Far From Home is a series of threat intelligence reports providing a comprehensive vision into surveillance attacks and cyber espionage activity against US mobile phones. The reports expose 3 years of active surveillance operations targeting US mobile users, resulting in massive breaches of user privacy. The reports feature global rankings of source countries and network operators originating the attacks. Featuring deep insights into threat operations, these reports are the culmination of independent expert investigations into attack data from state sponsors and organized crime entities.
With millions of transactions, massive volumes of threat activity have occurred for years and continues to this day.
Surveillance operations are not limited to traditional adversaries. Allied and neutral countries also participate actively to monitor phone locations and communications.
Security firewalls provide a layer of detection and prevention. However, many network operators use conservative approaches to reduce the risks of potentially disrupting international roaming service
Mobile devices use 3G and 4G networks simultaneously. Threat actors exploit both technologies to increase the success rates of attacks. In 2020, attackers are adapting to favor 4G attack vectors which poses great risks to 5G.
Countries are observed attacking the same mobile users with similar attack methods. Attacks sources from multiple Caribbean countries are observed with indications of network selling to conduct intelligence operations.
Current security guidelines are not sufficient to hold networks accountable for these attacks. The lack of mandates encourages small nations to participate in the threat economy, effectively selling their network to adversaries.
This report only reveals the surface of foreign espionage activity. If you have information related to mobile attacks or are interested in hearing more about attack trends and insights we would love to hear from you directly.
To be provided with special access, reporters, media and NGO's should contact Exigent Media directly using the secure contact link below or send a secure email to email@example.com or request an email encryption key and we will respond ASAP.