EXIGENT MEDIA
EXIGENT MEDIA
  • Home
  • Threat Intelligence
  • About Us
  • Contact
  • More
    • Home
    • Threat Intelligence
    • About Us
    • Contact
  • Home
  • Threat Intelligence
  • About Us
  • Contact

mobile THREAT INTELLIGENCE REPORTS

FAR FROM HOME - MOBILE SURVEILLANCE threat INTELLIGENCE

Far From Home is a series of threat intelligence reports providing a vision into surveillance attacks and cyber espionage campaigns targeting US mobile phones.  The reports expose years of active surveillance operations, resulting in media stories and whistleblower disclosures to US agencies.  The reports expose source countries and network operators originating these attacks.  Featuring deep insights into threat operations, these reports are the culmination of independent expert investigations into attack data from state sponsors and organized crime groups.

Exigent Media has transitioned the publishing of mobile cyber research reports to The Mobile Intelligence Alliance, a mission-focused threat research organization.  Visit the MIA site to access extensive research on mobile espionage threats and more.

Get Reports

Far From Home - threat intelligence report highlights

Exigent Media Foreign Surveillance Report

Foreign Surveillance Activity of US Mobile Users is Massive in Scale

With millions of transactions, massive volumes of threat activity have occurred for years and continues to this day.

Allies, Adversaries and Neutral Countries Participate in Espionage Targeting US Phones

Surveillance operations are not limited to traditional adversaries. Allied and neutral countries also participate actively to monitor phone locations and communications.

Detecting Surveillance Activity is Easier Than Preventing It

Security firewalls provide a layer of detection and prevention. However, many network operators use conservative approaches to reduce the risks of potentially disrupting international roaming service

Attacks Take Place on Both 3G and 4G Networks

Mobile devices use 3G and 4G networks simultaneously.  Threat actors exploit both technologies to increase the success rates of attacks.  In 2020, attackers are adapting to favor 4G attack vectors which poses great risks to 5G.

Attacks are Coordinated Between Network Operators

Countries are observed attacking the same mobile users with similar attack methods. Attacks sources from multiple Caribbean countries are observed with indications of network selling to conduct intelligence operations.

The Lack of Security Mandates Increases Attacks From Developing Nations

Current security guidelines are not sufficient to hold networks accountable for these attacks.  The lack of mandates encourages small nations to participate in the threat economy, effectively selling their network to adversaries.

More Threat Research Available

This report only reveals the surface of foreign espionage activity.  If you have information related to  mobile attacks or are interested in hearing more about  attack trends and insights we would love to hear from you directly.


To be provided with special access, reporters, media and NGO's should contact Exigent Media directly using the secure contact link below or use the form to request an email encryption key and we will respond ASAP.

Contact Us

Copyright © 2022 EXIGENT MEDIA LLC. - All Rights Reserved.

  • The Digital Adversary