Global Surveillance Supply Chain Map ⓘ
● Live APICommercial Spyware Database
● Live APIHistorical Spyware Index
● Live API: WikipediaMITRE ATT&CK® Techniques ⓘ
● Live APISocio-Technical Mitigation Framework
Framework Mitigation Matrix
| Framework Layer | Proactive Controls (Prevention) | Reactive Controls (Response) |
|---|---|---|
| 1. User Empowerment |
|
|
| 2. Organizational Governance |
|
|
| 3. Technical Infrastructure |
|
|
| 4. Legal & Policy Environment |
|
|
| 5. Civil Society & Public Awareness |
|
|
Quantitative Privacy Findings
Behavioral Adaptations
Survey Empirical Takeaways & Analysis
Systemic Privacy Concern vs. Behavioral Friction
The empirical results reveal a profound disconnect between user anxiety and practical self-defense. While 68.1% of respondents are "Very Concerned" about digital privacy, only 32.2% have adopted privacy-preserving technologies (such as VPNs, Tor, or Signal).
This privacy paradox is driven by technical friction, cost, and a lack of point-of-sale digital hygiene onboarding, reinforcing the framework's mandate for Layer 1: User Empowerment controls.
Ad-Hoc Defense Adaptations
Rather than adopting robust encryption tools, Ugandan users resort to ad-hoc, manual adaptations. 61.3% limit app permissions, and 57.2% manually toggle security configurations.
Crucially, 52.2% engage in online self-censorship and avoid sensitive conversations—a direct threat to open civic spaces, human rights advocacy, and democratic participation. This underscores the urgent need for systemic, technical, and regulatory intervention.
Gendered & Civil Society Vulnerabilities
Surveillance risks are highly asymmetrical. Empirical data indicates that spyware deployments disproportionately target civic space, particularly affecting feminist activists, journalists, and human rights defenders.
This uneven distribution creates widespread paranoia, suppresses online advocacy against technology-facilitated gender-based violence (TFGBV), and erodes essential interpersonal trust within critical activist networks.
Some Reported Surveillance Incidents in Uganda (2011–2025)
Chronological evidence mapping documented spyware deployments, network disruptions, and hardware-level intercept operations targeting political opposition, journalists, and activists in Uganda.
Anti-Surveillance & Forensic Toolkit Hub
In alignment with Layer 1 (User Empowerment) and Layer 3 (Technical Infrastructure) of the mitigation framework, this hub provides high-risk cohorts, including journalists, human rights defenders, legal advocates, and civil society actors, with active, open-source auditing utilities and personal security guides.
Mobile Verification Toolkit (MVT)
Amnesty InternationalDeveloped by Amnesty International's Security Lab, MVT is an open-source command-line tool designed to facilitate the consensual forensic acquisition and analysis of Android and iOS devices, detecting trace signatures left by highly targeted spyware like Pegasus and Predator.
- Extracts and inspects system logs and application databases.
- Compares device indicators against known Indicators of Compromise (IoCs) compiled by Citizen Lab.
- Safe, read-only analysis of backups to prevent device interference.
TinyCheck Spyware Detector
Network ForensicsTinyCheck allows you to easily capture and analyze network communications from a mobile device (iOS, Android, or IoT) using a separate Raspberry Pi-configured Wi-Fi hotspot. It identifies communication with spyware command-and-control (C2) servers in a completely non-invasive way.
- Zero footprint on the target device: Spyware cannot detect it is being monitored.
- Uses heuristic analysis and Snort/Zeek rules to match outbound traffic with cyber espionage servers.
- Extremely useful for civil society organizations running local clinics.
Citizen Lab Security Planner
A highly recognized, interactive digital safety planning guide developed specifically for high-risk cohorts by the University of Toronto’s Citizen Lab. It helps you build a personalized, actionable protection baseline tailored to your unique threat profile.
Front Line Defenders: Security in a Box
In collaboration with Tactical Technology Collective, Front Line Defenders provides an extensive library of localized, multi-language guidebooks on secure configurations for messaging apps, smartphones, emails, and browsing privacy.
EFF Surveillance Self-Defense
Knowledge BaseThe Electronic Frontier Foundation's expert guide to protecting yourself from electronic surveillance. It provides essential tutorials on secure communications, threat modeling, and circumventing censorship tailored for activists.
Access Now Digital Security Helpline
Incident ResponseA 24/7, free-of-charge secure helpline for civil society, activists, and journalists. If you suspect your device is compromised by state-grade spyware, Access Now provides rapid-response forensic support and mitigation advice.
Tails OS (Amnesic Incognito)
Secure OSA portable operating system that protects against surveillance and censorship. It forces all incoming and outgoing connections through the Tor network and leaves no trace on the host computer. Used extensively by investigative journalists.
GrapheneOS
Hardened MobileA privacy and security-focused mobile operating system with Android app compatibility. It mitigates entire classes of vulnerabilities, making it significantly harder for zero-click commercial spyware to successfully exploit the device.