Technical and legal questions from forensic investigators, CISOs, and legal counsel.
SmartScan is developed by Secure Path Ltd, a UK-registered company.
Our team consists of independent security researchers with:
Our only source of revenue is helping people detect threats. We have no reason to miss anything.
The spyware industry has structural conflicts of interest.
In December 2024, Amnesty International documented how Serbian police used Cellebrite UFED to unlock activists' phones, then immediately installed NoviSpy spyware on them. The same ecosystem that provides "forensic tools" also enables surveillance.
We believe detection tools should be independent from the surveillance industry. That's why we built SmartScan with no connections to spyware vendors, government contracts, or intelligence agencies.
No. Zero commercial, technical, or political relationships with:
We don't sell spyware. We don't work with those who use it. We only detect it.
Every documented Pegasus infection was discovered by independent researchers — not by commercial security products.
Citizen Lab (University of Toronto) and Amnesty International Security Lab have detected and documented virtually all known government spyware campaigns. Standard commercial tools consistently missed these infections.
We use the same IOC databases that independent researchers publish, combined with network behavioral analysis that doesn't rely on file-system access.
Access is not the same as incentive.
In December 2024, Amnesty International's Security Lab documented how Serbian police used Cellebrite UFED to unlock activists' phones — then infected them with NoviSpy spyware. The tool designed for lawful access became the delivery mechanism for government surveillance.
When a company's revenue depends on government contracts, detecting the same governments' spyware creates a fundamental conflict of interest. This isn't speculation — it's documented.
We aren't making claims — we're pointing to publicly documented facts:
You can verify these sources yourself. We're simply acting on the logical conclusion: if you want to detect government spyware, use tools that don't depend on governments for revenue.
Every documented Pegasus infection in history was discovered by independent researchers.
Not by antivirus. Not by enterprise security products. Not by mobile forensics suites. Independent academic and human rights researchers — Citizen Lab (University of Toronto), Amnesty International Security Lab, and their collaborators — found every case.
This includes infections on devices that had commercial security products installed and running.
Theoretically, any software can be compromised. Here's why our risk is lower:
We encourage healthy skepticism. If you're a high-value target, combine SmartScan with device-level analysis using open-source tools like MVT.
We aggregate indicators from 15+ independent, publicly verifiable sources:
| Source | Type | Update Frequency |
|---|---|---|
| CIRCL / LU-CERT | Luxembourg National CERT (MISP) | Real-time sync |
| Amnesty Tech | Government spyware IOCs | Weekly |
| Citizen Lab | Documented spyware campaigns | Weekly |
| abuse.ch | SSLBL, Feodo, URLhaus, ThreatFox | Every 6 hours |
| Spamhaus | DROP/EDROP blocklists | Daily |
| JA4DB (FoxIO) | TLS fingerprint database | Weekly |
| Tranco | Academic top 1M whitelist | Daily |
| Emerging Threats | Suricata/Snort rules (Proofpoint) | Daily |
| Cloud Provider CIDRs | AWS, GCP, Azure, Cloudflare | Daily |
All feeds run via automated pipelines with cryptographic integrity verification. Our database currently contains 50,000+ active IOCs and 1.5M+ whitelisted domains.
CIRCL (Computer Incident Response Center Luxembourg) is the national CERT for Luxembourg, operating under government mandate since 2008.
They maintain the MISP Project — the most widely used open-source threat intelligence platform globally. We have direct access to their MISP instance with:
Government-grade spyware:
Commercial stalkerware:
Generic malware:
VirusTotal is owned by Google (Alphabet). Commercial feeds may have restrictions on what they share based on business relationships or licensing terms.
We prefer sources with:
Our sources (CIRCL, Amnesty, Citizen Lab, abuse.ch) exist specifically to protect civil society — not to monetize threat data.
Yes, our reports are designed for legal admissibility. We follow internationally recognized forensic standards:
Every report includes SHA256 hashes, chain of custody documentation, and packet-level references for each finding. However, admissibility ultimately depends on jurisdiction and the presiding court. We recommend consulting with legal counsel familiar with digital evidence in your jurisdiction.
Chain of custody is tracked cryptographically from capture to report:
Each custody event is cryptographically linked to the previous event, creating a blockchain-like integrity chain. Any break in the chain is immediately detectable.
Our analysis methodology is built on the OIHL Framework (Observation-Interpretation-Hypothesis-Likelihood), which ensures forensic conclusions are defensible:
This framework prevents over-interpretation and ensures we never present speculation as fact. Every conclusion shows the underlying evidence and alternative hypotheses considered.
Spyware must communicate. Even the most sophisticated surveillance tools need to:
We detect these communications through multiple correlation methods:
There's an important distinction:
Even Pegasus — which uses sophisticated zero-click exploits — must eventually phone home. When it does, it uses:
How Pegasus was discovered in the first place? By analyzing network traffic. Citizen Lab and Amnesty Tech identified Pegasus infections by monitoring DNS queries and TLS connections — the same approach we use.
If spyware communicates, we can potentially detect it — regardless of how it was installed.
JA3 is a method of fingerprinting TLS clients based on the Client Hello packet. Every application has a unique way of initiating TLS connections — the cipher suites offered, extensions used, and their order create a fingerprint.
JA4+ is the next generation, providing more granular fingerprints:
JA4 — Enhanced client fingerprint (more collision-resistant than JA3)JA4S — Server Hello fingerprintJA4H — HTTP request fingerprintJA4T — TCP fingerprintJA4X — X.509 certificate fingerprintWe use the complete JA4+ suite from FoxIO's JA4DB, combined with SSLBL's JA3 blacklist, to identify malicious traffic even when encrypted.
Attribution is only reported when we have high-confidence indicators.
We attribute to specific spyware families (e.g., "Pegasus", "Predator") only when:
For behavioral-only detections (suspicious patterns without IOC match), we report the threat category (e.g., "Stalkerware-like beaconing", "Data exfiltration pattern") without claiming specific attribution. This prevents false accusations while still alerting to genuine threats.
Our multi-engine correlation approach minimizes false positives:
To further reduce false positives:
We prioritize accuracy over alerting volume. A "clean" scan is not a failure — it means no indicators were found.
Every finding is mapped to MITRE ATT&CK v18.1 (both Enterprise and Mobile matrices), providing:
This standardization allows:
A complete scan consists of two phases:
Total: <15 minutes for standard scans (10 min capture + ~5 min analysis).
Analysis engines run in parallel: Zeek protocol analysis, Suricata signatures, behavioral analysis, JA3/JA4 fingerprinting, and threat intelligence correlation.
Feeds are updated automatically on different schedules based on source update frequency:
All feeds run via systemd timers with automatic failure retry. The database currently contains 50,000+ active IOCs.
Reports can be exported in multiple formats:
STIX 2.1 bundles are compatible with MISP, OpenCTI, Splunk ES, Microsoft Sentinel, and other platforms.
Raw PCAP files are processed and then deleted from our servers after analysis is complete.
Your scan reports are permanently saved in your user dashboard. You can access, download, or share them at any time from your account.
We never share your data with third parties (except as required by UK law). All data at rest is encrypted using AES-256.
This is a known evasion technique called domain fronting or CDN hiding. Sophisticated spyware may route traffic through CloudFront, Fastly, or Google infrastructure to blend with legitimate traffic.
Our detection capabilities in this scenario:
We are transparent about this limitation. If you suspect CDN-based evasion, we recommend combining network analysis with device-level forensics for comprehensive coverage.
A clean scan means no indicators were found in the captured traffic — not that your device is definitively uncompromised.
A clean result could mean:
For high-assurance scenarios, we recommend:
If you're a journalist, activist, politician, or executive who might be targeted by state-sponsored surveillance:
No single tool catches everything. Layered defense is essential for high-risk individuals.
Our forensic team is available to discuss your specific requirements.
Contact Us