Stealth Phones: your complete guide
  • Home
  • The List
  • The Black List
  • About
  • Contact
  • Blog

Untraceable cell phones. SRSLY?

4/1/2021

0 Comments

 
Picture

​Test your "secure" phone. Now.

Before everything, let’s face it: who do you really fear?
There are not so many hackers around that can actually track your cell phone, because of few simple reasons: expensive hardware needed, lack of knowledge regarding GSM stack and SS7 protocol effective exploits, not to mention that hackers have no interests on you, average Joe. Excepting your worried parents and jealous girlfriend, no one wants to know your (cell phone) geo-location. Tracking a cell phone is not a simple “push button” situation when is done by a hacker. That involve deep and extensive knowledge, pretty expensive hardware, time and not least, an considerable interest on you, average Joe. Which obviously is not the case unless you are just another skilled hacker or a high profile person.
The situation became serious when you did something bad or even illegal. Then, you became a target for law enforcement and/or intelligence agencies. And there is no way to hide your (cell phone) location. They have not only the legal ability to track down your cell phone at any time, but have also technological and human resources to do that, not to mention training and expertise.
In case you think that your own cell phone is secure, its time for 2 simple tests.

TEST No. 1: NETWORK TESTING BY EMERGENCY CALL.

Read more here.
0 Comments

Finally, a new XCell website

3/31/2021

0 Comments

 
Picture

XCell Stealth Phones: a new website and new products

To be honest with you and also with XCell guys, their old website doesn't look too nice. In fact the look was pretty obsolete with that old HTML version. But now everything is changed and you can navigate on a brand new web shop: https://stealth-phones.com
However, not the website look is important but the new products you can buy there, now without any sale restrictions as they had before on the old site (x-cellular.com).
There is also a page that we appreciate more than others: The Blog. After getting permission, we will start posting some interesting articles from their blog.
0 Comments

WHEN ENCRYPTION IS NOT ENOUGH: ULTRA-SECURE MESSAGING

3/3/2019

0 Comments

 

SMS ENCRYPTION REDEFINED

Picture
A revolutionary innovation: Multi-Layer Security Protocol - MLSP® by XCell Technologies
Real end-to-end encryption and protection

If you are either super important, super paranoid or a super spy, there are times when you need to be able to use a cell phone and not leave a trace or any chance to anyone to intercept your calls and text messages, including law enforcement and intelligence agencies.
 
Secure = encryption? Well, think again...
 
Nowadays, interception issue affects most of the people, even if they are not aware of it. Not to mention so called “off air GSM interception systems” or also known as “IMSI-catchers”, "GSM Interceptors" or "StingRays", it has been known since 2014 that using the legacy SS7 (Signaling System No. 7) protocol SMS based traffic text messages can be easily intercepted by using diameter based networks independently of device or OS type. Signaling System No. 7 vulnerabilities are easy to be exploited even by hackers, being a 50-year old protocol that is probably part of a majority of cell phones and text messages in the world.
Generally speaking, most of aware users regarding cell phone interception by above technologies, believe that using encryption solutions will secure their calls and text messages. It is encryption a real solution? Let's see...

Law enforcement, homeland security and other related actors have plenty of methods to intercept messages and read text content, even when using encryption. Ranging from SS7 exploit, encryption backdoors or intentionally weaken popular encryption algorithms to lawful hacking that circumvent encryption and hitech decryption technology, all are there at their fingertips.
 
Encryption will not protect your privacy. At all
 
Recent headlines warn that the government now has greater authority to hack your coell phones, in and outside the US. Changes to federal criminal court procedures known as Rule 41 are to blame; they vastly expand how and whom the FBI can legally hack cell phones. But just like the NSA's hacking operations, FBI hacking isn't new. In fact, the bureau has a long history of surreptitiously hacking us, going back two decades.
 
Back-doors provided for law enforcement
 
Encryption back doors remain largely viewed as weakening everyone’s protections all the time for the sake of some people’s protections on rare occasions. As a result, workarounds like the FBI found are likely to be the most common approach going forward. Indeed, in recent years, law enforcement agencies have greatly expanded their hacking capabilities.
Many reputable encryption developers and companies have chosen to retain the ability to read and use their customers’ content, or perhaps they decided there is not a sufficient business case to add end-to-end encryption or user-controlled encryption. Their users’ encrypted content is more readily available to law enforcement because they hold the decryption keys. The same companies offer their services in a way that encryption does not preclude their ability to hand over the content to law enforcement in response to a warrant. Are those services as secure?
 
Lawful hacking
 
Most of national security agencies had been shown to have immense surveillance capabilities actively deployed on a mass scale, especially in those countries where the functions of law enforcement and national security overlapped. Beside encryption master-key and built-in back doors that provide law enforcement exceptional access to anyone secrets and privacy, they now have unprecedented access to information through open-source intelligence, collection of metadata, sophisticated traffic analysis tools and data analysis algorithms. Many local and international laws are mandating insecurity by requiring government access to all data and communications that permits lawful hacking (otherwise known as encryption circumvention).
 
Encryption vendors and law enforcement work together to solve access "problem". One suggested fix is one way information sharing where vendors make law enforcement aware of unpatched exploits, allowing the government (and anyone else who discovers it) to use these vulnerabilities to gain access to communications and data. It's a horrible suggestion - one that puts vendors in the liability line of fire and encourages continued weakening of device and software security.  
Several individuals with backgrounds in security and systems have begun to explore possible technical mechanisms to provide government exceptional access.
Picture

XCell approach regarding SMS encryption and protection

XCell Technologies is really serious about mobile security, bringing you the most advanced SMS security solutions. Concerns about government mass surveillance and their ability to decrypt anything by using given master-keys, backdoors, lawful hacking or effective decryption solutions were the factors driving us to develop a brand new and 100% secure SMS communications which use not only strong military grade encryption but adding a new security layer by exploiting GSM network via MLSP®, to make sure there is no way to intercept text messages or metadata, even in encrypted mode. All above overleap existing commercial-encrypted apps, services, devices, and also law enforcement access to your sensitive info.
GSM provides by default only a basic range of security features to ensure adequate protection for both the operator and customer. Over the lifetime of a system threat and technology change, and so the security is periodically reviewed and changed here on XCell Technologies, and then applied on our products.
Taking advantage on GSM network architecture and SMS Transport Protocol, our SMS encryption technology is capable to send/receive encrypted and non-interceptable messages.
Our SMS encryption application called XCrypt use a groundbreaking multi-layer technology to protect SMS from being intercepted and decrypted. As a unique encryption application, beside strong military grade encryption, XCrypt use a brand new patented technology in order to send/receive encrypted messages: discrete GSM channels or Multi-Layer Security Protocol®. That will protect not just encrypted text messages but also metadata which is not encrypted.

XCrypt concept. An insight into techniques used for 100% secure text messages

Definitions

  • "A-Party" phone is the sender phone which send encrypted messages via MLSP®
  • "B-Party" phone is the receiver phone that will decrypt and display received message.
  • Plain text message: a standard text message that can be read by anyone. Can be intercepted and read with no effort.
  • Encrypted message: an encrypted text message that can be read only by using the right password. Can be easily intercepted in encrypted mode but cannot be read. A password is required in order to read the message.
  • Metadata: data about data. SMS metadata is not encrypted because is not contained by the encrypted text itself, but law enforcement agencies are collecting unencrypted metadata to characterize the encrypted data. SMS metadata contain data about sender, receiver, message encoding (UTF8, UnicodeX etc.), date/time and length.
  • Non-interceptable message: a text message (plain text or encrypted) which cannot be intercepted by any means.
  • Real end-to-end encryption: no Internet and 3rd party servers involved.
  • XCrypt: software application that use MLSP® in order to send/receive ultra-secure messages.
 
MLSP®
 
Multi-Layer Security Protocol - MLSP® consist in:
1. Physical layer: encrypted text message.
The phone will encrypt text messages by using following protocols:
• RSA
• AES 256
• Elliptic Curve (ECIES) 256
• SHA256
• Protected by ITSEC Evaluation level 3
2. Multi-layer routing and transport protocol. Encrypted SMS data is randomly segmented and distributed in bursts by Application Port Addressing Technology, via discrete GSM channels which usually are not "listened" by mobile interception systems (IMSI Catchers, GSM Interceptors or StingRays), both in air interface (UM Interface in terms of GSM networks) and Abis, A and C-G mobile network interfaces. This way, SMS data which is usually sent over GSM Layer 1 (and widely intercepted on Layer 1) will be sent by using a combination of GSM Layer 1 and GSM Layer 2 (LAPDm). By consequence, no mobile interception systems (as GSM Interceptors) and lawful interception systems (SS7 interception also known as network switch based interception or interception by the help of network operator) will be able to intercept the whole message but only a few bursts which are encrypted anyway.
3. Metadata protection. Regular SMS metadata is not saved in a separate file (called a metadata file). XCrypt separate metadata and the data it describes (SMS encrypted text), sending metadata file in bursts over the network, by the same Port Addressing technology. Metadata is of little value without the data file (SMS) it relates too. At the same time, metadata makes the data more usable and therefore, more valuable. An encrypted text message with separate metadata file will reveal nothing about SMS sender and receiver.

How does it work

Picture
1. Phone level
 
At phone level XCrypt use a technology called port directed SMS, which is widely implemented in J2ME MIDP on mobile devices. The concept is basically that when an user send an encrypted SMS message to "B-Party" phone, a particular port number will be specified along with encrypted message, so only the device which is "listening" on that particular port will be able to receive an encrypted message. When a message is received on a port that the application is listening on, the message gets directly routed to secure Inbox instead of going to the standard message Inbox.
XCrypt will locally encrypt text messages at military level, then by message segmentation and Port Addressing will send randomly splitted bursts (bit streams) along with certain port address data by adding redundant bits to information binary string, to "B-Party" phone. Along with encrypted split message, the application on "A-Party" phone will send Port Addressing data, which will trigger opening certain Port Address on "B-Party" phone. This way, encrypted message will go through, avoiding standard phone Inbox and arriving directly on secure Inbox.
All this steps are transparent on receiving ("B-Party") phone, which also require user interaction which have to allow message to be routed to secure Inbox and decrypted by inserting the right password.
On "B-Party" phone, by port destination address, encrypted bursts will be selectively received, concatenated, decrypted and displayed only on "B-Party" phone which use the same XCrypt application that "listen" on certain receiving ports.
If on the "B-Party" (destination phone) is not also installed XCrypt app, then received message will not be delivered nor displayed by the phone (not even in encrypted/unreadable mode) due to Port Addressing technology which filter messages by port address.
When encrypting SMS, metadata file will be generated separately from text message and not as an integral part of the message as regular SMS do. Metadata file will be then truncated and sent in bursts over GSM network, by Port Addressing technology. This way no metadata can be intercepted by SS7 means.
At this level, handset vulnerability refer to forensic grade hardware and software that intend to extract system files and private data off the phone, including decrypted messages stored on XCrypt secure Inbox. XCell phones are protected against forensic procedures by USB volatile filters which does not permit any unauthorised USB connection, triggering motherboard self-nuke. Moreover, XCrypt run on Sandbox partition which is 100% encrypted and protected against file extraction by self-delete mechanism.
 
2. Um level
 
Um interface (the radio link between the cellular network and the subscriber handset) is the most vulnerable and exploited part of the GSM network by MItM attacks (IMSI Catchers, GSM Interceptors and StingRays), since no network operator help or target consent is needed. XCrypt will make use of GSM network architecture and SMS Transport Protocol in order to protect (already) encrypted messages to be intercepted even in encrypted mode. After encryption, the modulation signal has a carrier wave using GMSK (Gaussian Minimum Shift Keying) modulation. GMSK is a two-state modulation based on the frequency keying stroke.  
On Um interface XCrypt will use MLSP® technology: encrypted message bursts are not sent only on usual L1 SMS channels - SDCCH (Standalone Dedicated Control CHannel) signaling channels, but also on other available channels which are not subject of SMS interception, forcing Signaling Layer 2 (data link layer based on LAPDm protocol) for SMS Transport.
Since GSM Interceptors are "listening" only SDCCH physical channels in order to intercept text messages, will catch only a few encrypted bursts sent over SDCCH but not the whole encrypted message which is split and sent over multi-channel by MLSP® technology.
Same for metadata file: is sent over the network in bursts, separately from encrypted message body. No metadata extraction is possible at this level.
 
3. Core network level
 
The four-layer transport protocol stack of SMS (application, transfer, relay, and link) is used at this level and the transfer layer of this stack is the one which secure text message. GSM core network consist in Mobile switching center (MSC), Home location register (HLR), Authentication center (AuC), Visitor location register (VLR) and Equipment identity register (EIR), which are all vulnerable to network switch based interception, also known as SS7 interception or lawful interception. This kind of interception can be successfully performed only by law enforcement and homeland security agencies, by the help of network provider that allow monitoring hardware installation (SS7 boxes) at their core network based on Communications Assistance for Law Enforcement Act (CALEA). CALEA's purpose is to enhance the ability of law enforcement agencies to conduct lawful interception of communication by requiring that telecommunications carriers and manufacturers of telecommunications equipment modify and design their equipment, facilities, and services to ensure that they have built-in capabilities for targeted surveillance, allowing federal agencies to selectively wiretap any telephone traffic. CALEA covers mass surveillance of communications rather than just tapping specific lines and not all CALEA-based access requires a warrant. Generally, lawful Interception implementation is similar to the implementation of conference call. While A and B are talking with each other, C can join the call and listen silently.
 
At this network level, the main security vulnerability consist in lawful interception. XCrypt is taking advantage on GSM core network, sending both encrypted and non-interceptable text messages by using MLSP® technology. Core network protocols cannot be enforced as Um interface can. Actually there is no need to manipulate those protocols and transfer layers as long as message bursts that transit this part of the mobile network can be logically concatenated (fit together) by Port Addressing and decrypted only by "BParty" phone which run the same XCrypt application and by knowing the right password. By consequence, no text messages can be entirely intercepted by a third party that use CALEA - lawful interception. A few encrypted SMS bursts which are eventually intercepted by SS7 cannot lead by any means to SMS interception. Thus no private data will be collected by this method, phone user privacy being preserved peer-to-peer from "A-Party" to "B-Party" phone.
Let's face it: most of nowadays encryption solutions are taking care only on text itself, neglecting message metadata which are still sent on plain text over the network, due to network requirements. Law enforcement and other actors are taking advantage on this, collecting unencrypted metadata to characterize the encrypted data, metadata being this way a valuable source of information for them.
By using MLSP® technology on both Um and Core network levels, collecting unencrypted message metadata is not possible, thus no way to extract any additional info beside encrypted message.
It has long been said that it doesn’t matter how secure your organization, or personal information and assets, are if you connect them with third parties that are less secure. So take note: servers are third parties.
A real end-to-end encryption require no third parties involved on the way from "A-Party" to "B-Party" phone.
 
For maximum level of security and privacy, XCrypt does not require any Internet connection, third party servers or monthly subscriptions. All processes and protocols run locally on the phones (on Sandbox partition) providing this way not just a real end-to-end unbreakable encryption, but also non-interceptable messages by the reasons explained above.
XCrypt has been already implemented as standard on XCell Basic v3 Stealth Phones, both on Basic and Advanced versions.
0 Comments

Confirmed: XCell Dynamic IMEI v3, launched. And more to come 

6/2/2015

4 Comments

 
Our guessing was confirmed a few days ago: XCell Technologies not only launched the new version of the their famous now XCell Dynamic IMEI but even a new product, too: Dual SIM Dynamic IMEI Stealth Phone. But now about XCell Dynamic IMEI v3:
"The NEW XCell Dynamic IMEI v3 Stealth Phone is the most powerful we have ever built" says XCell Technologies CEO, Steven Broadey. And this is why: they added a new anti-interception feature, the phone being built taking into account the emerging trends and new technologies used by latest IMSI cacthers/Stingrays and GSM interception systems.
    • has been added a new Anti Interception function
    • has been improved GSM interceptor/IMSI catcher detection algorithm (cryptoTracerⒸ) based on the latest developments and achievements in lawful interception industry
    • better management of location tracking pings
    • location spoofing has been improved by neighboring cell towers monitoring
    • GSM Interceptor Proximity Alert has been updated
    • errors generated by TMSI allocation has been suppressed
This is the new v3 User Interface, showing the new functions added:
genuine stealth phone
Finally, XCell Technologies disclose the main hardware modifications they have done on Samsung G608 motherboards, making clear for everyone that other Samsung platforms are not suitable to stealth phones:
genuine stealth phones
XCell Dynamic IMEI v3 motherboard modifications needed for firmware proper functioning
genuine stealth phones
XCell Dynamic IMEI v3 modified motherboard
Not at all surprisingly, XCell Technologies engineers has focused on brand protection, fighting against product counterfeiting. For the first time the company reveals the security methods and labels that they use on their products:
genuine stealth phones
XCell Dynamic IMEI v3 hologram security seals
genuine stealth phones
XCell Dynamic IMEI v3 hologram security seals
genuine stealth phones
XCell Dynamic IMEI v3 phone boxes and shipping boxes
What else from XCell Technologies? Well, they have released a new low cost Dual SIM Stealth Phone. Simple as that.
dual sim stealth phone
XCell Dual SIM Stealth Phone
What is all about this dual SIM phones?
This seems to be the entry level for Dynamic IMEI phone users, that comes with just few but essential functions:
1. Manual change IMEI, user defined (both IMEI are manually changing)
2. Call Interception Alert (A5 crypto tracer)
3. GSM Interceptor Proximity Alert (Camp Alert)
Picture
Hopefully, we will get our hands on both this new XCell products. As usual, only for testing purposes.

The really good news: XCell Technologies says that their Android dynamic IMEI stealth phone is just around the corner.

*photos courtesy of XCell Technologies
4 Comments

Authentic Stealth Phones: 9 easy steps to identify the real ones

5/31/2015

0 Comments

 
The process of identifying a fake product is an art in itself. While most counterfeit products can be identified for it being simply identical or deceptively similar, there are other products, brands and designs which might not be able to be identified by the common eye. In order to find information on fake products, a keen sense of knowledge of brands and original products required to be cultivated. In case of high tech products like XCell Stealth Phones you need not only to take a closer look but also solid technical knowledge.
This is why we have made a simple guide to help you to identify a genuine XCell Stealth Phone.

Please see below what's new on the XCell Technologies new release, XCell Dynamic IMEI v3 Stealth Phone:

genuine stealth phones

Shipping Box: according to XCell Technologies representatives, since January 2015 all XCell Stealth Phones are being shipped into special branded boxes, as you can see on the image below.

genuine stealth phone
Genuine stealth phone shipping box

genuine stealth phone
According to XCell Technologies, since 2010 all XCell Stealth phones comes in branded black boxes.
Please note that XCell Technologies resellers are using the same black boxes, the only difference being that reseller boxes have no XCell logo.

genuine stealth phone
Genuine stealth phone box
Update:
XCell Technologies has changed the phone box design since May 2015:
genuine stealth phone
New genuine stealth phones boxes

genuine stealth phone

You can find the manufacturer website URL on the phone box.
No XCell Technologies URL on reseller boxes.

genuine stealth phones
Manufacturer URL
Update May 2015:
Phone box design has changed:
genuine stealth phones
New stealth phones box design

original stealth phones

Every XCell product comes with a security seal applied on the phone box, on the right corner.

genuine stealth phone
Phone Box Security Seal
Update May 2015:
Phone box security seal has been changed:
genuine stealth phones
New hologram security seal

genuine stealth phones

XCell Stealth Phones come with an User Manual, where special functions are explained in detail. Because of sensitive information, some details - such as location spoofing function - are not public, being communicated directly to the user by email.

original stealth phone
XCell Dynamic IMEI v2 User Manual
Update May 2015:
A new User Manual or the newest XCell Dynamic IMEI v3 Stealth Phone:
genuine stealth phone
New XCell Dynamic IMEI v3 User Manual

genuine stealth phonesSpecial setup instructions

Authentic XCell Stealth Phones come with a Quick Settings leaflet, containing special setup instructions.

genuine stealth phones
Special setup instructions

genuine stealth phone

Excepting XCell phones sold by resellers, all XCell devices have an engraved logo. At the express request of the user, the phone can be delivered without logo (generic phone), for a discreet use.

genuine stealth phone
XCell Logo

genuine stealth phones

All XCell handsets are having two distinctive security seals, on the backside: the golden one, attesting that the phone is an original XCell product, and a smaller one which secures one of the screws.

genuine stealth phones
Backside Security Seals
Update May 2015:
Backside security seals has been changed by XCell Technologies:
genuine stealth phones
New hologram security seals

genuine stealth phone

XCell Dynamic IMEI v2 Stealth Phone has a dedicated user interface and an original theme.

original stealth phone
Genuine User Interface of XCell Dynamic IMEI v2, original theme
Update May 2015
The new XCell Dynamic IMEI v3 User Interface have a new User Interface:
genuine stealth phone
New XCell Dynamic IMEI v3 User Interface

These differences are visible to the naked eye.
The other differences (the most important actually) are related to the effective functioning of the phone and its special features. Authentic stealth phones works exactly as described on the manufacturer website, while counterfeit stealth phones keeps only the appearance of a stealth phone, its special features being nonfunctional. We have posted on our blog about functional differences between fake and real stealth phones: click here.
We suggest you also watch the demo movies that can be found on the manufacturer website: authentic stealth phones has been tested against an GSM Interceptor.

What can you do if you're not sure?
If you are not sure that you are going to buy an authentic stealth phone, firstly check if there are all security seals and other items listed above. If the seller will not respond to your requests (by sending some detailed pictures, for example), there are already doubts and a primary indication that the phone is not authentic. You may also contact us just because we have enough knowledge that allow us to distinguish between genuine and fake stealth phones. Or you can simply contact directly the original stealth phones manufacturer to confirm if the phone comes from a genuine reseller. Simple as that. And please keep in mind that behind a small price usually hides a counterfeit product.

What can I do if I have already bought a fake stealth phone?
First of all, you have to be aware that you are carrying a ticking bomb in your pockets, only looking like a stealth phone. It's only a matter of time until the so-called stealth phone will betray you, and your wiretapping will explode in a criminal case.
Well, unfortunately we can not offer any legal advice. We suggest you to contact your lawyer or call the Police if you consider that you have been a victim of stealth phone scam. If you bought fake stealth phone on eBay, there is very little chance to refund your money from scammers: they successively open new accounts, as the old accounts are closed down following the victim complaints. Anyway, the first thing you need to do is to quit using your fake stealth phone: does not gives you any call security.

What is the impact of counterfeiting? What are the trends?
The impact of using a fake stealth phone consist in a major breach to your personal security and can even affect your freedom. In the last year the trend for stealth phone scam is that scammers are trying to give the appearance of an authentic stealth phone through various elusive strategies, as the one with the fake label on the backside of the phone, which has been presented on our blog a while ago. Also the scam trend is manifested through the use of simple techniques to attract new buyers, such as "2015 product update": buyers are being fooled that would buy an updated version of the phone stealth. We have wrote about it recently, in our blog.
0 Comments

More tests, more phones

5/31/2015

0 Comments

 
Back in December 2014, we have tried to bypass USB security filter of an XCell Dynamic v2 Stealth Phone (the true stealth phone) as a part of tests regarding passive security and anti-forensic features.

First, we have used our Cellebrite cell phone extraction device in order to extract physical files of the XCell Stealth Phone. No results. Cellebrite UFED could not connect at all to the phone via USB, physical access to the phone being 100% disabled.
genuine stealth phone
Testing a real stealth phone on UFED
genuine stealth phone
UFED fail: no connection to target phone, due to phone USB security filters
So we took the next step: we have tried JTAG connection, when disaster occurred: XCell Stealth Phone has died, with no chances to be resurrected. We found that bootloaders were self destroyed (as a security measure), the operating system can not be launched and this way no data can be extracted. XCell Stealth Phone went into a persistent loop in which we have not managed to bypass.
Picture
XStealth Technologies officials have told us that the phone is compromised, and no longer can be repaired in any way except by replacing the motherboard, an operation that cost 400 euro.
Conclusion: XCell Dynamic IMEI v2 phone is 100% secure when it comes to forensic investigations. No chance to extract any information of the phone.

So, earlier this year we have ordered other two XCell Dynamic IMEI v2 Stealth Phones, to continue our study. And now both phones has arrived to our laboratory:
genuine stealth phone
Genuine stealth phone box
genuine stealth phone
Genuine stealth phone boxes
genuine stealth phone
Genuine stealth phone boxes
genuine stealth phone
Genuine stealth phone boxes
We will keep you updated with the test results of USB security filter bypass.
0 Comments

The truth exposed: Stealth Phones, fake vs. real ones

5/30/2015

0 Comments

 
The ultimate test
Before reading any explanation, please watch the video footage below. It is self explanatory.
This is the supreme test that any scammer or fake stealth phones vendor will hide from you.

The video contains a test done with a SIM card that was intercepted (taped) at that time, tested on two stealth phones (aka change IMEI phones, untraceable phones or dynamic IMEI phones) that looks the same but
are essentially different: a fake and a real one.

First we have tested the fake stealth phone. Although the SIM card was intercepted, no call interception alarm was triggered.
The second time we have tested the intercepted SIM card on a real stealth phone. Interception alarm was triggered as soon as the SIM card has been inserted into the phone. Also during the call was displayed call interception alarm: an open padlock red that persists throughout the call.

Picture
Preliminaries.

We are a team of three mobile communications professionals from an European University.  Read more about us.

Elaborating an academic study about security of mobile communications, our team bought among others a stealth phone via the Internet, as anyone else would do: by choosing the lowest price. We regretted this later, because at that time the low price was only one that made ​​the difference.


Our case.

Current market shows a relative abundance of stealth phones, most of them sold by private individuals on traditional online sales channels (Internet consumer-to-consumer direct sales). A person interested in buying such a phone is no doubt attracted by the lower price, as the only selection criterion, in the absence of significant information about stealth phones and how mobile wiretap works.
Many buyers have already made this wrong choice, and now their mobile calls security is seriously affected. Why? Because they bought a cell phone that just looks like a stealth phone without actually having stealth phone functions: only apparently stealth functions are present on the phone, but they do not work properly, as vendors claim.
Why this situation? Because a stealth phone needs not only special software, but also substantial hardware changes that make the software run properly. Both software and hardware changes are patented by a Swiss based company, XCell Technologies LLC. This company (and their resellers and distributors) are only able to deliver a true stealth phone, 100% functional.
From technical explanations provided by the company representatives we understand that malfunction also come from the wrong choice of phone platform. While legitimate manufacturer use Samsung G608 platform, those fake stealth phones use cheaper Samsung G600 platform, which is simply not compatible 100% with the software (see Photo 1). We have to mention that the two phones Samsung G600 and G608 looks apparently identical, but have significant structural differences.
fake stealth phones
Photo 1
Picture
Have you ever wondered why some stealth phones are sold by private individuals? The answer is unequivocal and straightforward: on these phones is installed a cracked software, which not work properly, is unstable and is a fraud, in the end of the day. Also, these phones are not hardware modified in any way, which makes the software installed to be useless, giving only the appearance of a stealth phone, not the functionality of a real stealth phone.
In fact, people who sell these fake stealth phones do not know anything about the phone function, nor about the ways in which mobile phones are wiretapped (intercepted). They are limited to installing the cracked software on the phone and copying brief explanations and images from legitimate manufacturer webpage, trying to look more real, informed and professional.
Those who buy a fake stealth phone from a private person (as we did in the first instance) will have to face other problems, too: the lack of elementary customer service  or worse,completely wrong explanations about stealth phone functions that will seriously affect the security of mobile calls. Also there is no product guarantee or eventual replacement or repair. The fake stealth phone bought by us got stuck after a few weeks of testing and we were lucky that we managed to make the film. Repair or replacement was refused repeatedly by the vendor, and the website where we've bought has not taken any action against him. Vendor says he only sells phones, not repair nor replace them because it's just a private person and he do not provide additional information about the phone, for those who bought it. But when it comes to personal security and mobile communications, such an approach is totally wrong.

For these reasons we had to buy another stealth phone, to be able to continue our study on mobile communications security. This way we found XCel Technologies, a legitimate company that manufacture and sells these real stealth phones. Before buying the phone we have asked about operating conditions and repair or replacement in case of failure. We received a prompt and professional customer service, every single time. This company replaces any defective mobile phone, the general warranty term is two years, common to any other mobile phone. Until now, however, was not the case for any fixes, the phone works perfectly and does the job, as you can see in the video.

Customer service responses has helped us in our research on mobile communications security, through understanding the ways in which the mobile phone is monitored, tracked and wiretapped, the way it works IMSI catchers (aka StingRays in US) and possibility to detect them. Our study results will be published soon on the University website. Our study conclusions promises to be extremely interesting.
Other differences.

Besides that wiretapping alerts do not work at all, fake stealth phones differ from real ones not only from functional point of view but as legal aspects too. Fake stealth phones differ from real ones by the following aspects:

For legal protection of hardware changes, on real stealth phones are applied security seals, on the inside of the phone. See Photo 2, below.

fake stealth phones
Photo 2: Security seals
Real stealth phones have engraved the manufacturer logo (see Photo 3), because they can not be legally sold as original Samsung phones, since hardware and software changes that has been done are beyond the control of Samsung Electronics Co. From this point of view XCell Technologies comply with local law and international copyright law, without any export restriction of their products. Legitimate manufacturer sell stealth phones that are Samsung modded cell phones.
fake stealth phones
Photo 3
fake stealth phones
Photo 4
Another visible difference: fake stealth phones are using shoddy packaging, a ridiculous copy of the original packaging, as can be seen in the Photo 4. We've got information from other fake stealth phone users that some vendors sell these handsets even in paper envelopes or wrapped in bubble foil without any other packaging.
Since a real stealth phone have software and hardware changes, can not be sold as a genuine Samsung phone in the original packaging,  because basically is another product. The packaging used by the legitimate manufacturer is a quality one, unique and distinctive.

What else a scammer or fake stealth phone vendor will use to make you think that is selling a genuine stealth phone?
Well, some of them are trying to use some counterfeit IMEI stickers on the phone backside, trying to give a genuine appearance to their fake stealth phones.Sure, a sticker will not make a fake stealth phone, genuine. In fact not the sticker is important in our opinion, but the phone functions. And fake stealth phone functions does not work at all, as we have clearly demonstrated in the test above.
Others will try to lure you with attractive and suspiciously low prices.
It's too good to be true? If you find yourself asking this question, then probably yes, it is not true.
Others will try to use marketing methods that looks pretty hilarious when it comes to secure phones, as the guy behind imeichanger.com, anti-tap.com and secretgsm.com has done in the past: offering a free t-shirt for every handset that he sold. The same guy has been caught in the past, using fake G608 IMEI stickers, trying to fool people that he is selling proper stealth phones and not fake ones.
From then, his business reputation was pretty much ruined and now is trying to promote the idea that the sites and business owner has changed, trying to escape of such a bad reputation.. Please see our blog.

ounterfeit stealth phonesCounterfeit stealth phones
Conclusions. 

The low price can often be a trap, and in this particular case can be a very dangerous one: it will cost your personal security and will disclose secrets that you think you defend by using a fake stealth phone.

A counterfeit stealth phone is a ticking bomb in your pocket. Unfortunately you find out that you have been fulled by the scammer when usually is way too late: you "stealth" phone has been wiretapped and you got busted.

Trying to help those who want to buy a stealth phone, we asked XCell Technologies to notify us the resellers and distributors list. Company representatives were pretty reserved on the subject, saying that permission to disclose these details is not a part of distribution agreement, emphasizing that some resellers sell these phones under their own trademark and do not wish these details to be made public.
As you can guess, private individuals selling fake stealth phones does not fall into this category.





Picture
0 Comments

    Author

    Stealth-phones-guide.com

    Archives

    April 2022
    January 2022
    April 2021
    March 2021
    March 2019
    August 2016
    February 2016
    October 2015
    June 2015
    May 2015

    Categories

    All
    10 Functions Scam
    2016 Stealth Phones
    2019 Stealth Phones
    2021 Stealth Phones
    2022 Fake Stealth Phones
    2022 Scam Alert
    ABC Limited Scam
    Android Stealth Phone
    Android Ultra Secure Stealth Phones
    Anonymous Sim Card Scam
    Anti Eavesdropping
    Anti Interception
    Anti Stingray
    Antitap.com
    Anti Wiretapping
    AUDIO VIDEO INTELLIGENCE CORPORATION
    Authentic Stealth Phone
    Basic Stealth Phone
    Blackstone-security Scam
    Call Encryption Fail
    Cell Phone Interception
    Change Imei Free Software
    Change Imei Phone
    Change IMSI
    Change Voice
    Change Voice Scam
    Counterfeit Change Imei Phones
    Counterfeit Untraceable Phones
    Couterfeit Stealth Phones
    Deniz Ok Scammer
    Dual SIM Stealth Phone
    Dynamic Imei Phone
    EBay Stealth Phone Scam
    Encrypted SIM Cards
    Encrypted Smart Phone Scam
    Entry Level Dual Sim Burner Phone Scam
    Fake Imei Changer
    Fake Stealth Phones
    Fix.mobile.to.work
    Free Samsung G600 Stealth Phone Firmware 7 Unctions
    Free Stealth Phone Firmware
    Genuine Stealth Phones
    Gsm-interceptor.co.uk
    Imeichanger.com
    JD Mobile Unlock Service
    MLSP
    Multi IMSI SIM Card
    Multy Layer Security Protocol
    Multy-Layer Security Protocol
    Nokia Stealth Phones
    OneTech International Co
    Original Stealth Phone
    Phone Number Change
    Real Change Imei Phone
    Real Stealth Phones
    Real Untraceable Phone
    Russian SIM Cards
    Samsung G600 Stealth Firmware
    Secretgsm.com
    Sectelworld@protonmail Scam
    Sec_tel_world Scam
    Secure Cell Phone
    Secure_gsm Scam
    Secure SIM Cards
    Secure Wifi Router Scam
    SHX Trading SRO
    Siemens R32 Scam
    Siemens-sl-75-scam
    Siemens Stealth Phone Scam
    SMS Encryption
    Spdirect
    Spoofing Phone Number
    Spystore Ireland
    Stealth IPhone 5 Scam
    Stealth Phone
    Stealth Phone Free Software
    Stealth Phone Scam
    Stealth Phones.com
    Stealth-phones.com
    Stealth Phones New Release
    Stealth Phone Software
    Stealth Phones That Work
    Stealth Phones Trick
    Stealth Phone V4 Scam
    Stealth Samsung S4 Duos Scam
    Stealth Samsung S5 Scam
    Stealthtronic.com
    Test Your Secure Cell Phone
    Ultra Secure Messaging
    Ultra Tough Anti Tapping Phone Scam
    Untraceable Cell Phones
    Untraceable Phone
    Untraceable Phone Free Software
    Untraceable Phone Scam
    Untraceable Phone Scam Wiretapping Detection
    VHF Stealth Dual SIM Anti Tapping Phone Scam
    Voice Call Encryption Fail
    Voice Changer
    Voice Encryption
    Wifi Hotspot Scam
    Wiretapping Detection
    Witz.end.solutions
    XCell Basic V3
    XCell Stealth Phones
    XCell Technologies 2016
    XCell Technologies New Release
    ZOPO Anti Interception Phone Scam

    RSS Feed

Stealth Phone Scam: a reality that you need to know