Stealth Phones: your complete guide
  • Home
  • The List
  • The Black List
  • About
  • Contact
  • Blog

Con Man exposed: Deniz Ok [ eBay: sec_tel_world ]

1/24/2022

0 Comments

 
Deniz Ok, sec_tel_world scam
All info below are coming from XCell Technologies management team, and also from public sources.

We have discovered a new kind of scam/fraud and the person behind that: Deniz Ok. Apparently is located in Düsseldorf (Germany) and London (UK), if we consider data he offer on eBay account. We doubt that is his real name, but he use this name to run all kind of scams and fraud, associated with 2 company names: ABC Limited (UK) and ABC Großhandel (Germany).

Late edit: Deniz Ok changed his eBay account name from sec_tel_world to secure_gsm, hoping to erase traces and continue this scam. It didn't work.

The fraud

Fraudster Deniz Ok managed to get a large quantity of XStealth Phones without paying a dime. Of course, by fraud. Yes, XStealth Phones he sell on eBay are genuine. But... Yes, there is a "but": being a custom made order, his lot of XStealth Phones does have some particularities:
1. All XStealth Phones were delivered without batteries (which are single cell custom made batteries that avoid pro bug insertion). Instead of genuine batteries, fraudster use regular batteries which not only last less than original batteries but are also vulnerable to location tracking and environmental listening when a battery cell is replaced with this sort of professional bug.
2. Based on Deniz Ok requirements, certain software components were removed, and also added other software applications which made those particular XStealth Phones vulnerable to location tracking and remote intrusion.
3. On top of that, due to the nature of products, the fraud was reported first in Germany to Federal Criminal Police Office (Bundeskriminalamt / BKA) and Federal Office for the Protection of the Constitution (Bundesamt für Verfassungsschutz / BfV) and then in the UK, to National Crime Agency (NCA), Metropolitan Police (MSP). MI5 and UK Counter Terrorism Policing. All above agencies got all necessary data to locate every single XStealth Phone ordered by fraudster.

By consequence, every buyer will be located and questioned by law enforcement, once powering up the phone. Instead of a highly secure stealth phone, you will get a banana phone...
This is not too smart for Deniz Ok, and seems like he doesn't care about his customers which are buying those phones to avoid exactly this type of problems.
scammer Deniz Ok

The fraudster

fraudster Deniz Ok
Probably Deniz Ok is not his real name. We let you know the name he use on eBay scam and other fraud, just to be aware and avoid buying or dealing with him. The same for company names he use: ABC Limited (UK) and ABC Großhandel (Germany). There are no active companies with this name in the UK and Germany, as shown below. Both UK companies were dissolved before creating his eBay account, so probably he stole and used company names and details only to give a legal appearance.
ABC Limited fraud
ABC Limited UK fraud
Strange thing, one of above companies had German directors and shareholders, a fact that lead somehow to Deniz Ok which is a German citizen.

In Germany, ABC Großhandel company is even strange: operates as ABC Grupp, having its headquarter in... Tallin, Estonia. The company have nothing to do with cellular phones whatsoever, being "mainly focused on the sale and maintenance of vehicles and the wholesale of food and consumer goods".
Deniz Ok scam ABC Grosshandel
On his eBay account sec_tel_world, fraudster and scammer Deniz Ok is using as email address sectelworld@protonmail.com, pretending that his "company" is called ABC Limited, located on British Monomarks Ltd, Monomark House 27, Old Gloucester Street, London WC1N 3AX, UK.
What is British Monomarks Ltd? Well, is not a office building as you might think. British Monomarks Ltd is providing
mail forwarding service, virtual office and telephone answering services. Just perfect for any fraudster and scammer that want to convince you are dealing with a real and legit company located in the heart of London, and not with a scammer located in whatever country. This way, scammer think that no strings can lead to him, all inquiries stopping at British Monomarks Ltd. All good, until above mentioned law enforcement agencies are starting to put some unwanted and cheeky questions to British Monomarks Ltd.
deniz ok ebay scam
Deniz Ok sec_tel_world scam
deniz ok ABC Limited fraud

The scam

 Have you seen If you are not interested who actually is Deniz Ok and how fraudster work, then you should be interested in scams he do on eBay. Before reading below, just answer for yourself to a simple question: Why buying security from a private person, on eBay?! Do you buy your antivirus app on eBay, from a private person? We hope not. If you do so, then no reasons to read below.
Now, let's see: why buying "secure" cell phones from private persons, on eBay? Probably because of the cheap prices, without keeping in mind that cheap means less. Or even... nothing. And sure, you probably expect customer service, user manuals, accepted returns, extended warranty, repair and updates... from an eBay seller. Do you? If so, have fun with this. But remember that services are provided by companies and not by private individuals. Make sense to you, now? Sure, there are several small companies registered as eBay sellers, but you will never find serious and large companies selling on eBay. This is because eBay is addressing to private individuals rather than companies when it comes to sell an item. Same for eBay buyers: most of them are private persons. Have you seen other companies that manufacture secure cell phones, selling their products directly on eBay? Sure not! Boeing does not sell its Black phone on eBay. Sirin Labs does not sell their phones on eBay. Same for Silent Circle’s Blackphone. And so on. Why buying an XCell Stealth Phone from a private person on eBay, since there are official websites and resellers that provide those phones along with specific customer service, without any hustle and fear of scam?
This is why Deniz Ok sells his scams on eBay and not on a dedicated website: there is no company behind but only a single person. He is not a business man but a con man and a scammer. No need for a real company to do that, but only leaving buyers with a false sense of "serous business" he run. Not to mention the exposure that eBay can offer, even for a scammer like Deniz Ok.
This scammer can anytime delete his eBay account like he does many times before, leaving his "customers" with no help and explanations regarding phone use and various issues.
deniz ok abc limited sec_tel_world scam

The lie

Deniz Ok is not just a simple scammer. Is all in one: fraudster, liar and scammer. A combination which make him more dangerous than usual eBay scammers. The lie he use on eBay phone description is exposed below.

As anyone can read on XCell website, XStealth Pro is not yet released (this article is published today 27th January 2022). Based on XStealth developers declarations, Pro version will be released in the end of 2022. Despite that, Denis OK is offering for sale on eBay, XStealth Pro version (since 2021!):
Real xcell stealth phones
Deniz Ok ebay scammer
The funny thing is that Deniz Ok is presenting his scam as a "Real Deal". This is how scammer is lying eventual buyers.
The good news: until today, he didn't manage to scam any buyers. All stars he get on eBay account comes as buyer and not as seller, building a fake trust for novice buyers. "Buy with confidence from the 100% positive feedback" is obviously a ridiculous lie. There is no feedback as seller. He need all that ratings because of the price he is asking for XStealth "Pro". Big prices can be used only by old and trustworthy sellers, according to eBay policy. This scammer managed to bypass eBay checking.
Picture

We have to admit that fraudster is actually honest when wrote on eBay "!!!This is the REAL DEAL !!!". Yes, he is right. But... does not refer to buyers, but to himself: its a damn good deal for him, getting money for nothing.

The 2nd scam: "Secure 4G WIFI router"

If you think that selling banana phones as "secure" cell phones on eBay is the only scam that Deniz Ok sell, you are wrong. There is another scam he sell on eBay, even bigger: "Secure 4G WIFI router portable Hotspot VPN encrypted ~ IMEI ~ untrace stealth".
deniz ok ABC Ltd sec)tel_world dcam
What is actually that? Well, nothing special. Is just a regular Huawei router (E5573/E5770/E5885 series) which have a built in feature that allow IMEI changing by AT commands or directly from router control panel. There is no "encrypted" connection as scammer lie on eBay. Just to make it look more complex and complicated as actually is (for unaware buyers), scammer Deniz Ok is using "Airport Express" as model name, a term which is used only by iOS devices. Not to mention that scammer is faking also device manufacturer: instead of Huawei (Huawei logo is clear shown on some pics he posted), he pretend that the brand is called "Securwifi" (?!), a name that does not exist on a simple search on Google.
Huawei router price is only about 30-40 USD. You can check it on Google. Taking advantage on regular people lack of knowledge, scammer Deniz Ok is reselling this device with 400 GBP (about 540 USD) without making any modifications to make it more "secure". Nothing. Nada. Zero. But 200% profit margin. Cool or what?
On Aliexpress.com you can find the same product he sell (and same pictures he use on eBay), with detailed description. Nothing about "special" security, encrypted connection and all that sort of lies scammer use: www.aliexpress.com/item/32981395475.html Same here. And here.

No need to pay huge prices to this scammer. Here is how you can change regular router IMEI:
Huawei mobile routers & WIFI hotspots are well known for IMEI change capabilities. Nothing new about this. But this is not enough to make a mobile router secure, untraceable and stealth, as scammer Deniz Ok pretend.
Here is why:

1. A mobile router/WIFI hotspot does need a SIM card in order to work. SIM card provide connection between router and mobile network (outer world, internet). And guess what: router will connect to mobile network trough... cell towers and not directly to internet because this is just impossible. Hence, no real security because to allow connection, cell tower (and mobile network servers) need to know 2 things about any device that is asking for connection (including mobile routers): IMEI (router ID) and IMSI (SIM card ID). Only after providing this sensitive information to network, a mobile router can connect to internet trough a cell tower. For those who don't know, there are some devices called IMSI catchers, used for location tracking, call interception and data interception. An IMSI catcher does what is supposed to do: collecting IMEI and IMSI, then using them for further operations as location tracking, call interception and data interception. Funny, isn't it?
If mobile router IMEI can be changed at will, IMSI cannot be changed unless you insert every time another SIM card. However, when mobile router will connect to cell tower both IMEI and IMSI are broadcasted over the air and used for interception purposes. If an IMSI catcher or GSM interceptor are active within range, interception, location tracking and monitoring is trivial.
When you are on the move, mobile router will connect to other cell towers (trough SIM card) exactly as any other cell phone when travelling. Hence, your location data is exposed and widely available for network provider and law enforcement (and even for hackers). Location tracking is trivial. And "security" is just a lie that scammer Deniz Ok tells you.

2. Every single mobile router does have a so called router ID: a 32-bit IP address that uniquely identifies a router in an Autonomous System. This is also vulnerable to interception.

3. Every single mobile router have a MAC address (hardware ID) which is also vulnerable to location tracking and surface attacks.

4. Every single mobile router does use a SSID (wireless network name) broadcasted in clear text over the air. This is also a vulnerability, transforming your "secure" mobile router in a sitting duck when it comes to lawful interception because will say "hey, here I am!" to any mobile interception systems.

Compared with regular cell phones, a mobile router is more vulnerable to remote attacks, interception and monitoring because is using 2 vulnerable wireless connections (since a cell phone usually have a single connection with cell towers): wireless connection with cell towers and wireless connection with your cell phone, laptop or PC. Different radio frequencies but same vulnerabilities:
deniz ok ebay scam secure hotspot
This is how "secure wifi hotspot" sold by Deniz Ok provide "secure" internet connection.
Any mobile WIFI router / mobile hotspot is more vulnerable to over the air attacks than a regular cell phone. There are 2 essential vulnerabilities:

1. Wireless connection between router and your mobile device (cell phone, tablet, laptop, PC, etc.). Intercepting WIFI is trivial and more easy to do than intercepting a cell phone, due to WIFI security lack (authentication procedures, encryption, etc.) compared to regular mobile networks. As a matter of fact, tactical WIFI interception systems are way more cheap than mobile interception systems. You can find plenty of such systems on a simple Google search. Just to name few:
www.shoghicom.com/wifi-interception.php
www.tarideal.com/product/tactical-wi-fi-interception/
https://pegasusintelligence.com/sigint/#TacticalWiFiInterception
https://test2.zonetex.net/our-products/wi-fi-interception-system/
cerberussolutions.co.id/productssservices-wifi-interception-solutions/
https://spectradome.com/wifi-interceptors/
https://www.stratign.com/product/wi-fi-interception-system/
Picture
2. Wireless connection between router and outer world (regular mobile network).
Thinking of connecting your cell phone or PC to WIFI router / mobile hotspot via cable, which will reduce attack surface? Well, is remaining another vulnerable connection: data connection to cell tower that provide internet connection. If you think that your "secure" router is connected somehow directly (via cable?) to some sort of "secure" servers, you are completely wrong. This is not how it works. Your "secure" router will connect to the closest cell tower within your area (in the very same way as your cell phone does), in order to provide internet connection. Hence, no matter which kind of data connection exist between cell tower and the rest of the network: wireless connection is the weak point, exploitable by regular IMSI catchers and GSM interceptors that will intercept data connection (like this one), not to mention lawful interception systems.
Picture
Not least, "Secure 4G WIFI router portable Hotspot VPN encrypted ~ IMEI ~ untrace stealth" scam sold by Deniz Ok, is made by Huawei. Remember that back in May 2019, the US added Huawei to a trade blacklist over the company's alleged ties to Beijing, which were seen as a national security threat. So, a totally unsecure device is sold as a "untraceable stealth" router. No other comments are needed.
Deniz Ok sec_tel_world scam

Deniz Ok modus operandi
Scamming technique he use

This particular fraudster and scammer use different methods for buyers and sellers.

If you are a buyer, scam is done pretty much straight forward: scammer pretend to sell "Real working untraceable phone from XCell Technologies brand new in box." In fact, all XStealth Phones he sell are marked and monitored by law enforcement agencies with the help of XCell Technologies programmers. This is possible because Deniz Ok ordered a custom made lot version that have vulnerable software apps installed on his demand for whatever reasons. We have to mention that regular XStealth Phones cannot be tracked and monitored even by the manufactirer (or programmers), not to mention law enforcement agencies or hackers.
This way, when you buy a stealth phone from Deniz Ok, will get no security nor privacy. Instead, you can get an entire Police squad at your door step once you power up the phone.
The same if you buy the other scam: "Secure 4G WIFI router portable Hotspot VPN encrypted ~ IMEI ~ untrace stealth" and start doing some online monkey business.

Situation is different if you sell secure cell phones, any other devices or whatever marchendise he is interested to "buy". Deniz Ok is using old fraud techniques, almost as a talenbted con man. According to XCell Technologies managing board, this fraudster will first pay for all devices he order. Then, right after shipping when fraudster is sure that the parcel is on its way and cannot be returned to seller, he will pretend that devices are defective and not manufactured based on his requests, demanding payment refund. Fraudster will keep all devices and will stop replying to any messages. Managing board mentioned that Deniz Ok used disposable phone numbers in order to contact them and assigned forwarding agent. This fraud might involve telephone service provided for Deniz Ok by famed British Monomarks Ltd.
Recently, Deniz Ok tried to scam a German reseller which is pretty new in business, pretending that he is calling on behalf of German Domestic Intelligence Service -
Federal Office for the Protection of the Constitution (Bundesamt für Verfassungsschutz / BfV) and he want to order several dozens of stealth phones, being ready to pay for all quantity before shipping and without testing any stealth phone before payment, which is pretty unusual. Please note the same pattern used to scam XCell Technologies, before. Fraudster mistake was a beginner one: he considered his business "partner" (XCell Technologies German reseller) a newbie that have no idea about how any intelligence agency run technology aquisitions. Based on EU regulations, they have to set up a public tender even when buying office paper and pencils, not to mention hi-tech devices that cost a lot. Also fraudster Deniz Ok didn't prepared his fraud very well: he had no idea that BfV does not buy directly interception and security devices, because they don't use that directly. All technology is bought trough 2 support and research agencies for law enforcement and BfV, called ZITiS (Central Office for Information Technology in the Security Sector) and BSI (Federal Office for Information Security) with competences in information security and cyber security. So, German reseller realized that is a fraud on its very beginning, having fun with fraudster and playing with his nerves. In the end, fraudster tried to scare the reseller, threatening with BfV revenge, which was the most funny part of his failed fraud.

What you can do?

deniz ok ebay scam
If you are a buyer or a seller, just don't buy or sell anything from or to Deniz Ok and its related scam companies ABC Limited and ABC Großhandel. Keep in mind that scammers can change name, address, "company" name, can use other new eBay accounts to avoid to be discovered as scammers. But will never change the way they scam. Just stay away from this.
In case you have bought such device, call the Police and register a fraud complaint. Also report the account and products to eBay customer service. If really lucky, you can get a full refund for the scam.
If you really want to buy and not sure if you will buy an authentic Stealth Phone, you can contact us at any time, or you can contact devices manufacturer and its official distributors. Never get scammed again.
You can help others avoid secure phone scam, by distributing this article.
0 Comments

Voice call encryption: does really protect your privacy?

4/5/2021

0 Comments

 
Voice call encryption fail
​"If encryption made any difference, they wouldn't let us use it", said someone.

Encrypted calls are protecting you from the ones that don't want to (or cannot) intercept your phone calls, and does not protect you at all against the ones that can intercept your calls - law enforcement, homeland security and intelligence agencies. Make sense to you? If not, please read below.

Most people think that call encryption is the Holly Grail of secure communications, being also a mainstream when it comes to software development for mobile security. Why is that? Because of 007 movies? Not at all. Because is the only product you can find on nowadays security overcrowded market. From hardware devices to sophisticated software applications, all claim that encrypting your mobile voice calls is the best you can get and there are no other trustworthy solutions. Unfortunately encrypted calls does not offer real security when you are targeted not just by (abusive or not) law enforcement, homeland security or intelligence agencies, but worst, even when you are a target for a skilled hacker.

You don't have to trust us. Just google for voice call encryption hack and tons of articles are available at a glance.

For those of you that use voice encryption products on mobile phones the last thing you would expect is for it to be easily decrypted and intercepted. You may have shelled out good coin for your application and rely upon it for your intellectual security, but what if that security was not as tight as you had imagined, what if a readily available wiretapping utility attainable by anyone, and a simple Trojan slipped on to your device could compromise all of your calls?

Back in 2010 blogger, hacker and IT security expert Notrax has done just that. For his own safety we will not reveal his name, however, Notrax has discovered that 12 commercially available mobile voice encryption products can be intercepted and compromised using a little ingenuity and creativity as he has carefully detailed on his website.
He tested 15 voice encryption products in total, 12 of them were “worthless”. It’s easy to take the software at face value when it “tells you” that the call is secured. But how does someone actually go about being sure that it is secured? Notrax did some digging and discovered he could break in to almost all of them in under 30 minutes.

Secure means that Notrax did not manage to crack it. It does not mean that someone else would not be able to crack it.

These calls can be tapped by anyone that has basic technical skills or the money to back up such an endeavor. “Statistics show Government agencies on average conduct 50,000 legal wiretaps per year (legal= those where a court order is required), (Let’s not forget Echelon) another 150,000 phones are illegally tapped by private detectives, spouses and boyfriends and girlfriends trying to catch a potential cheater. Another estimate shows up to 100,000 phones are wiretapped by companies and private industry in some form of industrial espionage. It is happening and it is a big business.”
Picture
SnapCell was safe, it’s a private encryption device that snaps on to your mobile, they claim to protect your mobile voice, fax and data communications from wiretapping, eavesdropping and line interference. SnapCell’s website has been offline since January 21st for unknown reasons.
If you are using one of the above voice encryption technologies, you may want to be on the lookout for a new solution, as XCell Stealth Phones. Although these applications cracked are not entirely secure, it would take much effort to bypass them, like having the attacker be able to load software or a trojan on your phone without you knowing. It’s similar to a credit card, so as long as you keep it with you in a secure place you should be fine for the most part.
How govt is using spyware to circumvent call encryption? Read more here.

Think that LTE mobile networks are secure? Well, think twice: hackers decrypt VoLTE encryption to spy on people calls. More here.

​More cons regarding voice encryption

Though using of encryption to protect your privacy might be the prudent choice, the method has its own disadvantages:
  • Because a cell phone (no matter brand, OS, ram or chipset) does not have enough computation capabilities to encrypt/decrypt a phone call locally, voice encryption take place on 3rd party servers. That means your voice encryption app that you just installed on your "secure" smartphone act like a link to encryption server. This way, only by using data connection (WIFI, etc.) and stepping out on phone outer world you can use such application. The problem is that a server is actually someone else computer. You can't find out who is really hiding behind that servers. Some manufacturers of cryptographic equipment have a track record of hidden cooperation with intelligence agencies and interested private companies. Some of them are not even using publicly scrutinized and standardized crypto algorithms (like Diffie-Hellman, SHA256, AES and Towfish), but “proprietary” encryption methods that are not available for public evaluation. Several “proprietary” crypto-algorithms that were not subject to public review have been shown to be easily breakable in the past, like the COMP128 algorithm that is in use in many GSM networks for authentication, so the “proprietary crypto” approach has to be regarded as very risky. In the end of the day that means you have no real control on your voice calls.
  • Introducing a back door into a crypto system does not even require active cooperation of the manufacturer of the equipment or software. All it takes is one bribed programmer to compromise an entire product.
  • You never know if encryption solution you use is indeed trustworthy and there is no reliable way to check it. Most of the encryption applications developers are not making public the source code. There can be (and most of the time there are) back doors used by law enforcement agencies. Sure, you can find source code for some encryption apps, which are made available for public by the developer itself. Unless you are not a cryptographer or cryptanalyst, there is no way for you average Joe, to find out if some security flaws affect your encryption app.

There is a master key for all encryption systems

Open sesame of encryption solutions
Will you use an encryption app that have servers located in let's say... North Korea? Probably not, but you have to reconsider your opinion. Shortly saying, the more consolidated a democracy is, the easier is for law enforcement to get access to encryption servers, based on a simple warrant. All that because consolidated democracy countries know what we call the rule of law. Since encryption apps are not developed out of this planet and all encryption servers reside in some county, Govt and related institutions have a simple tool called judge warrant which will instantly "open" any "encrypted" server used for so called "secure" communication. Yes, its a matter of time. But in the end they will get a plain text or plain voice copy. Not to mention that NSA and other similar actors have tools and solutions that effectively circumvent any encryption apps, used nowadays to find out in real time what they are looking for.

Using voice call encryption might make you look suspicious and attract unwanted attention on you, exactly from the ones you are trying to hide from. Its like a ringing bell attached on your tail. Have a wild guess on what they will do in case the you use an encrypted cell phone. For sure they will use some other ways to get the info they need. They will not wait to find some security flaws in your crypto app, they will not attempt even deciphering. They will simply bug your home, office and vehicle, will spy on your computer, will intercept your mail and will use covert human intelligence sources (HUMINT) and whatever it takes to obtain relevant information about you and your activities. They can easily bypass the communication protection provided by the encrypted phones by simply collecting relevant information from other sources. Simple as that. Yes, its not on real time. But can be very close to that.

If you are targeted by an intelligence agency, encrypting your mobile communications does not mean that you are 100% protected against eavesdropping. Think about that: will they drop you just because you use encrypted communication? No, for sure.. Being a challenge for them, will find another ways to get the information they need. Sure, for a short period of time your secrets will remain... secret. But any decent agency will find at any time security breaches, gathering info they need about you, by any means.
Actually by encrypting your phone conversations, you are telling them that you have something important to hide and you invite agencies to use other ways to gather intelligence.

When using encryption over standard mobile network voice channels (not via data connection) like that encryption devices attached to your cell phone, that encrypted call is not so... encrypted as you think. Yes, will defend against call interception performed by spyware apps installed on your phone, because phone microphone is not used during encrypted call sessions. But even if you use such a device, the GSM operator or the entity that operates a GSM interceptor can find out pretty much information such as:
  • both phone numbers involved in conversation
  • conversation length, time stamped
  • your (phone) location at the moment of call
  • your geo-location at every moment, by some simple and effective triangulation techniques, based on your phone IMEI that cannot be hided by any encryption app. Once you power up your crypto phone, IMEI and IMSI (if there is inserted a SIM card) will be sent out to network, for connection. No need to make any call or send any SMS. This is the way that all cell phones work, including your crypto phone.​

​Other crypto phone field proven weaknesses:

  • Modern GSM interceptors can selectively and temporarily block any cell phone within its range based on IMEI and/or IMSI values, making that particular crypto phone unavailable for use, for as long as they want. This happen when a crypto phone uses data connection in order to make encrypted calls.
  • It is well known that cell voice encryption need high speed internet connection. Many modern GSM interceptors can downgrade your crypto phone connection from 3G/4G to 2G, by simply jamming 3G/4G uplink frequencies, which is a standard procedure. By doing that, crypto phones that use data connections will fail and become useless.

Not even notorious encrypted cell phones are immune to this attack. Few years ago, an average Joe posted on YouTube a short movie demonstrating how a well known app used for enterprise encrypted communications - GoldLock - can be defeated by a cheap commercial grade spy app called FlexiSpy. Because he had the phone in his hands with GoldLock already installed on, he installed also FlexySpy on the same cell phone. He started an encrypted phone call with another GoldLock phone. Entire conversation was recorded by FlexySpy in clear, just because FlexiSpy collect audio straight from the microphone, way before GoldLock proceed to voice encryption. Then, when conversation finished, was automatically sent by FlexiSpy via WIFI or data connection on a server where could be listened from user personal account. Simple, efficient and embarrassing for a top notch encryption application. You can do whenever you want the same test.
By some reasons, the video was removed from YouTube so we cannot post a link. Also since then, no more free trial apps are available from GoldLock, avoiding other similar situations. However, that does not make GoldLock less effective for private users, being by far one of the most secure communication application.
And yes, the same can happen with your "secure" cell phone.

This is why voice call encryption is a short time solution for secure communications. In fact, being predictable is one of the worst choice on intelligence battlefield. And using a crypto phone means that you are more than predictable.
When using any voice encryption solution (software or hardware), you will never know when actually your cell phone is intercepted, and by consequence you will never know when you are in real danger. Instead of crypto phones blind protection, it is better to know when someone attempt to tap your calls and when they are trying to locate you. Then you can act advisedly, taking the right decisions and even influencing them by different deception techniques. Here comes XCell Stealth Phones, which brings you the best of both worlds: interception detection and interception blocking. Detecting interception in real time and on the right time is really something else than using blind encryption, an advantage that is used by professionals against... professionals.

Based strictly on customer request and if we are sure that customer fully understand all security risks he take, a voice encryption app can be installed on XStealth Lite and XStealth.

source
0 Comments

The truth about antitap.com, imeichanger.com and secretgsm.com

6/12/2015

1 Comment

 
stealth phone scam: antitap.com, imeichanger.com and secretgsm.com
stealth phone scam: antitap.com, imeichanger.com and secretgsm.com
Trying to dismantle the scam behind antitap.com, imeichanger.com and secretgsm.com, we found out the following facts:

  • Behind all this three scam websites hides an italian scammer
  • There is no company behind (as trader or manufacturer), but only a guy that buy cheap and sell high, making good money from people
  • There is no postal address, no phone number and no contact details, all three websites being a classical online scam
  • There is no company PayPal account, but only a personal PayPal account used to sell the fake products.
  • There is no "producer" as the scammer states, but only a seller
  • There is no customer support since the scammer have no clue about how stealth phones work and how cell interception work
  • There are no product user manuals
  • There is no general guarantee for any of the products sold on all three websites
  • All three websites are owned from the beginning by the same italian scammer. The websites was never owned by any "russian guy"
  • On all three websites are being sold counterfeit stealth phones (IMEI change phones) that does not work as described by the scammer
  • There are no real anti tapping / anti IMSI catcher / anti interception features on any cell phones that scammer sell, but only words used to fool people, with no factual support
  • There are no demo movies to show phones functions and capabilities, being fake products
  • The scammer is selling software applications obtained for free from iTunes and Google Play Store. The applications are pre-installed on the phones he sell, pretending to sell "stealth phones"
  • The scammer mislead people about real phones capabilities, seriously endangering buyers personal security
  • There is no "version 4" Samsung stealth phone, being only a hilarious marketing trick used by the scammer to fool uninformed and naive buyers
  • The scammer has been caught previously, counterfeiting Samsung G600 IMEI stickers, misleading and fooling buyers about "stealth phones" he sell. More info here
  • All scammer eBay accounts has been successively closed down due to buyers complaints
  • This scammer has started his mobile phones scams since 2006
More blog entries about the scams on antitap.com, imeichanger.com and gsmsecret.com:
  1. Another seller, busted: fake stealth phones for sale 
  2. Anonymous SIM card scam
  3. A comprehensive view on stealth phones scam                               

How all this started: previous scams

Please note that most of the screenshots below has been taken from gsmhosting.com forum and few other websites where the scammer is pretty active.

The amateur scammer behind antitap.com, imeichanger.com and secretgsm.com websites is an italian guy that lives in Monaco, sometimes reported in Swiss. He uses the nickname "cryptone" on most forums since 2008, and sometimes "Luca" only on italian forums.

Early years

In his early years he has started his scams as spy-phone software dealer, on the black market. Back in 2008 he deals the illegal software only on italian forums and websites, taking advantages on italian people that - as you probably know from your trips or interactions - are pretty ignorant when it comes to english language. So, they had to pay a price for that ignorance, buying spy-phone software at high rates. As you know, selling and using spy-phone software is considered to be illegal in most of the countries, even when it comes to spy your own wife or child.
antitp.com, imeihnger.com nd secretgsm.com scam
selling illegal spy-phone softwre
Then in 2008 he has discovered gsmhosting.com forum, starting to post offers for spy-phone software.
antitap.com, imeichanger.com and secretgsm.com scam
selling illegal spy-phone software for BlackBerry devices
antitap.com, imeichanger.com and secretgsm.com scam
selling illegal Symbian spy software generator
antitap.com, imeichanger.com and secretgsm.com scam
selling illegal spy software genertor
Like now, the scammer has used in the past multiple sites for selling illegal software:
nokia-spy.com/index.html
bberryspy.com
spyphonegenerator.weebly.com

Nokia 1100 scam, a short story for the scammer

Bank fraud and selling fake phones - this scammer gets in
Picture
In case you weren't already convinced of a certain model of Nokia 1100's can be used for bank fraud by reprogramming the phone in a way that allow the attacker to extract your mobile transaction authentication number -- provided you live in a country like Germany or Holland that use mTANs -- and use it to get into your bank account and transfer funds.

So, this opportunity sounds good enough to the scammer to get involved in it, making some money by fooling people. When he first hear of this scam, posted on gsmgosting.com forum that he want to know more about this scam:

antitap.com, imeichanger.com and secretgsm.com scam
scmmer searching info about new scam
In a short time the scammer realize that he can exploit the market demand for Nokia 1100 by buying cheap Nokia 1100 which are not RH 16-18 series, and counterfeit the software or even the backside IMEI label:
antitap.com, imeichanger.com and secretgsm.com scam
scammer attempts to counterfeit Nokia 1100 RH
Because he didn't succeed to counterfeit Nokia 1100 RH by software means, he has simply counterfeit the backside IMEI label:
antitap.com, imeichanger.com and secretgsm.com scam
counterfeiting IMEI label for Nokia 1100
And then he just start selling counterfeit Nokia 1100 on forums, web shops and eBay:
antitap.com, imeichanger.com and secretgsm.com scam
selling counterfeit Nokia 1100
antitap.com, imeichanger.com and secretgsm.com scam
selling counterfeit Nokia 1100

Preparations for change IMEI phones scam

You probably know that the scammer behind antitap.com, imeichanger.com and secretgsm.com is posing now in a security professional, running a bunch of websites and selling high grade security related products pretending that he knows how that products work and how cell phone interception work.
Just to have fun on his approach, vision and knowledge regarding cell phone interception, please have a look below, on how he name an IMSI Catcher or GSM interceptor: "IMEI phishing machine". We think this is self explanatory and need no more proofs about his "professionalism". Do you expect professional customer support when buying and using a stealth phone from this illiterate when it comes to cell phone interception? We hope not.
antitap.com, imeichanger.com and secretgsm.com scam
"IMEI phishing machines". Truly professional
Then suddenly he have heard somehow about dynamic IMEI phones made by XCell Technologies. He couldn't probably afford to buy one to start replicate it, presuming that he know how to do it (which we doubt). So, he started to ask round for similar but cheaper ones:
antitap.com, imeichanger.com and secretgsm.com scam
searching for cheap counterfeit IMEI change phones
antitap.com, imeichanger.com and secretgsm.com scam
Decided to make money from nothing by fooling people, the italian scammer wants to sell even phones that apparently change IMEI (only on phone screen) and not in a real mode. This is yet another proof of the scammer intentions to fool people:
antitap.com, imeichanger.com and secretgsm.com scam
italian scammer looking for a way to fool people with fake IMEI change phones
The real story of antitap.com, imeichnger.com and secretgsm.com:

At this stage, from our records comes out that he contacted a Bulgarian hacker and together they put money and bought an XCell dynamic IMEI phone, whose firmware was hacked and extracted by the Bulgarian hacker. The hacker name is Zlatin Penchev from Stara Zagora, and we have his complete story about how he cracked and extracted the XCell firmware and how starting to sell the cracked (and non working) firmware together with the italian scammer. In fact even the italian scammer admits he worked with a Bulgarian hacker:
antitap.com, imeichanger.com and secretgsm.com scam
Obviously, he didn't lose the Bulgarian hacker contact: the hacker has dumped the scammer just because the scammer has no idea about how stealth phones should be replicated and sold to make some pocket money. So, the scammer has started to figure out by himself how to flash the cracked XCell firmware on a phone, in order to clone a real XCell stealth phone. But seems like his attempts to counterfeit XCell stealth phones were unsuccessful at first, because the scammer does not have the necessary knowledge nor quite right tools.
antitap.com, imeichanger.com and secretgsm.com scam
italian scammer using the cracked firmware on the wrong platform (Samsung G600)
Fake it to make it: please note that the same scammer has been caught in the past using fake G608 IMEI stickers on his fake G600 stealth phones, just to create the appearance of a genuine XCell stealth phone. More about that fake IMEI stickers, here.
antitap.com, imeichanger.com and secretgsm.com scam
italian scammer having no clue (in 2014!) about how to install the cracked firmware on his counterfeit stealth phones
Because of using a cracked and non working firmware installed on the wrong platform (Samsung G600 instead of G608), there are a lot of malfunctions and bugs that starts from the moment of flashing (installing) the firmware on the phone:
antitap.com, imeichanger.com and secretgsm.com scam
italian scammer using cracked (non working) firmware on the wrong platform (G600) is getting bugs and major malunctions
After his own statements, the italian scammer use the same empirical tool (Onenand downloader) to flash the cracked firmware on the phones, as the other scammer sells on eBay along with the cracked firmware (click here for details). So, no wonder that he got burned out his phones:
antitap.com, imeichanger.com and secretgsm.com scam
italian scammer using cracked (non working) firmware on the wrong platform (G600) is getting bugs and major malunctions

Stealth phone scam in progress

Despite the fact that the italian scammer sell counterfeit non working stealth phones, he start advertising on forums about his scam:
antitap.com, imeichanger.com and secretgsm.com scam
italian scammer selling counterfeit stealth phones on his website antitap.com
antitap.com, imeichanger.com and secretgsm.com scam
italian scammer selling counterfeit stealth phones on his website antitap.com
He also sell counterfeit stealth phones on his main web shops: antitap.com, imeichanger.com and secretgsm.com.
An interesting fact that demonstrates on antitap.com, imeichanger.com and secretgsm.com are being sold counterfeit non working stealth phones: please have a look on the thread dates: since 2013 the scammer sell stealth phones, but in 2014 he still ask for help in flashing stealth firmware on his counterfeit stealth phones. No need for more proofs, scammer own declarations are more than enough to demonstrate the scam.
antitap.com, imeichanger.com and secretgsm.com scam

What other scams can you find on antitap.com, imeichanger.com and secretgsm.com?

Buy cheap, sell high. This seems to be the the guideline followed by the italian scammer. Nothing bad up here, the wrong things and the scam starts when he consider himself nothing but a "legit producer", making confusions between producer and seller. We will not analyze his marketing strategies nor price policy since is not our business. But we will have a look on the products he sell.

Anonymous SIM card scam
We have posted already our conclusions on so called anonymous SIM card, on a previous blog entry. Click here for more details.

Other so called "stealth phones" that he sell
Before talking about other scams, you should know that all Android cell phones that he sell as "stealth phones" are not at all stealth, as scammer claims. The scammer is taking again advantages on unskilled and

unknowledgeable people that have no clue about how cell phone works, how and what a software application can do, selling simple Android phones that the scammer has pre installed several free software applications that can be easily found in abundance on Play Store, by anyone.
antitap.com, imeichanger.com and secretgsm.com scamStealth Samsung S4 scam
Stealth Samsung S4 Duos scam.
What the scammer did? Well, he simply installed on a standard Samsung S4 phone, a free app called Private Text Messaging & Calls. This app can be downloaded and used for free, from Play Store. Click here. Why paying more to a scammer since you can have all this for free, on your Android phone?
What else he did? By using copy/paste, he added some text to his website, copied off the Play Store app page. This is how he launched his product called "Samsung S4 stealth Phone". Pretty easy, right? But not smart enough. We really wonder how many naive people he managed to fool until now.

Please note that the phone does not have ANY anti tapping capabilities nor detection of call interception.

antitap.com, imeichanger.com and secretgsm.com scamStealth Samsung S5 scam
Stealth Samsung S5 scam.
The same scam as above. The scammer has installed the same app (Private Text Messaging & Calls) on a standard Samsung S5. And nothing more. Download for free the app: click here.

Please note that the phone does not have ANY anti tapping capabilities nor detection of call interception.

antitap.com, imeichanger.com and secretgsm.com scamEncrypted stealth phone scam
Encrypted smart phone scam
This is actually a very cheap China made cell phone called DOOGEE TITANS DG150 3.5" (can be bought from here with only 75$) which is not encrypted at all, by default. The phone can be encrypted by the user, as any other Android device, for free.
On this device, the italian scammer has installed the same free app called Private Text Messaging & Calls which can be downloaded from Google Play. Click here.
The scammer is selling this device with 450€, making a good profit on ignorant people.

Please note that the phone does not have ANY anti tapping capabilities nor detection of call interception.

antitap.com, imeichanger.com and secretgsm.com scamDual SIM stealth phone scam
Entry level dual sim burner phone: a scam.
This is actually a cheap NGM feature phone called Stealth, that can be bought with only £91.00 from here. The italian scammer is selling the device with 250€.
Please note that the device will not alert you when your calls and messages are being intercepted. The scammer just sell lies to you.

Please note that the phone does not have ANY anti tapping capabilities nor detection of call interception.

Picture
Stealth iPhone 5 scam
Italian scammer is selling ordinary iPhone 5 phones which he installed a free application called CoverMe Private Texting Messenger, which is similar to
Private Text Messaging & Calls, available for Android devices, being released by the same developer - CoverMe Inc.
You can download and install for free CoverMe Private Texting Messenger for iPhone: click here - iTunes link.
No need to pay 650€ for an ordinary iPhone 5.

Please note that the phone does not have ANY anti tapping capabilities nor detection of call interception.

antitap.com, imeichanger.com and secretgsm.com scamUltra Tough Anti Tapping Phone: scam
Ultra Tough Anti Tapping Phone: scam
The so called Anti Tapping phone sold by the italian scammer on his websites (antitap.com, imeichanger.com and secretgsm.com) is actually a cheap Android device made in China by OINOM, which can be purchased with only 299$ from Aliexpress.com: click here. Scammer price: 550€.
The scammer has installed on this phones the same free app called Private Text Messaging & Calls which can be downloaded from Google Play. Click here.

Please note that the phone does not have ANY anti tapping capabilities nor detection of call interception.

antitap.com, imeichanger.com and secretgsm.com scamVHF Stealth Dual SIM Anti Tapping Phone: scam
VHF Stealth Dual SIM Anti Tapping Phone: scam
This so called Anti Tapping phone is actually a China made Android phone called Snopow M8 which can be bought from Aliexpress.com with only 199$: click here.
Scammer price: 390€.
The scammer has installed on this phones the same free app called Private Text Messaging & Calls which can be downloaded from Google Play. Click here.

Please note that the phone does not have ANY anti tapping capabilities nor detection of call interception.

antitap.com, imeichanger.com and secretgsm.com scamZOPO anti interception phone ZP1000 Android: scam
ZOPO anti interception phone ZP1000 Android: scam
This so called "anti interception" phone can be bought for only 172$ from Zopo store: click here.
Scammer price: 399€.
The scammer has installed on this phones the same free app called Private Text Messaging & Calls which can be downloaded from Google Play. Click here.

Please note that the phone does not have ANY anti tapping capabilities nor detection of call interception.

antitap.com, imeichanger.com and secretgsm.com scam

Conclusions

All three examined websites are selling counterfeit and/or non working phones (claimed to be stealth phones), along with free software applications for which the scammer asks for money.
We strongly advise you to keep away from all three websites: antitap.com, imeichanger.com and secretgsm.com. There is nothing that you can buy for your privacy and call security, but only scams and lies.
in case that you been a scam victim on these sites, you might contact us for further assistance.

Our advice: always buy the original. As we did, in the end of the day.
1 Comment

    Author

    Stealth-phones-guide.com

    Archives

    April 2022
    January 2022
    April 2021
    March 2021
    March 2019
    August 2016
    February 2016
    October 2015
    June 2015
    May 2015

    Categories

    All
    10 Functions Scam
    2016 Stealth Phones
    2019 Stealth Phones
    2021 Stealth Phones
    2022 Fake Stealth Phones
    2022 Scam Alert
    ABC Limited Scam
    Android Stealth Phone
    Android Ultra Secure Stealth Phones
    Anonymous Sim Card Scam
    Anti Eavesdropping
    Anti Interception
    Anti Stingray
    Antitap.com
    Anti Wiretapping
    AUDIO VIDEO INTELLIGENCE CORPORATION
    Authentic Stealth Phone
    Basic Stealth Phone
    Blackstone-security Scam
    Call Encryption Fail
    Cell Phone Interception
    Change Imei Free Software
    Change Imei Phone
    Change IMSI
    Change Voice
    Change Voice Scam
    Counterfeit Change Imei Phones
    Counterfeit Untraceable Phones
    Couterfeit Stealth Phones
    Deniz Ok Scammer
    Dual SIM Stealth Phone
    Dynamic Imei Phone
    EBay Stealth Phone Scam
    Encrypted SIM Cards
    Encrypted Smart Phone Scam
    Entry Level Dual Sim Burner Phone Scam
    Fake Imei Changer
    Fake Stealth Phones
    Fix.mobile.to.work
    Free Samsung G600 Stealth Phone Firmware 7 Unctions
    Free Stealth Phone Firmware
    Genuine Stealth Phones
    Gsm-interceptor.co.uk
    Imeichanger.com
    JD Mobile Unlock Service
    MLSP
    Multi IMSI SIM Card
    Multy Layer Security Protocol
    Multy-Layer Security Protocol
    Nokia Stealth Phones
    OneTech International Co
    Original Stealth Phone
    Phone Number Change
    Real Change Imei Phone
    Real Stealth Phones
    Real Untraceable Phone
    Russian SIM Cards
    Samsung G600 Stealth Firmware
    Secretgsm.com
    Sectelworld@protonmail Scam
    Sec_tel_world Scam
    Secure Cell Phone
    Secure_gsm Scam
    Secure SIM Cards
    Secure Wifi Router Scam
    SHX Trading SRO
    Siemens R32 Scam
    Siemens-sl-75-scam
    Siemens Stealth Phone Scam
    SMS Encryption
    Spdirect
    Spoofing Phone Number
    Spystore Ireland
    Stealth IPhone 5 Scam
    Stealth Phone
    Stealth Phone Free Software
    Stealth Phone Scam
    Stealth Phones.com
    Stealth-phones.com
    Stealth Phones New Release
    Stealth Phone Software
    Stealth Phones That Work
    Stealth Phones Trick
    Stealth Phone V4 Scam
    Stealth Samsung S4 Duos Scam
    Stealth Samsung S5 Scam
    Stealthtronic.com
    Test Your Secure Cell Phone
    Ultra Secure Messaging
    Ultra Tough Anti Tapping Phone Scam
    Untraceable Cell Phones
    Untraceable Phone
    Untraceable Phone Free Software
    Untraceable Phone Scam
    Untraceable Phone Scam Wiretapping Detection
    VHF Stealth Dual SIM Anti Tapping Phone Scam
    Voice Call Encryption Fail
    Voice Changer
    Voice Encryption
    Wifi Hotspot Scam
    Wiretapping Detection
    Witz.end.solutions
    XCell Basic V3
    XCell Stealth Phones
    XCell Technologies 2016
    XCell Technologies New Release
    ZOPO Anti Interception Phone Scam

    RSS Feed

Stealth Phone Scam: a reality that you need to know