About Us



We are founded 2021 in Switzerland and has since been the exclusive distributor of XCell Technologies.

XCell Technologies

XCell Technologies

We are constantly looking for simple and innovative solutions with one goal in mind: mobile security. XCell Technologies is a dynamic company that wants to improve the protection of its customers by integrating a qualified, experienced and highly motivated team. Our mission is to provide our customers with the highest quality services in the field of intelligence and mobile security by turning our knowledge, expertise and passion into value for their own benefit. When you choose XCell Technologies, you will find a company that makes excellence, innovation and an unconventional strategy its core philosophy.

Experts in aggressive GSM security, cyber crime and security education. Our daily work includes vulnerability research, cryptography, mobile remote exploitation, exploit development and mobile penetration testing. 

Restricted icon

Export restrictions


Export restrictions for all XCell products apply to: Iran, Lebanon, Libya, North Korea, Sudan, Syria, Yemen and area controlled by ISIS.


A Stealth Phone is a cell phone that has special capabilities to detect and block phone surveillance or tracking attempts. Our XCell devices use active measures for the best possible protection and only resort to passive protection in certain cases.

While the rest of the market goes one way with text and voice encryption, we go another way, to the core of the problems. We fight wiretapping by exploiting the same network vulnerabilities that IMSI Catcher and GSM Interceptor use. XCell Stealth Phones are actually the only ones that can effectively defend themselves against mobile eavesdropping using both defensive and offensive security methods.

Mobile networks use their own encryption: A5/1, A5/2 and more recently A5/3 Stream Cypher, thus voice calls and SMS are encrypted by default on some mobile networks.

When it comes to law enforcement, government agencies and experienced hackers can circumvent the default encryption of mobile networks by using various methods, such as by exploiting network vulnerabilities or by getting help from the network operator.

Interceptors look like an ordinary cell tower to typical phones. Once the phone connects to the interceptor (based on IMEI and/or IMSI filtering, a target phone is forced to connect to the interceptor), a variety of “over-the-air” attacks become possible, from eavesdropping on calls and texts to injecting spyware onto the target phone. A spyware collects all key logs and sends them back to the attacker, records calls and reveals the location of the phone. Regardless of whether the phone’s owner uses a VPN or an encryption app for voice calls or messages. Despite VPN or encryption app, audio is recorded directly from the phone’s microphone and key logs are recorded before they reach an encryption app or VPN server even in the presence of an antivirus app.

Our approach when it comes to privacy and mobile security is significantly different:

Instead of blindly encrypting all communications, we provide the user with the unique ability to detect interception and how long this is active.

We strongly believe that knowing when and for how long your phone will be intercepted is a great advantage over encryption solutions because you and only you can control the information (by intoxication, manipulation or deception). Encryption is only a short-term solution because it can be dangerous even for professionals as it attracts the unwanted attention of a large number of government agencies.


All our products are developed in close cooperation with our main customers: law enforcement agencies and intelligence agencies.

Our programmers and telecommunication engineers have in-depth knowledge of programming and building mobile interception systems, location tracking devices, etc.

Therefore we know exactly how the interception of calls works and how this can be avoided and signaled. The way our stealth phones block eavesdropping is not comparable to mainstream methods. Sophisticated firmware and special apps that took us almost 20 years to achieve the current level of security.

XCell Stealth Phones have been developed in close cooperation with our key customers, who provide us not only with a secure market, but most importantly, a test environment for our products:

All XCell Stealth Phones have been intensively tested by our customers on various listening systems before public release. All XCell Stealth Phones have passed the interception and tracking tests (100% positive results).

This is also the reason why our products have a great advantage and are always one step ahead of our competitors.

XCell Stealth Phones are state of the art. We must mention that the interception methods haven’t changed too much in the last 10 years. This is because the principles of mobile networks have not changed and the same protocols and technologies are used. Consequently, wiretapping methods have not changed in terms of technology.

The latest changes in wiretapping technology relate to the size of the device (can now be mounted on a drone / UAV) and the number of cell towers that can be faked. The decryption skills have also improved a lot in the last 10 years (the Ki calculation time is now under 0.7 seconds, which means almost real-time decryption for semi-passive and fully passive interceptors), but that does not affect the eavesdropping methods , since it is a question of calculation.

Some of the XCell Stealth Phones can also recognize SS7 eavesdropping (eavesdropping with the help of the network operator). The SS7 protocol was first developed in 1975 and has seen little change since 1982, although it is still used today as the primary method by law enforcement agencies for location tracking.

What has changed in the last year is the ability to intercept WhatsApp, Messenger, Skype and other IM clients, regardless of whether they are installed on a cell phone or a PC. However, we do not recommend our users to use such applications. In addition, Android Ultra Secure Stealth Phones (XStealth Lite and XStealth) come with pre-installed secure IMs, SMS, VPN, etc.

Payment & Shipping

We accept:

  • Bank transfer.
  • Debit or credit cards.
  • PayPal.
  • Western Union.
  • Cryptocurrencies.

Swiss Post fee: 38€ per Package*

Shipping takes 5 to 15 days for delivery. Delays are to be expected due to the COVID-19 outage. The delivery time can also be influenced by local customs procedures. *The price is calculated for 2 items per package.

Swiss Post fee: 90€/ Package*

Swiss Post shipping only needs 3 working days for delivery internationally. *The price is calculated for 2 items per package. Swiss Post does not allow more than 2 cell phones per package.