Stop hiding. Be invisible.

Start fighting back

blank
blank
blank

Welcome to ECN GmbH – your trusted source for XCell Stealth Phones. We are proud to be the exclusive distributor for XCell Technologies. Our expertise is based on many years of experience in telecommunications sales, combined with in-depth training from XCell Technologies to provide you with the best possible product knowledge and quality of service. It is this specialised training that enables us to find and deliver the most appropriate security solutions for our customers. And we do not stop after selling. We offer 24/7 live support, recognising the importance of reliable support. Our knowledgeable team is always available to answer your questions, solve problems and ensure the smooth operation of your XCell Stealth Phone.

We are constantly looking for simple and innovative solutions with one thing in mind: mobile security. XCell Technologies is a dynamic company that seeks to enhance the protection of its customers by integrating a skilled, experienced and highly motivated team. Our mission is to provide our customers with the highest-quality services in intelligence and mobile security, turning our knowledge, expertise and passion into a value for their own benefit. By choosing XCell Technologies, you will find a company that makes excellence, innovation and non-conventional strategy its core philosophy.

The development staff consists of individuals spanning different languages, regions, industries, and nationalities. We are experts in offensive GSM security, cybercrime and security intelligence. We dedicate time and effort to ensuring that our product maintains its stature as the leader in the mobile security community.
It is fair to say that, with our background in signal intelligence and direct experience working with GSM, XCell Stealth Phones developers had a significant head start. And it is almost certainly this rare insight that guided us throughout our pragmatic approach to solving the problem at hand: alerting when your cell phone is being intercepted.

We are mobile/GSM security professionals, currently working with various Military and Government agencies and other clients who prefer to remain nameless. Our day-to-day work involves vulnerability research, cryptography, mobile remote exploitation, exploit development and Mobile Penetration Testing. Creativity, skills and passion are the hallmarks of this close-knit group that faces every day with a positive attitude any new challenge.

XCELL TECHNOLOGIES

Special Thanks!

With the support of hackvision.de, osmocom.org and others who prefer not to be named, as well as all our friends and our advisory board.

Do we meet the current technical standards?

XCell Stealth Phones are state of the art. We must mention that the interception methods haven’t changed too much in the last 10 years. This is because the principles of mobile networks have not changed and the same protocols and technologies are used. Consequently, wiretapping methods have not changed in terms of technology.

The latest changes in wiretapping technology relate to the size of the device (can now be mounted on a drone / UAV) and the number of cell towers that can be faked. The decryption skills have also improved a lot in the last 10 years (the Ki calculation time is now under 0.7 seconds, which means almost real-time decryption for semi-passive and fully passive interceptors), but that does not affect the eavesdropping methods , since it is a question of calculation.
Some of the XCell Stealth Phones can also recognize SS7 eavesdropping (eavesdropping with the help of the network operator). The SS7 protocol was first developed in 1975 and has seen little change since 1982, although it is still used today as the primary method by law enforcement agencies for location tracking.

blank
blank

Existing threats?

Mobile networks use their own encryption: A5/1, A5/2 and more recently A5/3 Stream Cypher, thus voice calls and SMS are encrypted by default on some mobile networks.

When it comes to law enforcement, government agencies and experienced hackers can circumvent the default encryption of mobile networks by using various methods, such as by exploiting network vulnerabilities or by getting help from the network operator.

Interceptors look like an ordinary cell tower to typical phones. Once the phone connects to the interceptor (based on IMEI and/or IMSI filtering, a target phone is forced to connect to the interceptor), a variety of “over-the-air” attacks become possible, from eavesdropping on calls and texts to injecting spyware onto the target phone. A spyware collects all key logs and sends them back to the attacker, records calls and reveals the location of the phone. Regardless of whether the phone’s owner uses a VPN or an encryption app for voice calls or messages.

TRUST & SECURTITY

Security Audits

XCell Stealth Phones have been developed in close cooperation with our key customers, who provide us not only with a secure market, but most importantly, a test environment for our products: All XCell Stealth Phones have been intensively tested by our customers on various listening systems before public release. All XCell Stealth Phones have passed the interception and tracking tests (100% positive results).

blank

This is also the reason why our products have a great advantage and are always one step ahead of our competitors.

PRODUCTION TIMELINE

Securing the future

blank