History

Do not allow compromises in your safety

Every XCell Stealth Phone user will always be one step ahead of their enemies.
Anything is possible, from simple deception or manipulation techniques to complex counter-intelligence measures.

WARNING icon

All of our features should be used with caution: You don’t want your enemies to find other ways to get relevant information from you, just in case they realise that tapping your phone doesn’t give them the information they’re looking for. Remember that it is not only your mobile phone that is a source of sensitive information: the same information can also come from other sources (HUMINT – human intelligence, as opposed to the more technical intelligence disciplines such as signals intelligence – SIGINT), such as your social relationships, friends, relatives, colleagues, employees, etc., or through the use of other methods and techniques such as hidden bugs, surveillance cameras, etc. It is only a matter of time before you are affected by such attempts if you are targeted by professionals.

The Motive

Why XCell Technologies develop XCell Stealth Phones?​

The government wiretapping of citizens is an extremely serious matter. The ability to invade the private realm is a tremendous force with which an individual can be monitored, embarrassed, controlled, shamed or ruined. Because it is so invasive, wiretapping technology has been carefully crafted and legal controls almost since it was invented. Ignoring these controls and wiretapping without a court order is a crime that carries a substantial prison sentence. But all of this is being ignored, and government wiretapping of citizens without guarantee has become a daily routine.

Our right to privacy protects us from being persecuted for our beliefs, lifestyle or sexual orientation. Right now, our privacy is being attacked without us realizing it, because every tool that gives people access to tons of personal data is being abused. We believe that personal data should be your data and not shared with others! Therefore, truly “secure cell phone” should be threat aware. For the maximum safety of mobile phone users, XCell Technologies developed XCell Stealth Phones.

Development icon

History

Our detection algorithms and software solutions were designed from the ground up by the same programmers and telecom engineers who developed the interception systems that are the primary source of our Stealth Phones.
Government icon

Government

Starting with government projects in 1998, we developed countermeasures alongside niche interception systems - special phones that can detect eavesdropping.

Military icon

Military

In 2007, XCell Stealth Phones became a standalone division, keeping pace with the latest wiretapping technologies and providing secure cell phones to government, military and law enforcement agencies.

Private Sector icon

Private Sector

Since 2013, some XCell Stealth Phones have been available for public use. Year after year we have added new special features and detection solutions that make our products unique.

counter measure icon

Benefits

Do not assume that your secrets will be hunted all the time by different instances. This will not be the case. Find out exactly when you are a target and for how long. Be smart and use XCell Stealth Phones to your advantage: 

If you know if / when someone is listening to your phone conversations, you can let them know what you want them to know about you. In most cases, smarter than scrambling your calls. Only with XCell Stealth Phones, you are in control of your mobile communications and know about any eavesdropping attempts.

Using an XCell device compared to other secure phones: you will always be one step ahead of your enemies and make the right decisions at the right time. The Stealth Phone will alert you to real threats in real time and allow you to exploit this advantage at will.

This kind of advantage cannot be achieved by using a crypto phone. This is the reason why many professionals use XCell devices on a daily basis. The entire project was inspired and vetted by security and intelligence professionals, who are also our main customers.

The difference

Check out some special features below that make them different from other so-called “secure cell phones”.

  • Real-time call interception detection.
  • Real-time SMS interception detection.
  • Ping detection for location tracking in real time.
  • Abnormal LUR and RAND / SRES sessions detection in real time.
  • Real-time SS7 interception detection.
  • Real-time SS7 location tracking detection.
  • Dynamic IMEI (IMEI can be changed manually or automatically).
  • IMEI cloning (ability to impersonate a different mobile phone, regardless of type or brand name).
  • Dynamic IMSI (like using a new SIM card for every new call).
  • Select and block ARFCN / EARFCN (Pair Comm channels) that the phone uses to communicate with the cell tower.
  • Real GSM location spoofing (while the phone is actively connected to the GSM network and not WiFi!) Bypassing the GSM triangulation performed by modern GSM interceptors. Effective against SS7 location tracking.
internet connection icon

No internet connection required

Unlike other “secure cell phones”, XCell Stealth Phones do not require an internet connection to function properly. All special features are carried out locally and independently of the outside world. Once you leave your phone by connecting to the internet, there is no more privacy. Point. Even secure browsers and VPNs can’t offer 100% privacy and security for one simple reason: You never know who’s really behind it.

No third party servers

Unlike other “secure cell phones”, there are no third-party servers involved to protect your privacy. Your data stays with you. A server is actually another computer. You will never know who is actually behind this server, and you cannot even do a simple background check. All we know from our customers is that most of the above servers are operated by intelligence agencies with a single purpose: to find out sensitive information that their servers are giving away. Sure, everything is encrypted. And sure, no one will find out your secrets except them. This is not a guess, this is information we have from our main customers. This is also a reason why our products do not require an internet connection to perform our special functions.
Server icon
contract icon

No data plan or contract

In contrast to other “secure mobile phones”, the use of special functions does not require a data plan, contract or data SIM card.

No monthly fees

In contrast to other “secure cell phones” there are no monthly or annual fees. All special functions are designed to work for free, with no further conditions. One time payment only when you purchase the product. No fees also mean maximum privacy and security.
payment icon
encryption icon

Doesn't just rely on encryption

In contrast to other “secure cell phones”, the XCell Stealth Phones are not (only) based on encryption. The way in which our Stealth Phones block eavesdropping is not comparable to the mainstream and is not based on encryption, but on very sophisticated firmware and special apps, for which it took us almost 20 years to achieve the actual level of security.

Compared to crypto phones, which only use encryption to maintain the feeling of security, the XCell Stealth Phones concept is based on eavesdropping security rather than encryption.

We also make high power jammers for law enforcement purposes. Guess what, law enforcement agencies use this technology when a target phone is making “secure” (encrypted) calls and messages. Simply put, the product blocks all data connections on selected cell phones. In this way, the “encrypted” phone user has to use his phone as a normal mobile phone, make unencrypted calls and send unencrypted text messages. Hence, cell phone monitoring is a breeze. Some of them will reveal what is known as the “source code” for review. However, there is a simple question: how can you be sure that the same “clean” software is installed on the phone you buy?

Crypto phones are mostly used by ordinary people (mostly civilians) who need some protection against break-in attempts by hackers and professionals. But let’s be honest: How many real GSM hackers are there in the world? Just a few. And they are certainly not interested in eavesdropping on phone calls en masse. And yes, the standard network protection (standard A5/1 encryption algorithm) is just enough when it comes to the above people.
And again, let’s face it: who do we really fear? No doubt, it is law enforcement agencies who certainly have the technical skills and highly qualified personnel to intercept your phone calls.

Encryption is only a solution for a short time. Then it can become dangerous even for professionals as it attracts the unwanted attention of law enforcement agencies. 

Since our products are aimed at professionals ranging from intelligence and embassies to law enforcement and various government agencies (and we are actually inspired by their requirements), we take a different approach as our primary users are primarily interested in knowing whether, when and for how long their cell phones are tapped. Therefore, XCell devices use active measures for the best possible protection and only resort to passive protection in certain cases (which are decided by the user). Our approach when it comes to privacy and mobile security is significantly different: instead of blind encryption, we offer the user the unique opportunity to recognize the eavesdropping and how long it has been active. We firmly believe that knowing when and for how long your phone is being tapped is a great advantage over encryption solutions, as you, and only you are in control of the information extracted (through manipulation or deception) by tapping your phone calls.

There is a wide variety of devices in the market today that you can use to encrypt your conversations. While using encryption to protect your privacy is a wise decision, this method also has its drawbacks:

A. You never know whether the encryption you are using can actually be trusted, and there is no reliable way to verify it. Most encryption application developers do not make the source code public. There may be back doors (and most of the time there are) that law enforcement agencies use.
The infiltration of a back door into a cryptosystem does not even require the active cooperation of the device manufacturer. It only takes one bribed programmer to compromise an entire product.

Some cryptographic device manufacturers have a track record of covert collaboration with intelligence agencies and interested individuals. Some of them do not even use publicly verified and standardized crypto-algorithms (such as Diffie-Hellman, SHA256, AES and Twofish), but rather “proprietary” encryption methods that are not available for public evaluation. Several “proprietary” crypto-algorithms that have not been publicly tested have proven to be easy to crack in the past, such as: B. the COMP128 algorithm, which is used in many GSM networks for authentication, so that the “proprietary crypto” approach must be viewed as very risky.

B. Using such devices can make you look suspicious and attract unwanted attention. A crypto phone is a ringing bell that attracts unwanted attention from the very same people you want to avoid.

C. If you are being targeted by an intelligence agency, encrypting your calls and messages doesn’t mean you are 100% safe from eavesdropping. Think about it: will you be dropped just for using encrypted communications? No definitely not. Since it is challenging for them, they will find other ways to get the information they need. Sure, for a short time, your secrets will … be kept secret. But any decent agency will find security flaws at any time to get the information they need about you by any means.

By encrypting your phone calls, you’re telling them you have something important to hide, and you’re forcing the authorities to use other avenues to gather information.

D. An encrypted call is not … encrypted as you think it is. Even if you are using a crypto phone, the GSM operator or the entity running a GSM interceptor can find out quite a bit of information, such as:

  • The number you dialled and the number that is calling you. This enables them to find out the location of the caller and even their true identity. It’s only a matter of time. You can (and will) eavesdrop on his cell phone to find out who it is and what your relationship is with him.
  • The length of the conversation, with timestamp.
  • Your location at the time of the phone call.
  • Your geolocation in every single moment, through a few simple and effective triangulation techniques.

Other proven vulnerabilities of the crypto phone:

  • Some GSM interceptor devices can carry out a DoS attack on your crypto phone, making the phone unusable for an indefinite period of time. This happens when the crypto phone uses a GPRS / data connection to transmit encrypted voice.
  • Many modern GSM interceptor devices can downgrade your crypto phone connection from 3G to 2G simply by interfering with the 3G uplink frequencies, which is a standard practice. As a result, many crypto telephones that use data connections fail and become unusable.
  • With the help of the network operator, the phone’s IMEI can be blocked in the network.
  • A GSM interceptor can perform a DoS attack on a BTS by continuously sending RACH bursts to all phones in the area. This affects all cell phones, including crypto phones from a certain area.

So even if you are using a crypto phone, your phone number and the identity of the person you are talking to, your exact locations, communication patterns, etc. are not protected at all. They will not know what you are talking about, but they will know when, for how long, where and with whom. Sure, the phone conversation itself cannot normally be deciphered in a reasonable amount of time. But the information above can (and will) be used to find out your secrets in the end.

Because of this, crypto phones can only be used as secure communication devices for a short period of time. Indeed, being predictable is one of the worst choices on the intelligence battlefield. And using a crypto phone means you are more than predictable.

XCell products don’t compete with any crypto phones because we have a slightly different approach and vision to mobile security.

sim card icon

No special SIM required

In contrast to other “secure cell phones”, no special SIM card is required to carry out the special functions. Every normal SIM card is compatible with XCell Stealth Phones.

More unique properties

check icon

No need for 2 XCell Stealth Phones

No two Stealth Phones are required to make secure voice calls and send secure messages. In addition, thanks to continuous network scanning, the XCell Stealth Phones can safely send and receive calls and messages to or from any normal mobile phone. If you want to send and receive military encrypted messages, you must use at least 2 XCell devices.

Immune to SIM toolkit attacks

XCell Stealth Phones are immune to SIM toolkit attacks, which are used by both hackers and law enforcement agencies to execute commands on the target phone via the SIM card. SIM management filters have been added to prevent SIM toolkit attacks.
secure sim card icon

Videos by XCell Technologies

X-ONE and XStealth Stealth Phone

Discover

Our Newest

Products