Do not allow compromises
in your safety


Our right to privacy protects us from being persecuted for our beliefs, lifestyle or sexual orientation. Right now, our privacy is being attacked without us realizing it, because every tool that gives people access to tons of personal data is being abused. We believe that personal data should be your data and not shared with others! Therefore, truly “secure cell phone” should be threat aware. For the maximum safety of mobile phone users, we have developed XCell Stealth Phones.

Do not assume that your secrets will be hunted all the time by different instances. This will not be the case. Find out exactly when you are a target and for how long. Be smart and use XCell Stealth Phones to your advantage: 

If you know if and when someone is listening to your phone conversations, you can let them know what you want them to know about you. In most cases smarter than scrambling your calls. Only with XCell Stealth Phones you are in control of your mobile communications and know about any eavesdropping attempts.

Using an XCell device compared to other secure phones: you will always be one step ahead of your enemies and make the right decisions at the right time. The Stealth Phone will alert you to real threats in real time and allow you to exploit this advantage at will.

This kind of advantage cannot be achieved by using a crypto phone. This is the reason why many professionals use XCell devices on a daily basis. The entire project was inspired and vetted by security and intelligence professionals who are also our main customers.

Some government agencies have been given carte blanche to the metadata of millions of phone calls. Someone, somewhere could potentially hear or read your conversations.

In the U.S. it’s even worse:

If you are a U.S. citizen, tapping your phone calls without a warrant is illegal, but police do not need a warrant requiring proof of “probable cause” of a crime to monitor the numbers for incoming and outgoing calls in real time, as well as the duration of the calls. The court need only sign an order making the data “relevant to an ongoing criminal investigation.” The government can also obtain historical phone records with an administrative subpoena that does not require a judge’s approval.

For a fee, many wireless carriers provide the phone’s location to authorities. Cell towers track where your phone is at any given time, as do the GPS capabilities of some smartphones.

Sprint in 2012: shared location data with U.S. law enforcement 67,000 times. AT&T in 2012: to have received 77,800 requests for location data. (AT&T also said it charges $100 to begin tracking a phone and $25 per day for continued tracking.)

Other carriers, including T-Mobile, U.S. Cellular, and Verizon, did not provide information on the number of requests for location data they received or the number of times they provided it.

Intelligence agencies have long exploited a loophole to conduct warrantless searches of Americans’ data collected under Section 702. The NSA conducts over 30,000 of these “backdoor” searches annually, while the FBI refuses to report their number, we know that these searches are routinely conducted when they are investigating and adjudicating a crime, or even just hunting for information on foreign affairs.

The law on government wiretapping of citizens is well established and crystal clear. However, the surveillance systems did not include a requirement that judicial warrants be filed. In other words, there is no independent review or judicial oversight.

Government wiretapping of citizens is an extremely serious matter. The ability to invade private space is a tremendous power with which an individual can be monitored, embarrassed, controlled, shamed, or ruined. Because it is so invasive, the technology of wiretapping has been subject to carefully crafted and legal controls almost since its invention. Ignoring these controls and wiretapping without a court order is a crime that carries significant jail time. All of this is ignored, and warrantless government wiretapping of citizens has become a daily routine.

Starting with government projects in 1998, we developed countermeasures along with niche eavesdropping systems – special phones that can detect eavesdropping. Then, in 2007, XCell Stealth Phones became a standalone branch, keeping pace with the latest wiretapping technologies and providing secure cell phones for government, military and law enforcement agencies. Since 2013, some XCell Stealth Phones have been available for public use.

The detection algorithms and software solutions were developed from the ground up by the same programmers and telco engineers who developed the interception systems that are the primary source of our Stealth Phones. Year after year we have added new special features and detection solutions that make our products unique.

Besides hardware modifications we made to connect the software to the baseband of the phone, special functions like self-nuke motherboard and anti-forensics require some parts to be added in addition to the existing hardware.

Genuine safety for the user

Unlike other “secure cell phones”, XCell Stealth phones do not require an Internet connection to function properly. All special functions are performed locally and independently from the outside world.

Once you leave your phone by connecting to the Internet, there is no privacy. Not even secure browsers and VPNs can provide 100% privacy and security for a simple reason: You never know who is really behind it.

Unlike other “secure cell phones”, no third-party servers are involved. Your data stays with you.

A server is actually another computer. You will never know who is actually behind that server and you can’t even do a simple background check. All we know from our customers is: that most of the above servers are run by intelligence agencies with a single purpose: to find out confidential information that their servers share.

Sure, everything is encrypted…. And sure, no one will find out your secrets except their own operators. This is not an assumption, this is information we have from our main customers. This is also the reason why our best selling product does not use data connection and internet.

Unlike other “secure cell phones”, using our features does not require a data plan, contract or data SIM card.

Unlike other “secure phones,” there are no monthly or annual fees. All special features are designed to work for free, no strings attached. Only a one-time payment when you purchase the product.

⚠️ No fees also means maximum privacy and security.

Compared to crypto phones that only use encryption to maintain a sense of security, the concept of XCell Stealth Phones is based on eavesdropping rather than encryption.

We also make high-performance jammers for law enforcement purposes. Guess what: law enforcement agencies use this technology when a target phone uses “secure” (encrypted) calls and messages. Simply, the product blocks any data connection on selected cell phones. In this way, the “encrypted” phone user must use their phone as a normal cell phone, make unencrypted calls and send unencrypted text messages. Therefore, monitoring cell phones is a piece of cake.

In today’s market, there are a variety of devices that allow you to encrypt your calls. Although using encryption to protect your privacy is a wise decision, this method has its drawbacks as well:

A. You never know if the encryption you use is actually trustworthy, and there is no reliable way to verify it. Most developers of encryption applications do not make the source code public. There can be (and usually are) backdoors used by law enforcement agencies. Sneaking a backdoor into a crypto system doesn’t even require the active cooperation of the device manufacturer. It only takes one bribed programmer to compromise an entire product.

Some crypto device manufacturers have a track record of covert cooperation with intelligence agencies and interested individuals.

B. Using such devices can make you look suspicious and attract unwanted attention. A crypto phone is a ringing bell that attracts unwanted attention from the very people you want to avoid.

C. If you are targeted by an intelligence agency, encrypting your calls and messages does not mean that you are 100% protected from eavesdropping. Think about it: Will they drop you just because you use encrypted communications? No, they certainly won’t. Since it’s a challenge for them, they will find other ways to get the information they need. Sure, for a short time your secrets will be…. will remain secret. But any decent government agency will always find security loopholes to get the information they need about you by any means necessary.

By encrypting your phone calls, you are telling them that you have something important to hide, and you are forcing the authorities to use other ways to gather information.

D. An encrypted call is not as…. encrypted as you think. Even if you use a crypto phone, the GSM operator or the entity running a GSM interceptor can find out quite a bit of information, such as:

The number you dial and the number that calls you. This way they can find out the location of the caller and even their true identity. It’s just a matter of time. You can (and will) listen to his cell phone to find out who it is and what your relationship is with him.

  • The length of the conversation, with time stamp.
  • Their location at the time of the phone call.
  • Their geolocation at every single moment, through some simple and effective triangulation techniques.
  • Some GSM Interceptor can perform a DoS attack on your crypto phone, making the phone unusable for any length of time. This happens when the crypto phone uses a GPRS/data connection to transmit encrypted voice.
  • Many modern GSM eavesdroppers can downgrade your crypto phone connection from 3G to 2G by simply jamming the 3G uplink frequencies, which is a standard procedure. This causes many crypto phones that use data connections to fail and become unusable.
  • With the help of the network operator, the phone’s IMEI can be locked to the network.
  • A GSM interceptor can perform a DoS attack on a BTS by continuously sending RACH bursts to all phones in the affected area. This affects all cell phones, including crypto phones from a given area.

So, even if you use a crypto phone, your phone number and the identity of the person you are talking to on the phone, your exact locations, communication patterns, etc. are not protected at all. They won’t know what you are talking about, but they will know when, how long, where and with whom. Sure, the phone call itself usually can’t be decrypted in a reasonable amount of time. But the above information can (and will) be used to find out your secrets in the end.

For this reason, crypto phones can only be used as secure communication devices for a short period of time. In fact, being predictable is one of the worst choices on the intelligence battlefield. And using a crypto phone means that you are more than predictable.

Unlike other “secure phones”, no special SIM card is required to perform the special functions. Any normal SIM card is compatible with XCell Stealth Phones.

Matchless Features

No two Stealth Phones are required to make secure voice calls and send secure messages. In addition, XCell Stealth Phones can send and receive secure calls and messages to or from any regular cell phone due to continuous network scanning. If you want to send and receive military encrypted messages, then you must use at least 2 XCell devices.

XCell Stealth Phones are immune to SIM toolkit attacks, which are used by both hackers and law enforcement to execute commands on the target phone via the SIM card. SIM management filters have been added to prevent SIM toolkit attacks.

XCell Stealth Phones are secure by default. Firmware files that manage and enable software installation are permanently removed. No antivirus is required, as no apps or executables can be installed even by the phone user. No remote exploits can be executed directly or indirectly for XCell Stealth Phones via the SIM Toolkit.

⚠️ Immune against FinSpy
⚠️ Immune against Exodus
⚠️ Immune against Pegasus

Effective tamper protection mechanisms are installed at both software and hardware levels. Hardware tamper resistance is resistance to tampering (intentional malfunction or sabotage) by normal users of a product, package, or system, or by other users with physical access to it. Using software tamper-resistance techniques, a firmware can check itself to see if the code has been changed. We refer to these techniques as self-checking, where the binary code of the protected software is literally read using special functions called checkers.

A cell phone battery contains up to 4 microcells. When intelligence agencies intercept the package containing your new phone, they replace one of the microcells with a tracking device powered directly by the remaining microcells before delivery. In addition, the phone user always charges the battery before it is discharged, keeping the tracking device alive.

⚠️ We use single cell batteries that do not allow replacement of microcells.

No “secure” mobile or crypto phone provides its users with a test tool to test the security. In this way, no phone user can actually test their own “secure” phone, as trust is the main thing, rather than testing.

Since we do not allow our users to trust only what we say and sell, we provide a free testing tool called XPing Tool, compatible with XStealth Lite and XStealth, available right after purchase.

Videos by XCell Technologies