All of our features should be used with caution: You don’t want your enemies to find other ways to get relevant information from you, just in case they realise that tapping your phone doesn’t give them the information they’re looking for. Remember that it is not only your mobile phone that is a source of sensitive information: the same information can also come from other sources (HUMINT – human intelligence, as opposed to the more technical intelligence disciplines such as signals intelligence – SIGINT), such as your social relationships, friends, relatives, colleagues, employees, etc., or through the use of other methods and techniques such as hidden bugs, surveillance cameras, etc. It is only a matter of time before you are affected by such attempts if you are targeted by professionals.
Why XCell Technologies develop XCell Stealth Phones?
The government wiretapping of citizens is an extremely serious matter. The ability to invade the private realm is a tremendous force with which an individual can be monitored, embarrassed, controlled, shamed or ruined. Because it is so invasive, wiretapping technology has been carefully crafted and legal controls almost since it was invented. Ignoring these controls and wiretapping without a court order is a crime that carries a substantial prison sentence. But all of this is being ignored, and government wiretapping of citizens without guarantee has become a daily routine.
Our right to privacy protects us from being persecuted for our beliefs, lifestyle or sexual orientation. Right now, our privacy is being attacked without us realizing it, because every tool that gives people access to tons of personal data is being abused. We believe that personal data should be your data and not shared with others! Therefore, truly “secure cell phone” should be threat aware. For the maximum safety of mobile phone users, XCell Technologies developed XCell Stealth Phones.
Do not assume that your secrets will be hunted all the time by different instances. This will not be the case. Find out exactly when you are a target and for how long. Be smart and use XCell Stealth Phones to your advantage:
If you know if / when someone is listening to your phone conversations, you can let them know what you want them to know about you. In most cases, smarter than scrambling your calls. Only with XCell Stealth Phones, you are in control of your mobile communications and know about any eavesdropping attempts.
Using an XCell device compared to other secure phones: you will always be one step ahead of your enemies and make the right decisions at the right time. The Stealth Phone will alert you to real threats in real time and allow you to exploit this advantage at will.
This kind of advantage cannot be achieved by using a crypto phone. This is the reason why many professionals use XCell devices on a daily basis. The entire project was inspired and vetted by security and intelligence professionals, who are also our main customers.
Check out some special features below that make them different from other so-called “secure cell phones”.
In contrast to other “secure cell phones”, the XCell Stealth Phones are not (only) based on encryption. The way in which our Stealth Phones block eavesdropping is not comparable to the mainstream and is not based on encryption, but on very sophisticated firmware and special apps, for which it took us almost 20 years to achieve the actual level of security.
Compared to crypto phones, which only use encryption to maintain the feeling of security, the XCell Stealth Phones concept is based on eavesdropping security rather than encryption.
We also make high power jammers for law enforcement purposes. Guess what, law enforcement agencies use this technology when a target phone is making “secure” (encrypted) calls and messages. Simply put, the product blocks all data connections on selected cell phones. In this way, the “encrypted” phone user has to use his phone as a normal mobile phone, make unencrypted calls and send unencrypted text messages. Hence, cell phone monitoring is a breeze. Some of them will reveal what is known as the “source code” for review. However, there is a simple question: how can you be sure that the same “clean” software is installed on the phone you buy?
Crypto phones are mostly used by ordinary people (mostly civilians) who need some protection against break-in attempts by hackers and professionals. But let’s be honest: How many real GSM hackers are there in the world? Just a few. And they are certainly not interested in eavesdropping on phone calls en masse. And yes, the standard network protection (standard A5/1 encryption algorithm) is just enough when it comes to the above people.
And again, let’s face it: who do we really fear? No doubt, it is law enforcement agencies who certainly have the technical skills and highly qualified personnel to intercept your phone calls.
Encryption is only a solution for a short time. Then it can become dangerous even for professionals as it attracts the unwanted attention of law enforcement agencies.
Since our products are aimed at professionals ranging from intelligence and embassies to law enforcement and various government agencies (and we are actually inspired by their requirements), we take a different approach as our primary users are primarily interested in knowing whether, when and for how long their cell phones are tapped. Therefore, XCell devices use active measures for the best possible protection and only resort to passive protection in certain cases (which are decided by the user). Our approach when it comes to privacy and mobile security is significantly different: instead of blind encryption, we offer the user the unique opportunity to recognize the eavesdropping and how long it has been active. We firmly believe that knowing when and for how long your phone is being tapped is a great advantage over encryption solutions, as you, and only you are in control of the information extracted (through manipulation or deception) by tapping your phone calls.
There is a wide variety of devices in the market today that you can use to encrypt your conversations. While using encryption to protect your privacy is a wise decision, this method also has its drawbacks:
A. You never know whether the encryption you are using can actually be trusted, and there is no reliable way to verify it. Most encryption application developers do not make the source code public. There may be back doors (and most of the time there are) that law enforcement agencies use.
The infiltration of a back door into a cryptosystem does not even require the active cooperation of the device manufacturer. It only takes one bribed programmer to compromise an entire product.
Some cryptographic device manufacturers have a track record of covert collaboration with intelligence agencies and interested individuals. Some of them do not even use publicly verified and standardized crypto-algorithms (such as Diffie-Hellman, SHA256, AES and Twofish), but rather “proprietary” encryption methods that are not available for public evaluation. Several “proprietary” crypto-algorithms that have not been publicly tested have proven to be easy to crack in the past, such as: B. the COMP128 algorithm, which is used in many GSM networks for authentication, so that the “proprietary crypto” approach must be viewed as very risky.
B. Using such devices can make you look suspicious and attract unwanted attention. A crypto phone is a ringing bell that attracts unwanted attention from the very same people you want to avoid.
C. If you are being targeted by an intelligence agency, encrypting your calls and messages doesn’t mean you are 100% safe from eavesdropping. Think about it: will you be dropped just for using encrypted communications? No definitely not. Since it is challenging for them, they will find other ways to get the information they need. Sure, for a short time, your secrets will … be kept secret. But any decent agency will find security flaws at any time to get the information they need about you by any means.
By encrypting your phone calls, you’re telling them you have something important to hide, and you’re forcing the authorities to use other avenues to gather information.
D. An encrypted call is not … encrypted as you think it is. Even if you are using a crypto phone, the GSM operator or the entity running a GSM interceptor can find out quite a bit of information, such as:
Other proven vulnerabilities of the crypto phone:
So even if you are using a crypto phone, your phone number and the identity of the person you are talking to, your exact locations, communication patterns, etc. are not protected at all. They will not know what you are talking about, but they will know when, for how long, where and with whom. Sure, the phone conversation itself cannot normally be deciphered in a reasonable amount of time. But the information above can (and will) be used to find out your secrets in the end.
Because of this, crypto phones can only be used as secure communication devices for a short period of time. Indeed, being predictable is one of the worst choices on the intelligence battlefield. And using a crypto phone means you are more than predictable.
XCell products don’t compete with any crypto phones because we have a slightly different approach and vision to mobile security.