Network technology: 2G/3G
This feature can detect all types of call/SMS interception. XCell Basic v3 Regular will continuously monitor and scan in background both mobile networks, checking for network anomalies as LAC changing, RSSI increase, C2 reselection.
XCell Basic v3 Regular is capable to detect all kind of call/SMS interception, performed by:
– IMSI Catchers.
– Active GSM-Interceptors.
– Semi Active GSM-Interceptors.
– Passive GSM-Interceptors.
– SS7 means (by the help of network provider, called also Lawful Interception).
XCell Basic v3 Regular will also detect when the other mobile phone involved in the call is being tapped.
This feature detects lawful interception by SS7 boxes (known as Network Switch Based Interception or Network Operator Assistance Interception). cryptoTRACERⓇ is a unique feature based on XCell’s proprietary algorithms that can instantly detect lawful interception attempts and alert the user when calls and SMS are being intercepted using SS7 (strategic interception solutions).
In addition to IMSI Catchers and GSM-Interceptors, which are small and mobile (sometimes vehicle mounted) interception systems, law enforcement agencies use so-called lawful interception (SS7 interception or operator help interception), a special piece of hardware that is directly connected to the GSM core network (at the level of the network switch).
In order to instantly detect if your XCell Basic v3 Regular is monitored by SS7 means, you don’t have to make any call or send/receive a message. Just run cryptoTRACER® and wait for results. After checking phone firmware integrity, cryptoTRACER® will start pinging core network at MSC/VLR and AUC/HLR level. Then will calculate network redundancy and compare to standard redundancy. If a ping delay will be detected, SS7 monitoring alert will be triggered by displaying:
– Network redundancy [!]
– Pingdelay [!]
– Phone status [!]
This feature creates a separate, secure partition in which the IMEI engine, IMSI engine and other security-related software components run smoothly, without the possibility of interference or tampering. The user can verify the integrity of the sandbox and its components at any time.
This feature will start checking both active and passive interception, allowing the user to immediately check whether the Stealth Phone is connected to a GSM-Interceptor or is affected by SS7 surveillance.
After the start, the function begins to check the active and passive monitoring, step by step. When monitoring with active and semi-active GSM-Interceptors, the Stealth Phone checks:
Regarding interception performed by Passive GSM-Interceptors, the phone will check based on real ARFCN:
The phone will ping HLR/VLR core network, computing network redundancy and abnormal ping delays. In the end, will generate a Network Security Rating. 100 % means that the network is 100% secure.
This feature monitors the C2 (cell re-selection criterion) parameter used by GSM-Interceptors to force mobile phones to connect. Active and semi-active GSM-Interceptors will force any mobile phone to disconnect from the home network and connect to the rogue BTS that the device is impersonating. This is also known as BCCH manipulation and is used by all modern GSM-Interceptors.
When launching this function, the phone will:
XCell Basic v3 Regular are protected from forensic investigations by volatile USB filters. No forensic device can extract any data or files from the Stealth Phone. As soon as the Stealth Phone is connected to such a device, a PC or a service box, the volatile USB filters trigger a self-destruction of the motherboard, and the Stealth Phone goes into protected mode (permanent boot loop).