
State-sponsored cyber attacks
People are trying to protect and defend themselves against abusive govt intrusion and illegal interception. Read our Digital-defence report.
When it comes to surveillance, accessible data is extremely limited. Switzerland is one of the few countries that provides transparent, official statistics on legal interception measures. Most other states do not release comparable information.
In our report, we used the official statistics published by the Swiss government for 2024. But what we can see is only the tip of the iceberg and by no means the full picture.
The numbers released by official sources reflect legal interception, the visible part above the waterline. Beneath the surface lies a much larger, invisible layer: activities that are not documented in any statistic.
There is no official registry for illegal surveillance, foreign interception or private-sector monitoring. If such data existed, it would be the primary source of our report. That’s why these official figures represent only a partial view of a much broader and more complex reality.
In 2024, the PTSS (Post- and Telecommunications Surveillance Service) recorded almost half a million official information requests in Switzerland alone.
These requests refer to legally mandated interception measures that are directly linked to criminal investigations. The statistics reflect the number of surveillance orders, not the number of crimes committed.
These figures are important because they show how surveillance is regulated and documented in democratic systems, reveal how deeply digital communication has become a target, and remind us that smartphones sit at the center of modern surveillance networks.
But these figures do not capture what happens outside the legal framework, the massive, unmeasured part of the iceberg.
If this is the picture for just one country, what about the other 194 states around the world, and how high is the dark figure really?
What lies below the surface is undefined, unmeasured, largely unreported and, for the most part, invisible to the public eye.
Corporate espionage,
Private interception technologies,
Foreign intelligence operations,
Criminal surveillance techniques.
This hidden layer is constantly evolving, growing more sophisticated and difficult to detect. Unlike PTSS data, this layer leaves no official trail. And that’s exactly why awareness is so critical.
The report provides:
A clear view of the visible layer of legal interception,
Insight into why the invisible part matters,
Why it is essential to use an XCell Stealth Phone to protect your communication.
If your home were a luxurious private estate, would you leave the gates open at night? Of course not. You would build high walls, install security systems, and protect what matters most.
Your digital life is no different. Every message, every call, every decision lives inside your personal digital house. XCell Stealth Phones act like a fortress: invisible to prying eyes, resistant to interception, and designed to give you control, not someone else.
Real protection must be in place before danger appears so it can unleash its full potential when it matters most. Just as strong gates keep intruders out of your home, XCell’s advanced technology keeps unwanted surveillance out of your life. Those who build real security do not wait for threats. They invest in security long before any threat appears. Secure your digital estate and take back full control of what is yours.
👉 Discover XCell Stealth Phones and lock your digital gates today.
If you would like to discuss the topic of surveillance, privacy, or the Freedom Report in more detail, we’re happy to hear from you.
📩 Contact us directly via email: [email protected]
Feel free to reach out to us by email to share your perspective.
Thank you,

People are trying to protect and defend themselves against abusive govt intrusion and illegal interception. Read our Digital-defence report.

Is voice distortion good for you? Find out how useful voice distortion really is for interception. Do you really want to protect yourself? Read this article

This case, discovered by Indian cybersecurity researcher Anand Prakash, was just a bug of bad programming, and is euphemistically called IDOR, short for Insecure Direct Object Reference.