Any one know anything about these phones?
Roger Tolces
http://x-cellular.com/about.html
XCell Stealth Phones
For the security of your phone conversations, the XCell Stealth Phone allows you to achieve a high level of protection against the risks of interceptions, now more and more common when you use an unprotected mobile phone. Our phones are intended for protection of conversations against the control by the operator, and by any GSM interceptor. The phone will alert you if either an SMS / text message, outgoing or incoming call is made via such GSM interception technology. The XCell Stealth Phones guarantees that your calls and text messages are 100% confidential from any 3rd party interception or IMSI catchers. The phone will immediately alert you in real time of any attempt to intercept your communications. Handsets has been tested on such equipment as the Rohde & Schwarz type interceptors, Septier, Dominator, IBIS, GSS Pro-A, NeoSoft and few others. Our phones operates independantly of any server exchange data and instead uses a highly complex engine to ensure all incoming and outgoing calls are sweeped for a backdoor break in communication in real time.
XCell Stealth handsets are the perfect choice for politicians, lawyers, executives, police and government personnel, in fact anyone who recognises the need for complete secure communication.
The wiretaps can be based on the IMEI number or on the phone number. So in the case where the interception is performed starting from the knowledge of your IMEI number, change the SIM card there will be of no help, because it is the device itself to be intercepted.
The XCell Dynamic IMEI Phone is able to change IMEI code in different ways: systematically or manually, using simple procedures.
Changing the IMEI number manually, you can choose one to your liking. Alternatively, these identification numbers are generated automatically by the phone itself thanks to a sophisticated internal algorithm, and it is practically impossible that a number be repeated. In this way, the phone becomes in fact a new device every time, thus making its interception and localization impossible, and allowing you to speak freely without the risk of being heard or traced.
What is IMEI, A5, and GSM Localization?
The International Mobile Station Equipment Identity or IMEI is a number, usually unique, used by a GSM network to identify valid devices. It is also used by IMEI/IMSI catchers / GSM interceptors in order to identify your phone and performing call interception.
The GSM ciphering algorithm is called A5. It can be supressed (active and semi active GSM interceptors) or broken (passive GSM interceptors) in order to eavesdrop your phone calls and SMS. Also, it can be supressed by GSM carrier due to a warrant.
GSM Localization: referring to how the cell towers which receive a phone's signal may be used to calculate its geophysical location. Same technique is used if instead of cell tower the phone is connected to a GSM interceptor. Invizible interrogation messages (called Ping) will be sent to your phone, in order to calculate its location.
All changes of above identifiers and parameters are instantly detected by XCell Stealth Phones, which will warn you every time when such intrusion attempts are in progress.
Can you really trust your cell phone?
A mobile phone is really a tracking device that lets you make calls. Over the past decades, telecommunication interception has developed into a huge worldwide industry allowing a phone to be bugged remotely. Most interception of mobile communications is made during the call, the equipment used is very advanced, commonly referred to as a GSM interceptor. These systems are used by many special security organizations for security purposes, however this may not always be the case. Different foreign and local agencies, security organisations within almost all countries routinely intercept calls and are able to bug a cell phone remotely that may yield sensitive political, military, economic or simply private information. The use of wiretapping has become so widespread, simple and uncontrolled that you should assume that records of you private calls end up in the wrong hands.
Identifying IMEI and IMSI
Every mobile phone has the requirement to optimize the reception. If there is more than one base station of the subscribed network operator accessible, it will always choose the one with the strongest signal. An IMSI/IMEI-catcher masquerades as a base station and causes every mobile phone of the simulated network operator within a defined radius to log in. With the help of a special identity request, it is able to force the transmission of the IMEI and IMSI. Tricking the mobile phones has been always pretty easy, as long as the phone is not asking the network for authentication, but only vice versa. GSM interceptors (IMEI/IMSI catchers) uses BCCH manipulation to give a "virtual power" effect of up to several hundred watts. By doing that, a GSM interceptor will trick the handsets, which will always choose the "BTS" with the strongest signal. As well, by changing Cell ID (all other network parameters remains the same - MCC, MNC, LAC) and ARFCN, the interceptor forces the cell phones within the area to send registration requests, collecting this way phone identifiers: IMSI, IMEI, classmark etc.
Tapping a mobile phone
The IMEI/IMSI catcher (or GSM interceptor) subjects the phones in its vicinity to a man-in-the-middle attack, acting to them as a preferred base station in terms of signal strength. With the help of a SIM, it simultaneously logs into the GSM network as a mobile station. Since the encryption mode is chosen by the base station, the IMEI/IMSI-catcher can induce the mobile station to use no encryption at all. Hence, it can encrypt the plain text traffic from the mobile station and pass it to the base station.
The "Ciphering Indication Feature" is suppressed by the network provider by setting the OFM (Operational Feature Monitor) bit in the "administrative data" field (EFAD, see GSM 11.11, 10.3.18) on the SIM card, in order to make IMEI/IMSI catchers (GSM interceptors) invisible for the phone user. Usually the Ciphering Indicator is turned off and you cannot modify the administrative data in the SIM. But XCell Stealth Phones are bypassing that provider settings and warns the phone user in case of interception.

The interceptor can be programmed to see any phone call by catching the IMEI number of the phone then monitoring the phone as well as locking onto the cell transmission during the call, the interceptor can then de crypt and manipulate the encoded transmission from your phone to the relevant BTS tower (base transceiver station). This will allow the interceptor operator to listen into your phone call as well as send or receive all your text message correspondence totally anonymously and remotely with no need for physically contact of your mobile phone or handset.
The GSM interceptor uses an active system that captures the IMEI of the targets by acting like a fake base station (BTS).
The GSM interceptor initializes the operation of the false base station. Thus, one fake cell is formed for which the MCC, MNC and ARFCN values will correspond to the parameters of a cell communication operator, operating in a given district, and the LAC is set to a different value from what is used in the real network. This operation is called handover forcing: the mobile phones, which are within its operation radius, will acknowledge activation of a strong channel and will start the registration procedure. They will transmit to the interceptor their IMEI, TMSI (received in real GSM networks), class mark, KcN. For the subscribers (cell phones), registration in the fake network does not differ from registration in the real operator network.
Any one know anything about these phones?
Roger Tolces
http://x-cellular.com/about.html
XCell Stealth Phones
For the security of your phone conversations, the XCell Stealth Phone allows you to achieve a high level of protection against the risks of interceptions, now more and more common when you use an unprotected mobile phone. Our phones are intended for protection of conversations against the control by the operator, and by any GSM interceptor. The phone will alert you if either an SMS / text message, outgoing or incoming call is made via such GSM interception technology. The XCell Stealth Phones guarantees that your calls and text messages are 100% confidential from any 3rd party interception or IMSI catchers. The phone will immediately alert you in real time of any attempt to intercept your communications. Handsets has been tested on such equipment as the Rohde & Schwarz type interceptors, Septier, Dominator, IBIS, GSS Pro-A, NeoSoft and few others. Our phones operates independantly of any server exchange data and instead uses a highly complex engine to ensure all incoming and outgoing calls are sweeped for a backdoor break in communication in real time.
XCell Stealth handsets are the perfect choice for politicians, lawyers, executives, police and government personnel, in fact anyone who recognises the need for complete secure communication.
The wiretaps can be based on the IMEI number or on the phone number. So in the case where the interception is performed starting from the knowledge of your IMEI number, change the SIM card there will be of no help, because it is the device itself to be intercepted.
<image003.png>
The XCell Dynamic IMEI Phone is able to change IMEI code in different ways: systematically or manually, using simple procedures.
Changing the IMEI number manually, you can choose one to your liking. Alternatively, these identification numbers are generated automatically by the phone itself thanks to a sophisticated internal algorithm, and it is practically impossible that a number be repeated. In this way, the phone becomes in fact a new device every time, thus making its interception and localization impossible, and allowing you to speak freely without the risk of being heard or traced.
What is IMEI, A5, and GSM Localization?
The International Mobile Station Equipment Identity or IMEI is a number, usually unique, used by a GSM network to identify valid devices. It is also used by IMEI/IMSI catchers / GSM interceptors in order to identify your phone and performing call interception.
The GSM ciphering algorithm is called A5. It can be supressed (active and semi active GSM interceptors) or broken (passive GSM interceptors) in order to eavesdrop your phone calls and SMS. Also, it can be supressed by GSM carrier due to a warrant.
GSM Localization: referring to how the cell towers which receive a phone's signal may be used to calculate its geophysical location. Same technique is used if instead of cell tower the phone is connected to a GSM interceptor. Invizible interrogation messages (called Ping) will be sent to your phone, in order to calculate its location.All changes of above identifiers and parameters are instantly detected by XCell Stealth Phones, which will warn you every time when such intrusion attempts are in progress.
Can you really trust your cell phone?A mobile phone is really a tracking device that lets you make calls. Over the past decades, telecommunication interception has developed into a huge worldwide industry allowing a phone to be bugged remotely. Most interception of mobile communications is made during the call, the equipment used is very advanced, commonly referred to as a GSM interceptor. These systems are used by many special security organizations for security purposes, however this may not always be the case. Different foreign and local agencies, security organisations within almost all countries routinely intercept calls and are able to bug a cell phone remotely that may yield sensitive political, military, economic or simply private information. The use of wiretapping has become so widespread, simple and uncontrolled that you should assume that records of you private calls end up in the wrong hands.
Identifying IMEI and IMSI
Every mobile phone has the requirement to optimize the reception. If there is more than one base station of the subscribed network operator accessible, it will always choose the one with the strongest signal. An IMSI/IMEI-catcher masquerades as a base station and causes every mobile phone of the simulated network operator within a defined radius to log in. With the help of a special identity request, it is able to force the transmission of the IMEI and IMSI. Tricking the mobile phones has been always pretty easy, as long as the phone is not asking the network for authentication, but only vice versa. GSM interceptors (IMEI/IMSI catchers) uses BCCH manipulation to give a "virtual power" effect of up to several hundred watts. By doing that, a GSM interceptor will trick the handsets, which will always choose the "BTS" with the strongest signal. As well, by changing Cell ID (all other network parameters remains the same - MCC, MNC, LAC) and ARFCN, the interceptor forces the cell phones within the area to send registration requests, collecting this way phone identifiers: IMSI, IMEI, classmark etc.
<image001.jpg>
Tapping a mobile phone
The IMEI/IMSI catcher (or GSM interceptor) subjects the phones in its vicinity to a man-in-the-middle attack, acting to them as a preferred base station in terms of signal strength. With the help of a SIM, it simultaneously logs into the GSM network as a mobile station. Since the encryption mode is chosen by the base station, the IMEI/IMSI-catcher can induce the mobile station to use no encryption at all. Hence, it can encrypt the plain text traffic from the mobile station and pass it to the base station.
The "Ciphering Indication Feature" is suppressed by the network provider by setting the OFM (Operational Feature Monitor) bit in the "administrative data" field (EFAD, see GSM 11.11, 10.3.18) on the SIM card, in order to make IMEI/IMSI catchers (GSM interceptors) invisible for the phone user. Usually the Ciphering Indicator is turned off and you cannot modify the administrative data in the SIM. But XCell Stealth Phones are bypassing that provider settings and warns the phone user in case of interception.
<image002.png>
The interceptor can be programmed to see any phone call by catching the IMEI number of the phone then monitoring the phone as well as locking onto the cell transmission during the call, the interceptor can then de crypt and manipulate the encoded transmission from your phone to the relevant BTS tower (base transceiver station). This will allow the interceptor operator to listen into your phone call as well as send or receive all your text message correspondence totally anonymously and remotely with no need for physically contact of your mobile phone or handset.
The GSM interceptor uses an active system that captures the IMEI of the targets by acting like a fake base station (BTS).
The GSM interceptor initializes the operation of the false base station. Thus, one fake cell is formed for which the MCC, MNC and ARFCN values will correspond to the parameters of a cell communication operator, operating in a given district, and the LAC is set to a different value from what is used in the real network. This operation is called handover forcing: the mobile phones, which are within its operation radius, will acknowledge activation of a strong channel and will start the registration procedure. They will transmit to the interceptor their IMEI, TMSI (received in real GSM networks), class mark, KcN. For the subscribers (cell phones), registration in the fake network does not differ from registration in the real operator network.
--
You received this message because you are subscribed to the Google Groups "TSCM-L Professionals List" group.
To unsubscribe from this group and stop receiving emails from it, send an email to tscm-l2006+...@googlegroups.com.
For more options, visit https://groups.google.com/groups/opt_out.