Home » telecommunications surveillance » Articoli recenti:

Stealth Phone and anonymous SIM card, for an absolute privacy

February 9, 2010 Technology No Commenti

More than once, on this blog we mentioned the Stealth Phone, that is, a mobile phone which, thanks to a piece of software discreetly installed, is capable of working on the IMEI (International Mobile Equipment Identifier) number, which unequivocally identifies each and every cellphone in the world, and of making itself fully protected from any attempt at eavesdropping.

In fact, mobile phone call interception is carried out noy only, as one might think, by searching for the phone number, but also by using the IMEI number which identifies the handset, as well as the IMSI which is used to authenticate the SIM card mounted on our phone.

In most Western countries, SIM cards can be purchased only by presenting an identification document, and for many network operators they are also linked to a specific handset and its IMEI number. In practice, phone and SIM card are unequivocally linked to a person.

If you need to use your phone for private conversations or confidential business talks, it is advisable to keep the privacy level high by using an untraceable phone just like Stealth, which changes its IMEI number automatically each time it is switched on, basically turning into a different hone each time you use it.

Together with Stealth, the best way to maintain your anonymity is by using a rechargeable SIM card, not connected to any subscription contract which might reveal your identity to others. The problem is that in most countries, even to purchase a rechargeable card, a personal document must be presented, and this means that we would not be able to achieve a fully anonymous phone experience.

Fortunately though, thanks to Endoacustica it is possible to purchase form an extensive selection of anonymous SIM cards, that is, rechargeable phone cards, manufactured in several foreign countries, that do not require an identity document to be presented.

Furthermore, with this kind of service, recharging your credit on your mobile phone can be done with a Western Union money transfer, instead of using a bank transfer or, even worse, a credit card purchase, transactions which could become a visible link between your person and the anonymous phone number.

By adding an anonymous SIM card to a Stealth untraceable phone you will be completely safe and protected from interceptions.

In order to add one further layer of protection, we have created a new version of our Stealth software. This version, which can be used on a normal Nokia 6021 handset, will allow you to receive a notification in the highly unlikely case of an interception attempt.

In that case, your Nokia Stealth will discreetly vibrate, and at that point all you have to do is switch it off, then turn it on again to have a new IMEI number generated, and be once again safe from any unauthorized attempt at listening to your calls.

Thanks to these simple precautions, you will be able to carry out confidential business talks, private negotiations, or simply stay in touch with your loved ones, in a completely safe manner. Just make sure that your counterpart is equipped with the same level of protection and the same equipment, and you will no longer need to worry.

For more information about anonymous phone cards and invisible phones, we advise you to visit the Endoacustica website.

Invisible mobile phones

November 22, 2009 Technology No Commenti

Stealth Phone

As we have seen in many previous posts on this blog, our conversations on mobile phone are far from being secure, far from being private and far from interception-proof. On the contrary, cellphone is the means of communications that carries the highest risk of having our conversations eavesdropped by prying ears, which could be interested in extracting information to be used against us, either in the personal life field or in business, especially if high-figure interests are at stake.

The most common mistake is made by thinking that, as far as telephone interception is concerned, it is only the telephone number that is placed under surveillance. By doing this, people think that they can be safe by simply changing the SIM card on their mobile phone, especially when travelling abroad.

Once the card is changed, erroneously believing to be safe, they start talking freely about confidential business. This is a very big mistake, because most of the mobile phone eavesdropping operations are carried out not only by picking up conversations from a specific telephone number, but also by using the IMEI (International Mobile Equipment Identity) number, that is, the unique number that identifies each and every mobile phone on the market.

Every mobile phone has its unique IMEI number that identifies it, and the modern systems for covert listening and eavesdropping are capable of intercepting conversations carried out on a mobile phone, by using this number. Once the handset is being intercepted, changing your SIM card will not protect you from prying ears.

In theory, the solution would be using a different cellphone every time you change your SIM card, but aside from being not so practical, this method does not protect us from interceptions at all, or at least not as safely as it is the case by using an invisible mobile phone, otherwise called Stealth Phone which, instead of requiring to change the SIM card each time, changes its IMEI number upon request, whenever we want and without having to change the handset.

Invisible cellphones are normal Siemens S65 handsets, on which a special software has been installed which, automatically or upon request, interacts with the device’s firmware, thus dynamically changing the phone’s IMEI number. By doing this, it will be as if you are using a different handset each time, without actually changing your phone.

Furthermore, the Stealth untraceable phone is equipped with some sort of built-in firewall which, in the unlikely event of an interception attempt, will immediately send an alert to its user. Once you receive this kind of notification, all you have to do is close the call, change the IMEI number, and you will be able to resume your conversation from where you left it, without fear of any unauthorized listener.

Therefore, the Stealth Phone is a method which guarantees a 100% efficiency to protect the privacy of our conversations. By using a Stealth secure phone we will be protected from unauthorized listeners, and will be able to carry on with our business, or talk to our loved ones, without fearing that our conversations could be intercepted and used against us. To be sure that our counterpart is also protected, and that our conversations are absolutely impossible to intercept, it is recommended that both parties use a Stealth Phone.

For more information about how a secure phone works, as well as to view a wide array of devices for interception defense, you can visit the Endoacustica website.

Calendar

September 2014
M T W T F S S
« Aug    
1234567
891011121314
15161718192021
22232425262728
2930  

NEWSLETTER

e-mail:
name:
Newsletter Endoacustica Europe - ENGLISH

Login

CONTACT US

Endoacustica Europe srl
Via Umberto Terracini, 47
70029 Santeramo in Colle (BA)
P.IVA IT06836020724
ITALY
tel. 0039 080 30 26 530
tel. 0039 080 43 73 08 93
fax 0039 080 40 73 11 87
e-mail: info@endoacustica.com

Text ADS

 SPY PHONE
spyphone A SpyPhone or GSM Spy cellphone, is a normal mobile phone, where a software has been installed, which allows a third party to monitor the activities of the phone user. To avoid suspicions, a Spyphone must be given either as a present (for family members monitoring) or given as company equipment (for personnel monitoring).

 MICRO DIGITAL RECCORDER
digital video recorder Micro digital recorder with vocal activation have recording time of 1200 hours long. They went out from the big screen to enter by force in the life of every day, in the most diverse situations that until a few years ago even the vivid imagination of a writer of espionage could have imagined.
 WALL MICROPHONES
Wall microphones to listen through walls up to 70 cm. Ultra sensitive professional stereo microphone, suitable to pick up the lowest noises thanks to its very high sensitive ceramic microphone. Limpid and stable sound. Endowed with sockets for recorder and earpiece.
 PHONE VOICE CHANGER
The phone voice changers when interposed between handset and phone, will change your voice into another one. It transforms any voice into a masculine, feminine, adult or child one.The voice changer can be adapted to cell phones, cordless phones, speakers and microphones, recording systems, or connected to switchboards. The reproduced voice is not a robotic but a human one.
 REAL TIME TRACKERS
localizzatore rf

Real time trackers are designed for those who need to keep their pets under control, while limiting the relevant cost, but also to locate precious objects or to remember where you parked your car.

 ANTI-DROWNING AND ANTI-LOSS ALARM
anti loss alarm

Anti-drowning defender is an alarm device which combines anti-drowning and anti-loss alarm, and works effectively as an electronic safety device for protecting children or pets from drowning and loss.

Relevant artilcle

Attention to the new gadgets of thieves

14 Feb 2014

mendicante-a-semaforo

This may be the last discover of ingenious thieves who don’t hesitate to resort to the technology to hit unsuspecting victims. The news of recent months shows several cases where someone complains of being robbed, at home or in the company, after agreeing to unknowns small gadgets, deployed on the street, particularly at the crossings or when the light is red. The hypothesis is that these gadgets (lighters, key chains …

Never lose things again with the geolocation tools

19 Sep 2013

etichettatag

The geolocation is getting closer, at your fingertips. We’re all constantly losing things. Keys, bag, charger and many other tools of daily use are very often forgotten, lost. The hard part is finding them. This discomfort could be deleted with the help of geolocation devices. In particular, big companies and startups are trying to answer to the distraction effects with products that will come soon on the market. Their secret would be an accessory, …

Stop mobile phones theft

30 Jul 2013

furto-cellulare

One hundred twenty thousand a year, ten thousand a month are the mobile phones stolen (or loss). These are the numbers from the homeland of mobile phones, smartphones and tablets thieves: London. The Mayor, Boris Johnson, and the police are really troubled about the weight of these statistics and asked to the same companies devices producing to investigate about what is happening. In particular, they asked to Apple, Samsung and …

Locate a mobile phone with the technique used by bats and dolphins

4 Jul 2013

Pipistrelli

Locate the exact position of a cell phone in enclosed spaces may become possible thanks to an algorithm that allows us to reconstruct the 3D shape of a room, listening to the echo of the sounds produced inside, even simple ones like the snap of the fingers. The project was developed by a research group at the EPFL. The researchers were inspired by echolocation, the system by which some animals …

Fish-robot will patrol the Thames River

10 May 2013

robot_fish

It’s environmental surveillance, the new frontier crossed by the fish-robot that will be released, in the coming months, in the Thames in order to sniff out pollution. Scenes like science fiction movies are recorded during the tests in the water. The robots will be released in groups of five in order to provide a mapping of the critical points and pollutant elements. The search will rely to the sensors built-in …

At the supermarket with the navigator

17 Jan 2013

locata

GPS technology has now numerous applications in daily activities. Keep an eye on the kids, monitor the pet, follow the partner’s car is a cakewalk if you have the right tools. Shortly, it will possible use a sophisticated development of GPS technology in a shopping center or on the shelves of the supermarket so you’ll save time and optimize the product comparison. To lead the tour will be our trusty …

Internet of things will revolutionize our daily

10 Dec 2012

web-3-0

Web 3.0 isn’t yet far away. All the big laboratories are working hard to develop new applications concerning the Internet of things. With this neologism has been named the last frontier of online technology. The strength lies in the possibility given to objects to interact with each other by capturing and exchanging information. The alarm clock may sound for example in advance once found, through the Internet, heavy traffic conditions. …

Hop! the suitcase that follows you

13 Nov 2012

Hop-595x363

Pack your bags is always a problem. Weather conditions, formal and informal dresses, comfortable and casual, but also suited to special occasions that may occur…In short, a grind. And what often we create is a baggage too heavy and almost entirely useless. About 25 years ago, a pilot of the Nortwestern Airlines tried to obviate to the problem of having to lift heavy luggage introducing the trolley as we know …

Even sharks tracked with GPS

22 Oct 2012

ocearch-squali-gps

Until recently, GPS tracking systems were used for the control of small animals. Now the GPS challenges even the most dangerous animals. Indeed, it is in an experimental phase the scientific mission of the American non profit association, Ocearch, led by Chris Fischer. During the operation, the sharks are caught, mainly in North America, and to them is applied a GPS tracking device, then they come back to the sea. …

Home with the GPS shoes

1 Oct 2012

dominic_wilcox_sept_043

Dominic Wilcox, british designer, has created a fully functional prototype pair of shoes with a built-in GPS that will guide you home. The name of this extravagant invention is “No Place Like Home” and it’s inspired by the famous novel “The Wonderful Wizard of Oz” in witch the protagonist Dorothy, with her magic shoes, can go everywhere clicking her shoes together three times. For Wilcox’s shoes, with expertly decorated sole, …