For the security of your phone conversations, the Stealth Phone allows you to achieve a high level of protection against the risks of interceptions, now more and more common when you use an unprotected mobile phone.
Unlike a cell phone that operates on the encrypted data item, codifying and making them unintelligible to any outside listener, the Stealth Phone protects the call itself, making the phone untraceable, and impossible life for those who want to listen to it.
This result is obtained thanks to the IMEI (International Mobile Equipment Identifier) number change, ie the 15-digit number that uniquely identifies each mobile device (to know just digit * # 06 #), any telephone operator is used.
The wiretaps can be based on the IMEI number or on the phone number. So in the case where the interception is performed starting from the knowledge of your IMEI number, change the SIM card there will be of no help, because it's the device itself to be intercepted.
The Stealth Phone is able to change IMEI code in different ways: systematically or manually, using simple procedures.
Changing the IMEI number manually, you can choose one to your liking. Alternatively, these identification numbers are generated automatically the phone itself thanks to a sophisticated internal algorithm, and it's practically impossible that a number is repeated. In this way, the Stealth Phone becomes in fact a new device every time, thus making its interception and localization impossible, and allowing you to speak freely without fear of being heard or traced.
And that's not all. With the Endoacustica system, the Stealth Phone will alert you immediately, sending an alarm or a discrete vibration when someone tries to intercept you. At this point you just need turn off and on the phone again to be re-safe.
In recent years, the wiretaps are very frequent and assume the theft of military, economic and political information that offer benefits to competitors.
There are a variety of devices on the market today to encrypt your conversation. Though using of encryption to protect your privacy might be the prudent choice, the method has its own disadvantages:
- You never know if encryption you use is indeed trustworthy and there is no reliable way to check it.
- Using of such devices might make you looking suspicious and attract undesired attention to your personality.
Understanding of IMEI (International Mobile Equipment Identity)
The IMEI is a unique 15-digit code used to identify an individual GSM mobile telephone to a mobile network. The IMEI can be displayed on most phones by dialing the code *#06#. It is also usually printed on the compliance plate under the battery. The numerical format of the IMEI code is: 111111-22-333333-4. This format will be in place until April 1st 2004.
- TAC: type approval code
- FAC : final assembly code
- SNR: serial number
- CD: check digit
The TAC (Type Approval Code) is formed by the first six digits of the IMEI. This code identifies the country in which type approval was sought for the phone, as well as the approval number.
NOTE: From 1st April 2004 the TAC will be the abbreviation for Type Allocation Code.
The FAC (Final Assembly Code) identifies the company that produced the mobile phone (for instance: Sony-Ericsson or Nokia).
The SNR (Serial Number) is a six digit code, which has been uniquely assigned to the specific type of handset.
The CD (Check Digit) is used to check the IMEI for its validity for Phase 2 and Phase 2+ handsets. Phase 1 GSM handsets, however, always have zero (0) as check digit.
The company isn't responsible for the IMEI change. The phone comes with original IMEI and any changes are under the direct control of the customer. In addition, the device is made available only for alerting in case of interceptions by third parties. The company is exempted from liability for any misuse.