Endoacustica Europe, Exclusive Customer Service, Consulting and Training
For the security of your phone conversations, the Stealth Phone allows you to achieve a high level of protection against the risks of interceptions, now more and more common when you use an unprotected mobile phone. Unlike a cell phone that operates on the encrypted data item, codifying and making them unintelligible to any outside listener, the Stealth Phone protects the call itself, making the phone untraceable and impossible to localize.
This result is obtained thanks to the IMEI (identification code transmitted to your telephone provider), but above all to an elaborate analysis algorithm of the telephone network to which you are connected. The wiretaps can be based on the IMEI number or on the phone number. So in the case where the interception is performed starting from the knowledge of your IMEI number, change the SIM card there will be of no help, because it's the device itself to be intercepted.
Ultimately, by having the ability to change the IMEI you get the same result as an effective and real change of cellphone. And that's not all. The Endoacustica Stealth Phone will alert you immediately by a vibrating display text message when someone will try to intercept you.
The active equipment, normally used in wiretapping as the IMEI/IMSI catcher and GSM Interceptors, works on the C2 level, masking itself as a new cell. The C2 (reselection criterion) value is used to determine if a new cell should be selected to camp-on. If the transmitted C2 value of a neighbor-cell is higher than the serving-cell (for a period longer than 5 seconds), the phone will catch the new cell.
This excellent device has the same features as a Burner phone or a trap phone, but you don't need to trough it out after use. In addition, the Stealth Phone also allows to encrypt the SMS, so as to protect them from any external interception, by means of an internal application into the device.
If there has been, in this condition, an encrypted exchange of SMS, you can be quite: the message will be completely incomprehensible and unrecoverable. Anyway, any attempt to intercept the cellphone will be reported by means of a message viewable directly on the phone.
The SMS encryption takes place, with military-level security, using an AES elliptic curved-based encryption (CFB mode 192bit). The application for end-to-end secure communication of SMS is PIN protected, so that to prevent any physical access to the reading of message. Moreover, since the encryption key is not unique (it is different for each contact stored in the address book) Stealth Phone makes much more safe the sending and receiving of message between two or more users.
The undetectable STEALTH-PHONE mobile is also available in the new PLUS version equipped with double SIM card, geographic position masking, GSM isolation, SMS encryption, calls via server and much more.
The company is not responsible in any way for the change of IMEI number. The phone comes with original IMEI and any changes are under the customer's control. Furthermore, the device is made available only for the warning function in the event of interceptions by third parties. The company disclaims any liability for any misuse.
The untraceable mobile phone (Nokia 5000 model-d2) provides 5 security levels in a single device:
1. Audio/text alert in case of connection to active equipment
2. Automatic and manual phone IMEI change
3. Capability to set the C2 to any value, to avoid the cell detection
4. Ability to view a log of all attacks and the elapsed time
5. Application for end-to-end encrypted SMS communication
For protection of mobile phone conversations of important people, managers etc.
For secure mobile phone communication in the field of investigations
For protection of one's privacy both in the workplace and in the private sphere
FACING ANY PROBLEMS?
Call us for a prompt solution
Dedicated consultation service
After-Sales training and support