DUE TO CORONA OPENING HOURS MAY VARY UNTIL FURTHER NOTICE.....
DUE TO CORONA OPENING HOURS MAY VARY UNTIL FURTHER NOTICE.....
DUE TO CORONA OPENING HOURS MAY VARY UNTIL FURTHER NOTICE.....
DUE TO CORONA OPENING HOURS MAY VARY UNTIL FURTHER NOTICE.....
spyshop-tel
DUE TO CORONA OPENING HOURS MAY VARY UNTIL FURTHER NOTICE.....
DUE TO CORONA OPENING HOURS MAY VARY UNTIL FURTHER NOTICE.....
DUE TO CORONA OPENING HOURS MAY VARY UNTIL FURTHER NOTICE.....
DUE TO CORONA OPENING HOURS MAY VARY UNTIL FURTHER NOTICE.....
DUE TO CORONA OPENING HOURS MAY VARY UNTIL FURTHER NOTICE.....
DUE TO CORONA OPENING HOURS MAY VARY UNTIL FURTHER NOTICE.....
DUE TO CORONA OPENING HOURS MAY VARY UNTIL FURTHER NOTICE.....
DUE TO CORONA OPENING HOURS MAY VARY UNTIL FURTHER NOTICE.....

SECURED PHONES

SECURE PHONE

SMS encryption (min. 2 Secure Phones required)

Crypto Phones

UNTRACABLE GSM MOBILE PHONE
WITH * SMS ENCRYPTION (* min. 2 pcs. required)

For the security of your Phone conversations, the ‘Secure Phone’ allows you to achieve a high level of protection against the risk of interception. Now, it is more and more common when you use an unprotected mobile phone. Unlike a cellphone that operates on the encrypted data item, codifying and making unintelligible to any outside listener, the ‘Secure Phone’ protects the call itself, making the Phone untraceable and impossible for those who wants to listen to it unnoticed (real time).

General description

The result is obtained thanks to the IMEI (identification code transmitted to your Telephone provider), but above all to an elaborate analysis algorithm of the telephone network through which you are connected. The wiretaps can be based on the IMEI number or on the Phone number. So, in the case where the interception is performed, starting from the knowledge of your IMEI number, changing the SIM card will be of no help, because it’s the device itself to be intercepted.

Ultimately, by having the ability to change the IMEI, you will get the same result as an effective and real change of cellphone. And that’s not all. The Secure Phone will alert you immediately by a vibrating display text message when someone will try to intercept your call.

The active equipment, normally used in wiretapping as the IMEI/IMSI catcher and GSM interceptors, works on the C2 level, masking itself as a new cell. The C2 (reselection criterion) value is used to determine if a new cell should be selected to camp-on. If the transmitted C2 value of a neighbour-cell is higher than the serving-cell (for a period longer than 5 seconds), the Phone will catch the new cell.

In addition, the Secure Phone also allows to encrypt the SMS so, as to protect them from any external interception, by means of an internal application into the device. If there has been an encrypted exchange, in this condition, you can be quiet: The message will be completely incomprehensible and uncoverable. Anyway, any attempt to intercept the cellphone will be reported by means of a message viewable directly on the phone.

How the SMS encryption Works

The SMS encryption takes place with military level security using an AES elliptic curved based encryption (CFB mode 192 bit). The application for end-to-end security communication of SMS is PIN protected, in order to prevent any physical access to the reading of messages. Moreover, since the encrypted key is not unique (it is different for each contact stored in the address book), the Secure Phone makes it much safer for sending and receiving of messages between 2 or more users. No server is involved to collect your messages (for later de-coding risks!)

In recent years, the wiretaps are very frequent and assume the theft of military, economic and political information that offers benefits to competitors. There are a variety of devices on the market today to encrypt your conversations. Through using of encryption to protect your privacy might be the prudent choice, the method has it’s own disadvantages:

1) You never know if encrypted smartphones are really trustworthy and there is no reliable way to check it.
2) The use of such devices may make one seem suspicious and attracts undesired attention to you personally.

Main functions and capabilities of the ‘Secure Phone’

• Audio/text alert in case of connection to active equipment
• Automatic or manual phone IMEI change
• Capability to set the C2 to any value, to avoid the cell detection
• Ability to view a log of all attacks and the elapsed time
• Application for end-to-end encrypted SMS communication (minimum 2 phones required!)

The ‘Secure Phone’ is produced in limited editions. Delivery from stock or prepaid order (refund guarantee in case of exceedance of agreed delivery date).

This product is provided with an unlimited license lifespan!