The most secure connection from wiretapping. How to protect your smartphone from wiretapping: secret codes.

In our modern age, too many tools are used to control the average citizen. Terrorist threats, the fragility of the state and the monitoring of antisocial elements lead to the fact that almost everyone is being wiretapped. Or everyone. Or more than everyone else. Whatever it was, communication has not been personal for a long time. If the intelligence services are not interested in you, then a person of a more dubious nature will definitely be happy with personal correspondence. It is possible to protect yourself from all this, albeit difficult. We will help you with this.


Wiretapping


Let's start with the most radical step - changing the communication standard. Most modern mobile phones operate using the GSM standard, which is not a problem to intercept if you know how to do it. But there is also the CDMA standard. It has been around for many years, phones that work with it cost on average one and a half times more, and these are almost always ordinary dialers, sometimes even without J2ME. However, the reliability of this standard is evidenced by the fact that knowledgeable people, businessmen and simply those for whom safety is more important than show-off, consistently support it financially. Here we will also write down a simple change of smartphone to a regular phone. Less radical, less convenient, but you will protect yourself from viruses that, say, can intercept SMS.


Next is checking for the presence of wiretapping itself. If you have a smartphone, then the signs that your conversations are not confidential are as follows: the battery runs out very quickly, even if you do nothing, during communication you can hear other people’s voices on the handset, the smartphone gets very hot, you can hear background noise when you hold it near the switched on speakers. sound. These signs are not 100% reliable, but if you notice them in yourself, then you already have reason to worry a little.


Since from wiretapping a conversation through mobile networks You can’t be reliably protected, you can try, suddenly, the Internet. and others like them, ideally, will be able to protect your confidential conversations, since data is transmitted a little differently than during a simple conversation. However, the World Wide Web has its own dangers.

Interception of SMS


There are two main points here. Firstly, do not give your smartphone/phone to anyone, and if you do, do not forget to set guest mode (if you have LG) or a password to access your data. People are curious by nature... As for SMS directly, one of the most profitable options is encryption. For Android this is, for iOS - iCrypter. Of course, there are other alternatives to these apps, but the final choice is yours. In addition, you can reduce communication via SMS to a minimum using social networks. Or, what is most reliable, meet in person more often.

Location


Everything here is banal. Your location can be found quite easily through the enabled GPS receiver on your smartphone, and a little more difficult - through your operator and SIM card. Moreover, even if your phone is turned off, your location can still be found with average accuracy. The solution is obvious: if privacy is so important to you, remove the SIM card from your phone when you want to remain invisible.


However, there is another solution for GPS - incorrect coordinates. There are special applications that emulate your location anywhere, be it in Rome or Paris. That is, where you need it. For Android it is, for iOS it is Fake-A-Location.

Internet


If with GSM everything is more or less clear, and security depends on the operator, then on the Internet everything is much worse. Stealing passwords, hacking accounts, intercepting messages - all this is scary and very dangerous. Especially if for you the World Wide Web is like your home, and almost all your affairs take place there. But there are a couple of tips on how to protect yourself and your passwords and appearances.


Firstly, don't limit yourself to passwords for logging into social networks and the like. Instant verification via SMS has long been supported by most operators and such giants as Facebook and VK. Don't worry, they won't send you spam. Probably... Secondly, you can use a proxy to surf the Internet. For the most timid there is, on Android and Red Onion for iOS.

It is worth remembering, however, that no protection in the world is 100% reliable. And there is always a chance that you will still be bugged. But if you follow simple tips, learn the rules of working with proxies, encrypting SMS and so on, then only organizations that can turn the Pentagon’s website into a porn archive for the sake of laughter will be able to extract personal information about you. Everyone else will be left hanging.

Today, few people have not heard of wiretapping programs cell phones. These spy programs allow you to secretly intercept your SMS messages, learn the essence of your phone conversations, and even know your location at any time. Be careful.
For just a few thousand rubles, any person can subject anyone to total control, in the name of only their own interests.

Right before our eyes, a boom is beginning to flare up with eavesdropping and even more “spying” on our mobile phones. And it turns out that the cooler mobile phone, the more spy functions you can use:

  • visual photographing of surrounding persons and objects;
  • video recording and acoustic monitoring within a radius of up to 10 m from a mobile phone with subsequent registration of all speakers;
  • listening to all incoming and outgoing telephone conversations, SMS and email and scrupulous archiving of all information;
  • clearly determine the location of an object (mobile phone) with an accuracy of several meters;
  • remote activation of the microphone from a distance of tens of thousands of kilometers;
  • remote listening to conversations through the phone's microphone, even if the main battery is removed (for modern SMART phones).

Naturally, these technologies for controlling mobile phones were previously used only by Western intelligence services as part of the fight against terrorists and criminal elements. Until now, there has been no development or production of mobile phones in Russia.

In the production of simple mobile phones, these functions were implemented at the hardware level. They became active only upon special requests that were known to the relevant Western intelligence agencies. These activities were carried out within the framework of the legislation of their countries.

With the development of technology mobile communications and the advent of SMART phones and communicators that connect the functions of a telephone and a computer, the implementation of “special” functions or, as they are called, “police” functions also fell on the operating systems that are used in mobile technologies.

It has become increasingly difficult to produce universal, high-speed, cost-effective processors for mobile phones that implement an additional “police” function.

This is interesting to know.
This significant redistribution of special functions from hardware to software has led to the fact that experienced programmers have become adept at using it. A number of so-called “spy” phones have been created based on commercially available mobile phones.

There are more than 70 models from the world's most famous mobile phone manufacturers, such as NOKIA, SIEMENS, PANASONIC, MOTOROLA, SAMSUNG, SONY-ERICSSON and others, on the basis of which “spy” phones were developed.

False base stations

It has become possible for programmers to create inexpensive decoy base stations (such as IMSI decoys). These stations are engaged in activating the microphone on your mobile phone using fake calls or SMS.

For example, in information about new service a false operator, which is not at all noticeable at first glance, may contain a code to activate the microphone of your mobile phone for subsequent listening to the conversation and premises.

It is practically very difficult to determine that your microphone is turned on, and an attacker can easily hear and record not only your conversations on the phone, but also conversations in the room where the mobile phone is located.

This is interesting to know.
This is mainly typical for modern communicators and SMART phones.

Thus, not only intelligence services (naturally, in accordance with the law), but also a large number of competitors in order to obtain information about you, including compromising information.

You can expect a huge number of “spy” phones to appear. The main thing is that their range is expanding every day.

Be careful.
Now we cannot know for sure which phone we are buying: regular or« spy» and which phone will be returned to us after minor repairs.

Phone manufacturers are in no way legally responsible for these rather strange changes. There has not been a single official statement from either NOKIA or SIEMENS that you cannot use your phones as listening devices, that this violates human rights.

Anti-spyware software

To find and destroy spyware in your mobile phone, special anti-spyware software has appeared.

After all, not a single antivirus for mobile Nokia phones, Samsung and others popular models could not protect against this threat until now. Including such well-known applications as kaspersky mobile security and norton smartphone security.

Thanks only to the anti-spyware for phones Spy Monitor Pro, which can be downloaded from the website www.spyline.ru, the situation has changed radically. This latest mobile anti-Trojan is the only protection against numerous spyware programs.

ProgramSpy Monitor Pro

The anti-spyware/anti-Trojan program is capable of reliably catching any spyware applications for GSM/3G phones. The developer of Spy Monitor Pro guarantees the ability to find and remove any spy applications for mobile phones.

Spy Monitor Pro is an anti-Trojan that catches any spy applications on mobile phones. You need to download this antispyware for your Nokia or other model. Then you can start an immediate system scan and/or set up regular background scanning of your phone for spyware/trojans in the settings.

After detecting malware, Spy Monitor anti-Trojan will offer to safely remove unauthorized software for the system. All spyware applications are removed, even with additional parameters deletion protection.

The Spy Monitor Pro version of the anti-Trojan is distinguished by advanced functionality and an annual license for use. Exists free update anti-spy base.

Thanks to flexible settings and an intuitive interface, this mobile anti-spyware for Symbian 9 series is simple and easy to use. And thanks to the perfect system for recognizing spy signatures combined with extensive monitoring, you can always be sure of full protection from wiretapping. All you need to do is download the anti-spyware program Spy Monitor.

This version of the anti-Trojan: Spy Monitor Pro is designed to constantly scan your phone for viruses/Trojans with the ability to remove unauthorized software. Both in the program interface and in background. The specification is as follows.

  • The license validity period is 1 year.
  • Compatibility: Symbian 9 based phones ( full list models, see www.spyline.ru) and Windows Mobile 5.6 and higher (all models).
  • Scanning phone memory at the user's request.
  • Performing the antivirus function for the phone - warning about installed spyware applications.
  • Remove any found malicious application from the Spy Monitor Pro menu.
  • Installing the program takes no more than 5 minutes. and it is delivered by e-mail within 24 hours from the receipt of funds.
  • Ability to scan in the background.
  • Automatic update of the anti-spyware database.
  • Guaranteed to find any spy application.

Video and text instructions for installation and operation for Symbian 9 and Windows Mobile 5.6 and higher are available on the website www.spyline.ru. There's also detailed instructions installation instructions for Symbian 9 and Windows Mobile 5.6 and higher in PDF format.

Models supported:

  • all phones based on the third generation Symbian 9 operating system and higher;
  • all phones based on the Windows Mobile operating system 5.6 versions and higher.
Special anti-spy phones

The use of specially designed phones is a significantly more expensive solution to this issue. They have built-in hardware and control systems software, exclude the possibility of any type of unauthorized collection of information.

This will allow you to avoid eavesdropping from your competitors. There are numerous crypto GSM manufacturers in today's commercial market, which can be divided into categories, although they have a common approach to solving the problem: they are based on commercially available GSM phones.

The hardware implementation of encryption in a GSM phone can also be divided into two approaches:

  • additional chip inside the GSM phone;
  • an additional device that performs an encryption function and is connected to a regular GSM phone.

Another approach is software speech encryption using the processor found in the GSM phone.

Obviously, both methods have significant drawbacks in the field of protection from radiation from the GSM microphone and other highly emissive components, the harmonics of which are freely broadcast through the GSM antenna, and can be intercepted by an inexpensive scanner at a distance of tens of kilometers.

There is no need to use the most complex encryption algorithms: clear speech is present on the airwaves. In turn, software encryptors have a significant drawback: the keys are stored on a processor that is directly connected to the phone’s modem. Stealing keys is not difficult.

It's like a person locking their car and putting the keys next to it and proving that the car's security is super great. This is relevant because software systems GSM encryption is used operating system Windows, which is often attacked by numerous viruses, including so-called Trojan horses.

Crypto smartphoneANCORT A-7

The manufacturer of specialized phones must provide you with guarantees that the phone cannot be tapped and that it does not have systems for remote microphone activation.

The ANCORT company notes on its website that it can provide these guarantees. For all the technical details of crypto smartphone protection, see the company’s website. For example, consider the ANCORT A-7 crypto smartphone

The Ancort crypto-smartphone is completely developed by ANCORT and does not use third-party GSM platforms. The cost of developing a crypto smartphone and its special research is about 1 million.

The ANCORT A-7 crypto smartphone was originally planned for cryptographic protection. The phone has a specialized crypto chip, special filters and a metal screen that prevent dangerous radiation. The crypto smartphone does not have such highly emitting elements as a video camera, Bluetooth, infrared port, removable additional memory, or Wi-Fi.

In addition, a unique system for monitoring the correct operation of the encoder has been developed. The implementation of a special synchronization system ensures reliable operation of a crypto-smartphone in roaming, especially when roaming has to be carried out over significantly distant distances, where analog data transmission means are used for transmission.

In this case, the crypto smartphone has a unique system for restoring crypto synchronization, which ensures high reliability of the connection.

The ANCORT A-7 crypto-smartphone has the highest cryptographic, engineering and cryptographic characteristics, which provide reliable cryptographic protection.

Encryption of SMS and E-mail. ANCORT A-7 is the first to implement full encryption of text messages transmitted over GSM protocol communication channels.

Eliminating the possibility of a “Man in the Middle” attack. A man-in-the-middle attack is a type of attack in which the attacker gains the ability to read, add, and modify messages and other information at will. Moreover, none of the interlocutors will know about this. The attacker must be able to monitor and intercept messages (information) between interlocutors. Such an attack becomes possible when using Diffie-Hellman key exchange, if the key exchange occurs without identification (verifying the authenticity of the source).

The Ancourt cryptosmartphone uses built-in algorithms and a unique caller identification system, which, in turn, eliminates the possibility of a “man in the middle” attack.

Protection against viruses that allow you to listen to a subscriber's phone using any other phone or specialized computer. To protect against of this type viruses, during the development of the crypto-smartphone, additional hardware was developed that allows us to avoid the effect of these viruses on the effect of unauthorized eavesdropping on conversations from other mobile phones and in the immediate vicinity of it.

Protection against undeclared capabilities. When developing the Ancort Crypto Smartphone, the necessary research was carried out, as a result of which a special hardware part of the Crypto Smartphone was developed that does not allow unauthorized eavesdropping and remote activation of the microphone. This is how the Ancort crypto-state smartphone differs from other smartphones from well-known manufacturers, in which an encryption program is only installed, and there are no other methods of protection.

Anti-interference protection. In many modern cell phones and even cryptophones, emissions from the GSM microphone and other high-emitting components, the harmonics of which are freely broadcast through the GSM antenna, and can be intercepted by an inexpensive scanner at a distance of tens of kilometers. ANCORT A-7 is protected from devices that allow listening to standard GSM phones. In order to increase protection, special screens and filters were installed on the phone.

Protection against information leakage as a result of loss, theft, or temporary access. It is impossible to decrypt previously encrypted information, even if your phone is taken possession of (lost, stolen, or gained temporary access). Because for each communication session a temporary “session key” is created, which cannot be restored in the future. This ensures the safety of conversations, encrypted SMS and E-mail, even if the phone is lost.

Low latency in crypto mode. The delay is about 0.7 s. Of this, 0.5 s is a delay due to the low priority of the data transmission channel, and the remaining 0.2 s is occupied by the encryption process. The delay during a normal conversation on the GSM network is 0.08 s. In any case, if you are talking at some distance from the other person, the delay is not noticeable.

High speech quality in crypto mode. Syllable intelligibility is 87%. This corresponds to a high quality indicator at the commercial level. There is no similar encryptor in the world with such a level of quality of conversation in encrypted mode.

Possibility of synchronization with a computer. To do this, you need to install Microsoft ActiveSync on your PC and connect the crypto-smartphone to the computer using a USB cable.

Ease of use. Establishing a secure connection or transmitting a secure text message happens at the touch of a button.

Can be used worldwide. The phone has been tested in more than 30 countries, including France, Switzerland, China, India, Malaysia, Singapore, the United Arab Emirates, Sweden, and South Africa.

International recognition. ANCORT A-7 has repeatedly participated in various exhibitions held around the world and has shown its undeniable superiority over similar products from such well-known brands as Rohde & Schwarz, GSMK CryptoPhone, Siemens, etc.

Kudos. ANCORT A-7 is used to ensure the security of top government officials in countries such as the UAE, South Africa, Singapore, etc. Also, famous and wealthy people around the world trust their safety to ANCORT A-7.

Together with the world's famous Austrian jeweler, designer and inventor of luxury mobile phones, Mr. Peter Aloysson, a Diamond Crypto Smartphone worth 1,300,000 USD was developed, especially for people for whom it is important not only to protect their information, but also to emphasize their individuality.

ANCORT A-7 will not only protect you from eavesdropping, but will also emphasize the status of the owner! The base model costs about $3,000.

This is interesting to know.
To ensure reliable cryptographic communication, you must have at least two crypto smartphonesANCORT A-7.

Why do you need a crypto smartphone?

Currently, more than 500,000,000 GSM phones are used in the world, through which a huge amount of completely different personal information is transmitted - political, financial, economic, legal, medical and personal. The use of this information by criminal elements is extremely dangerous and can lead to catastrophic consequences for both the state, corporations and individuals.

The problem of kidnapping. Children of rich parents are especially susceptible to this threat. Criminals falsify the voice of parents speaking on a GSM phone and lure children in order to kidnap them. Income from kindnapping amounts to a colossal amount in the world, many hundreds of millions of dollars. Faking voice and speech is the easiest and most inexpensive way to facilitate kidnapping.

Falsification of the voice and meaning of the speech of political figures speaking via GSM, followed by publication in the press of fake conversations with corresponding comments. Governments of many countries spend hundreds of billions of dollars on the defense of their countries, but often they do not have any money to protect the telephone conversations of their government officials, even when they work outside the territory of their countries, where they are most easily compromised.

Falsification of the voice and speech of show business figures in order for the criminal paparazzi to launch a noisy campaign to compromise and organize persecution of them. It is extremely profitable for criminal paparazzi and brings them income of many tens of millions of dollars.

There are frequent cases of using intercepted information via GSM regarding human illness. Public disclosure of medical secrets about a patient’s illnesses in order to remove him from his position, especially when he occupies a high position.

Falsification of conversations between religious leaders in order to incite religious conflicts.

Theft of corporate and personal confidential data in order to ruin competitors. Most hackers listen to mobile phones and conversations on them to find out passwords for accessing corporate databases and bank accounts.

Using personal information about people to carry out racketeering and extortion.

From a technical point of view, intercepting GSM conversations is relatively simple for the following reasons.

Cost of unauthorized interception and recording telephone conversations for GSM is relatively low and ranges from $1000 to $2000 for recording one GSM number for a month.

The interception equipment is slightly larger than a laptop computer. It is easy to carry and transport. It is almost impossible to detect it; this is the so-called “passive mode”. The equipment can simultaneously monitor up to 16 GSM phone numbers.

A loud scandal involving the most famous Russian singer L. Agutin, whose voice was faked by attackers, which led to the singer’s father paying the extortionist $30,000.

What options exist for wiretapping cell phone conversations, how can one protect against this type of attack, and how can a subscriber determine that his phone may be being tapped? Due to the recent wave of espionage scandals, these issues are becoming relevant again. Journalists turned to Ukrainian mobile operators with a request to explain how subscribers should behave in such cases.

What was striking was that almost all the operators that journalists contacted were simply unable to provide answers to the questions posed. The only company that agreed to help were representatives of MTS Ukraine. The operator Life:) did not give an answer at all to the sent request, and Kyivstar replied that they are not experts in such matters, and that such questions should be addressed to special government services (read, Ministry of Internal Affairs, SBU, etc. ) The article below also used information about wiretapping of mobile phones obtained from public sources.

How operators protect their networks
When developing GSM technology, as well as at the stage of its implementation, all requirements from the controlling government were taken into account. authorities to the level of protection. It is because of these requirements that in many countries around the world the sale and purchase of special equipment, such as powerful encryptors, crypto equipment, scramblers, as well as very secure technologies for public communications, are prohibited. But mobile operators themselves ensure the protection of their radio channels using signal encryption methods. Encryption uses very complex algorithms. Which cryptographic algorithm will be used for encryption is selected at the stage when a connection is established between the base station and the subscriber himself. The degree of probability of a leak of subscriber information from the operator’s equipment, as MTS employees assured journalists, is practically zero. Why to zero, we asked - and all because of the complexity and control of access to the operator’s facilities and equipment.
How can you “listen” to mobile phones?
There are only two methods of wiretapping subscribers - the active method and the passive method. When passively listening to a subscriber, you need to use very expensive equipment and have specially trained workers. If you have money (read - a lot of money), you can purchase special systems on the “black market”, using which you can listen to the conversations of any subscriber within a radius of up to 500 meters. Ask why you need to have a lot of money? The answer is simple - the price of one such set starts from several hundred thousand euros. What such a kit looks like can be seen in the next photo. There are many sites on the Internet where you can familiarize yourself with the description and operating principle of such kits and listening systems.

As the manufacturers of such listening systems convince, their systems can monitor GSM conversations in real time, because the operating principle of the equipment is based on access to the SIM card of the mobile subscriber, or directly to the database of the operator itself cellular communication. Although, if those listening to you do not have such access, they can listen to all your conversations with some delay. The amount of delay depends on the level of encryption of the communication channel that a particular operator uses. Such systems can also be mobile centers for listening and tracking the movement of objects.

The second method of wiretapping is active interference on the air with the authentication process and control protocols. For this purpose, special mobile complexes are used. Such mobile systems, which, in fact, are a pair of specially modified phones and a laptop, despite their external simplicity and small size, are also an expensive pleasure - their price varies from a couple of tens of thousands to several hundred thousand US dollars. And again, only highly qualified specialists in the field of communications can work on such equipment.

The attack on the subscriber is carried out according to the following principle: since the complex is mobile and is located at a close distance to the subscriber - up to 500 meters - it “intercepts” signals to establish a connection and transmit data, replacing the operator’s base station. In fact, the complex itself becomes an “intermediary bridge” between the nearest base station and the subscriber himself.

After “capturing” the desired mobile subscriber in this way, this complex can actually perform any control function over the intercepted channel: for example, connect the person being listened to with any number necessary for those listening, lower the encryption algorithm or even disable this encryption for a specific communication session, etc. .d.

What such a complex looks like can be seen in the photo below.


As experts shared, it is impossible to determine 100% that the subscriber’s phone is being tapped at this very moment. But, you can get indirect evidence that may indicate that such a possibility exists. In the recent past, some mobile models (namely push-button phones) had a special symbol-icon in the form of a lock in their functionality. If the lock was closed, then the signal is encrypted, and vice versa - if the lock is open... well, you understand everything yourself.

But in phones over the last 5-6 years there is no such function... It’s a pity. Although, for some smartphone models there are special applications that will signal the phone owner about the configuration of the settings used in the current communication session. One option is to notify the user about the mode in which his conversation is transmitted - using encryption algorithms or openly. Listed below are a few of these applications:

EAGLE Security
It is one of the most powerful applications for protecting your mobile phone from wiretapping. This program prevents any connections to false base stations. To determine the reliability of a station, a check of signatures and station identifiers is used. In addition, the program independently monitors and remembers the location of all base stations, and if it is detected that a base is moving around the city, or its signal disappears from time to time from its location - such a base is marked as false and suspicious and the application will notify the owner about this phone. Another one of useful functions programs - the ability to show which of the applications and programs installed on the phone have access to the video camera and microphone of your phone. There is also a function to disable (prohibit) access to any software you don’t need to the camera.
Darshak
This program differs from the previous one and its main function is to monitor any suspicious activity on the network, including the use of SMS, which can be sent without the permission of the phone owner. The application evaluates in real time how secure your network is, what encryption algorithm is being used at that moment, and much more.
Android IMSI-Catcher Detector
This application also helps protect your smartphone from any connections to pseudo-bases. The only disadvantage of this program is that you will not find it in Google Play and if you still want to install it, you will have to tinker with this procedure.
CatcherCatcher
The CatcherCatcher program, like its analogues above, is engaged in identifying false base stations that attackers (or special services?) use as intermediate “intermediary bridges” between the subscriber and the real base station.

And finally, experts also recommended using special applications to ensure the security of personal conversations and data, including encrypting your conversations. Similar analogues are the anonymous web browsers Orbot or Orweb, for example. There is also special programs that encrypt your telephone conversations, photographs and many already use secure messengers.

Many clients who bought and installed our programs and learned “a lot of interesting things” about their loved ones are starting to think about protecting their own phone! I want to say that there are several basic steps that I advise you to take to strengthen the security of your cell phone and prevent or make it as difficult as possible to install applications to control your phone.

Don't let go of your phone

Try never do not leave unattended your mobile phone. It only takes a professional 5 minutes to install a wiretapping program on your phone. Remember that most likely the person who takes possession of your phone will be the one you trust the most :-(!

Set a password or pattern

This is the easiest and most effective method protect your phone from spyware software. Incredibly, more than half of people do not use such a simple phone feature as password, and everyone uses the usual keypad lock the old fashioned way! Password protection is almost impossible to remove without obvious identifying signs. There are 2 main ways to remove your password or pattern:

Update your phone's firmware. Cydia, Root

If you suddenly found Cydia icons (on Apple devices– iPhone, iPad, etc.) or Superuser (on the Android platform), this means that the phone was

A program to detect wiretapping of your phone.
. A simple and reliable program for detecting the activity of GSM Monitoring System equipment designed for active and passive interception of voice and data of any modifications of GSM networks. Supports up to 4 GSM bands (850, 900, 1800, 1900), which makes it applicable anywhere in the world where there is a GSM network.

Detects activity following types spy equipment:

  • 1. Active GSM Interceptor with decoder A 5.x, which can intercept incoming and outgoing GSM calls and SMS with any type of encryption in real time. They work with moving and stationary objects and provide conversations and data in real time, analyze the received data, intercept IMSI/IMEI and selectively suppress GSM traffic in a given area
  • 2. 3G IMSI/IMEI/TMSI Catcher (captor), designed to influence the selected phone to force it to switch to GSM mode, so that data can be intercepted from such a phone by a passive interceptor.
  • 3. Blocker of selected cell phones (Cellular Firewall), for selective or mass suppression of GSM/UMTS targets. Created based on Active base station A cellular firewall allows authorized GSM/UMTS subscribers to use their phones as usual, receive calls, make calls, receive and send SMS, and so on, while unauthorized phones in the immediate vicinity of the system are deprived of cellular service.
  • 4. GSM IMSI/IMEI/TMSI Catcher (invader), which is designed to detect the presence of GSM phones in an area of ​​interest. The entire system is based on a laptop and a compact mini BTS and is an active system and thus it forces GSM phones in its vicinity to register to it.
  • and the like...

The program was developed with the advisory support of technical specialists mobile operators having a moral conviction about the right of each of us to privacy, a prohibition of any form of arbitrary interference in private life by the state and protection from such interference by third parties.

In the process of implementation:

  • 1. Choose between 2 SIM cards.

Pro version:

  • 1.2 Support for 2 SIM
  • 2. Auto-blocking (resetting) the connection of hardware interceptors to your phone.
  • 3. Analysis of “interceptors” statistics, what would you see, in what places, when and how often does your phone fall within the coverage area of ​​“interceptors”
  • 4. Identification of interceptors. (fortunately, usually, “spies” do not clear the simulated technical data of the interceptor, knowing that phone owners do not see the technical characteristics of the GSM connection and will not suspect wiretapping). This will allow you to determine: who listens to you and how often, whether “he” follows you around the city, whether “he” knows where you live and work, and so on. Or you accidentally fell into the range of interceptors. In the longer term
  • 5. Determination of wiretapping through an operator. A very difficult task to implement and without a 100% guarantee of definition accuracy. It will only be available in the paid PRO version.
  • 6. Identifying indiscriminate jammers GSM signal. These are often used by car thieves, who use a signal jammer to block the operation of a car GSM GPS location finder.
  • 7. NEW! 7. Detecting hacker virtual cells that steal your money from your phone!
  • 8. Notification about disabling conversation encryption.

Download GSM Spy Finder app for Android you can follow the link below

Developer: GALAN
Platform: Android 2.3 and higher
Interface language: Russian (RUS)
Status: Free
Root: Not needed