SAMSUNG G600 SECURE STEALTH PHONE, ANTI INTERCEPTION, ANTI-TAP, AUTO IMEI CHANGE

Comes with SIM card, Charger & Stealth Instructions

Instruction 1
Instruction 2
Instruction 5
Instruction 6
Instruction 8
Instruction 9
Instruction 10
Instruction 11
Instruction 12

PLEASE READ DESCRIPTION CAREFULLY. THANK YOU.


This auction is for a Basic Version = IMEI change, A5 Tracer & Secure Text phone.


I will reduce costs for multiple purchases!!


I also have some US & European chargers. Please let me know if you would like one and I will do my best to accommodate you.


Good condition phone. Not new, Grade B, minor signs of wear & usage, nothing that would interfere with it's purpose.


Unlocked to all GSM networks (Quad Band), not '3' (as it's 3G which you wouldn't want anyway!).


Inform me of your choice of colours, Gun Metal (Lots), Purple (Lots)Gold&Black (A Few), Pink (REDUCTION IN PRICE FOR THESE!), or you will usually end up with Gun Metal grey as it is the most popular, I will do my best to accommodate you.


All the usual details & instructions shown below;


The Secure Texting (SMS) Program is an application for encrypting SMS messages. Encryption algorithm & hash function for generating keys from passwords is SHA-256. This is end-to-end encryption, meaning that Mobile providers cannot read your messages as they are never sent in the clear. It can ONLY be read by the recipient who has the right password.


Comes with Charger or USB charger cable. I may have an original box or two, first come, first served.

I could also set up auction for car charger & combine postage.


Any questions, do not hesitate to contact me.


I must send items to paypal verified address unless you specifically arrange otherwise, all items will be sent 'signed for', so please make sure you have control of the postal address you choose. Any postage payment over what it actually costs, will be refunded. Parcels will have no markings showing the ability of the phone. The phone will be shipped with it's own correct IMEI. In line with current Laws & ebay policies I do not condone the changing of this, and suggest you check within your own borders before altering any settings regarding the IMEI.


I have put International (Europe & USA) postage figure down. Please check if you live outside of these areas as postage may increase. But as stated before, any overpayment will be refunded.


International Buyers, please be aware that due to recent changes in legislation regarding the shipping of Lithium Ion batteries, most couriers do NOT transport lithium ion batteries, also MANY countries no longer allow them to be shipped unless brand new. As mine are not, you may need to buy a new battery from a local seller. Countries that do allow batteries to be sent, do not allow more than two phones per package. We can however, ship more than one package. Shipping rates have been adjusted accordingly. Contact me for more details.


I can also offer EXPEDITED shipping, but this does come at extra cost too. PLEASE inform me as soon as possible if you prefer this option.


I do accept cash paid into my bank, W.U., I'll even consider bitcoin. But if you are paying in any other method than PayPal, please let me know first.


The new version untraceable cell phone is made to protect calls against control via a provider or via different complexes that intercept GSM. 


The phone has the following functions:


- Function change IMEI

- Function A5 tracer

- Sms encryption software


Please Note: We do not in any way endorse changing the IMEI, this is a feature integrated beyond our control therefore, we ensure by default that the IMEI will always remain original unless specifically changed by the customer. We provide the phone only for the functionality of being alerted to third party interception. We will not be held responsible for any misuse.


On the screen of the device there is a lock icon that shows whether the encryption on or off is and also which algorithm the provider of the connection uses.


Function change IMEI Function Change IMEI is intended to protect calls against control via the provider of the connection. In some cases, this function can also protect you against different kinds of complexes, which can be active and passive. 


If your phone is controlled the following structures are used:


1. Your phone number (it is not broadcasted, but the provider does know it)

2. IMSI – the unique name of the SIM

3. IMEI – the unique name of the phone.


If you change the IMEI and the SIM all the  identification structures which you can be controlled with, will be changed. So that the provider does not know who he should control. If you change only the SIM or only the IMEI it will not have any result and you will still be controllable like you have not changed anything. If you are being controlled using a complex, the simultaneous change of the IMEI and the SIM will temporary stop control. Because all the identification structures, which are recorded in the selection list of the complex, were changed, the complex has to make extra efforts to get your new identification structures. In addition, often the complex cannot directly see that it has no control over your phone anymore.

It is better not just to turn off the device, but to remove the battery from the working device so that the complex cannot register that the phone was switched off. Active complexes may not work correctly, so they can be detected by additional features. For example, a test of the device with only changing of IMEI on one of the most functional and popular active complexes has shown that when the phone comes to the area which is covered by the complex, the phone seems to work normally, also the level of a signal is shown, but it is impossible to call from this phone, also the incoming calls cannot be received.

 


Function A5 tracer

This function is intended to protect the phone user against control over his conversations via active complexes which intercept GSM. Active complex is an equipment which emits basis stations and makes phones work not via real basis stations but via this equipment – a false basis station. A real basis station sees a false basis station as a regular phone.


A false basis station can:

1. Turn off the encryption

2. Reduce the level of the encryption3.      


Do not change the level of the encryption.  There are no other  means, except the ours, which can identify such stations. A complex which does not disable the encryption can be normally detected by an icon with an open lock that appears on the display, but such icon is not available in all devices. New devices from Nokia and Samsung do not have such icon, they are designed in this way so that the user could not see that he is being overheard. The most common complexes of today are the complexes which reduce the level of the encryption. They do it continuously or during the calculation of the session key, after that the encryption of the complex becomes the same as the encryption of the provider. Active complex which does not reduce a level of the encryption has a built-in processing mechanism



A5.1. Function
Formerly, half active complexes were popular, they turned the encryption of the controlled phone off.  Our device detects any active or half active complex with 100% certainty.  Regardless of a price and a producer. 


How does Active complex work:

To a building where a person which has to be overheard is being can come a car, an equipment can also be installed in the building. A normal phone works so that it chooses automatically a basis station with a strongest signal. The false station becomes this strongest basis station for a controlled phone. The phone sees it as a real basis station and begins to work with it.  A provider of the false station gets full control over your phone. He can not only listen to your calls and read your text - massages, he can also manage your phone. The capabilities of such complex to manage your phone depend on perfection of the complex. There are complexes which can turn on a microphone of the controlled phone at a distance. 



TMSI

The "Temporary Mobile Subscriber Identity" (TMSI) is the identity that is most commonly sent between the mobile and the network. TMSI is randomly assigned by the VLR to every mobile in the area, the moment it is switched on. The number is local to a location area, and so it has to be updated each time the mobile moves to a new geographical area.


The network can also change the TMSI of the mobile at any time. And it normally does so, in order to avoid the subscriber from being identified, and tracked by eavesdroppers on the radio interface. This makes it difficult to trace which mobile is which, except briefly, when the mobile is just switched on, or when the data in the mobile becomes invalid for one reason or another. At that point, the global "international mobile subscriber identity" (IMSI) must be sent to the network. This is a unique number that is associated with all GSM and UMTS network mobile phone users. The number is stored in the SIM card. The IMSI is sent as rarely as possible, to avoid it being identified and tracked.


A key use of the TMSI is in paging a mobile. "Paging" is the one-to-one communication between the mobile and the base station. The most important use of broadcast information is to set up channels for "paging". Every cellular system has a broadcast mechanism to distribute such information to a plurality of mobiles.


A5.0The icon shows that coding is disconnected. It can be, in a case if the operator basically does not use signal coding, or at present there is no activity of phone.


A5.1The icon shows that the operator has included coding А5.1. Coding joins only, when the device communicates with base station, for example conversation, sending SMS, an exit in the internet etc.


Please see Instruction 1 Image


Function of change IMEI

Function of change IMEI is intended for protection of conversations against the control through a communication statement. In certain cases this function protects and from various types of complexes, active and passive.


When your phone put on the control identifiers are for this purpose used:

  1. Your phone number (on air it is not transferred, but the operator knows it)
  2. IMSI — unique name SIM
  3. IMEI — unique name of phone

If you change IMEI and SIM which have bought anonymously or on other person, that all identifiers on which you can supervise vary. Therefore the operator does not know, whom it is necessary to put on the control.


If you have changed only SIM or only have changed IMEI is will give nothing, and you will continue to supervise, as though you changed nothing.


If you supervise interception complexes simultaneous change IMEI and SIM will allow you to leave for a while from the control. As all your identifiers have exchanged, which are put into the list of selection of a complex, and to the operator of such complex it is necessary to make additional efforts what to receive your new identifiers. Besides, the operator of a complex it is far not at once can understand that has lost the control over your phone. It will be better, if you switch off not regularly the device, and will take out the battery from working phone that the operator of a complex would not see phone deenergizing.


Active complexes of interception can work not correctly that can bring additional signs its detection.
For example, device testing only with function of change IMEI, on one of the most functional and the widespread, active complexes has shown that when phone gets to an operative range a complex outwardly he behaves usually, signal level in particular is visible. But to call from phone not probably and as on it do not take place entering calls.


For this purpose, what to make options of function IMEI, enter in Menu — Settings — Phone settings — Extra — enter the password — IMEI

Please see Instruction 2 Image


The menu of function of change IMEI of phone has 4 points:


Random always: 


In this mode IMEI of phone varies at each inquiry the operator. The inquiry can be during time inclusions of phone, sending SMS, a call or work in GPRS. IMEI phone will always vary, when it is requested by the operator. This mode is not recommended for constant use. If You do not change SIM, and IMEI varies constantly, those who supervises your phone will pay attention to it. They will see that you for each new call use new phone, and it looks suspiciously.


Random on first request: 


In this mode IMEI of phone varies only once after device inclusion. Further on all inquiries IMEI the operator, phone will give out in a network this IMEI. At new device IMEI inclusion again will change, and will remain to constants before new inclusion the device. This mode is recommended for constant use.


Please see Instruction 5 Image


User define: 


In this mode IMEI of phone the user sets. For this purpose it is necessary to go down joistik downwards and in a window custom IMEI and to bring any IMEI manually.


Stay Original



Function A5 tracer

Function is intended for protection of the user of phone against the control of its conversations through active Complexes of interception GSM.


The active complex of interception this equipment which emulates base station and forces phones to work not through the present base station, and through this equipment — false base station. The present base station considers false base station as usual phones.

The false base station can

  1. To switch off coding.
  2. To lower coding level.
  3. Not to change coding level.

Any other means, except our device to find out such complexes not probably.


The complex which absolutely switches off coding, can be found out, as a rule, only that on phone screen there is a badge — opened lock. But this badge is not in all devices. In new devices Nokia or Samsung it is not present, it is made specially, that the user would not see that to it listen through such complexes of interception.


The most widespread now are complexes of interception which lower coding level, or is constant, or for the period of calculation of a session key then coding becomes such, what it was at the operator.


Active complex which does not lower coding level, built in output agent А5.1 has. Function A5 tracer is not intended for detection of such complexes. For this purpose in the device there is function channels, about it will be told more low.

Earlier semiactive complexes which disconnected coding for supervised phone have been extended.


Our device from 100 % probability will find out ANY ACTIVE or semiactive complex. It is not dependent on its cost, and firm of the manufacturer.


As the active complex works:
To a building in which there is a person whom wish to listen, the car, or the equipment can approach is established in the building. Phone works so that automatically chooses base station, at which strongest signal. For controllable phone such strongest base station appears — false base station. Phone accepts it for present and starts To work with it. The operator of a complex receives a complete control over your phone. He can not only To listen to your conversations and to read SMS, but also to operate your phone. Complex possibilities On management of your phone depend on that, how much it is perfect.


There are complexes which can remote include phone microphone.


For this purpose, what to make options of function A5 tracer, enter in Menu — Settings — Phone settings — Extra — enter password — A5 tracer.


Please see Instruction 2 Image

2 points of the menu open:

  1. A5 profiles
  2. A5 change alert

Please see Instruction 8 Image


For work of function of protection against false base it is necessary to adjust profiles for each operator whom you Will use.


Please see Instruction 9 Image


Any of points Empty is for this purpose chosen and pressedOptions, and in the dropped out menu the second point — Create.


Please see Instruction 10 Image


Phone some times will call on number 1111. 


During each call the device will inform base station that it supports only defined level of coding also looks that the base station will answer. Thus, phone finds out, what algorithms codings are supported by the given operator, and what algorithm of coding is included at the operator by default.

In menu A5 profiles there is a line with a name of the operator. If to choose this line, and then options — edit, the window where we see what algorithms of coding will open the operator supports, the line A5.1 support or A5.2 support becomes accessible. We can choose manually any algorithm, if both of them are supported by the operator.

Algorithm А5.1 is the steadiest against breaking. А5.2 weaker algorithm also is cracked in a mode of real time. The asterisk on the right says to one of lines that the given algorithm codings is included at the operator by default.

Such operation should be made for all operators of cellular communication whom you will use. For this purpose it is necessary to insert into device SIM of the necessary operator and to open for it the profile. Profiles it is necessar to do adjustment in a place where you are assured that be not in a zone of work of false base station, for example, when eat in the car.


Please see Instruction 11 Image


Let's adjust signals with what phone will warn the owner about conversation listening through false base station. It is necessary to enter in A5 change alert and in the opened window to choose one from ways of the alarm system.


Please see Instruction 12 Image


No alert — there is no signal
Message — In the conversation beginning, not on long, on phone screen there is a message «Attention»
Audio & Vibra — the sound signal is distributed and vibration
Audio — the sound signal is distributed
Vibra — joins vibration
HandOff — conversation automatically breaks.


As function A5 tracer works:
If you have got to an operative range of false base station and accept or make a call, accept either send SMS, or leave in the internet — phone will include the way of the alarm system chosen by you. Having warned you that your phone is in a zone of work of false base station, and to you listen. If you insert into device SIM of other operator phone will automatically choose necessary profile from the list before created profiles.



Usage instructions


Place a SIM card into the G600 handset and run the A5 Tracer from the hidden menu :settings>11 security settings> 0 extra (after 9)> password 1234 . This allows you to create a home network profile for the SIM card you are using and places the network in an unbreakable A5-1 encryption. If the network characteristics change i.e. using a GSM interceptor or IMSI catcher, or any method to try and trick the SIM into changing to a breakable A5-2 encryption, the phone will detect this and alert the user via an alarm, vibration or display a screen message. No calls or SMS's can then be made. 


The handset will also randomly change the IMEI on each call, or you may specify an IMEI. A good way to confirm the handset does indeed actually change the IMEI and not just give the appearance of a different IMEI is to assign a known blocked or stolen IMEI to the handset. 


1. Insert any SIM card with a PIN2 and then go to Settings--->Security Settings-->and there you will see an Extra menu, after 9 you have 0 , extra menu. Enter your password code (1234 IS THE DEFAULT CODE) . For security purposes, if you insert a SIM card which does not use a PIN2 then the Extra menu will be hidden from view.


2. Go to A5 Tracer and assign the SIM card you will be using. Press A5 profiles and an empty list will appear. Press options-->Create and the handset will now automatically perform a series of random calls assigning your SIM network to one of the previously empty slots for encryption to A5-1.


3. Go to the IMEI menu where you can select if you wish to keep the handsets original IMEI, change the IMEI to a specific serial number, or choose to randomly change the IMEI on every call.


Please Note: We do not in any way endorse changing the IMEI, this is a feature integrated beyond our control therefore, we ensure by default that the IMEI will always remain original unless specifically changed by the customer. We provide the phone only for the functionality of being alerted to third party interception. We will not be held responsible for any misuse.


4. Go to A5 change alert menu and assign how you want to be alerted in the event of any 3rd party attempt to intercept your calls / SMS’s.


You will also notice a small coloured padlock icon on the main display of the handset which will show red. When you make or receive calls and SMS's, the padlock will turn to green. If it stays red or changes to red, the handset is being intercepted in which case you will be notified by your pre-selected alert notification and your calls will not connect and SMS's will not be sent. If you see a yellow padlock it means the SIM network is not secured, for example China do not permit the use of encryption within their networks.


I do also have an UPGRADED VERSION (7 options = IMEI Change, A5 Tracer, UnPing, Channel Lock, Show TMSI, Clear Call Log, Recording) for an additional cost. If you are interested in the upgraded version, please contact me.


7 OPTIONS SPECIAL FEATURES:

1. IMEI - IMEI changeable (modifiable automatic / manual) 

2. A5 tracer - (proximity alert and alert interceptor to intercept GSM phone conversation) 

3. UnPing - Kc alert location and extraction; 

4. Channel lock - lock channel (ARFCN) 

5. Show TMSI - Display TMSI; 

6. Clear call log - Call History Deleting;
7. Recording - Audio recording of telephone conversations

Created with GarageSale


 _gsrx_vers_795 (GS 7.0.7 (795))