Print
Discovery Telecom
Official distributor of
GOIP, Dinstar, Portech, Openvox, DTT
Tel./Fax: +44 20 37691919
E-mail: info@madcom.uk

Untraceable Phone with outgoing number & voice substitution (UTP)

Untraceable Phone (UTP)
Price 2132 $
Other currency 1999 ˆ

Main characteristics
 
Vendor Kripti
Category Secure communication
Standart 2G/900/1800/850/1900 - Bluetooth™
Battery Li-ion, 960 mAh
Max. hold time 385 h
Max. working time 9.6 h
Display TFT, 262.14 thousands of colors
SMS(MMS) Encrypted
Q'ty of channels 2
IMEI changing Automatic or Manual
Dimensions, HWD 50x106x17 mm
Weight 0.112 kg
Shipment Worldwide

The main functions and characteristics

Untraceable phone (UTP) to protect against service provider monitoring, as well as active and semi-active GSM interception and IMSI catchers.

The only solution of its kind in the world

red1.jpg Number replacement service with an unlimited "whole world" tariff. Linked to the Phone, not to the SIM card NEW 
red1.jpg Voice substitution service. Several types of voices for the caller to choose from NEW 
red1.jpg Ability to operate as a standard mobile phone
red1.jpg Firmware modification that enables the phone to become untraceable
red1.jpg Set of built-in commands for modifying and viewing interception related parameters
red1.jpg Phone interception alerts
red1.jpg Automatic or Manual phone IMEI (International Mobile Equipment Identity) change
red1.jpg CrypToGo application for end-to-end encrypted SMS communication
red1.jpg Ability to remove SMS after sending on any remote subscriber's phone
red1.jpg Mechanical Microphone mute when folded
red1.jpg The telephone supports 2 SIM cards. All functions are available for both SIM cards and have independent settings.

Our UTP with 100% probability find any active or semi-active system, as well as an IMSI catcher. Regardless of its value and the manufacturer.

The UTP phone Samsung has features:

IMEI                 - automatic change of IMEI, protection against control via a service provider;
LAC tracking    - creation of a profile for a certain location that prevents catching your phone;
Weak A5         - warning of decreased cryptographic protection with respect to A5.1;
Call ping         - detection of soundless calls;
SMS ping         - detection of all types of hidden SMS & prohibition all types SMS that can harm the phone;
Channels lock - phone operation with the use of remote base stations;
Alerts         - choice of signals for events;
Show TIMSI - display of TIMSI on the telephone screen;
Clear call log - deletion of information about calls from the telephone memory;
One channel - detection of presence of one channel in the network and display of the channel number;
Fake SMS         - detection of SMS with a fake number;
Check C2         - detection of active complexes and catchers by C2 scanning of base stations;
Recording - automatic call recording;
Reset settings - reset to recommended settings;
Information: - display of the software version on the screen.

If the phone detects one of enabled events, a sound alarm and/or a vibration signal is generated depending on the settings, the screen displays a message about the detected event and the SIM card associated with the detected event, the event is recorded in the log.txt file.

The phone has no give-away signs that might have given away presence of the phone special functions. If you input a standard sequence of digits*#06#, the phone’s own IMEI will be displayed, the same as on the label under the battery. You can look up the IMEI, which has been actually sent to the service provider, with the use of a different combination of digits. You can access a special menu with settings of extra functions only by inputting a special sequence of digits and a password.
This has been done for a specific purpose, so that no one can understand that it is not a common phone. Because such knowledge can seriously help those who want to organize control of a subscriber with such a phone.

The only thing in appearance that gives away this phone is an icon on the screen that is intended for visual control of the signal encryption level.