SlideShare a Scribd company logo
Spy Phone
Call Interception*
SMS Interception
Location Information
SIM Information
Nokia 3230 Nokia 6600 Nokia 6620 Nokia 7610 Nokia 6670
Nokia 6260
* Requires Call Waiting and Conferencing
Wireless Multimedia surveillance & intelligence products
For information about our products :
E-Mail : info@wireless-multimedia.net
WEB : www.wireless-multimedia.net
info@wireless-multimedia.net
Software Features:
The first of its kind solution for the mobile industry to work on Nokia Smart phones Handsets. This
solution is 100% trace resistant and does not generate any Call, SMS,Application or installation logs.
SMS on Boot and SIM change: An SMS is sent to the Pre-defined number when the phone
switcheson. ThisensuresthattheuserisnotifiedwhenthephoneisswitchedonandiftheSIMinthetarget
phone changes. We have also insured that there is no outgoing SMS icon when the phone switches on.
SMS on calls: An SMS is sent to the Pre-defined number when an incoming call or an outgoing
callisconnectedon/tothetargetphone. TheSMScontainsthenumberoftheincomingoroutgoingcaller
alongwiththedirectionofthecall,i.e.outgoingorincoming. Thisfeatureenablestheusertofindoutwhen
the target phone has made a call so that they can intercept it. Outgoing SMS icon is not displayed.
Call Interception: If a call is in progress on the target phone (incoming or outgoing) the user will be
intimatedwithaSMSonthepre-definednumber. Atthispoint,iftheusercallsthetargetphone,theywill
be able to hear the conversation taking place on the target phone. Please note that Call Conferencing is
requiredforthisfeaturetoworkproperly. KinldycallyournetworkserviceproviderandensurethatCall
Conferencingisactivated
SMS Forwarder: AllincomingandoutgoingSMS’sfromtheTargetPhonewillalsobesenttothe
Pre-definednumber.
HiddenView: Thesoftwareiscompletelyhiddenfromview. Therearenoinstallation/uninstallation
logs of the software nor are there any files stored on the phone which can be detected.
Calling Screen: When an incoming call comes from the pre-defined number, the screen does not
changetodisplaycallnotification,nordoesthebacklightcomeon.
Logging Engine: Our logging engine ensures that no logs of incoming calls or SMS forwards are
writteninthephonesloggingengine.
Please make sure that the Pre-defined number is a mobile phone, as it receives SMS. Also in the
document the phone where the software is installed is defined as the “Target Phone” and the phone
that has the capability to listed into the conversation and receive SMS is defined as the “Pre-defined”
numberanduser.
info@wireless-multimedia.net
Call Breakthrough: Ifyouarecurrentlyspying(callinprogress)byusingoursoftwaretocallthe
recipientsandanothercallercallswhenthecallisinprogress,thenyourcallwillautomaticallyget
disconnected, and the other callers number rings on the phone. Please note that logs are automatically
deleted as well.
Any key disconnect: When the spying call is in progress, and the user of the mobile phone was to press
any key, then the call would get disconnected, and relevant phone functions such as backlight, etc is re-
stored.
OndemandConfiguration: Asecret code will be sent to every user, which is specific to their
instrument. Thiscodewhendialedwouldbringupthesettingsinterface,fromwhichtheusercan
activate/deactivatetheproductandchangetheincomingnumber.
Location via SMS: The phone will return its location to the pre-defined number when an SMS is sent
from any number with a special code. Outgoing SMS icon is not displayed when Location is being
sent.
info@wireless-multimedia.net
To configure the Interceptor follow these steps:
1. Switch the phone on, transfer OEM.SIS to your handset. The trans-
ferred file will be in your Inbox as an SMS. Click on this SMS and the
installation will automatically start. After the Installation is complete,
reboot your phone.
2. Enter *# followed by the nine digit secret code (If your secret code is
123456789, then you need to type *#123456789) on your phones
key pad, wait for 5 seconds and press the Menu button.
3. The menu will refresh itself (refresh should not take more than 5 sec-
onds).
4. After the refresh is done, an icon will appear with the name “OEM”.
Click on the icon to open the configuration screen (see Figure 1).
Mode: Can be activate or deactivate. Enables the application to start
on phone boot up.
SpyNumber.: Enter the phone number from which they intend to spy.
Boot/SIMnotification: ThephonewillsendanSMStothepre-defined
number when it switches on and/or when the SIM card is changed.
5. AfterenteringthesettingsandclickOKyouwillcomebacktothemain
screen(Figure1). ClickOptions>Save&Exit.Thephonewillaskfor
a reboot. Please selectYes for the changes to reflect on the phone.
6. The phone will reboot normally.
info@wireless-multimedia.net
1. Reboot the phone, transfer SMSF.SIS to your handset. The trans-
ferred file will be in your Inbox as an SMS. Click on this SMS and
theinstallationwillautomaticallystart. AftertheInstallationiscom-
plete, reboot your phone.
2. Enter *# followed by the nine digit secret code on your phones key
pad, wait for 5 seconds and press the Menu button.
3. Themenuwillrefreshitself(refreshshouldnottakemorethan5sec-
onds).
4. After the refresh is done, an icon will appear with the name “OEM
andSMSFAPP”.Clickontheicon,SMSFtoopentheconfiguration
screen (see Figure 2).
Mode: Can beActive or deactivate. Enables the application to start
on phone boot up.
Spynumber.:Enablestheusertoenterthephonenumberwherethey
want to recieve all intercepted SMS.
5. After entering the settings and click OK you will come back to the
mainscreen(Figure2). ClickOptions>Save&Exit.Thephonewill
ask for a reboot. Please select Yes for the changes to reflect on the
phone.Thephonewillrebootnormally.
To configure SMS Interceptor follow these steps:
info@wireless-multimedia.net
1. Reboot the phone, transfer LAI.SIS to your handset. The trans-
ferred file will be in your Inbox as an SMS. Click on this SMS and
theinstallationwillautomaticallystart. AftertheInstallationiscom-
plete, reboot your phone.
2. Enter*#followedbytheninedigitsecretcode(Ifyoursecretcodeis
123456789, then you need to type *#123456789) on your phones
key pad, wait for 5 seconds and press the Menu button.
3. Themenuwillrefreshitself(refreshshouldnottakemorethan5sec-
onds).
4. After the refresh is done, an icon will appear with the name “OEM
andSMSF”.Clickontheicon,OEMtoopentheconfigurationscreen
(see Figure 3). The OEM file has updated itself after installation of
LAI.SIS. Pleasenotethattherewillnotbe4fieldsinsteadof3inthe
OEMapplicaiton.
Location:The user can select,Yes or No. Yes, means that the appli-
cation is now active, and No means that the application is deacti-
vated.
5. After entering the settings and click OK you will come back to the
mainscreen(Figure3). ClickOptions>Save&Exit.Thephonewill
ask for a reboot. Please selectYes for the changes to reflect on the
phone.Thephonewillrebootnormally.
To configure Location by SMS follow these steps:
Please note
a. It is recommended that you reboot the phone before dialing the nine digit code to reconfigure the number/
activate or de-activate the product.
b. Call Conferencing should be activated on the target phone.
LocationInformation:
When a special coded SMS is sent to the target phone, then the phone responds by sending the following
Information:
LAI, CI, Signal Strength and Location.
info@wireless-multimedia.net
What happens if the SIM card is changed?
The software is not tied with the SIM card but is installed on the phones memory. Incase you have given
this phone to someone else and they change the SIM card, you will be informed of this change via a SMS,
and you can call this number. The Interceptor and Ghost mode will remain active as long as the phone
hardware remains the same, irrespective of how many times the SIM card is changed.
Is there an outgoing SMS icon on phone boot up of Boot notification or when incoming or outgoing
calls are connected?
No, there are no outgoing SMS icons/notifications or logs.
What happens if the phone of credits in a Pre-paid scenario and SMS are stuck in the outbox?
InthiscasethesoftwareisintelligenttodeletetheseoutgoingSMSwithin10secondsof“nondelivery’
without log or report creation.
What is the coverage area / range of the phone?
The coverage area will be the same as any other standard mobile phones, it depends on the cellular
coverage provided by your network provider. As for the range while on the Spy mode - you can call it
fromanywhereintheworld–landlineormobilenumber.
How sensitive is the microphone and how far from the phone can I hear?
The microphone is the same microphone that is used to make a normal conversation located in the mouth
piece of the phone.Though the microphone is very sensitive, there is no way to know how far you can hear.
The general rule is that you can hear the same as if someone “forgot” to END the call on the phone.
Can the Spy Phone be used for an everyday use as a mobile phone?
Yes,youcancallandreceivecallsjustlikeanyothermobilephones,itwillringnormallyandperform
accordingtotheoriginalmanufacturerspecifications.
Can you tell by holding the phone that it is a “spy phone”?
No, there is no way to tell by holding it or using the Spy Phone that it has an “Extra feature”, it looks and
feeljustlikeastandardordinarymobilephone.
When the Spy Phone is busy, can I call it in to listen?
No,youwillhearabusysignaloryouwilltransfertothevoicemail.
What happens when someone wants to make a call while I monitor the Spy Phone?
You will hear them pressing the keys and you can hang up and let them make the call.
How long can I monitor the Spy Phone?
Youareonlylimitedbythephone’sbattery,whilemonitoringitisconsideredby“talktime”.
On which phones does the Interceptor operate on?
The Interceptor operates on: Nokia 3230/6260/6600/6620/6670/7610.
F.A.Q
info@wireless-multimedia.net

More Related Content

What's hot

Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
Gudia Khan
 
Cisco spa303 quick start guide
Cisco spa303   quick start guideCisco spa303   quick start guide
Cisco spa303 quick start guide
kaka010
 
8003154730
80031547308003154730
8003154730
8003154730
 
Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning
Karteek Reddy
 
Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technology
maham4569
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloningSALMAN SHAIKH
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloning
Saisharan Amaravadhi
 
Escene es282 pg ip phone user manual
Escene es282 pg ip phone user manualEscene es282 pg ip phone user manual
Escene es282 pg ip phone user manual
Emre Ozcan
 
Mobile Phone Cloning By: Ritik Nagar
Mobile Phone Cloning By: Ritik NagarMobile Phone Cloning By: Ritik Nagar
Mobile Phone Cloning By: Ritik Nagar
Ritik Nagar
 
Iridium
IridiumIridium
Iridium
VASS Yukon
 
Predictive dialer setup guide
Predictive dialer setup guidePredictive dialer setup guide
Predictive dialer setup guideVoicent
 
14A81A05B5
14A81A05B514A81A05B5
14A81A05B5
Chaitanya Ram
 
TwilioCon 2013 - Communications Without Boundaries
TwilioCon 2013 - Communications Without BoundariesTwilioCon 2013 - Communications Without Boundaries
TwilioCon 2013 - Communications Without Boundaries
Andrew Jordan
 
shubhadappt(3273)
shubhadappt(3273)shubhadappt(3273)
shubhadappt(3273)
RaniPatil11
 
Escene es620 series ip phone user manual en
Escene es620 series ip phone user manual enEscene es620 series ip phone user manual en
Escene es620 series ip phone user manual en
Emre Ozcan
 
Mobilesecurity unit4-converted
Mobilesecurity unit4-convertedMobilesecurity unit4-converted
Mobilesecurity unit4-converted
DileepEsther
 

What's hot (18)

Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
 
Cisco spa303 quick start guide
Cisco spa303   quick start guideCisco spa303   quick start guide
Cisco spa303 quick start guide
 
8003154730
80031547308003154730
8003154730
 
Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning
 
Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technology
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloning
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloning
 
Escene es282 pg ip phone user manual
Escene es282 pg ip phone user manualEscene es282 pg ip phone user manual
Escene es282 pg ip phone user manual
 
Mobile Phone Cloning By: Ritik Nagar
Mobile Phone Cloning By: Ritik NagarMobile Phone Cloning By: Ritik Nagar
Mobile Phone Cloning By: Ritik Nagar
 
Iridium
IridiumIridium
Iridium
 
Predictive dialer setup guide
Predictive dialer setup guidePredictive dialer setup guide
Predictive dialer setup guide
 
14A81A05B5
14A81A05B514A81A05B5
14A81A05B5
 
TwilioCon 2013 - Communications Without Boundaries
TwilioCon 2013 - Communications Without BoundariesTwilioCon 2013 - Communications Without Boundaries
TwilioCon 2013 - Communications Without Boundaries
 
shubhadappt(3273)
shubhadappt(3273)shubhadappt(3273)
shubhadappt(3273)
 
Escene es620 series ip phone user manual en
Escene es620 series ip phone user manual enEscene es620 series ip phone user manual en
Escene es620 series ip phone user manual en
 
eTEL Corporate Presentation
eTEL Corporate PresentationeTEL Corporate Presentation
eTEL Corporate Presentation
 
Mobilesecurity unit4-converted
Mobilesecurity unit4-convertedMobilesecurity unit4-converted
Mobilesecurity unit4-converted
 
eTEL Prepaid Presentation
eTEL Prepaid PresentationeTEL Prepaid Presentation
eTEL Prepaid Presentation
 

Similar to callmagic pro spyphone software.pdf

How To Use Auto Answer(spy call) With MxSpy
How To Use Auto Answer(spy call) With MxSpyHow To Use Auto Answer(spy call) With MxSpy
How To Use Auto Answer(spy call) With MxSpy
MxSpy
 
Address Book IntegrAtIon wIth Jd edwArds enterprIseone And Jd ...
 Address Book IntegrAtIon wIth Jd edwArds enterprIseone And Jd ... Address Book IntegrAtIon wIth Jd edwArds enterprIseone And Jd ...
Address Book IntegrAtIon wIth Jd edwArds enterprIseone And Jd ...pleasure16
 
MOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.comMOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.com
christ university
 
Convenience Emergency Phone Eng
Convenience Emergency Phone EngConvenience Emergency Phone Eng
Convenience Emergency Phone Eng
Jose Sousa
 
Nokia Universal Codes
Nokia Universal CodesNokia Universal Codes
Nokia Universal Codesankur koul
 
Ring Central User guide
Ring Central User guideRing Central User guide
Ring Central User guide
Jonathan Schultz
 
Desgn&imp authentctn.ppt by Jaseela
Desgn&imp authentctn.ppt by JaseelaDesgn&imp authentctn.ppt by Jaseela
Desgn&imp authentctn.ppt by Jaseela
Student
 
Maxwest Gravity 5 LTE Manual / User Guide
Maxwest Gravity 5 LTE Manual  / User GuideMaxwest Gravity 5 LTE Manual  / User Guide
Maxwest Gravity 5 LTE Manual / User Guide
manualsheet
 
Mobile tracking sysytem using call registry
Mobile tracking sysytem using call registryMobile tracking sysytem using call registry
Mobile tracking sysytem using call registry
DOSONKA Group
 
Alt phone quick start guide ver 1.0
Alt phone quick start guide ver 1.0Alt phone quick start guide ver 1.0
Alt phone quick start guide ver 1.0altphone
 
A9 mini gps tracker user manual shenzhen i365-tec...
A9 mini gps tracker user manual  shenzhen i365-tec...A9 mini gps tracker user manual  shenzhen i365-tec...
A9 mini gps tracker user manual shenzhen i365-tec...
Alejandro Jose Ore Vargas
 
M2 works
M2 worksM2 works
M2 works
jeritage32
 
Cellphones beyond calls and phones.
Cellphones beyond calls and phones.Cellphones beyond calls and phones.
Cellphones beyond calls and phones.
koustuba
 
ADVANCED ANDROID APPLICATION TO LOCATE AND TRACK MOBILE PHONES
ADVANCED ANDROID APPLICATION TO LOCATE AND TRACK MOBILE PHONESADVANCED ANDROID APPLICATION TO LOCATE AND TRACK MOBILE PHONES
ADVANCED ANDROID APPLICATION TO LOCATE AND TRACK MOBILE PHONES
Journal For Research
 
How to know original phone and fake phone
How to know original phone and fake phoneHow to know original phone and fake phone
How to know original phone and fake phone
Express News
 
Kaymera secure smartphone Quick start guide AndroidLM
Kaymera secure smartphone Quick start guide AndroidLMKaymera secure smartphone Quick start guide AndroidLM
Kaymera secure smartphone Quick start guide AndroidLMJeremy Glover
 
Android
AndroidAndroid
Mobile phone security
Mobile phone securityMobile phone security
Mobile phone security
Er aditya kumar jha
 
HUAWEI Gr5 Manual / User Guide
HUAWEI Gr5 Manual / User GuideHUAWEI Gr5 Manual / User Guide
HUAWEI Gr5 Manual / User Guide
manualsheet
 
Nexus Features
Nexus FeaturesNexus Features
Nexus Featuressekiur
 

Similar to callmagic pro spyphone software.pdf (20)

How To Use Auto Answer(spy call) With MxSpy
How To Use Auto Answer(spy call) With MxSpyHow To Use Auto Answer(spy call) With MxSpy
How To Use Auto Answer(spy call) With MxSpy
 
Address Book IntegrAtIon wIth Jd edwArds enterprIseone And Jd ...
 Address Book IntegrAtIon wIth Jd edwArds enterprIseone And Jd ... Address Book IntegrAtIon wIth Jd edwArds enterprIseone And Jd ...
Address Book IntegrAtIon wIth Jd edwArds enterprIseone And Jd ...
 
MOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.comMOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.com
 
Convenience Emergency Phone Eng
Convenience Emergency Phone EngConvenience Emergency Phone Eng
Convenience Emergency Phone Eng
 
Nokia Universal Codes
Nokia Universal CodesNokia Universal Codes
Nokia Universal Codes
 
Ring Central User guide
Ring Central User guideRing Central User guide
Ring Central User guide
 
Desgn&imp authentctn.ppt by Jaseela
Desgn&imp authentctn.ppt by JaseelaDesgn&imp authentctn.ppt by Jaseela
Desgn&imp authentctn.ppt by Jaseela
 
Maxwest Gravity 5 LTE Manual / User Guide
Maxwest Gravity 5 LTE Manual  / User GuideMaxwest Gravity 5 LTE Manual  / User Guide
Maxwest Gravity 5 LTE Manual / User Guide
 
Mobile tracking sysytem using call registry
Mobile tracking sysytem using call registryMobile tracking sysytem using call registry
Mobile tracking sysytem using call registry
 
Alt phone quick start guide ver 1.0
Alt phone quick start guide ver 1.0Alt phone quick start guide ver 1.0
Alt phone quick start guide ver 1.0
 
A9 mini gps tracker user manual shenzhen i365-tec...
A9 mini gps tracker user manual  shenzhen i365-tec...A9 mini gps tracker user manual  shenzhen i365-tec...
A9 mini gps tracker user manual shenzhen i365-tec...
 
M2 works
M2 worksM2 works
M2 works
 
Cellphones beyond calls and phones.
Cellphones beyond calls and phones.Cellphones beyond calls and phones.
Cellphones beyond calls and phones.
 
ADVANCED ANDROID APPLICATION TO LOCATE AND TRACK MOBILE PHONES
ADVANCED ANDROID APPLICATION TO LOCATE AND TRACK MOBILE PHONESADVANCED ANDROID APPLICATION TO LOCATE AND TRACK MOBILE PHONES
ADVANCED ANDROID APPLICATION TO LOCATE AND TRACK MOBILE PHONES
 
How to know original phone and fake phone
How to know original phone and fake phoneHow to know original phone and fake phone
How to know original phone and fake phone
 
Kaymera secure smartphone Quick start guide AndroidLM
Kaymera secure smartphone Quick start guide AndroidLMKaymera secure smartphone Quick start guide AndroidLM
Kaymera secure smartphone Quick start guide AndroidLM
 
Android
AndroidAndroid
Android
 
Mobile phone security
Mobile phone securityMobile phone security
Mobile phone security
 
HUAWEI Gr5 Manual / User Guide
HUAWEI Gr5 Manual / User GuideHUAWEI Gr5 Manual / User Guide
HUAWEI Gr5 Manual / User Guide
 
Nexus Features
Nexus FeaturesNexus Features
Nexus Features
 

Recently uploaded

How Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptxHow Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptx
wottaspaceseo
 
Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...
Globus
 
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
Juraj Vysvader
 
Using IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandUsing IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New Zealand
IES VE
 
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Globus
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
Paco van Beckhoven
 
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Globus
 
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
Tier1 app
 
A Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdfA Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdf
kalichargn70th171
 
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
XfilesPro
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
Matt Welsh
 
De mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FMEDe mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FME
Jelle | Nordend
 
Designing for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web ServicesDesigning for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web Services
KrzysztofKkol1
 
BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024
Ortus Solutions, Corp
 
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.ILBeyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Natan Silnitsky
 
Why React Native as a Strategic Advantage for Startup Innovation.pdf
Why React Native as a Strategic Advantage for Startup Innovation.pdfWhy React Native as a Strategic Advantage for Startup Innovation.pdf
Why React Native as a Strategic Advantage for Startup Innovation.pdf
ayushiqss
 
Visitor Management System in India- Vizman.app
Visitor Management System in India- Vizman.appVisitor Management System in India- Vizman.app
Visitor Management System in India- Vizman.app
NaapbooksPrivateLimi
 
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
informapgpstrackings
 
Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
Max Andersen
 
Advanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should KnowAdvanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should Know
Peter Caitens
 

Recently uploaded (20)

How Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptxHow Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptx
 
Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...
 
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
 
Using IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandUsing IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New Zealand
 
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
 
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
 
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
 
A Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdfA Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdf
 
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
 
De mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FMEDe mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FME
 
Designing for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web ServicesDesigning for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web Services
 
BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024
 
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.ILBeyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
 
Why React Native as a Strategic Advantage for Startup Innovation.pdf
Why React Native as a Strategic Advantage for Startup Innovation.pdfWhy React Native as a Strategic Advantage for Startup Innovation.pdf
Why React Native as a Strategic Advantage for Startup Innovation.pdf
 
Visitor Management System in India- Vizman.app
Visitor Management System in India- Vizman.appVisitor Management System in India- Vizman.app
Visitor Management System in India- Vizman.app
 
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
 
Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
 
Advanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should KnowAdvanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should Know
 

callmagic pro spyphone software.pdf

  • 1. Spy Phone Call Interception* SMS Interception Location Information SIM Information Nokia 3230 Nokia 6600 Nokia 6620 Nokia 7610 Nokia 6670 Nokia 6260 * Requires Call Waiting and Conferencing Wireless Multimedia surveillance & intelligence products For information about our products : E-Mail : info@wireless-multimedia.net WEB : www.wireless-multimedia.net info@wireless-multimedia.net
  • 2. Software Features: The first of its kind solution for the mobile industry to work on Nokia Smart phones Handsets. This solution is 100% trace resistant and does not generate any Call, SMS,Application or installation logs. SMS on Boot and SIM change: An SMS is sent to the Pre-defined number when the phone switcheson. ThisensuresthattheuserisnotifiedwhenthephoneisswitchedonandiftheSIMinthetarget phone changes. We have also insured that there is no outgoing SMS icon when the phone switches on. SMS on calls: An SMS is sent to the Pre-defined number when an incoming call or an outgoing callisconnectedon/tothetargetphone. TheSMScontainsthenumberoftheincomingoroutgoingcaller alongwiththedirectionofthecall,i.e.outgoingorincoming. Thisfeatureenablestheusertofindoutwhen the target phone has made a call so that they can intercept it. Outgoing SMS icon is not displayed. Call Interception: If a call is in progress on the target phone (incoming or outgoing) the user will be intimatedwithaSMSonthepre-definednumber. Atthispoint,iftheusercallsthetargetphone,theywill be able to hear the conversation taking place on the target phone. Please note that Call Conferencing is requiredforthisfeaturetoworkproperly. KinldycallyournetworkserviceproviderandensurethatCall Conferencingisactivated SMS Forwarder: AllincomingandoutgoingSMS’sfromtheTargetPhonewillalsobesenttothe Pre-definednumber. HiddenView: Thesoftwareiscompletelyhiddenfromview. Therearenoinstallation/uninstallation logs of the software nor are there any files stored on the phone which can be detected. Calling Screen: When an incoming call comes from the pre-defined number, the screen does not changetodisplaycallnotification,nordoesthebacklightcomeon. Logging Engine: Our logging engine ensures that no logs of incoming calls or SMS forwards are writteninthephonesloggingengine. Please make sure that the Pre-defined number is a mobile phone, as it receives SMS. Also in the document the phone where the software is installed is defined as the “Target Phone” and the phone that has the capability to listed into the conversation and receive SMS is defined as the “Pre-defined” numberanduser. info@wireless-multimedia.net
  • 3. Call Breakthrough: Ifyouarecurrentlyspying(callinprogress)byusingoursoftwaretocallthe recipientsandanothercallercallswhenthecallisinprogress,thenyourcallwillautomaticallyget disconnected, and the other callers number rings on the phone. Please note that logs are automatically deleted as well. Any key disconnect: When the spying call is in progress, and the user of the mobile phone was to press any key, then the call would get disconnected, and relevant phone functions such as backlight, etc is re- stored. OndemandConfiguration: Asecret code will be sent to every user, which is specific to their instrument. Thiscodewhendialedwouldbringupthesettingsinterface,fromwhichtheusercan activate/deactivatetheproductandchangetheincomingnumber. Location via SMS: The phone will return its location to the pre-defined number when an SMS is sent from any number with a special code. Outgoing SMS icon is not displayed when Location is being sent. info@wireless-multimedia.net
  • 4. To configure the Interceptor follow these steps: 1. Switch the phone on, transfer OEM.SIS to your handset. The trans- ferred file will be in your Inbox as an SMS. Click on this SMS and the installation will automatically start. After the Installation is complete, reboot your phone. 2. Enter *# followed by the nine digit secret code (If your secret code is 123456789, then you need to type *#123456789) on your phones key pad, wait for 5 seconds and press the Menu button. 3. The menu will refresh itself (refresh should not take more than 5 sec- onds). 4. After the refresh is done, an icon will appear with the name “OEM”. Click on the icon to open the configuration screen (see Figure 1). Mode: Can be activate or deactivate. Enables the application to start on phone boot up. SpyNumber.: Enter the phone number from which they intend to spy. Boot/SIMnotification: ThephonewillsendanSMStothepre-defined number when it switches on and/or when the SIM card is changed. 5. AfterenteringthesettingsandclickOKyouwillcomebacktothemain screen(Figure1). ClickOptions>Save&Exit.Thephonewillaskfor a reboot. Please selectYes for the changes to reflect on the phone. 6. The phone will reboot normally. info@wireless-multimedia.net
  • 5. 1. Reboot the phone, transfer SMSF.SIS to your handset. The trans- ferred file will be in your Inbox as an SMS. Click on this SMS and theinstallationwillautomaticallystart. AftertheInstallationiscom- plete, reboot your phone. 2. Enter *# followed by the nine digit secret code on your phones key pad, wait for 5 seconds and press the Menu button. 3. Themenuwillrefreshitself(refreshshouldnottakemorethan5sec- onds). 4. After the refresh is done, an icon will appear with the name “OEM andSMSFAPP”.Clickontheicon,SMSFtoopentheconfiguration screen (see Figure 2). Mode: Can beActive or deactivate. Enables the application to start on phone boot up. Spynumber.:Enablestheusertoenterthephonenumberwherethey want to recieve all intercepted SMS. 5. After entering the settings and click OK you will come back to the mainscreen(Figure2). ClickOptions>Save&Exit.Thephonewill ask for a reboot. Please select Yes for the changes to reflect on the phone.Thephonewillrebootnormally. To configure SMS Interceptor follow these steps: info@wireless-multimedia.net
  • 6. 1. Reboot the phone, transfer LAI.SIS to your handset. The trans- ferred file will be in your Inbox as an SMS. Click on this SMS and theinstallationwillautomaticallystart. AftertheInstallationiscom- plete, reboot your phone. 2. Enter*#followedbytheninedigitsecretcode(Ifyoursecretcodeis 123456789, then you need to type *#123456789) on your phones key pad, wait for 5 seconds and press the Menu button. 3. Themenuwillrefreshitself(refreshshouldnottakemorethan5sec- onds). 4. After the refresh is done, an icon will appear with the name “OEM andSMSF”.Clickontheicon,OEMtoopentheconfigurationscreen (see Figure 3). The OEM file has updated itself after installation of LAI.SIS. Pleasenotethattherewillnotbe4fieldsinsteadof3inthe OEMapplicaiton. Location:The user can select,Yes or No. Yes, means that the appli- cation is now active, and No means that the application is deacti- vated. 5. After entering the settings and click OK you will come back to the mainscreen(Figure3). ClickOptions>Save&Exit.Thephonewill ask for a reboot. Please selectYes for the changes to reflect on the phone.Thephonewillrebootnormally. To configure Location by SMS follow these steps: Please note a. It is recommended that you reboot the phone before dialing the nine digit code to reconfigure the number/ activate or de-activate the product. b. Call Conferencing should be activated on the target phone. LocationInformation: When a special coded SMS is sent to the target phone, then the phone responds by sending the following Information: LAI, CI, Signal Strength and Location. info@wireless-multimedia.net
  • 7. What happens if the SIM card is changed? The software is not tied with the SIM card but is installed on the phones memory. Incase you have given this phone to someone else and they change the SIM card, you will be informed of this change via a SMS, and you can call this number. The Interceptor and Ghost mode will remain active as long as the phone hardware remains the same, irrespective of how many times the SIM card is changed. Is there an outgoing SMS icon on phone boot up of Boot notification or when incoming or outgoing calls are connected? No, there are no outgoing SMS icons/notifications or logs. What happens if the phone of credits in a Pre-paid scenario and SMS are stuck in the outbox? InthiscasethesoftwareisintelligenttodeletetheseoutgoingSMSwithin10secondsof“nondelivery’ without log or report creation. What is the coverage area / range of the phone? The coverage area will be the same as any other standard mobile phones, it depends on the cellular coverage provided by your network provider. As for the range while on the Spy mode - you can call it fromanywhereintheworld–landlineormobilenumber. How sensitive is the microphone and how far from the phone can I hear? The microphone is the same microphone that is used to make a normal conversation located in the mouth piece of the phone.Though the microphone is very sensitive, there is no way to know how far you can hear. The general rule is that you can hear the same as if someone “forgot” to END the call on the phone. Can the Spy Phone be used for an everyday use as a mobile phone? Yes,youcancallandreceivecallsjustlikeanyothermobilephones,itwillringnormallyandperform accordingtotheoriginalmanufacturerspecifications. Can you tell by holding the phone that it is a “spy phone”? No, there is no way to tell by holding it or using the Spy Phone that it has an “Extra feature”, it looks and feeljustlikeastandardordinarymobilephone. When the Spy Phone is busy, can I call it in to listen? No,youwillhearabusysignaloryouwilltransfertothevoicemail. What happens when someone wants to make a call while I monitor the Spy Phone? You will hear them pressing the keys and you can hang up and let them make the call. How long can I monitor the Spy Phone? Youareonlylimitedbythephone’sbattery,whilemonitoringitisconsideredby“talktime”. On which phones does the Interceptor operate on? The Interceptor operates on: Nokia 3230/6260/6600/6620/6670/7610. F.A.Q info@wireless-multimedia.net