Here we go...
This is what you suggested right Gstacker?
Well, your almost spot on the money if it is. The key is having the two phones (in the middle, mentioned as "answer phone" & "voice phone" in the above diagram). These two phones AREN'T connected by any other means but physically. No data is exchanged between the two 'over the air' meaning that the link between the two isn't obvious. Let me explain why and the pitfalls.
Now, for the purposes of this we will assume that NO phones are registered (or otherwise linked) to the owner. They are all registered in fictitious names.
Here is the diagram of how I believe the final setup should be, (yes Gstacker, its more a modified/refined version of what I took from your idea)
Now let me explain... This is going to sound very complicated but its nothing more than a few software mods, a few phones, an antenna and a couple of phone chargers.
Phone #1 & #2 = These are special phones which support END-TO-END encryption (good examples of this are QUASAR IV or CryptoPhone 500)
Phone #3 = This must be either a rooted phone running the Android OS or a jailbroken iPhone (cheap Android phones can be bought easily and would work fine)
You might ask why #1 & #2 need to be using encryption? The answer is kind of complicated but I'll do my best to explain. Firstly its just a hightened level of security, to be honest why wouldn't anyone want this. Secondly, if an IMSI catcher is deployed around the approximate location of Phone #3 (in hopes of finding the caller) it will be able to intercept Phone #2 and therefor trace the call to the location of Phone #1, with encryption in this scenario they can't produce the evidence that would be required to get a warrant but if they had the call data being transferred between #1 & #2 then they would have an undeniable link.
Encryption on the call between #1 & #2 means that the wiretap on the first base station only captures, that a call was placed from phone #1 to phone #2, the duration of the call and the location of the phones (will discuss this soon). The actual contents of the call are completely obfuscated.
You might ask why I seperated Upsteam Collection and an IMSI Catcher? Well, they do both capture data BEFORE it hits the base station (ie: AT&T) however they have seperate limitations and pose seperate threats. Upstream Collection monitors things from a remote location as it passes through the backbone of the internet. An IMSI catcher captures data which is being broadcast over the air, meaning it has to be deployed reasonably close to the phone but it also captures ALL things being broadcast over the air, so if you have two phones side by side it captures the data coming to both (along with all of your neighbourhood, etc) and this is what makes them different, an IMSI catcher is like a big net (that they then sift through with a fine comb to refine your details).
I think that kind of explains everything, all the details are in my head but I might be forgetting to write things or not making them clear.
The one thing I haven't explained is that brown star in the middle of Phone #2 & #3. Thats a vital piece of hardware which would need to be made. First, imagine it as a cradle for two phones to plug in to, it has to contain a charger for each phone with a lead to connect it to a powerpoint (so neither phone runs out of battery for extended periods of time). Secondly, we want this to contain a higher powered antenna (like
http://www.simplytech.eu/product_info.php?products_id=18) and be boosting the signal for both phones (#2 & #3).