Does old SIM-cards have the same security as new one?

As I am using an old (10-15 years) SIM-card, I was asking myself if the hardware and software on the sim-card is equivalent to the newer sim-cards.

Are the old-sim-cards (10-15years) the same as the new ones ?

Are usim-cards already in use ?

As Example the encryption, how to know if my card supports A5/1 or A5/3 ?


A stream cipher known as the A5 algorithm.


A5/0: no encryption.


A5/1: original A5 algorithm used in Europe.


A5/2: weaker encryption algorithm created for export, in
removal.


A5/3: strong encryption algorithm created as part of the 3rd
Generation Partnership Project (3GPP)

Does some People (scriptkiddies-criminals…) be able to these Threats ?

Threats to SIM Data

• GSM SIMs can be cloned because authentication
protocol has flaw

–COMP128 is popular algorithm and a published standard

• Leaks information at every connect attempt.

• Chosen-plaintext attack

–Approximately 150,000 queries required takes about 8-11
hours with a suitable smart card reader

From here

Continue reading Does old SIM-cards have the same security as new one?

A Field Guide to the North American Communications Tower

The need for clear and reliable communication has driven technology forward for centuries. The longer communication’s reach, the smaller the world becomes. When it comes to cell phones, seamless network coverage and low power draw are the ideals that continually spawn R&D and the eventual deployment of new equipment.

Almost all of us carry a cell phone these days. It takes a lot of infrastructure to support them, whether or not we use them as phones. The most recognizable part of that infrastructure is the communications tower. But what do you know about them?

What Is a Communications Tower?

Communication …read more

Continue reading A Field Guide to the North American Communications Tower