What is the difference between SUPI, SUCI and 5G-GUTI in 5G SA Networks?
January 28, 2025

Currently, I see some confusion regarding 5G identification and the purpose of each one, such as which network node generates them and the subscriber’s role. I summarized the 3 identifications in one page, and here is the summary: What is SUPI? The Subscription Permanent Identifier (SUPI) is stored within the SIM. The SUPI is the […]

What is an IMSI catcher?
January 22, 2025

The IMSI is a unique number assigned to every mobile subscriber, which is stored on the SIM card and used by mobile networks to identify and authenticate users. An IMSI Catcher is a device that pretends to be a commercial Base Station (BS), tracks devices and violates subscriber privacy. Criminals or hackers may use IMSI […]

SMS Home Routing Role in SS7 Security
January 16, 2025

Before discussing why we need an SMS Router, let’s understand the 1st figure when the mobile device sends SMS to another Mobile through the normal scenario without an SMS Router which means the communication is between SMSC and HLR.  The Normal Scenarios for Sending SMS:  The mobile sends the SMS to the SMSC. Since the […]

What is GT (Global Title)? Why Do We Need It?
January 12, 2025

Signalling System No. 7 (SS7) is an old signaling protocol, but all mobile network operators still use it to exchange information between nodes in the network nationally and internationally. Security and SS7 can’t come together, so I started explaining the definition of SS7 in a series that began with this video.  Once you finish the video, […]

What is IMSI Catcher?
March 24, 2024

Before starting to talk about IMSI Catcher, we need to understand what is the IMSI, its importance, and its structure. Based on this, we will discuss the IMSI catcher. So let’s GO 🙂  What is IMSI? IMSI, International Mobile Subscriber Identity, is a unique static identity allocated to each subscriber in a mobile wireless system. […]

What is a Multi-IMSI SIM?
August 26, 2023

At a conceptual level, the SIM identifies the subscriber to the network and enables this identity to be securely authenticated. When a device connects to a network, the SIM in the device sends the network its IMISI, and then it passes the network a key. On the network side, there is a list of IDs and a […]