Information on SIM card generally includes:
-Call Register Information
-Technical Network Information
GSM Network Structure Overview
What security protocols are being used?
A3 - Authentication mechanism for GSM Security
A5/1 - Stream Cipher for voice privacy
A5/2 - Weakest stream cipher for voice privacy
A5/3 - Provides confidentiality and integrity for mobile communications
So, are our call secure over GSM network? The answer is "no".
Scanning and decoding the GSM traffic using Nokia 3310 toolkit + Universal Radio Peripheral.
MBUS data cable
Overall view of GSM Cellphone System Breach