Did 5G kill the IMSI catcher?

5G SA, SUCI, and device/SIM requirements

  • Several comments note iPhones won’t join private 5G SA networks without SUCI enabled; this implies SUCI is treated as a de‑facto requirement for SA, at least in Apple’s ecosystem.
  • US examples show 5G SA SIMs/eSIMs with SUCI provisioned from the factory; older SIMs generally cannot be retrofitted unless operators reprogram specific SIM service fields and ECC capabilities.
  • There is disagreement on handover semantics: some view 5G SA vs NSA/LTE transitions as full re‑attachments closer to roaming, others emphasize that practical session continuity exists.

Disabling legacy radio technologies

  • Users ask if SIMs can forbid specific RATs (2G/3G/4G). Replies say this is mostly a baseband/OS setting, not a SIM one, though SIMs have related files (e.g., forbidden networks lists, service tables).
  • Android and some other devices expose 2G-disable or “5G preferred/only” toggles; behavior under forced downgrades from the network side is unclear.
  • In the US, 2G is effectively gone, so any 2G attachment is strongly suspect, but elsewhere 2G/3G are still relevant for coverage and roaming.

Are IMSI catchers “dead”?

  • One camp argues that criminal IMSI catchers are largely obsolete because:
    • 5G (with SUCI) and newer stacks make classic attacks harder.
    • Carriers and law enforcement can now do better location and identifier tracking directly from the network backend.
  • Others counter this is false: “fake base stations” and “SMS blasters” are actively used for spam, phishing, and fraud, with recent cases cited in multiple countries.
  • Passive or downgrade-based attacks remain possible wherever legacy technologies are supported.

Location tracking and lawful interception

  • 5G beamforming and dense deployments can already yield high‑precision location from cell data alone; some commenters argue this makes IMSI catchers less necessary.
  • There is concern that emergency-location mechanisms (e.g., GPS reporting) can be triggered remotely by the network, depending on baseband behavior; some hardware reportedly doesn’t limit such requests to emergencies.
  • Standards explicitly define “lawful interception” and location reporting per warrant; commenters stress that interception capabilities are designed in and not viewed as “bugs” by standards bodies.

mmWave, deployment, and tracking accuracy

  • Disagreement over how widely mmWave 5G is deployed and how useful it is:
    • Critics call it “vaporware” or a niche, power‑hungry technology mostly useful in stadiums/arenas and some urban cores; many budget or non‑US phones omit mmWave support.
    • Supporters cite real‑world multi‑Gbps speeds and ongoing spectrum auctions and rollouts, arguing it remains important for high‑density venues and certain future use cases.
  • One commenter notes that for general location, cell‑ID‑based methods are often less precise than Wi‑Fi/BSSID databases, which are widely commercialized.

Why cellular security has these holes

  • Historical explanations:
    • Early analog and 2G systems prioritized cost and basic encryption of content, not mutual authentication or metadata privacy.
    • GSM encryption and algorithms were constrained or weakened, and network authentication to devices wasn’t seen as necessary.
  • Some argue insecurity is structural: networks are designed for “lawful intercept,” rely on shared symmetric keys, and long treated IMSI catchers as acceptable collateral rather than vulnerabilities.
  • Others frame many issues as long‑standing oversights and inertia rather than intentional malice.

Article quality and AI‑generation suspicion

  • A meta-thread suggests the linked article “reads like” an AI synthesis: fact‑recitation without deep understanding, missing important nuances such as:
    • Global multi‑RAT behavior (phones still connecting to 2G/3G/LTE where present).
    • The continued value of any stable identifier, even if obfuscated, for correlation and tracking.
  • Another reply defends 5G’s SUCI design, noting that correctly implemented SUCIs are not stable identifiers, since they use fresh ephemeral keys and are rarely sent.

User mitigations and their limits

  • Suggested mitigations include:
    • Forcing 4G/5G‑only or 5G‑SA‑only modes (where supported, e.g., on some Android derivatives).
    • Using 2G‑disable toggles.
    • Monitoring disclosures of IMSI/IMEI/SUCI via new Android modem‑security reporting.
  • Trade‑offs: disabling older RATs risks coverage and sometimes voice (given VoLTE interoperability problems), though emergency calls are typically exempted from such restrictions.
  • Consensus: 5G improves things, but does not “kill” IMSI catchers outright; attacks evolve, legacy networks linger, and backend surveillance remains powerful.