Introduction - If you have any usage issues, please Google them yourself
a paper about UMTS, In this paper authors present a man-in-the-middle attack on the
Universal Mobile Telecommunication Standard (UMTS),
one of the newly emerging 3G mobile technologies. The attack
allows an intruder to impersonate a valid GSM base station
to a UMTS subscriber regardless of the fact that UMTS
authentication and key agreement are used. As a result, an
intruder can eavesdrop on all mobile-station-initiated traffic