A SIM ( Subscriber Identity Module ) card is an integrated circuit (IC) intended to securely store an international mobile subscriber identity (IMSI) number and its related key, which are used to identify and authenticate subscribers on mobile telephone devices (such as mobile phones and laptops ). SIMs are also able to store address book contacts information, and may be protected using a PIN code to prevent unauthorized use.
132-464: Muhamed Haneef (born 29 September 1979) is an Indian-born doctor who was falsely accused of aiding terrorists , and left Australia upon cancellation of his visa amid great political controversy. His visa was later reinstated and he was given some compensation. Haneef was arrested on 2 July 2007 at Brisbane Airport , Brisbane , Australia on suspicion of terror-related activities. He is the second cousin once removed of Kafeel Ahmed and Sabeel Ahmed ,
264-415: A European article number (EAN) required when registering online for the subscription of a prepaid card. As of 2020, eSIM is superseding physical SIM cards in some domains, including cellular telephony. eSIM uses a software-based SIM embedded into an irremovable eUICC . The SIM card is a type of smart card , the basis for which is the silicon integrated circuit (IC) chip. The idea of incorporating
396-603: A SIM application and a USIM application. This configuration is necessary because older GSM only handsets are solely compatible with the SIM application and some UMTS security enhancements rely on the USIM application. On cdmaOne networks, the equivalent of the SIM card is the R-UIM and the equivalent of the SIM application is the CSIM . A virtual SIM is a mobile phone number provided by
528-460: A conviction of Haneef being secured." He told the court that prosecutors had made two mistakes at a bail hearing on 14 July. One was their claim that Haneef's SIM card had been found in a burning jeep at Glasgow Airport when, in fact, it had been found in the possession of the brother of a terrorism suspect in Liverpool. The second error was their accusation that Haneef had once lived with some of
660-464: A cup of coffee with them 12 months ago, is that all association means?" the counsel representing the government, agreed, that would be enough for Justice Spender to fail the test, if he were a foreign citizen working in Australia on a visa. Justice Spender was also sceptical of the timing of the minister's decision, just hours after Magistrate Jacqui Payne granted Haneef bail. He said it was "curious"
792-564: A debate in early 2012 between a few designs created by Apple, Nokia and RIM , Apple's design for an even smaller SIM card was accepted by the ETSI. The nano-SIM (or 4FF) card was introduced in June 2012, when mobile service providers in various countries first supplied it for phones that supported the format. The nano-SIM measures 12.3 mm × 8.8 mm × 0.67 mm (0.484 in × 0.346 in × 0.026 in) and reduces
924-528: A divine duty with no consideration for political efficacy―their aim is transcendental and "holy terror" constitutes an end in itself. Hoffman's concept has since been taken up and developed by a number of other writers, including Walter Laquer, Steven Simon and Daniel Benjamen, and rebranded as the "New Terrorism". Arguably, the first organization to use modern terrorist techniques was the Irish Republican Brotherhood , founded in 1858 as
1056-558: A few days earlier. He was about to board an international flight. He was the first person arrested and detained under the 2005 Australian Anti-Terrorism Act and the first to have his detention extended under the Act, being detained for twelve days without being charged with a crime. Mick Keelty , the Australian Federal Police Commissioner, acknowledged that Haneef "may have done nothing wrong and may at
1188-433: A market need from ETSI customers, but additionally there is a strong desire not to invalidate, overnight, the existing interface, nor reduce the performance of the cards. Micro-SIM cards were introduced by various mobile service providers for the launch of the original iPad, and later for smartphones, from April 2010. The iPhone 4 was the first smartphone to use a micro-SIM card in June 2010, followed by many others. After
1320-610: A military response and welcomed it as a provocation that would result in more Muslims fight the United States. Some commentators believe that the resulting anger and suspicion directed toward innocent Muslims living in Western countries and the indignities inflicted upon them by security forces and the general public also contributes to radicalization of new recruits. Despite criticism that the Iraqi government had no involvement with
1452-515: A month (the last as of January 2019 was No. 1163 from 1 January 2019). ITU-T also publishes complete lists: as of August 2023, the list issued on 1 December 2018 was current, having all issuer identifier numbers before 1 December 2018. SIM cards are identified on their individual operator networks by a unique international mobile subscriber identity (IMSI). Mobile network operators connect mobile phone calls and communicate with their market SIM cards using their IMSIs. The format is: The K i
SECTION 10
#17327798614861584-563: A particular cause and many of the most deadly operations in recent times, such as the September 11 attacks , the London underground bombing , 2008 Mumbai attacks and the 2002 Bali bombings were planned and carried out by a close clique, composed of close friends, family members and other strong social networks. These groups benefited from the free flow of information and efficient telecommunications to succeed where others had failed. Over
1716-530: A person named "Bilal" but refused to provide further information on him. In fact Haneef had actually stated he knew a "Bilab" and freely gave information about this person. Australian intelligence authorities were reportedly probing a report in the Indian newspaper The Asian Age that alleged Haneef supposedly belonged to the now banned Student Islamic Movement of India (SIMI) when he was at medical school. Haneef's lawyer Peter Russo said he asked his client about
1848-486: A phone containing this SIM card can connect to a maximum of only 33 or 80 networks, instead it means that the SIM card issuer can specify only up to that number of preferred networks. If a SIM is outside these preferred networks, it uses the first or best available network. Each SIM is internationally identified by its integrated circuit card identifier ( ICCID ). Nowadays ICCID numbers are also used to identify eSIM profiles, not only physical SIM cards. ICCIDs are stored in
1980-498: A religious agenda. Before 2000, it was nationalist separatist terrorist organizations such as the IRA and Chechen rebels who were behind the most attacks. The number of incidents from nationalist separatist groups has remained relatively stable in the years since while religious extremism has grown. The prevalence of Islamist groups in Iraq , Afghanistan , Pakistan , Nigeria and Syria is
2112-438: A return ticket" from India to Australia. While the police affidavit stated Haneef "had no explanation" about his one-way ticket, the record of interview shows that he gave a detailed explanation to police while answering questions. Haneef told police that, as he did not have funds in his Australian bank account, his father-in-law had booked and paid for the one-way ticket with an understanding that "when I go there we can arrange for
2244-554: A revolutionary Irish nationalist group that carried out attacks in England. The group initiated the Fenian dynamite campaign in 1881, one of the first modern terror campaigns. Instead of earlier forms of terrorism based on political assassination, this campaign used timed explosives with the express aim of sowing fear in the very heart of metropolitan Britain , in order to achieve political gains. Another early terrorist-type group
2376-424: A signed response (SRES_1/SRES_2: see steps 3 and 4, below) from the K i has certain vulnerabilities that can allow the extraction of the K i from a SIM card and the making of a duplicate SIM card . Authentication process: The SIM stores network state information, which is received from the location area identity (LAI). Operator networks are divided into location areas, each having a unique LAI number. When
2508-452: A silicon IC chip onto a plastic card originates from the late 1960s. Smart cards have since used MOS integrated circuit chips, along with MOS memory technologies such as flash memory and EEPROM (electrically EPROM ). The SIM was initially specified by the ETSI in the specification TS 11.11. This describes the physical and logical behaviour of the SIM. With the development of UMTS ,
2640-402: A single, all-encompassing, legally binding, criminal law definition of terrorism. These difficulties arise from the fact that the term "terrorism" is politically and emotionally charged. The international community has instead adopted a series of sectoral conventions that define and criminalize various types of terrorist activities. Counterterrorism analyst Bruce Hoffman has noted that it
2772-412: A strategic tool to influence decision makers. By targeting densely populated public areas such as transportation hubs, airports, shopping centers, tourist attractions, and nightlife venues, terrorists aim to instill widespread insecurity, prompting policy changes through psychological manipulation and undermining confidence in security measures. The terms "terrorist" and "terrorism" originated during
SECTION 20
#17327798614862904-437: A successful high-profile attack. The attacks prompted some criticism from domestic and international observers regarding perceived injustices in U.S. foreign policy that provoked the attacks, but the larger practical effect was that the United States government declared a War on Terror that resulted in substantial military engagements in several Muslim-majority countries. Various commentators have inferred that al-Qaeda expected
3036-692: A tactic because it can: Attacks on "collaborators" are used to intimidate people from cooperating with the state in order to undermine state control. This strategy was used in Ireland, in Kenya , in Algeria and in Cyprus during their independence struggles. Stated motives for the September 11 attacks included inspiring more fighters to join the cause of repelling the United States from Muslim countries with
3168-473: A terrorist organisation under the terms of the act, whilst being reckless as to whether it was a terrorist organisation. The allegation centered on the gift of his own SIM card to his cousin, Sabeel Ahmed . Haneef's links with his cousins were cited by police as a key factor in their case, and a Commonwealth prosecutor told magistrate Jacqui Payne: Dr Haneef lived with these people. He may have worked with these people. He associated with these people. He
3300-478: A universally accepted, legally binding definition. Title 18 of the United States Code defines terrorism as acts that are intended to intimidate or coerce civilians or government. The international community has been slow to formulate a universally agreed, legally binding definition of this crime, and has been unable to conclude a Comprehensive Convention on International Terrorism that incorporates
3432-475: Is a 128-bit value used in authenticating the SIMs on a GSM mobile network (for USIM network, the K i is still needed but other parameters are also needed). Each SIM holds a unique K i assigned to it by the operator during the personalisation process. The K i is also stored in a database (termed authentication center or AuC) on the carrier's network. The SIM card is designed to prevent someone from getting
3564-419: Is an identical ETSI specification with different numbering.) ETSI and 3GPP maintain the SIM specifications. The main specifications are: ETSI TS 102 223 (the toolkit for smart cards), ETSI TS 102 241 ( API ), ETSI TS 102 588 (application invocation), and ETSI TS 131 111 (toolkit for more SIM-likes). SIM toolkit applications were initially written in native code using proprietary APIs. To provide interoperability of
3696-697: Is charged under terrorist legislation is obviously seen as a greater threat to the good order of our society than other types of prisoners," she said. Haneef was believed to have been moved from the Brisbane watchhouse to a nearby remand centre on the morning of 18 7 July. Just after 9:30 a.m. an armoured police van left the Brisbane City Watchhouse with a prisoner inside. The man was hunched over, hiding his face between his knees. Haneef's wife Firdous Arshiya spoke of her relief at finally being able to speak to him by phone eleven days after he
3828-483: Is independent of format. Full-size SIM was followed by mini-SIM, micro-SIM, and nano-SIM. SIM cards are also made to embed in devices. JEDEC Design Guide 4.8, SON-8 GSMA SGP.22 V1.0 All versions of the non-embedded SIM cards share the same ISO/IEC 7816 pin arrangement. The full-size SIM (or 1FF, 1st form factor) was the first form factor to appear. It was the size of a credit card (85.60 mm × 53.98 mm × 0.76 mm). The mini-SIM (or 2FF) card has
3960-522: Is not only individual agencies within the same governmental apparatus that cannot agree on a single definition of terrorism; experts and other long-established scholars in the field are equally incapable of reaching a consensus. In 1992, terrorism studies scholar Alex P. Schmid proposed a simple definition to the United Nations Commission on Crime Prevention and Criminal Justice (CCPCJ) as "peacetime equivalents of war crimes", but it
4092-576: Is obsolete, some suppliers refer to the mini-SIM as a "standard SIM" or "regular SIM". The micro-SIM (or 3FF) card has the same thickness and contact arrangements, but reduced length and width as shown in the table above. The micro-SIM was introduced by the European Telecommunications Standards Institute (ETSI) along with SCP, 3GPP (UTRAN/GERAN), 3GPP2 (CDMA2000), ARIB , GSM Association (GSMA SCaG and GSMNA), GlobalPlatform, Liberty Alliance , and
Muhamed Haneef - Misplaced Pages Continue
4224-511: Is politically charged and over-simplified. The underlying historical assertions have received less critical attention. According to The Oxford Handbook on the History of Terrorism : Since the publication of Rapoport's article, it has become seemingly pre-requisite for standard works on terrorism to cite the three case studies and to reproduce uncritically its findings. In lieu of empirical research, authors tend to crudely paraphrase Rapoport and
4356-405: Is reviving in new and unusual forms". He is the first to propose that religious doctrines were more important than political rationales for some terrorist groups. Rapoport's work has since become the basis of the model of "New Terrorism" proposed by Bruce Hoffman and developed by other scholars. "New Terrorism" has had an unparalleled impact on policymaking. Critics have pointed out that the model
4488-427: Is their second cousin. Haneef was ordered to be freed on a relatively modest, $ 10,000 surety on 16 July 2007, after the public prosecutor failed to convince the magistrate that the doctor should be remanded in custody. His barrister, Stephen Keim , SC, argued for the Indian national to be released on bail and said the case against Haneef was "extremely weak". The matter was due to be heard again on 31 August 2007. After
4620-480: Is usually accompanied by anti-government sentiments. Adherents of Christian Identity are not connected with specific Christian denominations , and they believe that whites of European descent can be traced back to the " Lost Tribes of Israel ". Adherents have committed hate crimes , bombings and other acts of terrorism, including the Centennial Olympic Park bombing . Its influence ranges from
4752-431: The 64 KB version has room for 80 MNCs. This is used by network operators to store data on preferred networks, mostly used when the SIM is not in its home network but is roaming . The network operator that issued the SIM card can use this to have a phone connect to a preferred network that is more economic for the provider instead of having to pay the network operator that the phone discovered first. This does not mean that
4884-893: The Hamas Charter 's apparent advocacy of genocidal aspirations . In the periods of 1994–1996 and 2001–2007, Hamas orchestrated a series of suicide bombings , primarily directed at civilian targets in Israel, killing over 1,000 Israeli civilians. Five of the terrorist groups that have been most active since 2001 are Hamas, Boko Haram , al-Qaeda , the Taliban and ISIL . These groups have been most active in Iraq, Afghanistan, Pakistan, Nigeria and Syria. Eighty percent of all deaths from terrorism occurred in these five countries. In 2015 four Islamic extremist groups were responsible for 74% of all deaths from Islamic terrorism: ISIS , Boko Haram,
5016-655: The International Conference of Rome for the Social Defense Against Anarchists , the first international conference against terrorism . According to Bruce Hoffman of the RAND Corporation , in 1980, 2 out of 64 terrorist groups were categorized as having religious motivation while in 1995, almost half (26 out of 56) were religiously motivated with the majority having Islam as their guiding force. Depending on
5148-504: The Ku Klux Klan and neo-Nazi groups to the anti-government militia and sovereign citizen movements . Terrorist acts frequently have a political purpose based on self-determination claims, ethnonationalist frustrations, single issue causes (like abortion or the environment), or other ideological or religious causes that terrorists claim are a moral justification for their violent acts. Individuals and groups choose terrorism as
5280-528: The Open Mobile Alliance (OMA) for the purpose of fitting into devices too small for a mini-SIM card. The form factor was mentioned in the December 1998 3GPP SMG9 UMTS Working Party, which is the standards-setting body for GSM SIM cards, and the form factor was agreed upon in late 2003. The micro-SIM was designed for backward compatibility. The major issue for backward compatibility was
5412-1298: The Organization of Ukrainian Nationalists in pre-war Poland , the Shining Path in Peru under Alberto Fujimori , the Kurdistan Workers Party when Turkey was ruled by military leaders and the ANC in South Africa. According to Boaz Ganor, "Modern terrorism sees the liberal democratic state, in all its variations, as the perfect launching pad and a target for its attacks. Moreover, some terrorist organizations—particularly Islamist-jihadist organizations—have chosen to cynically exploit democratic values and institutions to gain power and status, promote their interests, and achieve internal and international legitimacy". Jihadist militants have shown an ambivalent view towards democracy, as they both exploit it for their ends and oppose it in their ideology. Various quotes from jihadist leaders note their disdain for democracy and their efforts to undermine it in favor of Islamic rule. Democracies, such as Japan,
Muhamed Haneef - Misplaced Pages Continue
5544-753: The Palestinian airplane hijackings in 1970 and the 1975 Dutch train hostage crisis . Specific political or social causes have included: Causes for right-wing terrorism have included white nationalism , ethnonationalism , fascism, anti-socialism, the anti-abortion movement , and tax resistance . Sometimes terrorists on the same side fight for different reasons. For example, in the Chechen–Russian conflict secular Chechens using terrorist tactics fighting for national independence are allied with radical Islamist terrorists who have arrived from other countries. Various personal and social factors may influence
5676-587: The Southern Poverty Law Center released a report on domestic terrorism in the United States. The report (titled The Age of the Wolf ) analyzed 62 incidents and found that, between 2009 and 2015, "more people have been killed in America by non-Islamic domestic terrorists than jihadists ." The "virulent racist and antisemitic " ideology of the ultra-right wing Christian Identity movement
5808-598: The University of Maryland, College Park , has recorded more than 61,000 incidents of non-state terrorism, resulting in at least 140,000 deaths between 2000 and 2014. Various organizations have used terrorism to achieve their objectives. These include left-wing and right-wing political organizations, nationalist groups , religious groups , revolutionaries , and ruling governments . In recent decades, hybrid terrorist organizations have emerged, incorporating both military and political arms. The term "terrorism" itself
5940-469: The 0.76 mm (0.030 in) of its predecessors. The iPhone 5 , released in September 2012, was the first device to use a nano-SIM card, followed by other handsets. In July 2013, Karsten Nohl, a security researcher from SRLabs, described vulnerabilities in some SIM cards that supported DES , which, despite its age, is still used by some operators. The attack could lead to the phone being remotely cloned or let someone steal payment credentials from
6072-755: The 16th century has also been described as a reign of terror. The terms "terrorism" and "terrorist" gained renewed currency in the 1970s as a result of the Palestinian Liberation Organization (PLO), the Irish Republican Army (IRA), the Basque separatist group, ETA , and the operations of groups such as the Red Army Faction . Leila Khaled was described as a terrorist in a 1970 issue of Life magazine. A number of books on terrorism were published in
6204-427: The 1970s. The topic came further to the fore after the 1983 Beirut barracks bombings and again after the 2001 September 11 attacks and the 2002 Bali bombings . No definition of terrorism has gained universal agreement. Challenges emerge due to the politically and emotionally charged nature of the term, the double standards used in applying it, and disagreement over the nature of terrorist acts and limits of
6336-568: The AFP that he resided with Dr Sabeel Ahmed at a boarding house located at 13 Bentley Road, Liverpool, UK." This error was not corrected by the AFP , and revealed by Hedley Thomas on 20 July in The Australian . However, in the record of the interview, Haneef told police that he lived at 13 Bentley Road, Liverpool, with several doctors, whom he named. None of those named are known to be suspects in
6468-482: The AFP was investigating Haneef's alleged involvement in a plot to blow up a Gold Coast skyscraper. The reports also alleged that Haneef may have been one of a number of people who had expressed interest in the operations of planes at premises in Queensland. The Australian Federal Police commissioner Mick Keelty was forced to take the extraordinary step of publicly denying any substance to these claims. On 22 July,
6600-482: The Australian Federal Police would issue a "criminal justice certificate", the effect of would be that Haneef will remain in immigration detention while legal proceedings are afoot. Mr Andrews said he had revoked Haneef's 457 temporary skills visa on character grounds, because he "reasonably suspected" that Haneef had an association with people involved in terrorism. He further said "I'm satisfied
6732-576: The Federal Court. In the preliminary hearing, Justice Spender described as "absolutely astounding" the government's argument that mere association with a suspected criminal means a non-citizen fails the character test for the purposes of his visa, stating that even he could not pass the character test as he had represented murderers in the past: "Unfortunately, I would fail the character test on your statement because I have been associated with persons suspected of criminal conduct," adding "Suppose he had
SECTION 50
#17327798614866864-667: The French Revolution of the late 18th century but became widely used internationally and gained worldwide attention in the 1970s during the Troubles in Northern Ireland, the Basque conflict and the Israeli–Palestinian conflict . The increased use of suicide attacks from the 1980s onwards was typified by the 2001 September 11 attacks in the United States. The Global Terrorism Database , maintained by
6996-529: The Glasgow or London incidents. Haneef told police that he had moved out of 13 Bentley Road by the time that Sabeel Ahmed moved there. He also told police that he visited Cambridge on two occasions in 2004 and stayed for up to six days with Kafeel Ahmed. There was confusion with the handling of evidence, with Australian police presenting their own notes to Haneef under the impression that they were diary entries written by Haneef. This led to inaccurate claims that
7128-820: The Government's actions. Federal Labor's failure to criticise the Government was widely seen as an attempt by its leadership to avoid a political wedge issue in the lead up to the late-2007 federal election . Queensland Premier Peter Beattie criticised the Federal government over the handling of the case and called for an explanation. He was reported in The Australian newspaper to have said: "I'm deeply concerned about where we are," Mr Beattie said. "If they have stuffed this up, they should come clean. There are now too many questions and it's just looking sloppy." Bill Hayden , former Governor-General , also criticised
7260-508: The ICCID length as an opaque data field, 10 octets (20 digits) in length, whose structure is specific to a mobile network operator . The number is composed of three subparts: Their format is as follows. Issuer identification number (IIN) Individual account identification Check digit With the GSM Phase 1 specification using 10 octets into which ICCID is stored as packed BCD ,
7392-531: The Indian Government, E. Ahamed , met Haneef's family in Bangalore. Haneef's wife told him "India should put more pressure on Australia" The prime minister of India was quoted as saying that he could not sleep the whole night owing to Haneef's arrest. Commonwealth prosecutor Clive Porritt had claimed that the SIM card was lent by Haneef to Sabeel Ahmed and was then passed to Khalid Ahmed before it
7524-630: The Internet, was published on the website of The Australian newspaper then removed. Australia's Attorney-General, Philip Ruddock , claimed that to ensure a fair trial Haneef might have been forced to spend more time in detention as a result of the leaked transcript, Haneef's lawyers subsequently released the transcript from his second interview to the media. Meanwhile, in India, the Australian High Commissioner , John McCarthy
7656-452: The K i by using the smart-card interface . Instead, the SIM card provides a function, Run GSM Algorithm , that the phone uses to pass data to the SIM card to be signed with the K i . This, by design, makes using the SIM card mandatory unless the K i can be extracted from the SIM card, or the carrier is willing to reveal the K i . In practice, the GSM cryptographic algorithm for computing
7788-643: The March 2006 issue of the British Medical Journal . In Australia, he worked as a registrar at the Gold Coast Hospital from September 2006, and lived in an apartment several blocks from the hospital. Haneef was arrested on 2 July 2007 at Brisbane Airport, Brisbane, Australia for suspected terror-related activities, specifically in connection to the attack at Glasgow Airport in the UK,
7920-642: The Middle East. Their activities in Lebanon during the 1980s garnered support among local Shiites , leading to the rise of smaller terrorist groups, notably the Islamic Jihad . Hamas , the main Islamist movement in the Palestinian territories , was formed by Palestinian imam Ahmed Yassin in 1987. Some scholars, including constitutional law professor Alexander Tsesis , have voiced concerns over
8052-558: The National Crime Commission, Peter Faris . These claims were disputed by Federal Police Commissioner, Mick Keelty . The Federal Labor party resisted offering criticism of the Government's handling of the issue and on several occasions offered the Government in principle support for Kevin Andrews ' decision to cancel Haneef's visa. This contrasted with statements issued by The Greens which were strongly critical of
SECTION 60
#17327798614868184-453: The Queensland government revealed that Haneef would be treated "as a terrorist" while detained in jail and subject to special conditions, including solitary confinement for 23 hours a day. Queensland Police and Corrective Services Minister Judy Spence said the conditions of his detention included no contact with other inmates, meaning Haneef would be alone in a cell for all but one hour a day, when he would be allowed to exercise. "Anyone who
8316-583: The S@T Browser library were being actively exploited. This vulnerability was named Simjacker . Attackers were using the vulnerability to track the location of thousands of mobile phone users in several countries. Further details of the research were provided at VirusBulletin on 3 October 2019. When GSM was already in use, the specifications were further developed and enhanced with functionality such as SMS and GPRS . These development steps are referred as releases by ETSI. Within these development cycles,
8448-447: The SIM as its primary component. In practice the term "SIM card" is still used to refer to the entire unit and not simply the IC. A SIM contains a unique serial number, integrated circuit card identification (ICCID), international mobile subscriber identity (IMSI) number, security authentication and ciphering information, temporary information related to the local network, a list of the services
8580-534: The SIM card was found in the jeep confirming that the conduit for the SIM card error was the Australian Federal Police, contrary to Keelty's previous denials. A review by the Director of Public Prosecutions (DPP), Damian Bugg, revealed the allegations connected to the SIM card use were an "error of fact". The AFP claimed in a court affidavit that Haneef told police in his first interview that he lived in Britain with
8712-421: The SIM card. When a user tries to copy such entries to a SIM, the handset's software breaks them into multiple entries, discarding information that is not a phone number. The number of contacts and messages stored depends on the SIM; early models stored as few as five messages and 20 contacts, while modern SIM cards can usually store over 250 contacts. SIM cards have been made smaller over the years; functionality
8844-506: The SIM cards and are also engraved or printed on the SIM card body during a process called personalisation. The ICCID is defined by the ITU-T recommendation E.118 as the primary account number . Its layout is based on ISO/IEC 7812 . According to E.118, the number can be up to 19 digits long, including a single check digit calculated using the Luhn algorithm . However, the GSM Phase 1 defined
8976-656: The SIM specification was enhanced as well: new voltage classes, formats and files were introduced. In GSM-only times, the SIM consisted of the hardware and the software. With the advent of UMTS, this naming was split: the SIM was now an application and hence only software. The hardware part was called UICC. This split was necessary because UMTS introduced a new application, the universal subscriber identity module (USIM). The USIM brought, among other things, security improvements like mutual authentication and longer encryption keys, and an improved address book. "SIM cards" in developed countries today are usually UICCs containing at least
9108-677: The SIM. Further details of the research were provided at BlackHat on 31 July 2013. In response, the International Telecommunication Union said that the development was "hugely significant" and that it would be contacting its members. In February 2015, The Intercept reported that the NSA and GCHQ had stolen the encryption keys (Ki's) used by Gemalto (now known as Thales DIS , manufacturer of 2 billion SIM cards annually) ), enabling these intelligence agencies to monitor voice and data communications without
9240-433: The SMSC ( Short Message service center ) number, service provider name (SPN), service dialing numbers (SDN), advice-of-charge parameters and value-added service (VAS) applications. (Refer to GSM 11.11. ) SIM cards can come in various data capacities, from 8 KB to at least 256 KB . All can store a maximum of 250 contacts on the SIM, but while the 32 KB has room for 33 Mobile country code (MCCs) or network identifiers ,
9372-446: The September 11 attacks, Bush declared the 2003 invasion of Iraq to be part of the War on Terror. The resulting backlash and instability enabled the rise of Islamic State of Iraq and the Levant and the temporary creation of an Islamic caliphate holding territory in Iraq and Syria, until ISIL lost its territory through military defeats. Attacks used to draw international attention to struggles that are otherwise unreported have included
9504-688: The Taliban, and al-Qaeda, according to the Global Terrorism Index 2016. Since approximately 2000, these incidents have occurred on a global scale, affecting not only Muslim-majority states in Africa and Asia, but also states with non-Muslim majority such as United States , United Kingdom , France , Germany , Spain , Belgium , Sweden , Russia , Australia , Canada , Sri Lanka , Israel , China , India and Philippines . Such attacks have targeted both Muslims and non-Muslims, however
9636-639: The UK bombing suspects, when in fact he had not. The Australian Labor Party called for an external review of the handling of the Haneef case by the Office of the Commonwealth Director of Public Prosecutions. Terrorists Terrorism , in its broadest sense, is the use of violence against non-combatants to achieve political or ideological aims. The term is used in this regard primarily to refer to intentional violence during peacetime or in
9768-628: The United Kingdom, the United States , Israel , Indonesia , India , Spain , Germany , Italy and the Philippines , have all experienced domestic terrorism. While a democratic nation espousing civil liberties may claim a sense of higher moral ground than other regimes, an act of terrorism within such a state may cause a dilemma: whether to maintain its civil liberties and thus risk being perceived as ineffective in dealing with
9900-511: The age—such as the invention of dynamite, which they were the first anarchist group to make widespread use of —enabled them to strike directly and with discrimination. In 1920 Leon Trotsky wrote Terrorism and Communism to justify the Red Terror and defend the moral superiority of revolutionary terrorism . The assassination of the Empress of Austria Elisabeth in 1898 resulted in
10032-545: The applications, ETSI chose Java Card . A multi-company collaboration called GlobalPlatform defines some extensions on the cards, with additional APIs and features like more cryptographic security and RFID contactless use added. SIM cards store network-specific information used to authenticate and identify subscribers on the network. The most important of these are the ICCID, IMSI, authentication key (K i ) , local area identity (LAI) and operator-specific emergency number. The SIM also stores other carrier-specific data such as
10164-417: The assumed relevance of "Thuggee" to the study of modern terrorism is taken for granted. Yet the significance of the article is not simply a matter of citations―it has also provided the foundation for what has become known as the "New Terrorism" paradigm. While Rapoport did not suggest which late 20th century groups might exemplify the implied recurrence of "holy terror", Bruce Hoffman, recognized today as one of
10296-811: The cancellation is in the national interest. I have a responsibility and a duty as minister under the Act to turn my mind to the question of whether Haneef passes the character test.", This decision was criticised by the head of the Australian Bar Association , Stephen Estcourt who said "He can't do that" The decision to revoke Haneef's visa was given in principle support by the Shadow Minister of Immigration, Tony Burke On 31 July, Mr Andrews claimed to have canceled Haneef's visa based in part on an online chat that Haneef had with his brother prior to attempting to leave Australia. Haneef's legal team lodged an appeal against this decision with
10428-541: The claim: "His response to it was it's simply not true", Mr Russo told ABC Radio. Australia reportedly sought details from India of personal information such as banking transactions related to Haneef. The request came after Indian authorities declined to comply with a request for "friendly sharing of information" made by a representative of the Australian Federal Police during a visit there in late September 2007. On Sunday, 22 July, some News Limited papers reported unsubstantiated claims from unnamed law enforcement sources that
10560-481: The coming back ticket. Because I just got 7 days' leave approved". Australian authorities alleged that as Haneef left Britain he recklessly provided assistance to a terrorist organisation by leaving his relative, Sabeel Ahmed, a SIM card and the balance of a two-year mobile phone contract to use and pay off when he left Britain in July 2006. Relatives said that he left the SIM card behind to save money by not surrendering
10692-496: The contact area of the chip. Retaining the same contact area makes the micro-SIM compatible with the prior, larger SIM readers through the use of plastic cutout surrounds. The SIM was also designed to run at the same speed (5 MHz) as the prior version. The same size and positions of pins resulted in numerous "How-to" tutorials and YouTube videos with detailed instructions how to cut a mini-SIM card to micro-SIM size. The chairman of EP SCP, Klaus Vedder, said ETSI has responded to
10824-472: The context of war against non-combatants (mostly civilians and neutral military personnel ). There are various different definitions of terrorism , with no universal agreement about it. Different definitions of terrorism emphasize its randomness , its aim to instill fear , and its broader impact beyond its immediate victims. Modern terrorism, evolving from earlier iterations, employs various tactics to pursue political goals, often leveraging fear as
10956-645: The country, the political system, and the time in history, the types of terrorism are varying. In early 1975, the Law Enforcement Assistant Administration in the United States formed the National Advisory Committee on Criminal Justice Standards and Goals. One of the five volumes that the committee wrote was titled Disorders and Terrorism , produced by the Task Force on Disorders and Terrorism under
11088-454: The data field has room for 20 digits with hexadecimal digit "F" being used as filler when necessary. In practice, this means that on GSM cards there are 20-digit (19+1) and 19-digit (18+1) ICCIDs in use, depending upon the issuer. However, a single issuer always uses the same size for its ICCIDs. As required by E.118, the ITU-T updates a list of all current internationally assigned IIN codes in its Operational Bulletins which are published twice
11220-436: The decision by Immigration Minister Kevin Andrews to cancel his work visa, Haneef chose not to post bail, opting instead to remain in police custody until his appeal against the visa cancellation decision could be heard. Immigration Minister Kevin Andrews announced that Haneef's visa had been cancelled immediately on "character grounds" and, if released on bail, he would be taken into immigration detention. Mr Andrews said that
11352-447: The device changes locations, it stores the new LAI to the SIM and sends it back to the operator network with its new location. If the device is power cycled, it takes data off the SIM, and searches for the prior LAI. Most SIM cards store a number of SMS messages and phone book contacts. It stores the contacts in simple "name and number" pairs. Entries that contain multiple phone numbers and additional phone numbers are usually not stored on
11484-578: The direction of H. H. A. Cooper, Director of the Task Force staff. The Task Force defines terrorism as "a tactic or technique by means of which a violent act or the threat thereof is used for the prime purpose of creating overwhelming fear for coercive purposes". It classified disorders and terrorism into seven categories: Other sources have defined the typology of terrorism in different ways, for example, broadly classifying it into domestic terrorism and international terrorism , or using categories such as vigilante terrorism or insurgent terrorism. Some ways
11616-734: The end of the day be free to go." At the time of his arrest, Haneef was attempting to make a one-way trip to India. This led authorities to believe Haneef's attempted exit from Australia on 2 July was directly linked to the arrest of his cousin Kafeel Ahmed, who suffered 90% burns after the Glasgow Airport attack on 30 June. They discounted the possibility that Haneef was returning to see his six-day-old daughter, who had neonatal jaundice , and wife who had given birth to her first child by emergency caesarean section. Following his arrest, Haneef's family claimed that any link between him and
11748-540: The failed bombings on 29 June. Haneef's colleagues at Gold Coast Hospital said Haneef "had made no mention of his planned personal trip to India, and had commented often about how well it worked to have his family living in India while he was working in Queensland " Australian police alleged a link between Haneef and Bilal Abdullah , the owner and occupant of the Jeep used in the attack, by claiming Haneef admitted knowing
11880-492: The government's handling of the case, which he described as "frightening and appalling", and especially the cancellation of Haneef's visa by immigration minister Kevin Andrews, which Hayden described as "arbitrary". On 27 July, all charges against Haneef were dropped before Magistrate Wendy Cull in the Brisbane Magistrates Court. Prosecutor A.J. McSporran said that there would be "no reasonable prospect of
12012-537: The knowledge or approval of cellular network providers or judicial oversight. Having finished its investigation, Gemalto claimed that it has “reasonable grounds” to believe that the NSA and GCHQ carried out an operation to hack its network in 2010 and 2011, but says the number of possibly stolen keys would not have been massive. In September 2019, Cathal Mc Daid, a security researcher from Adaptive Mobile Security, described how vulnerabilities in some SIM cards that contained
12144-565: The main driver behind these trends. The emergence of Hezbollah in 1982 marked a pivotal moment in terrorism's history. The Shiite Islamist group, rooted in Lebanon , drew inspiration from the Iranian Revolution and Ayatollah Ruhollah Khomeini 's teachings , responding to the 1982 Lebanon War . Beyond pursuing revolutionary goals, Hezbollah members were deeply concerned about the social conditions of Shiite communities across
12276-571: The majority affect Muslims themselves. Terrorism in Pakistan has become a great problem. From the summer of 2007 until late 2009, more than 1,500 people were killed in suicide and other attacks on civilians for reasons attributed to a number of causes—sectarian violence between Sunni and Shia Muslims ; easy availability of guns and explosives; the existence of a " Kalashnikov culture"; an influx of ideologically driven Muslims based in or near Pakistan , who originated from various nations around
12408-463: The majority of SIM cards launched before 1998 was 5 V . SIM cards produced subsequently are compatible with 3 V and 5 V . Modern cards support 5 V , 3 V and 1.8 V . Modern SIM cards allow applications to load when the SIM is in use by the subscriber. These applications communicate with the handset or a server using SIM Application Toolkit , which was initially specified by 3GPP in TS 11.14. (There
12540-455: The minister had not decided to cancel the visa earlier, adding "There is room for the view that this was an act of circumventing the inconvenience of having him on bail". On 18 July 2007, Haneef's barrister Stephen Keim confirmed that he had leaked a transcript of Haneef's initial interview with the AFP to the media in order to counter what he described as a campaign of damaging leaks by law enforcement agencies. The transcript, now mirrored on
12672-546: The neighbouring district of Dakshina Kannada . He subsequently studied medicine at the Tripura Medical College & Dr. B.R. Ambedkar Memorial Teaching Hospital from 1997 to 2002, achieving a first-class degree. Haneef worked at Halton Hospital in Runcorn Cheshire , before applying for a job in Australia under that country's temporary skilled worker scheme, after reading an advertisement in
12804-471: The operatives in the 2007 Glasgow Airport attack . Haneef's ensuing detention became the longest without charge in recent Australian history, which caused great controversy in Australia and India. Haneef was released when the Director of Public Prosecutions withdrew its charge on 27 July 2007, whereby his passport was returned and he departed Australia voluntarily on 29 July 2007. Haneef's visa cancellation
12936-653: The personal choice of whether to join a terrorist group or attempt an act of terror, including: A report conducted by Paul Gill, John Horgan and Paige Deckert found that for "lone wolf" terrorists: Ariel Merari , a psychologist who has studied the psychological profiles of suicide terrorists since 1983 through media reports that contained biographical details, interviews with the suicides' families, and interviews with jailed would-be suicide attackers , concluded that they were unlikely to be psychologically abnormal. In comparison to economic theories of criminal behaviour, Scott Atran found that suicide terrorists exhibit none of
13068-684: The police had written in the diary itself but it was confirmed that the police notes were not written in Haneef's diary. Unsubstantiated media reports claim that Muhamed Haneef was in frequent and extensive contact with two men at the centre of Britain's car-bomb plot on the eve of their failed terror attacks. The online communication between Haneef and the bomb plotters was (supposedly) prolific and that authorities had (supposedly) gathered significantly more evidence against him than that has been disclosed publicly. There are claims that computer records obtained by authorities reveal that Haneef remained in close contact with both Kafeel and his brother Sabeel until
13200-451: The populace. To avoid detection, a terrorist will look, dress, and behave normally until executing the assigned mission. Some claim that attempts to profile terrorists based on personality, physical, or sociological traits are not useful. The physical and behavioral description of the terrorist could describe almost any normal person. The majority of terrorist attacks are carried out by military age men, aged 16 to 40. Groups not part of
13332-437: The previous format to the contact area while maintaining the existing contact arrangements. A small rim of isolating material is left around the contact area to avoid short circuits with the socket. The nano-SIM can be put into adapters for use with devices designed for 2FF or 3FF SIMs, and is made thinner for that purpose, and telephone companies give due warning about this. 4FF is 0.67 mm (0.026 in) thick, compared to
13464-411: The problem; or alternatively to restrict its civil liberties and thus risk delegitimizing its claim of supporting civil liberties. For this reason, homegrown terrorism has started to be seen as a greater threat, as stated by former CIA Director Michael Hayden. This dilemma, some social theorists would conclude, may very well play into the initial plans of the acting terrorist(s); namely, to delegitimize
13596-564: The propaganda tactics used by terrorists. Some security organizations designate these groups as violent non-state actors . A 2007 study by economist Alan B. Krueger found that terrorists were less likely to come from an impoverished background (28 percent versus 33 percent) and more likely to have at least a high-school education (47 percent versus 38 percent). Another analysis found only 16 percent of terrorists came from impoverished families, versus 30 percent of male Palestinians, and over 60 percent had gone beyond high school, versus 15 percent of
13728-428: The remaining value of the contract to the telephone company. The prosecutor claimed the SIM card was found inside the vehicle used in the Glasgow attack. This allegation, central to the case, proved to be false and investigating British police officers concluded that the case was driven by politics rather than policing. Mick Keelty revealed that Scotland Yard had initially told Australian Federal Police investigators that
13860-455: The right to self-determination . Harvard law professor Richard Baxter , a leading expert on the law of war, was a skeptic: "We have cause to regret that a legal concept of 'terrorism' was ever inflicted upon us. The term is imprecise; it is ambiguous; and above all, it serves no operative legal purpose." Different legal systems and government agencies employ diverse definitions of terrorism, with governments showing hesitation in establishing
13992-453: The same contact arrangement as the full-size SIM card and is normally supplied within a full-size card carrier, attached by a number of linking pieces. This arrangement (defined in ISO/IEC 7810 as ID-1/000 ) lets such a card be used in a device that requires a full-size card – or in a device that requires a mini-SIM card, after breaking the linking pieces. As the full-size SIM
14124-672: The secular Irgun were among the Zionist groups labelled as terrorist organisations by the British authorities and United Nations , for violent terror attacks against Britons and Arabs. Another extremist group, the Lehi , openly declared its members as "terrorists". Historian William Cleveland stated many Jews justified any action, even terrorism, taken in the cause of the creation of a Jewish state. In 1995, Yigal Amir assassinated Israeli Prime Minister Yitzhak Rabin . For Amir, killing Rabin
14256-438: The size of credit and bank cards ; sizes were reduced several times over the years, usually keeping electrical contacts the same, to fit smaller-sized devices. SIMs are transferable between different mobile devices by removing the card itself. Technically the actual physical card is known as a universal integrated circuit card (UICC); this smart card is usually made of PVC with embedded contacts and semiconductors , with
14388-600: The socially dysfunctional attributes—such as fatherless, friendless, jobless situations—or suicidal symptoms. By which he means, they do not kill themselves simply out of hopelessness or a sense of 'having nothing to lose'. Abrahm suggests that terrorist organizations do not select terrorism for its political effectiveness. Individual terrorists tend to be motivated more by a desire for social solidarity with other members of their organization than by political platforms or strategic objectives, which are often murky and undefined. Michael Mousseau shows possible relationships between
14520-493: The specification work was partially transferred to 3GPP . 3GPP is now responsible for the further development of applications like SIM (TS 51.011 ) and USIM (TS 31.102 ) and ETSI for the further development of the physical card UICC . The first SIM card was manufactured in 1991 by Munich smart-card maker Giesecke+Devrient , who sold the first 300 SIM cards to the Finnish wireless network operator Radiolinja , who launched
14652-469: The state and cause a systematic shift towards anarchy via the accumulation of negative sentiments towards the state system. The perpetrators of acts of terrorism can be individuals, groups, or states. According to some definitions, clandestine or semi-clandestine state actors may carry out terrorist acts outside the framework of a state of war. The most common image of terrorism is that it is carried out by small and secretive cells , highly motivated to serve
14784-800: The state apparatus of in opposition to the state are most commonly referred to as a "terrorist" in the media. According to the Global Terrorism Database, the most active terrorist group in the period 1970 to 2010 was Shining Path (with 4,517 attacks), followed by Farabundo Marti National Liberation Front (FMLN), Irish Republican Army (IRA), Basque Fatherland and Freedom (ETA), Revolutionary Armed Forces of Colombia (FARC), Taliban , Liberation Tigers of Tamil Eelam , New People's Army , National Liberation Army of Colombia (ELN), and Kurdistan Workers Party (PKK). Israel has had problems with religious terrorism even before independence in 1948. During British mandate over Palestine ,
14916-441: The terrorists is only tenuous, and a case of guilt by association, that he was not involved in the plot, and that he was returning to India to see his wife and daughter. Haneef's father-in-law said the doctor wanted to take his wife and daughter back to Australia after getting the infant a passport, and so travelled without a return ticket. The AFP claimed in a court affidavit that Haneef, "had no explanation as to why he did not have
15048-486: The two terrorism suspects, his cousins: "On 2 July and 3 July 2007 Dr Haneef participated in a taped record of interview with the AFP and stated the following: Whilst in the UK he resided with suspects 1 and 2 (alleged suicide bomber Kafeel Ahmed and his brother Sabeel Ahmed), at 13 Bentley Road, Liverpool." In subsequent Immigration Department documents used to advise Australian Immigration Minister Kevin Andrews , senior public servant Peter White asserted: "Dr Haneef advised
15180-495: The type of economy within a country and ideology associated with terrorism. Many terrorists have a history of domestic violence. Terrorism is most common in nations with intermediate political freedom, and it is least common in the most democratic nations. Some examples of terrorism in non-democratic nations include ETA in Spain under Francisco Franco (although the group's activities increased sharply after Franco's death),
15312-424: The typology of terrorism may be defined are: According to the Global Terrorism Index by the University of Maryland, College Park , religious extremism has overtaken national separatism and become the main driver of terrorist attacks around the world. Since 9/11 there has been a five-fold increase in deaths from terrorist attacks. The majority of incidents over the past several years can be tied to groups with
15444-417: The user has access to, and four passwords: a personal identification number (PIN) for ordinary use, and a personal unblocking key (PUK) for PIN unlocking as well as a second pair (called PIN2 and PUK2 respectively) which are used for managing fixed dialing number and some other functionality. In Europe, the serial SIM number (SSN) is also sometimes accompanied by an international article number (IAN) or
15576-585: The world and the subsequent war against the pro-Soviet Afghans in the 1980s which blew back into Pakistan; the presence of Islamist insurgent groups and forces such as the Taliban and Lashkar-e-Taiba. On July 2, 2013, in Lahore , 50 Muslim scholars of the Sunni Ittehad Council (SIC) issued a collective fatwa against suicide bombings, the killing of innocent people, bomb attacks, and targeted killings declaring them as Haraam or forbidden. In 2015,
15708-550: The world's first commercial 2G GSM cell network that year. Today, SIM cards are considered ubiquitous, allowing over 8 billion devices to connect to cellular networks around the world daily. According to the International Card Manufacturers Association (ICMA), there were 5.4 billion SIM cards manufactured globally in 2016 creating over $ 6.5 billion in revenue for traditional SIM card vendors. The rise of cellular IoT and 5G networks
15840-437: The world's leading terrorism experts, did not hesitate to do so. A decade after Rapoport's article. Hoffman picked up the mantle and taking the three case studies as inspiration, he formulated a model of contemporary "holy terror" or, as he defined it, "terrorism motivated by a religious imperative". Completely distinct from "secular terrorists", Hoffman argued that "religious terrorists" carry out indiscriminate acts of violence as
15972-517: The years, much research has been conducted to distill a terrorist profile to explain these individuals' actions through their psychology and socio-economic circumstances. Some specialists highlight the lack of evidence supporting the idea that terrorists are typically psychologically disturbed. The careful planning and detailed execution seen in many terrorist acts are not characteristics generally associated with mentally unstable individuals. Others, like Roderick Hindery, have sought to discern profiles in
16104-455: Was Narodnaya Volya , founded in Russia in 1878 as a revolutionary anarchist group inspired by Sergei Nechayev and " propaganda by the deed " theorist Carlo Pisacane . The group developed ideas—such as targeted killing of the 'leaders of oppression', which were to become the hallmark of subsequent violence by small non-state groups, and they were convinced that the developing technologies of
16236-664: Was a modern phenomenon until David C. Rapoport published his seminal article Fear and Trembling: Terrorism in Three Religious Traditions in 1984. Rapoport proposed three case studies to demonstrate "ancient lineage" of religious terrorism, which he called "sacred terror": the "Thugs" , the Assassins and the Jewish Sicarii Zealots . Rapoport argued religious terrorism has been ongoing since ancient times and that "there are signs that it
16368-688: Was an exemplary act that symbolized the fight against an illegitimate government that was prepared to cede Jewish Holy Land to the Palestinians. Members of Kach , a Jewish ultranationalist party, employed terrorist tactics in pursuit of what they viewed as religious imperatives. Israel and a few other countries have designated the party as a terrorist group. Subscriber Identity Module SIMs are always used on GSM phones; for CDMA phones, they are needed only for LTE -capable handsets. SIM cards are also used in various satellite phones , smart watches, computers, or cameras. The first SIM cards were
16500-488: Was arrested. Australia also revoked the visa of Firdous Arshiya; they did not provide a reason for the cancellation. Australian authorities charged Haneef under Section 102.7(2) of the Criminal Code Act 1995. An offence under this section of the Act carries a maximum penalty of 15 years in prison. The basis of the charge was the allegation that he had intentionally provided support to an organisation, deemed to be
16632-707: Was found in the wreckage of the Jeep Cherokee used in the Glasgow attack. It was subsequently reported by The Australian newspaper and ABC's AM program that the veracity of these claims are questionable, and that the SIM card was found in Liverpool at Sabeel Ahmed's residence. The handling of the case by the Australian Federal Police (AFP) and the Department of Public Prosecutions (DPP) has been criticised by Victorian Supreme Court Judge (then criminal lawyer) Lex Lasry , and former chairman of
16764-454: Was not accepted. In 2006, it was estimated that there were over 109 different definitions of terrorism. Early published studies like Paul Wilkinson considered terrorism a product of 19th-century revolutionary politics. Technological developments like the pistol and dynamite made possible the relentless onslaught of successful attacks and assassinations that shook the 19th-century. Scholars of terrorism had largely assumed that terrorism
16896-501: Was not disclosed, but was described by sources as "substantial". Raised a Muslim, Haneef is from Mudigere , in the coffee-rich Chikkamagaluru district of the state of Karnataka in India, where his late father, Shami Khaleel, was a teacher. Haneef's father died in a road accident when he was 18. Shortly after this Haneef moved with his family to Bangalore, and completed his pre-university certification course at SDM College in Ujire in
17028-609: Was originally used to describe the actions of the Jacobin Club during the " Reign of Terror " in the French Revolution . "Terror is nothing other than justice, prompt, severe, inflexible", said Jacobin leader Maximilien Robespierre . In 1795, Edmund Burke denounced the Jacobins for letting "thousands of those hell-hounds called Terrorists ... loose on the people" of France. John Calvin 's rule over Geneva in
17160-564: Was overturned by the Federal Court on 21 August 2007, with the decision being reiterated by the full bench of the court on 21 December 2007, resulting in Haneef having his Australian visa returned. In December 2010, Haneef returned to Australia to seek damages for loss of income, interruption of his professional work, and emotional distress. He was awarded compensation from the Australian government. The amount of compensation awarded
17292-611: Was predicted by Ericsson to drive the growth of the addressable market for SIM cards to over 20 billion devices by 2020. The introduction of embedded-SIM (eSIM) and remote SIM provisioning (RSP) from the GSMA may disrupt the traditional SIM card ecosystem with the entrance of new players specializing in "digital" SIM card provisioning and other value-added services for mobile network operators. There are three operating voltages for SIM cards: 5 V , 3 V and 1.8 V ( ISO/IEC 7816 -3 classes A, B and C, respectively). The operating voltage of
17424-797: Was summoned to the Ministry of External Affairs , and told of India's concern over the way Haneef was being treated. This came after Haneef's wife complained to the Prime Minister of India . The Ministry of External Affairs spokesman Navtej Sarna said, "The ministry expressed its concern to the Australian government that Dr Mohammed Haneef should be treated fairly and justly under Australian law ". The Indian high commission in Canberra helped Haneef's family arrange legal assistance. India twice sought consular access to Dr Haneef. A minister of
#485514