The functioning examined, the security and the threats or vulnerabilities which it can show the communications made through mobile devices that they use the technology 2G (GSM) and 3G (UMTS), as well as the attacks in which they can see themselves exposed, it is considered that, in order to guarantee the confidentiality and the integrity of the sensitive personal information in its transmission through these mobile devices, it is necessary to employ software that allows the encipherment of this information in traffic of extreme in extreme.