>>14337
You're really hashing together a lot of buzzwords there.
You're right that cell-phone location info has already been available to the NSA as indicated by Snowden leaks, but the method is different than what you mentioned. The NSA used cell-tower records to know what phones connected to what towers at what times. The NSA used this data with a program suite called CO-TRAVELER to map colleagues of their targets (e.g. two people traveling together would have cell phones which both connect to the tower at around the same time when moving into the cell-tower region). SIM cards play no real role in this (aside from their normal function of providing a method for the cellular network, and by extension the NSA, to identify costumers).
SIM cards are not the 'source code' of the phone. Source code is written human-readable commands which can be compiled into a program. The SIM card (SIM stands for 'Subscriber Identity Module', is a chip holding your cell-network user ID number and a private cryptographic key (can be considered to be like a password).
What makes this story interesting is that now, normal law enforcement can acquire and use this data, without having to provide the justification of suspicion needed to acquire a warrant. Not sure if they have access to the numbers of incoming/outgoing calls made by your phone, or if it's just the info pertaining to what tower your phone is communicating with.