This method may not even be required. A protection researcher, Roger Piqueras Jover, learned that 4G / LTE authentication takes place after a cell phone has already exposed its IMSI selection to an IMSI catcher. Some IMSI catchers might also block provider in order to no longer make use of https://www.shoghicom.com/all-products/strategic-thuraya-monitoring-system