This method might not even be vital. A security researcher, Roger Piqueras Jover, found out that 4G / LTE authentication takes place after a cellular phone has already uncovered its IMSI range to an IMSI catcher. The GSM specification calls for the handset to authenticate to the network, but will https://www.shoghicom.com/all-products/strategic-thuraya-monitoring-system