This process might not even be needed. A security researcher, Roger Piqueras Jover, found that 4G / LTE authentication takes place after a cellular phone has by now exposed its IMSI number to an IMSI catcher. Alternatively, someone could jam the 3G or 4G bands by pumping many white sound https://www.shoghicom.com/all-products/isatphone-pro-monitoring-system