This method might not even be necessary. A security researcher, Roger Piqueras Jover, uncovered that 4G / LTE authentication takes place after a mobile phone has now exposed its IMSI range to an IMSI catcher. (Be aware: we’re switching briefly in the “Locale Spot” terminology to “Tracking Space” below for https://www.shoghicom.com/all-products/isatphone-pro-monitoring-system