This is made possible by out of date technology with no authentication for the end user (all the authentication in the system is designed to benefit the network operators only).