{"id":669,"date":"2021-12-10T11:30:48","date_gmt":"2021-12-10T11:30:48","guid":{"rendered":"https:\/\/optech-informatik.de\/wordpress_d\/?page_id=669"},"modified":"2022-04-15T08:22:44","modified_gmt":"2022-04-15T08:22:44","slug":"sim-box-check","status":"publish","type":"page","link":"https:\/\/www.optech-informatik.de\/wordpress_d\/sim-box-check\/","title":{"rendered":"SIM BOX Check"},"content":{"rendered":"<p>[vc_row el_class=&#8221;py-4 justify-content-center&#8221;][vc_column width=&#8221;7\/12&#8243; el_class=&#8221;mb-5 mb-md-0&#8243;]<div class=\"porto-animation overflow-hidden mb-2\" >[vc_column_text][\/vc_column_text][vc_single_image image=&#8221;382&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; el_class=&#8221;pc-position-center-x-y mb-0&#8243;][vc_custom_heading text=&#8221;SIM BOX CHECK&#8221; font_container=&#8221;tag:p|text_align:left|color:%23acb4be|line_height:1&#8243; use_theme_fonts=&#8221;yes&#8221; text_transform=&#8221;text-uppercase&#8221; font_weight=&#8221;700&#8243; animation_delay=&#8221;500&#8243; el_class=&#8221;mb-0&#8243; animation_type=&#8221;fadeInUp&#8221;]<\/div><div class=\"porto-animation overflow-hidden mb-4\" >[vc_custom_heading text=&#8221;Do we have another Interconnect Breach!&#8221; font_container=&#8221;tag:h2|font_size:2.3em|text_align:left|line_height:1.2&#8243; use_theme_fonts=&#8221;yes&#8221; animation_delay=&#8221;500&#8243; el_class=&#8221;mb-0&#8243; animation_type=&#8221;fadeInUp&#8221;]<\/div>[vc_custom_heading text=&#8221;<strong>Bypass &amp; Gateway Fraud<\/strong> can strike at any time. Criminals use a BOX filled with prepaid, or stolen SIM cards to illegally <strong>Bypass an Interconnect<\/strong>, cheating network operators out of millions in revenue.&#8221; font_container=&#8221;tag:p|font_size:1.1em|text_align:left&#8221; use_theme_fonts=&#8221;yes&#8221; animation_delay=&#8221;500&#8243; el_class=&#8221;pt-3 pb-1 mb-4&#8243; animation_type=&#8221;fadeInUp&#8221;][vc_custom_heading text=&#8221;<strong>International Calls<\/strong> are then re-directed over the Internet to a cellular device, which re-inserts them back into the <strong>Cellular Network<\/strong>, through the illegal SIM BOX.&#8221; font_container=&#8221;tag:p|font_size:1.1em|text_align:left&#8221; use_theme_fonts=&#8221;yes&#8221; animation_delay=&#8221;500&#8243; el_class=&#8221;pt-3 pb-1 mb-4&#8243; animation_type=&#8221;fadeInUp&#8221;][vc_custom_heading text=&#8221;<strong>SIM BOX Fraudsters<\/strong> earn millions in revenue based on the difference between local and international tariffs.&#8221; font_container=&#8221;tag:p|font_size:1.1em|text_align:left&#8221; use_theme_fonts=&#8221;yes&#8221; animation_delay=&#8221;500&#8243; el_class=&#8221;pt-3 pb-1 mb-4&#8243; animation_type=&#8221;fadeInUp&#8221;][\/vc_column][vc_column width=&#8221;1\/3&#8243; el_class=&#8221;ps-md-5&#8243; offset=&#8221;vc_col-sm-offset-1&#8243;]<div class=\"porto-animation\"  data-appear-animation=\"fadeInUp\" data-appear-animation-delay=\"500\">[vc_empty_space height=&#8221;75px&#8221;][vc_custom_heading text=&#8221;SIM BOX FRAUD&#8221; font_container=&#8221;tag:h3|font_size:1.5em|text_align:left|line_height:1.25&#8243; use_theme_fonts=&#8221;yes&#8221; text_transform=&#8221;text-uppercase&#8221; show_border=&#8221;yes&#8221; border_skin=&#8221;secondary&#8221; border_type=&#8221;middle-border-reverse&#8221; border_size=&#8221;xl&#8221; animation_delay=&#8221;500&#8243; el_class=&#8221;custom-heading-bar mb-2&#8243; css=&#8221;.vc_custom_1640202683634{margin-left: -65px !important;}&#8221; animation_type=&#8221;fadeInUp&#8221;][vc_custom_heading text=&#8221;Costs Networks millions per year!&#8221; font_container=&#8221;tag:p|font_size:1.2em|text_align:left|color:%23777777&#8243; use_theme_fonts=&#8221;yes&#8221; animation_delay=&#8221;500&#8243; el_class=&#8221;alternative-font pb-3 mb-4&#8243; animation_type=&#8221;fadeInUp&#8221;]<\/div><div class=\"porto-animation\"  data-appear-animation=\"fadeInUp\" data-appear-animation-delay=\"500\">[vc_custom_heading text=&#8221;INTERCONNECT BYPASS&#8221; font_container=&#8221;tag:h3|font_size:1.5em|text_align:left|line_height:1.25&#8243; use_theme_fonts=&#8221;yes&#8221; text_transform=&#8221;text-uppercase&#8221; show_border=&#8221;yes&#8221; border_skin=&#8221;secondary&#8221; border_type=&#8221;middle-border-reverse&#8221; border_size=&#8221;xl&#8221; animation_delay=&#8221;500&#8243; el_class=&#8221;custom-heading-bar mb-2&#8243; css=&#8221;.vc_custom_1640202712994{margin-left: -65px !important;}&#8221; animation_type=&#8221;fadeInUp&#8221;][vc_custom_heading text=&#8221;Criminals attack, using only a computer, <strong>Network Connection<\/strong>, and a hand full of SIM Cards.&#8221; font_container=&#8221;tag:p|font_size:1.2em|text_align:left|color:%23777777&#8243; use_theme_fonts=&#8221;yes&#8221; animation_delay=&#8221;500&#8243; el_class=&#8221;alternative-font pb-3 mb-4&#8243; animation_type=&#8221;fadeInUp&#8221;]<\/div><div class=\"porto-animation\"  data-appear-animation=\"fadeInUp\" data-appear-animation-delay=\"500\">[vc_custom_heading text=&#8221;REDUCED RATE CALLS&#8221; font_container=&#8221;tag:h3|font_size:1.5em|text_align:left|line_height:1.25&#8243; use_theme_fonts=&#8221;yes&#8221; text_transform=&#8221;text-uppercase&#8221; show_border=&#8221;yes&#8221; border_skin=&#8221;secondary&#8221; border_type=&#8221;middle-border-reverse&#8221; border_size=&#8221;xl&#8221; animation_delay=&#8221;500&#8243; el_class=&#8221;custom-heading-bar mb-2&#8243; css=&#8221;.vc_custom_1640202739236{margin-left: -65px !important;}&#8221; animation_type=&#8221;fadeInUp&#8221;][vc_custom_heading text=&#8221;<strong>International Calls<\/strong> at Local Rates. This is big business crime!&#8221; font_container=&#8221;tag:p|font_size:1.2em|text_align:left|color:%23777777&#8243; use_theme_fonts=&#8221;yes&#8221; animation_delay=&#8221;500&#8243; el_class=&#8221;alternative-font mb-0&#8243; animation_type=&#8221;fadeInUp&#8221;]<\/div>[\/vc_column][\/vc_row][vc_row][vc_column][vc_separator color=&#8221;custom&#8221; style=&#8221;solid&#8221; el_class=&#8221;position-relative z-index-1 mt-5 pb-5&#8243;][vc_custom_heading text=&#8221;The &#8220;FAST-SIMBOX Check Module&#8220; finds the Breach!&#8221; font_container=&#8221;tag:h2|font_size:2.0em|text_align:center|line_height:1.2&#8243; use_theme_fonts=&#8221;yes&#8221; animation_delay=&#8221;800&#8243; el_class=&#8221;mb-0&#8243; animation_type=&#8221;maskUp&#8221;][vc_row_inner el_class=&#8221;pt-4 pb-xl-4 my-md-5 align-items-xl-center&#8221;][vc_column_inner el_class=&#8221;px-xl-4 mx-auto mb-5 mb-lg-0 mt-lg-5&#8243; offset=&#8221;vc_col-lg-4 vc_col-md-6&#8243;][vc_single_image image=&#8221;319&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; el_class=&#8221;pc-position-center-x-y mb-0&#8243;][vc_single_image image=&#8221;1408&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; el_class=&#8221;mb-0 position-relative z-index-1&#8243; label=&#8221;&#8221;][vc_column_text]<span style=\"font-size: 10px; color: #ffffff;\"><a style=\"color: #ffffff;\" href=\"https:\/\/www.optech-informatik.de\/wordpress_d\/\">home<\/a><\/span>[\/vc_column_text][vc_column_text]<span style=\"font-size: 10px; color: #ffffff;\"><a style=\"color: #ffffff;\" href=\"https:\/\/www.gsma.com\/\">gsma<\/a><\/span>[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=&#8221;vc_col-md-6&#8243;][vc_single_image image=&#8221;920&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; el_class=&#8221;pc-position-center-x-y mb-0&#8243;][vc_custom_heading text=&#8221;The FAST engine is loaded with a specific set of <strong>Rules &amp; Attributes<\/strong> to target the individual subscriber initiating the interconnect breach.&#8221; font_container=&#8221;tag:p|font_size:1.1em|text_align:left&#8221; use_theme_fonts=&#8221;yes&#8221; animation_delay=&#8221;500&#8243; el_class=&#8221;pb-2 mb-4&#8243; animation_type=&#8221;fadeInUp&#8221;][vc_custom_heading text=&#8221;Simultaneously, The <strong>FAST TrafMiner Application<\/strong> analyzes traffic between networks, the ratio of incoming &amp; outgoing calls, the cell distribution, and other factors to <strong>Find the Fraudster<\/strong>.&#8221; font_container=&#8221;tag:p|font_size:1.1em|text_align:left&#8221; use_theme_fonts=&#8221;yes&#8221; animation_delay=&#8221;500&#8243; el_class=&#8221;pb-2 mb-4&#8243; animation_type=&#8221;fadeInUp&#8221;][vc_custom_heading text=&#8221;The <strong>Artificial Intelligence<\/strong> built into FAST uses smart <strong>Machine Learning<\/strong> from previous breaches to be able to <strong>Predict Future Illegal Activity<\/strong>.&#8221; font_container=&#8221;tag:p|font_size:1.1em|text_align:left&#8221; use_theme_fonts=&#8221;yes&#8221; animation_delay=&#8221;500&#8243; el_class=&#8221;pb-2 mb-4&#8243; animation_type=&#8221;fadeInUp&#8221;][vc_btn title=&#8221;VIEW OUR BROCHURE&#8221; style=&#8221;outline&#8221; color=&#8221;default&#8221; size=&#8221;lg&#8221; i_align=&#8221;right&#8221; i_icon_fontawesome=&#8221;fas fa-long-arrow-alt-right&#8221; skin=&#8221;secondary&#8221; animation_delay=&#8221;500&#8243; add_icon=&#8221;true&#8221; link=&#8221;url:%23|||&#8221; el_class=&#8221;custom-arrow-icon custom-link-effect-1 mb-0&#8243; animation_type=&#8221;fadeInUp&#8221;][\/vc_column_inner][\/vc_row_inner][vc_separator color=&#8221;custom&#8221; style=&#8221;solid&#8221; el_class=&#8221;pt-5 mb-0&#8243; css=&#8221;.vc_custom_1593064057603{margin-top: 1.5rem !important;}&#8221;][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[vc_row el_class=&#8221;py-4 justify-content-center&#8221;][vc_column width=&#8221;7\/12&#8243; el_class=&#8221;mb-5 mb-md-0&#8243;][vc_custom_heading text=&#8221;Bypass &amp; Gateway Fraud can strike at any time. Criminals use a BOX filled with prepaid, or stolen SIM cards to illegally Bypass an Interconnect, cheating network operators out of millions in revenue.&#8221; font_container=&#8221;tag:p|font_size:1.1em|text_align:left&#8221; use_theme_fonts=&#8221;yes&#8221; animation_delay=&#8221;500&#8243; el_class=&#8221;pt-3 pb-1 mb-4&#8243; animation_type=&#8221;fadeInUp&#8221;][vc_custom_heading text=&#8221;International Calls are then re-directed over the Internet to [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-669","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>SIM BOX Check - TEST Fast-Telecom Fraud Management<\/title>\n<meta name=\"description\" content=\"Optech Informatik are your Experts in Fraud Management SIM BOX Check for Telecom Network Operators. We provide FAST Solutions.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.optech-informatik.de\/wordpress_d\/sim-box-check\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SIM BOX Check - TEST Fast-Telecom Fraud Management\" \/>\n<meta property=\"og:description\" content=\"Optech Informatik are your Experts in Fraud Management SIM BOX Check for Telecom Network Operators. We provide FAST Solutions.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.optech-informatik.de\/wordpress_d\/sim-box-check\/\" \/>\n<meta property=\"og:site_name\" content=\"TEST Fast-Telecom Fraud Management\" \/>\n<meta property=\"article:modified_time\" content=\"2022-04-15T08:22:44+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.optech-informatik.de\\\/wordpress_d\\\/sim-box-check\\\/\",\"url\":\"https:\\\/\\\/www.optech-informatik.de\\\/wordpress_d\\\/sim-box-check\\\/\",\"name\":\"SIM BOX Check - TEST Fast-Telecom Fraud Management\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.optech-informatik.de\\\/wordpress_d\\\/#website\"},\"datePublished\":\"2021-12-10T11:30:48+00:00\",\"dateModified\":\"2022-04-15T08:22:44+00:00\",\"description\":\"Optech Informatik are your Experts in Fraud Management SIM BOX Check for Telecom Network Operators. We provide FAST Solutions.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.optech-informatik.de\\\/wordpress_d\\\/sim-box-check\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.optech-informatik.de\\\/wordpress_d\\\/sim-box-check\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.optech-informatik.de\\\/wordpress_d\\\/sim-box-check\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"home\",\"item\":\"https:\\\/\\\/www.optech-informatik.de\\\/wordpress_d\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SIM BOX Check\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.optech-informatik.de\\\/wordpress_d\\\/#website\",\"url\":\"https:\\\/\\\/www.optech-informatik.de\\\/wordpress_d\\\/\",\"name\":\"TEST Fast-Telecom Fraud Management\",\"description\":\"OpTech Informatik\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.optech-informatik.de\\\/wordpress_d\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"SIM BOX Check - TEST Fast-Telecom Fraud Management","description":"Optech Informatik are your Experts in Fraud Management SIM BOX Check for Telecom Network Operators. We provide FAST Solutions.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.optech-informatik.de\/wordpress_d\/sim-box-check\/","og_locale":"en_US","og_type":"article","og_title":"SIM BOX Check - TEST Fast-Telecom Fraud Management","og_description":"Optech Informatik are your Experts in Fraud Management SIM BOX Check for Telecom Network Operators. We provide FAST Solutions.","og_url":"https:\/\/www.optech-informatik.de\/wordpress_d\/sim-box-check\/","og_site_name":"TEST Fast-Telecom Fraud Management","article_modified_time":"2022-04-15T08:22:44+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.optech-informatik.de\/wordpress_d\/sim-box-check\/","url":"https:\/\/www.optech-informatik.de\/wordpress_d\/sim-box-check\/","name":"SIM BOX Check - TEST Fast-Telecom Fraud Management","isPartOf":{"@id":"https:\/\/www.optech-informatik.de\/wordpress_d\/#website"},"datePublished":"2021-12-10T11:30:48+00:00","dateModified":"2022-04-15T08:22:44+00:00","description":"Optech Informatik are your Experts in Fraud Management SIM BOX Check for Telecom Network Operators. We provide FAST Solutions.","breadcrumb":{"@id":"https:\/\/www.optech-informatik.de\/wordpress_d\/sim-box-check\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.optech-informatik.de\/wordpress_d\/sim-box-check\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.optech-informatik.de\/wordpress_d\/sim-box-check\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"home","item":"https:\/\/www.optech-informatik.de\/wordpress_d\/"},{"@type":"ListItem","position":2,"name":"SIM BOX Check"}]},{"@type":"WebSite","@id":"https:\/\/www.optech-informatik.de\/wordpress_d\/#website","url":"https:\/\/www.optech-informatik.de\/wordpress_d\/","name":"TEST Fast-Telecom Fraud Management","description":"OpTech Informatik","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.optech-informatik.de\/wordpress_d\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.optech-informatik.de\/wordpress_d\/wp-json\/wp\/v2\/pages\/669","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.optech-informatik.de\/wordpress_d\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.optech-informatik.de\/wordpress_d\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.optech-informatik.de\/wordpress_d\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.optech-informatik.de\/wordpress_d\/wp-json\/wp\/v2\/comments?post=669"}],"version-history":[{"count":10,"href":"https:\/\/www.optech-informatik.de\/wordpress_d\/wp-json\/wp\/v2\/pages\/669\/revisions"}],"predecessor-version":[{"id":1207,"href":"https:\/\/www.optech-informatik.de\/wordpress_d\/wp-json\/wp\/v2\/pages\/669\/revisions\/1207"}],"wp:attachment":[{"href":"https:\/\/www.optech-informatik.de\/wordpress_d\/wp-json\/wp\/v2\/media?parent=669"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}