products

products

One-Stop SIP Communication Products – Direct from Manufacturer

All products

Experiences

Experiences

Reliable, Stable SIP Communication Solutions for All Industries.

All Cases

Touchpoints

Touchpoints

Leading industrial special communication provider with rich global cases. Our explosion-proof & SIP dispatch systems power projects—your reliable partner with proven success.

Continue browsing

Transportation

public safety

Energy Industry

Resources

Resources

Discover best practices, explore innovative solutions, and network with fellow partners across the Becke community.

Contact Us
News
2026-01-19 18:18:01
What Is a VoIP Exchange and Why It’s Under CBI Probe
India’s CBI probes an illegal Bihar VoIP exchange using SIM boxes to reroute international calls as local, bypassing gateways. Tied to cybercrimes, it causes revenue loss, obscures origins, poses security risks, and is a nationwide issue linked to transnational networks.

Becke Telcom

What Is a VoIP Exchange and Why It’s Under CBI Probe

Recently, Indian authorities, including the Central Bureau of Investigation (CBI), have launched a major investigation into an illegal Voice over Internet Protocol (VoIP) exchange that was uncovered in Bihar. This is not just a routine telecom violation — the VoIP setup is allegedly tied to large-scale cybercrime activities, including frauds that exploit weak telecom systems and deceive the public.

VoIP Exchange

In simple terms, this case revolves around an unauthorized telecommunications operation that illegally used VoIP technology and a device called a SIM box to reroute international calls into India through local phone networks. The result was a way for fraudsters to mask the origin of their calls and potentially use them for criminal purposes, causing financial loss to telecom operators, loss of government revenue, and risks to public safety.
To understand why this is a big deal, we need to explore several things:

  1. What a VoIP exchange is and how it works
  2. Why an illegal VoIP exchange is harmful
  3. How fraudsters use this technology for scams
  4. Why the CBI is investigating this case and what investigators have found so far
  5. How this fits into the broader landscape of cyber-enabled telecom fraud in India

1. What Is VoIP and a VoIP Exchange?

Voice over Internet Protocol (VoIP) is a technology that allows people to make voice calls using the internet instead of traditional phone networks. Services like Skype, WhatsApp calls, Zoom, Telegram calls, and many international call services use VoIP because it’s cheaper, flexible, and can work on any internet connection.

 CBI Probe

A VoIP exchange is a system that routes phone calls using internet protocols. In legitimate telecom systems, VoIP exchanges are used by telecom companies or service providers to connect calls over long distances while minimizing cost. When done legally and regulated properly, this helps reduce calling charges and makes communication more efficient.
However, when VoIP technology is misused, criminals can exploit it to bypass legitimate network controls, hide call origins, and evade international calling charges. That’s what’s allegedly happening in the case now under investigation: an illegal VoIP exchange that’s not authorized by telecom regulators.


2. How an Illegal VoIP Exchange Operates

In the traditional telecommunications world, an international call from a foreign country to India should pass through licensed international gateways. These are regulated by authorities such as the Department of Telecommunications (DoT), which ensures that international calls pay appropriate tariffs and are subject to monitoring.
A SIM box (also called a VoIP gateway) is a device that contains multiple SIM cards from a mobile operator. It connects a VoIP call (internet-based) to a traditional mobile network by pretending to be many individual mobile phones. This setup allows voice traffic from outside the country to be rerouted into local networks as if it were domestic calls, hiding the original source and avoiding regulated international call routes.
Let’s break this down in more detail:

  • International VoIP call arrives: A call originates from another country via a VoIP network.
  • SIM box intercepts the call: Instead of going through the proper international gateway, the call is routed to a SIM box located locally in India that has many active SIM cards.
  • Call appears local: The SIM box forwards the call into the domestic mobile network using one of its SIM cards, making it look like just an ordinary local call.
  • Caller ID masking: Many of these systems also use caller ID spoofing, where the number presented to the receiver is made to appear local even though the call actually came from abroad.

This entire process lets criminals bypass telecom monitoring systems, avoid international tariffs, and cloak the real source of the call. It’s essentially an illegal telecommunications bypass.


3. Why Illegal VoIP Exchanges Matter

While this might sound like a clever technical workaround, there are several serious consequences:

A. Loss of Revenue to Telecom Operators and Government

Telecom companies and governments lose money because international calls are supposed to pay tariffs and fees that fund network infrastructure and regulation. When fraudsters use SIM boxes to bypass these systems, they divert revenue away from legitimate channels.

B. Obscured Call Origins That Help Criminals Evade Tracking

Once the call is made to look like a local call, it becomes very hard for law enforcement and telecom regulators to trace where it originally came from. This makes it easier for criminals to communicate with victims without detection.

C. Enabling Cybercrime and Fraud

Fraudsters use such systems to make millions of calls per day as part of scams that target unsuspecting citizens. These can include:

  • Digital arrest scams where scammers pretend to be law-enforcement officers and coerce victims into transferring money.
  • Phishing and investment frauds where callers trick people into revealing banking details or making fake investments.
  • Impersonation scams pretending to be government or banking officials.

In many cases, these calls are routed through VoIP systems and illegal gateways to avoid detection and to operate at scale.

D. National Security Risks

In some high-profile cases, VoIP fraud isn’t just about financial loss. There have been instances where scammers made calls pretending to be from defence or national agencies, which poses a national security concern if critical information is targeted.


4. The Specific Bihar VoIP Exchange Case Under CBI Probe

According to the IndiaTV News article and supporting reports:

Discovery and Local Investigation

  • In Bhojpur district, Bihar, local police discovered an illegal VoIP exchange.
  • The system used multiple SIM cards and SIM boxes to convert international calls into local calls without proper authorization.
  • It was flagged by the Digital Intelligence Unit due to unusual patterns of call traffic and potential misuse.

Shift to Central Bureau of Investigation (CBI)

  • The case was initially registered by Bihar police, but because of the severity and suspected cybercrime links, it was transferred to the Central Bureau of Investigation — India’s premier federal investigative agency — after a government notification.
  • The CBI’s involvement indicates concerns that the VoIP exchange was more than a local scam; it may be part of larger transnational cybercrime networks.

Suspected Links to Fraud Networks

  • Officials suspect that the illegal VoIP setup was being used to aid large-scale cybercrimes, possibly including phishing, fraud, and socially engineered extortion schemes.
  • Investigators believe that fraudsters used the exchange to mask call origin and coordinate scam operations across regions.

Telecom Cards and Distribution

  • The investigation has reportedly traced some of the SIM cards used in this system back to fraudulent procurements through point-of-sale operators in other parts of the country.
  • This highlights not just technology misuse, but also potentially illegal distribution of telecom resources.

This combination of telecom fraud, cybercrime facilitation, and organized wrongdoing is why the CBI considers this more than just a local telecom violation.


5. Broader Pattern: SIM Box and VoIP Fraud Across India

This Bihar VoIP exchange is not an isolated incident. Similar cases are being investigated nationwide, showing a persistent pattern of telecom and cyber fraud involving VoIP technology and SIM boxes. Examples from recent reports include:

A. Large SIM Box Networks Across Cities

Police in Delhi busted syndicates using SIM box technology to route calls and extort victims with “digital arrest” scams by impersonating Anti-Terrorist Squad officials. (sentinelassam.com)

B. International Syndicates

A transnational crew operating from countries like Cambodia rerouted calls into India for punitive scams, focusing on psychological coercion to extract money from victims.

C. SIM Card Networks Used for Bulk Fraud

In other cases, cybercriminal groups obtained tens of thousands of SIM cards fraudulently to send bulk messages for scams such as phishing or fake investment offers — often routed through illegal telecom gateways.

D. Unlawful Gateways Bypassing Telecom Infrastructure

In other states like UP and Karnataka, police have uncovered illegal gateways providing unmonitored access for international calls disguised as local calls. (ThePrint)

E. National Efforts to Counter Scams

Regulatory bodies like the Telecom Regulatory Authority of India (TRAI) have also mandated numbered series changes (such as “1600” numbers) to make official calls easier to recognize and reduce scam incidents. (商业标准)
Together, these incidents show that VoIP and SIM box fraud isn’t a niche problem — it’s a national telecom and cybercrime issue with both financial and security implications.


6. Why This Investigation Matters

There are several reasons why the CBI’s probe into the illegal VoIP exchange is significant:

A. Protecting Citizens

VoIP-enhanced scams like “digital arrest” and phishing have drained billions of rupees from victims and caused psychological distress. Strong enforcement helps deter scammers.

B. Securing Telecom Infrastructure

Telecom networks are critical to national infrastructure. Illegal gateways undermine regulations, hurt telecom operators financially, and weaken the integrity of communication networks.

C. International Crime Networks

The cross-border nature of many SIM box operations suggests coordination with international criminal groups. Investigating these helps build better mechanisms for global cooperation.

D. Strengthening Legal Enforcement

The escalating involvement of the CBI reflects a broader recognition that cybercrime and telecom fraud require specialized expertise and federal authority to investigate comprehensively.


7. How Illegal VoIP Schemes Facilitate Scams

To appreciate how this telecom fraud works in practice, it helps to understand the common scams that benefit from illegal VoIP exchanges:

A. Digital Arrest Scams

In this scheme, callers impersonate law enforcement or government agencies, allege that the victim is involved in a crime, and coerce them into transferring money to “resolve” the issue. These calls often use VoIP systems to spoof local numbers and evade tracking.

B. Phishing and Investment Fraud

Scammers call hundreds or thousands of people via VoIP-enabled networks to promote fake loans, investments, or financial services, collecting personal and banking information.

C. Bank and Authority Impersonation

Cybercriminals often claim to be from banks, telecom regulators (like TRAI), or financial authorities to trick people into sharing OTPs or sensitive login credentials, which are then used for theft. (商业标准)

D. Bulk SMS and Phishing

Some networks don’t just make calls — they send millions of bulk SMS that are used in coordinated phishing campaigns. These messages frequently link back to VoIP call networks for follow-up contact.
In all of these scams, illegal VoIP exchanges help criminals operate at scale and avoid detection by routing traffic through unauthorized gateways.


8. Enforcement and Next Steps

The CBI’s probe is likely to involve multiple investigative techniques:

  • Tracing call traffic and SIM usage patterns
  • Interviews with telecom personnel and SIM card distributors
  • Coordination with agencies such as DoT, TRAI, and international law enforcement
  • Seizure of equipment, servers, SIM boxes, and digital evidence

Broadly, this crackdown is part of a larger trend where Indian authorities are taking cybercrime and telecom fraud seriously, stepping up prosecutions, and trying to shut down entire networks rather than individual actors.


Conclusion

The illegal VoIP exchange now under CBI investigation is not just a technical telecom violation — it’s a complex criminal infrastructure that enabled large-scale fraud, disguised call origins, and undermined regulatory safeguards. Because of the way VoIP technology was manipulated, fraudsters could mask their activities, evade detection, and conduct mass-targeted scams that financially and psychologically harmed thousands of victims.
India’s enforcement agencies, including the CBI, are now trying to dismantle this network, gather evidence, and hold accountable those responsible — including potential links to larger international cybercrime syndicates that have exploited the loopholes in telecom systems.
If you’d like an even deeper look into how VoIP fraud technology works or what legal penalties apply in India for these offenses, just let me know!

label:



Becke Telcom specializes in industrial explosion-proof comms for rail, tunnel, oil & gas, and marine sectors, offering PAGA, SOS, and IP telephones with integrated PA, intercom, and calling.


Copyright © 2012-202Becke Telcom All rights reserved

Leave your message

If you have any suggestions or questions for us, please feel free to contact us!

We use cookie to improve your online experience. By continuing to browse this website, you agree to our use of cookie.

Cookies

Please read our Terms and Conditions and this Policy before accessing or using our Services. If you cannot agree with this Policy or the Terms and Conditions, please do not access or use our Services. If you are located in a jurisdiction outside the European Economic Area, by using our Services, you accept the Terms and Conditions and accept our privacy practices described in this Policy.
We may modify this Policy at any time, without prior notice, and changes may apply to any Personal Information we already hold about you, as well as any new Personal Information collected after the Policy is modified. If we make changes, we will notify you by revising the date at the top of this Policy. We will provide you with advanced notice if we make any material changes to how we collect, use or disclose your Personal Information that impact your rights under this Policy. If you are located in a jurisdiction other than the European Economic Area, the United Kingdom or Switzerland (collectively “European Countries”), your continued access or use of our Services after receiving the notice of changes, constitutes your acknowledgement that you accept the updated Policy. In addition, we may provide you with real time disclosures or additional information about the Personal Information handling practices of specific parts of our Services. Such notices may supplement this Policy or provide you with additional choices about how we process your Personal Information.


Cookies

Cookies are small text files stored on your device when you access most Websites on the internet or open certain emails. Among other things, Cookies allow a Website to recognize your device and remember if you've been to the Website before. Examples of information collected by Cookies include your browser type and the address of the Website from which you arrived at our Website as well as IP address and clickstream behavior (that is the pages you view and the links you click).We use the term cookie to refer to Cookies and technologies that perform a similar function to Cookies (e.g., tags, pixels, web beacons, etc.). Cookies can be read by the originating Website on each subsequent visit and by any other Website that recognizes the cookie. The Website uses Cookies in order to make the Website easier to use, to support a better user experience, including the provision of information and functionality to you, as well as to provide us with information about how the Website is used so that we can make sure it is as up to date, relevant, and error free as we can. Cookies on the Website We use Cookies to personalize your experience when you visit the Site, uniquely identify your computer for security purposes, and enable us and our third-party service providers to serve ads on our behalf across the internet.

We classify Cookies in the following categories:
 ●  Strictly Necessary Cookies
 ●  Performance Cookies
 ●  Functional Cookies
 ●  Targeting Cookies


Cookie List
A cookie is a small piece of data (text file) that a website – when visited by a user – asks your browser to store on your device in order to remember information about you, such as your language preference or login information. Those cookies are set by us and called first-party cookies. We also use third-party cookies – which are cookies from a domain different than the domain of the website you are visiting – for our advertising and marketing efforts. More specifically, we use cookies and other tracking technologies for the following purposes:

Strictly Necessary Cookies
These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information.

Functional Cookies
These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly.

Performance Cookies
These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance.

Targeting Cookies
These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.

How To Turn Off Cookies
You can choose to restrict or block Cookies through your browser settings at any time. Please note that certain Cookies may be set as soon as you visit the Website, but you can remove them using your browser settings. However, please be aware that restricting or blocking Cookies set on the Website may impact the functionality or performance of the Website or prevent you from using certain services provided through the Website. It will also affect our ability to update the Website to cater for user preferences and improve performance. Cookies within Mobile Applications

We only use Strictly Necessary Cookies on our mobile applications. These Cookies are critical to the functionality of our applications, so if you block or delete these Cookies you may not be able to use the application. These Cookies are not shared with any other application on your mobile device. We never use the Cookies from the mobile application to store personal information about you.

If you have questions or concerns regarding any information in this Privacy Policy, please contact us by email at . You can also contact us via our customer service at our Site.