Visualização de leitura

Cargill deploys private 5G to aid factory AI and automation efforts

Connectivity at legacy facilities can present significant challenges for manufacturing companies seeking to optimize operations on the factory floor.

To remedy that, food production giant Cargill is tapping private 5G as a means for unlocking new levels of automation across its extensive system of factories, including the introduction of AI-powered robots.

NTT DATA’s private 5G network will provide the backbone for the company’s factory connectivity strategy, which was launched in March 2025 and covers 50 of its 1,100 facilities as of February 2026. The company plans to add private 5G to more than 100 sites per year.

The network provides Cargill with reliable, low-latency connectivity to smartphones and tablets on factory floors and has open the door to experiments with AI-powered robots, including its deployment of Boston Dymanics’ Spot at its Amsterdam facility to automate inspections. The four-legged robot checks for hazards such as overheating equipment and looks for ways to improve worker safety.

Spot roams the factory in a preset pattern and builds a database of information about the conditions it finds there, says Robert Greiner, Cargill’s director of platform engineering for customer, commercial, and business operations digital technology.

“It’ll do vibration tests, it’ll do air quality tests, it’ll do a whole bunch of different measures of what the plant should look like in normal conditions,” he adds. “Because it’s doing that same path every day, it then starts building a database of what normal looks like and what normal doesn’t look like.”

Cargill robotics on factory floor

Cargill

Cargill is exploring other ways to bring AI to its factory facilities, many of which are decades old, Greiner says. Reliable connectivity will enable the company to retrofit the buildings with modern sensors.

“Whether it’s a motor that turns or a mill, they generate heat, they have bearings, and they have failures,” he says. “5G has lit up a large area of those plants that didn’t have connectivity out there.”

More coverage

Cargill turned to NTT DATA and private 5G because of challenges with traditional Wi-Fi at many of its factories, Greiner says. In addition to covering a wider area than Wi-Fi routers, private 5G networking provides better connectivity through thick walls and other obstacles than public cellular networks, he notes.

“In the manufacturing environment, when you get outside of what I call a carpeted space, connectivity becomes an issue,” he adds. “Coming out of COVID, with Industry 4.0, there’s been a need for advanced connectivity out there in the plant floor, and our model was struggling to get that connectivity.”

Cargill can now deploy one private 5G network access point to cover the same area as about nine Wi-Fi access points.  And while private 5G assess points can cost more than Wi-Fi equipment, additional savings come during installation, with a 70% reduction in cabling and setup costs, Greiner says.

“In our environment we mostly have to run that cabling in conduits, and we have all that infrastructure cost that has to go into the factory floor to enable that access point toward the other side,” he says.

Meanwhile, private 5G gives the company more control over its networks than public cellular networks would, he adds.

“If you’re running on that public network and you’re in the middle of Nebraska, then the school lets out and the school bus pulls up next to the plant and every kid starts streaming data,” he says. “You’re relying on that connection to do some process, but that cell tower could be overrun by the school bus that just happens to be sitting there at that critical time.”

Pen and paper no more

Private 5G also will enable Cargill to update major software platforms and other apps in a secure and reliable way, Greiner says. The company has had several small warehouses sprinkled around the world with no connectivity, and private 5G deployments will allow them to install ERP systems.

“These dark warehouses didn’t have Wi-Fi in them, and they basically were using a No. 2 pencil and a yellow pad for keeping track of the inventory,” he says. “They’re moving to SAP, they have an inventory management system now, and they had the ability to switch over to an electronic inventory system, a warehousing system.”

Cargill took a smart approach to deploying private 5G by approaching it as foundational infrastructure rather than a single-use technology, says Parma Sandhu, vice president of enterprise 5G products and services at NTT.

“Instead of building networks for individual applications, the company deployed connectivity across facilities so multiple use cases — connected worker, robotics, sensors, inspections, and worker tools — can run on the same network,” Sandhu adds. “That approach allows new capabilities to be added over time without rebuilding the underlying connectivity.”

Private 5G can use several slices of the radio spectrum, and NTT DATA works with customers to find the best spectrum for their needs, Sandhu says. Connections can vary from sub-300Mbps to multigigabit speeds, depending on the spectrum used, but throughput isn’t the primary concern on most factory floors, he adds.

“In industrial environments, reliability and consistency matter more than peak speed,” Sandhu says. “Private 5G delivers high capacity and low latency, but the real advantage is secure, predictable connectivity across large facilities with thousands of connected devices. That reliability is what enables automation, robotics, and real-time monitoring on the factory floor.”

Private 5G is gaining traction in manufacturing as factories embrace generative AI, agentic AI, edge AI, and physical AI, Sandhu says. “There has been an explosion in demand for OT data, which requires more compute power and a faster, more reliable, and more secure connectivity,” he adds.

The factory use case

Private 5G makes sense in factory settings, says Jason Leigh, senior research manager for the mobility team at IT analyst firm IDC. While the gap is narrowing, private 5G has given factories more control over network performance than traditional Wi-Fi, and it is also built on a zero-trust security model, he adds.

“If you’re deploying a private network, you can pretty much tune it to say, ‘This network is always going to give me 100 megabits down, 50 megabits up,’” he says. “You can get a little better performance and control who comes on and off the network. “

While outsiders can access a Wi-Fi network if they have the password, private 5G can authenticate at the device SIM level, Leigh says. “It doesn’t matter if you have the password,” he adds.

Private 5G also has advantages as factories adopt more automation and other digital transformation initiatives, Leigh says. While smartphones and tablets running standard applications may not need a specialized network, technologies like AR and VR can benefit.

“Where it gets interesting is when you move towards more automation, more robotics,” he adds. “When you’re running a high-speed factory line and you’re using video to scan for quality issues, with private 5G, you can run that at high speed.”

AI-driven maintenance will need stable connections, he says. “You want that real-time super low-latency connection to exchange the image with the processing and back,” he adds. “You don’t want 10 minutes before the data processing to say, ‘This was an error in this problem, and the product should have been rejected.’”

FCC Moves to Fine Voxbeam $4.5M in Robocall Case Linked to Foreign Traffic

Voxbeam robocall case

The Federal Communications Commission (FCC) has moved to fine Voxbeam Telecommunications $4.5 million, bringing renewed attention to how foreign call traffic is still being used to push bank impersonation scams into the U.S. telecom system. The Voxbeam robocall case stems from an FCC investigation that found the company allegedly routed suspicious robocalls onto American networks, calls that, under existing rules, should have been blocked before reaching consumers. At the center of the Voxbeam robocall case is a compliance failure that regulators consider fundamental. U.S. voice providers are barred from accepting traffic from operators not listed in the FCC’s Robocall Mitigation Database (RMD). Yet, according to the findings, Voxbeam carried calls from Axfone, a Czech Republic-based provider that has never been registered in the database, raising fresh concerns about gaps in enforcement and oversight.

FCC Flags Lapses in Voxbeam Robocall Handling

The Voxbeam robocall case is built around what regulators see as a failure to follow clear compliance requirements. According to the FCC, Voxbeam transmitted tens of thousands of calls from Axfone into U.S. networks over a short period—from March 31 to April 3, 2025. These weren’t random spam calls. Many of them appeared to impersonate major financial institutions, using spoofed numbers linked to fraud departments or customer service lines at banks such as Bank of America and Chase. For recipients, the calls looked legitimate, increasing the likelihood of victims engaging with scammers. The FCC says this kind of traffic should have been blocked outright. Providers listed outside the RMD are considered high-risk, and accepting their traffic is a direct violation of the rules.

Dormant Accounts Raise Red Flags

What makes the Voxbeam robocall case more concerning is how the traffic was routed. Investigators found that the calls were linked to an account that had been inactive since 2018. That detail matters. Dormant accounts are often seen as a weak point in telecom networks, as they can be reactivated without drawing immediate attention if proper monitoring is not in place. In this instance, the FCC believes Voxbeam failed to identify and stop a sudden surge of activity from an account that had been silent for years. For an industry that handles massive volumes of call traffic daily, this points to a deeper operational gap—not just a one-off mistake.

Consumer Harm Drives FCC Action

The investigation itself was triggered by a complaint from a financial institution. Customers had reported receiving fraudulent calls that appeared to come from the bank’s official fraud reporting number. This is where the impact of the Voxbeam robocall case becomes clear. These scams are not just technical violations—they directly affect consumers, erode trust in banking systems, and make fraud harder to detect. FCC Chairman Brendan Carr addressed this directly, stating:
“Companies like Voxbeam must ensure they are not accepting traffic from sketchy operators. These gateway providers are the on-ramps to American phone networks and with that business model comes significant responsibility. As we saw in this case, failure to follow the FCC’s robocall mitigation rules can result in tens of thousands of scam calls reaching U.S. customers. The FCC is committed to protecting consumers from robocall scams like these.”

A Broader Industry Problem

The Voxbeam robocall case reflects a wider challenge for regulators. While frameworks like the RMD are in place, enforcement still depends heavily on telecom providers doing their due diligence. And that’s where things often fall apart. Foreign operators, especially those outside regulatory oversight, remain a major source of illegal robocalls. When U.S.-based gateway providers fail to vet their partners or monitor unusual traffic patterns, they effectively open the door to these campaigns. The proposed $4.5 million penalty is significant, but it’s also a warning. The FCC is making it clear that simply acting as a pass-through for call traffic is no longer acceptable.

The US False Claims Act Becomes a Cybersecurity Enforcement Engine

False Claims Act

For years, many government contractors treated cybersecurity compliance as a technical checklist, important, certainly, but often siloed within IT departments. That mindset is no longer tenable. The U.S. Department of Justice (DOJ) has announced that cybersecurity representations to the federal government are now squarely within the enforcement core of the False Claims Act (FCA). What began in October 2021 as the Civil Cyber-Fraud Initiative has matured into a sustained and expanding enforcement priority.

The numbers alone signal that this is not a passing trend. In January 2026, the DOJ announced that it recovered $52 million through nine cybersecurity-related FCA settlements in the fiscal year ending September 2025. Those recoveries formed part of a record-setting $6.8 billion in total False Claims Act recoveries that year.

Even more striking, DOJ reported that cybersecurity fraud resolutions have more than tripled in each of the past two years, evidence of what Deputy Assistant Attorney General Brenna Jenny described as a “significant upward trajectory.”

The False Claims Act: From Initiative to Institutional Priority

When the DOJ launched the Civil Cyber-Fraud Initiative in October 2021, it stated that it would use the FCA, complete with treble damages and statutory penalties, to pursue entities that knowingly submit false claims tied to cybersecurity obligations. The misconduct categories were specific and practical: 

  • Delivering deficient cybersecurity products or services 

  • Misrepresenting cybersecurity practices or protocols 

  • Failing to monitor and report cybersecurity incidents as required 

At the time, some viewed the initiative as an experiment. That view is no longer credible. Since October 2021, the DOJ has settled fifteen civil cyber-fraud cases under the FCA. More than half of those settlements were announced during the current administration, surpassing the total from the earlier years following the initiative’s launch. Civil cyber-fraud enforcement is now part of the DOJ’s routine FCA portfolio, not an edge case. 

In remarks delivered on January 28, 2026, at the American Conference Institute’s Advanced Forum on False Claims and Qui Tam Enforcement, Jenny reaffirmed the administration’s commitment to this path. As the political official overseeing nationwide False Claims Act enforcement, she emphasized both the scale of recent recoveries and the continuing focus on cybersecurity. 

Misrepresentation, Not Mere Breach 

One of the most important clarifications in Jenny’s remarks addressed a persistent misconception: FCA cybersecurity cases are “not about data breaches,” but are instead “premised on misrepresentations.” That distinction matters. 

Breaches occur even in well-managed environments. The DOJ has signaled that it is not interested in punishing companies simply because they were victims of sophisticated attacks. Instead, the FCA becomes relevant when an organization tells the government it complies with cybersecurity requirements and, in reality, does not. 

Under the False Claims Act, liability turns on knowingly false or misleading claims for payment. In the cybersecurity context, this can include explicit certifications of compliance or even implied representations embedded in invoices and contract submissions. If a contractor seeks payment while failing to meet required cybersecurity standards, the DOJ may argue that the claim itself carries an implied assertion of compliance. 

That theory has teeth, particularly when paired with the FCA’s treble damages framework. 

Defense, Civilian Agencies, and Expanding Standards 

The majority of DOJ’s cybersecurity-related FCA settlements, nine out of fifteen, have involved U.S. Department of Defense (DoD) cybersecurity requirements. The DoD recently finalized the Cybersecurity Maturity Model Certification (CMMC), introducing structured and, for many contractors, third-party verification requirements. These developments create more objective benchmarks against which representations can be tested. 

Civilian agencies are moving in the same direction. In January 2026, the General Services Administration issued a procedural guide governing the protection of Controlled Unclassified Information (CUI) on nonfederal contractor systems. Like the CMMC framework, it contemplates extensive third-party assessments. Across the executive branch, scrutiny of contractor cybersecurity programs is intensifying. 

As federal dollars increasingly flow with cybersecurity conditions attached, across defense contractors, IT service providers, healthcare benefit administrators, research universities, and even entities adjacent to prime contractors, the FCA provides the DOJ with a powerful lever to enforce those conditions. 

Whistleblowers as Catalysts 

No discussion of the False Claims Act is complete without acknowledging the central role of whistleblowers. Qui tam provisions allow private individuals to bring FCA claims on behalf of the government and potentially receive up to thirty percent of any recovery. Defendants are also responsible for the whistleblower’s attorneys’ fees. 

Jenny noted that whistleblowers have continued to play a large role in cyber-fraud cases. That should not surprise anyone familiar with FCA enforcement. Cybersecurity compliance failures often surface internally before they become public. When employees believe their concerns are ignored, or worse, concealed, the FCA offers a direct channel to the DOJ. 

Organizations that treat internal cybersecurity complaints as routine HR matters underestimate the risk. A credible internal reporting system, thorough investigation processes, and transparent remediation efforts are not just governance best practices; they are FCA risk mitigation tools. 

In some circumstances, companies may need to evaluate disclosure obligations to the government, whether mandatory or voluntary. DOJ policies have increasingly emphasized cooperation credit in the cybersecurity arena, making early, good-faith engagement a strategic consideration. 

Governance Is Now a Legal Issue 

The DOJ’s approach refrains from considering cybersecurity as more than a technical discipline. It is a representation issue, a contract performance issue, and ultimately an FCA issue. That reality demands cross-functional alignment. 

Organizations doing business with the federal government should ensure: 

  1. Clearly defined roles and accountability for cybersecurity compliance. 

  1. A comprehensive understanding of contractual and regulatory obligations. 

  1. Coordinated reporting and escalation channels for cybersecurity concerns. 

  1. Ongoing assessments of cybersecurity posture, including documented gap analyses and remediation plans supported by qualified experts. 

These elements are not aspirational. They form the evidentiary record that may determine whether a dispute becomes an expensive False Claims Act investigation. 

The New Baseline 

The DOJ’s $6.8 billion in fiscal year 2025 False Claims Act recoveries, including $52 million from cybersecurity settlements, mark a new shift. Cybersecurity is now central to DOJ FCA enforcement, not a secondary issue. 

For contractors and grant recipients, accuracy in cybersecurity representations is critical. Under the False Claims Act, what an organization tells the government about its security posture must align with reality. Gaps between certification and practice can quickly escalate into costly investigations. 

Strengthening visibility across attack surfaces, monitoring emerging threats, and validating controls are essential steps in reducing FCA risk. Platforms like Cyble, recognized in Gartner Peer Insights for Threat Intelligence, help organizations maintain continuous intelligence, detect exposures early, and support defensible cybersecurity governance. 

Book a free demo with Cyble to see how AI-powered threat intelligence can help your organization stay ahead of risk and confidently support its cybersecurity commitments. 

References: 

The post The US False Claims Act Becomes a Cybersecurity Enforcement Engine appeared first on Cyble.

European Officials Warn of Russian Satellites Intercepting Communications

Russian Luch “inspector” satellites are suspected of shadowing European GEO spacecraft, raising fears of interception, jamming, and orbital risk.

The post European Officials Warn of Russian Satellites Intercepting Communications appeared first on TechRepublic.

France’s Cybersecurity Roadmap: Talent, Deterrence, and European Digital Sovereignty

France National Cybersecurity Strategy

Introduction 

France has released its National Cybersecurity Strategy for 2026-2030, and the document reveals an ambitious vision that extends far beyond traditional defense postures. Under the directive of President Emmanuel Macron, who frames cybersecurity as "a prerequisite for freedom" and "a strategic imperative," France is positioning itself not merely as a secure nation, but as Europe's cybersecurity powerhouse. 

The strategy's structure is telling. While most national cybersecurity frameworks lead with infrastructure protection or threat response, France places talent development as Pillar 1—the foundational priority before all others. This sequencing isn't accidental. It signals a fundamental recognition that sustainable cybersecurity advantage isn't built on technology alone, but on the human capital capable of wielding it. 

Pillar 1: Building Europe's Largest Cyber Talent Pool 

France's most ambitious commitment is becoming "the largest pool of cyber talent in Europe," backed by initiatives addressing the global cybersecurity labor shortage at its roots. The strategy confronts persistent barriers directly: the perception of cybersecurity as "male-dominated, solitary, essentially technical, and accessible only to those with high education." 

The approach spans the entire talent pipeline. Mentoring programs will target young women. Cybersecurity will integrate into civic engagement programs for youth. A national platform will coordinate public and private efforts guiding people toward cyber careers. MOOCs and self-training tools will democratize access to cybersecurity knowledge. 

Most notably, France commits to "bridge strategies" between cyber and non-cyber scientific disciplines—recognizing that tomorrow's challenges require expertise spanning AI, quantum computing, cryptography, and emerging domains. At the European level, France will champion harmonized training courses across all EU member states and promote professional mobility, establishing itself as the gravitational center of European cyber talent development. 

Pillar 2: National Resilience Through Proportionate Protection 

France's second pillar acknowledges that cyber threats "affect all sectors of the economy and society," requiring resilience extending beyond government to encompass the entire economic and social fabric. The framework operates on proportionate principles: vital services receive the highest protection capable of withstanding sophisticated threats, while broader entities face cybersecurity obligations aligned with the European NIS2 Directive. 

Beyond mandatory requirements, a trust label system will allow businesses, local authorities, and associations to demonstrate security efforts to stakeholders, creating market incentives for voluntary investment. A national portal for everyday cybersecurity will provide a single access point for information and resources, while the 17Cyber platform will function as a public service desk for incident victims. 

Critically, France commits to national cyber crisis exercises testing coordination and response efficiency at territorial, sectoral, national, European, and international levels—ensuring resilience isn't merely documented but operationally validated. 

Pillar 3: Multi-Lever Deterrence 

France explicitly states its determination "to halt the expansion of this cyber threat" by mobilizing judicial, technical, diplomatic, military, and economic instruments to "increase the financial, human and reputational cost for potential adversaries." 

The Cyber Crisis Coordination Centre (C4) brings together ANSSI, COMCYBER, and intelligence services DGSE and DGSI. Its mandate will expand to activate broader response measures and propose options to political authorities—including public attribution of attacks. France will coordinate with European partners in implementing the EU's cyber-diplomatic toolbox, particularly its sanctions regime. 

Uniquely, France will mobilize private sector participation in national cyber defense. Internet operators will implement protective measures to detect, characterize, and potentially block attacks early. A cybersecurity filter will prevent public access to malicious websites. Technical threat information sharing between government and private actors will strengthen through InterCERT France.       

Pillar 4: Technological Sovereignty and Industrial Consolidation 

France's fourth pillar addresses dependence on digital technologies potentially controlled by foreign entities or vulnerable to sophisticated attacks. The approach centers on maintaining "autonomy of judgement and freedom of action in cyberspace" through sustained mastery of critical technologies and autonomous assessment capabilities.       

Investment focuses on critical cryptography technologies and products capable of countering advanced threats for sovereign uses. Industrial policy instruments will stimulate European sector consolidation, supporting the emergence of world-leading cyber industrial players. France will leverage European funds and private partnerships to drive investment in world-class companies, including specialized investment funds. 

The European certification framework for cybersecurity products and services will structure this industrial development. France will also continue developing its internationally recognized security evaluation sector while promoting autonomous European evaluation capability. 

Pillar 5: International Cooperation Without Geopolitical Blocs 

France's fifth pillar promotes cyberspace security and stability while explicitly rejecting "the logic of geopolitical blocs." The governance approach combines multilateral frameworks with multi-stakeholder participation—states, private sector, research, and civil society. 

France will continue leading initiatives like the Paris Call (over 1,200 stakeholders around nine principles for open, secure cyberspace) and the Pall Mall Process addressing commercial cyber intrusion capability proliferation (27 governments endorsed its code of best practices by August 2025). Within the UN, France supports establishing a Global Cybersecurity Mechanism by 2026 to operationalize 2015 UN standards of responsible behavior. 

At the European level, France regards the EU as "essential and preferred" for safeguarding its cyberspace initiative and action. France will strengthen EU strategic autonomy through full involvement in cooperation forums like the CSIRT Network, CyCLONe, and CYBERCO, emphasizing threat information sharing to achieve greater European autonomy. 

France will also develop cyber solidarity capabilities through structural cooperation (long-term capacity building via advice, training, logistical support) and operational cooperation (specific assistance through IT audits and incident response). The EU Cyber Reserve, operational by 2026, will deploy incident response services from trusted private providers to help EU member states and associated third countries. 

The Distinctive Governance Model 

France's organizational approach explicitly separates defensive and offensive cyber missions while ensuring effective coordination—guaranteeing civil liberties while maintaining operational effectiveness. 

Defensive governance operates across three missions: "The State defends the Nation" (understanding threats and developing responses), "The State secures itself" (protecting state systems and critical operators), and "The Nation strengthens itself" (coordinating public action and private efforts across individuals, businesses, associations, and local authorities). 

This multi-stakeholder governance integrates professional sectors, local government, academia, and civil society as both victims and essential partners in response development—recognizing cyber threats affect all areas of society, economy, and national territory. 

Strategic Implications 

France's strategy arrives amid heightened geopolitical tension, explicitly acknowledging Russia's war in Ukraine and the "increasingly fragmented world." The emphasis on deterrence, technological sovereignty, and European cooperation reflects assessment that cybersecurity has become inseparable from national sovereignty and international power dynamics. 

The talent development prioritization deserves particular attention. While other nations focus primarily on defensive capabilities and threat response, France recognizes sustainable advantage requires building human infrastructure capable of continuous innovation. Becoming Europe's largest cyber talent pool isn't subsidiary to technical capabilities—it's the foundation enabling all other strategic objectives. 

The European dimension permeates every pillar. France consistently frames cybersecurity advancement as contribution to European strategic autonomy rather than purely national capability, positioning itself as architect and leader of European cyber policy. 

The timeline extending to 2030 provides sufficient horizon for structural changes in talent pipelines, industrial capabilities, and international frameworks to materialize—allowing investments whose benefits compound over time. 

From Vision to Execution 

Implementation challenges are substantial. Talent development initiatives require long-term cultural shifts that educational programs alone cannot achieve—industry must provide accessible entry points, competitive compensation, and inclusive workplace cultures. The deterrence posture requires careful calibration to avoid escalation while maintaining credibility. The multi-stakeholder governance demands coordination across fragmented communities with divergent interests.       

For organizations observing France's strategic evolution, implications extend beyond French borders. European cooperation, standardization, and industrial consolidation will shape the continental cybersecurity market. Talent pipeline investments will affect where expertise concentrates. Regulatory frameworks aligned with NIS2 will establish compliance baselines affecting multinational operations. 

France's 2026-2030 National Cybersecurity Strategy represents one of the most comprehensive national frameworks released by any country. Its success depends not just on French execution, but on European coordination, private sector engagement, and the broader international community's response to the governance models and cooperation frameworks France promotes. 

Strengthening Organizational Resilience 

As nations like France invest in comprehensive cybersecurity strategies emphasizing talent, deterrence, and digital sovereignty, organizations worldwide face similar imperatives at the enterprise level. Building resilience requires understanding attack surfaces, monitoring threats across surface and dark web channels, and maintaining continuous visibility over evolving risks.  

Cyble's threat intelligence platform provides capabilities aligned to these strategic priorities—from attack surface management and dark web monitoring to vulnerability intelligence and incident response support.  

Request a demo to explore comprehensive threat intelligence solutions. 

The post France’s Cybersecurity Roadmap: Talent, Deterrence, and European Digital Sovereignty appeared first on Cyble.

India Criminalizes Tampering with Telecommunication Identifiers and Unauthorized Radio Equipment Under the Telecommunications Act 

Indian Telecommunications Act

The Indian government has introduced explicit legal provisions under subsection 42(3)(c) and subsection 42(3)(f) of the Telecommunications Act, 2023, formally classifying the tampering with telecommunication identifiers and the willful possession of radio equipment using unauthorized or altered identifiers as criminal offenses. These measures are intended to address persistent challenges related to sim misuse, telecom fraud, and the exploitation of digital communication infrastructure across India. 

The legal clarification was outlined in a press release issued by the Press Information Bureau (PIB) on 17 December, following a written response in the Lok Sabha by Minister of State for Communications and Rural Development Dr. Pemmasani Chandra Sekhar. The response addressed the liability of mobile subscribers and broader cybersecurity concerns arising from the misuse of telecommunication resources. 

Legal Provisions Targeting Tampering and Unauthorized Equipment 

Under sub-section 42(3)(c) of the Telecommunications Act, 2023, any act involving the tampering of telecommunication identifiers is now treated as a punishable offence. Telecommunication identifiers include elements such as subscriber identity modules, equipment identity numbers, and other unique identifiers that form the basis of lawful access to communication networks. 

In parallel, sub-section 42(3)(f) criminalizes the willful possession of radio equipment when the individual knows that such equipment operates using unauthorized or tampered telecommunication identifiers. This provision is important in cases involving cloned devices, illegal intercept equipment, or modified communication hardware that can be used to bypass regulatory controls. 

The government has further reinforced these offences through Telecom Cyber Security Rules, which prohibit intentionally removing, obliterating, altering, or modifying unique telecommunication equipment identification numbers. The rules also bar individuals from producing, trafficking, using, or possessing hardware or software linked to telecommunication identifiers when they are aware that such configurations are unauthorized. 

Sim Misuse and Fraudulent Acquisition of Telecom Identifiers 

Addressing the broader issue of sim misuse, the Minister highlighted that sub-section 42(3)(e) of the Telecommunications Act, 2023, criminalizes the acquisition of subscriber identity modules or other telecommunication identifiers through fraud, cheating, or impersonation. Fraudulently obtained SIM cards have frequently been linked to cyber fraud, financial crimes, and identity theft, prompting the need for clear statutory deterrents. 

The government noted that responsibilities relating to “Police” and “Public Order” fall within the jurisdiction of State governments, as outlined in the Seventh Schedule of the Constitution of India. As a result, enforcement of these provisions relies on coordination between central regulatory authorities and State law enforcement agencies. 

To prevent misuse at the onboarding stage, the Department of Telecommunications (DoT) has mandated, through license conditions, that Telecom Service Providers (TSPs) conduct adequate verification of every customer before issuing SIM cards or activating services. 

Regulatory Oversight and Public Reporting Mechanisms 

Beyond criminal penalties, the regulatory framework stresses oversight and early detection of telecom-related abuse. The DoT has developed mechanisms that allow citizens to report suspected misuse of telecom resources, enabling authorities and service providers to identify patterns of fraud and deactivate offending numbers or connections. 

These measures are designed to hold offenders accountable while protecting legitimate subscribers from the consequences of sim misuse. By encouraging public reporting, authorities aim to strengthen collective vigilance against telecom-enabled cybercrime without shifting responsibility away from regulated entities. 

Policy Debate and Withdrawal of Mandatory App Installation 

The legal provisions under the Telecommunications Act gained broader public attention following controversy over a government directive that required the mandatory pre-installation of a related mobile application on all new smartphones. The directive sparked criticism from privacy advocates, opposition leaders, and technology companies, who raised concerns about user consent, surveillance risks, and excessive permissions. 

Amid growing public backlash and resistance from device manufacturers, the Ministry of Communications withdrew the mandatory pre-installation order in early December, clarifying that the application would remain voluntary. The government stated that its withdrawal did not affect the underlying legal framework established under the Telecommunications Act, 2023. 

The debate does not change the intent of the law. By criminalizing tampering with telecommunication identifiers and knowingly possessing radio equipment using unauthorized identifiers under sub-section 42(3)(c) and sub-section 42(3)(f), the framework establishes clear accountability for SIM misuse. As enforcement tightens, organizations need visibility into telecom-enabled fraud and infrastructure abuse. Cyble provides threat intelligence to help teams detect and assess these risks early.  

Request a personalized demo to see how Cyble supports proactive threat detection! 

References: 

The post India Criminalizes Tampering with Telecommunication Identifiers and Unauthorized Radio Equipment Under the Telecommunications Act  appeared first on Cyble.

❌