Understanding India’s internet censorship regime
An internet user’s experience in India depends on the ISP, which determines their access to content
360° Perspective Analysis
Deep-dive into Geography, Polity, Economy, History, Environment & Social dimensions — AI-powered, on-demand
Context
A recent large-scale study on internet censorship in India has revealed massive inconsistencies and opacity in how Internet Service Providers (ISPs) implement government website-blocking orders. Driven primarily by techniques like DNS poisoning, this arbitrary enforcement undermines procedural safeguards and raises concerns about the misuse of executive power under the IT Act.
UPSC Perspectives
Polity and Governance
The legal bedrock for internet censorship in India is , which empowers the government to block public access to information in the interest of sovereignty, national security, or public order. This provision acts as a reasonable restriction on the fundamental right to freedom of speech and expression guaranteed under . However, a critical governance deficit is the extreme opacity of this regime, as blocking orders are bound by confidentiality agreements with ISPs. In the landmark (2015) judgment, the Supreme Court upheld Section 69A but strongly mandated procedural safeguards, including an executive review committee and the right of affected parties to be heard. The current haphazard implementation by regional ISPs demonstrates that without a standardized regulatory framework, these constitutional safeguards are practically ineffective, leading to arbitrary censorship.
Science and Technology
For UPSC Prelims, understanding the underlying internet architecture used to execute censorship is highly relevant. The (DNS) functions as the internet's directory, translating human-readable web addresses into machine-readable numerical IP addresses. Indian ISPs predominantly enforce blocking through a mechanism known as DNS poisoning, where their servers are deliberately configured to return a false IP address, misdirecting the user's browser away from the target site. While older censorship methods involved intercepting unencrypted data packets, the near-universal adoption of (HTTPS) has rendered simple HTTP blocking obsolete. Consequently, ISPs now rely on DNS manipulation or reading the unencrypted Server Name Indication (SNI) fields during the initial connection setup to drop traffic, as these methods are cheap and do not require resource-heavy deep packet inspection.
Internal Security and Ethics
Regulating cyberspace necessitates a delicate balance between neutralizing genuine internal security threats—such as terrorism, militancy, or child exploitation—and preventing state overreach. The study reveals that because execution is left entirely to individual ISPs, a domain deemed a security threat might be blocked by one provider but remain freely accessible on another. This fragmented approach fatally undermines the core national security rationale for blocking, as malicious actors can bypass restrictions simply by switching mobile networks or broadband providers. Furthermore, the strict secrecy surrounding the blocklists prevents independent audits by security researchers. Without proactive disclosure mechanisms, civil society cannot distinguish between legitimate, public-interest interventions (like disabling malware domains) and the unwarranted suppression of digital rights, thereby violating the principles of transparency and accountability in public administration.