iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: http://opennet.net/research/profiles/india
India | OpenNet Initiative

India

PDF Version
Published on 09/Aug/2012

A stable democracy with a strong tradition of press freedom, India nevertheless continues its regime of Internet filtering. However, India’s selective censorship of blogs and other content, often under the guise of security, has also been met with significant opposition. Note: a previous version of this profile is available at India, 2007.

Results At A Glance

FILTERING No evidence of filtering Suspected filtering Selective filtering Substantial filtering Pervasive filtering
Political       
Social       
Conflict/Security       
Internet tools       
OTHER FACTORS Not Applicable Low Medium High
Transparency       
Consistency      

Key Indicators

    worst best
GDP per capita, PPP (constant 2005 international $) 2970
Life expectancy at birth (years) 64
Human Development Index (out of 182 countries) 119
Rule of Law (scale of 0-5) 2.5
Voice and Accountability (scale of 0-5) 3
EIU Democracy Index (out of 167 countries) 40
Digital Opportunity Index (out of 181 countries) 124
Internet users (% of population) 5.1

Background

With a population of over one billion, India is the world’s second most populous nation. The Indian government, a constitutional republic and representative democracy, generally respects the right to free speech and allows a wide array of political, social, and economic beliefs to be expressed. However, on targeted political and social conflicts, the government censors media and online discussion, particularly in areas of social unrest. In conflicts between castes and religious groups, and in the ongoing dispute with Pakistan over Kashmir, the state routinely censors material it believes could incite violence. Threats to journalists and bloggers come from political, religious, or ethnic nationalist groups. However, journalists are rarely detained as a means of censoring the press, and when they are held they are often quickly released.

Internet in India

Internet use in India reveals a great imbalance between urban and rural regions, although the gap has been diminishing during the past few years. Nearly 25 percent of India's population lives in cities (266 million), and 20 percent (52 million) of those are active Internet users (meaning they have used the Internet at least once in the past month).1 By contrast, only 4.18 million among the rural population are active users; 54 percent of these rural users access the Internet through Internet cafés more than ten kilometers away from their villages. Seventy-eight percent of nonusers indicate that they are not aware of the Internet.2 Language is another obstacle to using the Internet. Although there are 22 primary regional languages in India, most online content is in English, a language only 11 percent of the population speaks.3 With approximately 61 million Internet users, India has an overall Internet penetration rate of 5.1 percent. However, its Internet subscription rate is low, at only 1.3 percent.4

Most Indians who access the Internet do so from Internet cafés. Home and work connections and school access points are less popular. Most Internet users in the country are male, middle-class, and young.5 Almost half of the country’s users are online at least four to six times per week.6

As of December 2009, approximately 370 Internet service providers (ISPs) were licensed to operate in the country.7 According to an official Telecom Regulatory Authority of India report, Bharat Sanchar Nigam Limited (BSNL) and Mahanagar Telephone Nigam Limited (MTNL) were the market leaders, holding 57.84 percent and 13.81 percent of the market share respectively in June 2010.8 In the mid-1980s, two state-owned corporations were formed to provide limited telecom services: Videsh Sanchar Nigam Limited (VSNL) for international long distance and Mahanagar Telephone Nigam Limited (MTNL) for Mumbai and Delhi. In 1995, VSNL became the first to provide Internet services to the country. In April 2002, the government authorized ISPs to offer Voice over Internet protocol (VoIP) services.9

In January 2007, the Department of Telecommunications (DOT) announced that it would install filtering mechanisms at India's international gateways. The head of the Internet Service Providers Association of India (ISPAI) said that these new “landing stations” would be able to block both specific Web sites at the subdomain level and unauthorized VoIP telephone systems.10

Legal and Regulatory Frameworks

India guarantees freedom of speech and expression in its constitution but reserves the authority to impose restrictions in the interests of national sovereignty, state security, foreign relations, public order, decency, and morality.11 Each form of media — print, film, and television — is governed by its own regulatory apparatus. For example, print media are regulated by a board of press and government officials,12 while films are regulated by a board appointed wholly by the government.13 Private FM radio stations were legalized in 2000, but none of them are allowed to broadcast news or current affairs. The state continues to retain control over all AM radio stations.14

Until the late 1990s, the Indian government had control over all aspects of the telecommunications sector: policy, regulation, and operations.15 The new Internet policy introduced in November 1998 allowed private companies to become ISPs and either lease transmission network capacity or build their own, thereby ending the monopoly over domestic long-distance networks of the Department of Telecoms. However, most companies opted to use the lines already established by the government.16

In June 2000, the Indian Parliament created the Information Technology Act (IT Act) to provide a legal framework to regulate Internet use and commerce, including digital signatures, security, and hacking. The act criminalizes publication of obscene information electronically and grants police powers to search any premises without a warrant and arrest individuals in violation of the act.17

In December 2008, the Indian Parliament amended the IT Act; the amended act came into force on October 27, 2009.18 The 2000 IT Act had criminalized the electronic publication of obscene information, granting police powers to search premises without warrants and arrest individuals in violation of the act.19 The 2008 amendment broadened content that could be blocked beyond online obscenity. The newly added Section 69A grants power to the central government, “in the interest of sovereignty and integrity of India, defense of India, security of the State, friendly relations with foreign states or public order,” to issue directions to block public access to any information “generated, transmitted, received, stored or hosted in any computer resource.”20 Although Section 69A(2) requires procedures and safeguards to be prescribed when the government exercises this power,21 these restrictions are unclear because they are not specified in the amendment. Critics claim that the amendment, which makes such sweeping changes in the existing regime, was passed “in an unprecedented hurry, without any discussion in both the houses of the Parliament.”22

The Indian Computer Emergency Response Team (CERT-IN)23 was set up by the Department of Information Technology under the amended IT Act to implement India’s filtering regime.24 In 2004, CERT-IN became operational to review complaints and act as the sole authority for issuing blocking instructions to the DOT.25 Under the 2008 amendment of the IT Act, CERT-IN was assigned “the task of oversight of the Indian cyberspace for enhancing cyber protection, enabling security compliance and assurance in Government and critical sectors.”26 Only limited or specified individuals or institutions can make official complaints and recommendations for investigation to CERT-IN. These include high-ranking government officials, the police, government agencies, and “any others as may be specified by the Government.”27

On July 13, 2006, CERT-IN ordered access to 17 Web sites blocked following the 2006 Mumbai train bombings, reportedly because the attackers were believed to have communicated by means of the blogosphere. The blocked Web sites included “American right-wing” sites (http://mypetjawa.mu.nu/, http://mackers-world.com/), Hindu extremist or “Hindutva” sites, and a defunct Web site supporting the formation of a “Dalit ” homeland within India (http://www.dalitstan.org).28

In 2006, filtering requests also came from individuals protesting content they considered offensive or obscene. On October 10, 2006, media reported that the Bombay High Court had directed the Maharashtra government to issue notice to Google for “alleged spread of hatred about India” on its social networking site Orkut, in response to a Public Interest Litigation (PIL) petition calling for the ban of Orkut for hosting a “We Hate India” community.29 Similarly, in 2009, the Maharashtra government began examining legal options for censoring Google Earth, for fear that it could be used to facilitate terror attacks.30 It was reported that the surviving gunman of the 2008 terror attacks in Mumbai claimed that Google satellite images had been used in planning the attacks.31

In November 2006, in response to protests over an “anti-Shivaji” community on Orkut, police banned Orkut, temporarily shut down Internet cafés where users were found using the site, and began an investigation under the IT Act and penal code provisions for obscene publications and religious insult offenses.32 In December, a government official made a similar blocking request after a report that “obscene” material about “Hindu girls” was posted on Orkut.33 In May 2007, although none of these efforts resulted in a comprehensive ban of Orkut, site officials reached an agreement with the Indian government to block “defamatory or inflammatory content" and to release the IP addresses of the offending parties to law enforcement.34

Many have argued that giving CERT-IN this power through executive order violates constitutional jurisprudence, holding that specific legislation must be passed before the government can encroach on individual rights. When CERT-IN has issued orders to block specific Web sites, no communication has been made to the public beforehand.35 The blocking mechanism created under the IT Act provides for no review or appeal procedures, except in court, and is a permanent block.

Police commissioners, who can exercise the powers of executive magistrates in times of emergency, can also block Web sites containing material that constitutes a nuisance or threat to public safety under Section 155 of the Code of Criminal Procedure.36 The first occurrence of such an action was in 2004, when Mumbai police blocked http://hinduunity.org on the grounds that it contained anti-Islamic material that could be inflammatory.37 One of the nation’s ISPs, Sify, refused to block the site on the basis that only CERT-IN had the authority to issue blocking orders.38

Filtering can also be mandated through licensing requirements. For example, ISPs seeking licenses to provide Internet services with the DOT “shall block Internet sites and/or individual subscribers, as identified and directed by the Telecom Authority from time to time” in the interests of “national security.”39 License agreements also require ISPs to prevent the transmission of obscene or otherwise “objectionable material.”40

Surveillance

Section 69 of the IT Act empowers the central government to designate agencies and issue orders for interception, monitoring, and decryption in the interest of national security, public order, or preventing incitement of illegal acts. More specifically, Section 69B of the IT Act authorizes the central government to “monitor and collect traffic data or information through any computer resource for cyber security."41 Within this authority, the law mandates that any intermediary or any person in charge of said computer resource called upon must “provide technical assistance and extend all facilities to such agency to enable online access,” “intercept, monitor, or decrypt the information,” and “provide information stored in computer resources."42 Similar to Section 69A, the law requires that procedures and safeguards be applied when the government exercises such power, though the details of such procedures are not clear.

Concerned that terrorists may take advantage of the encryption in smart phones, the Indian government threatened to ban BlackBerry messaging and corporate e-mail services by August 31, 2010, unless Research in Motion (RIM) granted regulators access to encrypted user data. The deadline was first extended to October 2010, then to January 2011, for RIM and regulators to work on a feasible solution to address the national security concerns. As an interim solution, RIM agreed to host local servers and proposed a manual solution for messenger service.43 In December 2010, India agreed to work with individual carriers to access data from BlackBerry devices, acknowledging RIM ’ s assertion that they do not have access to individual users’ encryption keys.44

According to Indian officials, the government also sent notices to Google and Skype, requiring them to set up local servers to allow full monitoring of encrypted e-mail and messenger communications.45 It remains unclear how these service providers would comply with the direction.

ONI Testing Results

Results from OpenNet Initiative testing reveal that Indian ISPs selectively filter sites identified by government authorities. Over the course of 2009 – 2010, the ONI conducted testing on four major Indian ISPs: Bharti Airtel, Ltd.; Bharat Sanchar Nigam, Ltd. (BSNL); Tata Communications, Ltd.; and Mahanagar Telephone Nigam, Ltd. (MTNL). Testing done by the ONI found that BSNL blocked more Web sites than the other ISPs, which had only slight variations among them. Variations in blocking among ISPs suggest that CERT-IN and the DOT continue to rely on ISPs to implement filtering instructions.

When users attempt to access a blocked Web site on any of the four tested ISPs, they receive a “server not found” error page. This error page — also received in the instance of a genuine server error — gives users the impression that the Web sites are inaccessible as a result of routine network errors, rather than filtering.

OpenNet Initiative technical analysis revealed that these errors were the result of DNS tampering, a method of filtering that enables ISPs to target specific content. As a result, ISPs are able to block individual blogs (such as http://pajamaeditors.blogspot.com, http://commonfolkcommonsense.blogspot.com, and http://exposingtheleft.blogspot.com) without blocking the host domain, http://blogspot.com, or any of the other blogs hosted on it.

While BSNL blocked more sites than the other ISPs, the ONI found that in general the level of filtering among ISPs was consistent with only slight variations. Further, the contents of filtered Web sites are similar across ISPs. For example, each ISP blocks a variety of extremist sites, such as Web sites of Hindu extremist groups (http://hinduunity.com and http://hinduunity.org) or Web sites with critical or extremist political (particularly “American right-wing”) commentary (http://mypetjawa.mu.nu, http://mackers-world.com/). The OpenNet Initiative has found that these sites are consistently targeted for filtering by India. Web sites with information on human rights in India, Internet tools such as proxies, and content related to free expression are also targets of filtering. Data also showed that ISPs consistently filter pornography, but compared to other types of content, the number of blocked pornographic sites is small.

Technical analysis revealed evidence of collateral filtering on two ISPs: Bharti Airtel and MTNL. Collateral filtering is a result of IP-based blocking and refers to Web sites that are unintentionally filtered as a result of sharing the same IP address as a Web site that has been intentionally blocked. For example, 2006 – 2007 testing found that a site about American-Israeli rabbi Meir Kahane (http://kahane.org) was blocked because it shares the same IP address as the Hindu Unity Web site (http://hinduunity.com, http://hinduunity.org); 2009 – 2010 testing confirmed that the block was still in place. Similarly, during 2008 – 2009 testing a Web site for travel agents (http://www.positivespace.com) and a system administrator resource Web site (http://gwsystems.co.il) were found blocked as a result of sharing that same IP address with the Hindu Unity Web site.

Conclusion

Indian ISPs continue to selectively filter Web sites identified by authorities. However, government attempts at filtering have not been entirely effective because blocked content has quickly migrated to other Web sites and users have found ways to circumvent filtering. The government has also been criticized for a poor understanding of the technical feasibility of censorship and for haphazardly choosing which Web sites to block.

There are still parts of the IT (Amendment) Act, including absolving intermediaries from being responsible for third-party-created content, that have not been tested since its enactment. This lack of action could signal stronger government monitoring in the future.