Oh no, you're thinking, yet another cookie pop-up. Well, sorry, it's the law. We measure how many people read us, and ensure you see relevant ads, by storing cookies on your device. If you're cool with that, hit “Accept all Cookies”. For more info and to customise your settings, hit “Customise Settings”.

Review and manage your consent

Here's an overview of our use of cookies, similar technologies and how to manage them. You can also change your choices at any time, by hitting the “Your Consent Options” link on the site's footer.

Manage Cookie Preferences
  • These cookies are strictly necessary so that you can navigate the site as normal and use all features. Without these cookies we cannot provide you with the service that you expect.

  • These cookies are used to make advertising messages more relevant to you. They perform functions like preventing the same ad from continuously reappearing, ensuring that ads are properly displayed for advertisers, and in some cases selecting advertisements that are based on your interests.

  • These cookies collect information in aggregate form to help us understand how our websites are being used. They allow us to count visits and traffic sources so that we can measure and improve the performance of our sites. If people say no to these cookies, we do not know how many people have visited and we cannot monitor performance.

See also our Cookie policy and Privacy policy.

India responds to internet shutdown criticism... by codifying rules to make it legal

Bureaucracy embraces removing communications for millions of people


The Indian government has responded to fierce criticism of its increasing use of internet shutdowns by codifying rules for when the extreme measure is allowed.

In a notification [PDF] published earlier this month, the Indian Ministry of Communications has published the process and authority required for a cutoff of internet services in the populous country.

In essence, it requires the highest-level official in charge of domestic security – the Ministry of Home Affairs for the whole country or a state's Home Department official – to sign off on any shutdown.

However, anyone at Joint Secretary rank or higher can also order an internet shutdown "in unavoidable circumstances" or if gaining permission from the Home Department "is not feasible." In these circumstances, the ban can only hold for 24 hours without being authorized by the Home Department.

Any shutdown order will have to come with an explanation and will be reviewed within five days by a "review committee" made up of top members of the legal, executive and administrative branches to ensure it is in accordance with the law – ie, that it was ordered "due to public emergency or public safety."

Although that approach does appear to put a formal structure around what has become an increasing problem in India as well as many African and Asian countries, it has also dismayed many who have been arguing that internet connections should be treated like utilities and only cut off in the most extreme circumstances.

The fact that the Indian government's bureaucracy has embraced internet shutdowns means that it is a form of control it is unlikely to give up.

The number of internet shutdowns have been steadily growing in India, particularly in the disputed Kashmir region, where there have been 50 in the past five years, with 19 in the past year alone.

The problem has grown so pervasive that a dedicated website tracking them and arguing for reform has been set up. "As the Internet is a key enabler of many fundamental rights, including freedom of speech and expression, such frequent disruptions have been a cause for concern," states InternetShutdowns.in.

"They threaten the democratic working of nations, and also point to the gradual normalization of the mindset that permits such blanket restriction on Internet access."

Arab Spring

The trend for killing all access to digital information on smartphones and computers started during the Egyptian revolution back in 2011, when authorities shut down the entire country's web access prior to a big protest march. Employees of ISPs and mobile phone companies reported troops turning up at their homes and pointing guns at their families in order to enforce the shutdown.

Until then, many governments had assumed it was not possible to turn off internet access to their entire nation, due to the decentralized nature of the network. But soon after, governments across the globe educated themselves about AS numbers and internet routing, and started using their power to set up systems that would allow them to order network shutdowns.

What was originally only intended to be used in more extreme circumstances has quickly devolved into officials using their powers for all sorts of questionable – and often political – reasons.

Bangladesh switched off its entire country's net connectivity prior to the sentencing of former government leaders for war crimes. Iraq shut down the entire country for several hours at a time in order to prevent exam cheating.

Cameroon took things one step further and cut off the country's southwest and northwest provinces for several weeks following violent protests, causing a huge knock-on financial impact.

United Nations

The situation has grown so persistent that the UN has officially condemned the practice. And one internet infrastructure organization, the regional internet registry for Africa – Afrinic – even heard a proposal to punish countries that carried out such blocks by refusing to provide those countries with additional IP address (the proposal was swiftly beaten down by Afrinic's staff and board).

India's rules could, in theory, limit the number of shutdowns put in place for the wrong reasons. But that would all depend on enforcement. A 24-hour cut-off of the internet to a region is a very powerful and blunt tool that will be very tempting for officials to use, especially if they are allowed to use weak definitions of "public safety" as justification.

It also means that, unlike European and North American countries, the ability to force internet shutdowns will become official and formalized in India, with ISPs and other relevant internet companies expected to have procedures in place to cut off their services at a moment's notice.

That approach will likely be reproduced by other countries in Africa and Asia. ®

Similar topics

Broader topics


Other stories you might like

  • Micron dangles predictable memory price agreements in front of vendors
    The idea? To get investors muttering: DRAM, those gross margins are stable...

    Memory and storage maker Micron Technology has revealed a new business model intended to address the volatility in the memory market that has resulted in sharp swings in pricing over the past several years.

    Revealed at Micron's Investor Day 2022 event, the new forward pricing agreements enable a Micron customer to sign a multi-year deal that guarantees them a supply of memory at a predictable price that follows the cost reduction that the chipmaker sees during the lifecycle of a particular product.

    Micron's chief business officer Sumit Sadana told Investor Day attendees that the chipmaker has already signed up an unnamed volume customer to one of the new agreements, which the company is currently trying out to see whether it delivers on the expected benefits.

    Continue reading
  • Most organizations hit by ransomware would pay up if hit again
    Nine out of ten organizations would do it all over again, keeping attackers in business

    Almost nine in 10 organizations that have suffered a ransomware attack would choose to pay the ransom if hit again, according to a new report, compared with two-thirds of those that have not experienced an attack.

    The findings come from a report titled "How business executives perceive ransomware threat" by security company Kaspersky, which states that ransomware has become an ever-present threat, with 64 percent of companies surveyed already having suffered an attack, but more worryingly, that executives seem to believe that paying the ransom is a reliable way of addressing the issue.

    The report, available here, is based on research involving 900 respondents across North America, South America, Africa, Russia, Europe, and Asia-Pacific. The respondents were in senior non-IT management roles at companies between 50 and 1,000 employees.

    Continue reading
  • 'Peacetime in cyberspace is a chaotic environment' says senior US advisor
    The internet is now the first battleground of any new war – before the shooting starts

    Black Hat Asia Cyber war has become an emerged aspect of broader armed conflicts, commencing before the first shot is fired, cybersecurity expert Kenneth Geers told the audience at the Black Hat Asia conference on Friday.

    "Peacetime in cyberspace is a chaotic environment," said Geers, who has served as a visiting professor at Kiev National Taras Shevchenko University, represented the US government at NATO, and held senior roles at the National Security Agency. "A lot of hacking has to be done in peacetime."

    Geers said the Russia-Ukraine war demonstrates how electronic and kinetic conflicts interact. Ahead of the Ukraine invasion, Russia severed network cables, commandeered satellites, whitewashed Wikipedia, and targeted military ops via mobile phone geolocations.

    Continue reading
  • Windows Subsystem for Linux gets bleeding-edge Ubuntu
    'This is not recommended for production development. It may be unstable and it will have bugs'

    Canonical has begun slinging daily builds of Ubuntu at Windows Subsystem for Linux. We took a look at the not-for-production code.

    Ubuntu has long been friends with the Windows Subsystem for Linux. If you pop wsl --install onto a virgin Windows 11 PC, the odds are it will be Canonical's Linux distribution that is installed by default.

    There are plenty of other options available – OpenSUSE and Debian spring effortlessly to mind, and we recently noted the arrival of AlmaLinux for RHEL refuseniks, but all require specifying manually.

    Continue reading
  • Iran-linked Cobalt Mirage extracts money, info from US orgs – report
    Khamenei, can you just not? Not right now, fam

    The Iran-linked Cobalt Mirage crew is running attacks against America for both financial gain and for cyber-espionage purposes, according to Secureworks' threat intelligence team.

    The cybercriminal gang has been around since June 2020, and its most recent activities have been put into two categories. One, using ransomware to extort money, as illustrated by a strike in January against a US philanthropic organization, according to Secureworks' Counter Threat Unit (CTU); and two, gathering intelligence, with a local government network in the United States targeted in March, CTU researchers detailed Thursday.

    "The January and March incidents typify the different styles of attacks conducted by Cobalt Mirage," they wrote. "While the threat actors appear to have had a reasonable level of success gaining initial access to a wide range of targets, their ability to capitalize on that access for financial gain or intelligence collection appears limited. At a minimum, Cobalt Mirage's ability to use publicly available encryption tools for ransomware operations and mass scan-and-exploit activity to compromise organizations creates an ongoing threat."

    Continue reading

Biting the hand that feeds IT © 1998–2022