A. Introduction
The Lower House of Parliament passed the Indian Telecommunications Act 2023 on December 20, 2023, followed by the Upper House the next day.Footnote 1 This legislation aims to reform the legal framework governing the telecommunication sector, which has long been based on two colonial-era laws: the Telegraph Act 1885 and the Wireless Telegraphy Act 1933.Footnote 2 The discourse surrounding the Telecommunications Act 2023 parallels that of recent criminal law reforms, both seeking to “decolonize” existing legal systems.Footnote 3 This aligns with the trend over the last decade, the increased emphasis of the ruling government in the past decade on the Hindutva linked indigenization of the legal, political system and the very political identity of the country.Footnote 4
In his speech in the Lok Sabha introducing the Telecommunications Bill 2023, Communications Minister Ashwini Vaishnaw claimed that this legislation marked a significant break from the past.Footnote 5 However, critics argue that, contrary to these assertions, the law reaffirms the colonial status quo.Footnote 6 They contend that it retains its “colonial architecture” and is merely a repackaged version of archaic colonial laws.Footnote 7 Claims of decoloniality have become increasingly frequent over the last few decades in various academic disciplines and broader political discussions, prompting alarm among certain academics who warn of its potential for co-option, tokenization, and dilution of the frame’s generative critical value.Footnote 8 Even in digital governance contexts, such claims are becoming more frequent; for instance, terms like “data colonialism” have been employed by digital rights activists, the Indian government, and corporate actors.Footnote 9 Thus, it is essential to scrutinize each claim of decoloniality closely to ensure that it does not become merely a metaphor or rhetorical device.
To critically examine claims of decoloniality, we must engage in historical inquiry to unmask the colonial past. Evaluating continuities or ruptures with colonial paradigms requires a nuanced understanding of their fundamental characteristics. By delving into the political, economic, and cultural underpinnings of this history, we can envision alternative futures. Historical excavations provide an “enlarged sense of possibility” to reclaim these overlooked narratives.Footnote 10 This inquiry serves as a vital tool for identifying the dangers of colonial reproduction within legal frameworks. The presence of colonial vestiges can manifest as new forms of structural inequality and dynamics of oppression that perpetuate existing injustices. By understanding these patterns and internal logics, we can challenge the normalization of colonial narratives.
To answer whether the Telecommunications Act 2023 constitutes a rupture from or has continuities with the colonial status quo, I examine the historical development of the telegraph and the legal framework that regulated the network. I posit that despite the rhetoric of decoloniality, the Indian Telecommunications Act 2023 fundamentally maintains continuity with colonial power structures. This continuity is anchored in three interrelated dynamics: technology as a tool of control, the state-subject relationship, and the relentless accumulation of state power.Footnote 11 These three characteristics, deeply embedded in the colonial dispositions that underpinned early telegraphy and its regulatory framework, continue to define the relationship between technology, governance, and the populace in post-colonial India. My analysis will demonstrate that even with advancements in communication technologies and legal reforms over the past century, the core elements of governance—particularly those pertaining to control and subjugation—have not only persisted but in many instances, but have been intensified. By tracing these enduring threads, we gain a critical understanding of how colonial power structures have adapted and survived in contemporary India.
To substantiate this argument, in the Second B, I first examine the historical development of the telegraph and its regulatory framework in India. I will deconstruct claims of British benevolence and empowerment, demonstrating that telegraph infrastructure and its regulatory framework were primarily utilized for surveillance, control, administration, and discipline over the population. The construction of this infrastructure and its regulation predominantly occurred after the 1857 revolt. I will explore how this revolt left a lasting influence on the fears and anxieties within the colonial administration’s psyche, informing both infrastructure development and regulatory measures. I conclude that both telegraphy and its regulatory framework were exceptional measures developed in response to an emergency aimed at preventing and quelling “native uprisings.”
In Section C, I provide a theoretical exploration of the concept of colonial continuity as it pertains to this Article, precisely detailing the triad of technology as control, state-subject dynamics, and relentless accumulation. My goal is to illustrate connections between colonial and post-colonial eras through a postcolonial perspective that recognizes true decolonization requires more than merely ending colonial rule; it necessitates rethinking our relationship with ongoing coloniality.Footnote 12 This involves acknowledging persistent colonial hierarchies and stratification of social relations as well as examining how law, institutions, and technology sustain subjugation and domination. These elements arise from the colonial dispositions underpinning telegraphy and its regulatory framework. My objective is to demonstrate that despite advancements in communication technologies and legal reforms over the past century, elements of governance—particularly control and subjugation—continue to persist. By tracing these enduring threads, we can better understand how colonial power structures have adapted and survived in contemporary India.
In Section D, I will build upon an emergency frame by examining how the Telegraph Act 1885—originally an exceptional measure enacted in response to the 1857 revolt—was normalized post-independence. Instead of being repealed after independence, this Act became one of the primary laws enabling targeted and mass surveillance. It also served as a template influencing other communication interception provisions across various laws. The Telegraph Act has now become foundational for internet shutdowns, which have rapidly increased in frequency over the past decade. I posit that there are colonial continuities evident in how these laws conceptualize relationships between government and citizens as well as in how technology and communication infrastructure function within that dynamic. I argue that legal provisions explored in this section are premised on a notion of perpetual emergency where—the exception become rule.
In Section E, I show how dissecting the Telecommunications Act, 2023 reveals continuities with colonial ideology embedded within its provisions. I contend that this Act fails to dismantle the colonial architecture of surveillance and control; instead, it expands a framework prioritizing state power over individual rights. In particular, I will explore broad aspects of the law—including provisions related to interception, internet shutdowns, traffic data collection, and powers exercised by Central Government under national security concerns or during wartime—to demonstrate that while underlying technology has evolved over 150 years, its use—as well as legal regulations governing it—as an instrument for hegemony, control, and surveillance has not only remained unaltered but has worsened.
This analysis locates my work at an intersection involving postcolonial studies, critical security studies, and constitutional law. Postcolonial literature provides a lens through which we can unpack British notions of benevolence and rationalism underpinning telegraphy projects while tracing their implications for modern governance structures. The post-colonial lens helps map evolution from the Telegraph Act 1885 to Telecommunications Act 2023 by viewing technology as a tool for control while also examining state-subject dynamics alongside constant power accumulation trends. Critical security studies further provide frameworks tracing genealogies associated with surveillance technologies while highlighting their unequal impacts across historical contexts—past through present into future scenarios—illuminating layers associated with control governance legitimacy alongside enduring legacies shaping contemporary surveillance landscapes today.
B. Telegraph Infrastructure as a Tool of Imperial Control: Early Legal Codification
I. Historical Perspective on Telegraph Development
In colonial accounts, the telegraph is often portrayed as a symbol of British benevolence, providing affordable access to modern technology for an increasing number of people. Thorat explains how the telegraph is framed as the “pre-eminent project of Western modernity,” aligned with the British civilizing mission in India.Footnote 13 However, these portrayals elide the fact that efficient administration and military control were the primary driving factors.Footnote 14 In fact, the route of the first Indian telegraph line was completed in 1855, running from Saugor Island via Diamond Harbour to Calcutta and continuing through the key military cantonments in upper and central India until Peshawar.Footnote 15 In the Indian context, the “[colonial] government, media, and European-capital-dominated international businesses were the biggest users of the telegraph.”Footnote 16 This is further reflected in the statement by Sir William Wilson Hunter, biographer of Dalhousie, who noted that the telegraph had become “the basis not only of our military policy in India but also of the modern mercantile system.”Footnote 17 The benevolent account is also undercut by the fact that scientific and working knowledge regarding it was closely guarded. Secrecy “dominated the moral economy of scientific enterprise in British India.”Footnote 18 While not the primary focus of this piece, it is important to briefly mention that the establishment of the telegraph would not be possible without native laborers, who were subject to exploitative working conditions, and the work of local skilled workers who developed the specialized parts for the telegraph.Footnote 19 These contributions are often absent in colonial histories and even in certain recent scholarship.Footnote 20
The use of the telegraph as a technology of colonial control became more evident in the context of the 1857 revolts. The telegraph network played a critical role in suppressing the revolts. Sir Robert Montgomery, a British administrator, famously claimed that “[t]he Electric Telegraph has saved India.”Footnote 21 Hunter similarly notes that “the railway and the telegraph were worth thousands of men to us in the Mutiny of 1857, and it is by the railway and the telegraph that India is now strategically held.”Footnote 22 However, while the telegraph network provided a strategic military advantage, the revolts also exposed the inadequacy of the network. Its reach was limited, and the absence of backup or duplicate lines made the system inherently vulnerable.Footnote 23 The rebels were successful in disabling important nodes.Footnote 24 However, the telegraph system proved its potential as a key tool for British domination despite its limitations. The experiences of 1857–58 greatly catalyzed the telegraphic development within India.Footnote 25 These lessons also informed the establishment of telegram lines in other colonies. In conclusion, as Thorat notes, the telegraph system in British India, “could not have been realised without colonial resources, native labour, and the impetus of native uprisings.”Footnote 26
II. Communication Infrastructure of Dominion
The Rebellion of 1857 struck a powerful blow to the supposed indomitability of British power in the country. Several scholars have documented how the rebellion led to the development of anxiety within the colonial state.Footnote 27 There was a recurrent pattern of colonial anxieties that manifested in unfounded panics multiple times. Metcalf has noted that there was an “enduring legacy of fear” from the 1857 rebellion.Footnote 28 Bayly, in his work, has coined the term “information panic” to describe the “information anxieties” of the colonial administration that led to attempts to solidify both informal and formal control.Footnote 29 This anxiety manifested from actual or often perceived gaps in colonial knowledge and intelligence gathering networks. The 1857 rebellion was an information-gathering failure and perhaps the biggest one. However, the Indian Mutiny of 1857 revealed the existence of “autonomous networks of social communication within Indian society that were impervious to state surveillance. These affective communities of religion, belief, kinship, pilgrimage, literary or linguistic sensibility, and style of political debate resisted the state’s efforts to co-opt them.”Footnote 30
Therefore, post the rebellion, this informational anxiety catalyzed the rapid expansion of intelligence networks and apparatus for exercising greater oversight and control over communication and the population.Footnote 31 This significant boost contributed to the development of the telegraph and railway infrastructure.Footnote 32 The spectre of the 1857 rebellion also informed the development of laws governing the telegraph. The legislation aimed to turn the telegraph into an infrastructure of domination. The telegraph, and the railway, were not mere tools of governance, but weapons wielded against the perceived threat of the unknown, the uncolonized mind. They were monuments to the empire’s fear, a testament to the fragility of its dominion.
Technologies like the telegraph were seen as modern and objective, outside the realm of manipulation and separate from the “world of bazaar gossip and rumour” that seemed incomprehensible to the British.Footnote 33 These modern technologies were meant to address the information gaps, which existed due to, among other factors, the reliance on natives for information and the deep mistrust of them.Footnote 34 This mistrust stemmed more broadly from the evolving colonial imagination of “the other” and the limitations in truly understanding Indian society.Footnote 35 Such technologies allowed the state to generate knowledge, making the Indian population legible by mapping them into categories and using this information for biopolitical control and administration.
III. Evolution of Telegraph Regulations
The first law regulating telegraph was the Electric Telegraphs Act 1854, which was passed by the East India Company. After the transfer of power from the East India Company to the British Government, the Telegraph Act 1860 was introduced. This Act largely retained the provisions of the 1854 Act, but importantly, it gave the government the exclusive privilege of setting up telegraph lines and prohibited the setting up of a telegraph line without a license.Footnote 36 A prohibitive monetary penalty was imposed as well for setting unlicensed lines, treating it as a continuing wrong.Footnote 37 The colonial state viewed the telegraph as a key apparatus for accessing indigenous communication to keep a check on simmering undercurrents.Footnote 38 Thus, the law provided the British Indian Government with a monopoly over the telegraph. In line with the need to exert greater control over the dissemination of content, the Telegraph Act 1860, Section V, permitted the colonial government to take temporary possession of any electric telegraph in the occurrence of a public emergency.Footnote 39
As the telegraph network expanded across the sub-continent, its potential for surveillance and suppression grew even more potent. In 1873, the government passed strictures on local governments, allowing them to intercept and examine telegraph messages under Section VII of the Telegraph Act 1860.Footnote 40 The Telegraph Act 1876 provided an explicit provision for the interception of telegraph messages.Footnote 41 This was the first provision in the history of India, to the knowledge of this author, that allowed for the interception of communications. This trend then travelled to other contexts as well. Post the Telegraph Act 1876 interception provisions were then included under the Post Office Act, 1898,Footnote 42 and the Sea Customs Act 1878.Footnote 43 In 1867, the Press and Registration of Books Act was enacted with the explicit intention of introducing procedural hurdles aimed at restraining free speech of the subjects and exercising heightened scrutiny over the published print media.Footnote 44 Each law, a tentacle of control reaching into the arteries of communication—telegraph wires, printed pages—mirrored the colonizer’s fear of the unmapped and ungovernable.
The Telegraph Act 1867, like its 1860 predecessor, empowered the colonial administration to temporarily take over telegraphs. Crucially, it expanded the government’s power by adding “public safety” as an additional, and notably vague, ground for intervention.Footnote 45 In contrast, under the Telegraph Act 1860 Act, and the 1863 British Telegraph Act,Footnote 46 governing the infrastructure in the metropole, such takeovers could only occur during a declared “public emergency.” Moreover, the British Telegraph 1863 Act offered two crucial safeguards vis-a-vis takeover: it specified who could authorize the takeover and placed a temporal limit on such authorization, requiring renewal beyond that period.Footnote 47 Yet, these were not present in the 1867 version of the Telegraph Act. The Telegraph Act 1867 was later superseded by the Telegraph Act 1885, but it retained provisions for interception, telecom takeover, and government monopoly.
Telegraph and postal communications played a crucial role in enabling colonial subjects and anti-colonialists overseas to connect and organize resistance during the first half of the 1900s.Footnote 48 These channels facilitated the coordination of protests and the dissemination of information about key developments, including arrests and the brutalities inflicted by British authorities. During this period, the correspondence of key leaders and groups, including their telegrams and postal articles, was placed under strict surveillance.Footnote 49 Those monitored included Mahatma Gandhi, Jawaharlal Nehru, M.N. Roy, P.B. Seal, Subhas Chandra Bose, S.D. Saklatvala, and Virendranath Chattopadhyaya. Several organizations, including the League Against Imperialism, the Hindustan Ghadar Party, Friends of Freedom of India, and the Communist International, were also closely watched. In his writings, Nehru reflected on the challenges posed by constant surveillance, describing the persistent sense of unease and frustration it created.Footnote 50
IV. Antecedents for a State of Emergency
The military and security measures that the United States and the West undertook post-9/11 have ignited a robust scholarly discourse surrounding the notion of emergency in the twenty-first century. Particularly concerning the unsettling notion of a permanent or perpetual state of emergency arising from the so-called “forever war.”Footnote 51 Within this discourse, thinkers like Dyzenhaus, among others, tend to view emergency as existing within a “norm-exception” divide.Footnote 52 Conversely, Agamben characterizes the state of exception as “a space devoid of law, a zone of anomie in which all legal determinations are deactivated.”Footnote 53 Of particular note is the work of Reynolds, which demonstrates an intrinsic link between emergency law and colonialism.Footnote 54 He argues that the origin of emergency law lies in martial law, primarily developed in colonies like Ireland and India.Footnote 55 These draconian measures were then imported into other colonies. The lessons from this colonial context informed the drafting of emergency derogation provisions in the International Covenant on Civil and Political Rights and the European Convention on Human Rights.Footnote 56
Reynolds cites examples of British emergency legislative codes in India, such as the Defence of India Act 1915 and the Anarchical and Revolutionary Crimes Act 1919.Footnote 57 While these represented a more comprehensive form of emergency laws, Roberts, building over Reynolds work, traces the origins of emergency governance powers to the 1857 rebellion. Following the rebellion, a series of laws were passed, including the State Offences Act 1857, the Military and State Offences Act 1857, the Heinous Offences Act 1857, and the State Prisoners Act 1858.Footnote 58 These introduced new crimes against the crown, allowed for detention without trial in security cases, and enabled trials by court-martial.Footnote 59 The consolidation of emergency powers further manifested through legislation aimed at censoring and controlling communication channels.Footnote 60 These laws included the Telegraph Acts, the Press and Registration of Books Act 1867, the Vernacular Press Act 1878, and the Post Office Act 1898.Footnote 61 The control over these communication networks, notably the Telegraph, was indispensable for the colonial state’s military, security, and intelligence apparatus.
1. Governing by Exception: The Telegraph’s Place in Colonial Landscape
How the telegraph infrastructure was designed, and deployed, and its legal evolution both highlight its exceptional nature. Exceptional here refers to (1) its relationship with the rule of law, (2) its role in reinforcing and legitimizing colonial control, and (3) its contrast with the standards in the metropole and relevant comparative practices. The primary objectives of the telegraph network in British India were security, control, and the administration of the state. These objectives influenced the evolution of Telegraph regulation as well. For instance, the Telegraph Act 1860, provided the government with a monopoly over the telecom infrastructure in India. This was a departure from the regulatory paradigms observed in Britain or the United States. This was to guard against the “circulation of false and inaccurate information” and for the “uniformity of management.”Footnote 62 For the British Indian government, the telegraph was a state-owned communication system that would allow the transmission of messages in a rational and controllable manner.Footnote 63 This confidence in the telegraph marked a shift from their earlier resort to indigenous intelligence networks which could not be trusted as they were perceived to be “irrational, spontaneous, susceptible to rumour, and highly contagious and volatile networks of human communication.”Footnote 64 This necessity for control shaped the evolution of telegram regulation from 1860 to 1880.
The extraordinary nature of Indian telegraph regulation is further underscored by examining the communication interception provision outlined in the Telegraph Act 1876. Such a provision was unprecedented at the time. In fact, in Britain and the US, there was no law permitting the interception of telecommunications for decades after the 1870s. In the US, the Communications Act 1934 prohibited wiretapping and made wiretap evidence inadmissible in court.Footnote 65 It was only with the Omnibus Crime Control Act 1968, following US Supreme Court decisions in Katz v. United States (1967)Footnote 66 and Berger v. New York (1967),Footnote 67 that interception of telecommunications was permitted for investigative purposes. In Britain, the first explicit statutory power to intercept communications was under Section 4 of the Official Secrets Act 1920, but the scope of the interception power was limited.Footnote 68 The first comprehensive law permitting the interception of telecommunications was the Interception of Communications Act 1985.Footnote 69 Further, even jurists at the time believed that the surveillance provisions were exceptional in nature. Shri P. Ananda Charlu, highlighting the arbitrariness of these provisions, pointed out the lack of safeguards, such as notifying individuals if no charges were pressed after their communication was intercepted.Footnote 70 He concluded that the provisions heavily favored the government at the expense of the public. Similarly, Shri Bisambar Nath expressed his concerns about the vagueness of the provisions.Footnote 71 Both were members of the Select Committee reviewing the Post Office Bill Section 26(1), which was modelled after Section 5 of the Telegraph Act 1885.Footnote 72
The colonial state’s deep anxieties about losing grip over information flows shaped the development of telegraph infrastructure and its legal framework. Far from neutral tools of modernization, the telegraph and associated regulations emerged as essential instruments for asserting control and disciplinary power over the population. This historical analysis was key to providing important context for understanding the long-standing entanglement between technology, knowledge, and colonial power structures.
C. Knowledge, Power and Colonial Continuities
Postcolonial theory was initially developed in the discourse among literary and cultural critics to analyze the diverse social, political, and cultural engagements of colonized people with imperial power, along with the broader effects of colonization.Footnote 73 Over time, it has expanded beyond these fields and is now widely applied in historical, political, sociological, legal, and economic disciplines to examine the enduring influence of European colonialism and its legacy.Footnote 74
Postcolonialism emphasizes that genuine decolonization extends beyond merely ending colonial rule; it requires a deep re-evaluation of the structures, hierarchies, and power dynamics that characterized colonial systems.Footnote 75 This endeavor calls for a critical assessment of the enduring influence of colonialism on the political, economic, and governance frameworks of formerly colonized nations. Similarly, Eve Darian-Smith has noted that “[r]ather, postcolonial legal scholarship underscores that even when colonialism has officially ceased to exist, the injustices of material practices endure over time and in many ways frame emergent legalities and legal consciousness.”Footnote 76 In this way, postcolonial theory serves as an intellectual bridge, linking historical colonial injustices to contemporary global inequalities in economic, political, and social power.
Postcolonial studies is an interdisciplinary field that encompasses a wide range of perspectives. This diversity stems in part from the fact that colonial and imperial histories were not uniform; significant regional variations exist in subject formation, systems of governance, mechanisms of control, and forms of resistance.Footnote 77 To avoid essentialism and mischaracterization, it is essential to maintain contextual specificity when employing a postcolonial framework.
I. Pillars of Colonial Echoes in Wires and Waves
The central claim of this article is that of colonial continuity, viewed through the lens of postcolonialism. To substantiate this claim, it is essential to establish a clear linkage between the colonial and post-colonial periods. This is evident from the fact that the provisions of the Telegraph Act, 1885 remain largely embedded in the Indian legal system (see Sections D and E). However, my argument for colonial continuity goes deeper than merely the retention of a pre-colonial law.I argue that the colonial dispositions and the features underlying the telegraph, and its regulations have persisted, despite the evolution of communicative technologies and relevant legal transformations over the century. Key characteristics of this colonial continuity are: (i) the use of technology as instruments for control, censorship, and discipline; (ii) the dynamic between the state and its people, where individuals are viewed as subjects; and (iii) a relentless drive to amass as much knowledge and intelligence about a subject as possible to categorize, target, and surveil them. These elements, though transformed by time and technological advancement, remain fundamentally rooted in colonial approaches to governance and control.
Under the first and third limbs, as demonstrated in Section B.II, the telegram infrastructure and its regulations were used primarily as tools for control, discipline, and governance of the population. As I shall showcase in Sections D and E, post-independence, Telegraph Act 1885 was not substantively reformed. Instead, its coercive elements were expanded through the Telecommunications Act and other regulations influenced by it. This evolution underscores how the government has consistently sought to enhance its legal authority to collect information and strengthen its mechanisms for controlling and censoring citizens.
2. State-Subject Relationship
Moving on to the second aspect concerning the individual as a subject, this Article examines how India’s independence transformed the nation from a colony into a democracy, ostensibly shifting the “people” from subjects to citizens with rights. Yet, the regulations discussed in Sections D and E perpetuate a framework that views individuals primarily as subjects from whom data is extracted, monitored, and used as tools for control and governance. These laws, instead of fostering a two-way flow of information grounded in transparency, accountability, and respect for human rights, remain fundamentally unchanged in their approach. This reinforces a hierarchical relationship where citizens are reduced to sources of information to be monitored and subjugated, perpetuating colonial patterns of power and control. Ashcroft and others have discussed how surveillance and observation were among the most powerful strategies of imperial dominance. Connecting this to Lacan’s work, the on gaze of the “grande-autre” (big other), they observe “within which the identification, objectification and subjection of the subject are simultaneously enacted: the imperial gaze defines the identity of the subject, objectifies it within the identifying system of power relations and confirms its subalterneity and powerlessness.” Thomas’s analysis is particularly illuminating here—he demonstrates how surveillance in India, both historically and in the present day, “is about maintaining order in society and curbing disorder brought about by a variety of badmaashe”—with the figure of the terrorist now replacing colonial-era threats.Footnote 78 The parallels between colonial and contemporary surveillance practices are striking just as the British colonial administration sought to decode India’s vast unknowns through systematic information gathering, modern surveillance mechanisms aim to map and monitor online patterns of speech and communication among suspect populations.Footnote 79
There was a hierarchy between the colonial and the natives, and surveillance was essential to maintain the hierarchy. Similarly, current hierarchies—shaped by colonial legacies—continue to influence how state coercive power is exercised today. For instance, lists of “criminals” or “bad characters” created by colonial authorities still affect contemporary preventive policing strategies.Footnote 80 Through a broader lens of surveillance studies and biopolitical control, we can observe how both state and private sector governance operate within these entrenched hierarchical frameworks.Footnote 81 The manifestation of surveillance-based exclusion occurs at both micro and macro levels.
Among these three factors, the second—linking control and relentless accumulation to the individual—is the most critical for an inquiry into colonial continuity, as it underscores the persistence of the hierarchical relationship between the state and its people. One more caveat is in order: the three characteristics I identified may also apply to other colonial contexts, such as the evolution of undersea cablesFootnote 82 and biometric data collection.Footnote 83 Similarly, Still notes, “colonial practices of counting, categorization, and surveillance have long been identified and analyzed by postcolonial and feminist scholars, who have untangled the layers of disciplining and control these processes enabled.”Footnote 84 In fact, as Ogasawara explains, “nation building and colonialism are intertwined in the development of surveillance systems.”Footnote 85 Thus, the outlined factors may have broader applications, potentially extending to non-postcolonial authoritarian or repressive contexts. However, I do not develop that comprehensive account in this Article. My analysis here remains limited to the historical development of the telegraph network and its regulation during the colonial period, and of colonial continuity post-independence.
II. Anticipating Critiques of the Decolonial Frame
Considering this Article is grounded in a postcolonial lens, it is essential to address any objections regarding the use of colonial and decolonial framing to critique a law before proceeding to the next section. Here, I engage with Burra’s work on colonial framing as a basis for legal critical analysis, who, has developed his critique over more than a decade.Footnote 86 He argues that the label of colonial law carries no normative weight beyond the fact that it was enacted during the colonial period.Footnote 87 According to him, a colonial law could be just or unjust, progressive or regressive, based on its content rather than its historical context. Therefore, he claims that: “the language of decolonisation is unhelpful and misleading as a shorthand for the criticism of specific laws; and that such criticism should always be made in purely normative terms ….”Footnote 88
To address this concern, the claim in this Article is not solely based on colonial legal continuity but rather on the continuity of British practices regarding information and communication technologies for surveillance, censorship, control, and administration of the populace. Even Burra acknowledges that “there are many ways in which the terms ‘colonial’ and ‘decolonial’ may be applied and understood, and some of these are no doubt genuinely illuminating.”Footnote 89 Further, I partially agree with him that merely highlighting colonial framing is insufficient for critiquing a law; at times, the labels of decolonial, colonial, or anti-colonial could serve as shorthand for evaluating the merits of a law. Therefore, it is critical to define and clarify what is meant by colonial continuity in both theoretical frameworks and factual context, and to examine how this continuity is problematic in terms of the merits of the law. In this article, I rely on the post-colonial lens, tracing the Telegram Act 1885 evolution in both the colonial and post-colonial contexts, and then offer a critique of it based on the Indian legal system.
Where I disagree with Burra is his insistence on not discussing the historical origins of laws while focusing on their merits independently. However, historical excavation can help illuminate the telos of a regulation and how it was used during the colonial period, which can be particularly relevant when examining its legality and constitutionality. There should be serious questioning of laws in a post-colonial context, particularly those originally designed to sustain colonial rule and its underlying logic. This is crucial as India transitioned from a colony—established primarily for the political and economic benefit of the metropole—to an independent constitutional democracy. As Baxi notes “the Indian constitution marks a historic break with ’modern’ constitutionalism.” He further remarks “[n]o previous constitutional model envisaged such an explicit and comprehensive transformation … and installed a description of a constitutionally desired social order and good life …”Footnote 90
In this regard, the debate surrounding the continuation of colonial laws during the First Amendment to the Constitution is particularly relevant, as even Burra examines.Footnote 91 Critics of the amendment contended that it perpetuated colonial legacies; Acharya Kripalani noted,“[t]he whole of our satyagraha movement was to break the law, to break such provisions of the law that created offences. Today, if you pass this amendment, even satyagraha can come to be legislated against.”Footnote 92 Conversely, proponents like Shyama Prasad Mookerjee argued, “[t]hese are a set of men selected by the Government. They are not foreigners coming from outside.”Footnote 93 Burra uses this debate to support his opposition to labelling laws as colonial, arguing that such labels can be malleable on both sides.Footnote 94 However, I believe that these arguments are not equally legitimate. I would critique Mookerjee’s assertion by noting that merely retaining colonial laws post-Independence—laws used by the colonial state for repressive purposes—raises serious concerns. The fact that the government is now independent does not resolve this issue. For instance, sedition laws were crafted to maintain colonial hegemony by criminalizing dissent against the colonial government. The Punjab High Court in Tara Singh Gopi Chand v. State 1950 noted that “India is now a sovereign democratic State. Governments may go and be caused to go without impairing the foundations of the State. A law of sedition thought necessary during a period of foreign rule has become inappropriate by the very nature of the change which has come about.”Footnote 95
Further, as Khaitan has demonstrated, a proper interpretation of State of West Bengal v. Anwar Ali Sarkar 1952 would lead to the conclusion that pre-constitutional laws do not deserve the presumption of constitutionality.Footnote 96 In his partially concurring opinion, Justice Bose emphasised the importance of considering the historical context of pre-constitutional laws as well as the ethos that shaped the values of the Constitution when adjudicating constitutional cases.Footnote 97 While I agree with Burra that not all colonial laws are inherently flawed, I maintain that certain laws’ colonial origins—especially those designed for control and repression—demand revaluation. To clarify, a colonial antecedent is not, by itself, grounds for declaring a law unconstitutional, but its repressive legacy should inform a rights-based adjudication.
D. Enduring Legacy: How the Telegraph Act 1885 Shapes India’s Post-Colonial Surveillance and Censorship Framework
In Section B, I explored the evolution of both telegraph infrastructure and regulations. I explained how the 1857 rebellion and the subsequent colonial anxiety about an ever-present threat informed the development of the telecom network and its associated legislation. The series of legislations that led to the Telegraph Act 1885 were part of an emergency governance apparatus, serving as quintessential tools for British control, and governance of the populace.
The objective of this section is to trace the journey of the Telegraph Act 1885 post-independence, before the introduction of the Telecommunications Act 2023. I seek to explore how the law has evolved and its broader legacy vis-á-vis the Indian regulatory landscape. I postulate that despite the reforms to the framework, post-independence, the Telegraph Act 1885 colonial legacy has not only been normalized but rather the zone for executive discretion has only grown more expansive with time. The claim of colonial continuity is based on the Act perpetuating an asymmetrical power relationship, and the discretionary power that enables a state hegemony, which is the norm rather than the exception.
The discourse regarding the Telegraph Act 1885 has sporadically occurred over the decades. Between 1947–1965, there was limited development in terms of media reporting, academic attention, legislative scrutiny, or judicial review, except for the Press Laws Enquiry Committee in 1947, which I shall return to shortly. However, it is important to examine at a high level the issue of continuity of colonial law. There was significant continuity between the colony and the post-colony, both in terms of constitutional provisions and the laws that helped sustain the repressive rule of the colonial power, such as Section 124-A of the Indian Penal Code of 1860 (sedition) and the Press (Emergency Powers) Act 1931.Footnote 98 The Constitution of India, Article 372(1), makes all colonial-era laws constitutional with the Constitution as part of the law of the land.Footnote 99 While, Article 13 voids laws in conflict with Part III of the Constitution the fundamental rights.Footnote 100 Further, a key debate arose regarding the continuation of colonial law in the context of the First Amendment. While I do not have the space to discuss it at length, the government’s stance was based on the belief that independence and the establishment of a democratic government were sufficient to break from the colonial past. This perspective did not necessitate dismantling or meaningfully reforming the repressive colonial apparatus, which includes the Telegraph Act 1885 to ensure rupture for the colonial past.
I. Background
Now returning to the evolution of the Telegraph Act 1885. The Press Laws Enquiry Committee in 1947, examined Section 5(2) of the Act and Section 26 of the Post Office Act 1898, both of which have similar scopes and criteria for invocation. The Committee recommended that actions and orders of subordinate officers be reported to and reviewed by responsible ministers of the government.Footnote 101
The Post Office Act 1898 underwent a comprehensive review by the Law Commission of India (LCI) in 1968.Footnote 102 The LCI examined Section 26 of the Act and opined that the interception of communication constituted a restriction on the right to free speech and expression.Footnote 103 It noted that the term “public emergency” was vague and asserted that if the emergency did not threaten public order or state security, it would exceed acceptable limits on free speech.Footnote 104 The Commission recommended that the imposition provision should only be utilised when necessary for a public emergency and based on grounds outlined in Article 19(2).Footnote 105 Following the LCI’s recommendations regarding Section 26, Section 5(2) of the Telegraph Act was amended in 1972, as both provisions had similar a scope. The amendment to Section 5(2) incorporated the grounds of Article 19(2) and introduced additional criteria, requiring that actions be “necessary or expedient” for these grounds.Footnote 106 This change contradicted the LCI’s recommendation, which advised that the power should only be invoked when “necessary,” by introducing the ambiguous term “expedient.”Footnote 107
Despite amendments aimed at constitutional compliance, the provision remains inconsistent with the rule of law in a more robust sense and offers the state wide-ranging discretionary powers. This is also reflected in debates regarding the amendment in the parliament in 1972, and how the provision has been abused since.Footnote 108 Parliamentary discussion centred on how the provision was vague and could be considered “excessive” when a proclamation of emergency was not in effect.Footnote 109 Some members expressed concern that the central government, which controlled the Telecom Department, might use this power to target opposition governments at the state level.Footnote 110 This centralization of authority could hinder the dissemination of information from states to other parts of the country. Lal Krishna Advani, a leader of the Bharatiya Jana Sangh, criticized the amendment for its colonial origins. He stated:
I see no reason why … after India became independent, an Act of this nature, which had been brought forward by the British Government in the year 1885 merely to strengthen and reinforce their own Government and to protect themselves against criticism … should not have been repealed altogether.Footnote 111
In response, H.N. Bahuguna, the Communications Minister, asserted that there had been no reported cases of misuse, making it unlikely that such misuse would occur in the future.Footnote 112 However, as Mohanty pointed out, “even if it were found to be true that no misuse of Section 5(2) had occurred until 1972, this fact would not preclude the possibility of future misuse in the absence of adequate safeguards.”Footnote 113 Subsequent events would later contradict Bahuguna’s confident assertion.
Before segueing into the next subsection, it is worth mentioning former President Zail Singh’s pocket veto of the Indian Post Office (Amendment) Bill, 1986. The bill granted sweeping powers to intercept postal communications without meaningful safeguards. The pocket veto was exercised out of the belief that it “undermined the Constitution’s fundamental freedoms.”Footnote 114
II. Surveillance
Subramanian has tracked how the powers under Section 5(2) were widely used during the Emergency of 1975–1980.Footnote 115 Not only were opposition members and journalists targeted, but members of Indira Gandhi’s own party were also affected.Footnote 116 In 1981, India Today reported how the Delhi Police used interception powers to target 264 individuals, including six journalists, 30 advocates, 16 trade union and student leaders, three retired bureaucrats, 40 businessmen, over 100 leaders of various political parties (particularly BJP members), and 55 alleged criminals detained under the infamous Maintenance of Internal Security Act during the Emergency.Footnote 117 In 1988, the Karnataka Chief Minister Ramakrishna Hegde resigned after a phone tapping scandal.Footnote 118 Similarly, in the 1990s, Chandra Shekhar—who would soon become the eighth Prime Minister of India—publicly accused the V.P. Singh-led government of illegally tapped the phones of 27 politicians, including his own.Footnote 119 These controversies surrounding the surveillance of politicians led to failed legislative amendment efforts in 1988 and 1996 through private member bills.Footnote 120 The Chandra Shekhar controversy, in particular, resulted in a case filed in the Supreme Court of India by the People’s Union for Civil Liberties (PUCL).
In the case of PUCL v. Union of India (1997), the petitioners challenged the constitutionality of Section 5(2) and, alternatively, asked the Court to lay down safeguards.Footnote 121 The Supreme Court held that the provision was constitutional, but it did incorporate safeguards regarding the authorization of interception. However, the Court failed to meaningfully explain the constitutionality of the provision and its safeguards, rather its approach can be categorized as procedural fetishism. The safeguards were “paper thin” even by the 1990s standards, and now even more so considering contemporary standards in the age of the internet.Footnote 122 The primary problem with these safeguards is that they entail executive authorization and ex-ante executive review. This procedure does not envisage judicial or any independent oversight at any point. This model has faced criticism as early as 1985, A.G. Noorani pointed out the shortcomings of Section 5(2) for its lack of independent oversight at any level, especially when compared to practices in Europe, including the United Kingdom.Footnote 123 Austin notes that a surveillance framework can be lawful in a narrow sense but can conflict with a more robust interpretation of the rule of law (“lawful illegality”).Footnote 124 This framing is well-suited to describe the characteristics of state surveillance under the Telegraph Act 1885.
The ex-ante executive review has become the standard for key interception provisions in the country.Footnote 125 This approach is codified in the interception provisions under the Prevention of Terrorism Act 2002, the Maharashtra Control of Organised Crime Act 1999, and the Information Technology Act 2000 (IT Act). Under the Unlawful Activities (Prevention) Act 1967 and the Gujarat Control of Terrorism and Organized Crime Act 2015, law enforcement relies on the Telegraph Act or the IT Act for authorization, thereby subjecting these actions to ex-ante executive review.Footnote 126 Evidence collected through the interception of communication under both laws is admissible, notwithstanding any provisions in the Indian Evidence Act 1872.Footnote 127 A provision originally designed to serve the colonial state’s national security interests now governs state surveillance in everyday law enforcement and public order contexts within the post-colonial state.
A variety of domestic acts of terrorism, including the storming of Parliament in 2001 and the Mumbai terrorist attacks in 2008 have had a significant affect on the surveillance architecture in the country.Footnote 128 The 2008 attacks were particularly characterized as an intelligence failure, reminiscent of the 1857 revolt, leading to a bolstering of both bureaucratic and technical capabilities of the surveillance apparatus. This led to the creation of various initiatives such as the National Intelligence Grid, the Centralized Monitoring System (CMS), the Crime and Criminal Tracking Network and Systems, and the most recent National Automated Facial Recognition System, all of which constitute part of India’s mass surveillance framework.Footnote 129 The government has sought to justify the legality of some of these initiatives based on provisions of the IT Act and the Telegraph Act 1885. For instance, regarding the CMS, there has been an attempt to normalize the state’s mass digital surveillance by suggesting that it is merely the “automation” of existing systems of interception and monitoring under Section 5(2) of the Telegraph Act 1885.Footnote 130
III. Internet Shutdown
Section 5(1) of the Telegram Act empowers the government to shut down the internet.Footnote 131 Since January 2012, India has experienced over 836 government-imposed internet shutdowns, making it the highest in the world.Footnote 132 Particularly since 2016, India has consistently imposed more internet shutdowns than any other country.Footnote 133 In the first six months of 2023 alone, there were more shutdowns than in all of 2022.Footnote 134 The reasons for these shutdowns range from speculative national security concerns to administrative issues, such as preventing cheating during exams.Footnote 135 Various studies have underscored the significant impact of internet shutdowns on human rights, the digital divide, economic growth, and businesses in India.Footnote 136
Two notable cases illustrate this impact. Following the revocation of Kashmir’s special constitutional status, the government imposed an 18-month ban on 4G internet access—an act described as digital apartheid and collective punishment. The Jammu Kashmir Coalition of Civil Society reported that:
[D]igital sieges are a technique of political repression in Kashmir and a severe impediment to the enjoyment of internationally and constitutionally guaranteed civil, political, and socio-economic rights. They curtail the circulation of news and information, restrict social and emergency communications, and silence and criminalise all forms of political interactions and mobilizations as “militancy-related,” “terrorist activity,” and threats to ‘national security.Footnote 137
Similarly, in Manipur, following violence in 2023–24, internet shutdowns were implemented, marking one of the longest shutdowns that year.Footnote 138 The state government, led by the ruling Bharatiya Janata Party, claimed these measures were necessary to curb rumours and disinformation.Footnote 139 However, critics argue that the shutdown may have exacerbated violence and was intended to limit information about human rights abuses by state-supported majority Hindu Meitei groups from reaching the rest of India and the world.Footnote 140 The prescient warning of Shri Dinen Bhattacharyya, a Member of Parliament who remarked in 1972 during a parliamentary debate on the amendment to Section 5 of the Telegraph Act 1885 that it could be used to create hurdles in disseminating information from states to other parts of the country, seems to have come true.Footnote 141
The internet shutdown in Kashmir was challenged before the Supreme Court in Anuradha Bhasin v. Union of India in 2020.Footnote 142 In Bhasin, the Court’s approach mirrored that of the PUCL case, offering widespread deference to the state, focusing primarily on procedural issues rather than addressing the matter on its merits.Footnote 143 The Court held that internet shutdowns must be narrowly tailored in terms of time and geographic scope, acknowledging some flaws in the ban in Kashmir.Footnote 144 However, when it came to providing relief and striking down the ban, the Court merely directed a government-constituted body under the Temporary Suspension of Telecom Services (Public Emergency or Public Safety) Rules, 2017 (the “Internet Shutdown Rules”), to review the order in light of its guidance.Footnote 145 The Court, did not critically assess whether these safeguards, modeled after those established in PUCL, were adequate. The Court only required that shutdown orders be published;Footnote 146 this requirement was not followed by the government in Kashmir and has become a norm since then.Footnote 147 Ultimately, the Court endorsed the Internet Shutdown Rules along with the model of executive authorization and ex-ante executive review.
This overreliance on internet shutdowns stands in stark contrast with the history of resistance against British India, which took the form of shutting down or disrupting the flow of telegram communication. During the 1857 rebellion, the tactic of destruction and disabling of telegram infrastructure was widely employed, and by January 1858, less than 2500 miles of functioning wire was left.Footnote 148 This forced the British to rely on traditional means of communication for months in many regions.Footnote 149 Similarly, during the Telegraph General Strike of 1908, the protesters’ shutdown disabled different nodes of networks across the British Empire. As Choudhury noted the “[s]trikes travelled along the nerves of the telegraph, leaving states, regions, and networks helpless as the communication system betrayed it.”Footnote 150 The network shutdowns, once a tool for subaltern resistance, are now consolidated in independent India as a coercive legal instrument for control over its “subjects.”
IV. Control Through Infrastructure
Another key pillar of the Telegraph Act 1885 infrastructure of control is Section 4(1), which grants the government the exclusive licence for establishing and operating telegraphs, subject to certain conditions.Footnote 151 These conditions are set out in the Unified License (UL), which any entity intending to offer telecom services in India needs to obtain. UL imposes a range of obligations, granting the government to exert enhanced control over the communication infrastructure and network.Footnote 152 These obligations encompass security vetting of equipment, utilisation of “trusted source” equipment in networks, adherence to standards and certification requirements, regulations governing engagement with third-party vendors for quality of service, auditing, testing, and inspection.Footnote 153 In addition, the licensee needs to install equipment that would enable interception.Footnote 154 As part of the CMS, their infrastructure needs to be connected to regional monitoring systems, which are then connected to the central servers.Footnote 155 This infrastructure enables mass surveillance.Footnote 156 Further, they are required to limit encryption standards to a low threshold to ensure that surveillance, particularly mass surveillance, is not obstructed.Footnote 157 There is a data localization and retention requirement as well.Footnote 158
In conclusion, the Telegraph Act of 1885, initially designed as a colonial instrument of control as part of the emergency governance apparatus, has normalized and persisted as a framework for state hegemony in post-independence India. Despite constitutional amendments and judicial interventions, its provisions continue to offer wide executive discretion and enable asymmetrical power relationships and state hegemony through surveillance, infrastructure control, and internet shutdowns. This reflects a colonial continuity grounded in control, accumulation, and subjectification. The next section will explore how the Telecommunications Act 2023 perpetuates this legacy.
E. Indian Telecommunications Act 2023: Colonial Continuities
The purported object and purpose of the Telecommunications Act 2023 is to “decolonize” the telecom sector, yet a postcolonial lens reveals colonial anxieties etched beneath the surface. The Act, similar to the British Colonial Administration, uses telecommunications infrastructure and networks primarily as instruments for control. I posit this for two reasons. First, the central government has not only reinforced but rather significantly widened its power to monitor and quell the lawful exercise of speech, expression, and the populace. Second, the legislation espouses a colonial mindset; it does not envision the relationship between a post-colonial democratic government and its citizens but instead one between an authoritarian state and its subjects. The legislation categorizes every individual and each instance of expression as inherently suspect. In this section, I do not aim to delve into the legal and policy dimensions of each provision, as these have been widely discussed in mainstream literature. Instead, I focus on connecting key issues within the law to the central characteristics of colonial continuity—technology as control, and constant accumulation—outlined earlier. In parallel with colonial precedents, there is a perpetual compulsion to collect greater and greater intelligence and to confer escalating discretionary powers upon oneself, driven by apprehensions of speculative threats perennially looming on the horizon.
I. Technology as Control
The Telecommunications Act 2023 removes the explicit reference to the term “over the top” (OTT), which was included in the 2022 version of the bill.Footnote 159 However, the underlying definition remains broad enough to encompass OTT services. OTT refers to any service delivered over the public internet, such as digital media, online video or voice communication, e-gaming, e-commerce, social media, and cloud services.Footnote 160 This term effectively covers the entire digital ecosystem built on the physical infrastructure of the internet. Officials from the Department of Telecommunications (DoT) have issued conflicting statements regarding OTT inclusion, but these statements in the absence of a legislative undertaking are not binding.Footnote 161 Likewise, the term “telecom network” is defined broadly to include telecom equipment and “software and intelligence integral to such telecommunication equipment.”Footnote 162 This definition extends beyond traditional telecom services and encompasses a wide range of ancillary infrastructure, including servers, storage solutions, networking equipment, data centers, cloud computing services, leased circuits, and content delivery networks—all essential for delivering a diverse array of internet services.Footnote 163
While these broader terms do not inherently grant control, they significantly empower the central government to regulate modern digital communications and supply chains. These subtle shifts in terminology may have a more substantial influence than other provisions discussed later concerning state coercive power under the Telecommunications Act 2023. The government’s authority—in terms of both continuity and expansion—that will be analysed in the following sections should be viewed through this broader lens, considering who it could potentially control, monitor, or target.
The adjustments in the law’s scope must be contextualized within the evolution of communication technologies from telecom service-based communities to internet-centric communication. Under the Telegraph Act 1885, regulations primarily addressed internet service provision limited to the physical layer of the internet without covering applications built on top of it. As internet usage has surged—evidenced by growing user numbers and data consumption—and its influence on the economy, innovation, governance, and policy has expanded, there has been an increasing push from the DoT to regulate this frontier and its infrastructure.
F. Constant Accumulation
In this article, I refer to constant accumulation as the relentless pursuit of knowledge and intelligence about individuals for the purposes of categorization, targeting, and surveillance. In Section B(I), I examined how, after the 1857 rebellion, the British implemented regulations to monitor and control various communication methods, including telegraphy and print, driven by their anxiety about the “other.” By focusing on telegraph regulations, I highlighted the systematic expansion of state power over the decades. A similar trend is evident in the Telecommunications Act 2023, which retains powers from the Telegraph Act 1885 while adapting to newer communication modes and technological challenges that affect the State’s ability to continuously gather knowledge.
The Telecommunications Act, 2023, retains the interception provision from Section 5(2) of the Telegraph Act, 1885. However, under the former, authorized entities can compel the disclosure of intercepted messages in an “intelligible format,” while the subordinate interception rules dilute the safeguards provided under the latter.Footnote 164 This threatens the adoption of stronger encryption standards, as it indicates that the message should be presented in a readable manner, decrypted. The risk is further compounded by provisions granting the government power to prescribe encryption standards under Sections 19(1)(f) and 21(b)-(c).Footnote 165 Stronger encryption standards—like end-to-end encryption—are critical for individuals like journalists, witnesses, whistleblowers, and for the right to anonymously search the web.Footnote 166 In fact, these standards form the foundation for secure digital communication.
The Act’s provisions for traffic data collection represent another avenue for constant accumulation.Footnote 167 Although ostensibly justified for cybersecurity purposes, the collection of such data opens significant possibilities for surveillance.Footnote 168 The relevant subsidiary rules do not contain a purpose or retention limitation, allowing data to be collected by the union government, or any authorized agency.Footnote 169 This can lead to analysis and processing for purposes or by agencies without any connection to protecting or ensuring telecom cybersecurity. Traffic data can at times reveal more about an individual’s behaviour than the content of their communications.Footnote 170 Without adequate safeguards, the collection of such data risks becoming a backdoor for surveillance, and seriously undermining privacy.
Perhaps most concerning is Section 21 of the Act, which grants the government broad discretionary powers under the nebulous justification of “national security.”Footnote 171 A primary concern is the broad discretion this provision affords the central government through its undefined use of “national security,” which diverges from constitutional terms like “public order.” This ambiguity echoes colonial practices where vague security justifications were employed to suppress dissent. Furthermore, Section 21(f) allows the government to take over or suspend any telecommunication services or networks, including essential infrastructure.Footnote 172 Effectively lowering the threshold for internet shutdowns from previously established judicial criteria of public emergency or safety. Such expansive authority significantly enhances governmental control over the communication value chain. The real-world influence of these powers is already evident in India’s use of internet shutdowns as political tools, particularly targeting marginalized communities. The prolonged 4G ban in Kashmir and shutdowns in Manipur illustrate how such measures obscure human rights violations while disrupting essential communications and services, deepening societal inequalities and suppressing dissent in affected regions.
Overall, the Telecommunications Act 2023 illustrates that while technology has evolved and network scales have expanded significantly over the past 150 years, the underlying logic of constant accumulation persists adapting colonial practices to the digital age while maintaining fundamental power dynamics.
G. State-subject Dynamic
One of the fundamental characteristics of colonialism was the state’s role as a repository of power, employing various mechanisms or technologies of power—such as the apparatus of police or legislation—to create subjects rather than citizens. These mechanisms operated through a dual approach: Direct coercion and the more subtle cultivation of self-regulating behaviours, effectively moulding individuals into compliant subjects rather than empowered citizens.Footnote 173 Mehla, in the context of the new criminal laws, argues that the colonial tendency to “discipline and thereby create a hegemonic norm is present in the new legislation as well, just in a different manner, because the anti-colonial stance cannot be interpreted to mean that the institutions of governance are not functioning under a colonialist structure.”Footnote 174
What is colonial about the telegraph and its regulations lies in their use to create subjects through disciplinary power—a key function of colonial authority.Footnote 175 A post-colonial lenses reveals that these dynamics of discipline and subjectification continue within the Telecommunications Act 2023, despite India’s independence and the end of colonial rule. This subjugation is intrinsically linked to concepts of technology as control and constant accumulation. Consequently, the avenues for control explored in Sections E(I) and E(II) are directly aligned with this colonial approach, ensuring continuity of domination in social relations. However, my focus here will primarily be on biometric governance and surveillance.
The Telecommunications Act 2023 mandates that telecommunication service providers verify customer identities through prescribed biometric methods. This measure aims to prevent the illegal acquisition of SIM cards, which are often used for creating fraudulent online profiles. Akshra and Lakshay have raised concerns about the constitutionality of these provisions, referencing the Indian Supreme Court’s ruling in Puttaswamy v. Union of India (2019).Footnote 176 In that decision, the Court invalidated the mandatory linking of Aadhaar with SIM cards, deeming it a disproportionate response to the issue of illegal applications.Footnote 177 They argue that the current provisions contradict this precedent, as the Court held that mandatory Aadhaar linkage with private services was not permitted.Footnote 178
Further, the law is not narrowly tailored. The Telecommunication Bill 2022 and the Indian Telegraph Act, 1885, allow multiple modes of verification instead of solely biometric verification. Under the latter, even when Aadhaar was used, core biometric data and Aadhaar numbers were not stored—a safeguard absent in the Telecommunications Act 2023. The new law lacks provisions ensuring fair and reasonable processing of biometric data and does not grant individuals the right to access or correct their information. Akshra and Lakshay argue that “in a governmentality of uncertainty in a surveillance era, exceptional situations have transformed into the normal by rationally guiding the conduct of citizens’ everyday, mundane practices through surveillance.”Footnote 179 They contend that biometric surveillance under the Telecommunications Act 2023 falls within this framework, risking the reduction of complex individual identities to mere identification numbers and encroaching on individuals’ freedom to control their personal information’s usage, storage, or dissemination.Footnote 180
The British, as colonial administrators over the “other,” sought knowledge about the populace and landscape to make them legible for administrative control.Footnote 181 The vast amount of data extracted, collated, and analyzed for imperial purposes reveals how knowledge about colonies and colonized subjects was managed and “imagined” in the sense Anderson and Scott identified—as produced. Footnote 182 Enumerative technologies—such as maps, censuses, and biometric methods—played a key role in transforming knowledge into power and producing “truths” about colonized lands.Footnote 183 Thomas examines the comprehensive nature of censuses from the 1880s, highlighting how they foreshadowed modern projects like UID (Aadhaar), which digitize knowledge for administrative purposes.Footnote 184 Sukumar explains how biometric surveillance targeted indigenous groups along racial lines, notably in the identification of “criminal tribes” by the Bengal police, and affected all residents of India. Indeed, the Indian Evidence Act 1899 was the world’s first legislation to endorse fingerprinting as a method of identifying criminals.Footnote 185 The biometric verification mandate in the Telecommunications Act 2023 echoes colonial-era practices in data collection and control, drawing on historical surveillance methods intended to categorize and govern populations. As a governance tool, biometric surveillance erodes the boundary between public and private spheres by reducing human identities to numerical identifiers, thus constructing a compliant and controllable form of subjectivity. In the “whole enchilada of digitalization and informatization of the human body,” the distinction between identity and identification becomes blurred, where “human bodies are no longer looked at as living bodies, but rather as information.”Footnote 186 This shift in power dynamics, rooted in colonial legacies, challenges human identity and dignity in the digital age.
H. Conclusion
A historical account of technology is required to fill in the blanks of its journey.Footnote 187 It is an acknowledgement that “[a]ll human-made tools are birthed within historical dynamics, not in a political vacuum.”Footnote 188 This historical perspective provides insights into the original purposes, conditions of creation, and the transformations these technologies undergo.
The telegraph infrastructure in India, contrary to any benevolent colonial claims, emerged not as a tool for progress but fundamentally as an instrument for the discipline, control, and surveillance of the native populace. I have elucidated how the pervasive colonial anxiety, deeply rooted in the enduring legacy of the 1857 revolt, served as the potent impetus for the rapid expansion of the telecom network and the systematic enactment of a series of repressive telecom regulations, ultimately culminating in the Telegraph Act 1885. This imperial panic, far from being a fleeting moment, birthed not merely new intelligence networks but an entire infrastructure of domination, laying the foundational doctrinal and practical groundwork for technology as a tool of control and cementing an asymmetrical state-subject dynamic.
This Article demonstrates how the Telegraph Act 1885 was not discarded post-independence but actively retained and repurposed within the Indian legal framework. Its legacy persists in its role as the model for interception, surveillance, and communications control provisions within numerous contemporary legislations. My examination of internet shutdown powers, the licensing regime under the UL, and the Telecommunications Act 2023 illustrates how colonial-era legal techniques of exceptionalism and discretionary control have been seamlessly assimilated into post-colonial governance, facilitating mass surveillance and a growing consolidation of state authority over communication infrastructures. These doctrinal continuities are neither incidental nor residual but represent deliberate legislative choices that echo colonial impulses privileging state security over civil liberties.
Through the application of a post-colonial theoretical lens, this Article has demonstrated that there has been no genuine rupture or fundamental discontinuity between the colonial and post-colonial eras concerning these pivotal telecommunication laws. Instead, what we observe is a profound and persistent colonial continuity. Irrespective of the superficial legal transformations and the profound evolution of underlying communication technologies, the core nature of the colonial disposition—particularly its methods of governance and control have, I posit, remained remarkably consistent for over a century. The key features defining this colonial continuity remain starkly apparent: (1) The employment of technology as instruments for pervasive control, censorship, and social discipline; (2) the persistent depiction of the relationship between the state and its citizens as one of authoritarian oversight over subjects, rather than a reciprocal engagement with rights-bearing citizens; and (3) an unyielding and insatiable pursuit to gather extensive knowledge and intelligence about individuals for the purposes of precise categorization, targeted intervention, and pervasive monitoring. These deeply ingrained features of coloniality permeate both the historical Telegraph Act 1885 and, disturbingly, the contemporary Telecommunications Act 2023, extending their influence across the broader framework of surveillance laws briefly discussed in this Article.
The Telecommunications Act 2023 must be contextualized within the broader push for decolonization in recent years. This trend includes the introduction of three new criminal laws, the now-withdrawn Broadcasting Services (Regulation) Bill 2023, and the Criminal Procedure (Identification) Act 2022 all framed as efforts to replace colonial-era laws and signal a departure from the colonial past. However, critics argue that these laws revive colonial baggage and often exacerbate the status quo. Arun argues that laws hold “communications under siege” and links this to “authoritarian surveillance rooted in an inherited colonial legacy.”Footnote 189 These misguided efforts are not genuine attempts at decolonization; they represent efforts at “indigenization” that replicate colonial values and dispositions.Footnote 190 The issue with these laws is their failure to understand what is fundamentally colonial about the regulations they seek to “decolonize,” which I address in relation to the Telecommunications Act 2023 in this Article.Footnote 191 The recent push for indigenization of “colonial” laws has theocratic undertones. For instance, the new criminal laws derive their names from Hindi and Sanskrit, and the Universal Service Obligation Fund has been renamed the Digital Bharat Nidhi Fund under the Telecommunications Act 2023. Similarly, there have been sustained efforts to rename cities using Hindu and Sanskrit nomenclature.Footnote 192 The vocabulary of decolonization is being co-opted and deployed in the service of right-wing authoritarian populism. Prime Minister Narendra Modi and his party are portrayed as “genuinely freeing India from its colonial baggage, returning India to its ’true’ Hindu-Vedic roots, and uniting a nation divided by colonizers.”Footnote 193 Meanwhile, the Indian National Congress is criticized for having been dominated by colonial elites and collaborators at the time of independence.Footnote 194 The right-wing narrative further argues that many of India’s present social issues stem from the continued dominance of an “outsider-imposed” historical narrative that has left the Indian mind “possessed, and handicapped.”Footnote 195 The right wing has for a long promoted a notion of Hindutva that is inherently exclusionary, based on the belief that there was a glorious Hindu civilizational state in the past before colonization by the Mughals and the British.Footnote 196 The Hindutva’s values and priorities are also to an extent reflected in the Indian Constitution.Footnote 197 Without delving further into the broader contestations within decolonial discourse, this Article offers preliminary insights for particularly postcolonial legal inquiry. First, decolonization claims must be carefully historicized. Second, material conditions—beyond cultural, psychological, and political dimensions—must be rigorously examined, as they are often overlooked. Third, the exclusionary tendencies within the decolonial lens must be acknowledged, as they risk undermining its generative and progressive potential. Finally, the decolonial turn should not be mistaken for a call for radical alterity.
In conclusion, the historical analysis reveals a deeply entrenched colonial continuity, from the Telegraph Act 1885 to the Telecommunications Act 2023. Despite the government’s assertive claims of decolonization, these laws persistently perpetuate a framework defined by coercive control, extensive surveillance, and an inherent power imbalance between the state and its citizens. The recent push for “indigenization” fails to address the core colonial aspects of these regulations, often exacerbating existing issues under the guise of modernization. A genuine attempt at decolonizing telecom regulation requires identifying and addressing the structural colonial dispositions in laws while prioritizing fundamental rights, democratic principles, and equitable access.
Acknowledgments
The author extends sincere gratitude to Mrs. Sanskriti Sanghi and Mr. Abhijeet Shrivastava for their thoughtful review, insightful comments, and valuable feedback, which significantly strengthened this paper.
I would like to thank Abhijeet Shrivastava for their multiple rounds of review and valuable inputs on the paper. Thanks, are also due to Ayan Gupta and Nidhi Jha. Any mistakes in the paper are entirely my own.
Funding Statement
The author declares none.
Competing Interests
No funding has been declared in relation to this Article.