Sanchar Saathi App Mandate: The Tech & Legal Architecture Decoded

author-image
Lavanya Tomar
New Update
1
Listen to this article
00:00/ 00:00

The Architecture of Sanchar Saathi: Decoding India's Aborted Smartphone Surveillance Mandate

On November 28, 2025, the Indian government attempted to execute one of the most expansive digital mandates in the history of its $48 billion smartphone market. The Department of Telecommunications (DoT) issued a secretive directive requiring all smartphone manufacturers and importers to pre-install the "Sanchar Saathi" cybersecurity application on all new devices within 90 days, and push it to existing devices via firmware updates. 

The mandate was rolled back just days later on December 3, following massive industry pushback and public outcry. However, the technical and legal architecture of the attempted rollout reveals a systemic blueprint for state surveillance. By analyzing official DoT directives, technical permission structures, and the underlying legal frameworks, a clear picture emerges: the Sanchar Saathi mandate was not merely an anti-fraud initiative, but an attempt to establish persistent, root-level access to the personal devices of millions of Indian citizens.

1

The Anatomy of a Mandate: Code as Law

To understand the scale of the November directive, it is necessary to trace the platform's evolution. According to official DoT records, Sanchar Saathi was initially launched in May 2023 as a voluntary web portal designed to help users track lost phones and report telecom fraud. By January 2025, it was officially launched as a mobile application.

As a voluntary tool, the platform demonstrated measurable utility. Official government data indicates that by early December 2025, the app had recorded between 1.4 crore (14 million) and 1.5 crore downloads. Enforcement metrics were substantial: the platform successfully blocked over 42.14 lakh stolen or lost phones, traced 26 lakh devices, and disconnected 1.43 crore fraudulent mobile connections.

However, the transition from a voluntary utility to a mandatory installation fundamentally altered the platform's nature. The November 28 directive, issued under the Telecom Cyber Security Rules, explicitly ordered manufacturers to ensure the app's functionalities "are not disabled or restricted." Manufacturers were threatened with punitive action under the Telecommunications Act, 2023, if they failed to submit compliance reports within 120 days.

This written legal directive stood in stark contrast to the government's public defense. On December 2, as backlash mounted, Union Communications Minister Jyotiraditya Scindia defended the app in Parliament, stating: *"Sanchar Saathi app se na snooping sambhav hai, na snooping hoga [Neither is snooping possible through the Sanchar Saathi app, nor will it happen]. I can delete it like any other app, as every citizen has this right in a democracy."*

The contradiction between the Minister's claim of a "completely optional" app and the DoT's written mandate prohibiting the disabling of the software highlights a critical disconnect between public messaging and regulatory reality.

The Technical Reality: System Apps and Root Access

The most severe implications of the Sanchar Saathi mandate lie in its technical execution. According to its official privacy policy, the application requests access to a vast array of sensitive data points: IMEI numbers, SMS logs, call logs, camera, location, and local device storage.

When a user voluntarily downloads an application from an app store, modern mobile operating systems (iOS and Android) allow the user to grant, restrict, or revoke these permissions at will. However, cybersecurity analysts estimate that pre-installing an application at the manufacturer level elevates it to "system app" status. 

System apps operate at the root OS layer. They possess stronger bindings with the device hardware and software, granting them persistent, non-consensual access to sensitive data without triggering standard permission prompts. As Nikhil Pahwa, founder of MediaNama, noted in reports from credible outlets: "The app gets installed on the OS layer and pre-installed apps usually have much stronger binding with the device... it is a perpetual occupation of your personal device."

2

The Threat of Client-Side Scanning

Mainstream coverage of the mandate heavily framed the app as an anti-fraud tool, largely missing the broader technical context. By mandating root access alongside permissions for SMS logs, call data, and local storage, the government was effectively laying the groundwork for "client-side scanning."

Cybersecurity experts estimate that with these permissions permanently locked into the OS layer, a simple server-side update could theoretically allow the state to scan for banned applications, correlate SIM activity, or flag Virtual Private Network (VPN) usage directly on the user's device. This shifts the burden of surveillance from telecom networks (wiretapping) directly into the citizen's pocket.

The Legal Architecture: Consent for Thee, Not for Me

The government has repeatedly claimed that Sanchar Saathi aligns with the data minimization principles of the Digital Personal Data Protection (DPDP) Act, 2023. However, a structural analysis of the Act reveals a two-tier system of privacy.

While Section 6 of the DPDP Act mandates strict user consent for private entities processing data, Section 17 grants the state broad, sweeping exemptions to process personal data without user consent under the umbrella of "national security" and "maintenance of public order." Legal experts point out that this statutory loophole allows state-mandated applications to bypass the very privacy protections the government claims to uphold.

Furthermore, the mandate was issued under the newly amended Telecom Cyber Security Rules, 2024. These rules introduced the "Telecommunication Identifier User Entity" (TIEU), a framework enabling the state to personally identify users through their phone numbers and device identifiers. 

3

Failing the Puttaswamy Test

Beyond statutory law, the mandate faced severe constitutional hurdles. In the landmark *K.S. Puttaswamy v. Union of India (2017)* judgment, the Supreme Court of India established a three-pronged test for state intrusion into privacy: legality, necessity, and proportionality.

Constitutional lawyers and legal experts widely view the Sanchar Saathi mandate as a failure of the proportionality test. Bharat Chugh, former civil judge and lawyer, described the mandate as Orwellian, noting to credible outlets that *"a non-removable app that has access to calls, messages, and storage risks creating a permanent surveillance backdoor in our devices."* Forcing a root-level application onto every citizen's phone to catch a subset of telecom fraudsters is a disproportionate measure that treats the entire population as suspects by default.

Market Pushback and the Feature Phone Blindspot

The mandate's collapse was accelerated by immediate resistance from the global technology market. India's smartphone market is valued at an estimated $48 billion, and sudden compliance costs forced Original Equipment Manufacturers (OEMs) into an impossible position.

Reports from credible outlets indicate that Apple flat-out refused to comply with the edict. A non-removable, state-mandated application fundamentally violates Apple's closed-ecosystem software model and its global privacy positioning. The government's inability to force compliance from one of the world's largest tech companies highlighted the logistical fragility of the mandate.

Furthermore, the policy suffered from a glaring demographic blindspot. Analysts estimate that the mandate entirely ignored India's massive population of feature-phone users. This demographic is disproportionately rural, lower-income, and highly vulnerable to the exact types of telecom fraud Sanchar Saathi is designed to prevent. Because feature phones cannot install smartphone applications, the "universal security" argument presented by the DoT was fundamentally flawed from inception.

Historical Precedent: The Aarogya Setu Playbook

The trajectory of the Sanchar Saathi mandate is not an isolated incident; it is a repetition of established state behavior. The rollout closely mirrors the government's aggressive push of the Aarogya Setu contact-tracing app during the COVID-19 pandemic in 2020.

Aarogya Setu was initially made mandatory for public and private sector employees, with local authorities threatening punitive action for non-compliance. Following massive outcries from privacy advocates regarding data retention and surveillance capabilities, the government quietly rolled the mandate back to a "best effort" basis.

The Sanchar Saathi timeline—a quiet mandate, public denial of its mandatory nature, followed by a swift rollback citing "increasing voluntary acceptance"—is a direct deployment of the Aarogya Setu playbook.

4

Conclusion: The Line Between Cybersecurity and Cyber Prison

The official rollback of the Sanchar Saathi pre-installation directive on December 3-4, 2025, is a victory for digital privacy, but it is likely only a tactical retreat. The legal frameworks that enabled the mandate—Section 17 of the DPDP Act and the Telecom Cyber Security Rules—remain entirely intact.

The Sanchar Saathi episode serves as a critical stress test of India's digital democracy. It proves that the state possesses both the technical ambition and the statutory mechanisms to attempt mass, device-level surveillance under the guise of consumer protection. As mobile devices increasingly serve as the primary repositories of our personal, financial, and social lives, the line between a cybersecurity tool and a cyber prison is written entirely in code. Until the underlying legal exemptions granting the state unchecked access to personal data are reformed, the architecture for the next mandate is already built, waiting for the right moment to be deployed.

Surveillance sanchar saathi telecom data cybersecurity