Canada Accuses India Of Using Spyware To Track Separatists

A Canadian spy agency has said India is using cyber technology to track separatists abroad. In a report, Canada’s Communications Security Establishment (CSE) said India was using cyber capabilities “to track and surveil activists and dissidents living abroad” as well as stepping up cyber attacks against Canadian government networks.

The CSE said that the Indian government is using illicit spyware to track separatists abroad, in response to Canada's accusation that a top Indian official of authorising violence that included the killing of a Sikh in Vancouver. 

Canada has the largest Sikh community outside of India, and includes activists for an independent Sikh state. “It is clear that we are seeing India being an emerging [cyber] threat actor,” the CSE chief, Caroline Xavier, told a news conference. In the report, her agency blamed the rift in bilateral relations between Canada and India for “very likely” driving this activity.

The report notes that, “a pro-India hacktivist group” launched crippling DDoS attacks, flooding a system with online traffic to make it inaccessible to legitimate users, against Canadian websites including the military’s public-facing website.

Canadian officials say they have  traced a campaign targeting Canadian Khalistan activists to the highest levels of Prime Minister Narendra Modi’s government. Testifying at a house of commons public safety and national security committee, the deputy minister of foreign affairs, David Morrison, confirmed a Washington Post story that implicated the Indian home affairs minister, Amit Shah, in the plot to intimidate and assassinate Canadian Sikhs.

The Canadian prime minister, Justin Trudeau, and the national police have said there are “clear indications” of India’s involvement in the murder, as well as a broad campaign of intimidation, violence and other threats against Khalistan activists. 

Government relations have deteriorated and Delhi and Ottawa recently each expelled the other’s ambassador and other senior diplomats. 

CSE   |   Guardian   |   Guardian   |    Barrons   |    Bloomberg   |    YCombinator   |   FirstPost  |    Allsides 

Image: Ideogram 

You Might Also Read: 

Israeli Hacking Spyware In Widespread Use:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Russian & Chines Affiliated Hackers Attack The Netherlands

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Aptive Consulting

Aptive Consulting

Aptive is a cyber security consultancy providing Penetration Testing and Vulnerability Assessment services.

Stott & May

Stott & May

Stott & May is a specialist cyber security recruitment agency.

Malta Information Technology Agency (MITA)

Malta Information Technology Agency (MITA)

MITA is the central driver of Government Information and Communications Technology (ICT) policy, programmes and initiatives in Malta.

NopSec

NopSec

NopSec provides automated IT security control measurement and risk remediation solutions to help businesses protect their IT environments from security breaches.

Cyberteq

Cyberteq

Cyberteq is an innovative Information and Communication Technology Consulting Company, enabling it’s customers to take full advantage of the latest technologies in a secure manner.

NTIC Cyber Center

NTIC Cyber Center

NTIC Cyber Center is an organization dedicated to making the National Capital Region (Washington DC) more resilient to cyber-attacks.

eResilience

eResilience

eResilience is a division of Referentia Systems, a pioneer in an ultra-secure information safeguarding technique known as “Enclaving”, in which data can be segmented and protected within a network.

British Blockchain Association (BBA)

British Blockchain Association (BBA)

British Blockchain Association (BBA) is a not-for-profit organisation that promotes evidence-based adoption of Blockchain and Distributed Ledger Technologies (DLT) across the public and private sector

Breadcrumb Cybersecurity

Breadcrumb Cybersecurity

Breadcrumb Cybersecurity is a cybersecurity and advisory firm. We specialize in penetration testing, threat hunting, incident response, regulatory compliance, and employee training services.

FiVerity

FiVerity

FiVerity provides financial institutions with cyber fraud defense to combat a dangerous and growing threat - the convergence of fraud-related theft with sophisticated, high-volume cyber attacks.

Diligent

Diligent

Diligent's SaaS GRC platform gives leaders a connected view of governance, risk, compliance and ESG across their organization.

Sealing Technologies (SealingTech)

Sealing Technologies (SealingTech)

SealingTech is a leader in cutting edge research, products, engineering, and integration services in the Internet of Things, Edge, Machine Learning, Artificial Intelligence, and Cloud.

Metabase Q

Metabase Q

Metabase Q protects you from financial and reputational losses with more efficient and intelligent cybersecurity, using the best worldwide in technologies, processes and specialists.

Strivacity

Strivacity

Strivacity lets brands quickly add secure login and identity management capabilities to their customer-facing applications without tying up an army of developers or consultants to do it.

Phriendly Phishing

Phriendly Phishing

Phriendly Phishing offers phishing awareness training programs designed to ward off potential security threats and minimise the impact of cyber attacks.

Fulcrum IT Partners

Fulcrum IT Partners

Fulcrum IT Partners is the parent company of an expanding portfolio of established IT solution companies around the world with proven expertise in cyber security, cloud, and managed services.