Canada Accuses India Of Using Spyware To Track Separatists

A Canadian spy agency has said India is using cyber technology to track separatists abroad. In a report, Canada’s Communications Security Establishment (CSE) said India was using cyber capabilities “to track and surveil activists and dissidents living abroad” as well as stepping up cyber attacks against Canadian government networks.

The CSE said that the Indian government is using illicit spyware to track separatists abroad, in response to Canada's accusation that a top Indian official of authorising violence that included the killing of a Sikh in Vancouver. 

Canada has the largest Sikh community outside of India, and includes activists for an independent Sikh state. “It is clear that we are seeing India being an emerging [cyber] threat actor,” the CSE chief, Caroline Xavier, told a news conference. In the report, her agency blamed the rift in bilateral relations between Canada and India for “very likely” driving this activity.

The report notes that, “a pro-India hacktivist group” launched crippling DDoS attacks, flooding a system with online traffic to make it inaccessible to legitimate users, against Canadian websites including the military’s public-facing website.

Canadian officials say they have  traced a campaign targeting Canadian Khalistan activists to the highest levels of Prime Minister Narendra Modi’s government. Testifying at a house of commons public safety and national security committee, the deputy minister of foreign affairs, David Morrison, confirmed a Washington Post story that implicated the Indian home affairs minister, Amit Shah, in the plot to intimidate and assassinate Canadian Sikhs.

The Canadian prime minister, Justin Trudeau, and the national police have said there are “clear indications” of India’s involvement in the murder, as well as a broad campaign of intimidation, violence and other threats against Khalistan activists. 

Government relations have deteriorated and Delhi and Ottawa recently each expelled the other’s ambassador and other senior diplomats. 

CSE   |   Guardian   |   Guardian   |    Barrons   |    Bloomberg   |    YCombinator   |   FirstPost  |    Allsides 

Image: Ideogram 

You Might Also Read: 

Israeli Hacking Spyware In Widespread Use:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Russian & Chines Affiliated Hackers Attack The Netherlands
The Importance Of Ensuring Domain Infrastructure Security »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Logicalis

Logicalis

Logicalis are a leading provider of global IT solutions and managed services.

QTS

QTS

QTS Realty Trust, Inc. is a leading provider of secure, compliant data center, hybrid cloud and managed services.

Certes

Certes

Certes is a pioneer in delivering cutting-edge security technology solutions, with a specific focus on Data Protection Risk Mitigation (DPRM).

Fastpath Solutions

Fastpath Solutions

Fastpath deliver software solutions that enable you to take control of your security, compliance and risk management initiatives.

Karlsruhe Institute of Technology (KIT)

Karlsruhe Institute of Technology (KIT)

KIT is a leading research and education institutions with strong capabilities in information systems and security.

National Information Technology Development Agency (NITDA) - Nigeria

National Information Technology Development Agency (NITDA) - Nigeria

The National Information Technology Development Agency (NITDA) is committed to implementing the Nigerian National Information Technology Policy.

Innotec Security

Innotec Security

Innotec Security is a Spanish company specializing in cybersecurity-as-a-service, cyber resilience and cyber risk management.

ENEA Qosmos Division

ENEA Qosmos Division

Qosmos, a division of Enea, leads the market for IP traffic classification and network intelligence technology used in physical, SDN and NFV architectures.

Sandline Discovery

Sandline Discovery

Sandline Discovery provides digital forensics, eDiscovery solutions, managed review and litigation consulting services.

Incognito Forensic Foundation Lab (IFF Lab)

Incognito Forensic Foundation Lab (IFF Lab)

IFF Lab is a premier cyber and digital forensics lab in India that offers forensic services and solutions, cyber security analysis and assessment, IT support, training and consultation.

Cybertonica

Cybertonica

Cybertonica is a FinTech company which detects and prevents fraudulent transactions and reduces risk for financial services organisations.

TES

TES

TES is a provider of IT Lifecycle Services, offering bespoke solutions that help customers manage the commissioning, deployment and retirement of Information Technology assets.

Contextual Security Solutions

Contextual Security Solutions

Contextual Security Solutions is a leading provider of penetration testing services and IT security & compliance audits.

OX Security

OX Security

OX is a DevOps software supply chain security solution. Teams can verify the integrity and security of every artifact using a pipeline bill of materials (PBOM).

Kivera

Kivera

Kivera enforces your organisation governance and security policies across cloud deployments preventing misconfigurations turning into attack vectors.

C5 Technology

C5 Technology

C5 Technology specialises in the provision of networking, security, and infrastructure services to enterprises and government agencies.