India’s Political Parties Fighting A Cyberwar

With just a couple of months to go before assembly elections in Karnataka State, southern India (pop.65m) , political parties have all but declared war in cyberspace, in an attempt to woo young voters. 

Ironically, the leaders of the three major parties, chief minister Siddaramaiah, BJP chief B S Yeddyurappa' and JD(S) leader H D Kumaraswamy, cannot claim to be tech savvy. 

Yet, social networking sites, websites, blogs, almost every platform on cyberspace, are abuzz with sarcastic and, increasingly, vitriolic posts. "An all-party delegation to PM, letters to Goa CM, attempts at tri-party meeting and in various other ways CM @siddaramaiah has tried to solve the Mahadayi issue. The BJP Government at the Centre & in Goa did not respond to any of these overtures. Will BJP answer why?" tweeted the state Congress, followed by a four-minute promotional video. 

The central BJP, perhaps, was first off the blocks in realising the importance of a cyber campaign, but the others have caught up and they are now on an equal footing. The battle in Karnataka intensified after the BJP launched its 'Parivartana Yatra' and the Congress its 'Sadhana Sambrahma'. "Siddaramaiah and Yeddyurappa have been very active on Twitter," said a city-based social-networking expert. "They send out two to six tweets a day through their Twitter handlers and backroom strategists.

Almost all the major rallies by BJP and Congress leaders are streamed live on social media. “Those who cannot attend the rallies can get live updates. The parties also choose quotable quotes, illustrations, facts and figures to prove a point over their political rivals."

G Ravishankar, a social media analyst, revealed that since November, the general traffic on all three parties' Twitter and Facebook accounts have, on an average, seen a 10-fold increase in the number of daily transactions and user reach. 
"In the past one week (December 1 to 31), Siddaramaiah has tweeted 255 times and posted 54 videos, while Yeddyurappa has tweeted 220 times and posted about 35 videos. This is bound to double as polls near."

The latest flash point between the two sides is the triple talaq bill. Some Congress leaders have opposed the penal clause, while BJP leaders have cheered it. 

Experts claim political parties have augmented their online presence for the 2018 polls. They say the intensity this time is nothing compared to the 2013 assembly elections.

Ein News

You Might Also Read: 

India Internet Shutdowns 'Violate Human Rights':

Cyber Police Stations Across India:

Solutions To Combat ‘Fake News’:
 

 

« Get Serious About Hardware Cybersecurity
Making Data Scientists More Productive »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Davis Wright Tremaine (DWT)

Davis Wright Tremaine (DWT)

Davis Wright Tremaine is a full-service law firm with offices throughout the US and in Shanghai, China. Practice areas include Technology, Privacy & Security.

IoT Security Foundation (IoTSF)

IoT Security Foundation (IoTSF)

IoTSF is a collaborative, non-profit organisation with a mission to raise the quality and drive pervasive security in the Internet of Things.

MSG Systems

MSG Systems

MSG are committed to intelligent IT and industry solutions and offer independent consulting on all aspects of information security.

Crossword Cybersecurity

Crossword Cybersecurity

We work with research intensive European university partners to identify promising cyber security intellectual property from research that meets emerging real-world challenges.

Pentagon Group

Pentagon Group

Pentagon Group is a provider of security services in high-risk environments, remote areas and emerging markets in support of land-based, aviation, maritime and cyber operations.

Secure-IC

Secure-IC

Secure-IC provide end-to-end, best-of-breed security expertise, solutions, and hardware & software technologies, for embedded systems and connected objects.

SecSign Technologies

SecSign Technologies

SecSign Technologies delivers user authentication, messaging, file sharing, and file storage with next generation security for company networks, websites, platforms, and devices.

Cybermerc

Cybermerc

Cybermerc's services, training programmes and cyber security solutions are designed to forge collaborations across industry, government and academia, for collective defence of our digital borders.

Digitpol

Digitpol

Digitpol’s Cyber Crime Investigation experts investigate hacking incidents, ransomware, extortion and conduct security audits and IT upgrades.

FPT Software

FPT Software

As a leading technology service provider, FPT assists customers of all sizes and from any industries in implementing and adapting digital technologies including cybersecurity.

BCyber

BCyber

BCyber is a Swiss Cyber Security company that provides security products, training, and managed services to protect diverse IT and OT environments against cyber, physical, and cyber-physical threats.

Limes Security

Limes Security

Limes Security GmbH is the leading OT Security expert in the German-speaking region of Europe.

Rootly

Rootly

Rootly is an incident management platform on Slack that helps automate manual admin work during incidents.

Third Wave Innovations

Third Wave Innovations

Third Wave Innovations (formerly RCS Secure) offers a full spectrum of cybersecurity safeguards and IT services.

Disecto Technologies

Disecto Technologies

At Disecto, we provide SaaS based Data Discovery, Classification and a remediation solution for data privacy compliance.

Amtivo Group

Amtivo Group

Amtivo provides Certification, Inspection and Training services to national and local Government bodies, multi-nationals, enterprise clients and SMEs.