Violent Indian Separatists Using Twitter Bots

Recent research from Network Contagion Research Institute (NCRI) found that pro-Khalistani groups are using Twitter bots to promote violence and anti-India propaganda on social media platforms.

And as the conflict continues between the Indian government and Sikh separatists, backers of the separatist ideology are using multiple networks of linked accounts to trend tweets that include videos and calls for action simultaneously.

A network of bots run by supporters of the pro-Khalistan Sikhs for Justice and virtual activists in Pakistan appear to have teamed up to foment attacks inside India and abroad following after New Delhi had launched a manhunt to nab separatist fugitive Amritpal Singh.

The Sikh separatist movement has found the most traction in the farming population of the Indian Punjab state.

Despite India recently revoking Internet access to the Punjab state, it is suspected that separatists are receiving assistance from the government of Pakistan. 

The Network Contagion Research Institute (NCRI) has identified over 359 active accounts projecting separatist rhetoric since the new year. Networks of 20 to 50 accounts were used to tweet the same message multiple times, each tagging new journalists and public figures to boost exposure. The NCRI is concerned that escalations of online rhetoric directly lead to increased vandalism and violence worldwide.

Approximately 20 percent of networked accounts are labeled as Pakistani, and many messages from the accounts mention that Sikhs should be thankful for Pakistani support. These activities have increased exponentially since the Punjab Police and Central Agencies started a massive crackdown on pro-Khalistani separatist leader Amritpal Singh. the report says.

The activity on social media has been found to revolve around the violent protests outside Indian consulates in San Francisco and other cities worldwide and assaults on Indian officials and journalists during these protests.

Twitter has suspended various accounts linked to the Khalistani campaign, but the slimmed security staff struggles to defend against growing links between online rhetoric and real-world violence.

OpIndia:   Oodaloop;     Washington Post:     Indian Narrative:    Reddit:   Flipboard

You Might Also Read: 

A Genocide Incited On Facebook:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Locked Shields - NATO’s 2023 Cyber Exercise
Facebook Delivers Fake Reviews »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Indelible Data

Indelible Data

Indelible Data is an established information security and technology consultancy and a Cyber Essentials Certification Body.

TrustedIA

TrustedIA

TrustedIA is a cyber and protective security company. Our mission is to help businesses protect themselves from disruptive events that can impact their successful operation.

NATO Cooperative Cyber Defence Centre (CCDCOE)

NATO Cooperative Cyber Defence Centre (CCDCOE)

NATO CCDCOE's mission is to enhance the capability, cooperation and information sharing among NATO, NATO nations and partners in cyber defence.

Conscio Technologies

Conscio Technologies

Conscio Technologies is a specialist in IT security awareness. Our solutions allow you to easily manage innovative online IT awareness campaigns.

Konfidas

Konfidas

Konfidas provide high-level cybersecurity consulting and professional tailored solutions to meet specific cybersecurity operational needs.

ERMProtect

ERMProtect

ERMProtect is a leading Information Security & Training Company that helps businesses improve their cybersecurity posture and comply with regulations.

Brainloop

Brainloop

Brainloop's security architecture enables you to work on and distribute strictly confidential documents both within and beyond the firewall.

BullGuard

BullGuard

BullGuard is an award-winning cybersecurity company focused on providing the consumer and small business markets with the confidence to use the internet in absolute safety.

Ukrainian Academy of Cyber Security (UACS)

Ukrainian Academy of Cyber Security (UACS)

UACS is a professional non-profit public organization established to promote the development of an extensive network and ecosystem of education and training in the field of cyber security.

Salt Cybersecurity

Salt Cybersecurity

Salt Cybersecurity offer a four-pronged approach to information security that includes Custom Security Policy, Vulnerability Assessment, Threat Detection, and Security Awareness Training.

Informatics International

Informatics International

Informatics is a leading ICT provider in Sri Lanka, providing cutting-edge software & infrastructure solutions and services including cyber security.

Activu

Activu

Activu makes any information visible, collaborative, and proactive for people tasked with monitoring critical operations including network security.

Baxter Clewis Consulting

Baxter Clewis Consulting

Baxter Clewis are cyber security and compliance experts. We provide Security Consulting, IT Assurance, and Technical Security services.

CySecK

CySecK

CySecK is a Centre of Excellence in Cybersecurity formed in 2017 by the Government of Karnataka, as part of the Technology Innovation Strategy.

Protega

Protega

Protega is a company specialized in Managed Cybersecurity Services (MSS) & SOC 24×7; management, risk & compliance (GRC); implementation of data protection technologies; and Red Team services.

Assura

Assura

Assura provides innovative cybersecurity advisory and managed services to all industries including government, healthcare, financial, manufacturing, and transportation sectors.