Violent Indian Separatists Using Twitter Bots

Recent research from Network Contagion Research Institute (NCRI) found that pro-Khalistani groups are using Twitter bots to promote violence and anti-India propaganda on social media platforms.

And as the conflict continues between the Indian government and Sikh separatists, backers of the separatist ideology are using multiple networks of linked accounts to trend tweets that include videos and calls for action simultaneously.

A network of bots run by supporters of the pro-Khalistan Sikhs for Justice and virtual activists in Pakistan appear to have teamed up to foment attacks inside India and abroad following after New Delhi had launched a manhunt to nab separatist fugitive Amritpal Singh.

The Sikh separatist movement has found the most traction in the farming population of the Indian Punjab state.

Despite India recently revoking Internet access to the Punjab state, it is suspected that separatists are receiving assistance from the government of Pakistan. 

The Network Contagion Research Institute (NCRI) has identified over 359 active accounts projecting separatist rhetoric since the new year. Networks of 20 to 50 accounts were used to tweet the same message multiple times, each tagging new journalists and public figures to boost exposure. The NCRI is concerned that escalations of online rhetoric directly lead to increased vandalism and violence worldwide.

Approximately 20 percent of networked accounts are labeled as Pakistani, and many messages from the accounts mention that Sikhs should be thankful for Pakistani support. These activities have increased exponentially since the Punjab Police and Central Agencies started a massive crackdown on pro-Khalistani separatist leader Amritpal Singh. the report says.

The activity on social media has been found to revolve around the violent protests outside Indian consulates in San Francisco and other cities worldwide and assaults on Indian officials and journalists during these protests.

Twitter has suspended various accounts linked to the Khalistani campaign, but the slimmed security staff struggles to defend against growing links between online rhetoric and real-world violence.

OpIndia:   Oodaloop;     Washington Post:     Indian Narrative:    Reddit:   Flipboard

You Might Also Read: 

A Genocide Incited On Facebook:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Locked Shields - NATO’s 2023 Cyber Exercise
Facebook Delivers Fake Reviews »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Code Dx

Code Dx

Code Dx is a software application vulnerability correlation and management system.

Momentum

Momentum

The Cyber Security team at Momentum offers a professional and specialist recruitment service across Cyber & IT Security.

Pradeo

Pradeo

Pradeo Security offers a complete, automatic and seamless protection to mobile devices and applications, aligned with your organization security policy while preserving business agility.

Cyberlitica

Cyberlitica

Cyberlitica (formerly iPhish) provides a Workforce Threat Intelligence application that significantly augments companies’ cyber threat prevention efforts.

IEEE Cyber Science and Technology Congress (CyberSciTech)

IEEE Cyber Science and Technology Congress (CyberSciTech)

CyberSciTech provides a platform for scientists, researchers, and engineers to share their latest ideas and advances in the broad scope of cyber-related science, technology, and application topics.

Enterprise Ethereum Alliance (EEA)

Enterprise Ethereum Alliance (EEA)

EEA is a member-led industry organization whose objective is to drive the use of Ethereum blockchain technology as an open-standard to empower ALL enterprises.

Argo Group

Argo Group

Argo is an international underwriter of specialty insurance. Argo Cyber offers a full spectrum of coverage solutions related to professional and technology services.

Blu Venture Investors (BVI)

Blu Venture Investors (BVI)

Blu Venture Investors is a venture capital firm that supports early stage companies with a focus on technology in diverse domains including cybersecurity, IoT, defense and homeland security.

Phy-Cy.X Security Group

Phy-Cy.X Security Group

Phy-Cy.X specialize in the “Physics” of Information Security through both physical and cyber domains. We are not an IT company, we ARE an Information Security company.

Nucleon Security

Nucleon Security

Nucleon Endpoint Detection and Response EDR is the most effective way to protect the value created by your organization against any threat.

doIT Solutions

doIT Solutions

doIT solutions specialize in IT security and infrastructure, security automation, data center, and cybersecurity.

Shorebreak Security

Shorebreak Security

Shorebreak Securioty specialize in conducting highly accurate, safe, and reliable Information Security tests to determine the risks posed to your business.

Sterling Information Technologies

Sterling Information Technologies

Sterling is an information security, operational risk consulting and advisory group. Our Advisory services help to safeguard information assets while supporting business operations.

Board of Cyber

Board of Cyber

Board of Cyber offers Security Rating: a fast, non-intrusive, continuous, 100% automated solution to evaluate the cyber performance of an organization.

Orchestrate Technologies

Orchestrate Technologies

Orchestrate Technologies provides computer network and IT managed services for small and mid-market clients as well as small enterprise businesses.

Pacific Certifications

Pacific Certifications

Pacific Certifications provide accredited certification, training and support services to help you improve processes, performance and products and services.