Violent Indian Separatists Using Twitter Bots

Recent research from Network Contagion Research Institute (NCRI) found that pro-Khalistani groups are using Twitter bots to promote violence and anti-India propaganda on social media platforms.

And as the conflict continues between the Indian government and Sikh separatists, backers of the separatist ideology are using multiple networks of linked accounts to trend tweets that include videos and calls for action simultaneously.

A network of bots run by supporters of the pro-Khalistan Sikhs for Justice and virtual activists in Pakistan appear to have teamed up to foment attacks inside India and abroad following after New Delhi had launched a manhunt to nab separatist fugitive Amritpal Singh.

The Sikh separatist movement has found the most traction in the farming population of the Indian Punjab state.

Despite India recently revoking Internet access to the Punjab state, it is suspected that separatists are receiving assistance from the government of Pakistan. 

The Network Contagion Research Institute (NCRI) has identified over 359 active accounts projecting separatist rhetoric since the new year. Networks of 20 to 50 accounts were used to tweet the same message multiple times, each tagging new journalists and public figures to boost exposure. The NCRI is concerned that escalations of online rhetoric directly lead to increased vandalism and violence worldwide.

Approximately 20 percent of networked accounts are labeled as Pakistani, and many messages from the accounts mention that Sikhs should be thankful for Pakistani support. These activities have increased exponentially since the Punjab Police and Central Agencies started a massive crackdown on pro-Khalistani separatist leader Amritpal Singh. the report says.

The activity on social media has been found to revolve around the violent protests outside Indian consulates in San Francisco and other cities worldwide and assaults on Indian officials and journalists during these protests.

Twitter has suspended various accounts linked to the Khalistani campaign, but the slimmed security staff struggles to defend against growing links between online rhetoric and real-world violence.

OpIndia:   Oodaloop;     Washington Post:     Indian Narrative:    Reddit:   Flipboard

You Might Also Read: 

A Genocide Incited On Facebook:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Locked Shields - NATO’s 2023 Cyber Exercise
Facebook Delivers Fake Reviews »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Voyager Networks

Voyager Networks

Voyager Networks is an IT solutions business with a focus on Enterprise Networks, Security and Collaborative Communications.

CERT.BY

CERT.BY

The National Computer Emergency Response Team of the Republic of Belarus.

Aptive Consulting

Aptive Consulting

Aptive is a cyber security consultancy providing Penetration Testing and Vulnerability Assessment services.

ISACA Conferences

ISACA Conferences

ISACA is dedicated to offering the most dynamic and inclusive conferences to keep you abreast of the latest advances in IT and Information Security.

Guardian360

Guardian360

The Guardian360 platform offers unrivalled insight into the security of your applications and IT infrastructure.

Flexera

Flexera

Flexera is reimagining the way software is bought, sold, managed and secured.

Privitar

Privitar

Privitar is leading the development and adoption of privacy engineering technology enabling our customers to innovate and leverage data with an uncompromising approach to data privacy.

Intercast Global

Intercast Global

Intercast's mission is to be a strategic resource to our clients in Risk Reduction. We are a global leader in cyber security staffing and consulting to the enterprise.

Variti

Variti

Variti Intelligent Active Bot Protection technology — traffic analysis, detection and stopping of malicious bots in real-time and effective response to DDoS attacks.

Cyphere

Cyphere

Cyphere is a cyber security company that helps to secure most prized assets of a business. We provide technical risk assessment (pen testing/ethical hacking) and managed security services.

SafeStack Academy

SafeStack Academy

SafeStack Academy is an online cyber security and privacy education platform. Our content is designed by experts to suit small businesses, growing companies, and development teams.

Rayzone Group

Rayzone Group

Rayzone Group offers a wide range of Cyber Security solutions and services, providing hollistic protection suitable for both enterprises and National cyber security centers.

Peris.ai

Peris.ai

Peris.ai is a cybersecurity as a service startup that protects businesses and organizations from online threats.

Elastio

Elastio

Elastio's cloud-native platform safeguards cloud data from the risks posed by ransomware, application failures and storage security vulnerabilities.

FusionAuth

FusionAuth

FusionAuth is the customer authentication and authorization platform that makes developers' lives awesome.

Zeta Sky

Zeta Sky

Zeta Sky offers a full range of IT and cyber-security services for your business.