Violent Indian Separatists Using Twitter Bots

Recent research from Network Contagion Research Institute (NCRI) found that pro-Khalistani groups are using Twitter bots to promote violence and anti-India propaganda on social media platforms.

And as the conflict continues between the Indian government and Sikh separatists, backers of the separatist ideology are using multiple networks of linked accounts to trend tweets that include videos and calls for action simultaneously.

A network of bots run by supporters of the pro-Khalistan Sikhs for Justice and virtual activists in Pakistan appear to have teamed up to foment attacks inside India and abroad following after New Delhi had launched a manhunt to nab separatist fugitive Amritpal Singh.

The Sikh separatist movement has found the most traction in the farming population of the Indian Punjab state.

Despite India recently revoking Internet access to the Punjab state, it is suspected that separatists are receiving assistance from the government of Pakistan. 

The Network Contagion Research Institute (NCRI) has identified over 359 active accounts projecting separatist rhetoric since the new year. Networks of 20 to 50 accounts were used to tweet the same message multiple times, each tagging new journalists and public figures to boost exposure. The NCRI is concerned that escalations of online rhetoric directly lead to increased vandalism and violence worldwide.

Approximately 20 percent of networked accounts are labeled as Pakistani, and many messages from the accounts mention that Sikhs should be thankful for Pakistani support. These activities have increased exponentially since the Punjab Police and Central Agencies started a massive crackdown on pro-Khalistani separatist leader Amritpal Singh. the report says.

The activity on social media has been found to revolve around the violent protests outside Indian consulates in San Francisco and other cities worldwide and assaults on Indian officials and journalists during these protests.

Twitter has suspended various accounts linked to the Khalistani campaign, but the slimmed security staff struggles to defend against growing links between online rhetoric and real-world violence.

OpIndia:   Oodaloop;     Washington Post:     Indian Narrative:    Reddit:   Flipboard

You Might Also Read: 

A Genocide Incited On Facebook:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Locked Shields - NATO’s 2023 Cyber Exercise
Facebook Delivers Fake Reviews »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Serena

Serena

Serena Software helps increase speed of the software development lifecycle while enhancing security, compliance, and performance.

Granite Partners

Granite Partners

Granite is a cloud service for the development of business risk management, cyber security and privacy and occupational safety and health.

Post-Quantum

Post-Quantum

Post-Quantum offer a unique, patented quantum-resistant encryption algorithm that can be applied to existing products and networks.

RedLock

RedLock

The RedLock Cloud 360TM platform correlates disparate security data sets to provide a unified view of risks across fragmented cloud environments.

Bluink

Bluink

Bluink specializes in identity and access management and customer identity verification, using your smartphone as a strong authenticator and secure identity store.

CyberSecurityTrainingCourses.com

CyberSecurityTrainingCourses.com

Cyber Security Training Courses is a portal to help candidates find the best courses to progress their career within the IT security industry.

HUB Security

HUB Security

Hub Security provide Ultra Secure, Military Grade HSM (Hardware Security Module) Solutions for Blockchain and Digital Assets.

SparkLabs Cyber + Blockchain

SparkLabs Cyber + Blockchain

SparkLabs Cyber + Blockchain accelerator is located in Washington D.C. which is one of the world's top cybersecurity ecosystems.

Paladin Capital Group

Paladin Capital Group

Paladin is a leading global investor that supports and grows the world’s most innovative cyber companies.

Gorodissky IP Security

Gorodissky IP Security

Gorodissky IP Security is a comprehensive approach to protecting your intellectual property on the Internet and beyond.

Drip7

Drip7

Drip7 is a micro-learning platform that is re-inventing the way companies train their employees and build lasting cultural change around the importance of cybersecurity.

Cirosec

Cirosec

Cirosec is a specialized company with a focus on information security. We carry out pentests & audits and advise our customers in the German-speaking countries on information and IT security issues.

MorganFranklin Consulting

MorganFranklin Consulting

MorganFranklin Consulting is a management advisory firm that works with businesses and government to address complex and transformational technology and business objectives including cybersecurity.

BATM Advanced Communications

BATM Advanced Communications

BATM Advanced Communications is a leading provider of real-time technologies for networking and cyber security solutions.

Ascent Solutions

Ascent Solutions

Ascent is built to help firms evolve their cybersecurity posture, modernize their Microsoft solutions, and accelerate their journey to the cloud.

CoreStack

CoreStack

CoreStack helps enterprises overcome cloud challenges such as ever growing security risks, stringent regulatory compliance needs and operational complexities.