Violent Indian Separatists Using Twitter Bots

Recent research from Network Contagion Research Institute (NCRI) found that pro-Khalistani groups are using Twitter bots to promote violence and anti-India propaganda on social media platforms.

And as the conflict continues between the Indian government and Sikh separatists, backers of the separatist ideology are using multiple networks of linked accounts to trend tweets that include videos and calls for action simultaneously.

A network of bots run by supporters of the pro-Khalistan Sikhs for Justice and virtual activists in Pakistan appear to have teamed up to foment attacks inside India and abroad following after New Delhi had launched a manhunt to nab separatist fugitive Amritpal Singh.

The Sikh separatist movement has found the most traction in the farming population of the Indian Punjab state.

Despite India recently revoking Internet access to the Punjab state, it is suspected that separatists are receiving assistance from the government of Pakistan. 

The Network Contagion Research Institute (NCRI) has identified over 359 active accounts projecting separatist rhetoric since the new year. Networks of 20 to 50 accounts were used to tweet the same message multiple times, each tagging new journalists and public figures to boost exposure. The NCRI is concerned that escalations of online rhetoric directly lead to increased vandalism and violence worldwide.

Approximately 20 percent of networked accounts are labeled as Pakistani, and many messages from the accounts mention that Sikhs should be thankful for Pakistani support. These activities have increased exponentially since the Punjab Police and Central Agencies started a massive crackdown on pro-Khalistani separatist leader Amritpal Singh. the report says.

The activity on social media has been found to revolve around the violent protests outside Indian consulates in San Francisco and other cities worldwide and assaults on Indian officials and journalists during these protests.

Twitter has suspended various accounts linked to the Khalistani campaign, but the slimmed security staff struggles to defend against growing links between online rhetoric and real-world violence.

OpIndia:   Oodaloop;     Washington Post:     Indian Narrative:    Reddit:   Flipboard

You Might Also Read: 

A Genocide Incited On Facebook:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Locked Shields - NATO’s 2023 Cyber Exercise
Facebook Delivers Fake Reviews »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

D-RisQ

D-RisQ

D-RisQ is focussed on delivering techniques to reduce the development costs of complex systems and software whilst maximising compliance

CLUSIS

CLUSIS

CLUSIS is an association for the information security industry in Switzerland.

Secret Double Octopus

Secret Double Octopus

Secret Double Octopus offers the world’s only keyless multi-shield authentication technology for users and things.

VIPRE Security Group

VIPRE Security Group

VIPRE Security Group is an award-winning global cybersecurity, privacy and data protection company.

Gallarus Industry Solutions

Gallarus Industry Solutions

Gallarus leads innovation within industrial Manufacturing, Production and Management Systems, including Cyber Security solutions specifically developed to protect against the latest cyber criminality.

SafeTech Informatics & Consulting

SafeTech Informatics & Consulting

Safetech's OTShield detects, prevents and analyses cyber-attacks in SCADA and Industrial IoT systems by utilising state of the art deception techniques.

Information & Communications Technology Association of Jordan (int@j)

Information & Communications Technology Association of Jordan (int@j)

The Information & Communications Technology Association of Jordan is a membership based ICT and IT Enabled Services (ITES) industry advocacy, support and networking association.

Kiberna

Kiberna

Kiberna are a small but niche company specialising in data driven security to manage your cyber risks.

NCC-CSIRT (Nigerian Communications Commission)

NCC-CSIRT (Nigerian Communications Commission)

NCC has established a CSIRT for the telecommunication industry to provide services and support for the prevention and management of potential cyber security related emergencies.

Otto

Otto

Stop Client-Side Attacks. Plug otto into your application security suite and protect your supply chain.

Tarlogic

Tarlogic

Tarlogic works to protect and defend your security with the highest quality technical team with next generation solutions to achieve the best protection.

Evo Security

Evo Security

Evo Security is an Identity and Access Management company focused exclusively on serving MSPs, MSSPs and their SMB and Mid-Market customers.

Athena7

Athena7

Athena7 is a dedicated assessment practice committed to helping organizations understand how their infrastructure, backups, and security controls will withstand the latest threat actor tactics.

Securily

Securily

Securily offers the ultimate solution for small to medium-sized businesses, blending cutting-edge AI with expert human insight to deliver the world’s easiest and most effective pentesting experience.

Interlynk

Interlynk

Interlynk's #SBOM and # VEX-powered platform automates and continuously monitors first-party and vendor software supply chains and helps meet #FDA, #CRA, #GSA, and #DoD compliance obligations.

Infodot Technologies

Infodot Technologies

Infodot Technologies specialize in a co-managed IT support and services approach, where businesses share their IT responsibilities with a skilled Managed IT Services Provider (MSP).