Social Media Reaction To The London Terror Attack

As is increasingly the norm in countries where nearly everyone carries a smartphone, the first news of the terror attack that killed seven and wounded dozens at London Bridge and Borough Market on May 3rd, Saturday night, emerged on social media.

But the posts which spread during and immediately after the attack, in particular on Twitter where breaking news tends to travel quickest, featured less disinformation, gore and panic than we have become used to. 

One explanation may simply be down to the attack's location near the offices of major news organisations, including the Times and Sun, and in an area where a number of journalists from other outlets were eating and drinking.
"There was less fake news and disinformation floating around the Internet last night than in the aftermath of the Manchester Arena terror attack," says BuzzFeed News political editor Jim Waterson, who monitored disinformation through the night.
"Partly this was due to the large number of experienced journalists who happened to be already on the ground or were themselves eyewitnesses, meaning the initial reports on Twitter turned out to be fairly accurate."

The nature of the attack, targeting pedestrians with a van followed by stabbings, and the police response, may also have played a part in reducing the number of gory and distressing images that emerged. With many bystanders running from the attackers and the area swiftly cleared and cordoned off, there were fewer opportunities to take pictures of the injured.
"We generally see less social media footage from eyewitnesses in active situations with multiple attackers than we do during bombings," says Alastair Reid, a social media journalist at the Press Association. "This may be because people are quite literally running for their lives while terrorists are still on the loose."

Another moderating influence was the Metropolitan Police Twitter account, which accompanied rapid updates on the situation with pleas for people to stick to verified facts and show restraint in what they shared. It also issued advice to anyone caught up in the attacks, including an image urging people to Run, Hide and Tell, which was picked up by broadcast media.

The message, based on best practice guidelines developed by terror experts, may not have reached as many people as broadcasts about how to respond to bomb alerts in the 1980s and '90s, or the "Protect and Survive" pamphlets and infomercials about what to do in a nuclear attack produced during the Cold War. But it was shared many tens of thousands of times, and for those near the scene using their phones to find out what was happening it would have been hard to miss. 

Another possible reason for the change in behaviour is in some ways the most encouraging - users are learning from previous terror attacks. 
“Sadly, a lot of people on social media also probably learned their lessons from the Manchester attack where a genuine desire to help by retweeting supposedly positive messages or appeals for missing people turned out to be simply boosting trolls," says Waterson. 
"It might not seem the most important thing to be worrying about online hoaxes in the middle of a terrorist attack but speedy debunking is crucial if we want to stop lies taking hold and avoid the narrative of events being hijacked."
Reid says the trend stretches back further: "The amount of misinformation around breaking news events has gone down over the last few years. It's still an issue, but nothing compared to what we saw during the Paris attacks in 2015 and the Brussels attacks last year. 
"People still create it and try to share it, but regular social media users are far quicker to condemn the hoaxers and not share them further than to just reflexively hit retweet." 

Of course there were still trolls making false claims about missing relatives and deliberately misidentifying suspects following the attack. But in the first few hours of this latest atrocity, there was a hint of how social media could be a tool for sharing information that helps, rather than hinders, our response to terror attacks.

New Statesman

You Might Also Read: 

ISIS Social Media Ops Are Declining:

London Police Chief Says Spy Agencies Face Terror Fight:

Cities Face Multiple Security Threats:

Open Source Intelligence Can Predict Terrorist Attacks:

 

 

« Five Pitfalls of Cybersecurity Insurance
Protect Yourself Against Ransomware »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Security Compass

Security Compass

Security Compass, the Security by Design Company, enables organizations to shift left and build secure applications by design, integrated directly with existing DevSecOps tools and workflows.

Nmap Project

Nmap Project

Nmap Project is a Free and open source tool for network discovery, administration, and security auditing.

SolarWinds

SolarWinds

SolarWinds as a worldwide leader in solutions for network and IT service management, application performance, and managed services.

Wilson Sonsini Goodrich & Rosati (WSGR)

Wilson Sonsini Goodrich & Rosati (WSGR)

WSGR is the premier provider of legal services to technology, life sciences, and growth enterprises worldwide. Practice areas include cybersecurity and data protection.

PeCERT

PeCERT

PeCERT is the national Computer Emergency Response Team for Peru.

IoT Now

IoT Now

IoT Now explores the evolving opportunities and challenges facing CSPs, and we pass on some lessons learned from those who have taken the first steps in next gen IoT services.

TruNarrative

TruNarrative

TruNarrative provides a unified solution for Identity Verification, Fraud Detection, eKYC, Risk Assessment, AML Compliance and Account Monitoring.

QI ANXIN Technology Group

QI ANXIN Technology Group

QI ANXIN specializes in serving the cybersecurity market by offering next generation enterprise-class cybersecurity products and services to government and businesses.

astarios

astarios

astarios provide near-shore software development services including secure software development (DevSecOps), quality assurance and testing.

Noblis

Noblis

Noblis is a dynamic science, technology, and strategy organization dedicated to creating forward-thinking technical and advisory solutions in the public interest.

Client Solution Architects (CSA)

Client Solution Architects (CSA)

Client Solution Architects (CSA) is a leading digital transformation consulting firm focused on the U.S. Defense Department and all U.S. Federal enterprise information technology service areas.

Klaatu IT Security (KITS)

Klaatu IT Security (KITS)

Klaatu IT Security is a boutique provider of cyber security services, empowering our clients to prioritise and reduce their cyber risk.

Cybertech Nepal

Cybertech Nepal

Cybertech Nepal is committed to provide high-quality cyber security solutions, including server assessment and hardening, forensics and malware analysis, end-point threat analysis, and VAPT.

ANY.RUN

ANY.RUN

ANY.RUN is an interactive online malware analysis service created for dynamic as well as static research of multiple types of cyber threats.

Closed Door Security

Closed Door Security

Closed Door Security is the only cybersecurity team in the north of Scotland offering everything from IASME Certification to CREST-Accredited penetration testing.

Fairly AI

Fairly AI

Fairly AI is on a mission to democratize safe, secure, and compliant AI across the enterprise.