The Information War In Gaza & Israel

In common with the early phase of the conflict in Ukraine, there is a shortage of verified information on events in the violent conflict in Israel and Gaza and what information there is to be found is charged with emotions.

Fast-moving news events have made it hard to verify information or to find trustworthy news. Consequently, social media platforms have played a big part in filling the empty space. Indeed, social media platforms have seen a surge of misinformation about the conflict,  like doctored images and incorrectly labelled videos.

Social media has played a critical role in previous conflicts and wider access to the Internet and the spread of smartphones has reached a peak, demonstrating the power of the algorithms deployed to deliver information to social media users to portray the human cost of violent events. 

Since October 7th, when Hamas terrorists crossed the border, social media has become part of the information war, with many questions over whether fake news is being used to manipulate the international response to these events.

There are reports of a video recently circulated that apparently falsely claimed to show Hamas kidnapping a Jewish baby. The video garnered more than a million views in one post alone.  However, the video was recorded some time September and had nothing to do with kidnapping, or indeed with Gaza. Disinformation is not limited to accounts seeking to undermine violence against hostages. Profiles supporting the actions of the Israeli government have also shared misleading and hateful content.

Successful attempts to distort and confuse the truth of events can have serious implications for the international community when it comes to investigating allegations of war crimes and providing aid. 

In the past, both the Israeli government and Hamas have faced accusations of trying to distort online narratives with "bot" networks, inauthentic accounts used to repeatedly push divisive or misleading ideas. There are clues we can use to identify an account as inauthentic. For example, if a profile is only recently created and is suddenly sharing a large amount of misleading content, then it is more likely to be a false source.

In August 2023 the EU introduced The Digital Services Act (DSA) which requires the major online platforms, those with over 45 million EU users, to proactively remove "illegal content" and  be ready to demonstrate they have taken measures, if requested to do so. 

The DSA allows the EU to conduct interviews and inspections and, if it is unsatisfied, proceed to a formal investigation. In cases of non-compliance, the DSA gives the EU Commission powers to issue fines and to request EU courts to enforce temporarily ban a platform inside the EU. Recently, TikTok said it "immediately" took action to counter misinformation after the EU warned TikTok's CEO to "urgently step up" efforts, and "spell out" how it was complying with EU law.

While disinformation spreads on all social media sites, X, previously known as Twitter, is one of the most influential and is a major channel where users go first to find information on breaking news and developing events.

Since being acquired by Elon Musk, X has relaxed its moderation processes and staff dealing with disinformation and hate speech have been made redundant by the company. Posts with inflammatory and antisemitic accounts, along with demonstrably false content have become more common on X and false information has become easier to spread. 

AlJazeera:     APNews:    BBC:   BBC:     BBCWorld:   Arab CenterDC:   Washington Post:   

Image: Arkadiusz Warguła

You Might Also Read:

Cyber War Crimes Will Be Prosecuted:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Navigating The Data Privacy Maze
The Latest Trends In Email Threats »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ThreatHunter.ai

ThreatHunter.ai

ThreatHunter.ai (formerly Milton Security) is a business that tracks down and mitigates attacks in real time using our ARGOS Platform and our Elite Threat Hunters.

TUV Sud

TUV Sud

TÜV SÜD is a leading technical service organisation. We specialize in testing, certification, auditing, training, and advisory services for different industries.

Rhebo

Rhebo

Rhebo Industrial Protector monitors and ensures the continuous, correct, and predictable operation of real-time Industrial Control Systems to prevent outages and reduce downtimes.

TÜV Informationstechnik (TÜViT)

TÜV Informationstechnik (TÜViT)

TÜViT is a leading service provider in the IT sector offering unbiased and independent tests and certifications of IT products, hardware, software, systems and processes.

Spin Technology

Spin Technology

SpinOne is a SaaS data protection platform designed to monitor, secure, and back up your G Suite and O365 data, improve compliance, and reduce IT costs.

Hunton Andrews Kurth

Hunton Andrews Kurth

Hunton Andrews Kurth LLP serves clients across a broad range of complex transactional, litigation and regulatory matters. Practice areas include Privacy and Cybersecurity.

Virtue Security

Virtue Security

Virtue Security are specialists in web application penetration testing.

Antares NetlogiX

Antares NetlogiX

Antares Netlogix are a leading Austrian service provider for IT security, critical infrastructures and managed security services.

Armo

Armo

Armo technology enhances any Kubernetes deployment with security, visibility, and control from the CI/CD pipeline through production.

Xiarch Solutions

Xiarch Solutions

Xiarch Security is an global security firm that educates clients, identifies security risks, informs intelligent business decisions, and enables you to reduce your attack surface.

Aleo

Aleo

Aleo is building the world's leading developer platform for enabling absolute privacy on blockchains.

Timus Networks

Timus Networks

Timus Networks enables today's work from anywhere organizations to secure their networks very easily and cost effectively.

Goldilock

Goldilock

Goldilock is redefining how sensitive data, devices, networks and critical infrastructure can be secured.

Exacom

Exacom

Exacom is a leading provider of multimedia logging/recording solutions across public safety, government, DoD, energy, utilities, transportation, and security applications.

Recast Software

Recast Software

Recast Software exists to simplify the work of IT teams and enable them to create highly secure and compliant environments.

Defendis

Defendis

Defendis develops AI-powered cybersecurity solutions for Government Agencies, Banks, and Businesses, designed to helps them contain data leaks, minimise damage, and proactively hunt for new threats.