The Information War In Gaza & Israel

In common with the early phase of the conflict in Ukraine, there is a shortage of verified information on events in the violent conflict in Israel and Gaza and what information there is to be found is charged with emotions.

Fast-moving news events have made it hard to verify information or to find trustworthy news. Consequently, social media platforms have played a big part in filling the empty space. Indeed, social media platforms have seen a surge of misinformation about the conflict,  like doctored images and incorrectly labelled videos.

Social media has played a critical role in previous conflicts and wider access to the Internet and the spread of smartphones has reached a peak, demonstrating the power of the algorithms deployed to deliver information to social media users to portray the human cost of violent events. 

Since October 7th, when Hamas terrorists crossed the border, social media has become part of the information war, with many questions over whether fake news is being used to manipulate the international response to these events.

There are reports of a video recently circulated that apparently falsely claimed to show Hamas kidnapping a Jewish baby. The video garnered more than a million views in one post alone.  However, the video was recorded some time September and had nothing to do with kidnapping, or indeed with Gaza. Disinformation is not limited to accounts seeking to undermine violence against hostages. Profiles supporting the actions of the Israeli government have also shared misleading and hateful content.

Successful attempts to distort and confuse the truth of events can have serious implications for the international community when it comes to investigating allegations of war crimes and providing aid. 

In the past, both the Israeli government and Hamas have faced accusations of trying to distort online narratives with "bot" networks, inauthentic accounts used to repeatedly push divisive or misleading ideas. There are clues we can use to identify an account as inauthentic. For example, if a profile is only recently created and is suddenly sharing a large amount of misleading content, then it is more likely to be a false source.

In August 2023 the EU introduced The Digital Services Act (DSA) which requires the major online platforms, those with over 45 million EU users, to proactively remove "illegal content" and  be ready to demonstrate they have taken measures, if requested to do so. 

The DSA allows the EU to conduct interviews and inspections and, if it is unsatisfied, proceed to a formal investigation. In cases of non-compliance, the DSA gives the EU Commission powers to issue fines and to request EU courts to enforce temporarily ban a platform inside the EU. Recently, TikTok said it "immediately" took action to counter misinformation after the EU warned TikTok's CEO to "urgently step up" efforts, and "spell out" how it was complying with EU law.

While disinformation spreads on all social media sites, X, previously known as Twitter, is one of the most influential and is a major channel where users go first to find information on breaking news and developing events.

Since being acquired by Elon Musk, X has relaxed its moderation processes and staff dealing with disinformation and hate speech have been made redundant by the company. Posts with inflammatory and antisemitic accounts, along with demonstrably false content have become more common on X and false information has become easier to spread. 

AlJazeera:     APNews:    BBC:   BBC:     BBCWorld:   Arab CenterDC:   Washington Post:   

Image: Arkadiusz Warguła

You Might Also Read:

Cyber War Crimes Will Be Prosecuted:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Navigating The Data Privacy Maze
The Latest Trends In Email Threats »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Mielabelo

Mielabelo

Belgian consulting firm providing services in the security and compliance of information systems and IT service management.

Secure Recruiting International (SRI)

Secure Recruiting International (SRI)

SRI is an industry leader in Information Security , Networking, Wireless and Storage recruitment.

Positive Technologies

Positive Technologies

Positive Technologies is a leading global provider of enterprise security solutions for vulnerability and compliance management, incident and threat analysis, and application protection.

Graphus

Graphus

Graphus provides a simple, powerful, automated solution that eliminates 99% of social engineering and spear phishing attacks against G Suite business Gmail users.

GraVoc

GraVoc

GraVoc is a technology-consulting firm committed to solving business problems for customers through the development, implementation, & support of technology-based solutions.

Fingerprint Cards

Fingerprint Cards

Fingerprint Cards develops and produces biometric components and technologies that verify a person’s identity through the analysis and matching of an individual’s unique fingerprint.

Cyber Science

Cyber Science

Cyber Science is the flagship conference of C-MRiC, focusing on pioneering research and innovation in Cyber Situational Awareness, Social Media, Cyber Security and Cyber Incident Response.

Business Hive Vilnius (BHV)

Business Hive Vilnius (BHV)

BHV is one of the oldest startup incubator and technology hubs in the Baltics, primarily focused on hardware, security, blockchain, AI, fintech and enterprise software.

Belcan

Belcan

Belcan is a global supplier of engineering, manufacturing & supply chain, workforce and government IT solutions to customers in the aerospace, defense, automotive, industrial, and private sector.

Pacific Cyber Security Operational Network (PaCSON)

Pacific Cyber Security Operational Network (PaCSON)

PaCSON is an operational cyber security network of regional working-level cyber security experts in the Pacific.

SOC Prime

SOC Prime

SOC Prime is the only Threat Detection Marketplace where researchers monetize their content to help security teams defend against attacks easier, faster and more efficiently than ever.

TechMD

TechMD

TechMD (formerly ICS) is an award-winning IT solutions firm that specializes in cloud solutions, managed cybersecurity services, strategic IT consulting, and managed IT services.

AVEVA

AVEVA

AVEVA has a long history in providing Supervisory Control and Data Acquisition software for meeting complex and evolving automation requirements.

turingpoint

turingpoint

turingpoint GmbH is a tech enabled boutique consultancy. It was founded by security experts with a focus on cyber security and software solutions.

Theori

Theori

Theori tackles the most difficult cybersecurity challenges from an attacker’s perspective and conquers them as the best strategic security experts.

Swick Technologies (SWICKtech)

Swick Technologies (SWICKtech)

SWICKtech offer IT managed services to increase IT security, stability, and performance for your organization.