The Information War In Gaza & Israel

In common with the early phase of the conflict in Ukraine, there is a shortage of verified information on events in the violent conflict in Israel and Gaza and what information there is to be found is charged with emotions.

Fast-moving news events have made it hard to verify information or to find trustworthy news. Consequently, social media platforms have played a big part in filling the empty space. Indeed, social media platforms have seen a surge of misinformation about the conflict,  like doctored images and incorrectly labelled videos.

Social media has played a critical role in previous conflicts and wider access to the Internet and the spread of smartphones has reached a peak, demonstrating the power of the algorithms deployed to deliver information to social media users to portray the human cost of violent events. 

Since October 7th, when Hamas terrorists crossed the border, social media has become part of the information war, with many questions over whether fake news is being used to manipulate the international response to these events.

There are reports of a video recently circulated that apparently falsely claimed to show Hamas kidnapping a Jewish baby. The video garnered more than a million views in one post alone.  However, the video was recorded some time September and had nothing to do with kidnapping, or indeed with Gaza. Disinformation is not limited to accounts seeking to undermine violence against hostages. Profiles supporting the actions of the Israeli government have also shared misleading and hateful content.

Successful attempts to distort and confuse the truth of events can have serious implications for the international community when it comes to investigating allegations of war crimes and providing aid. 

In the past, both the Israeli government and Hamas have faced accusations of trying to distort online narratives with "bot" networks, inauthentic accounts used to repeatedly push divisive or misleading ideas. There are clues we can use to identify an account as inauthentic. For example, if a profile is only recently created and is suddenly sharing a large amount of misleading content, then it is more likely to be a false source.

In August 2023 the EU introduced The Digital Services Act (DSA) which requires the major online platforms, those with over 45 million EU users, to proactively remove "illegal content" and  be ready to demonstrate they have taken measures, if requested to do so. 

The DSA allows the EU to conduct interviews and inspections and, if it is unsatisfied, proceed to a formal investigation. In cases of non-compliance, the DSA gives the EU Commission powers to issue fines and to request EU courts to enforce temporarily ban a platform inside the EU. Recently, TikTok said it "immediately" took action to counter misinformation after the EU warned TikTok's CEO to "urgently step up" efforts, and "spell out" how it was complying with EU law.

While disinformation spreads on all social media sites, X, previously known as Twitter, is one of the most influential and is a major channel where users go first to find information on breaking news and developing events.

Since being acquired by Elon Musk, X has relaxed its moderation processes and staff dealing with disinformation and hate speech have been made redundant by the company. Posts with inflammatory and antisemitic accounts, along with demonstrably false content have become more common on X and false information has become easier to spread. 

AlJazeera:     APNews:    BBC:   BBC:     BBCWorld:   Arab CenterDC:   Washington Post:   

Image: Arkadiusz Warguła

You Might Also Read:

Cyber War Crimes Will Be Prosecuted:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Navigating The Data Privacy Maze
The Latest Trends In Email Threats »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

AlgoSec

AlgoSec

The AlgoSec platform enables the world’s most complex organizations to gain visibility, reduce risk and process changes at zero-touch across the hybrid network.

Exclusive Networks

Exclusive Networks

Exclusive Networks accelerate market entry and growth for innovative cybersecurity, networking and infrastructure technologies.

Cortado Mobile Solutions

Cortado Mobile Solutions

Cortado Mobile Solutions is the manufacturer of the mobile device management solution Cortado MDM.

OneLogin

OneLogin

OneLogin simplifies identity management with secure, one-click access,for employees, customers and partners, through all device types, to all enterprise cloud and on-premise applications.

CERT Syria

CERT Syria

CERT Syria is the national Computer Emergency Response Team for Syria.

Avira

Avira

Avira provide a portfolio of antivirus, security and performance applications for Windows, Android, Mac, and iOS.

NetApp Excellerator

NetApp Excellerator

NetApp Excellerator is NetApp’s global start-up program that aims to fuel innovation by partnering with deep-tech start-ups.

WebSec B.V.

WebSec B.V.

WebSec is a Dutch Cybersecurity firm mainly focused on offensive security services such as pentesting, red teaming and security awareness and phishing campaigns.

NSR

NSR

NSR provide trusted solutions that deliver positive business outcomes for our clients in cybersecurity and data protection challenges.

RankedRight

RankedRight

RankedRight empowers security teams to take immediate action on their most critical risks.

International Association of Financial Crimes Investigators (IAFCI)

International Association of Financial Crimes Investigators (IAFCI)

International Association of Financial Crimes Investigators provides services and information about financial fraud, fraud investigation and fraud prevention.

Indian Cyber Security Solutions (ICSS)

Indian Cyber Security Solutions (ICSS)

Indian Cyber Security Solutions is an Enterprise Cyber Security Platforms company offering Cyber Security & Technical Education and Compliance & Penetration Testing Services.

PROVINTELL Cyber Security

PROVINTELL Cyber Security

PROVINTELL is a Managed Security Service Provider (MSSP) specialising in Next-Gen Cyber Defense and Response to detect and respond to threats.

ThreatNix

ThreatNix

ThreatNix is a tight knit group of experienced security professionals who are committed to providing competent cybersecurity solutions that adhere to international standards.

CYBHORUS

CYBHORUS

CYBHORUS are a team of Italian cyber security experts, specialized in cyber threat defense and strategic and organizational consulting.

AKIPS

AKIPS

AKIPS develops the world's most scalable network and infrastructure monitoring software, delivered as a turn-key software appliance.