The Information War In Gaza & Israel

In common with the early phase of the conflict in Ukraine, there is a shortage of verified information on events in the violent conflict in Israel and Gaza and what information there is to be found is charged with emotions.

Fast-moving news events have made it hard to verify information or to find trustworthy news. Consequently, social media platforms have played a big part in filling the empty space. Indeed, social media platforms have seen a surge of misinformation about the conflict,  like doctored images and incorrectly labelled videos.

Social media has played a critical role in previous conflicts and wider access to the Internet and the spread of smartphones has reached a peak, demonstrating the power of the algorithms deployed to deliver information to social media users to portray the human cost of violent events. 

Since October 7th, when Hamas terrorists crossed the border, social media has become part of the information war, with many questions over whether fake news is being used to manipulate the international response to these events.

There are reports of a video recently circulated that apparently falsely claimed to show Hamas kidnapping a Jewish baby. The video garnered more than a million views in one post alone.  However, the video was recorded some time September and had nothing to do with kidnapping, or indeed with Gaza. Disinformation is not limited to accounts seeking to undermine violence against hostages. Profiles supporting the actions of the Israeli government have also shared misleading and hateful content.

Successful attempts to distort and confuse the truth of events can have serious implications for the international community when it comes to investigating allegations of war crimes and providing aid. 

In the past, both the Israeli government and Hamas have faced accusations of trying to distort online narratives with "bot" networks, inauthentic accounts used to repeatedly push divisive or misleading ideas. There are clues we can use to identify an account as inauthentic. For example, if a profile is only recently created and is suddenly sharing a large amount of misleading content, then it is more likely to be a false source.

In August 2023 the EU introduced The Digital Services Act (DSA) which requires the major online platforms, those with over 45 million EU users, to proactively remove "illegal content" and  be ready to demonstrate they have taken measures, if requested to do so. 

The DSA allows the EU to conduct interviews and inspections and, if it is unsatisfied, proceed to a formal investigation. In cases of non-compliance, the DSA gives the EU Commission powers to issue fines and to request EU courts to enforce temporarily ban a platform inside the EU. Recently, TikTok said it "immediately" took action to counter misinformation after the EU warned TikTok's CEO to "urgently step up" efforts, and "spell out" how it was complying with EU law.

While disinformation spreads on all social media sites, X, previously known as Twitter, is one of the most influential and is a major channel where users go first to find information on breaking news and developing events.

Since being acquired by Elon Musk, X has relaxed its moderation processes and staff dealing with disinformation and hate speech have been made redundant by the company. Posts with inflammatory and antisemitic accounts, along with demonstrably false content have become more common on X and false information has become easier to spread. 

AlJazeera:     APNews:    BBC:   BBC:     BBCWorld:   Arab CenterDC:   Washington Post:   

Image: Arkadiusz Warguła

You Might Also Read:

Cyber War Crimes Will Be Prosecuted:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Navigating The Data Privacy Maze
The Latest Trends In Email Threats »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

MetaCompliance

MetaCompliance

MetaCompliance is a cyber security and compliance organisation that helps transform your company culture and safeguard your data and values.

FireMon

FireMon

FireMon is the only agile network security policy platform for firewalls and cloud security groups providing the fastest way to streamline network security policy management.

Fortinet

Fortinet

Fortinet is a provider of network security systems. Our products provide protection against dynamic security threats while simplifying the IT security infrastructure.

JLT Specialty

JLT Specialty

JLT Specialty is a leading specialist insurance broker. Services offered include Cyber Risks insurance.

Cybint Solutions

Cybint Solutions

Cybint provides customized cyber education and training solutions for Higher Education, Companies and Government.

adaware

adaware

adaware is an award-winning security and privacy software provider, empowering users to connect with confidence.

Jumio

Jumio

Jumio’s end-to-end identity verification and authentication solutions fight fraud, maintain compliance and onboard good customers faster.

Aspisec

Aspisec

Aspisec is a cybersecurity company specialized in Firmware Security and Critical Infrastructure Protection.

Lewis Brisbois

Lewis Brisbois

Lewis Brisbois offers legal practice in more than 40 specialties, and a multitude of sub-specialties including Data Privacy & Cybersecurity.

DataViper

DataViper

Data viper is a threat intelligence platform designed for organizations, investigators, and law enforcement.

Crown Sterling

Crown Sterling

Crown Sterling delivers next generation software-based, AI-driven cryptography in the form of random number generators and encryption products.

Protelion

Protelion

The Protelion Security Platform is uniquely architected to deliver security solutions that combine greater protection, flexibility, and performance.

SIEM Xpert

SIEM Xpert

SIEM Xpert is a leader in Cyber Security Trainings and services since 2015.

Barclay Simpson

Barclay Simpson

Barclay Simpson is proud to have a long history of delivering cyber security, technology and governance recruitment services.

Simbian

Simbian

Simbian, with its hardened TrustedLLM system, is the first to accelerate security by empowering every member of a security team from the C-Suite to frontline practitioners.

KTrust

KTrust

KTrust provides Continuous Threat Exposure Management for Kubernetes environments.