The Information War In Gaza & Israel

In common with the early phase of the conflict in Ukraine, there is a shortage of verified information on events in the violent conflict in Israel and Gaza and what information there is to be found is charged with emotions.

Fast-moving news events have made it hard to verify information or to find trustworthy news. Consequently, social media platforms have played a big part in filling the empty space. Indeed, social media platforms have seen a surge of misinformation about the conflict,  like doctored images and incorrectly labelled videos.

Social media has played a critical role in previous conflicts and wider access to the Internet and the spread of smartphones has reached a peak, demonstrating the power of the algorithms deployed to deliver information to social media users to portray the human cost of violent events. 

Since October 7th, when Hamas terrorists crossed the border, social media has become part of the information war, with many questions over whether fake news is being used to manipulate the international response to these events.

There are reports of a video recently circulated that apparently falsely claimed to show Hamas kidnapping a Jewish baby. The video garnered more than a million views in one post alone.  However, the video was recorded some time September and had nothing to do with kidnapping, or indeed with Gaza. Disinformation is not limited to accounts seeking to undermine violence against hostages. Profiles supporting the actions of the Israeli government have also shared misleading and hateful content.

Successful attempts to distort and confuse the truth of events can have serious implications for the international community when it comes to investigating allegations of war crimes and providing aid. 

In the past, both the Israeli government and Hamas have faced accusations of trying to distort online narratives with "bot" networks, inauthentic accounts used to repeatedly push divisive or misleading ideas. There are clues we can use to identify an account as inauthentic. For example, if a profile is only recently created and is suddenly sharing a large amount of misleading content, then it is more likely to be a false source.

In August 2023 the EU introduced The Digital Services Act (DSA) which requires the major online platforms, those with over 45 million EU users, to proactively remove "illegal content" and  be ready to demonstrate they have taken measures, if requested to do so. 

The DSA allows the EU to conduct interviews and inspections and, if it is unsatisfied, proceed to a formal investigation. In cases of non-compliance, the DSA gives the EU Commission powers to issue fines and to request EU courts to enforce temporarily ban a platform inside the EU. Recently, TikTok said it "immediately" took action to counter misinformation after the EU warned TikTok's CEO to "urgently step up" efforts, and "spell out" how it was complying with EU law.

While disinformation spreads on all social media sites, X, previously known as Twitter, is one of the most influential and is a major channel where users go first to find information on breaking news and developing events.

Since being acquired by Elon Musk, X has relaxed its moderation processes and staff dealing with disinformation and hate speech have been made redundant by the company. Posts with inflammatory and antisemitic accounts, along with demonstrably false content have become more common on X and false information has become easier to spread. 

AlJazeera:     APNews:    BBC:   BBC:     BBCWorld:   Arab CenterDC:   Washington Post:   

Image: Arkadiusz Warguła

You Might Also Read:

Cyber War Crimes Will Be Prosecuted:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Navigating The Data Privacy Maze
The Latest Trends In Email Threats »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CCN-CERT

CCN-CERT

CCN-CERT is the Spanish national government computer security incident response centre.

PFP Cybersecurity

PFP Cybersecurity

PFP provides a SaaS solution for life-cycle protection based on our IoT security platform and power usage analytics.

Dionach

Dionach

Dionach are a certified information security specialists who provide Penetration Testing, IT Security Auditing and Information Security Consultancy.

BigID

BigID

BigID is redefining personal data protection and privacy. BigID software helps companies secure their customer data & satisfy privacy regulations like GDPR.

Radiflow

Radiflow

Radiflow is a leading provider of cyber security solutions for critical infrastructure networks (i.e. SCADA), such as power utilities, oil & gas, water and others.

Jobsite

Jobsite

Jobsite is an award winning job board in the UK providing job listings in the key sectors of IT, Engineering and Finance.

Dasera

Dasera

Dasera’s Radar and Interceptor products deliver visibility, governance, and protection solutions for data-agile companies.

Akito

Akito

Akito was set up to become a point of reference in the ICT market for issues related to Security and in particular Cyber Security.

Jit

Jit

Jit empowers developers to own security for the product they are building from day zero.

MS Tech Solutions

MS Tech Solutions

MS Tech Solutions is a Jamaican-based, multinational consulting company that specializes in the architecture, implementation and management of key network and Information technologies.

JLS Technology

JLS Technology

Since 2007, JLS Tech has been recognized as one of the world’s most innovative cybersecurity and technology operations leaders.

Lintu Solutions

Lintu Solutions

Lintu Solutions is a trusted provider of comprehensive cybersecurity and enterprise risk management solutions.

Internet Initiative Japan (IIJ)

Internet Initiative Japan (IIJ)

IIJ is one of Japan's leading Internet-access and comprehensive network solutions providers.

Replica

Replica

Replica creates authentic virtual environments that ensure identities and assets are always protected no matter where or what work needs to get done.

Graphiant

Graphiant

Graphiant’s Data Assurance service gives businesses end-to-end control and visibility into how data travels throughout the entire business network.

Enaviya Information Technologies

Enaviya Information Technologies

Enaviya offer a comprehensive set of manual and automated software testing services adhering to standard quality assurance for best practices and processes.