Select Page
The Destruction of Gaza’s Internet Is Complete

The Destruction of Gaza’s Internet Is Complete

For more than three weeks, Gaza has faced an almost total internet blackout. The cables, cell towers, and infrastructure needed to keep people online have been damaged or destroyed as Israel launched thousands of missiles in response to Hamas attacking Israel and taking hundreds of hostages on October 7. Then, this evening, amid reports of heavy bombing in Gaza, some of the last remaining connectivity disappeared.

In the days after October 7, people living in Gaza have been unable to communicate with family or friends, leaving them unsure whether loved ones are alive. Finding reliable news about events has become harder. Rescue workers have not been able to connect to mobile networks, hampering recovery efforts. And information flowing out of Gaza, showing the conditions on the ground, has been stymied.

As the Israel Defense Forces said it was expanding its ground operations in Gaza this evening, internet connectivity fell further. Paltel, the main Palestinian communications company, has been able to keep some of its services online during Israel’s military response to Hamas’ attack. However, at around 7:30 pm local time today, internet monitoring firm NetBlocks confirmed a “collapse” in connectivity in the Gaza Strip, mostly impacting remaining Paltel services.

“We regret to announce a complete interruption of all communications and internet services within the Gaza Strip,” Paltel posted in a post on its Facebook page. The company claimed that bombing had “caused the destruction of all remaining international routes.” An identical post was made on the Facebook page of Jawwal, the region’s biggest mobile provider, which is owned by Paltel. Separately, Palestinian Red Crescent, a humanitarian organization, said on X (formerly Twitter) that it had lost contact with its operation room in Gaza and is “deeply concerned” about its ability to keep caring for people, with landline, cell, and internet connections being inaccessible.

“This is a terrifying development,” Marwa Fatafta, a policy manager focusing on the Middle East and North Africa at the digital rights group Access Now, tells WIRED. “Taking Gaza completely off the grid while launching an unprecedented bombardment campaign only means something atrocious is about to happen.”

A WIRED review of internet analysis data, social media posts, and Palestinian internet and telecom company statements shows how connectivity in the Gaza Strip drastically plummeted after October 7 and how some buildings linked to internet firms have been damaged in attacks. Photos and videos show sites that house various internet and telecom firms have been damaged, while reports from official organizations, including the United Nations, describe the impact of people being offline.

Damaged Lines

Around the world, the internet and telecoms networks that typically give web users access to international video calls, online banking, and endless social media are a complicated, sprawling mix of hardware and software. Networks of networks, combining data centers, servers, switches, and reams of cables, communicate with each other and send data globally. Local internet access is provided by a mix of companies with no clear public documentation of their infrastructure, making it difficult to monitor the overall status of the system as a whole. In Gaza, experts say, internet connectivity is heavily reliant on Israeli infrastructure to connect to the outside world.

Amid Israel’s intense bombing of Gaza, physical systems powering the internet have been destroyed. On October 10, the United Nations’ Office for the Coordination of Humanitarian Affairs (OCHA), which oversees emergency responses, said air strikes “targeted several telecommunication installations” and had destroyed two of the three main lines of communications going into Gaza.

The Hamas Threat of Hostage Execution Videos Looms Large Over Social Media

The Hamas Threat of Hostage Execution Videos Looms Large Over Social Media

Ahmed alleges that the companies are failing to implement systems that automatically detect violent extremist content as effectively as they detect some other kinds of content. “If you have a snatch of copyrighted music in your video, their systems will detect it within a microsecond and take it down,” Ahmed says, adding that “the fundamental human rights of the victims of terrorist attacks” should carry as much urgency as the “property rights of music artists and entertainers.”

The lack of details about how social platforms plan to curb the use of livestreams is, in part, because they are concerned about giving away too much information, which may allow Hamas, Palestinian Islamic Jihad (PIJ), and other militant groups or their supporters to circumvent the measures that are in place, an employee of a major platform who was granted anonymity because they are not authorized to speak publicly claimed in a communication with WIRED.

Adam Hadley, founder and executive director of Tech Against Terrorism, a United Nations-affiliated nonprofit that tracks extremist activity online, tells WIRED that while maintaining secrecy around content moderation methods is important during a sensitive and volatile conflict, tech companies should be more transparent about how they work.

“There has to be some degree of caution in terms of sharing the details of how this material is discovered and analyzed,” Hadley says. “But I would hope there are ways of communicating this ethically that don’t tip off terrorists to detection methods, and we would always encourage platforms to be transparent about what they’re doing.”

The social media companies say their dedicated teams are working around the clock right now as they await the launch of Israel’s expected ground assault in Gaza, which Hadley believes could trigger a spate of hostage executions.

And yet, for all of the time, money, and resources these multibillion-dollar companies appear to be putting into tackling this potential crisis, they are still reliant on Tech Against Terrorism, a tiny nonprofit, to alert them when new content from Hamas or PIJ, another paramilitary group based in Gaza, is posted online.

Hadley says his team of 20 typically knows about new terrorist content before any of the big platforms. So far, while tracking verified content from Hamas’ military wing or the PIJ, Hadey says the volume of content on the major social platforms is “very low.”

The Israel-Hamas War Is Drowning X in Disinformation

The Israel-Hamas War Is Drowning X in Disinformation

Musk deleted his recommendation soon after posting it, but not before it was viewed over 11 million times. Later on Sunday, Musk wrote: “As always, please try to stay as close to the truth as possible, even for stuff you don’t like.”

Experts believe that the proliferation of disinformation on X around the Israel-Hamas conflict this weekend is largely the result of changes Musk has made to the platform over the past year, including his decision to fire most of the people responsible for tackling disinformation.

“Elon Musk’s changes to the platform work entirely to the benefit of terrorists and war propagandists,” Emerson Brooking, a researcher at the Atlantic Council Digital Forensics Research Lab, tells WIRED. “Changes in profit and incentive structure mean that there’s a lot more tendency for people to share at high volume information which may not be true because they are trying to maximize view counts. Anyone can buy one of those little blue checks and change their profile picture to something that’s seemingly a media outlet. It takes quite a bit of work to vet who’s telling the truth and who’s not.”

X, which eliminated its entire PR team last year, responded to WIRED’s request for comment on the proliferation of disinformation on its platform with the automated message: “Busy now, please check back later.”

Peden says the Twitter algorithm has been designed to boost content that gets the most engagement, which incentivizes bad actors to share disinformation.

“The videos and images that you’re seeing of air strikes, they’re very prolific,” Peden says. “They’re very hard-hitting, and unfortunately that means engagement does incredibly, incredibly well. These images are horrible and dramatic, and they perform well. So there is an incentive by others, especially those trying to push a narrative to share an old video from years ago, just because people love looking at the stuff.”

In an echo of what happened when Russia invaded Ukraine in 2022, much of the primary footage emerging from the Israel-Hamas conflict over the weekend was posted first on the encrypted message platform Telegram. From there, it was taken and reshared on other platforms, but in most cases the footage was not fact-checked first or it was taken out of context to suit the narrative being pushed by the poster.

“There’s an immense amount of primary content that was first posted in Telegram groups in one form or another, but there’s essentially no way to vet that information. Then that primary information hits others platforms, notably Twitter, where there’s an immense battle of spin and narrative taking place,” Brooking says. “You have artisans on every side, as well as sympathizers from one group or another, who are also joining this [battle].”

The situation is so bad on X right now that even seasoned OSINT researchers are being duped by fake accounts, including one that shared a false claim about Israeli prime minister Benjamin Netanyahu being hospitalized over the weekend.

“Any sort of ground truth, which was always hard to get on Twitter, is now entirely out of reach,” Brooking says.

Chinese Hackers Are Hiding in Routers in the US and Japan

Chinese Hackers Are Hiding in Routers in the US and Japan

WIRED broke the news on Wednesday that SoundThinking, the company behind the gunshot-detection system ShotSpotter, is acquiring some assets—including patents, customers, and employees—from the firm Geolitica, which developed the notorious predictive policing software PredPol. WIRED also exclusively reported this week that the nonprofit Electronic Privacy Information Center is calling on the US Justice Department to investigate potentially biased deployment of ShotSpotter in predominantly Black neighborhoods.

As the US federal government inches closer to a possible shutdown, we took a look at the sprawling conservative media apparatus and deep bench of right-wing hardliners in Congress that are exploiting their leverage to block a compromise in the House of Representatives.

Satellite imaging from the Conflict Observatory at Yale University is providing harrowing insight and crucial information about the devastation wrought in the city of Khartoum by Sudan’s civil war. Meanwhile, researchers from the cybersecurity firm eQualitie have developed a technique for hiding digital content in satellite TV signals—a method that could be used to circumvent censorship and internet shutdowns around the world. And the productivity data that corporations have increasingly been gathering about their employees using monitoring software could be mined in an additional way to train AI models and eventually automate entire jobs.

Plus, there’s more. Each week, we round up the security and privacy news we didn’t cover in depth ourselves. Click the headlines to read the full stories, and stay safe out there.

A China-linked hacking group, dubbed BlackTech, is compromising routers in the US and Japan, secretly modifying their firmware and moving around company networks, according to a warning issued by cybersecurity officials this week. The United States Cybersecurity and Infrastructure Security Agency (CISA), the NSA, FBI, and Japan’s National Police Agency and cybersecurity office issued the joint alert saying the BlackTech group was “hiding in router firmware.”

The officials said they had seen the Chinese-linked actors using their access to the routers to move from “global subsidiary companies” to the networks of companies’ headquarters in the US and Japan. BlackTech, which has been operating since around 2010, has targeted multiple router types, the officials said, but they highlighted that it compromised Cisco routers using a customized backdoor. “TTPs against routers enable the actors to conceal configuration changes, hide commands, and disable logging while BlackTech actors conduct operations,” the alert says.

Microsoft and US government officials said in July that Chinese government hackers had breached the cloud-based Outlook email systems of about 25 organizations, including the US State Department and Department of Commerce. On Wednesday, an anonymous staffer for Senator Eric Schmitt told Reuters that the State Department incident exposed 60,000 emails from 10 accounts. Nine of the accounts were used by State Department employees focused on East Asia and the Pacific, while one was focused on Europe. The Congressional staffer learned the information in a State Department IT briefing for legislators and shared the details with Reuters via email.

The zero-day market, where new vulnerabilities and the code needed to exploit them are traded for cash, is big business. And it is, maybe, getting more lucrative. Russian zero-day seller Operation Zero this week announced it would increase some of its payments from $200,000 to $20 million. “As always, the end user is a non-NATO country,” the group said, indicating it means Russian private and government organizations.

Unlike bug bounties, where security researchers find flaws in companies’ code and then disclose them to the firms to fix for payments, the zero-day market encourages the trade in flaws that can potentially be exploited by the purchasers. “Full chain exploits for mobile phones are the most expensive products right now and they’re used mostly by government actors,” Operation Zero CEO Sergey Zelenyuk told TechCrunch. “When an actor needs a product, sometimes they’re ready to pay as much as possible to possess it before it gets into the hands of other parties.”

The European Union’s proposed law to clamp down on child sexual abuse content—by scanning people’s messages and potentially compromising encryption—is one of the continent’s most controversial laws of the last decade. This week, a series of revelations from a group of reporters has shown how the law’s main architect was heavily lobbied ahead of proposing the law and that police wanted access to the message data. First, an investigation revealed the close connections between the European Union’s home affairs commissioner, Ylva Johansson, and child protection groups. A second report shows the European police agency Europol pushed to get access to data collected under the proposed law. In response to the investigations, Europe’s Committee on Civil Liberties, Justice, and Home Affairs has written to Johansson asking questions about the relationships.

US Justice Department Urged to Investigate Gunshot Detector Purchases

US Justice Department Urged to Investigate Gunshot Detector Purchases

The United States Justice Department (DOJ) is being asked to investigate whether a gunshot-detection system widely in use across the US is being selectively deployed to justify the over-policing of mainly Black neighborhoods, as critics of the technology claim.

Attorneys for the nonprofit Electronic Privacy Information Center—a leading US-based civil liberties group—argue that “substantial evidence” suggests American cities are disproportionately deploying an acoustic tool known as ShotSpotter in majority-minority neighborhoods. Citing past studies, EPIC alleges that data derived from these sensors has encouraged some police departments to spend more and more time patrolling areas where the fewest number of white residents live—an allegation disputed by SoundThinking, the system’s manufacturer.

In a letter today to Merrick Garland, the US attorney general, attorneys for EPIC call for an investigation into whether cities using ShotSpotter are running afoul of the Civil Rights Act—namely, Title VI, which forbids racial discrimination by anyone who receives federal funds.

“State and local police departments around the country have used federal financial assistance to facilitate the purchase of a slew of surveillance and automated decision-making technologies, including ShotSpotter,” EPIC says. Despite mounting evidence of ShotSpotter’s discriminatory impact, there is no indication that its Title VI compliance has ever been seriously assessed. 

A spokesperson for SoundThinking says a statement by the company is forthcoming.

ShotSpotter has been deployed in more than 150 cities in the US, according to the company. It relies on internet-connected acoustic sensors, often attached to utility poles, and aims to detect gunfire using machine algorithms. SoundThinking says “acoustic experts” are on staff around the clock to review alerts and “ensure and confirm that the events are indeed gunfire.” The company claims its sensors have a 97 percent accuracy rate, disputing reports that alerts triggered by fireworks and other high-impact sounds affect the system’s accuracy.

EPIC is urging the DOJ to consider research that suggests ShotSpotter has produced “tens of thousands of false alerts” while simultaneously being deployed “in predominantly Black neighborhoods.” One such study, launched by the city of Chicago’s inspector general in 2021, noted that the “frequency of ShotSpotter alerts in a given area may be substantively changing policing behavior.” The agency concluded that, despite the city’s investment of $23-33 million, ShotSpotter alerts “rarely produce evidence of a gun-related crime, rarely give rise to investigatory stops, and even less frequently lead to the recovery of gun crime-related evidence during an investigatory stop.”

News investigations in Ohio and Texas have similarly raised doubts about the system’s effectiveness, revealing that in some cases its alerts have delayed responses to 911 calls. Working to expand the use of ShotSpotter in Houston in late 2020, the city also green-lit a pilot program that saw sensors deployed across two areas where communities are between 80 and 95 percent people of color.

EPIC is pressing Garland to investigate whether local law enforcement agencies have used federal grant money to buy ShotSpotter, and if so, ascertain whether those grants conformed with Title VI. Moreover, EPIC is seeking new guidelines for funding systems designed to automate police work; rules to ensure such arrangements are “transparent, accountable, and nondiscriminatory.” The attorney general should take additional steps, EPIC says, to ensure agencies dispersing federal funds are careful to assess whether tech companies meet “minimum standards of nondiscrimination,” and that new police technologies are not only justified but necessary to achieve a “defined goal.”