Algorithmic Censorship in Modern Wars: Case of the Encryption for Digital Resilience during the Latest Israeli War of 2023 on Gaza

Hassan Rammal

Abstract


Social media has significantly reshaped traditional concepts of free media, steering it toward greater independence. After decades of control by ministries of communication and gatekeepers over audio-visual content, these institutions have gradually lost their influence, leading to a more decentralized media landscape. In this new environment, social media platforms have become powerful tools, shaping social and political narratives by controlling information dissemination, often aligning with their policies. Artificial intelligence's rise has amplified algorithms' role, particularly during geopolitical wars and conflicts. For instance, during the latest Israeli war in Gaza that erupted in October 2023, thousands of accounts supporting the Palestinian cause were banned, raising concerns about freedom of expression due to algorithms' ability to manipulate public opinion. In response, users have adopted various tactics, such as employing encryption and content modification techniques to evade algorithmic censorship. Despite the widespread use of these tactics across the Arab world, no research has systematically explored their effectiveness in countering algorithms, especially in crisis-prone regions. This study aims to fill this gap by examining the most common encryption techniques used by users during the Gaza war, particularly in resistance axis countries. This study will utilize a mixed-methods approach to analyse a sample of 80 social media posts sourced from X, TikTok, WhatsApp, and Instagram. The analysis will identify the most effective methods for circumventing AI-based censorship and highlight the sophisticated strategies used to protect freedom of expression in the digital age.

 

Keywords: Algorithmic censorship, Gaza conflict, data encryption, social media bias, crisis communication strategies.

 

https://doi.org/10.17576/JKMJC-2025-4104-21


References


Abokhodair, N., Skop, Y., Rüller, S., Aal, K., & Elmimouni, H. (2024). Opaque algorithms, transparent biases: Automated content moderation during the Sheikh Jarrah Crisis. First Monday, 29(4-1). https://doi.org/10.5210/fm.v29i4.13620

Al-Dala'ien, O. A., Al-Daher, Z., Al-Shboul, Y., & Al-Rousan, M. (2023). Analyzing verbal and pictorial Arab's Facebook posts During the Israeli attack on Gaza Strip in 2021. GEMA Online Journal of Language Studies, 23(1), 114–139.

Al-Jarrah, A., Albsharat, A., & Al-Jarrah, M. (2022). Word-based encryption algorithm using dictionary indexing with variable encryption key length. International Journal of Electrical and Computer Engineering, 12(1), 669–683. https://doi.org/p8ds

Ali, I. M. (2024). A guide for positivist research paradigm: From philosophy to methodology. Idealogy Journal, 9(2), 187-196. https://doi.org/p8dt

Buckley, N., & Schafer, J. S. (2022). 'Censorship-free' platforms: Evaluating content moderation policies and practices of alternative social media. For(e)Dialogue, 4(1). https://doi.org/10.21428/e3990ae6.483f18da

Cobbe, J. (2021). Algorithmic censorship by social platforms: Power and resistance. Philosophy & Technology, 34(4), 739-766.

Daucé, F., & Loveluck, B. (2021). Codes of conduct for algorithmic news recommendation: The Yandex. News controversy in Russia. First Monday, 26(5). https://doi.org/p8dv

De Saussure, F. (1959). Course in General Linguistics [Trans. W. Baskin]. Philosophical Library.

Dawson, S. (2024). You Can’t Say That on TikTok: Cxnsxrshxp, Algorithmic (in) visibility, and the threat of Representation (Doctoral dissertation, University of British Columbia).

El Zein, H., & Abusalem, A. (2015). Social media and the war on Gaza: A battle on virtual space to galvanise support and falsify Israel story. Athens Journal of Mass Media and Communications, 1(2), 109-120.

Ermoshina, K., & Musiani, F. (2022). Concealing for Freedom: The Making of Encryption, Secure Messaging and Digital Liberties. Manchester, UK: Mattering Press.

Fedoruk, B., Nelson, H., Frost, R., & Fucile Ladouceur, K. (2021). The Plebeian Algorithm: A Democratic Approach to Censorship and Moderation. JMIR Formative Research, 5(12), e32427. http://doi.org/10.2196/32427

Gohdes, A. R. (2024). Repression in the Digital Age: Surveillance, Censorship, and the Dynamics of State Violence. Oxford, OX: Oxford University Press.

Hejase, A. J., & Hejase, H. J. (2013). Research Methods: A Practical Approach for Business Students (2nd ed.). Philadelphia, PA: Masadir Inc.

Huang, T. C. (2022). Private censorship, disinformation and the first amendment: Rethinking online platforms regulation in the era of a global pandemic. Michigan Technology Law Review, 29(1), 137-196. https://doi.org/10.36645/mtlr.29.1.private

Iannone, A. (2022). Democracy crisis in South-East Asia: Media control, censorship, and disinformation during the 2019 Presidential and General Elections in Indonesia, Thailand and 2019 Local Election in the Philippines. Jurnal Ilmu Sosial dan Ilmu Politik, 26(1), 81-97.

JosephNg, P. S., EricMok, Z. C., Phan, K. Y., Sun, J., & Wei, Z. (2025). Mitigating social media cybercrime: Revolutionising with AES encryption and generative AI. Journal of Advanced Research in Applied Sciences and Engineering Technology, 46(2), 124-154.

Khader, M., & Karam, M. (2023). Assessing the effectiveness of masking and encryption in safeguarding the identity of social media publishers from advanced metadata analysis. Data, 8(6), 105. https://doi.org/10.3390/data8060105

Kshetri, N., Rahman, M. M., Rana, M. M., Osama, O., & Hutson, J. (2024). AlgoTRIC: Symmetric and asymmetric encryption algorithms for Cryptography - A comparative analysis in the AI era. International Journal of Advanced Computer Science and Applications, 15(12). http://doi.org/10.14569/IJACSA.2024.0151201

Latif, M. S. A., Manap, N. A., & Althabhawi, N. M. (2025). Modernising site-blocking mechanism in protecting copyright owners content against digital piracy in Malaysia. Malaysian Journal of Syariah and Law, 13(1), 1-17.

Liaqat, F., Khan, M. A., & Qamar, S. S. (2024). Humanity unframed: A socio-semiotic analysis of political cartoon on Israel-Palestine Conflict. Jahan-e-Tahqeeq, 7(1), 1157-1168.

Mahlouly, D., & Erhaim, Z. (2023). Pro-Palestinian activism: Resisting the digital occupation. In N. Miladi (Ed.), Global Media Coverage of the Palestinian-Israeli Conflict: Reporting the Sheikh Jarrah Evictions (237-250). I.B. Tauris. https://doi.org/p8dw

Matthiesen, T. (2022). Digital activism and authoritarianism adaptation in the Middle East. Journal of Global Media Studies, 15(2), 45–63.

Majdawi, A. M. A., & Jabi, S. I. (2020). A pragma-Semiotic analysis of emoticons in social media. Education and Linguistics Research, 6(2), 139.

Musdalifah, F. S., Nasyaya, A., & Santoso, A. D. (2023). Digital voices in early days: Analysing local government social media approaches to risk communication during the initial stages of the COVID-19 pandemic in Indonesia. Jurnal Komunikasi: Malaysian Journal of Communication, 39(4), 126-149. https://doi.org/10.17576/JKMJC-2023-3904-07

Nadesan, M. (2021). Technological utopia, end times and the SARS-CoV-2 crisis: A genealogy of crisis ideoscapes and mediascapes. Communication+1, 8(1). https://doi.org/p8dx

Olise, F. (2021). Level of acceptance of news stories on social media platforms among youth in Nigeria. Jurnal Komunikasi: Malaysian Journal of Communication, 37(2), 210-225.

Oltmann, S. M., Knox, E. J., & Mabi, M. N. (2022). Censorship is not a panacea: Access to information in a resilient society. Proceedings of the Association for Information Science and Technology, 59(1), 591-594.

Öztürk, N. K. (2024). Meta's challenge with Olives and Watermelon: The case of blocking posts about Gaza. Journal of Media and Religion Studies, 7(2), 101-121.

Panait, C., & Ashraf, C. (2021). AI Algorithms–(re) shaping public opinions through interfering with access to information in the online environment. Europuls Policy Journal, 1(1), 46-64.

Park, D. J. (2023). US foreign policy, think tanks, control over web content, and the threat to democracy. In Y. Kamalipour, & J. V. Pavlik (Eds.), Communicating Global Crises: Media, War, Climate, and Politics (pp.55-74). London, UK: Bloomsbury Publishing. http://doi.org/10.5040/9798881813222.ch3

Peirce, C. S. (1931) The Collected Papers of Charles Sanders Peirce. Cambridge, MA: Harvard University Press.

Qureshi, M. B., Qureshi, M. S., Tahir, S., Anwar, A., Hussain, S., Uddin, M., & Chen, C.-L. (2022). Encryption techniques for smart systems data security offloaded to the cloud. Symmetry, 14(4), 695. https://doi.org/10.3390/sym14040695

Rammal, H., Hejase, H.J., & Hazimeh, H. (2024). Metaverse technology and its impact on the evolving landscape of communication and media: A future outlook for Lebanese satellite channels. Saudi Journal of Humanities and Social Sciences, 9(3), 92-117. https://saudijournals.com/media/articles/SJHSS_93_92-117.pdf

Raykar, N., Kumbharkar, P., & Jayatilal, D. H. (2023). De-duplication avoidance in regional names using an approach based on pronunciation. International Journal of Advances in Electrical Engineering, 4(1), 10-17.

Riaz, N., Qureshi, Q. A., Tahir, S., & Waheed, I. (2024). Signs and symbols: A semiotic exploration of visual media and its underlying ideologies. Journal of Arts and Linguistics Studies, 2(2), 705-725.

Rumata, V. M., & Nugraha, F. K. (2020). An analysis of fake narratives on social media during the 2019 Indonesian presidential election. Jurnal Komunikasi: Malaysian Journal of Communication, 36(4), 351-368.

Sangwan, Y. S., Lal, S., Bhambri, P., Kumar, A., & Dhanoa, I. S. (2021). Advancements in social data security and encryption: A review. NVEO-Natural Volatiles & Essential Oils Journal, 8(4), 15353-15362.

Sikdar, S., & Kule, M. (2022). Recent trends in cryptanalysis techniques: A review. In R. Sarkar, S. Pal, S. Basu, D. Plewczynski, & D. Bhattacharjee (Eds.), International Conference on Frontiers in Computing and Systems (pp. 209-222). Singapore: Springer Nature Singapore Private Limited.

Tanczer, L. M., Deibert, R. J., Bigo, D., Franklin, M. I., Melgaço, L., Lyon, D., Kazansky, B. & Milan, S. (2020). Online surveillance, censorship, and encryption in academia. International Studies Perspectives, 21(1), 1-36.

Tomasev, N., McKee, K. R., Kay, J., & Mohamed, S. (2021). Fairness for unobserved characteristics: Insights from technological impacts on queer communities. Proceedings of the 2021 AAAI/ACM Conference on AI, Ethics, and Society (pp. 254-265), May 19–21, Virtual Event, New York, USA. https://doi.org/p8dz

Umar, H. G. A., Aoun, M., Kaleem, M. A., Rehman, S. U., & Younis, M. (2023). Cryptographic Analysis of Blur-Based Encryption an in-depth examination of resilience against various attack vectors. Journal of Computing and Biomedical Informatics, 5(2). https://doi.org/10.56979/502/2023

Vorhies, Z., & Heckenlively, K. (2021). Google Leaks: A Whistleblower's Exposé of Big Tech Censorship. New York, NY: Simon and Schuster.

Wadho, S. A., Meghji, A. F., Yichiet, A., Kumar, R., & Shaikh, F. B. (2023). Encryption techniques and algorithms to combat cybersecurity attacks: A review. VAWKUM Transactions on Computer Sciences, 11(1), 295-305.

Wells, A. (2024). Digital refugee resistance, power, representation, and algorithmic censorship. Forced Migration Review, 73. https://www.fmreview.org/digital-disruption/wells/

Wok, S., Hashim, J., & Abdullah, K. (2016). Social media influence on Malay family resilience towards challenges of the Internet. Jurnal Komunikasi: Malaysian Journal of Communication, 32(2), 648-669.

Youvan, D. C. (2024, November 17). Conflict, crisis, and continuity: Media control, proxy wars, and the preservation of power in democratic systems. https://doi.org/p8d2

Zhang, G. (2024). Cryptographic techniques in digital media security: Current practices and future directions. International Journal of Advanced Computer Science & Applications, 15(8), 933-941. http://doi.org/10.14569/IJACSA.2024.0150892

Zhang, N., & Díaz-Kommonen, L. (2024). Toward a rhetorical understanding of Chinese political internet memes amid a Chinese governance crisis. Communication and Democracy, 58(2), 226-261.

Zhang, W., Hernandez-Boussard, T., & Weiss, J. (2023). Censored fairness through awareness. In B. Williams, Y. Chen. & J. Neville (Eds.), Proceedings of the AAAI conference on artificial intelligence, 37(12), 14611-14619. https://doi.org/p8d3


Refbacks

  • There are currently no refbacks.


e-ISSN: 2289-1528