Dark Web pp 273-293 | Cite as

Jihadi Video Analysis

Part of the Integrated Series in Information Systems book series (ISIS, volume 30)


This chapter presents an exploratory study of jihadi extremist groups’ videos using content analysis and a multimedia coding tool to explore the types of videos, groups’ modus operandi, and production features that lend support to extremist groups. The videos convey messages powerful enough to mobilize members, sympathizers, and even new recruits to launch attacks that are captured (on video) and disseminated globally through the Internet. They communicate the effectiveness of the campaigns and have a much wider impact because the messages are media rich with nonverbal cues and have vivid images of events that can evoke not only a multitude of psychological and emotional responses but also violent reactions. The videos are important for jihadi extremist groups’ learning, training, and recruitment. In addition, the content collection and analysis of extremist groups’ videos can help policy makers, intelligence analysts, and researchers better understand the extremist groups’ terror campaigns and modus operandi, and help suggest counterintelligence strategies and tactics for troop training.


Europe Explosive Baran Egypt Verse 



This research has been supported in part by NSF/ITR, “COPLINK Center for Intelligence and Security Informatics – A Crime Data Mining Approach to Developing Border Safe Research,” EIA-0326348, September 2003–August 2006.

We would like to thank the staff of the Artificial Intelligence Lab at the University of Arizona who have contributed to this work, in particular Wei Xi, Homa Atabakhsh, Catherine Larson, Chun-Ju Tseng, and Shing Ka Wu. Finally, we also acknowledge the presence of native analysts on our team who, in addition to being proficient in translating Arabic text to English, are also able to place the content within the sociopolitical and cultural environmental context. The absence of this latter skill would have created serious gaps which could have derailed our analysis.


  1. Baran, David and Guidere, Mathieu. 2005. How to decode resistance propaganda Iraq: a message from the insurgents. Le Monde diplomatique, May.Google Scholar
  2. Becker. A. 2005. Technology and terror: The new modus operandi. PBS, January 2005. [cited January 4 2006]. Available from http://www.pbs.org/wgbh/pages/frontline/shows/front/­special/tech.html.
  3. Chen, Hsinchun, et al. 2005. The Dark Web Portal project: collecting and analyzing the presence of terrorist groups on the Web. In Proceedings of the IEEE International Conference on Intelligence and Security Informatics (ISI 2005). Atlanta GA: Springer.Google Scholar
  4. Coleman, Alistair. 2007. Iraq jihad TV’ mocks coalition. BBC Monitoring, May 10, 2007. [cited August 10 2007]. Available from http://news.bbc.co.uk/2/hi/middle_east/6644103.stm.
  5. Corman, Steven and Schiefelbein, Jill. 2006. Communication and media strategy in the jihadi war of ideas. In Consortium for Strategic Communication. Tempe AZ: Arizona State University. [cited April 12, 2006]. Available from http://www.asu.edu/clas/communication/about/csc/publications/jihad_comm_media.pdf.
  6. Critical Incident Analysis Group (CIAG). 2007. NET worked radicalization: A counter-strategy. CIAG, Homeland Security Policy Institute. [cited July 19 2007]. Available from http://www.healthsystem.virginia.edu/internet/ciag/publications/NETworked-Radicalization_A-Counter-Strategy.pdf.
  7. Duijvelaar, Christy. 1996. Beyond borders: East-east cooperation among NGOs in Central and Eastern Europe. Regional Environmental Center for Central and Eastern Europe. [Available December 2005]. Available from http://www.rec.org/REC/Publications/Beyond Borders/introSR.html.
  8. GIMF releases a new video featuring a day in the life of a mujahid. 2006. SAIC, January 30, 2006. [cited August 4 2006]. Available from http://www.tecom.usmc.mil/caocl/OIF/IO_and_PA/insurgentacademy.doc. [Also cited January 23, 2006; available from http://trackingalqueda.blogspot.com/].
  9. Hendron, John. 2006. Videos win support for Iraq insurgency, February 23, 2006. [cited August 4 2006]. Available from http://prairieweather.typepad.com/the_scribe/2006/03/22306npr_videos.html.
  10. Holsti, Ole. 1969. Content analysis for the social sciences and humanities. Reading: Addison-Wesley.Google Scholar
  11. IntelCenter. 2004. Al Qaeda videos and 3rd 9–11 anniversary v.1.0. Alexandria, VA: IntelCenter.Google Scholar
  12. IntelCenter. 2005. Evolution of jihad video, v 1.0. Alexandria, VA: IntelCenter. [cited May 10 2006]. Available from http://www.intelcenter.com/EJV-PUB-v1–0.pdf.
  13. Intelfiles, 2005. [cited August 10 2007]. Available from http://intelfiles.egoplex.com/.
  14. International Crisis Group. 2006. In their own words: Reading the Iraqi insurgency. In Crisis Group Reports #50. Brussels, Belgium: International Crisis Group. [cited March 0 2006]. Available from http://www.crisisgroup.org/home/index.cfm?id=3953.
  15. Islamic Imagery Project. 2006. West Point, N.Y.: Combating Terrorism Center. [cited December 12 2006]. Available from http://www.ctc.usma.edu/imagery.asp.
  16. News from Russia. Terrorists threaten more attacks on Britain 2006. News from Russia, September 2, 2005 [cited August 4 2006]. Available from http://newsfromrussia.com/.
  17. Paz, Reuven. 2006. Reading their lips: The credibility of jihadi Web sites in Arabic as a source for information. PRISM 2006 [cited August 4 2006]. Available from http://www.e-prism.org/images/Read_Their_Lips.doc.
  18. Reid, Edna, et al. 2005. Collecting and analyzing the presence of terrorists on the Web: A case study of jihad Websites. In Proceedings of the IEEE International Conference on Intelligence and Security Informatics (ISI 2005). Atlanta GA: Springer.Google Scholar
  19. Robertson, N. 2006. Tapes shed new light on bin laden’s network. CNN.com August 19, 2002. [cited August 4 2006]. Available from http://archives.cnn.com/2002/US/08/18/terror.tape.main/.
  20. Rocket propelled grenade. 2006. [cited August 4 2006]. Available from ­http://www.militaryfactory.com/smallarms/detail.asp?smallarms_id=10.
  21. Salem, Arab, Reid, Edna, and Chen, Hsinchun. 2006. Content analysis of jihadi extremist groups’ videos. In Proceedings of the IEEE International Conference on Intelligence and Security Informatics (ISI 2006). San Diego, CA: Springer. [cited June 12 2006]. Available from http://ai.arizona.edu/research/terror/publications/isi_content_analysis_jihadi.pd (This paper - Multimedia Content Coding and Analysis is an expanded version of the ISI 2006 conference paper).
  22. SITE Institute. 2004. Manufacture of the Explosive Belt for Suicide Operations, December 22 2004 [cited August 4 2006]. Available from http://siteinstitute.org/.
  23. Tracking Al Qaeda. 2006. [cited January 23, 2006]. Available from http://trackingalqueda.­blogspot.com/.
  24. Weimann, Gabriel. 2006. Terror on the Internet: The new arena, the new challenges. Washington, D.C.: U.S. Institute of Peace.Google Scholar
  25. Zhou, Yilu et al. 2006. Exploring the dark side of the Web: Collection and analysis of U.S. extremist online forums. In Proceedings of the IEEE International Conference on Intelligence and Security Informatics (ISI 2006). San Diego, CA: Springer.Google Scholar

Copyright information

© Springer Science+Business Media, LLC 2012

Authors and Affiliations

  1. 1.Department of Management Information SystemsUniversity of ArizonaTusconUSA

Personalised recommendations