Skip to main content

Identifying Daesh-Related Propaganda Using OSINT and Clustering Analysis

  • Conference paper
  • First Online:
Cybersecurity Challenges in the Age of AI, Space Communications and Cyborgs (ICGS3 2023)

Abstract

The development of the digital society has substantially altered the conditions under which conflicts occur. Emerging threats are characterized by their asymmetry, diversity, and constant change; rapid transmission over the network; near-immediate nature; possibility for unrestricted access; and swift ability to alter the behaviour of individuals. This paradox is an example of cognitive warfare, which employs both traditional and novel information, cyber, and psychological warfare techniques. The self-proclaimed Islamic State engages in a unique type of disruptive cyber cognitive-intelligence activity utilizing cyberspace. We now refer to the Weaponization of Media Narratives: the struggle of narratives has overtaken the relevance of traditional military and physical Jihad. Jihadist activities consist of sending threatening messages to Western nations and promoting online propaganda in order to recruit new members and instil terror in individuals. Daesh’s propaganda output is so extensive that it is practically impossible for humans to analyse it. Thus, it is crucial to establish and implement cyber defence strategies to prevent, identify, and deter jihadist Internet activity. Law Enforcement, Intelligence, and other organizations are constantly devising new tools to prevent, identify, and restrict terrorist operations over the Internet. The collection and analysis of information from a vast array of sources can give intelligence analysts with useful insights by revealing previously concealed but logically sound patterns and connections. Beginning with a review of Al-Naba’s propaganda materials, this study seeks to construct an automated model that would aid in detecting and identifying the online locations of Daesh. We looked at Al-Naba’ magazine instead of another newspaper because it has only been published in Arabic. Other magazines have been published in other languages and have been looked at in a lot of community identification and Social Network propaganda analysis studies in the past. Therefore, the purpose of our study was to discover if it is possible to employ computer assistance to evaluate Jihadist tales in order to identify any (thematic) similarities across various propaganda sources. One of the specific goals was to evaluate whether or not there are tweets with a direct connection to Al-Naba’ magazine. We wanted to make sure that the tweets were coded in a way that was consistent with the Twitter data—collected from Kaggle—we used as a training set. This was important because tweets could be put into different groups. This was done to see if the tweets were correctly put into their own groups based on information from Al-Naba’s writings. So, the number of times each group shows up depends on how often it shows up in more than 1% of the texts in each cluster.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Erdem BK, Bilge R (2017) The announcement of dar al-harb in cyber media in context of the theological policy of jihad: Reading the Cyber-Jihad and ISIS based on the Pharmakon Characteristic of the Cyber Media. Int J Islamic Thought 11:17

    Google Scholar 

  2. Krebs VE (2002) Mapping networks of terrorist cells. Connections 24(3):43–52

    Google Scholar 

  3. Brams SJ, Mutlu H, Ramirez SL (2006) Influence in terrorist networks: From undirected to directed graphs. Stud Conflict Terrorism 29(7):703–718. https://doi.org/10.1080/10576100600701982

  4. Koschade S (2006) A social network analysis of Jemaah Islamiyah: The applications to counterterrorism and intelligence. Stud Conflict Terrorism 29(6):559–575. https://doi.org/10.1080/10576100600798418

  5. Lautenschlager J et al (2015) Group profiling automation for crime and terrorism (GPACT). Procedia Manuf 3:3933–3940

    Google Scholar 

  6. Berger JM, Morgan J (2015) The ISIS Twitter census: Defining and describing the population of ISIS supporters on Twitter

    Google Scholar 

  7. Magdy W, Darwish K, Weber I (2015) #FailedRevolutions: Using Twitter to study the antecedents of ISIS support. arXiv preprint arXiv:1503.02401

  8. Kaati L et al (2015) Detecting multipliers of Jihadism on Twitter. In: 2015 IEEE international conference on data mining workshop (ICDMW), pp 954–960. IEEE. https://www.foi.se/download/18.7fd35d7f166c56ebe0b1000c/1542623725677/Detecting-multipliers-of-jihadism_FOI-S--5656--SE.pdf

  9. Rowe M, Saif H (2016) Mining pro-ISIS radicalisation signals from social media users. In: Proceedings of the international AAAI conference on web and social media, vol 10, no 1, pp 329–338. https://doi.org/10.1609/icwsm.v10i1.14716

  10. Cantalapiedra DG (2019) Toward a new security concept in a multi-domain space: complexity, war and cross-domain security. ieee.es | Instituto Español de Estudios Estratégicos. https://www.ieee.es/Galerias/fichero/docs_opinion/2019/DIEEEO85_2019DAVGAR_seguridad_ENG.pdf. Accessed 8 Sept 2022

  11. Le Guyader H (2022) Cognitive domain: a sixth domain of operations. Hal Open Science, p 3-1. https://hal.science/hal-03635898/document. Accessed 26 June 2023

  12. Caliskan M (2019) Hybrid warfare and strategic theory. Beyond the Horizon ISSG. https://behorizon.org/hybrid-warfare-through-the-lens-of-strategic-theory/. Accessed 27 Sept 2022

  13. Zanini M, Sean JAE (2001) The networking of terror in the information age. In: Networks and netwars: the future of terror, crime, and militancy, p 32

    Google Scholar 

  14. Theohary CA (2015) Information warfare: the role of social media in conflict. Congressional Research Service, the Library of Congress. https://sgp.fas.org/crs/misc/IN10240.pdf. Accessed 19 Sept 2022

  15. Zeiger S, Gyte J (2020) Prevention of radicalization on social media and the Internet. International Centre for Counter-Terrorism (ICCT). https://icct.nl/app/uploads/2021/10/Chapter-12-Handbook.pdf. Accessed 28 Sept 2022

  16. Gartenstein-Ross D (2015) Radicalization: social media and the rise of terrorism. House Testimony, Hearing before the US House of Representatives Committee on Oversight and Government Reform, Subcommittee on National Security, p 28. https://www.govinfo.gov/content/pkg/CHRG-114hhrg97977/html/CHRG-114hhrg97977.htm. Accessed 28 Sept 2022

  17. Ingelevič-Citak M, Przyszlak Z (2020) Jihadist, far-right and far-left terrorism in cyberspace-same threats and same countermeasures?. Int Comp Jurisprud 6:2. https://doi.org/10.13165/J.ICJ.2020.12.005

  18. Thomas TL (2003) Al Qaeda and the Internet: the danger of cyberplanning. Foreign Military Studies Office (ARMY). Fort Leavenworth Ks. https://apps.dtic.mil/sti/pdfs/ADA485810.pdf. Accessed 30 Sept 2022

  19. Meleagrou-Hitchens A, Hughes S (2017) The threat to the United States from the Islamic State’s virtual entrepreneurs. Combating Terrorism Center at West Point, vol 10. Mar 2017. https://ctc.usma.edu/the-threat-to-the-united-states-from-the-islamic-states-virtual-entrepreneurs/. Accessed 2 Sept 2022

  20. Bishop P, Macdonald S (2019) Digital Jihad: online communication and violent extremism. ISPI, Milano, pp 135–136

    Google Scholar 

  21. Stenersen A (2008) The Internet: a virtual training camp? Taylor & Francis Group

    Google Scholar 

  22. Todorovic B, Trifunovic D (2020) Prevention of (ab-) use of the Internet for terrorist plotting and related purposes. International Centre for Counterterrorism (ICCT). https://icct.nl/app/uploads/2021/10/Chapter-19-Handbook.pdf. Accessed 24 Oct 2022

  23. Trifunović D (2015) Digital steganography in terrorist networks. In: Proceedings (ZBORNIK RADOVA)

    Google Scholar 

  24. Rugge F (ed) (2018) Cybercrime as a threat to international security. ISPI Dossier. https://www.ispionline.it/sites/default/files/pubblicazioni/dossier_cyber_rugge_july2018.pdf

  25. Terrorist financing. Financial Action Task Force. Report 2008. https://www.fatf-gafi.org/media/fatf/documents/reports/FATF%20Terrorist%20Financing%20Typologies%20Report.pdf. Accessed 24 Oct 2022

  26. Adams J (1986) The financing of terror: behind the PLO, IRA, Red Brigades, and M-19 stand the paymasters: how the groups that are terrorizing the world get the money to do it. Simon and Schuster

    Google Scholar 

  27. Borum R (2007) Psychology of terrorism. University of South Florida Tampa Dept of Mental Health Law and Policy. https://www.ojp.gov/pdffiles1/nij/grants/208552.pdf. Accessed 20 Oct 2022

  28. Zelin A (2013) The state of global Jihad online. New America Foundation. https://www.washingtoninstitute.org/media/3122. Accessed 25 Oct 2022

  29. Laveraging artificial intelligence to counter terrorism. Voyager Labs. Sept 2021. https://www.voyager-labs.com/leveraging-artificial-intelligence-to-counter-terrorism/. Accessed 27 Oct 2022

  30. Chau M et al (2016) Intelligence and security informatics: 11th Pacific Asia workshop. PAISI 2016. Auckland, New Zealand: 19 April 2016, proceedings, vol 9650. Springer

    Google Scholar 

  31. Bottazzi G, Me G (2014) The botnet revenue model. In: Proceedings of the 7th international conference on security of information and networks, Glasgow, UK, 9–11 Nov 2014. ACM, New York, NY, USA, pp 459–465

    Google Scholar 

  32. Perliger A, Pedahzur A (2011) Social network analysis in the study of terrorism and political violence. Polit Sci Polit 44(1):45–50

    Google Scholar 

  33. Belli R et al (2015) Exploring the crime-terror nexus in the United States: a social network analysis of a Hezbollah network involved in trade diversion. Dyn Asymmetric Confl 8(3):263–281

    Article  Google Scholar 

  34. Chenoweth E, Lowham E (2007) On classifying terrorism: a potential contribution of cluster analysis for academics and policy-makers. Defence Secur Anal 23(4):345–357

    Google Scholar 

  35. Qi X et al (2010) A hierarchical algorithm for clustering extremist web pages. In: 2010 international conference on advances in social networks analysis and mining. IEEE

    Google Scholar 

  36. Papadopoulos S et al (2012) Community detection in social media. Data Min Knowl Disc 24(3):515–554

    Article  Google Scholar 

  37. Boccaletti S et al (2006) Complex networks: structure and dynamics. Phys Rep 424(4–5):175–308

    Article  ADS  MathSciNet  Google Scholar 

  38. Joseph K, Carley K (2015) Culture, networks, twitter and foursquare: testing a model of cultural conversion with social media data. In: Proceedings of the international AAAI conference on web and social media, vol 9, no 1

    Google Scholar 

  39. Newman ME (2006) Modularity and community structure in networks. Proc Nat Acad Sci 103(23):8577–8582. 3.1

    Google Scholar 

  40. Blondel VD et al (2008) Fast unfolding of communities in large networks. J Stat Mech: Theory Exp 2008(10):P10008

    Article  Google Scholar 

  41. Tang L, Liu H (2011) Leveraging social media networks for classification. In: Data mining and knowledge discovery, vol 23, pp 447–478

    Google Scholar 

  42. Wang X et al (2010) Discovering overlapping groups in social media. In: 2010 IEEE 10th international conference on data mining (ICDM). IEEE, pp 569–578

    Google Scholar 

  43. Binkiewicz N, Vogelstein JT, Rohe K (2014) Covariate assisted spectral clustering. arXiv preprint arXiv:1411.2158. 2.2.1, 3.1. https://arxiv.org/pdf/1411.2158.pdf

  44. Miller BA, Beard MS, Bliss NT (2011) Eigenspace analysis for threat detection in social networks. In: 14th international conference on information fusion. IEEE, pp 1–7

    Google Scholar 

  45. Klausen J (2015) Tweeting the Jihad: social media networks of Western foreign fighters in Syria and Iraq. Stud Confl Terror 38(1):1–22

    Google Scholar 

  46. Berger JM, Perez H (2016) The Islamic State’s diminishing returns on Twitter: how suspensions are limiting the social networks of English-speaking ISIS supporters. George Washington University Program on Extremism

    Google Scholar 

  47. Bodine-Baron et al (2016) Examining ISIS support and opposition networks on Twitter. RAND, Santa Monica, CA. https://www.rand.org/pubs/research_reports/RR1328.html

  48. Chatfield AT, Reddick CG, Brajawidagda U (2015) Tweeting propaganda, radicalization and recruitment: Islamic state supporters multi-sided Twitter networks. In: Proceedings of the 16th annual international conference on digital government research

    Google Scholar 

  49. Xu J, Lu T-C (2016) Automated classification of extremist Twitter accounts using content-based and network-based features. In: 2016 IEEE international conference on big data (big data). IEEE

    Google Scholar 

  50. Ashcroft M et al (2015) Detecting jihadist messages on Twitter. In: 2015 European intelligence and security informatics conference. IEEE

    Google Scholar 

  51. Me G, Mucci MF (2023) Countering Daesh cognitive and cyber warfare with OSINT and basic data mining tools. In: IC3 2023, vol 10, pp 71–80

    Google Scholar 

  52. Awford J (2014) Jihadist social media policy: ISIS look to stay one step ahead. Mail Online. https://www.dailymail.co.uk/news/article-2798185/isis-look-stay-one-step-ahead-western-spies-teaching-fighters-remove-metadata-tweets.html. Accessed 12 Nov 2022

  53. Religious texts used by ISIS. Kaggle.com. 2014. https://www.kaggle.com/datasets/fifthtribe/isis-religious-texts

  54. How ISIS uses Twitter. Kaggle.com. 2019. https://www.kaggle.com/datasets/fifthtribe/how-isis-uses-twitter

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Maria Felicita Mucci .

Editor information

Editors and Affiliations

Ethics declarations

The present document is merely informative in nature and refrains from endorsing any unsanctioned individuals or entities to directly engage with Daesh propaganda. It is recommended that such activities be exclusively carried out by individuals who have received adequate training and are operating within the confines of appropriate legal regulations. It is imperative to promptly notify the appropriate law enforcement authorities of any dubious actions.

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Me, G., Mucci, M.F. (2024). Identifying Daesh-Related Propaganda Using OSINT and Clustering Analysis. In: Jahankhani, H. (eds) Cybersecurity Challenges in the Age of AI, Space Communications and Cyborgs. ICGS3 2023. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-031-47594-8_6

Download citation

Publish with us

Policies and ethics