Advertisement

Preliminary Analytical Considerations in Designing a Terrorism and Extremism Online Network Extractor

Chapter
Part of the Intelligent Systems Reference Library book series (ISRL, volume 53)

Abstract

It is now widely understood that extremists use the Internet in attempts to accomplish many of their objectives. In this chapter we present a web-crawler called the Terrorism and Extremism Network Extractor (TENE), designed to gather information about extremist activities on the Internet. In particular, this chapter will focus on how TENE may help differentiate terrorist websites from anti-terrorist websites by analyzing the context around the use of predetermined keywords found within the text of the webpage. We illustrate our strategy through a content analysis of four types of web-sites. One is a popular white supremacist website, another is a jihadist website, the third one is a terrorism-related news website, and the last one is an official counterterrorist website. To explore differences between these websites, the presence of, and context around 33 keywords was examined on both websites. It was found that certain words appear more often on one type of website than the other, and this may potentially serve as a good method for differentiating between terrorist websites and ones that simply refer to terrorist activities. For example, words such as “terrorist,” “security,” “mission,” “intelligence,” and “report,” all appeared with much greater frequency on the counterterrorist website than the white supremacist or the jihadist websites. In addition, the white supremacist and the jihadist websites used words such as “destroy,” “kill,” and “attack” in a specific context: not to describe their activities or their members, but to portray themselves as victims. The future developments of TENE are discussed.

Keywords

Web-Crawler Extremism Terrorism Internet 

References

  1. 1.
    Chen, W.: Dark Web: Exploring and Data Mining the Dark Side of the Web. Springer, New York (2012)CrossRefGoogle Scholar
  2. 2.
    Chen, H., Chung, W., Qin, J., Reid, E., Sageman, M., Weinmann, G.: Uncovering the dark web: a case study of Jihad on the Web. J. Am. Soc. Inf. Sci.Technol. 59(8), 13471359 (2008)CrossRefGoogle Scholar
  3. 3.
    Chen, H., Qin, J., Reid, E., Chung, W., Zhou, Y., Xi, W., Lai, G., Elhourani, T., Bonillas, A., Wang, F.Y., Sageman, M.: Collecting and analyzing the presence of domestic and international terrorist groups on the Web. In: Proceedings of the 7th Annual IEEE Conference on Intelligent Transportation Systems. The dark web portal (2004)Google Scholar
  4. 4.
    Conway, M.: Reality bites: Cyberterrorism and terrorist use’ of the Internet. http://www.firstmonday.org/Issues/issue7_11/conway/index.html (2002)
  5. 5.
    Cucchiarelli, A., D’Antonio, F., Velardi, P.: Semantically interconnected social networks. Soc. Netw. Anal. Min. 2(1), 69–95 (2012)CrossRefGoogle Scholar
  6. 6.
    Frank, R., Westlake, B., Bouchard, M.: The structure and content of online child exploitation networks. In: Proceedings of the Tenth ACM SIGKDD Workshop on Intelligence and Security Informatics ’04 (2010)Google Scholar
  7. 7.
    Institute for Security Technology Studies, Technical Analysis Group: Examining the cyber capabilities of Islamic Terrorist Groups. http://www.ists.dartmouth.edu/ (2004)
  8. 8.
    Jacobson, M.: Terrorist financing and the Internet. Stud. Confl. Terror. 33(4), 353–363 (2010)CrossRefGoogle Scholar
  9. 9.
    Jiang, C., Coenen, F., Sanderson, R., Zito, M.: Text classification using graph mining based feature extraction. In: Proceedings of the SGAI ’09: International Conference on Artificial Intelligence, London (2009)Google Scholar
  10. 10.
    Joffres, K., Bouchard, M., Frank, R., Westlake, B.: Strategies to disrupt online child pornography networks. In: Proceedings of the 11th ACM SIGKDD Workshop on Intelligence and Security Informatics. 163–170 (2011)Google Scholar
  11. 11.
    Kamruzzaman, S.M., Farhana, H., Ahmen, R.H.: Text classification using data mining. In: Proceedings of International Conference on Information and Communication Technology in Management ’05, Multimedia University, Malaysia (2009/10)Google Scholar
  12. 12.
    Musawi, M.A.: Cheering for Osama: how Jihadists use internet discussion forums. Quillan Foundation. http://www.quilliamfoundation.org/images/stories/pdfs/cheering-for-osama.pdf(2010)
  13. 13.
    National Research Council: Making the Nation Safer: The Role of Science and Technology in Countering Terrorism. National Academy of Sciences, Washington DC (2002)Google Scholar
  14. 14.
    Office of Homeland Security: National strategy for homeland security. Office of Homeland Security, Washington DC (2002)Google Scholar
  15. 15.
    Sebastiani, F.: Machine learning in automated text categorization. ACM Comput. Surv. 34(1), 1–47 (2002)CrossRefGoogle Scholar
  16. 16.
    Technical Analysis Group: Examining the cyber capabilities of Islamic Terrorist Groups. Institute for Security Technology Studies at Dartmouth College, Hanover (2004)Google Scholar
  17. 17.
    Thomas, T.L.: Al Qaeda and the Internet: the danger of cyberplanning’. Parameters 33, 112–123 (2003)Google Scholar
  18. 18.
    Tong, S., Koller, D.: Support vector machine active learning with applications to text classification. J. Mach. Learn. Res. 2, 45–66 (2002)MATHGoogle Scholar
  19. 19.
    Tsfati, W., Weimann, G.: http://www.terrorism.com: Terror on the Internet. Stud. Confl. Terror. 25(3), 317–332 (2002)Google Scholar
  20. 20.
    Weimann, G.: http://www.terror.net: How modern terrorism uses the Internet. Special report, US Institute of Peace. http://www.usip.org/pubs/specialreports/sr116.pdf (2004)
  21. 21.
    Weimann, G.: Terror on the Internet: The New Arena, The New Challenges. United States Institute of Peace, Washington DC (2006)Google Scholar
  22. 22.
    Westlake, B., Bouchard, M., Frank, R.: Finding the key players in online child exploitation networks. Policy Internet 3(2), 104 (2011)CrossRefGoogle Scholar
  23. 23.
    Xu, J., Chen, H., Zhou, Y., Qin, J.: On the topology of the dark web of terrorist groups. Lect. Notes Comput. Sci. 3975, 367–376 (2006)CrossRefGoogle Scholar
  24. 24.
    Zhou, Y., Qin, J., Lai, G., Reid, E., Chen, H.: Building knowledge management system for researching terrorist groups on the Web. In: Proceedings of the 11th Americas Conference on Information Systems ’05, Omaha, NE, USA (2005)Google Scholar
  25. 25.
    Zhou, Y., Reid, E., Qin, J., Chen, H., Lai, G.: U.S. Extremist Groups on the Web: link and content analysis. IEEE Intell. Syst. 20(5), 44–51 (2005)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  1. 1.School of Criminology, International CyberCrime Research CentreSimon Fraser UniversityBurnabyCanada

Personalised recommendations