Abstract
In this paper we first provide a brief review of the Dark Web project of the University of Arizona Artificial Intelligence Lab. We then report our research design and case study that aim to identify the geolocation of the countries, cities, and ISPs that host selected international Jihadist web sites. We provide an overview of key relevant Internet functionality and architecture and present techniques for exploiting networking technologies for locating servers and resources. Significant findings from our case study and suggestion for future research are also presented.
Keywords
- Internet Protocol
- Terrorist Group
- Domain Name System
- Internet Protocol Address
- White Supremacist
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
This is a preview of subscription content, access via your institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Abbasi, A., Chen, H.: Identification and Comparison of Extremist-Group Web Forum Messages using Authorship Analysis. IEEE Intelligent Systems 20(5), 67–75 (2005)
Abbasi, A., Chen, H., Salem, A.: Sentiment Analysis in Multiple Languages: Feature Selection for Opinion Classification in Web Forums. ACM Transactions on Information Systems 26(3), 12:1–12:34 (2008)
Adams, J., Roscigno, V.J.: White Supermacists, oppositional culture and the World Wide Web. Social Forces 84(2), 759–778 (2005)
Chau, M., Qin, J., Zhou, Y., Tseng, C., Chen, H.: SpidersRUs: Automated Development of Vertical Search Engines in Different Domains and Languages. In: Proceedings of the ACM/IEEE-CS Joint Conference on Digital Libraries (JCDL 2005), Denver, Colorado, USA, June 7-11 (2005)
Chau, M., Xu, J.: A Framework for Locating and Analyzing Hate Groups in Blogs. In: Proceedings of the Pacific-Asia Conference on Information Systems, Kuala Lumpur, Malaysia, July 6-9 (2006)
Chen, H., Qin, J., et al.: Dark Web portal: collecting and analyzing the presence of domestic and international terrorist droups on the Web. In: IEEE Intelligence Transportation Conference, Washington, D.C. IEEE, Los Alamitos (2004)
Chen, H.: Intelligence and Security Informatics for International Security: Information Sharing and Data Mining. Springer, Heidelberg (2006)
Chen, H., Reid, E., Sinai, J., Silke, A., Ganor, B. (eds.): Terrorism Informatics: Knowledge Management and Data Mining for Homeland Security. Springer, Heidelberg (2008)
Crilley, K.: Information Warfare: New Battle Fields Terrorists, Propaganda, and the Internet. Proceedings of the Association for Information Management 53(7), 250–264 (2001)
Gerstenfeld, P.B., Grant, D.R., Chiang, C.: Hate Online: A Content Analysis of Extremist Internet Sites. Analysis of Social Issues and Public Policy 3(1), 29–44 (2003)
Glaser, J., Dixit, J., Green, D.P.: Studying Hate Crime with the Internet: What Makes Racists Advocate Racial Violence? Journal of Social Issues 58(1), 177–193 (2002)
Gustavson, A.T., Sherkat, D.E.: Elucidating the Web of Hate: The Ideological Structuring of Network Ties among White Supremacist Groups on the Internet. In: The Annual Meeting of the American Sociological Association (2004)
Krebs, V.E.: Mapping terrorist cells. Connections 24(3) (2001)
Weimann, G.: How modern terrorism uses the Internet. Special Report, United States Institute of Peace (2004) (Retrieved October 31, 2006), http://www.terror.net , http://www.terror.net
Zhou, Y., Reid, E., Qin, J., Chen, H., Lai, G.: U.S. Extremist Groups on the Web: Link and Content Analysis. IEEE Intelligent Systems 20(5), 44–51 (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Mielke, C., Chen, H. (2008). Mapping Dark Web Geolocation. In: Ortiz-Arroyo, D., Larsen, H.L., Zeng, D.D., Hicks, D., Wagner, G. (eds) Intelligence and Security Informatics. EuroIsI 2008. Lecture Notes in Computer Science, vol 5376. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-89900-6_12
Download citation
DOI: https://doi.org/10.1007/978-3-540-89900-6_12
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-89899-3
Online ISBN: 978-3-540-89900-6
eBook Packages: Computer ScienceComputer Science (R0)