Advertisement

Spreading the Message Digitally: A Look into Extremist Organizations’ Use of the Internet

  • Richard Frank
  • Martin Bouchard
  • Garth Davies
  • Joseph Mei
Chapter
Part of the Palgrave Macmillan’s Studies in Cybercrime and Cybersecurity book series (PSCYBER)

Abstract

Why would a terrorist choose to utilize the Internet rather than the usual methods of assassination, hostage taking, and guerrilla warfare? Conway (2006) identified five major reasons why extremist groups used the Internet: virtual community building, information provision, recruitment, financing, and risk mitigation. Terrorist and extremist organizations can use the Internet to increase their visibility and provide information about the group along with its goals without posing an increased risk to the members. It also allows them to easily ask for, and accept, donations through anonymous financial services such as Dark Coins. These benefits allow these groups to promote awareness of their cause, to convey their message to, and perhaps foster sympathy from a much larger pool of potential supporters and converts (Weimann 2010). Finally, the Internet also provides asynchronous services with global access, with the sender and recipient located at any place, at any time, without the need to link up at a specific time (Wagner 2005). In short, unlike the real world, cyberspace is borderless without limitation, and this makes identification, verification, and attribution a challenge.

Keywords

Sentiment Analysis Extremist Group Negative Sentiment Sentiment Dictionary Muslim Brotherhood 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Bibliography

  1. Abbasi, A. and Chen, H. (2005) “Applying Authorship Analysis to Extremist-group Web Forum Messages,” Intelligent Systems 20 (5): 67–75.CrossRefGoogle Scholar
  2. Apache Software Foundation (2014) “openNLP,” http://opennlp.apache.org/ (accessed 30 December 2014).
  3. Bouchard, M., Joffres, K. and Frank, R. (2014) “Preliminary Analytical Considerations in Designing a Terrorism and Extremism Online Network Extractor,” in Computational Models of Complex Systems, V. Mago and V. Dabbaghian (eds.), New York: Springer, 171–84.CrossRefGoogle Scholar
  4. Bowman-Grieve, L. (2009) “Anti-abortion extremism online.” First Monday, October. Available at http://journals.uic.edu/ojs/index.php/fm/article/view/2679.Google Scholar
  5. Burnap, P., Williams, M., Sloan, L., Rana, O., Housley, W., Edwards, A., Knight, V., Procter, R. and Voss, A. (2014) “Tweeting the Terror: Modelling the Social Media Reaction to the Woolwich Terrorist Attack,” Social Network Analysis and Mining 4 (206): 1–14.Google Scholar
  6. Chalothorn, T. and Ellman, J. (2012) “Using SentiWordNet and Sentiment Analysis for Detecting Radical Content on Web Forums,” in the 6th Conference on Software, Knowledge, Information Management and Applications (SKIMA 2012), 9–11 September, Chengdu University.Google Scholar
  7. Chen, W. (2012) Dark Web: Exploring and Data Mining the Dark Side of the Web, New York: Springer.CrossRefGoogle Scholar
  8. Conway, M. (2006) “Terrorism and the Internet: New Media, New Threat?,” Parliamentary Affairs 59.Google Scholar
  9. Davies, G., Bouchard, M., Wu, E., Joffres, K. and Frank, R. (forthcoming 2015 ) “Terrorist Organizations’ Use of the Internet for Recruitment,” in Social Network,Terrorism and Counter-terrorism: Radical and Connected, M. Bouchard (ed.), New York: Routledge.Google Scholar
  10. Feldman, R. (2013) “Techniques and Applications for Sentiment Analysis,” Communications of the ACM 56 (4): 82–8.CrossRefGoogle Scholar
  11. Frank, R., Westlake, B. and Bouchard, M. (2010) “The Structure and Content of Online Child Exploitation Networks,” Proceedings of the Tenth ACM SIGKDD Workshop on Intelligence and Security Informatics 2004.Google Scholar
  12. Ghiassi, M., Skinner, J. and Zimbra, D. (2013) “Twitter Brand Sentiment Analysis: A Hybrid System Using n-gram Analysis and Dynamic Artificial Neural Network,” Expert Systems with Applications 40: 6266–82.CrossRefGoogle Scholar
  13. Holt, T. (2012) “Exploring the Intersection of Technology Crime, and Terror,” Terrorism and Political Violence 24: 337–54.CrossRefGoogle Scholar
  14. Jefferis, J. (2011) Armed for Life: The Army of God and Anti-Abortion Terror inthe United States, Santa Barbara, CA: Praeger.Google Scholar
  15. Joffres, K., Bouchard, M., Frank, R. and Westlake, B. (2011) “Strategies to Disrupt Online Child Pornography Networks,” Proceedings of the EISIC - European Intelligence and Security Informatics, Athens, September, 163–70.Google Scholar
  16. Kennedy, H. (2012) “Perspectives on Sentiment Analysis,” Journal of Broadcasting and Electronic Media 56 (4): 435–50.CrossRefGoogle Scholar
  17. Komissarov, V. S., and Stepanov-Egiyants, V. G. (2013) “The Anti-terrorism Legislation of the Russian Federation.” Megatrend Review 10 (1): 335–49.Google Scholar
  18. Ogneva, M. (2010) “How Companies Can Use Sentiment Analysis to Improve Their Business,” http://mashable.com/2010/04/19/sentiment-analysis/ (accessed 28 September 2013).Google Scholar
  19. Pang, B., Lee, L. and Vaithyanathan, S. (2002) “Thumbs Up? Sentiment Classification Using Machine Learning Techniques,” Proceedings of the Conference on Empirical Methods in Natural Language Processing (EMNLP), 79–86.CrossRefGoogle Scholar
  20. Saint-Claire, S. (2014) “Overview and Analysis on Cyber Terrorism,” http://www.iiuedu.eu/press/journals/sds/SDS_2011/DET_Article2.pdf (accessed 30 December 2014).Google Scholar
  21. Sebastiani, F. (2002) “Machine Learning in Automated Text Categorization,” ACM Computing Surveys 34 (1): 1–47.CrossRefGoogle Scholar
  22. Seib, P. M. and Janbek, D. M. (2011) Global Terrorism and the New Media: The Post-Al Qaeda Generation, London: Routledge.Google Scholar
  23. Thelwall, M., Buckley, K., Paltoglou, G., Cai, D. and Kappas, A. (2010) “Sentiment Strength Detection in Short Informal Text,” Journal of the American Society for Information Science and Technology 61 (12): 2544–58.CrossRefGoogle Scholar
  24. Thelwall, M. and Buckley, K. (2013) “Topic-based Sentiment Analysis for the Social Web: The Role of Mood and Issue-related Words,” Journal of the American Society for Information Science and Technology 64 (8): 1608–17.CrossRefGoogle Scholar
  25. Tong, S. and Koller, D. (2002) “Support Vector Machine Active Learning with Applications to Text Classification,” Journal of Machine Learning Research 2: 45–66.Google Scholar
  26. Wagner, A. (2005) “Terrorism and the Internet: Use and Abuse,” in Fighting Terror in Cyberspace, M. Last and A. Kandel (eds.), http://www.worldscibooks.com/etextbook/5934/5934_chap1.pdf (accessed 30 December 2014).Google Scholar
  27. Weimann, G. (2006) Terror on the Internet: The New Area, the New Challenges, Washington, DC: United States Institute of Peace Press.Google Scholar
  28. Weimann, G. (2010) “Terror on Facebook, Twitter, and Youtube,” Brown Journal of World Affairs 16 (2): 45–54.Google Scholar
  29. Westlake, B., Bouchard, M. and Frank, R. (2011) “Finding the Key Players in Child Exploitation Networks,” Policy and Internet 3, Article 6: 1–32.Google Scholar

Copyright information

© Richard Frank, Martin Bouchard, Garth Davies, and Joseph Mei 2015

Authors and Affiliations

  • Richard Frank
  • Martin Bouchard
  • Garth Davies
  • Joseph Mei

There are no affiliations available

Personalised recommendations