Abstract
Why would a terrorist choose to utilize the Internet rather than the usual methods of assassination, hostage taking, and guerrilla warfare? Conway (2006) identified five major reasons why extremist groups used the Internet: virtual community building, information provision, recruitment, financing, and risk mitigation. Terrorist and extremist organizations can use the Internet to increase their visibility and provide information about the group along with its goals without posing an increased risk to the members. It also allows them to easily ask for, and accept, donations through anonymous financial services such as Dark Coins. These benefits allow these groups to promote awareness of their cause, to convey their message to, and perhaps foster sympathy from a much larger pool of potential supporters and converts (Weimann 2010). Finally, the Internet also provides asynchronous services with global access, with the sender and recipient located at any place, at any time, without the need to link up at a specific time (Wagner 2005). In short, unlike the real world, cyberspace is borderless without limitation, and this makes identification, verification, and attribution a challenge.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Bibliography
Abbasi, A. and Chen, H. (2005) “Applying Authorship Analysis to Extremist-group Web Forum Messages,” Intelligent Systems 20 (5): 67–75.
Apache Software Foundation (2014) “openNLP,” http://opennlp.apache.org/ (accessed 30 December 2014).
Bouchard, M., Joffres, K. and Frank, R. (2014) “Preliminary Analytical Considerations in Designing a Terrorism and Extremism Online Network Extractor,” in Computational Models of Complex Systems, V. Mago and V. Dabbaghian (eds.), New York: Springer, 171–84.
Bowman-Grieve, L. (2009) “Anti-abortion extremism online.” First Monday, October. Available at http://journals.uic.edu/ojs/index.php/fm/article/view/2679.
Burnap, P., Williams, M., Sloan, L., Rana, O., Housley, W., Edwards, A., Knight, V., Procter, R. and Voss, A. (2014) “Tweeting the Terror: Modelling the Social Media Reaction to the Woolwich Terrorist Attack,” Social Network Analysis and Mining 4 (206): 1–14.
Chalothorn, T. and Ellman, J. (2012) “Using SentiWordNet and Sentiment Analysis for Detecting Radical Content on Web Forums,” in the 6th Conference on Software, Knowledge, Information Management and Applications (SKIMA 2012), 9–11 September, Chengdu University.
Chen, W. (2012) Dark Web: Exploring and Data Mining the Dark Side of the Web, New York: Springer.
Conway, M. (2006) “Terrorism and the Internet: New Media, New Threat?,” Parliamentary Affairs 59.
Davies, G., Bouchard, M., Wu, E., Joffres, K. and Frank, R. (forthcoming 2015 ) “Terrorist Organizations’ Use of the Internet for Recruitment,” in Social Network,Terrorism and Counter-terrorism: Radical and Connected, M. Bouchard (ed.), New York: Routledge.
Feldman, R. (2013) “Techniques and Applications for Sentiment Analysis,” Communications of the ACM 56 (4): 82–8.
Frank, R., Westlake, B. and Bouchard, M. (2010) “The Structure and Content of Online Child Exploitation Networks,” Proceedings of the Tenth ACM SIGKDD Workshop on Intelligence and Security Informatics 2004.
Ghiassi, M., Skinner, J. and Zimbra, D. (2013) “Twitter Brand Sentiment Analysis: A Hybrid System Using n-gram Analysis and Dynamic Artificial Neural Network,” Expert Systems with Applications 40: 6266–82.
Holt, T. (2012) “Exploring the Intersection of Technology Crime, and Terror,” Terrorism and Political Violence 24: 337–54.
Jefferis, J. (2011) Armed for Life: The Army of God and Anti-Abortion Terror inthe United States, Santa Barbara, CA: Praeger.
Joffres, K., Bouchard, M., Frank, R. and Westlake, B. (2011) “Strategies to Disrupt Online Child Pornography Networks,” Proceedings of the EISIC - European Intelligence and Security Informatics, Athens, September, 163–70.
Kennedy, H. (2012) “Perspectives on Sentiment Analysis,” Journal of Broadcasting and Electronic Media 56 (4): 435–50.
Komissarov, V. S., and Stepanov-Egiyants, V. G. (2013) “The Anti-terrorism Legislation of the Russian Federation.” Megatrend Review 10 (1): 335–49.
Ogneva, M. (2010) “How Companies Can Use Sentiment Analysis to Improve Their Business,” http://mashable.com/2010/04/19/sentiment-analysis/ (accessed 28 September 2013).
Pang, B., Lee, L. and Vaithyanathan, S. (2002) “Thumbs Up? Sentiment Classification Using Machine Learning Techniques,” Proceedings of the Conference on Empirical Methods in Natural Language Processing (EMNLP), 79–86.
Saint-Claire, S. (2014) “Overview and Analysis on Cyber Terrorism,” http://www.iiuedu.eu/press/journals/sds/SDS_2011/DET_Article2.pdf (accessed 30 December 2014).
Sebastiani, F. (2002) “Machine Learning in Automated Text Categorization,” ACM Computing Surveys 34 (1): 1–47.
Seib, P. M. and Janbek, D. M. (2011) Global Terrorism and the New Media: The Post-Al Qaeda Generation, London: Routledge.
Thelwall, M., Buckley, K., Paltoglou, G., Cai, D. and Kappas, A. (2010) “Sentiment Strength Detection in Short Informal Text,” Journal of the American Society for Information Science and Technology 61 (12): 2544–58.
Thelwall, M. and Buckley, K. (2013) “Topic-based Sentiment Analysis for the Social Web: The Role of Mood and Issue-related Words,” Journal of the American Society for Information Science and Technology 64 (8): 1608–17.
Tong, S. and Koller, D. (2002) “Support Vector Machine Active Learning with Applications to Text Classification,” Journal of Machine Learning Research 2: 45–66.
Wagner, A. (2005) “Terrorism and the Internet: Use and Abuse,” in Fighting Terror in Cyberspace, M. Last and A. Kandel (eds.), http://www.worldscibooks.com/etextbook/5934/5934_chap1.pdf (accessed 30 December 2014).
Weimann, G. (2006) Terror on the Internet: The New Area, the New Challenges, Washington, DC: United States Institute of Peace Press.
Weimann, G. (2010) “Terror on Facebook, Twitter, and Youtube,” Brown Journal of World Affairs 16 (2): 45–54.
Westlake, B., Bouchard, M. and Frank, R. (2011) “Finding the Key Players in Child Exploitation Networks,” Policy and Internet 3, Article 6: 1–32.
Editor information
Editors and Affiliations
Copyright information
© 2015 Richard Frank, Martin Bouchard, Garth Davies, and Joseph Mei
About this chapter
Cite this chapter
Frank, R., Bouchard, M., Davies, G., Mei, J. (2015). Spreading the Message Digitally: A Look into Extremist Organizations’ Use of the Internet. In: Smith, R.G., Cheung, R.CC., Lau, L.YC. (eds) Cybercrime Risks and Responses. Palgrave Macmillan’s Studies in Cybercrime and Cybersecurity. Palgrave Macmillan, London. https://doi.org/10.1057/9781137474162_9
Download citation
DOI: https://doi.org/10.1057/9781137474162_9
Publisher Name: Palgrave Macmillan, London
Print ISBN: 978-1-349-55788-2
Online ISBN: 978-1-137-47416-2
eBook Packages: Palgrave Social Sciences CollectionSocial Sciences (R0)