Skip to main content

Spreading the Message Digitally: A Look into Extremist Organizations’ Use of the Internet

  • Chapter
Cybercrime Risks and Responses

Abstract

Why would a terrorist choose to utilize the Internet rather than the usual methods of assassination, hostage taking, and guerrilla warfare? Conway (2006) identified five major reasons why extremist groups used the Internet: virtual community building, information provision, recruitment, financing, and risk mitigation. Terrorist and extremist organizations can use the Internet to increase their visibility and provide information about the group along with its goals without posing an increased risk to the members. It also allows them to easily ask for, and accept, donations through anonymous financial services such as Dark Coins. These benefits allow these groups to promote awareness of their cause, to convey their message to, and perhaps foster sympathy from a much larger pool of potential supporters and converts (Weimann 2010). Finally, the Internet also provides asynchronous services with global access, with the sender and recipient located at any place, at any time, without the need to link up at a specific time (Wagner 2005). In short, unlike the real world, cyberspace is borderless without limitation, and this makes identification, verification, and attribution a challenge.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Bibliography

  • Abbasi, A. and Chen, H. (2005) “Applying Authorship Analysis to Extremist-group Web Forum Messages,” Intelligent Systems 20 (5): 67–75.

    Article  Google Scholar 

  • Apache Software Foundation (2014) “openNLP,” http://opennlp.apache.org/ (accessed 30 December 2014).

  • Bouchard, M., Joffres, K. and Frank, R. (2014) “Preliminary Analytical Considerations in Designing a Terrorism and Extremism Online Network Extractor,” in Computational Models of Complex Systems, V. Mago and V. Dabbaghian (eds.), New York: Springer, 171–84.

    Chapter  Google Scholar 

  • Bowman-Grieve, L. (2009) “Anti-abortion extremism online.” First Monday, October. Available at http://journals.uic.edu/ojs/index.php/fm/article/view/2679.

    Google Scholar 

  • Burnap, P., Williams, M., Sloan, L., Rana, O., Housley, W., Edwards, A., Knight, V., Procter, R. and Voss, A. (2014) “Tweeting the Terror: Modelling the Social Media Reaction to the Woolwich Terrorist Attack,” Social Network Analysis and Mining 4 (206): 1–14.

    Google Scholar 

  • Chalothorn, T. and Ellman, J. (2012) “Using SentiWordNet and Sentiment Analysis for Detecting Radical Content on Web Forums,” in the 6th Conference on Software, Knowledge, Information Management and Applications (SKIMA 2012), 9–11 September, Chengdu University.

    Google Scholar 

  • Chen, W. (2012) Dark Web: Exploring and Data Mining the Dark Side of the Web, New York: Springer.

    Book  Google Scholar 

  • Conway, M. (2006) “Terrorism and the Internet: New Media, New Threat?,” Parliamentary Affairs 59.

    Google Scholar 

  • Davies, G., Bouchard, M., Wu, E., Joffres, K. and Frank, R. (forthcoming 2015 ) “Terrorist Organizations’ Use of the Internet for Recruitment,” in Social Network,Terrorism and Counter-terrorism: Radical and Connected, M. Bouchard (ed.), New York: Routledge.

    Google Scholar 

  • Feldman, R. (2013) “Techniques and Applications for Sentiment Analysis,” Communications of the ACM 56 (4): 82–8.

    Article  Google Scholar 

  • Frank, R., Westlake, B. and Bouchard, M. (2010) “The Structure and Content of Online Child Exploitation Networks,” Proceedings of the Tenth ACM SIGKDD Workshop on Intelligence and Security Informatics 2004.

    Google Scholar 

  • Ghiassi, M., Skinner, J. and Zimbra, D. (2013) “Twitter Brand Sentiment Analysis: A Hybrid System Using n-gram Analysis and Dynamic Artificial Neural Network,” Expert Systems with Applications 40: 6266–82.

    Article  Google Scholar 

  • Holt, T. (2012) “Exploring the Intersection of Technology Crime, and Terror,” Terrorism and Political Violence 24: 337–54.

    Article  Google Scholar 

  • Jefferis, J. (2011) Armed for Life: The Army of God and Anti-Abortion Terror inthe United States, Santa Barbara, CA: Praeger.

    Google Scholar 

  • Joffres, K., Bouchard, M., Frank, R. and Westlake, B. (2011) “Strategies to Disrupt Online Child Pornography Networks,” Proceedings of the EISIC - European Intelligence and Security Informatics, Athens, September, 163–70.

    Google Scholar 

  • Kennedy, H. (2012) “Perspectives on Sentiment Analysis,” Journal of Broadcasting and Electronic Media 56 (4): 435–50.

    Article  Google Scholar 

  • Komissarov, V. S., and Stepanov-Egiyants, V. G. (2013) “The Anti-terrorism Legislation of the Russian Federation.” Megatrend Review 10 (1): 335–49.

    Google Scholar 

  • Ogneva, M. (2010) “How Companies Can Use Sentiment Analysis to Improve Their Business,” http://mashable.com/2010/04/19/sentiment-analysis/ (accessed 28 September 2013).

    Google Scholar 

  • Pang, B., Lee, L. and Vaithyanathan, S. (2002) “Thumbs Up? Sentiment Classification Using Machine Learning Techniques,” Proceedings of the Conference on Empirical Methods in Natural Language Processing (EMNLP), 79–86.

    Chapter  Google Scholar 

  • Saint-Claire, S. (2014) “Overview and Analysis on Cyber Terrorism,” http://www.iiuedu.eu/press/journals/sds/SDS_2011/DET_Article2.pdf (accessed 30 December 2014).

    Google Scholar 

  • Sebastiani, F. (2002) “Machine Learning in Automated Text Categorization,” ACM Computing Surveys 34 (1): 1–47.

    Article  Google Scholar 

  • Seib, P. M. and Janbek, D. M. (2011) Global Terrorism and the New Media: The Post-Al Qaeda Generation, London: Routledge.

    Google Scholar 

  • Thelwall, M., Buckley, K., Paltoglou, G., Cai, D. and Kappas, A. (2010) “Sentiment Strength Detection in Short Informal Text,” Journal of the American Society for Information Science and Technology 61 (12): 2544–58.

    Article  Google Scholar 

  • Thelwall, M. and Buckley, K. (2013) “Topic-based Sentiment Analysis for the Social Web: The Role of Mood and Issue-related Words,” Journal of the American Society for Information Science and Technology 64 (8): 1608–17.

    Article  Google Scholar 

  • Tong, S. and Koller, D. (2002) “Support Vector Machine Active Learning with Applications to Text Classification,” Journal of Machine Learning Research 2: 45–66.

    Google Scholar 

  • Wagner, A. (2005) “Terrorism and the Internet: Use and Abuse,” in Fighting Terror in Cyberspace, M. Last and A. Kandel (eds.), http://www.worldscibooks.com/etextbook/5934/5934_chap1.pdf (accessed 30 December 2014).

    Google Scholar 

  • Weimann, G. (2006) Terror on the Internet: The New Area, the New Challenges, Washington, DC: United States Institute of Peace Press.

    Google Scholar 

  • Weimann, G. (2010) “Terror on Facebook, Twitter, and Youtube,” Brown Journal of World Affairs 16 (2): 45–54.

    Google Scholar 

  • Westlake, B., Bouchard, M. and Frank, R. (2011) “Finding the Key Players in Child Exploitation Networks,” Policy and Internet 3, Article 6: 1–32.

    Google Scholar 

Download references

Authors

Editor information

Editors and Affiliations

Copyright information

© 2015 Richard Frank, Martin Bouchard, Garth Davies, and Joseph Mei

About this chapter

Cite this chapter

Frank, R., Bouchard, M., Davies, G., Mei, J. (2015). Spreading the Message Digitally: A Look into Extremist Organizations’ Use of the Internet. In: Smith, R.G., Cheung, R.CC., Lau, L.YC. (eds) Cybercrime Risks and Responses. Palgrave Macmillan’s Studies in Cybercrime and Cybersecurity. Palgrave Macmillan, London. https://doi.org/10.1057/9781137474162_9

Download citation

Publish with us

Policies and ethics