Spreading the Message Digitally: A Look into Extremist Organizations’ Use of the Internet
- 399 Downloads
Why would a terrorist choose to utilize the Internet rather than the usual methods of assassination, hostage taking, and guerrilla warfare? Conway (2006) identified five major reasons why extremist groups used the Internet: virtual community building, information provision, recruitment, financing, and risk mitigation. Terrorist and extremist organizations can use the Internet to increase their visibility and provide information about the group along with its goals without posing an increased risk to the members. It also allows them to easily ask for, and accept, donations through anonymous financial services such as Dark Coins. These benefits allow these groups to promote awareness of their cause, to convey their message to, and perhaps foster sympathy from a much larger pool of potential supporters and converts (Weimann 2010). Finally, the Internet also provides asynchronous services with global access, with the sender and recipient located at any place, at any time, without the need to link up at a specific time (Wagner 2005). In short, unlike the real world, cyberspace is borderless without limitation, and this makes identification, verification, and attribution a challenge.
KeywordsSentiment Analysis Extremist Group Negative Sentiment Sentiment Dictionary Muslim Brotherhood
Unable to display preview. Download preview PDF.
- Apache Software Foundation (2014) “openNLP,” http://opennlp.apache.org/ (accessed 30 December 2014).
- Burnap, P., Williams, M., Sloan, L., Rana, O., Housley, W., Edwards, A., Knight, V., Procter, R. and Voss, A. (2014) “Tweeting the Terror: Modelling the Social Media Reaction to the Woolwich Terrorist Attack,” Social Network Analysis and Mining 4 (206): 1–14.Google Scholar
- Chalothorn, T. and Ellman, J. (2012) “Using SentiWordNet and Sentiment Analysis for Detecting Radical Content on Web Forums,” in the 6th Conference on Software, Knowledge, Information Management and Applications (SKIMA 2012), 9–11 September, Chengdu University.Google Scholar
- Conway, M. (2006) “Terrorism and the Internet: New Media, New Threat?,” Parliamentary Affairs 59.Google Scholar
- Davies, G., Bouchard, M., Wu, E., Joffres, K. and Frank, R. (forthcoming 2015 ) “Terrorist Organizations’ Use of the Internet for Recruitment,” in Social Network,Terrorism and Counter-terrorism: Radical and Connected, M. Bouchard (ed.), New York: Routledge.Google Scholar
- Frank, R., Westlake, B. and Bouchard, M. (2010) “The Structure and Content of Online Child Exploitation Networks,” Proceedings of the Tenth ACM SIGKDD Workshop on Intelligence and Security Informatics 2004.Google Scholar
- Jefferis, J. (2011) Armed for Life: The Army of God and Anti-Abortion Terror inthe United States, Santa Barbara, CA: Praeger.Google Scholar
- Joffres, K., Bouchard, M., Frank, R. and Westlake, B. (2011) “Strategies to Disrupt Online Child Pornography Networks,” Proceedings of the EISIC - European Intelligence and Security Informatics, Athens, September, 163–70.Google Scholar
- Komissarov, V. S., and Stepanov-Egiyants, V. G. (2013) “The Anti-terrorism Legislation of the Russian Federation.” Megatrend Review 10 (1): 335–49.Google Scholar
- Seib, P. M. and Janbek, D. M. (2011) Global Terrorism and the New Media: The Post-Al Qaeda Generation, London: Routledge.Google Scholar
- Tong, S. and Koller, D. (2002) “Support Vector Machine Active Learning with Applications to Text Classification,” Journal of Machine Learning Research 2: 45–66.Google Scholar
- Weimann, G. (2006) Terror on the Internet: The New Area, the New Challenges, Washington, DC: United States Institute of Peace Press.Google Scholar
- Weimann, G. (2010) “Terror on Facebook, Twitter, and Youtube,” Brown Journal of World Affairs 16 (2): 45–54.Google Scholar
- Westlake, B., Bouchard, M. and Frank, R. (2011) “Finding the Key Players in Child Exploitation Networks,” Policy and Internet 3, Article 6: 1–32.Google Scholar