Dark Web pp 257-270 | Cite as

Dark Web Forum Portal

  • Hsinchun ChenEmail author
Part of the Integrated Series in Information Systems book series (ISIS, volume 30)


In recent years, there have been numerous studies from a variety of perspectives analyzing the Internet presence of hate and extremist groups. Yet the web sites and forums of extremist and terrorist groups have long remained an underutilized resource for terrorism researchers due to their ephemeral nature and persistent access and analysis problems. The purpose of the Dark Web archive, therefore, is to provide a research infrastructure for use by social scientists, computer and information scientists, policy and security analysts, and others studying a wide range of social and organizational phenomena and computational problems. The Dark Web Forum Portal provides web-enabled access to critical international jihadist web forums. The focus of this chapter is on the significant extensions to previous work including: increasing the scope of our data collection; adding an incremental spidering component for regular data updates; enhancing the searching and browsing functions; enhancing multilingual machine translation for Arabic, French, German, and Russian; and adding advanced social network analysis. A case study on identifying active participants is described at the end.


Social Network Analysis Machine Translation Security Analyst List Page Forum Data 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.



This work is supported by the NSF Computer and Network Systems (CNS) Program (CNS-0709338), September 2007–August 2010, and HDTRA1-09-1-0058, July 2009–July 2012. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation or DOD.


  1. Adamic, L. A., Zhang, J., Bakshy, E., and Ackerman, M. S. (2008). “Knowledge Sharing and Yahoo Answers: Everyone Knows Something.” In Proceeding of the 17th International Conference on World Wide Web (Beijing, China, April 21–25). WWW ‘08. ACM, New York, NY, pp. 665–674.Google Scholar
  2. Albert, R. and Barabasi, A.-L. (2002), “Statistical Mechanics of Complex Networks,” Rev. Mod. Phys., Vol. 74, pp. 47–97.MathSciNetCrossRefzbMATHGoogle Scholar
  3. Cheong, F.C. (1996). Internet Agents: Spiders, Wanderers, Brokers, and Bots. Indianapolis, IN: New Riders Publishing.Google Scholar
  4. Cho, J. and Garcia-Molina, H. (2000). “The Evolution of the Web and Implications for an Incremental Crawler.” In Proceedings of the 26th International Conference on Very Large Databases.Google Scholar
  5. Coll, S. and Glasser, S.B. (2005). “Terrorists Turn to the Web as Base of Operations,” Washington Post, August 7.Google Scholar
  6. Fu, T.J., Abbasi, A., and Chen, H. (2010 online; forthcoming in print). “A Focused Crawler for Dark Web Forums,” Journal of the American Society for Information Science and Technology (JASIST).Google Scholar
  7. Hu, D., Kaza, S., and Chen, H. 2009. “Identifying Significant Facilitators of Dark Network Evolution,” JASIST, Vol. 60, no. 4, pp. 655–665.CrossRefGoogle Scholar
  8. Kossinets, G. and Watts, D.J. (2006), “Empirical Analysis of an Evolving Social Network,” Science, Vol. 311, pp. 88–90.MathSciNetCrossRefzbMATHGoogle Scholar
  9. Liben-Nowel, D. (2007), “The Link-prediction Problem for Social Networks,” JASIST, vol. 58, no. 7, pp. 1019–1031.CrossRefGoogle Scholar
  10. Raab, J. and Milward, H.B. (2003), “Dark Networks as Problems,” Journal of Public Administration Research and Theory, Vol. 13, pp. 413–439.CrossRefGoogle Scholar
  11. Raghavan, S. and Garcia-Molina, H. (2001). “Crawling the Hidden Web.” In Proceedings of the 27th International Conference on Very Large Databases.Google Scholar
  12. Reid, E., Qin, J., Chung, W., Xu, J., Zhou, Y., Schumaker, R., Sageman, M., and Chen, H. (2004). “Terrorism Knowledge Discovery Project: A Knowledge Discovery Approach to Addressing the Threats of Terrorism.” In Proceedings of the 2nd Symposium on Intelligence and Security Informatics (Tucson, June 10–11), pp. 125–145.Google Scholar
  13. Weimann, G. (2004). “ How Modern Terrorism Uses the Internet.” Special Report, United States Institute of Peace. Retrieved October 31, 2006.­specialreports/sr116.pdf.
  14. Zhang, Y., Zeng, S., Fan, L., Dang, Y., Larson, C., and Chen, H. (2009). “Dark Web Forums Portal: Searching and Analyzing Jihadist Forums.” In Proceedings of the IEEE International Intelligence and Security Informatics Conference (Dallas, Texas, June 8–11).Google Scholar
  15. Zhou, Y., Qin, J., Chen, H., et al. (2005). “Multilingual Web Retrieval: An Experiment on a Multilingual Business Intelligence Portal.” In Proceedings of the 38th Annual Hawaii International Conference on System Sciences (HICSS’2005).Google Scholar
  16. Zhang, J., Ackerman, M. S., and Adamic, L. (2007). “Expertise Networks in Online Communities: Structure and Algorithms.” In Proceedings of the 16th International Conference on World Wide Web (Banff, Alberta, Canada, May 08–12). WWW ‘07. ACM, New York, NY, pp. 221–230.Google Scholar

Copyright information

© Springer Science+Business Media, LLC 2012

Authors and Affiliations

  1. 1.Department of Management Information SystemsUniversity of ArizonaTusconUSA

Personalised recommendations