Improvised Explosive Devices (IED) on Dark Web
This chapter presents a cyber-archaeology approach to social movement research. The approach overcomes many of the issues of scale and complexity facing social research on the Internet, enabling broad and longitudinal study of the virtual communities supporting social movements. Cultural cyber-artifacts of significance to the social movement are collected and classified using automated techniques, enabling analysis across multiple related virtual communities. Approaches to the analysis of cyber-artifacts are guided by perspectives of social movement theory. A Dark Web case study on a broad group of related IED virtual communities is presented to demonstrate the efficacy of the framework and provide a detailed instantiation of the proposed approach for evaluation.
KeywordsSupport Vector Machine Social Movement Support Vector Machine Model Virtual Community Link Network
Funding for this research was provided by (1) NSF, “CRI: Developing a Dark Web Collection and Infrastructure for Computational and Social Sciences,” 2007–2010 and (2) NSF, “EXP-LA: Explosives and IEDs in the Dark Web: Discovery, Categorization, and Analysis,” 2007–2010.
- Aggarwal, C. C., Al-Garawi, F., and Yu, P. S. (2001). Intelligent crawling on the world wide web with arbitrary predicates. In Proceedings of the 10th WWW Conference. Hong Kong.Google Scholar
- Chakrabarti, S., Van Den Berg, M., and Dom, B. (1999). Focused crawling: a new approach to topic-specific resource discovery. In Proceedings of the Eighth WWW Conference. Toronto, Canada.Google Scholar
- Castells, M. (1998). End of millennium – The information age: Economy, society, and culture. Blackwell Publishers.Google Scholar
- Collier, G. (1994). Basta! Land and the Zapatista rebellion in Chaipas. Food First Books.Google Scholar
- Cleaver, H. (1995). The Zapatistas and the electronic fabric of struggle. Online, http://www.eco.utexas.edu/faculty/Cleaver/zaps.html.
- Cleaver, H. (1999). Computer-linked social movements and the global threat to capitalism. Online, http://www.eco.utexas.edu/faculty/Cleaver/polnet.html.
- Ester, M., Grob, M., and Kriegel, H. (2001). Focused web crawling: a generic framework for specifying the user interest and for adaptive crawling strategies. In Proceedings of the International Conference on Very Large Databases.Google Scholar
- Fuchs, C. (2006b). The self-organization of cyberprotest. In Morgan, K., Brebbia, C., and Spector, J. (eds.), The Internet Society II. Southampton/Boston. WIT Press. pp. 275-295.Google Scholar
- Jones, S. (1994). Cyber-society: Computer-mediated communication and community. Sage Publications.Google Scholar
- Jordan, T. and Taylor, P. (2004). Hacktivism and cyberwars: Rebels with a cause? Routledge.Google Scholar
- McAdam, D. (1986). Recruitment to high-risk activism: the case of freedom summer. The American Journal of Sociology, 92(1), 64–90.Google Scholar
- Meikle, G. (2002). Future active: Media activism and the Internet. Routledge.Google Scholar
- Santini, M. (2004). A shallow approach to syntactic feature extraction for genre classification. In Proceedings of the 7th Annual Colloquium for the UK Special Interest Group for Computational Linguistics (CLUK).Google Scholar
- Schafer, J. (2002). Spinning the web of hate: web-based hate propagation by extremist organizations. Journal of Criminal Justice and Popular Culture, 9(2), 69–88.Google Scholar
- Shepherd, M., Watters, C., and Kaushik, R. (2001). Lessons from reading E-News for browsing the web: the role of genre and task. In Proceedings of the American Society for Information Science, 38, 256–267.Google Scholar
- Snow, D. and Marshall, S. (1984). Cultural imperialism, social movement, and the Islamic revival. In L. Kriesberg (ed.), Research in Social Movements, Conflicts, and Change, Vol. 7. London: Jai Press.Google Scholar
- Starr, A. (2000). Naming the enemy: Anti-corporate movements confront globalization. Zed Books.Google Scholar