Weapons of Mass Destruction (WMD) on Dark Web
The tragic events of September 11 have caused drastic effects on many aspects of society. Academics in the fields of natural sciences, computational science, information science, social sciences, engineering, medicine, and many others have been called upon to help enhance the government’s ability to fight terrorism and other crimes. In the area under defending against catastrophic terrorism, weapons of mass destruction (WMD), especially nuclear weapons, have been considered one of the most dangerous threats to US homeland security and international peace and prosperity. We believe the science of Intelligence and Security Informatics (ISI) can help with nuclear forensics and attribution. ISI research can help advance the intelligence collection, analytical techniques, and instrumentation used in determining the origin, capability, intent, and transit route of nuclear materials by selected hostile countries and (terrorist) groups. We propose a research framework that aims to investigate the capability, accessibility, and intent of critical high-risk countries, institutions, researchers, and extremist or terrorist groups. We propose to develop a knowledge base of the Nuclear Web that will collect, analyze, and pinpoint significant actors in the high-risk international nuclear physics and weapons communities. We also identify potential extremist or terrorist groups from our Dark Web test bed who might pose WMD threats to the USA and the international community. Selected knowledge mapping and focused web crawling techniques and findings from a preliminary study are presented in this chapter.
KeywordsTerrorist Group Internet Service Provider Homeland Security Extremist Group Knowledge Mapping
Funding for this research was provided by (1) NSF, “CRI: Developing a Dark Web Collection and Infrastructure for Computational and Social Sciences,” NSF CNS-0709338, 2007–2010; and (2) NSF, “EXP-LA: Explosives and IEDs in the Dark Web: Discovery, Categorization, and Analysis,” NSF CBET-0730908, 2007–2010.
- Card, S. K., Mackinlay, J. D. and Shneiderman, B. (1999). Readings in Information Visualization: Using Vision to Think, Morgan Kaufmann Publishers, Inc., San Francisco, CA.Google Scholar
- Chakrabarti, S., Van Den Berg, M., and Dom, B. (1999). Focused Crawling: A New Approach to Topic-Specific Resource Discovery. In Proceedings of the Eight World Wide Web Conference, Toronto, Canada.Google Scholar
- Chen, H. (2001). Knowledge Management Systems: A Text Mining Perspective, University of Arizona, Tucson, Arizona.Google Scholar
- Chen, H. (2006). Intelligence and Security Informatics, Springer-Verlag.Google Scholar
- Cho, J., Garcia-Molina, H., and Page, L. (1998). Efficient Crawling Through URL Ordering. In Proceedings of the 7th World Wide Web Conference, Brisbane, Australia.Google Scholar
- Crane, D. (1972). Invisible Colleges: Diffusion of Knowledge in Scientific Communities. Chicago, University of Chicago Press.Google Scholar
- Glance, N., Hurst, M., Nigam, K. Siegler, M., Stockton, R. and Tomokiyo, T. (2005). Analyzing Online Discussion for Marketing Intelligence, In Proceedings of the 14th International World Wide Web Conference, Chicago, Illinois.Google Scholar
- Office of Homeland Security. (2002). National Strategy for Homeland Security. Washington D.C.: Office of Homeland Security.Google Scholar
- Raghavan, S. and Garcia-Molina, H. (2001). Crawling the Hidden Web. In Proceedings of the 27th International Conference on Very Large Databases.Google Scholar
- Schafer, J. (2002). Spinning the Web of Hate: Web-Based Hate Propagation by Extremist Organizations. Journal of Criminal Justice and Popular Culture, 9(2), 69–88.Google Scholar
- Shneiderman, B. (1996). The Eyes Have It: A Task by Data Type Taxonomy for Information Visualization, Proceedings of IEEE Workshop on Visual Languages’96, 336–343.Google Scholar
- Shiffrin, R. M. and Börner, K., (2004). Mapping Knowledge Domains. Arthur M. Sackler Colloguia of the National Academy of Sciences, National Academies of Sciences.Google Scholar