Dark Web pp 341-353 | Cite as

Weapons of Mass Destruction (WMD) on Dark Web

  • Hsinchun ChenEmail author
Part of the Integrated Series in Information Systems book series (ISIS, volume 30)


The tragic events of September 11 have caused drastic effects on many aspects of society. Academics in the fields of natural sciences, computational science, information science, social sciences, engineering, medicine, and many others have been called upon to help enhance the government’s ability to fight terrorism and other crimes. In the area under defending against catastrophic terrorism, weapons of mass destruction (WMD), especially nuclear weapons, have been considered one of the most dangerous threats to US homeland security and international peace and prosperity. We believe the science of Intelligence and Security Informatics (ISI) can help with nuclear forensics and attribution. ISI research can help advance the intelligence collection, analytical techniques, and instrumentation used in determining the origin, capability, intent, and transit route of nuclear materials by selected hostile countries and (terrorist) groups. We propose a research framework that aims to investigate the capability, accessibility, and intent of critical high-risk countries, institutions, researchers, and extremist or terrorist groups. We propose to develop a knowledge base of the Nuclear Web that will collect, analyze, and pinpoint significant actors in the high-risk international nuclear physics and weapons communities. We also identify potential extremist or terrorist groups from our Dark Web test bed who might pose WMD threats to the USA and the international community. Selected knowledge mapping and focused web crawling techniques and findings from a preliminary study are presented in this chapter.


Terrorist Group Internet Service Provider Homeland Security Extremist Group Knowledge Mapping 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.



Funding for this research was provided by (1) NSF, “CRI: Developing a Dark Web Collection and Infrastructure for Computational and Social Sciences,” NSF CNS-0709338, 2007–2010; and (2) NSF, “EXP-LA: Explosives and IEDs in the Dark Web: Discovery, Categorization, and Analysis,” NSF CBET-0730908, 2007–2010.


  1. Abbasi, A. and Chen, H. (2005). Identification and Comparison of Extremist-Group Web Forum Messages using Authorship Analysis. IEEE Intelligent Systems, 20(5), 67–75. CrossRefGoogle Scholar
  2. Baeza-Yates, R. (2003). Information Retrieval in the Web: Beyond Current Search Engines. International Journal of Approximate Reasoning, 34, 97–104.MathSciNetCrossRefzbMATHGoogle Scholar
  3. Card, S. K., Mackinlay, J. D. and Shneiderman, B. (1999). Readings in Information Visualization: Using Vision to Think, Morgan Kaufmann Publishers, Inc., San Francisco, CA.Google Scholar
  4. Chakrabarti, S., Van Den Berg, M., and Dom, B. (1999). Focused Crawling: A New Approach to Topic-Specific Resource Discovery. In Proceedings of the Eight World Wide Web Conference, Toronto, Canada.Google Scholar
  5. Chau, M. and Chen, H. (2003). Comparison of Three Vertical Search Spiders. IEEE Computer, 36(5), 56–62.CrossRefGoogle Scholar
  6. Chen, C. (2003). Mapping Scientific Frontiers. London, UK, Springer-Verlag.CrossRefGoogle Scholar
  7. Chen, H. (2001). Knowledge Management Systems: A Text Mining Perspective, University of Arizona, Tucson, Arizona.Google Scholar
  8. Chen, H. (2006). Intelligence and Security Informatics, Springer-Verlag.Google Scholar
  9. Cho, J., Garcia-Molina, H., and Page, L. (1998). Efficient Crawling Through URL Ordering. In Proceedings of the 7th World Wide Web Conference, Brisbane, Australia.Google Scholar
  10. Crane, D. (1972). Invisible Colleges: Diffusion of Knowledge in Scientific Communities. Chicago, University of Chicago Press.Google Scholar
  11. Glance, N., Hurst, M., Nigam, K. Siegler, M., Stockton, R. and Tomokiyo, T. (2005). Analyzing Online Discussion for Marketing Intelligence, In Proceedings of the 14th International World Wide Web Conference, Chicago, Illinois.Google Scholar
  12. Glaser, J., Dixit, J., and Green, D. P. (2002). Studying Hate Crime with the Internet: What Makes Racists Advocate Racial Violence? Journal of Social Issues, 58(1), 177–193.CrossRefGoogle Scholar
  13. Lawrence, S. and Giles, C. L. (1998). Searching the World Wide Web. Science, 280(5360), 98–100.CrossRefGoogle Scholar
  14. Office of Homeland Security. (2002). National Strategy for Homeland Security. Washington D.C.: Office of Homeland Security.Google Scholar
  15. Raghavan, S. and Garcia-Molina, H. (2001). Crawling the Hidden Web. In Proceedings of the 27th International Conference on Very Large Databases.Google Scholar
  16. Schafer, J. (2002). Spinning the Web of Hate: Web-Based Hate Propagation by Extremist Organizations. Journal of Criminal Justice and Popular Culture, 9(2), 69–88.Google Scholar
  17. Shneiderman, B. (1996). The Eyes Have It: A Task by Data Type Taxonomy for Information Visualization, Proceedings of IEEE Workshop on Visual Languages’96, 336–343.Google Scholar
  18. Shiffrin, R. M. and Börner, K., (2004). Mapping Knowledge Domains. Arthur M. Sackler Colloguia of the National Academy of Sciences, National Academies of Sciences.Google Scholar
  19. Sparrow, M. K., (1991). The Application of Network Analysis to Criminal Intelligence: An Assessment of the Prospects, Social Networks, 13, 251–274.CrossRefGoogle Scholar
  20. Xu, J. and Chen, H. (2005) CrimeNet Explorer: A Framework for Criminal Network Knowledge Discovery. ACM Transactions on Information Systems, 23(2), pp. 201–226.MathSciNetCrossRefGoogle Scholar
  21. Zhou, Y., Reid, E., Qin, J., Chen, H., and Lai, G. (2005). U.S. Extremist Groups on the Web: Link and Content Analysis. IEEE Intelligent Systems, 20(5), 44–51.CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC 2012

Authors and Affiliations

  1. 1.Department of Management Information SystemsUniversity of ArizonaTusconUSA

Personalised recommendations