Advertisement

Dark Web pp 391-405 | Cite as

US Domestic Extremist Groups

  • Hsinchun ChenEmail author
Chapter
Part of the Integrated Series in Information Systems book series (ISIS, volume 30)

Abstract

US domestic extremist groups have increased in number and are intensively utilizing the Internet as an effective tool to share resources and members with limited regard for geographic, legal, or other obstacles. Researchers find that monitoring extremist and hate groups’ web sites and analyzing their usage and content have become time consuming and challenging. In response, this chapter describes the development of automated or semiautomated methodologies for capturing, classifying, and organizing domestic extremist web site data and using them for analysis. We found that by analyzing the hyperlink structures and content of domestic extremist web sites and constructing social network maps, their interorganizational structure and cluster affinities could be identified. Such analysis results could help experts in terrorism, law enforcement, intelligence, and policy making domains better understand the domestic extremist phenomena and eventually boost our national security.

Keywords

Extremist Group White Supremacist Hate Group Christian Identity Extremist Organization 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Notes

Acknowledgments

This research has been supported in part by the following grants: (1) DHS/CNRI, “BorderSafe Initiative,” October 2003–March 2005, and (2) NSF/ITR, “COPLINK Center for Intelligence and Security Informatics – A Crime Data Mining Approach to Developing Border Safe Research,” EIA-0326348, September 2003–August 2005. We would like to thank all members of the Artificial Intelligence Lab at the University of Arizona who have contributed to the project, in particular Wei Xi, Feng Huang, Homa Atabakhsh, Cathy Larson, Chun-Ju Tseng, and Shing Ka Wu.

References

  1. Albertsen, K. (2003). “The Paradigma Web Harvesting Environment,” 3 rd ECDL Workshop on Web Archives, Trondheim, Norway.Google Scholar
  2. Blitzer, R. (2001). “Domestic Preemption,” Terrorism Threat and U.S. Government Response: Operational and Organizational Factors. J.M. Smith and W.C. Thomas, eds. Colorado: U.S. Air Force Academy, INSS, http://www.usafa.af.mil/nss/terrorism.htm. Accessed January 15, 2005.
  3. Borgman, C. L., Furner, J. (2002). “Scholarly Communication and Bibliometrics,” Annual Review of Information Science and Technology. B. Cronin, ed. Information Today, Inc.Google Scholar
  4. Burris, V. Smith, E., Strahm, A. (2000). “White Supremacist Networks on the Internet,” Sociological Focus, vol. 33, 2:215–235.CrossRefGoogle Scholar
  5. Chen, H., Qin, J., Reid, E. et al. (2004). “Dark Web Portal: Collecting and Analyzing the Presence of Domestic and International Terrorist Groups on the Web,” IEEE Intelligent Transportation System Conference, Washington, D.C.Google Scholar
  6. CNN (July 1999). U.S. Hate Groups Hard to Track.Google Scholar
  7. Demchak, C. C., Friis, C., La Porte, T. M. (2000). “Webbing Governance: National Differences in Constructing the Face of Public Organizations,” Handbook of Public Information Systems, G. David Garson, ed., New York: Marcel Dekker Publishers.Google Scholar
  8. Gerstenfeld, P. B., Grant, D. R., Chiang, C. (2003). “Hate Online: a Content Analysis of Extremist Internet Sites,” Analysis of Social Issues and Public Policy, 3(1):29–44.CrossRefGoogle Scholar
  9. Gibson, D., Kleinberg, J., Raghavan, P. (1998). “Inferring Web Communities from Link Topology,” Proceedings of the 9th ACM Conference on Hypertext and Hypermedia.Google Scholar
  10. Gustavson, A. T., Sherkat, D. E. (2004). “Elucidating the Web of Hate: the Ideological Structuring of Network Ties Among Right Wing Hate Groups on the Internet,” Annual Meetings of the American Sociological Association.Google Scholar
  11. Kay, R. (June 21, 2004). “Web Harvesting,” Computer World, http://www.computerworld.com. Accessed January, 15, 2005.
  12. Reid, E. O. F. (2003). “Identifying a Company’s Non-Customer Online Communities: a Proto-typology,” Proceedings of the 36th Hawaii International Conference on System Sciences, Springer, http://e-business.fhbb.ch/eb/publications.nsf/id/214. Accessed June 18, 2004.
  13. Reilly, B., Tuchel, G., Simon, J., Palaima, C., Norsworthy, K., and Myrick, Leslie (2003). “Political Communications Web Archiving: Addressing Typology and Timing for Selection, Preservation and Access,” 3rd ECDL Workshop on Web Archives, Trondheim, Norway.Google Scholar
  14. SPLC Report (2004). “Hate Groups, Militias on Rise as Extremists Stage Comeback,” http://www.splcenter.org/center/splcreport/article.jsp?aid=71. Accessed June 02, 2005.
  15. Whine, M. (1997). “Far Right on the Internet,” Governance of Cyberspace. B. Loader, ed., London: Routledge.Google Scholar
  16. Xu, J. and Chen, H. (April 2005). “CrimeNet Explorer: A Framework for Criminal Network Knowledge Discovery,” ACM Transactions on Information Systems, Vol. 23, No. 2, 201–226.MathSciNetCrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC 2012

Authors and Affiliations

  1. 1.Department of Management Information SystemsUniversity of ArizonaTusconUSA

Personalised recommendations