US Domestic Extremist Groups
US domestic extremist groups have increased in number and are intensively utilizing the Internet as an effective tool to share resources and members with limited regard for geographic, legal, or other obstacles. Researchers find that monitoring extremist and hate groups’ web sites and analyzing their usage and content have become time consuming and challenging. In response, this chapter describes the development of automated or semiautomated methodologies for capturing, classifying, and organizing domestic extremist web site data and using them for analysis. We found that by analyzing the hyperlink structures and content of domestic extremist web sites and constructing social network maps, their interorganizational structure and cluster affinities could be identified. Such analysis results could help experts in terrorism, law enforcement, intelligence, and policy making domains better understand the domestic extremist phenomena and eventually boost our national security.
KeywordsExtremist Group White Supremacist Hate Group Christian Identity Extremist Organization
This research has been supported in part by the following grants: (1) DHS/CNRI, “BorderSafe Initiative,” October 2003–March 2005, and (2) NSF/ITR, “COPLINK Center for Intelligence and Security Informatics – A Crime Data Mining Approach to Developing Border Safe Research,” EIA-0326348, September 2003–August 2005. We would like to thank all members of the Artificial Intelligence Lab at the University of Arizona who have contributed to the project, in particular Wei Xi, Feng Huang, Homa Atabakhsh, Cathy Larson, Chun-Ju Tseng, and Shing Ka Wu.
- Albertsen, K. (2003). “The Paradigma Web Harvesting Environment,” 3 rd ECDL Workshop on Web Archives, Trondheim, Norway.Google Scholar
- Blitzer, R. (2001). “Domestic Preemption,” Terrorism Threat and U.S. Government Response: Operational and Organizational Factors. J.M. Smith and W.C. Thomas, eds. Colorado: U.S. Air Force Academy, INSS, http://www.usafa.af.mil/nss/terrorism.htm. Accessed January 15, 2005.
- Borgman, C. L., Furner, J. (2002). “Scholarly Communication and Bibliometrics,” Annual Review of Information Science and Technology. B. Cronin, ed. Information Today, Inc.Google Scholar
- Chen, H., Qin, J., Reid, E. et al. (2004). “Dark Web Portal: Collecting and Analyzing the Presence of Domestic and International Terrorist Groups on the Web,” IEEE Intelligent Transportation System Conference, Washington, D.C.Google Scholar
- CNN (July 1999). U.S. Hate Groups Hard to Track.Google Scholar
- Demchak, C. C., Friis, C., La Porte, T. M. (2000). “Webbing Governance: National Differences in Constructing the Face of Public Organizations,” Handbook of Public Information Systems, G. David Garson, ed., New York: Marcel Dekker Publishers.Google Scholar
- Gibson, D., Kleinberg, J., Raghavan, P. (1998). “Inferring Web Communities from Link Topology,” Proceedings of the 9th ACM Conference on Hypertext and Hypermedia.Google Scholar
- Gustavson, A. T., Sherkat, D. E. (2004). “Elucidating the Web of Hate: the Ideological Structuring of Network Ties Among Right Wing Hate Groups on the Internet,” Annual Meetings of the American Sociological Association.Google Scholar
- Kay, R. (June 21, 2004). “Web Harvesting,” Computer World, http://www.computerworld.com. Accessed January, 15, 2005.
- Reid, E. O. F. (2003). “Identifying a Company’s Non-Customer Online Communities: a Proto-typology,” Proceedings of the 36th Hawaii International Conference on System Sciences, Springer, http://e-business.fhbb.ch/eb/publications.nsf/id/214. Accessed June 18, 2004.
- Reilly, B., Tuchel, G., Simon, J., Palaima, C., Norsworthy, K., and Myrick, Leslie (2003). “Political Communications Web Archiving: Addressing Typology and Timing for Selection, Preservation and Access,” 3rd ECDL Workshop on Web Archives, Trondheim, Norway.Google Scholar
- SPLC Report (2004). “Hate Groups, Militias on Rise as Extremists Stage Comeback,” http://www.splcenter.org/center/splcreport/article.jsp?aid=71. Accessed June 02, 2005.
- Whine, M. (1997). “Far Right on the Internet,” Governance of Cyberspace. B. Loader, ed., London: Routledge.Google Scholar