Link and Content Analysis
While the Web has become a worldwide platform for communication, terrorists share their ideology and communicate with members on the “Dark Web” – the dark side of the Web used by terrorists. Currently, the problems of information overload and the difficulty of obtaining a comprehensive picture of terrorist activities hinder effective and efficient analysis of terrorist information on the Web. To improve understanding of terrorist activities, we have developed a novel methodology for collecting and analyzing Dark Web information. The methodology incorporates information collection, analysis, and visualization techniques, and exploits various Web information sources. We applied it to collecting and analyzing information of 39 jihad Web sites and developed visualization of their site contents, relationships, and activity levels. An expert evaluation showed that the methodology is very useful and promising, having a high potential to assist in investigation and understanding of terrorist activities by producing results that could potentially help guide both policy making and intelligence research.
KeywordsTerrorist Group Terrorist Activity Arabic Speaker Islamist Movement Native Arabic Speaker
This research was partly supported by funding from the US Government Department of Homeland Security and Corporation for National Research Initiatives and by the University of Texas at El Paso. We thank contributing members of the University of Arizona Artificial Intelligence Lab for their support and assistance.
- Anti-Defamation League. (2002). Jihad Online: Islamic Terrorists and the Internet, from http://www.adl.org/internet/jihad_online.pdf.
- Blakemore, B. (2004, November 23). Web posting may provide insight into Iraq insurgency. ABC News.Google Scholar
- Carley, K. M., Lee, J.-S., and Krackhardt, D. (2001). Destabilizing Networks. Connections.Google Scholar
- Chambers, J., Cleveland, W., Kleiner, B., and Tukey, P. (1983). Graphical Methods for Data Analysis: Wadsworth.Google Scholar
- Chen, H. and Chau, M. (2004). Web mining: machine learning for web applications. In M. E. Williams (Ed.), Annual Review of Information Science and Technology (ARIST), (Vol. 38, pp. 289–329). Medford, NJ: Information Today, Inc.Google Scholar
- Chung, W. (2007). Visualizing E-Business stakeholders on the web: a methodology and experimental results. International Journal of Electronic Business, (forthcoming).Google Scholar
- Chung, W., Zhang, Y., Huang, Z., Wang, G., Ong, T.-H., and Chen, H. (2004). Internet searching and browsing in a multilingual world: an experiment on the Chinese Business Intelligence Portal (CBizPort). Journal of the American Society for Information Science and Technology, 55(9), 818–831.CrossRefGoogle Scholar
- Department of State. (2003). Patterns of Global Terrorism 2002: The United States Government.Google Scholar
- Encyclopedia Britannica Online. (2007). Jihad. http://www.britannica.com/ebc/article-9368558: Britannica Concise Encyclopedia.
- Gellman, B. (2002, June 27). Cyber-attacks by Al Qaeda feared. Washington Post.Google Scholar
- Kelley, J. (2002). Militants Wire Web With Links to Jihad. USA Today.Google Scholar
- Krebs, V. E. (2001). Mapping network of terrorist cells. Connections, 24(3), 43–52.Google Scholar
- La Porte, T. M., Jong, M. d., and Demchak, C. C. (1999). Public Organizations on the World Wide Web: Empirical Correlates of Administrative Openness. Paper presented at the Proceedings of the 5th National Public Management Research Conference, College Station, TX.Google Scholar
- Middle East Media Research Institute. (2004). Jihad and Terrorism Studies Project. Retrieved March 2004, from http://www.memri.org/jihad.html.
- Mladenic, D. (1998). Turning Yahoo into an Automatic Web Page Classifier. Paper presented at the Proceedings of the 13th European Conference on Artificial Intelligence, Brighton, UK.Google Scholar
- Newman, M. (2004, May 11). Video appears to show beheading of American civilian. The New York Times.Google Scholar
- Project for the Research of Islamist Movements. (2004). PRISM, 2004, from http://www.e-prism.org.
- Technical Analysis Group. (2004). Examining the cyber capabilities of Islamic terrorist groups. Hanover, NH: Institute for Security Technology Studies at Dartmouth College.Google Scholar
- Thomas, T. L. (2003, Spring). Al Qaeda and the Internet: the danger of cyberplanning. Parameters, 112–123.Google Scholar
- Trybula, W. J. (1999). Text mining. In M. E. Williams (Ed.), Annual Review of Information Science and Technology (Vol. 34, pp. 385–419). Medford, NJ: Information Today, Inc.Google Scholar
- Young, F. W. (1987). Multidimensional Scaling: History, Theory, and Applications. Hillsdale, NJ, USA: Lawrence Erlbaum Associates, Publishers.Google Scholar