Advertisement

Dark Web pp 71-90 | Cite as

Link and Content Analysis

  • Hsinchun ChenEmail author
Chapter
Part of the Integrated Series in Information Systems book series (ISIS, volume 30)

Abstract

While the Web has become a worldwide platform for communication, terrorists share their ideology and communicate with members on the “Dark Web” – the dark side of the Web used by terrorists. Currently, the problems of information overload and the difficulty of obtaining a comprehensive picture of terrorist activities hinder effective and efficient analysis of terrorist information on the Web. To improve understanding of terrorist activities, we have developed a novel methodology for collecting and analyzing Dark Web information. The methodology incorporates information collection, analysis, and visualization techniques, and exploits various Web information sources. We applied it to collecting and analyzing information of 39 jihad Web sites and developed visualization of their site contents, relationships, and activity levels. An expert evaluation showed that the methodology is very useful and promising, having a high potential to assist in investigation and understanding of terrorist activities by producing results that could potentially help guide both policy making and intelligence research.

Keywords

Terrorist Group Terrorist Activity Arabic Speaker Islamist Movement Native Arabic Speaker 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Notes

Acknowledgments

This research was partly supported by funding from the US Government Department of Homeland Security and Corporation for National Research Initiatives and by the University of Texas at El Paso. We thank contributing members of the University of Arizona Artificial Intelligence Lab for their support and assistance.

References

  1. Anti-Defamation League. (2002). Jihad Online: Islamic Terrorists and the Internet, from http://www.adl.org/internet/jihad_online.pdf.
  2. Blakemore, B. (2004, November 23). Web posting may provide insight into Iraq insurgency. ABC News.Google Scholar
  3. Carley, K. M., Lee, J.-S., and Krackhardt, D. (2001). Destabilizing Networks. Connections.Google Scholar
  4. Chambers, J., Cleveland, W., Kleiner, B., and Tukey, P. (1983). Graphical Methods for Data Analysis: Wadsworth.Google Scholar
  5. Chen, H. (2005). Introduction to the special topic issue: Intelligence and security informatics. Journal of the American Society for Information Science and Technology, 56(3), 217–220.MathSciNetCrossRefGoogle Scholar
  6. Chen, H. and Chau, M. (2004). Web mining: machine learning for web applications. In M. E. Williams (Ed.), Annual Review of Information Science and Technology (ARIST), (Vol. 38, pp. 289–329). Medford, NJ: Information Today, Inc.Google Scholar
  7. Chen, H., Fan, H., Chau, M., and Zeng, D. (2001). MetaSpider: meta-searching and categorization on the web. Journal of the American Society for Information Science and Technology, 52(13), 1134–1147.CrossRefGoogle Scholar
  8. Chen, H., Schuffels, C., and Orwig, R. (1996). Internet categorization and search: a self-organizing approach. Journal of Visual Communication and Image Representation, 7(1), 88–102.CrossRefGoogle Scholar
  9. Chung, W. (2007). Visualizing E-Business stakeholders on the web: a methodology and experimental results. International Journal of Electronic Business, (forthcoming).Google Scholar
  10. Chung, W., Chen, H., Chaboya, L. G., O’Toole, C., and Atabakhsh, H. (2005). Evaluating event visualization: a usability study of COPLINK Spatio-Temporal Visualizer. International Journal of Human-Computer Studies, 62(1), 127–157.CrossRefGoogle Scholar
  11. Chung, W., Chen, H., and Nunamaker, J. F. (2005). A visual framework for knowledge discovery on the web: an empirical study on business intelligence exploration. Journal of Management Information Systems, 21(4), 57–84.CrossRefGoogle Scholar
  12. Chung, W., Zhang, Y., Huang, Z., Wang, G., Ong, T.-H., and Chen, H. (2004). Internet searching and browsing in a multilingual world: an experiment on the Chinese Business Intelligence Portal (CBizPort). Journal of the American Society for Information Science and Technology, 55(9), 818–831.CrossRefGoogle Scholar
  13. Department of State. (2003). Patterns of Global Terrorism 2002: The United States Government.Google Scholar
  14. Encyclopedia Britannica Online. (2007). Jihad. http://www.britannica.com/ebc/article-9368558: Britannica Concise Encyclopedia.
  15. Eom, S. B. and Farris, R. S. (1996). The contributions of organizational science to the development of decision support systems research subspecialties. Journal of the American Society for Information Science, 47(12), 941–952.CrossRefGoogle Scholar
  16. Etzioni, O. (1996). The World-Wide Web: quagmire or gold mine? Communications of the ACM, 39(11), 65–68.CrossRefGoogle Scholar
  17. Gellman, B. (2002, June 27). Cyber-attacks by Al Qaeda feared. Washington Post.Google Scholar
  18. He, Y., and Hui, S. C. (2002). Mining a web citation database for author co-citation analysis. Information Processing and Management, 38(4), 491–508.CrossRefzbMATHGoogle Scholar
  19. Kealy, W. A. (2001). Knowledge maps and their use in computer-based collaborative learning. Journal of Educational Computing Research, 25(4), 325–349.CrossRefGoogle Scholar
  20. Kelley, J. (2002). Militants Wire Web With Links to Jihad. USA Today.Google Scholar
  21. Krebs, V. E. (2001). Mapping network of terrorist cells. Connections, 24(3), 43–52.Google Scholar
  22. La Porte, T. M., Jong, M. d., and Demchak, C. C. (1999). Public Organizations on the World Wide Web: Empirical Correlates of Administrative Openness. Paper presented at the Proceedings of the 5th National Public Management Research Conference, College Station, TX.Google Scholar
  23. Last, M., Markov, A., and Kandel, A. (2006). Multi-Lingual Detection of Terrorist Content on the Web. Paper presented at the Proceedings of the PAKDD’06 International Workshop on Intelligence and Security Informatics, Singapore.CrossRefGoogle Scholar
  24. Marshall, B., McDonald, D., Chen, H., and Chung, W. (2004). EBizPort: collecting and analyzing business intelligence information. Journal of the American Society for Information and Science and Technology, 55(10), 873–891.CrossRefGoogle Scholar
  25. Middle East Media Research Institute. (2004). Jihad and Terrorism Studies Project. Retrieved March 2004, from http://www.memri.org/jihad.html.
  26. Mladenic, D. (1998). Turning Yahoo into an Automatic Web Page Classifier. Paper presented at the Proceedings of the 13th European Conference on Artificial Intelligence, Brighton, UK.Google Scholar
  27. Nasukawa, T. and Nagano, T. (2001). Text analysis and knowledge mining system. IBM Systems Journal, 40(4), 967–984.CrossRefGoogle Scholar
  28. Newman, M. (2004, May 11). Video appears to show beheading of American civilian. The New York Times.Google Scholar
  29. Popp, R., Armour, T., Senator, T., and Numrych, K. (2004). Countering terrorism through information technology. Communications of the ACM, 47(3), 36–43.CrossRefGoogle Scholar
  30. Project for the Research of Islamist Movements. (2004). PRISM, 2004, from http://www.e-prism.org.
  31. Sageman, M. (2004). Understanding Terror Networks. Philadelphia: University of Pennsylvania Press.CrossRefGoogle Scholar
  32. Strickland, L. S. and Hunt, L. E. (2005). Technology, security, and individual privacy: new tools, new threats, and new public perceptions. Journal of the American Society for Information Science and Technology, 56(3), 221–234.CrossRefGoogle Scholar
  33. Technical Analysis Group. (2004). Examining the cyber capabilities of Islamic terrorist groups. Hanover, NH: Institute for Security Technology Studies at Dartmouth College.Google Scholar
  34. Thomas, T. L. (2003, Spring). Al Qaeda and the Internet: the danger of cyberplanning. Parameters, 112–123.Google Scholar
  35. Trybula, W. J. (1999). Text mining. In M. E. Williams (Ed.), Annual Review of Information Science and Technology (Vol. 34, pp. 385–419). Medford, NJ: Information Today, Inc.Google Scholar
  36. Tsfati, Y. and Weimann, G. (2002). www.terrorism.com: terror on the Internet. Studies in Conflict and Terrorism, 25, 317–332.CrossRefGoogle Scholar
  37. Xu, J. and Chen, H. (2005). Criminal network analysis and visualization. Communications of the ACM, 48(6), 100–107.CrossRefGoogle Scholar
  38. Young, F. W. (1987). Multidimensional Scaling: History, Theory, and Applications. Hillsdale, NJ, USA: Lawrence Erlbaum Associates, Publishers.Google Scholar
  39. Zhu, B. and Chen, H. (2005). Chapter 4: Information Visualization. In B. Cronin (Ed.), Annual Review of Information Science and Technology (Vol. 39, pp. 139–177).CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC 2012

Authors and Affiliations

  1. 1.Department of Management Information SystemsUniversity of ArizonaTusconUSA

Personalised recommendations