Advertisement

Content Analysis of Jihadi Extremist Groups' Videos

  • Arab Salem
  • Edna Reid
  • Hsinchun Chen
Part of the Integrated Series In Information Systems book series (ISIS, volume 18)

This paper presents an exploratory study of jihadi extremist groups’ videos using content analysis and a multimedia coding tool to explore the types of video, groups’ modus operandi, and production features that lend support to extremist groups. The videos convey messages powerful enough to mobilize members, sympathizers, and even new recruits to launch attacks that are once again captured (on video) and disseminated globally via the Internet. They communicate the effectiveness of the campaigns and have a much wider impact because they are media rich with nonverbal cues and vivid images of events that can evoke not only a multitude of psychological and emotional responses but also violent reactions. The videos are important for jihadi extremist groups’ learning, training, and recruitment. In addition, the content collection and analysis of extremist groups’ videos can help policy makers, intelligence analysts, and researchers better understand the extremist groups’ terror campaigns and modus operandi, and help suggest counter-intelligence strategies and tactics for troop training.

Keywords

Content Analysis Terrorist Group Extremist Group Content Category Resource Mobilization 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Aikat, D. (2004) Streaming Violent Genres Online: Visual Images in Music Videos on BET.com, Country.com, MTV.com, VH1.com. Popular Music and Society 27.Google Scholar
  2. APS (2006) 17 1/2 Advantages of Using Video. Fort Mill, APS.Google Scholar
  3. BBC (2002) Video Shows al-Qaeda Terrorist Training. BBC.Google Scholar
  4. Becker, A. (2005) Technology and Terror: the New Modus Operandi. Frontline. Washington, D.C., PBS.Google Scholar
  5. Berger, J. M. (2005) Short Primer on Terrorist Videos. Intelfiles, Alexandria, Virginia. http://www.intelfiles.com Google Scholar
  6. Boucher, R. (2004) Foreign Terrorist Organization: Designation of Jama'at al-Tawhid wa'al Jihad and Aliases. Press Statement. Washington, D.C., U.S. Department of State.Google Scholar
  7. Caught on Tape: Video as a Terrorist's Weapon. (2004) ABC News Internet Ventures.Google Scholar
  8. Qin, J., Zhou, Y., Lai, G., Reid, E., Sageman, M., and Chen, H. (2005) The Dark Web Portal Project: Collecting and Analyzing the Presence of Terrorist Groups on the Web. Proceedings of the IEEE International Conference on Intelligence and Security (ISI 2005), Atlanta, Georgia.Google Scholar
  9. Coll, S. and S. Glasser (2005) Rifles and Laptops al-Qaeda's New Armoury. Washington Post. Washington, D.C.Google Scholar
  10. Dimitrova N., Zhang H-J., Shahraray B., Sezan I., Huang T., Zakhor A. (2002) Applications of Video-content Analysis and Retrieval. IEEE Multimedia: 42-55.Google Scholar
  11. Dominick, J. R. (1984) Videogames, Television Violence, and Agression in Teenagers. Journal of Communication 34: 136-147.CrossRefGoogle Scholar
  12. Duijvelaar, C. (1996) In the Books: Theoretical Outlines. Resource Movilization Approach. East-East Cooperation Among Environmental NGOs in Central and Eastern Europe. Budapest, Regional Environmental Center for Central and Eastern Europe.Google Scholar
  13. DuRant R.H., Rich M., Emans S.J., Rome E.S., Allred E., Woods E.R.. (1997) Violence and Weapon Carrying in Music Videos: a Content Analysis. Arch Pediatr Adol Med 15(1): 443-338.Google Scholar
  14. Fong, T. (2005) Indonesia: Terror Groups Spreading Video Bomb-making Guide. Jakarta Post. Jakarta.Google Scholar
  15. Ghashghai, E. and R. Lewis (2002) Issues Affecting Internet Use in Afghanistan and Developing Countries in the Middle East. Issue Paper. R. Corporation, RAND Corporation.Google Scholar
  16. Gladwell, M. (2002) Tipping Point: How Little Things Can Make a Big Difference, Little Brown & Company.Google Scholar
  17. GlobalSecurity (2005) Jaish Ansar al-Sunna. Military, GlobalSecurity.org.Google Scholar
  18. Gossett, S. (2006) al Qaeda Video is Green Light for an Attack: Analyst Warns. CNS News.Google Scholar
  19. Gustavson, A.T. and D.E. Sherkat (2004) Elucidating the Web of Hate: the Ideological Structuring of Network Ties among Right Wing Hate Groups on the Internet. Annual Meetings of the American Sociological Association, (ASA)Google Scholar
  20. Guitonni, A., A. Boury-Brisset, et al. (2002) Automatic Documents Analyzer and Classifier. 7th International Command and Control Research and Technology Symposium, Quebec.Google Scholar
  21. Holsti, O. R. (1969) Content Analysis for the Social Sciences and Humanities. Reading, Addison-Wesley.Google Scholar
  22. Huber, G. P. (1991) Organizational Learning: Contributing Processes and the Literatures. Organization Science 2(1): 88-114.CrossRefGoogle Scholar
  23. Intelcenter (2004) Al Qaeda Videos & 3rd 9-11 Anniversary v1.0. Intelcenter, Alexandria, Virginia.Google Scholar
  24. Intelcenter (2005) Evolution of Jihad Video, v1.0. IntelCenter, Alexandria, Virginia.Google Scholar
  25. Brian A. Jackson, John C. Baker, Peter Chalk, Kim Cragin, John V. Parachini, Horacio R. Trujillo (2005) Aptitude for Destruction: Organizational Learning in Terrorist Groups and its Implications for Combating Terrorism. RAND Corporation.Google Scholar
  26. Jenkins, B. M. (2004) World Becomes the Hostage of Media-Savvy Terrorists: Commentary. USA Today.Google Scholar
  27. Kelley, J. (2001) Militants Wire Web With Links to Jihad. USA Today.Google Scholar
  28. Lachlan, KA, Smith, SL, Tamborini, R. (2003) Popular Video Games: Assessing the Amount and Context of Violence. Annual Meeting of the National Communication Association, Seattle, Washington.Google Scholar
  29. Lutes, C. (2001) al Qaida in Action and Learning: a Systems Approach. . Fulfillment of CourseRequirements.GeorgeWashingtonUniversity. http://www.au.af.mil/au/awc/awcgate/readings/al_qaida2.htm
  30. Makris, G. (1999) Searching for Violence on the Internet: an Exploratory Analysis of MTV Online Music Video Clips, North Caroline, Chapel Hill.Google Scholar
  31. Mannes, A. and J. Golbeck (2005) Building a Terrorism Ontology. ISWC Workshop on Ontology Patterns for the Semantic Web,Google Scholar
  32. Military Factor (2006) Rocket Propelled Grenade. MilitaryFactor.com. http://www.militaryfactor.com/smallarms/
  33. MOCA (2005) Overview: Movie Content Analysis Project (MoCA) Univ. Mannheim. Mannheim.Google Scholar
  34. Reid, E., J. Qin, et al. (2005) Collecting and Analyzing the Presence of Terrorists on the Web: a Case Study of Jihad Websites. Intelligence and Security Informatics: IEEE International Conference on Intelligence and Security Informatics, ISI 2005, May 2005, Atlanta, Georgia. Springer.Google Scholar
  35. Robertson, N. (2002) Tapes Shed New Light on bin Laden's Network. cnn.com.Google Scholar
  36. Sageman, Marc (2005) Undersanding Jihadi Networks. Strategic Insights, Volume IV(4) http://www.ccc.nps.navy.mil/si/2005/Apr/sagemanApr05.asp
  37. SITE (2004a) Jaish Ansar al Sunah Insurgency Group in Iraq Issues a Clarification Statement and Video Regarding the Blessed Attack Against the American Base in Mosul. SITE Institute. Washington, D.C.Google Scholar
  38. SITE (2004b) Manufacture of the Explosive Belt for Suicide Bombing Operations. SITE Institute. Washington, D.C.Google Scholar
  39. SITE (2004c) Communique No. 11 Issued by Zarqawi's Attawhid Wal Jihad Group Military Department. SITE Publications. SITE Institute. Washington, D.C.Google Scholar
  40. Smith, S. L., Wilson, B. J., Kunkel, D., Linz, D., Potter, W. J., Colvin, C. M., Donnerstein, E. (1998) National Television Violence Study: Vol. 3. Violence in television programming overall: University of California, Santa Barbara study (pp. 5-220). Newbury Park, CA: Sage.Google Scholar
  41. Terrorists threaten more attacks on Britain. (2005) News from Russia.Google Scholar
  42. Wactlar, H.(2000) Informedia: Search and Summarization in the Video Medium. Proceeedings of Imagina2000 Conference, January 31-Februrary 2,2000, Monaco, France.Google Scholar
  43. Wactlar, H. and Chen, C. (2002) Enhanced Perspectives for Historical and Cultural Documentaries Using Informedia Technologies. Joint Conference on Digital Libraries (JCDL’02), July 13-17, 2002, Portland, Oregon.Google Scholar
  44. Weimann (2004) www.terror.net How Modern Terrorist Uses the Internet. Washington, D.C., U.S. Institute of Peace.Google Scholar
  45. Zhou, Y., Reid, E., Qin, J., Chen, H., Lai, G. (2005) U.S. Domestic Extremist Groups on the Web: Link and Content Analysis. IEEE Intelligent Systems: 44-51.Google Scholar

Copyright information

© Springer Science+Business Media, LLC 2008

Authors and Affiliations

  • Arab Salem
    • 1
  • Edna Reid
    • 2
  • Hsinchun Chen
    • 3
  1. 1.Private consultantAAA
  2. 2.Clarion UniversityClarionUSA
  3. 3.University of ArizonaTucsonUSA

Personalised recommendations