Abstract
US domestic extremist groups have increased in number and are intensively utilizing the Internet as an effective tool to share resources and members with limited regard for geographic, legal, or other obstacles. Researchers find that monitoring extremist and hate groups’ web sites and analyzing their usage and content have become time consuming and challenging. In response, this chapter describes the development of automated or semiautomated methodologies for capturing, classifying, and organizing domestic extremist web site data and using them for analysis. We found that by analyzing the hyperlink structures and content of domestic extremist web sites and constructing social network maps, their interorganizational structure and cluster affinities could be identified. Such analysis results could help experts in terrorism, law enforcement, intelligence, and policy making domains better understand the domestic extremist phenomena and eventually boost our national security.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Albertsen, K. (2003). “The Paradigma Web Harvesting Environment,” 3 rd ECDL Workshop on Web Archives, Trondheim, Norway.
Blitzer, R. (2001). “Domestic Preemption,” Terrorism Threat and U.S. Government Response: Operational and Organizational Factors. J.M. Smith and W.C. Thomas, eds. Colorado: U.S. Air Force Academy, INSS, http://www.usafa.af.mil/nss/terrorism.htm. Accessed January 15, 2005.
Borgman, C. L., Furner, J. (2002). “Scholarly Communication and Bibliometrics,” Annual Review of Information Science and Technology. B. Cronin, ed. Information Today, Inc.
Burris, V. Smith, E., Strahm, A. (2000). “White Supremacist Networks on the Internet,” Sociological Focus, vol. 33, 2:215–235.
Chen, H., Qin, J., Reid, E. et al. (2004). “Dark Web Portal: Collecting and Analyzing the Presence of Domestic and International Terrorist Groups on the Web,” IEEE Intelligent Transportation System Conference, Washington, D.C.
CNN (July 1999). U.S. Hate Groups Hard to Track.
Demchak, C. C., Friis, C., La Porte, T. M. (2000). “Webbing Governance: National Differences in Constructing the Face of Public Organizations,” Handbook of Public Information Systems, G. David Garson, ed., New York: Marcel Dekker Publishers.
Gerstenfeld, P. B., Grant, D. R., Chiang, C. (2003). “Hate Online: a Content Analysis of Extremist Internet Sites,” Analysis of Social Issues and Public Policy, 3(1):29–44.
Gibson, D., Kleinberg, J., Raghavan, P. (1998). “Inferring Web Communities from Link Topology,” Proceedings of the 9th ACM Conference on Hypertext and Hypermedia.
Gustavson, A. T., Sherkat, D. E. (2004). “Elucidating the Web of Hate: the Ideological Structuring of Network Ties Among Right Wing Hate Groups on the Internet,” Annual Meetings of the American Sociological Association.
Kay, R. (June 21, 2004). “Web Harvesting,” Computer World, http://www.computerworld.com. Accessed January, 15, 2005.
Reid, E. O. F. (2003). “Identifying a Company’s Non-Customer Online Communities: a Proto-typology,” Proceedings of the 36th Hawaii International Conference on System Sciences, Springer, http://e-business.fhbb.ch/eb/publications.nsf/id/214. Accessed June 18, 2004.
Reilly, B., Tuchel, G., Simon, J., Palaima, C., Norsworthy, K., and Myrick, Leslie (2003). “Political Communications Web Archiving: Addressing Typology and Timing for Selection, Preservation and Access,” 3rd ECDL Workshop on Web Archives, Trondheim, Norway.
SPLC Report (2004). “Hate Groups, Militias on Rise as Extremists Stage Comeback,” http://www.splcenter.org/center/splcreport/article.jsp?aid=71. Accessed June 02, 2005.
Whine, M. (1997). “Far Right on the Internet,” Governance of Cyberspace. B. Loader, ed., London: Routledge.
Xu, J. and Chen, H. (April 2005). “CrimeNet Explorer: A Framework for Criminal Network Knowledge Discovery,” ACM Transactions on Information Systems, Vol. 23, No. 2, 201–226.
Acknowledgments
This research has been supported in part by the following grants: (1) DHS/CNRI, “BorderSafe Initiative,” October 2003–March 2005, and (2) NSF/ITR, “COPLINK Center for Intelligence and Security Informatics – A Crime Data Mining Approach to Developing Border Safe Research,” EIA-0326348, September 2003–August 2005. We would like to thank all members of the Artificial Intelligence Lab at the University of Arizona who have contributed to the project, in particular Wei Xi, Feng Huang, Homa Atabakhsh, Cathy Larson, Chun-Ju Tseng, and Shing Ka Wu.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2012 Springer Science+Business Media, LLC
About this chapter
Cite this chapter
Chen, H. (2012). US Domestic Extremist Groups. In: Dark Web. Integrated Series in Information Systems, vol 30. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-1557-2_20
Download citation
DOI: https://doi.org/10.1007/978-1-4614-1557-2_20
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4614-1556-5
Online ISBN: 978-1-4614-1557-2
eBook Packages: Computer ScienceComputer Science (R0)