Skip to main content

Online Social Networks and Terrorism: Threats and Defenses

  • Chapter
  • First Online:
Security and Privacy Preserving in Social Networks

Part of the book series: Lecture Notes in Social Networks ((LNSN))

Abstract

Over 1 billion active users of online social networks are evidence of the enormous growth of these technologies. Although the majority of online social network users use such services for ordinary social interactions, a very small number may possibly be misusing them for terrorism. In this chapter, we first provide the background, definition, and classification of terrorism. Second, we discuss how some terrorists may be using online social networks to: (1) recruit new members to a terrorist organization and maintain the loyalty of their existing sympathizers; (2) plan attacks and share information about them; (3) gather intelligence; (4) train recruits for specific attacks; (5) raise funds for their causes; (6) propagate fear amongst the enemy population; and (7) engage in counterintelligence to uncover undercover agents. Third, we discuss several mechanisms to detect terrorists using online social networks, including: (1) keyword-based flagging; (2) sentiment analysis; (3) honeypots; (4) social network analysis; (5) facial recognition; and (6) view escalation. We show that the keyword-only flagging mechanism used by US Department of Homeland Security to detect terrorists is potentially effective, but certainly produces a large number of false positives, making it possibly less efficient in practice. Finally, we propose the use of targeted advertisements to rehabilitate possible radicals using the online social networks.

Legal Notice: The content of this chapter are meant only to provide researchers and security personnel with information about threats of the use of online social networks for terrorism and how to counter those threats. It is in no way meant to help anyone do anything unethical or illegal.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    The spelling and grammar mistakes are left intact to show the exact message.

  2. 2.

    The spelling and grammar mistakes are left intact to show the exact message.

  3. 3.

    http://www.facebook.com/AzharAhmedScum, Accessed September 19, 2012.

  4. 4.

    We accessed the pages on July 13, 2012.

  5. 5.

    We accessed the page on September 19, 2012.

  6. 6.

    Agents in the police and other law enforcement agencies may take up to 5 years undercover to reach the leaders of a group.

  7. 7.

    http://www.facebook.com/pages/Anders-B-Breivik/265349460157301 Accessed: July 13, 2012.

  8. 8.

    http://www.facebook.com/pages/Anwar-al-Awalki/102248169830078?rf=134722733227304 Accessed: July 13, 2012.

References

  1. About Meetup: http://www.meetup.com/about/. Accessed 20 February 2012

  2. Article 2: International Convention for the Suppression of the Financing of Terrorism, 1999

    Google Scholar 

  3. Asher, J.: Accused terrorists used porn magazines to deter security. NineMSN, 5 April 2008

    Google Scholar 

  4. Barnett, E.: Google+ hits 90 million users. The Telegraph, 20 January 2012

    Google Scholar 

  5. Crenshaw, M.: The causes of terrorism. Comp. Polit. 379–399 (1981)

    Google Scholar 

  6. Deceglie, A., Robertson, K.: Taliban using Facebook to lure Aussie soldier. The Sunday Telegraph, 9 September 2012

    Google Scholar 

  7. Facebook: Facebook Statistics. http://newsroom.fb.com/content/default.aspx?NewsAreaId=22. Accessed 13 July 2012

  8. Flickr: http://advertising.yahoo.com/article/flickr.html. Accessed 20 February 2012

  9. Flveash, K.: Neo-Nazis scoop YouTube ad revenue from UK telcos. The Register, 22 June 2012

    Google Scholar 

  10. Foursquare: https://foursquare.com/about/. Accessed 20 February 2012

  11. Gunaratna, R., Jerard, J., Rubin, L.: Terrorist Rehabilitation and Counter-Radicalisation New Approaches to Counter-Terrorism. Taylor & Francis, New York (2011)

    Google Scholar 

  12. Hudson, R.A.: Who Becomes a Terrorist and Why: The 1999 Government Report on Profiling Terrorists. Lyons Press, Guilford, Connecticut (2002)

    Google Scholar 

  13. Krebs, V.E.: Uncloaking terrorist networks. First Monday 7(4) (2002)

    Google Scholar 

  14. Lardner, R.: Your new Facebook ‘friend’ may be the FBI. MSNBC, 15 March 2010

    Google Scholar 

  15. Linkedin: http://press.linkedin.com/about. Accessed 19 September 2012

  16. Mahmood, S.: Online social networks: The overt and covert communication channels for terrorists and beyond. In: IEEE HST, 2012

    Google Scholar 

  17. Mahmood, S., Desmedt, Y.: Online social networks, a criminals multipurpose toolbox (poster abstract). In: Balzarotti, D., Stolfo, S.J., Cova, M. (eds.) Research in Attacks, Intrusions, and Defenses, vol. 7462 of Lecture Notes in Computer Science, pp. 374–375. Springer, New York (2012)

    Google Scholar 

  18. Mahmood, S., Desmedt, Y.: Your Facebook deactivated friend or a cloaked spy. In: IEEE PerCom Workshops, pp. 367–373, 2012

    Google Scholar 

  19. Narco terror on social networks. Live Leak, 20 June 2012

    Google Scholar 

  20. Online ethymology dictionary. http://www.etymonline.com/index.php?term=terrorism. Accessed 25 September 2012

  21. OPSEC for hackers: because jail is for wuftpd. http://www.slideshare.net/grugq/opsec-for-hackers. Accessed 25 September 2012

  22. Parnell, B.-A.: Linkedin faces class action suit over password leak. The Register, 21 June 2012

    Google Scholar 

  23. Purpura, P.: Terrorism and Homeland Security: An Introduction with Applications. Butterworth-Heinemann, Boston, MA (2007)

    Google Scholar 

  24. Schneider, B.R., Davis, J.A.: Avoiding The Abyss: Progress, Shortfalls, and the Way Ahead in Combating the WMD Threat. Greenwood Publishing Group, Westport, Connecticut (2006)

    Google Scholar 

  25. Seymour, R.: Azhar Ahmed – charged with treason over Facebook comments? 15 March 2012

    Google Scholar 

  26. Shachtman, N.: Army launches $50 million videogame push. Wired, 24 November 2008

    Google Scholar 

  27. Sharma, N.: Abu Jundal used Facebook to hunt for recruits for his terror mission. NDTV, 29 June 2012

    Google Scholar 

  28. Siddiqui, H.: Taliban and Nato-led forces engage in war of words on Twitter. Guardian, 14 September 2011

    Google Scholar 

  29. Twitter stats: https://business.twitter.com/basics/what-is-twitter/. Accessed 19 September 2012

  30. U.S. Department of State, office of the coordinator for counterterrorism. Country Reports on Terrorism, 30 April 2007

    Google Scholar 

  31. Willetts, D., Wells, T.: Game fanatics. The Sun, 20 March 2012

    Google Scholar 

  32. Wilson, T., Wiebe, J., Hoffmann, P.: Recognizing contextual polarity in phrase-level sentiment analysis. In: HLT/EMNLP, 2005

    Google Scholar 

  33. YouTube: YouTube statistics. http://www.youtube.com/t/press_statistics. Accessed 16 May 2012

Download references

Acknowledgments

This chapter is an expanded version of our work in [16]. The author would like to thank the University College London for financial support through the UCL PhD Studentship Program.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shah Mahmood .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Wien

About this chapter

Cite this chapter

Mahmood, S. (2013). Online Social Networks and Terrorism: Threats and Defenses. In: Chbeir, R., Al Bouna, B. (eds) Security and Privacy Preserving in Social Networks. Lecture Notes in Social Networks. Springer, Vienna. https://doi.org/10.1007/978-3-7091-0894-9_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-7091-0894-9_3

  • Published:

  • Publisher Name: Springer, Vienna

  • Print ISBN: 978-3-7091-0893-2

  • Online ISBN: 978-3-7091-0894-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics