Abstract
Over 1 billion active users of online social networks are evidence of the enormous growth of these technologies. Although the majority of online social network users use such services for ordinary social interactions, a very small number may possibly be misusing them for terrorism. In this chapter, we first provide the background, definition, and classification of terrorism. Second, we discuss how some terrorists may be using online social networks to: (1) recruit new members to a terrorist organization and maintain the loyalty of their existing sympathizers; (2) plan attacks and share information about them; (3) gather intelligence; (4) train recruits for specific attacks; (5) raise funds for their causes; (6) propagate fear amongst the enemy population; and (7) engage in counterintelligence to uncover undercover agents. Third, we discuss several mechanisms to detect terrorists using online social networks, including: (1) keyword-based flagging; (2) sentiment analysis; (3) honeypots; (4) social network analysis; (5) facial recognition; and (6) view escalation. We show that the keyword-only flagging mechanism used by US Department of Homeland Security to detect terrorists is potentially effective, but certainly produces a large number of false positives, making it possibly less efficient in practice. Finally, we propose the use of targeted advertisements to rehabilitate possible radicals using the online social networks.
Legal Notice: The content of this chapter are meant only to provide researchers and security personnel with information about threats of the use of online social networks for terrorism and how to counter those threats. It is in no way meant to help anyone do anything unethical or illegal.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
The spelling and grammar mistakes are left intact to show the exact message.
- 2.
The spelling and grammar mistakes are left intact to show the exact message.
- 3.
http://www.facebook.com/AzharAhmedScum, Accessed September 19, 2012.
- 4.
We accessed the pages on July 13, 2012.
- 5.
We accessed the page on September 19, 2012.
- 6.
Agents in the police and other law enforcement agencies may take up to 5 years undercover to reach the leaders of a group.
- 7.
http://www.facebook.com/pages/Anders-B-Breivik/265349460157301 Accessed: July 13, 2012.
- 8.
http://www.facebook.com/pages/Anwar-al-Awalki/102248169830078?rf=134722733227304 Accessed: July 13, 2012.
References
About Meetup: http://www.meetup.com/about/. Accessed 20 February 2012
Article 2: International Convention for the Suppression of the Financing of Terrorism, 1999
Asher, J.: Accused terrorists used porn magazines to deter security. NineMSN, 5 April 2008
Barnett, E.: Google+ hits 90 million users. The Telegraph, 20 January 2012
Crenshaw, M.: The causes of terrorism. Comp. Polit. 379–399 (1981)
Deceglie, A., Robertson, K.: Taliban using Facebook to lure Aussie soldier. The Sunday Telegraph, 9 September 2012
Facebook: Facebook Statistics. http://newsroom.fb.com/content/default.aspx?NewsAreaId=22. Accessed 13 July 2012
Flickr: http://advertising.yahoo.com/article/flickr.html. Accessed 20 February 2012
Flveash, K.: Neo-Nazis scoop YouTube ad revenue from UK telcos. The Register, 22 June 2012
Foursquare: https://foursquare.com/about/. Accessed 20 February 2012
Gunaratna, R., Jerard, J., Rubin, L.: Terrorist Rehabilitation and Counter-Radicalisation New Approaches to Counter-Terrorism. Taylor & Francis, New York (2011)
Hudson, R.A.: Who Becomes a Terrorist and Why: The 1999 Government Report on Profiling Terrorists. Lyons Press, Guilford, Connecticut (2002)
Krebs, V.E.: Uncloaking terrorist networks. First Monday 7(4) (2002)
Lardner, R.: Your new Facebook ‘friend’ may be the FBI. MSNBC, 15 March 2010
Linkedin: http://press.linkedin.com/about. Accessed 19 September 2012
Mahmood, S.: Online social networks: The overt and covert communication channels for terrorists and beyond. In: IEEE HST, 2012
Mahmood, S., Desmedt, Y.: Online social networks, a criminals multipurpose toolbox (poster abstract). In: Balzarotti, D., Stolfo, S.J., Cova, M. (eds.) Research in Attacks, Intrusions, and Defenses, vol. 7462 of Lecture Notes in Computer Science, pp. 374–375. Springer, New York (2012)
Mahmood, S., Desmedt, Y.: Your Facebook deactivated friend or a cloaked spy. In: IEEE PerCom Workshops, pp. 367–373, 2012
Narco terror on social networks. Live Leak, 20 June 2012
Online ethymology dictionary. http://www.etymonline.com/index.php?term=terrorism. Accessed 25 September 2012
OPSEC for hackers: because jail is for wuftpd. http://www.slideshare.net/grugq/opsec-for-hackers. Accessed 25 September 2012
Parnell, B.-A.: Linkedin faces class action suit over password leak. The Register, 21 June 2012
Purpura, P.: Terrorism and Homeland Security: An Introduction with Applications. Butterworth-Heinemann, Boston, MA (2007)
Schneider, B.R., Davis, J.A.: Avoiding The Abyss: Progress, Shortfalls, and the Way Ahead in Combating the WMD Threat. Greenwood Publishing Group, Westport, Connecticut (2006)
Seymour, R.: Azhar Ahmed – charged with treason over Facebook comments? 15 March 2012
Shachtman, N.: Army launches $50 million videogame push. Wired, 24 November 2008
Sharma, N.: Abu Jundal used Facebook to hunt for recruits for his terror mission. NDTV, 29 June 2012
Siddiqui, H.: Taliban and Nato-led forces engage in war of words on Twitter. Guardian, 14 September 2011
Twitter stats: https://business.twitter.com/basics/what-is-twitter/. Accessed 19 September 2012
U.S. Department of State, office of the coordinator for counterterrorism. Country Reports on Terrorism, 30 April 2007
Willetts, D., Wells, T.: Game fanatics. The Sun, 20 March 2012
Wilson, T., Wiebe, J., Hoffmann, P.: Recognizing contextual polarity in phrase-level sentiment analysis. In: HLT/EMNLP, 2005
YouTube: YouTube statistics. http://www.youtube.com/t/press_statistics. Accessed 16 May 2012
Acknowledgments
This chapter is an expanded version of our work in [16]. The author would like to thank the University College London for financial support through the UCL PhD Studentship Program.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Wien
About this chapter
Cite this chapter
Mahmood, S. (2013). Online Social Networks and Terrorism: Threats and Defenses. In: Chbeir, R., Al Bouna, B. (eds) Security and Privacy Preserving in Social Networks. Lecture Notes in Social Networks. Springer, Vienna. https://doi.org/10.1007/978-3-7091-0894-9_3
Download citation
DOI: https://doi.org/10.1007/978-3-7091-0894-9_3
Published:
Publisher Name: Springer, Vienna
Print ISBN: 978-3-7091-0893-2
Online ISBN: 978-3-7091-0894-9
eBook Packages: Computer ScienceComputer Science (R0)