Unraveling International Terrorist Groups' exploitation of the Web: Technical sophistication, media richness, and web interactivity

Jialun Qin, Yilu Zhou, Edna Reid, Guanpi Lai, Hsinchun Chen

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Abstract

Terrorists and extremists have become mainstream exploiters of the Internet beyond routine communication operations and dramatically increased their own ability to influence the outside world. Although this alternate side of the Internet, referred to as the "Dark Web," has recently received extensive government and media attention, the terrorists/extremists' Internet usage is still under-researched because of the lack of systematic Dark Web content collection and analysis methodologies. To address this research gap, we explore an integrated approach for identifying and collecting terrorist/extremist Web contents. We also propose a framework called the Dark Web Attribute System (DWAS) to enable quantitative Dark Web content analysis from three perspectives: technical sophistication, media richness, and Web interactivity. Using the proposed methodology, we collected and examined more than 200,000 multimedia Web documents created by 86 Middle Eastern multi-lingual terrorist/extremist organizations. In our comparison of terrorist/extremist Web sites to U.S. government Web sites, we found that terrorists/extremist groups exhibited similar levels of Web knowledge as U.S. government agencies. We also found that the terrorists/extremist groups are as effective as the U.S. government agencies in terms of supporting communications and interaction using Web technologies. Based on our case study results, we believe that the DWAS is an effective framework to analyze the technical sophistication of terrorist/extremist groups' Internet usage and our Dark Web analysis methodology could contribute to an evidence-based understanding of the applications of Web technologies in the global terrorism phenomena.

Original languageEnglish (US)
Title of host publicationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Pages4-15
Number of pages12
Volume3917 LNCS
DOIs
StatePublished - 2006
EventInternational Workshop on Intelligence and Security Informatics, WISI 2006 - Singapore, Singapore
Duration: Apr 9 2006Apr 9 2006

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume3917 LNCS
ISSN (Print)03029743
ISSN (Electronic)16113349

Other

OtherInternational Workshop on Intelligence and Security Informatics, WISI 2006
CountrySingapore
CitySingapore
Period4/9/064/9/06

Fingerprint

Interactivity
Internet
Exploitation
Government Agencies
Websites
Technology
Terrorism
Multimedia
Communication
Tongue
Organizations
Research
Methodology
Attribute
Content Analysis

ASJC Scopus subject areas

  • Computer Science(all)
  • Biochemistry, Genetics and Molecular Biology(all)
  • Theoretical Computer Science

Cite this

Qin, J., Zhou, Y., Reid, E., Lai, G., & Chen, H. (2006). Unraveling International Terrorist Groups' exploitation of the Web: Technical sophistication, media richness, and web interactivity. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3917 LNCS, pp. 4-15). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 3917 LNCS). https://doi.org/10.1007/11734628_2

Unraveling International Terrorist Groups' exploitation of the Web : Technical sophistication, media richness, and web interactivity. / Qin, Jialun; Zhou, Yilu; Reid, Edna; Lai, Guanpi; Chen, Hsinchun.

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 3917 LNCS 2006. p. 4-15 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 3917 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Qin, J, Zhou, Y, Reid, E, Lai, G & Chen, H 2006, Unraveling International Terrorist Groups' exploitation of the Web: Technical sophistication, media richness, and web interactivity. in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). vol. 3917 LNCS, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 3917 LNCS, pp. 4-15, International Workshop on Intelligence and Security Informatics, WISI 2006, Singapore, Singapore, 4/9/06. https://doi.org/10.1007/11734628_2
Qin J, Zhou Y, Reid E, Lai G, Chen H. Unraveling International Terrorist Groups' exploitation of the Web: Technical sophistication, media richness, and web interactivity. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 3917 LNCS. 2006. p. 4-15. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)). https://doi.org/10.1007/11734628_2
Qin, Jialun ; Zhou, Yilu ; Reid, Edna ; Lai, Guanpi ; Chen, Hsinchun. / Unraveling International Terrorist Groups' exploitation of the Web : Technical sophistication, media richness, and web interactivity. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 3917 LNCS 2006. pp. 4-15 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
@inproceedings{0d689b308c874831a90908f5284112ce,
title = "Unraveling International Terrorist Groups' exploitation of the Web: Technical sophistication, media richness, and web interactivity",
abstract = "Terrorists and extremists have become mainstream exploiters of the Internet beyond routine communication operations and dramatically increased their own ability to influence the outside world. Although this alternate side of the Internet, referred to as the {"}Dark Web,{"} has recently received extensive government and media attention, the terrorists/extremists' Internet usage is still under-researched because of the lack of systematic Dark Web content collection and analysis methodologies. To address this research gap, we explore an integrated approach for identifying and collecting terrorist/extremist Web contents. We also propose a framework called the Dark Web Attribute System (DWAS) to enable quantitative Dark Web content analysis from three perspectives: technical sophistication, media richness, and Web interactivity. Using the proposed methodology, we collected and examined more than 200,000 multimedia Web documents created by 86 Middle Eastern multi-lingual terrorist/extremist organizations. In our comparison of terrorist/extremist Web sites to U.S. government Web sites, we found that terrorists/extremist groups exhibited similar levels of Web knowledge as U.S. government agencies. We also found that the terrorists/extremist groups are as effective as the U.S. government agencies in terms of supporting communications and interaction using Web technologies. Based on our case study results, we believe that the DWAS is an effective framework to analyze the technical sophistication of terrorist/extremist groups' Internet usage and our Dark Web analysis methodology could contribute to an evidence-based understanding of the applications of Web technologies in the global terrorism phenomena.",
author = "Jialun Qin and Yilu Zhou and Edna Reid and Guanpi Lai and Hsinchun Chen",
year = "2006",
doi = "10.1007/11734628_2",
language = "English (US)",
isbn = "3540333614",
volume = "3917 LNCS",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
pages = "4--15",
booktitle = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",

}

TY - GEN

T1 - Unraveling International Terrorist Groups' exploitation of the Web

T2 - Technical sophistication, media richness, and web interactivity

AU - Qin, Jialun

AU - Zhou, Yilu

AU - Reid, Edna

AU - Lai, Guanpi

AU - Chen, Hsinchun

PY - 2006

Y1 - 2006

N2 - Terrorists and extremists have become mainstream exploiters of the Internet beyond routine communication operations and dramatically increased their own ability to influence the outside world. Although this alternate side of the Internet, referred to as the "Dark Web," has recently received extensive government and media attention, the terrorists/extremists' Internet usage is still under-researched because of the lack of systematic Dark Web content collection and analysis methodologies. To address this research gap, we explore an integrated approach for identifying and collecting terrorist/extremist Web contents. We also propose a framework called the Dark Web Attribute System (DWAS) to enable quantitative Dark Web content analysis from three perspectives: technical sophistication, media richness, and Web interactivity. Using the proposed methodology, we collected and examined more than 200,000 multimedia Web documents created by 86 Middle Eastern multi-lingual terrorist/extremist organizations. In our comparison of terrorist/extremist Web sites to U.S. government Web sites, we found that terrorists/extremist groups exhibited similar levels of Web knowledge as U.S. government agencies. We also found that the terrorists/extremist groups are as effective as the U.S. government agencies in terms of supporting communications and interaction using Web technologies. Based on our case study results, we believe that the DWAS is an effective framework to analyze the technical sophistication of terrorist/extremist groups' Internet usage and our Dark Web analysis methodology could contribute to an evidence-based understanding of the applications of Web technologies in the global terrorism phenomena.

AB - Terrorists and extremists have become mainstream exploiters of the Internet beyond routine communication operations and dramatically increased their own ability to influence the outside world. Although this alternate side of the Internet, referred to as the "Dark Web," has recently received extensive government and media attention, the terrorists/extremists' Internet usage is still under-researched because of the lack of systematic Dark Web content collection and analysis methodologies. To address this research gap, we explore an integrated approach for identifying and collecting terrorist/extremist Web contents. We also propose a framework called the Dark Web Attribute System (DWAS) to enable quantitative Dark Web content analysis from three perspectives: technical sophistication, media richness, and Web interactivity. Using the proposed methodology, we collected and examined more than 200,000 multimedia Web documents created by 86 Middle Eastern multi-lingual terrorist/extremist organizations. In our comparison of terrorist/extremist Web sites to U.S. government Web sites, we found that terrorists/extremist groups exhibited similar levels of Web knowledge as U.S. government agencies. We also found that the terrorists/extremist groups are as effective as the U.S. government agencies in terms of supporting communications and interaction using Web technologies. Based on our case study results, we believe that the DWAS is an effective framework to analyze the technical sophistication of terrorist/extremist groups' Internet usage and our Dark Web analysis methodology could contribute to an evidence-based understanding of the applications of Web technologies in the global terrorism phenomena.

UR - http://www.scopus.com/inward/record.url?scp=33745766674&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=33745766674&partnerID=8YFLogxK

U2 - 10.1007/11734628_2

DO - 10.1007/11734628_2

M3 - Conference contribution

AN - SCOPUS:33745766674

SN - 3540333614

SN - 9783540333616

VL - 3917 LNCS

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 4

EP - 15

BT - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

ER -