Nowadays, global extremist organizations are heavily utilizing Internet technologies to increase their abilities to influence the world. Studying those global extremist organizations’ Internet presence would allow us to better understand extremist organizations’ technical sophistication and their propaganda plans. However, due to the lack of efficient automatic methodologies, few previous researches have attempted to study the extremist organizations’ online presence on a global scale. In this work, we explore an integrated approach for collecting and analyzing extremist online presence. We employed automatic Web crawling techniques to build a comprehensive extremist Web collection which contains around 1.7 million multimedia Web documents. We then used a systematic content analysis tool called the Dark Web Attribute System to study these extremist organizations’ Internet usage from three perspectives: technical sophistication, content richness, and Web interactivity. We also conducted statistical analysis to cross-compare the technical sophistication and effectiveness of Web sites created by extremist groups from different regions. Our analysis results showed that all extremist organizations covered in this study demonstrated high level of technical sophistication in their Web presence but extremist organizations from different regions have different patterns in their Internet technology deployment and online content delivery. Our analysis results would help domain experts deepen their understanding on the global extremism movements and make better counterextremism measures on the Internet.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Anderson, A., “Risk, Terrorism, and the Internet,” Knowledge, Technology & Policy, 16:2, 24-33, Summer 2003.
Armstrong, H. L. and Forde, P. J., “Internet Anonymity Practices in Computer Crime,” Information Management & Computer Security, 11(5), pp. 209-215, 2003.
Arquilla, J. and Ronfeldt, D., “Cyber War Is Coming!” Comparative Strategy, 12(2), 1993.
Becker, A. “Technology and Terror: the New Modus Operandi,” Frontline, 2004, available at http://www.pbs.org/wgbh/pages/frontline/shows/front/special/tech.html
Bowers, F., “Terrorists spread their messages online,” Christian Science Monitor, July 28, 2004, available at http://www.csmonitor.com/2004/0728/p03s01-usgn.htm.
Chakrabarti, S., van den Berg, M. and Dom, B., “Focused crawling: a new approach to topicspecific Web resource discovery,” in Proc. of the 8th International World Wide Web Conference, Toronto, Canada, 1999.
Chen, H., Qin, J., Reid, E., Chung, W., Zhou, Y., Xi, W., Lai, G., Bonillas, A. A. and Sageman, M., “The Dark Web Portal: Collecting and Analyzing the Presence of Domestic and International Terrorist Groups on the Web,” In Proc. of International IEEE Conference on Intelligent Transportation Systems, 2004.
Chou, C., “Interactivity and interactive functions in web-based learning systems: a technical framework for designers.” British Journal of Educational Technology, 34(3), pp. 265-279, 2003.
Coll, S. and Glasser, S. B., “Terrorists Turn to the Web as Base of Operations,” Washington Post, Aug 7, 2005.
Demchak, C., Friis, C., and La Porte, T. M., “Webbing Governance: National Differences in Constructing the Face of Public Organizations,” Handbook of Public Information Systems. G. D. Garson. NYC, Marcel Dekker, 2001.
Denning, D. E., “Information Operations and Terrorism,” Journal of Information Warfare (draft), 2004, available at http://www.jinfowar.com.
Elison, W., “Netwar: Studying Rebels on the Internet,” The Social Studies, 91, pp. 127-131, 2000.
FBIS, “Arab Afghans Said to Launch Worldwide Terrorist War,” Paris al-Watan al-’Arabi, December 1, 1995, pp.22-24, FBIS-TOT-96-010-L.
Hillman, D. C. A., Willis, D. J., and Gunawardena, C. N., “Learner-interface interaction in distance education: an extension of contemporary models and strategies for practitioners.” The American Journal of Distance Education, 8(2), pp. 30-42, 1994.
Hoffman, D. L. and Novak, T. P., “Marketing in hypermedia computer-mediated environments: Conceptual foundation.” Journal of Marketing, 60(3), pp. 50-68, 1996.
ISTS, “Examining the Cyber Capabilities of Islamic Terrorist Groups”. Report, Institute for Security Technology Studies, 2004. http://www.ists.dartmouth.edu/
Internet Haganah, Internet Haganah report, 2005, available at http://en.wikipedia.org/wiki/Internet_Haganah.
Jenkins, B. M., International Terrorism, Crescent Publication, Los Angeles, 1975.
Jenkins, B. M., “World Becomes the Hostage of Media-Savvy Terrorists: Commentary”, USA Today, August 22, 2004. http://www.rand.org/
Delio, M., “Al Qaeda Websites Refuses to Die,” Wired, April 7, 2003, available at: http:// www.wired.com/news/infostructure/0,1377,583562,00.html?tw=wn_story_page_next1 .
Jackson, Brian J. Technology Acquisition by Terrorist Groups: Threat Assessment Informed by Lessons from Private Sector Technology Adoption. Studies in Conflict & Terrorism, vol. 24, p183-213. 2001
Jesdanun, A., “WWW: Terror’s Channel of Choice,” CBS News, June 20, 2004.
Kelley, J., “Terror Groups Hide Behind Encryption,” USA Today, Feb 5, 2001, available at http://www.usatoday.com/tech/news/2001-02-05-binladen.htm
Lawrence, S. and Giles, C. L., “Searching the World Wide Web.” Science, 280(5360), 1998, pp. 98.
Lawrence, S. and Giles, C. L. “Accessibility of information on the Web.” Nature, 400, 1999, pp. 107-109.
Lyman, P. and Varian, H.R., “How Much Information.” published by the UC Berkeley School of Information Management and Systems, 2000.
McCallum, A., Nigamm, K., Rennie, J., and Seymore, K., “Building Domain-Specific Search Engines with Machine Learning Techniques” Proc. AAAI-99 Spring Symposium on Intelligent Agents in Cyberspace, 1999
Michalewicz, Z., Genetic algorithms + data structures = evolution programs. Berlin/Heidelberg: Springer-Verlag, 1992.
Muriel, D., “Terror Moves to the Virtual World,” CNN News, April 8, 2004, available at http://edition.cnn.com/2004/TECH/04/08/internet.terror/.
Nunnelly, J., Psychometric theory. McGraw Hill, New York, 1978.
Palmer, J. W. and Griffith, D. A., “An Emerging Model of Web Site Design for Marketing,” Communications of the ACM, 41(3), pp. 45-51, 1998.
Preece, J., Online Communities: Designing Usability, Supporting Socialability, 2000, New York City, Wiley.
Reid, E., Qin, J., Chung, W., Xu, J., Zhou, Y., Schumaker, R., Sageman, M., and Chen H., “Terrorism Knowledge Discovery Project: a Knowledge Discovery Approach to Addressing the Threats of Terrorism” in Proc. of 2nd Symposium on Intelligence and Security Informatics, ISI 2004, , Tucson, Arizona, 2004.
Rusay, C., “User-centered design for government portals,” Digital Web Magazine, Jan 16, 2003, available at http://www.digital-web.com/articles/user_centered_design_for_large_ government_portals/
Schneider, S. M., Foot, K., Kimpton, M., and Jones, G., “Building thematic web collections: challenges and experiences from the September 11 Web Archive and the Election 2002 Web Archive,” in Proc. of the 3rd ECDL Workshop on Web Archives, Trondheim, Norway, August 2003.
Tekwani, S., “Cyberterrorism: Threat and Response,” Institute of Defence and Strategic Studies, in Proc. of the Workshop on the New Dimensions of Terrorism, 21-22, Singapore, 2002.
Thomas, T. L., “Al Qaeda and the Internet: The Danger of ‘Cyberplanning,’” Parameters, Spring 2003, pp. 112-23, available at http://carlisle-www.army.mil/usawc/Parameters /03spring/thomas.htm.
Tsfati, Y. and Weimann, G., “http://www.terrorism.com : Terror on the Internet,” Studies in Conflict & Terrorism, 25, pp. 317-332, 2002.
Trevino, L. K., Lengel, R. H., and Daft, R. L., “Media symbolism, media richness, and media choice in organizations: A symbolic interactionist perspective.” Communication Research, 14(5), pp. 553-574, 1987.
Qin, J., Zhou, Y., Reid, E., Lai, G. and Chen, H. (forthcoming). “Analyzing Terror Campaigns on the Internet: Technical Sophistication, Content Richness, and Web Interactivity,” International Journal on Human Computer Studies, accepted for publication, forthcoming.
Weimann, G., http://www.terror.net : How Modern Terrorism Use the Internet,” Special Report, U.S. Institute of Peace, 2004, Available at http://www.usip.org/pubs/specialreports/ sr116.pdf.
Whine, M., “Cyberspace: A New Medium for Communication, Command and Control by Extremists,” 1999, available at http://www.ict.org.il/articles/cyberspace.htm
Xu, J. and Croft, B., “Querying Expansion using Local and Global Document Analysis.” in Proc. of the 19th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, Zurich, Switzerland, 1996.
Zhou, Y., Reid, E., Qin, J., Chen, H., and Lai, G., “U.S. Domestic Extremist Groups on the Web: Link and Content Analysis,” IEEE Intelligent Systems Special Issue on Homeland Security, 20(5), pp. 44-51, 2005.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer Science+Business Media, LLC
About this chapter
Cite this chapter
Chen, H., Qin, J., Reid, E., Zhou, Y. (2008). Studying Global Extremist Organizations' Internet Presence Using the DarkWeb Attribute System. In: Chen, H., Reid, E., Sinai, J., Silke, A., Ganor, B. (eds) Terrorism Informatics. Integrated Series In Information Systems, vol 18. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-71613-8_12
Download citation
DOI: https://doi.org/10.1007/978-0-387-71613-8_12
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-71612-1
Online ISBN: 978-0-387-71613-8
eBook Packages: Business and EconomicsBusiness and Management (R0)