PhD Thesis |
Detection And Analysis Of Online Extremist Communities
View Abstract
Online social networks have become a powerful venue for political activism. In many cases large, insular online communities form that have been shown to be powerful diffusion mechanisms of both misinformation and propaganda. In some cases, these groups users advocate actions or policies that could be construed as extreme along nearly any distribution of opinion and are thus called Online Extremist Communities (OECs). Although these communities appear increasingly common, little is known about how these groups form or the methods used to influence them. The work in this thesis provides researchers a methodological framework to study these groups by answering three critical research questions:
• How can we detect large dynamic online activist or extremist communities?
• What automated tools are used to build, isolate, and influence these communities?
• What methods can be used to gain novel insight into large online activist or extremist communities?
This group members social ties can be inferred based on the various affordances offered by OSNs for group curation. By developing heterogeneous, annotated graph representations of user behavior I can efficiently extract online activist discussion cores using an ensemble of unsupervised machine learning methods. I call this technique Ensemble Agreement Clustering. Through manual inspection, these discussion cores can then often be used as training data to detect the larger community. I present a novel supervised learning algorithm called Multiplex Vertex Classification for network bipartition on heterogeneous, annotated graphs. This methodological pipeline has also proven useful for social botnet detection, and a study of large, complex social botnets used for propaganda dissemination is provided as well. Throughout this thesis, I provide Twitter case studies including communities focused on the Islamic State of Iraq and al-Sham (ISIS), the ongoing Syrian Revolution, the Euromaidan Movement in Ukraine, as well as the alt-Right.
|
2017 |
Benigni, M.C. |
View
Publisher
|
Journal Article |
Detection And Classification Of Social Media Based Extremist Affiliations Using Sentiment Analysis Techniques
View Abstract
Identification and classification of extremist-related tweets is a hot issue. Extremist gangs have been involved in using social media sites like Facebook and Twitter for propagating their ideology and recruitment of individuals. This work aims at proposing a terrorism-related content analysis framework with the focus on classifying tweets into extremist and non-extremist classes. Based on user-generated social media posts on Twitter, we develop a tweet classifcation system using deep learning-based sentiment analysis techniques to classify the tweets as extremist or non-extremist. The experimental results are encouraging and provide a gateway for future researchers.
|
2019 |
Ahmad, S., Asghar, M. Z., Alotaibi, F. M. and Awan, I. |
View
Publisher
|
MA Thesis |
Detection And Monitoring Of Improvised Explosive Device Education Networks Through The World Wide Web
View Abstract
As the information age comes to fruition, terrorist networks have moved mainstream by promoting their causes via the World Wide Web. In addition to their standard rhetoric, these organizations provide anyone with an Internet connection the ability to access dangerous information involving the creation and implementation of Improvised Explosive Devices (IEDs). Unfortunately for governments combating terrorism, IED education networks can be very difficult to find and even harder to monitor. Regular commercial search engines are not up to this task, as they have been optimized to catalog infor mation quickly and e fficiently for user ease of access while promoting retail commerce at the same time. This thesis presents a performance analysis of a new search engine algorithm designed to help find IED education networks using the Nutch open-source search engine architecture. It reveals which web pages are more important via references from other web pages regardless of domain. In addition, this thesis discusses the potential evaluation and monitoring techniques to be used in conjunction with the proposed algorithm.
|
2009 |
Stinson, R.T. |
View
Publisher
|
Journal Article |
Detection Of Jihadism In Social Networks Using Big Data
View Abstract
Social networks are being used by terrorist organizations to distribute messages with the intention of influencing people and recruiting new members. The research presented in this paper focuses on the analysis of Twitter messages to detect the leaders orchestrating terrorist networks and their followers. A big data architecture is proposed to analyze messages in real time in order to classify users according to diferent parameters like level of activity, the ability to infuence other users, and the contents of their messages. Graphs have been used to analyze how the messages propagate through the network, and this involves a study of the followers based on retweets and general impact on other users. Ten, fuzzy clustering techniques were used to classify users in profiles, with the advantage over other classifcations techniques of providing a probability for each profile instead of a binary categorization. Algorithms were tested using public database from Kaggle and other Twitter extraction techniques. The resulting profiles detected automatically by the system were manually analyzed, and the parameters that describe each profile correspond to the type of information that any expert may expect. Future applications are not limited to detecting terrorist activism. Human resources departments can apply the power of profle identification to automatically classify candidates, security teams can detect undesirable clients in the financial or insurance sectors, and immigration officers can extract additional insights with these
techniques.
|
2019 |
Rebollo, C. S., Puente, C., Palacios, R., Piriz, C., Fuentes, J. P. and Jarauta, J. |
View
Publisher
|
Journal Article |
Determining The Role Of The Internet In Violent Extremism And Terrorism Six Suggestions For Progressing Research
View Abstract
Some scholars and others are sceptical of a significant role for the Internet in processes of violent radicalisation. There is increasing concern on the part of other scholars, and increasingly also policymakers and publics, that easy availability of violent extremist content online may have violent radicalising effects. This article identifies a number of core questions regarding the interaction of violent extremism and terrorism and the Internet, particularly social media, that have yet to be adequately addressed and supplies a series of six follow-up suggestions, flowing from these questions, for progressing research in this area. These suggestions relate to (1) widening the range of types of violent online extremism being studied beyond violent jihadis; (2) engaging in more comparative research, not just across ideologies, but also groups, countries, languages, and social media platforms; (3) deepening our analyses to include interviewing and virtual ethnographic approaches; (4) up-scaling or improving our capacity to undertake “big data” collection and analysis; (5) outreaching beyond terrorism studies to become acquainted with, for example, the Internet Studies literature and engaging in interdisciplinary research with, for example, computer scientists; and (6) paying more attention to gender as a factor in violent online extremism. This research was produced with the aid of VOX-Pol Research Mobility Programme funding and supervision by VOX-Pol colleagues at Dublin City University.
|
2016 |
Conway, M. |
View
Publisher
|
Report |
Detours and Diversions Online Strategies for the Dissemination of Right-Wing Extremist Content
View Abstract
Since the beginning of 2021, ISD Germany has been researching right-wing extremist actors on alternative platforms on the internet. Three reports were published as part of the German Federal Ministry for Justice (BMJ)-funded project “Countering radicalisation in right-wing extremist online subcultures”. The last report in 2021, “Detours and Diversions – Online Strategies for the Dissemination of Right-Wing Extremist Content”, provides a summary of the projects central findings and presents them in a comparative manner.
This report thus combines the methodological and theoretical groundwork of the report “Wegweiser” with the results of the empirical research of the reports “Fluchtwege” and “Stützpfeiler Telegram”, and puts them into context. The report presents a comparison of data from established platforms and Telegram, and thus helps to gain a better understanding of the behaviour of far-right actors on the selected platforms. It also includes a comparative analysis of the strategies and linkages of far-right and radical right actors on established and alternative platforms. This research is based on the empirical data collected by the platforms. Given, that data collection is different for each platform, and given that this project also explores alternative platforms, it also furthers the exploration of data collection options, which are described in more detail in this report.
|
2022 |
Kuchta, R., Hammer, D., Gerster, L. and Schwieter, C. |
View
Publisher
|