SlideShare ist ein Scribd-Unternehmen logo
1 von 42
The Terrorism Knowledge Portal Advanced Methodologies for Collecting and Analyzing Information from the “Dark Web” and Terrorism Research Resources By:  Hsinchun Chen, PhD, with Wingyan Chung; Cathy Larson; Edna Reid, DLS; Wei Xi; Alfonso Bonillas; Chun Yin; Yu Su and Greg Lai;  The University of Arizona August 14, 2003 We gratefully acknowledge support from the National Science Foundation
“ There is a potential here to reach millions [Black said of the Internet]. I think it’s a major breakthrough. I don’t know if it’s the ultimate solution to developing a white rights movement in this country, but it’s certainly a significant advance.” -- Don Black, white supremacist, KKK, launched  Stormfront , the first extremist hate web site on WWW “ Up until now, unless someone met me personally, or read my material, the only way they could judge me is by what the liberal-biased media says. Now, that situation has changed. Millions of people are going online in America. Now, if they want to find out about me and my ideas and issues all they have to do is go into one of the search engines and search for “David Duke.” Hundreds [actually about 1,080,000] of sources will show up.”-- David Duke, Knights of the KKK, in  “The Coming White Revolution – Born on the Internet”
“ Terrorist groups are increasingly using new information technology and the Internet to formulate plans, recruit members, communicate between cells and members, raise funds, and spread propaganda. Terrorist groups including Hizballah, the Abu Nidal Organization, and bin Laden’s Al-Queda Organization are using computerized files, email, and encryption to support their operations.” – Louis J. Freeh, Director, FBI, Congressional Statement,  “Threat of Terrorism to the United States,”  2001
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Background
Misuse of the Internet ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Important Definitions ,[object Object],[object Object],[object Object],Source:  U.S. State Dept.,  Patterns of Global Terrorism 2002 .  “The US Government has employed this definition of terrorism for statistical and analytical purposes since 1983.”
Intelligence from the Dark Web ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Problems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Terrorist Knowledge Portal ,[object Object],[object Object],[object Object],[object Object]
Review of Terrorism Research Information and Terrorist Groups
Review ,[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Information about Terrorism
A Few Examples ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
From the Dark Web: Domestic Terrorist Groups ,[object Object],[object Object],Numerous groups have openly posted their web sites to the public web, but many more are not so easily accessible
From the Dark Web: International Groups ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
From the Dark Web: International Groups ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
From the Dark Web: Findings ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Data Collection and Data Analysis for Testbed Creation An Overview and Analysis of Potential Methods
Purpose ,[object Object],[object Object],[object Object],[object Object],[object Object]
Data Collection Methods (1) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Data Collection Methods (2) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Data Collection Methods (3) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Data Collection Methods (4) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Other methods ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Data Analysis (1) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Data Analysis (2) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Proposed Methodology
An Automatic Text Mining Approach  ,[object Object],[object Object],[object Object],[object Object],[object Object]
Information Sources Collection Methods Automatic Spidering Back link search Personal Profile Search Meta Searching Downloading from Gov’t Web sites Filtering Data Storage Domestic Terrorism International Terrorism Terrorism research information The Web Dark Web Hate Groups | Racial Supremacy | Suicidal Attackers | Activists / Extremists | Anti-Government |  …  Terrorist Group Web sites Search Engines Terrorism databases Government information
Testbeds ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],The basic unit in each testbed is a Web page, article or report
Plan for Developing the Testbed ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Research Issues ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Challenges ,[object Object],[object Object],[object Object],[object Object],[object Object]
Current Progress
Current Progress ,[object Object],[object Object],[object Object],[object Object]
Terrorism Knowledge Portal (1) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Terrorism Knowledge Portal (2) ,[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object]
Dark Web testbed: Domestic Terrorist Groups ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Dark Web testbed: International Terrorist Groups ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Contact: Hsinchun Chen [email_address] For more information, please visit http://ai.eller.arizona.edu/

Weitere ähnliche Inhalte

Was ist angesagt?

Internet Resources Power Point
Internet Resources Power PointInternet Resources Power Point
Internet Resources Power Point
Phillip0582
 
Freewebslideshare
FreewebslideshareFreewebslideshare
Freewebslideshare
freeweb
 
Data-Mining Twitter for Political Science -Hickman, Alfredo - Honors Thesis
Data-Mining Twitter for Political Science -Hickman, Alfredo - Honors ThesisData-Mining Twitter for Political Science -Hickman, Alfredo - Honors Thesis
Data-Mining Twitter for Political Science -Hickman, Alfredo - Honors Thesis
Alfredo Hickman
 
Deep Web
Deep WebDeep Web
Deep Web
St John
 
Super Searching 3
Super Searching 3Super Searching 3
Super Searching 3
lwmurray1
 
Annex 9 Recap Knowledge, Learning, Networks
Annex 9 Recap Knowledge, Learning, NetworksAnnex 9 Recap Knowledge, Learning, Networks
Annex 9 Recap Knowledge, Learning, Networks
RAIN Foundation
 
BIZ 2401 First Class
BIZ 2401 First ClassBIZ 2401 First Class
BIZ 2401 First Class
Traciwm
 
Cross-Platform Profiling tutorial at the Digital Methods Summer School 2013
Cross-Platform Profiling tutorial at the Digital Methods Summer School 2013Cross-Platform Profiling tutorial at the Digital Methods Summer School 2013
Cross-Platform Profiling tutorial at the Digital Methods Summer School 2013
Digital Methods Initiative
 
What Your Tweets Tell Us About You, Speaker Notes
What Your Tweets Tell Us About You, Speaker NotesWhat Your Tweets Tell Us About You, Speaker Notes
What Your Tweets Tell Us About You, Speaker Notes
KrisKasianovitz
 

Was ist angesagt? (19)

Information Retrieval and Social Media
Information Retrieval and Social MediaInformation Retrieval and Social Media
Information Retrieval and Social Media
 
Internet Resources Power Point
Internet Resources Power PointInternet Resources Power Point
Internet Resources Power Point
 
HathiTrust
HathiTrustHathiTrust
HathiTrust
 
Freewebslideshare
FreewebslideshareFreewebslideshare
Freewebslideshare
 
Online Searching Tips
Online Searching TipsOnline Searching Tips
Online Searching Tips
 
Introtointernet1
Introtointernet1Introtointernet1
Introtointernet1
 
Data-Mining Twitter for Political Science -Hickman, Alfredo - Honors Thesis
Data-Mining Twitter for Political Science -Hickman, Alfredo - Honors ThesisData-Mining Twitter for Political Science -Hickman, Alfredo - Honors Thesis
Data-Mining Twitter for Political Science -Hickman, Alfredo - Honors Thesis
 
Information literacy
Information literacyInformation literacy
Information literacy
 
Deep Web
Deep WebDeep Web
Deep Web
 
Deep web Seminar
Deep web Seminar Deep web Seminar
Deep web Seminar
 
How to share and publish data: resources, law, and policy
How to share and publish data: resources, law, and policyHow to share and publish data: resources, law, and policy
How to share and publish data: resources, law, and policy
 
Super Searching 3
Super Searching 3Super Searching 3
Super Searching 3
 
Annex 9 Recap Knowledge, Learning, Networks
Annex 9 Recap Knowledge, Learning, NetworksAnnex 9 Recap Knowledge, Learning, Networks
Annex 9 Recap Knowledge, Learning, Networks
 
BIZ 2401 First Class
BIZ 2401 First ClassBIZ 2401 First Class
BIZ 2401 First Class
 
Cross-Platform Profiling tutorial at the Digital Methods Summer School 2013
Cross-Platform Profiling tutorial at the Digital Methods Summer School 2013Cross-Platform Profiling tutorial at the Digital Methods Summer School 2013
Cross-Platform Profiling tutorial at the Digital Methods Summer School 2013
 
What Your Tweets Tell Us About You, Speaker Notes
What Your Tweets Tell Us About You, Speaker NotesWhat Your Tweets Tell Us About You, Speaker Notes
What Your Tweets Tell Us About You, Speaker Notes
 
Evaluating websites2
Evaluating websites2Evaluating websites2
Evaluating websites2
 
Using Search Engines
Using Search EnginesUsing Search Engines
Using Search Engines
 
63demo dfa
63demo dfa63demo dfa
63demo dfa
 

Andere mochten auch

Andere mochten auch (10)

Scuba diving into The Deep Dark Web
Scuba diving into The Deep Dark WebScuba diving into The Deep Dark Web
Scuba diving into The Deep Dark Web
 
Deep web (Dark side)
Deep web (Dark side)Deep web (Dark side)
Deep web (Dark side)
 
Dark web markets: from the silk road to alphabay, trends and developments
Dark web markets: from the silk road to alphabay, trends and developmentsDark web markets: from the silk road to alphabay, trends and developments
Dark web markets: from the silk road to alphabay, trends and developments
 
The Dark Net
The Dark NetThe Dark Net
The Dark Net
 
Deep Web & Dark Web
Deep Web & Dark WebDeep Web & Dark Web
Deep Web & Dark Web
 
The Dark Web
The Dark WebThe Dark Web
The Dark Web
 
Dark Web and Privacy
Dark Web and PrivacyDark Web and Privacy
Dark Web and Privacy
 
Darknet
DarknetDarknet
Darknet
 
Deep web
Deep webDeep web
Deep web
 
The Deep and Dark Web
The Deep and Dark WebThe Deep and Dark Web
The Deep and Dark Web
 

Ähnlich wie The Terrorism Knowledge Portal: Advanced Methodologies for Collecting and Analyzing Information from the ‘Dark Web’ and Terrorism Research Resources

The impact of internet in radicalization of terrorists.docx
The impact of internet in radicalization of terrorists.docxThe impact of internet in radicalization of terrorists.docx
The impact of internet in radicalization of terrorists.docx
4934bk
 
Wini's Presentation on Racial Cyberhates Targeting Young People
Wini's Presentation on Racial Cyberhates Targeting Young PeopleWini's Presentation on Racial Cyberhates Targeting Young People
Wini's Presentation on Racial Cyberhates Targeting Young People
artatipratiwi
 
1. Discussion Points (Use your browser to conduct research on the .docx
1. Discussion Points (Use your browser to conduct research on the .docx1. Discussion Points (Use your browser to conduct research on the .docx
1. Discussion Points (Use your browser to conduct research on the .docx
SONU61709
 
Capstone_SingleSpaced
Capstone_SingleSpacedCapstone_SingleSpaced
Capstone_SingleSpaced
Cameron Banks
 
Future_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RESFuture_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RES
Jenny O'Meara
 
Terrorism 15 May 2009
Terrorism 15 May 2009Terrorism 15 May 2009
Terrorism 15 May 2009
karsalan
 

Ähnlich wie The Terrorism Knowledge Portal: Advanced Methodologies for Collecting and Analyzing Information from the ‘Dark Web’ and Terrorism Research Resources (20)

The impact of internet in radicalization of terrorists.docx
The impact of internet in radicalization of terrorists.docxThe impact of internet in radicalization of terrorists.docx
The impact of internet in radicalization of terrorists.docx
 
Should the ″Dark Web″ be monitored, shut down completely, or left alone?
Should the ″Dark Web″ be monitored, shut down completely, or left alone?Should the ″Dark Web″ be monitored, shut down completely, or left alone?
Should the ″Dark Web″ be monitored, shut down completely, or left alone?
 
Wini's Presentation on Racial Cyberhates Targeting Young People
Wini's Presentation on Racial Cyberhates Targeting Young PeopleWini's Presentation on Racial Cyberhates Targeting Young People
Wini's Presentation on Racial Cyberhates Targeting Young People
 
Julie Clegg
Julie CleggJulie Clegg
Julie Clegg
 
Dark web presentation
Dark web presentationDark web presentation
Dark web presentation
 
Polinter06
Polinter06Polinter06
Polinter06
 
Ass3 Summative
Ass3 SummativeAss3 Summative
Ass3 Summative
 
Rogers studyingpoliticalissues mar2014_optimized_ii_
Rogers studyingpoliticalissues mar2014_optimized_ii_Rogers studyingpoliticalissues mar2014_optimized_ii_
Rogers studyingpoliticalissues mar2014_optimized_ii_
 
A Semantic Graph-based Approach for Radicalisation Detection on Social Media
A Semantic Graph-based Approach for Radicalisation Detection on Social MediaA Semantic Graph-based Approach for Radicalisation Detection on Social Media
A Semantic Graph-based Approach for Radicalisation Detection on Social Media
 
1. Discussion Points (Use your browser to conduct research on the .docx
1. Discussion Points (Use your browser to conduct research on the .docx1. Discussion Points (Use your browser to conduct research on the .docx
1. Discussion Points (Use your browser to conduct research on the .docx
 
Intelligence Collection
Intelligence CollectionIntelligence Collection
Intelligence Collection
 
Open Data Journalism
Open Data JournalismOpen Data Journalism
Open Data Journalism
 
Online Journalism Story Ideas Feb12 2008[1]
Online Journalism Story Ideas Feb12 2008[1]Online Journalism Story Ideas Feb12 2008[1]
Online Journalism Story Ideas Feb12 2008[1]
 
Capstone_SingleSpaced
Capstone_SingleSpacedCapstone_SingleSpaced
Capstone_SingleSpaced
 
Searchthewebtutorial2014
Searchthewebtutorial2014Searchthewebtutorial2014
Searchthewebtutorial2014
 
The Role of Social Media in Da'awah
The Role of Social Media in Da'awahThe Role of Social Media in Da'awah
The Role of Social Media in Da'awah
 
Future_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RESFuture_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RES
 
Fake news learner packet
Fake news learner packetFake news learner packet
Fake news learner packet
 
Library session for POLS 3760 - Looking at Alternative Viewpoints
Library session for POLS 3760 - Looking at Alternative ViewpointsLibrary session for POLS 3760 - Looking at Alternative Viewpoints
Library session for POLS 3760 - Looking at Alternative Viewpoints
 
Terrorism 15 May 2009
Terrorism 15 May 2009Terrorism 15 May 2009
Terrorism 15 May 2009
 

Mehr von suyu22 (6)

Ucd presentation miami_no_animation
Ucd presentation miami_no_animationUcd presentation miami_no_animation
Ucd presentation miami_no_animation
 
New Directions in Metadata
New Directions in MetadataNew Directions in Metadata
New Directions in Metadata
 
Managing Software Selection and Acquisition: From Problem to Solution
Managing Software Selection and Acquisition: From Problem to SolutionManaging Software Selection and Acquisition: From Problem to Solution
Managing Software Selection and Acquisition: From Problem to Solution
 
It’s Local, It’s Personal -- Search Engine & Information Service Trends
It’s Local, It’s Personal -- Search Engine & Information Service TrendsIt’s Local, It’s Personal -- Search Engine & Information Service Trends
It’s Local, It’s Personal -- Search Engine & Information Service Trends
 
The Making of A Natural History Digital Library
The Making of A Natural History Digital LibraryThe Making of A Natural History Digital Library
The Making of A Natural History Digital Library
 
User Contribution in Knowledge Management – A Journey to Semantic Technology
User Contribution in Knowledge Management – A Journey to Semantic TechnologyUser Contribution in Knowledge Management – A Journey to Semantic Technology
User Contribution in Knowledge Management – A Journey to Semantic Technology
 

Kürzlich hochgeladen

Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 

Kürzlich hochgeladen (20)

Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 

The Terrorism Knowledge Portal: Advanced Methodologies for Collecting and Analyzing Information from the ‘Dark Web’ and Terrorism Research Resources

  • 1. The Terrorism Knowledge Portal Advanced Methodologies for Collecting and Analyzing Information from the “Dark Web” and Terrorism Research Resources By: Hsinchun Chen, PhD, with Wingyan Chung; Cathy Larson; Edna Reid, DLS; Wei Xi; Alfonso Bonillas; Chun Yin; Yu Su and Greg Lai; The University of Arizona August 14, 2003 We gratefully acknowledge support from the National Science Foundation
  • 2. “ There is a potential here to reach millions [Black said of the Internet]. I think it’s a major breakthrough. I don’t know if it’s the ultimate solution to developing a white rights movement in this country, but it’s certainly a significant advance.” -- Don Black, white supremacist, KKK, launched Stormfront , the first extremist hate web site on WWW “ Up until now, unless someone met me personally, or read my material, the only way they could judge me is by what the liberal-biased media says. Now, that situation has changed. Millions of people are going online in America. Now, if they want to find out about me and my ideas and issues all they have to do is go into one of the search engines and search for “David Duke.” Hundreds [actually about 1,080,000] of sources will show up.”-- David Duke, Knights of the KKK, in “The Coming White Revolution – Born on the Internet”
  • 3. “ Terrorist groups are increasingly using new information technology and the Internet to formulate plans, recruit members, communicate between cells and members, raise funds, and spread propaganda. Terrorist groups including Hizballah, the Abu Nidal Organization, and bin Laden’s Al-Queda Organization are using computerized files, email, and encryption to support their operations.” – Louis J. Freeh, Director, FBI, Congressional Statement, “Threat of Terrorism to the United States,” 2001
  • 4.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11. Review of Terrorism Research Information and Terrorist Groups
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19. Data Collection and Data Analysis for Testbed Creation An Overview and Analysis of Potential Methods
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 29.
  • 30. Information Sources Collection Methods Automatic Spidering Back link search Personal Profile Search Meta Searching Downloading from Gov’t Web sites Filtering Data Storage Domestic Terrorism International Terrorism Terrorism research information The Web Dark Web Hate Groups | Racial Supremacy | Suicidal Attackers | Activists / Extremists | Anti-Government | … Terrorist Group Web sites Search Engines Terrorism databases Government information
  • 31.
  • 32.
  • 33.
  • 34.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42. Contact: Hsinchun Chen [email_address] For more information, please visit http://ai.eller.arizona.edu/