SlideShare ist ein Scribd-Unternehmen logo
1 von 42
The Terrorism Knowledge Portal Advanced Methodologies for Collecting and Analyzing Information from the “Dark Web” and Terrorism Research Resources By:  Hsinchun Chen, PhD, with Wingyan Chung; Cathy Larson; Edna Reid, DLS; Wei Xi; Alfonso Bonillas; Chun Yin; Yu Su and Greg Lai;  The University of Arizona August 14, 2003 We gratefully acknowledge support from the National Science Foundation
“ There is a potential here to reach millions [Black said of the Internet]. I think it’s a major breakthrough. I don’t know if it’s the ultimate solution to developing a white rights movement in this country, but it’s certainly a significant advance.” -- Don Black, white supremacist, KKK, launched  Stormfront , the first extremist hate web site on WWW “ Up until now, unless someone met me personally, or read my material, the only way they could judge me is by what the liberal-biased media says. Now, that situation has changed. Millions of people are going online in America. Now, if they want to find out about me and my ideas and issues all they have to do is go into one of the search engines and search for “David Duke.” Hundreds [actually about 1,080,000] of sources will show up.”-- David Duke, Knights of the KKK, in  “The Coming White Revolution – Born on the Internet”
“ Terrorist groups are increasingly using new information technology and the Internet to formulate plans, recruit members, communicate between cells and members, raise funds, and spread propaganda. Terrorist groups including Hizballah, the Abu Nidal Organization, and bin Laden’s Al-Queda Organization are using computerized files, email, and encryption to support their operations.” – Louis J. Freeh, Director, FBI, Congressional Statement,  “Threat of Terrorism to the United States,”  2001
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Background
Misuse of the Internet ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Important Definitions ,[object Object],[object Object],[object Object],Source:  U.S. State Dept.,  Patterns of Global Terrorism 2002 .  “The US Government has employed this definition of terrorism for statistical and analytical purposes since 1983.”
Intelligence from the Dark Web ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Problems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Terrorist Knowledge Portal ,[object Object],[object Object],[object Object],[object Object]
Review of Terrorism Research Information and Terrorist Groups
Review ,[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Information about Terrorism
A Few Examples ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
From the Dark Web: Domestic Terrorist Groups ,[object Object],[object Object],Numerous groups have openly posted their web sites to the public web, but many more are not so easily accessible
From the Dark Web: International Groups ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
From the Dark Web: International Groups ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
From the Dark Web: Findings ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Data Collection and Data Analysis for Testbed Creation An Overview and Analysis of Potential Methods
Purpose ,[object Object],[object Object],[object Object],[object Object],[object Object]
Data Collection Methods (1) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Data Collection Methods (2) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Data Collection Methods (3) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Data Collection Methods (4) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Other methods ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Data Analysis (1) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Data Analysis (2) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Proposed Methodology
An Automatic Text Mining Approach  ,[object Object],[object Object],[object Object],[object Object],[object Object]
Information Sources Collection Methods Automatic Spidering Back link search Personal Profile Search Meta Searching Downloading from Gov’t Web sites Filtering Data Storage Domestic Terrorism International Terrorism Terrorism research information The Web Dark Web Hate Groups | Racial Supremacy | Suicidal Attackers | Activists / Extremists | Anti-Government |  …  Terrorist Group Web sites Search Engines Terrorism databases Government information
Testbeds ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],The basic unit in each testbed is a Web page, article or report
Plan for Developing the Testbed ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Research Issues ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Challenges ,[object Object],[object Object],[object Object],[object Object],[object Object]
Current Progress
Current Progress ,[object Object],[object Object],[object Object],[object Object]
Terrorism Knowledge Portal (1) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Terrorism Knowledge Portal (2) ,[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object]
Dark Web testbed: Domestic Terrorist Groups ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Dark Web testbed: International Terrorist Groups ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Contact: Hsinchun Chen [email_address] For more information, please visit http://ai.eller.arizona.edu/

Weitere ähnliche Inhalte

Was ist angesagt?

Internet Resources Power Point
Internet Resources Power PointInternet Resources Power Point
Internet Resources Power Point
Phillip0582
 
Freewebslideshare
FreewebslideshareFreewebslideshare
Freewebslideshare
freeweb
 
Data-Mining Twitter for Political Science -Hickman, Alfredo - Honors Thesis
Data-Mining Twitter for Political Science -Hickman, Alfredo - Honors ThesisData-Mining Twitter for Political Science -Hickman, Alfredo - Honors Thesis
Data-Mining Twitter for Political Science -Hickman, Alfredo - Honors Thesis
Alfredo Hickman
 
Deep Web
Deep WebDeep Web
Deep Web
St John
 
Super Searching 3
Super Searching 3Super Searching 3
Super Searching 3
lwmurray1
 
Annex 9 Recap Knowledge, Learning, Networks
Annex 9 Recap Knowledge, Learning, NetworksAnnex 9 Recap Knowledge, Learning, Networks
Annex 9 Recap Knowledge, Learning, Networks
RAIN Foundation
 
BIZ 2401 First Class
BIZ 2401 First ClassBIZ 2401 First Class
BIZ 2401 First Class
Traciwm
 
Cross-Platform Profiling tutorial at the Digital Methods Summer School 2013
Cross-Platform Profiling tutorial at the Digital Methods Summer School 2013Cross-Platform Profiling tutorial at the Digital Methods Summer School 2013
Cross-Platform Profiling tutorial at the Digital Methods Summer School 2013
Digital Methods Initiative
 
What Your Tweets Tell Us About You, Speaker Notes
What Your Tweets Tell Us About You, Speaker NotesWhat Your Tweets Tell Us About You, Speaker Notes
What Your Tweets Tell Us About You, Speaker Notes
KrisKasianovitz
 

Was ist angesagt? (19)

Information Retrieval and Social Media
Information Retrieval and Social MediaInformation Retrieval and Social Media
Information Retrieval and Social Media
 
Internet Resources Power Point
Internet Resources Power PointInternet Resources Power Point
Internet Resources Power Point
 
HathiTrust
HathiTrustHathiTrust
HathiTrust
 
Freewebslideshare
FreewebslideshareFreewebslideshare
Freewebslideshare
 
Online Searching Tips
Online Searching TipsOnline Searching Tips
Online Searching Tips
 
Introtointernet1
Introtointernet1Introtointernet1
Introtointernet1
 
Data-Mining Twitter for Political Science -Hickman, Alfredo - Honors Thesis
Data-Mining Twitter for Political Science -Hickman, Alfredo - Honors ThesisData-Mining Twitter for Political Science -Hickman, Alfredo - Honors Thesis
Data-Mining Twitter for Political Science -Hickman, Alfredo - Honors Thesis
 
Information literacy
Information literacyInformation literacy
Information literacy
 
Deep Web
Deep WebDeep Web
Deep Web
 
Deep web Seminar
Deep web Seminar Deep web Seminar
Deep web Seminar
 
How to share and publish data: resources, law, and policy
How to share and publish data: resources, law, and policyHow to share and publish data: resources, law, and policy
How to share and publish data: resources, law, and policy
 
Super Searching 3
Super Searching 3Super Searching 3
Super Searching 3
 
Annex 9 Recap Knowledge, Learning, Networks
Annex 9 Recap Knowledge, Learning, NetworksAnnex 9 Recap Knowledge, Learning, Networks
Annex 9 Recap Knowledge, Learning, Networks
 
BIZ 2401 First Class
BIZ 2401 First ClassBIZ 2401 First Class
BIZ 2401 First Class
 
Cross-Platform Profiling tutorial at the Digital Methods Summer School 2013
Cross-Platform Profiling tutorial at the Digital Methods Summer School 2013Cross-Platform Profiling tutorial at the Digital Methods Summer School 2013
Cross-Platform Profiling tutorial at the Digital Methods Summer School 2013
 
What Your Tweets Tell Us About You, Speaker Notes
What Your Tweets Tell Us About You, Speaker NotesWhat Your Tweets Tell Us About You, Speaker Notes
What Your Tweets Tell Us About You, Speaker Notes
 
Evaluating websites2
Evaluating websites2Evaluating websites2
Evaluating websites2
 
Using Search Engines
Using Search EnginesUsing Search Engines
Using Search Engines
 
63demo dfa
63demo dfa63demo dfa
63demo dfa
 

Andere mochten auch

Andere mochten auch (10)

Scuba diving into The Deep Dark Web
Scuba diving into The Deep Dark WebScuba diving into The Deep Dark Web
Scuba diving into The Deep Dark Web
 
Deep web (Dark side)
Deep web (Dark side)Deep web (Dark side)
Deep web (Dark side)
 
Dark web markets: from the silk road to alphabay, trends and developments
Dark web markets: from the silk road to alphabay, trends and developmentsDark web markets: from the silk road to alphabay, trends and developments
Dark web markets: from the silk road to alphabay, trends and developments
 
The Dark Net
The Dark NetThe Dark Net
The Dark Net
 
Deep Web & Dark Web
Deep Web & Dark WebDeep Web & Dark Web
Deep Web & Dark Web
 
The Dark Web
The Dark WebThe Dark Web
The Dark Web
 
Dark Web and Privacy
Dark Web and PrivacyDark Web and Privacy
Dark Web and Privacy
 
Darknet
DarknetDarknet
Darknet
 
Deep web
Deep webDeep web
Deep web
 
The Deep and Dark Web
The Deep and Dark WebThe Deep and Dark Web
The Deep and Dark Web
 

Ähnlich wie The Terrorism Knowledge Portal: Advanced Methodologies for Collecting and Analyzing Information from the ‘Dark Web’ and Terrorism Research Resources

The impact of internet in radicalization of terrorists.docx
The impact of internet in radicalization of terrorists.docxThe impact of internet in radicalization of terrorists.docx
The impact of internet in radicalization of terrorists.docx
4934bk
 
Wini's Presentation on Racial Cyberhates Targeting Young People
Wini's Presentation on Racial Cyberhates Targeting Young PeopleWini's Presentation on Racial Cyberhates Targeting Young People
Wini's Presentation on Racial Cyberhates Targeting Young People
artatipratiwi
 
1. Discussion Points (Use your browser to conduct research on the .docx
1. Discussion Points (Use your browser to conduct research on the .docx1. Discussion Points (Use your browser to conduct research on the .docx
1. Discussion Points (Use your browser to conduct research on the .docx
SONU61709
 
Capstone_SingleSpaced
Capstone_SingleSpacedCapstone_SingleSpaced
Capstone_SingleSpaced
Cameron Banks
 
Future_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RESFuture_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RES
Jenny O'Meara
 
Terrorism 15 May 2009
Terrorism 15 May 2009Terrorism 15 May 2009
Terrorism 15 May 2009
karsalan
 

Ähnlich wie The Terrorism Knowledge Portal: Advanced Methodologies for Collecting and Analyzing Information from the ‘Dark Web’ and Terrorism Research Resources (20)

The impact of internet in radicalization of terrorists.docx
The impact of internet in radicalization of terrorists.docxThe impact of internet in radicalization of terrorists.docx
The impact of internet in radicalization of terrorists.docx
 
Should the ″Dark Web″ be monitored, shut down completely, or left alone?
Should the ″Dark Web″ be monitored, shut down completely, or left alone?Should the ″Dark Web″ be monitored, shut down completely, or left alone?
Should the ″Dark Web″ be monitored, shut down completely, or left alone?
 
Wini's Presentation on Racial Cyberhates Targeting Young People
Wini's Presentation on Racial Cyberhates Targeting Young PeopleWini's Presentation on Racial Cyberhates Targeting Young People
Wini's Presentation on Racial Cyberhates Targeting Young People
 
Julie Clegg
Julie CleggJulie Clegg
Julie Clegg
 
Dark web presentation
Dark web presentationDark web presentation
Dark web presentation
 
Polinter06
Polinter06Polinter06
Polinter06
 
Ass3 Summative
Ass3 SummativeAss3 Summative
Ass3 Summative
 
Rogers studyingpoliticalissues mar2014_optimized_ii_
Rogers studyingpoliticalissues mar2014_optimized_ii_Rogers studyingpoliticalissues mar2014_optimized_ii_
Rogers studyingpoliticalissues mar2014_optimized_ii_
 
A Semantic Graph-based Approach for Radicalisation Detection on Social Media
A Semantic Graph-based Approach for Radicalisation Detection on Social MediaA Semantic Graph-based Approach for Radicalisation Detection on Social Media
A Semantic Graph-based Approach for Radicalisation Detection on Social Media
 
1. Discussion Points (Use your browser to conduct research on the .docx
1. Discussion Points (Use your browser to conduct research on the .docx1. Discussion Points (Use your browser to conduct research on the .docx
1. Discussion Points (Use your browser to conduct research on the .docx
 
Intelligence Collection
Intelligence CollectionIntelligence Collection
Intelligence Collection
 
Open Data Journalism
Open Data JournalismOpen Data Journalism
Open Data Journalism
 
Online Journalism Story Ideas Feb12 2008[1]
Online Journalism Story Ideas Feb12 2008[1]Online Journalism Story Ideas Feb12 2008[1]
Online Journalism Story Ideas Feb12 2008[1]
 
Capstone_SingleSpaced
Capstone_SingleSpacedCapstone_SingleSpaced
Capstone_SingleSpaced
 
Searchthewebtutorial2014
Searchthewebtutorial2014Searchthewebtutorial2014
Searchthewebtutorial2014
 
The Role of Social Media in Da'awah
The Role of Social Media in Da'awahThe Role of Social Media in Da'awah
The Role of Social Media in Da'awah
 
Future_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RESFuture_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RES
 
Fake news learner packet
Fake news learner packetFake news learner packet
Fake news learner packet
 
Library session for POLS 3760 - Looking at Alternative Viewpoints
Library session for POLS 3760 - Looking at Alternative ViewpointsLibrary session for POLS 3760 - Looking at Alternative Viewpoints
Library session for POLS 3760 - Looking at Alternative Viewpoints
 
Terrorism 15 May 2009
Terrorism 15 May 2009Terrorism 15 May 2009
Terrorism 15 May 2009
 

Mehr von suyu22 (6)

Ucd presentation miami_no_animation
Ucd presentation miami_no_animationUcd presentation miami_no_animation
Ucd presentation miami_no_animation
 
New Directions in Metadata
New Directions in MetadataNew Directions in Metadata
New Directions in Metadata
 
Managing Software Selection and Acquisition: From Problem to Solution
Managing Software Selection and Acquisition: From Problem to SolutionManaging Software Selection and Acquisition: From Problem to Solution
Managing Software Selection and Acquisition: From Problem to Solution
 
It’s Local, It’s Personal -- Search Engine & Information Service Trends
It’s Local, It’s Personal -- Search Engine & Information Service TrendsIt’s Local, It’s Personal -- Search Engine & Information Service Trends
It’s Local, It’s Personal -- Search Engine & Information Service Trends
 
The Making of A Natural History Digital Library
The Making of A Natural History Digital LibraryThe Making of A Natural History Digital Library
The Making of A Natural History Digital Library
 
User Contribution in Knowledge Management – A Journey to Semantic Technology
User Contribution in Knowledge Management – A Journey to Semantic TechnologyUser Contribution in Knowledge Management – A Journey to Semantic Technology
User Contribution in Knowledge Management – A Journey to Semantic Technology
 

Kürzlich hochgeladen

會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
中 央社
 
MSc Ag Genetics & Plant Breeding: Insights from Previous Year JNKVV Entrance ...
MSc Ag Genetics & Plant Breeding: Insights from Previous Year JNKVV Entrance ...MSc Ag Genetics & Plant Breeding: Insights from Previous Year JNKVV Entrance ...
MSc Ag Genetics & Plant Breeding: Insights from Previous Year JNKVV Entrance ...
Krashi Coaching
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
Peter Brusilovsky
 

Kürzlich hochgeladen (20)

How to Manage Closest Location in Odoo 17 Inventory
How to Manage Closest Location in Odoo 17 InventoryHow to Manage Closest Location in Odoo 17 Inventory
How to Manage Closest Location in Odoo 17 Inventory
 
Dementia (Alzheimer & vasular dementia).
Dementia (Alzheimer & vasular dementia).Dementia (Alzheimer & vasular dementia).
Dementia (Alzheimer & vasular dementia).
 
PSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptxPSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptx
 
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading RoomSternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
 
Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...
 
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community PartnershipsSpring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
 
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxAnalyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
 
ANTI PARKISON DRUGS.pptx
ANTI         PARKISON          DRUGS.pptxANTI         PARKISON          DRUGS.pptx
ANTI PARKISON DRUGS.pptx
 
An overview of the various scriptures in Hinduism
An overview of the various scriptures in HinduismAn overview of the various scriptures in Hinduism
An overview of the various scriptures in Hinduism
 
Championnat de France de Tennis de table/
Championnat de France de Tennis de table/Championnat de France de Tennis de table/
Championnat de France de Tennis de table/
 
MSc Ag Genetics & Plant Breeding: Insights from Previous Year JNKVV Entrance ...
MSc Ag Genetics & Plant Breeding: Insights from Previous Year JNKVV Entrance ...MSc Ag Genetics & Plant Breeding: Insights from Previous Year JNKVV Entrance ...
MSc Ag Genetics & Plant Breeding: Insights from Previous Year JNKVV Entrance ...
 
How to Analyse Profit of a Sales Order in Odoo 17
How to Analyse Profit of a Sales Order in Odoo 17How to Analyse Profit of a Sales Order in Odoo 17
How to Analyse Profit of a Sales Order in Odoo 17
 
demyelinated disorder: multiple sclerosis.pptx
demyelinated disorder: multiple sclerosis.pptxdemyelinated disorder: multiple sclerosis.pptx
demyelinated disorder: multiple sclerosis.pptx
 
MOOD STABLIZERS DRUGS.pptx
MOOD     STABLIZERS           DRUGS.pptxMOOD     STABLIZERS           DRUGS.pptx
MOOD STABLIZERS DRUGS.pptx
 
e-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopale-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopal
 
The Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDFThe Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDF
 
Đề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinhĐề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinh
 
Exploring Gemini AI and Integration with MuleSoft | MuleSoft Mysore Meetup #45
Exploring Gemini AI and Integration with MuleSoft | MuleSoft Mysore Meetup #45Exploring Gemini AI and Integration with MuleSoft | MuleSoft Mysore Meetup #45
Exploring Gemini AI and Integration with MuleSoft | MuleSoft Mysore Meetup #45
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
 

The Terrorism Knowledge Portal: Advanced Methodologies for Collecting and Analyzing Information from the ‘Dark Web’ and Terrorism Research Resources

  • 1. The Terrorism Knowledge Portal Advanced Methodologies for Collecting and Analyzing Information from the “Dark Web” and Terrorism Research Resources By: Hsinchun Chen, PhD, with Wingyan Chung; Cathy Larson; Edna Reid, DLS; Wei Xi; Alfonso Bonillas; Chun Yin; Yu Su and Greg Lai; The University of Arizona August 14, 2003 We gratefully acknowledge support from the National Science Foundation
  • 2. “ There is a potential here to reach millions [Black said of the Internet]. I think it’s a major breakthrough. I don’t know if it’s the ultimate solution to developing a white rights movement in this country, but it’s certainly a significant advance.” -- Don Black, white supremacist, KKK, launched Stormfront , the first extremist hate web site on WWW “ Up until now, unless someone met me personally, or read my material, the only way they could judge me is by what the liberal-biased media says. Now, that situation has changed. Millions of people are going online in America. Now, if they want to find out about me and my ideas and issues all they have to do is go into one of the search engines and search for “David Duke.” Hundreds [actually about 1,080,000] of sources will show up.”-- David Duke, Knights of the KKK, in “The Coming White Revolution – Born on the Internet”
  • 3. “ Terrorist groups are increasingly using new information technology and the Internet to formulate plans, recruit members, communicate between cells and members, raise funds, and spread propaganda. Terrorist groups including Hizballah, the Abu Nidal Organization, and bin Laden’s Al-Queda Organization are using computerized files, email, and encryption to support their operations.” – Louis J. Freeh, Director, FBI, Congressional Statement, “Threat of Terrorism to the United States,” 2001
  • 4.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11. Review of Terrorism Research Information and Terrorist Groups
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19. Data Collection and Data Analysis for Testbed Creation An Overview and Analysis of Potential Methods
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 29.
  • 30. Information Sources Collection Methods Automatic Spidering Back link search Personal Profile Search Meta Searching Downloading from Gov’t Web sites Filtering Data Storage Domestic Terrorism International Terrorism Terrorism research information The Web Dark Web Hate Groups | Racial Supremacy | Suicidal Attackers | Activists / Extremists | Anti-Government | … Terrorist Group Web sites Search Engines Terrorism databases Government information
  • 31.
  • 32.
  • 33.
  • 34.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42. Contact: Hsinchun Chen [email_address] For more information, please visit http://ai.eller.arizona.edu/