Uncovering the dark Web: A case study of Jihad on the Web

While the Web has become a worldwide platform for communication, terrorists share their ideology and communicate with members on the “Dark Web”—the reverse side of the Web used by terrorists. Currently, the problems of information overload and difficulty to obtain a comprehensive picture of terrorist activities hinder effective and efficient analysis of terrorist information on the Web. To improve understanding of terrorist activities, we have developed a novel methodology for collecting and analyzing Dark Web information. The methodology incorporates information collection, analysis, and visualization techniques, and exploits various Web information sources. We applied it to collecting and analyzing information of 39 Jihad Web sites and developed visualization of their site contents, relationships, and activity levels. An expert evaluation showed that the methodology is very useful and promising, having a high potential to assist in investigation and understanding of terrorist activities by producing results that could potentially help guide both policymaking and intelligence research. © 2008 Wiley Periodicals, Inc.

[1]  Lee S. Strickland,et al.  Technology, security, and individual privacy: New tools, new threats, and new public perceptions , 2005, J. Assoc. Inf. Sci. Technol..

[2]  Y. Tsfati,et al.  www.terrorism.com: Terror on the Internet , 2002 .

[3]  Hsinchun Chen,et al.  EBizPort: Collecting and analyzing business intelligence information , 2004, J. Assoc. Inf. Sci. Technol..

[4]  John M. Chambers,et al.  Graphical Methods for Data Analysis , 1983 .

[5]  Abraham Kandel,et al.  Multi-lingual Detection of Terrorist Content on the Web , 2006, WISI.

[6]  Wingyan Chung,et al.  Visualising e-business stakeholders on the Web: a methodology and experimental results , 2008, Int. J. Electron. Bus..

[7]  T. Thomas Al Qaeda and the Internet: The Danger of “Cyberplanning” , 2003, Parameters.

[8]  Beat Kleiner,et al.  Graphical Methods for Data Analysis , 1983 .

[9]  Marc Sageman,et al.  Understanding terror networks. , 2004, International journal of emergency mental health.

[10]  Hsinchun Chen,et al.  MetaSpider: Meta-searching and categorization on the Web , 2001, J. Assoc. Inf. Sci. Technol..

[11]  Ted E. Senator,et al.  Countering terrorism through information technology , 2004, CACM.

[12]  Jay F. Nunamaker,et al.  A Visual Framework for Knowledge Discovery on the Web: An Empirical Study of Business Intelligence Exploration , 2005, J. Manag. Inf. Syst..

[13]  William A. Kealy Knowledge Maps and Their Use in Computer-Based Collaborative Learning Environments , 2001 .

[14]  Tetsuya Nasukawa,et al.  Text analysis and knowledge mining system , 2001, IBM Syst. J..

[15]  Hsinchun Chen,et al.  Internet Categorization and Search: A Self-Organizing Approach , 1996, J. Vis. Commun. Image Represent..

[16]  Oren Etzioni,et al.  The World-Wide Web: quagmire or gold mine? , 1996, CACM.

[17]  Hsinchun Chen,et al.  Evaluating event visualization: a usability study of COPLINK spatio-temporal visualizer , 2005, Int. J. Hum. Comput. Stud..

[18]  S. C. Hui,et al.  Mining a Web Citation Database for author co-citation analysis , 2002, Inf. Process. Manag..

[19]  Forrest W. Young Multidimensional Scaling: History, Theory, and Applications , 1987 .

[20]  Gang Wang,et al.  Internet searching and browsing in a multilingual world: An experiment on the Chinese Business Intelligence Portal (CBizPort) , 2004, J. Assoc. Inf. Sci. Technol..

[21]  Hsinchun Chen,et al.  Web mining: Machine learning for web applications , 2005, Annu. Rev. Inf. Sci. Technol..

[22]  Sean B. Eom,et al.  The contributions of organizational science to the development of decision support systems research subspecialties , 1996 .

[23]  Susan Karr The United States Government , 2007 .

[24]  Hsinchun Chen,et al.  Introduction to the special topic issue: Intelligence and security informatics , 2005, J. Assoc. Inf. Sci. Technol..

[25]  Hsinchun Chen,et al.  Criminal network analysis and visualization , 2005, CACM.