Semantic Analysis Supporting De-Radicalisation

Internet and Social media are widely used by terrorist organizations to spread their ideas and recruit foreign fighters. The aim of SAFFRON project is to build a system able to support early detection of foreign fighters' recruitment by terrorist groups in Europe. It consists in studying recruitment communication strategies on social media (e.g. narrations, argumentative tropes and myths used), and their evolution in time, as well as in identifying needs, values, cultural and social contexts of the target groups (young foreign fighters). In this paper, we will describe Safapp, the application developed to support semantic analysis of social network. We focus on how SAFFRON makes use of natural language processing and machine learning to categorize and analyse messages dealing with recruitment and radicalization on social networks.

[1]  Luca Dini,et al.  SOMA: The Smart Social Customer Relationship Management Tool , 2017 .

[2]  Peter D. Turney Thumbs Up or Thumbs Down? Semantic Orientation Applied to Unsupervised Classification of Reviews , 2002, ACL.

[3]  Lucien Tesnière Éléments de syntaxe structurale , 1959 .

[4]  Adib Bencherif Social Networks, Terrorism and Counter-terrorism. Radical and Connected, Martin Bouchard (dir.), 2015, New York, Routledge, 256 p. , 2016 .

[5]  Paola Velardi,et al.  TermExtractor: a Web Application to Learn the Shared Terminology of Emergent Web Communities , 2007, IESA.

[6]  Sigrid Maurel,et al.  Sybille : anatomie d’un système automatique d’extraction de termes de sentiment , 2019, Le Lexique des émotions.

[7]  Ioannis Partalas,et al.  Learning to Search for Recognizing Named Entities in Twitter , 2016, NUT@COLING.

[8]  Magnus Ranstorp,et al.  Understanding Violent Radicalisation : Terrorist and Jihadist Movements in Europe , 2010 .

[9]  James H. Martin,et al.  Speech and Language Processing: An Introduction to Natural Language Processing, Computational Linguistics, and Speech Recognition , 2000 .

[10]  Hamed El-Said,et al.  New Approaches to Countering Terrorism , 2015 .

[11]  Michael I. Jordan,et al.  Latent Dirichlet Allocation , 2001, J. Mach. Learn. Res..

[12]  Dan Roth,et al.  The Importance of Syntactic Parsing and Inference in Semantic Role Labeling , 2008, CL.

[13]  Thomas J. Holt,et al.  Exploring the behavioral and attitudinal correlates of civilian cyberattacks , 2015 .

[14]  Khairullah Khan,et al.  A Review of Machine Learning Algorithms for Text-Documents Classification , 2010 .

[15]  Mihai Surdeanu,et al.  The Stanford CoreNLP Natural Language Processing Toolkit , 2014, ACL.

[16]  Andrew McCallum,et al.  Using Maximum Entropy for Text Classification , 1999 .

[17]  Roger Levy,et al.  Tregex and Tsurgeon: tools for querying and manipulating tree data structures , 2006, LREC.

[18]  Jeffrey Dean,et al.  Efficient Estimation of Word Representations in Vector Space , 2013, ICLR.

[19]  Razvan C. Bunescu,et al.  Sentiment analyzer: extracting sentiments about a given topic using natural language processing techniques , 2003, Third IEEE International Conference on Data Mining.

[20]  Brendan T. O'Connor,et al.  Part-of-Speech Tagging for Twitter: Annotation, Features, and Experiments , 2010, ACL.