Contagion dynamics of extremist propaganda in social networks

Recent terrorist attacks carried out on behalf of ISIS on American and European soil by lone wolf attackers or sleeper cells remind us of the importance of understanding the dynamics of radicalization mediated by social media communication channels. In this paper, we shed light on the social media activity of a group of twenty-five thousand users whose association with ISIS online radical propaganda has been manually verified. By using a computational tool known as dynamic activity-connectivity maps, based on network and temporal activity patterns, we investigate the dynamics of social influence within ISIS supporters. We finally quantify the effectiveness of ISIS propaganda by determining the adoption of extremist content in the general population and draw a parallel between radical propaganda and epidemics spreading, highlighting that information broadcasters and influential ISIS supporters generate highly-infectious cascades of information contagion. Our findings will help generate effective countermeasures to combat the group and other forms of online extremism.

[1]  Emilio Ferrara,et al.  Measuring Emotional Contagion in Social Media , 2015, PloS one.

[2]  Ashish Sureka,et al.  Spider and the Flies : Focused Crawling on Tumblr to Detect Hate Promoting Communities , 2016, ArXiv.

[3]  Ashish Sureka,et al.  Using KNN and SVM Based One-Class Classifier for Detecting Online Radicalization on Twitter , 2015, ICDCIT.

[4]  Huan Liu,et al.  Is the Sample Good Enough? Comparing Data from Twitter's Streaming API with Twitter's Firehose , 2013, ICWSM.

[5]  Damon Centola An Experimental Study of Homophily in the Adoption of Health Behavior , 2011, Science.

[6]  Emilio Ferrara,et al.  Disinformation and Social Bot Operations in the Run Up to the 2017 French Presidential Election , 2017, First Monday.

[7]  Filippo Menczer,et al.  Evolution of online user behavior during a social upheaval , 2014, WebSci '14.

[8]  Max Nanis,et al.  Socialbots: voices from the fronts , 2012, INTR.

[9]  Matteo Vergani,et al.  The evolution of the ISIS' language: a quantitative analysis of the language of the first year of Dabiq magazine , 2015 .

[10]  J. Wallinga,et al.  Different Epidemic Curves for Severe Acute Respiratory Syndrome Reveal Similar Impacts of Control Measures , 2004, American journal of epidemiology.

[11]  Ashish Sureka,et al.  Learning to Classify Hate and Extremism Promoting Tweets , 2014, 2014 IEEE Joint Intelligence and Security Informatics Conference.

[12]  Emilio Ferrara,et al.  Social Bots Distort the 2016 US Presidential Election Online Discussion , 2016, First Monday.

[13]  Amos Azaria,et al.  The DARPA Twitter Bot Challenge , 2016, Computer.

[14]  A. Fisher How Jihadist Networks Maintain a Persistent Online Presence , 2015 .

[15]  Francisco Herrera,et al.  Managing consensus based on leadership in opinion dynamics , 2017, Inf. Sci..

[16]  Emilio Ferrara,et al.  The rise of Jihadist propaganda on social networks , 2017, Journal of Computational Social Science.

[17]  Cun-Quan Zhang,et al.  A Hierarchical Algorithm for Clustering Extremist Web Pages , 2010, 2010 International Conference on Advances in Social Networks Analysis and Mining.

[18]  Guido Caldarelli,et al.  Science vs Conspiracy: Collective Narratives in the Age of Misinformation , 2014, PloS one.

[19]  Filippo Menczer,et al.  The Digital Evolution of Occupy Wall Street , 2013, PloS one.

[20]  Elnour Hamad,et al.  ISIS: Inside the Army of Terror , 2015 .

[21]  Timothy R. Tangherlini,et al.  “Mommy Blogs” and the Vaccination Exemption Narrative: Results From A Machine-Learning Approach for Story Aggregation on Parenting Social Media Sites , 2016, JMIR public health and surveillance.

[22]  Ciro Cattuto,et al.  Dynamical classes of collective attention in twitter , 2011, WWW.

[23]  Philip N. Howard,et al.  Bots, #StrongerIn, and #Brexit: Computational Propaganda during the UK-EU Referendum , 2016, ArXiv.

[24]  Jacob Ratkiewicz,et al.  Detecting and Tracking Political Abuse in Social Media , 2011, ICWSM.

[25]  Piotr Sapiezynski,et al.  Evidence of complex contagion of information in social media: An experiment using Twitter bots , 2017, PloS one.

[26]  Emilio Ferrara,et al.  "Manipulation and abuse on social media" by Emilio Ferrara with Ching-man Au Yeung as coordinator , 2015, SIGWEB Newsl..

[27]  Sara Reardon Terrorism: Science seeks roots of terror. , 2015, Nature.

[28]  Ashish Sureka,et al.  Applying Social Media Intelligence for Predicting and Identifying On-line Radicalization and Civil Unrest Oriented Threats , 2015, ArXiv.

[29]  Filippo Menczer,et al.  Online Human-Bot Interactions: Detection, Estimation, and Characterization , 2017, ICWSM.

[30]  B. Ganor,et al.  Who matters online: measuring influence, evaluating content and countering violent extremism in online social networks , 2013 .

[31]  J. Pennebaker,et al.  The Psychological Meaning of Words: LIWC and Computerized Text Analysis Methods , 2010 .

[32]  Sebastian Funk,et al.  Spatial and temporal dynamics of superspreading events in the 2014–2015 West Africa Ebola epidemic , 2017, Proceedings of the National Academy of Sciences.

[33]  Uffe Kock Wiil,et al.  Criminal network investigation , 2014, Security Informatics.

[34]  Alan F. Smeaton,et al.  Combining Social Network Analysis and Sentiment Analysis to Explore the Potential for Online Radicalisation , 2009, 2009 International Conference on Advances in Social Network Analysis and Mining.

[35]  P. Kumaraguru,et al.  $1.00 per RT #BostonMarathon #PrayForBoston: Analyzing fake content on Twitter , 2013, 2013 APWG eCrime Researchers Summit.

[36]  Walid Magdy,et al.  #FailedRevolutions: Using Twitter to study the antecedents of ISIS support , 2015, First Monday.

[37]  Pasquale De Meo,et al.  Network Structure and Resilience of Mafia Syndicates , 2015, Inf. Sci..

[38]  Y. Vorobyeva,et al.  New online ecology of adversarial aggregates: ISIS and beyond , 2016, Science.

[39]  G. Caldarelli,et al.  The spreading of misinformation online , 2016, Proceedings of the National Academy of Sciences.

[40]  P. Metaxas,et al.  Social Media and the Elections , 2012, Science.

[41]  Yamir Moreno,et al.  Broadcasters and Hidden Influentials in Online Protest Diffusion , 2012, ArXiv.

[42]  Margaret E. Roberts,et al.  How the Chinese Government Fabricates Social Media Posts for Strategic Distraction, Not Engaged Argument , 2017, American Political Science Review.

[43]  Hsinchun Chen,et al.  Uncovering the dark Web: A case study of Jihad on the Web , 2008, J. Assoc. Inf. Sci. Technol..

[44]  Ashish Sureka,et al.  Solutions to Detect and Analyze Online Radicalization : A Survey , 2013, ArXiv.

[45]  Susan C. Herring,et al.  ISIS vs. the U.S. government: A war of online video propaganda , 2015, First Monday.

[46]  Filippo Menczer,et al.  The rise of social bots , 2014, Commun. ACM.

[47]  Muhammad Abdul-Mageed,et al.  Subjectivity and Sentiment Analysis of Arabic: A Survey , 2012, AMLTA.

[48]  Emilio Ferrara,et al.  Manipulation and Abuse on Social Media , 2015, ArXiv.

[49]  C. Althaus Estimating the Reproduction Number of Ebola Virus (EBOV) During the 2014 Outbreak in West Africa , 2014, PLoS currents.

[50]  Christophe Fraser,et al.  HIV-1 transmission, by stage of infection. , 2008, The Journal of infectious diseases.

[51]  Matthew Rowe,et al.  Mining Pro-ISIS Radicalisation Signals from Social Media Users , 2016, ICWSM.

[52]  Ashish Sureka,et al.  A focused crawler for mining hate and extremism promoting videos on YouTube. , 2014, HT.

[53]  Jeffrey T. Hancock,et al.  Experimental evidence of massive-scale emotional contagion through social networks , 2014, Proceedings of the National Academy of Sciences.

[54]  Emilio Ferrara,et al.  Quantifying the Effect of Sentiment on Information Diffusion in Social Media , 2015, PeerJ Comput. Sci..

[55]  Jessica Stern,et al.  ISIS: The State of Terror , 2015 .

[56]  Jacob Ratkiewicz,et al.  OSoMe: The IUNI observatory on social media , 2016, PeerJ Prepr..

[57]  A. Pentland,et al.  Life in the network: The coming age of computational social science: Science , 2009 .

[58]  Yamir Moreno,et al.  The Dynamics of Protest Recruitment through an Online Network , 2011, Scientific reports.

[59]  Alessandro Flammini,et al.  Predicting online extremism, content adopters, and interaction reciprocity , 2016, SocInfo.

[60]  Quirin Schiermeier Terrorism: Terror prediction hits limits. , 2015, Nature.

[61]  J. M. Berger,et al.  The ISIS Twitter census: defining and describing the population of ISIS supporters on Twitter , 2015 .

[62]  Damon Centola,et al.  The Spread of Behavior in an Online Social Network Experiment , 2010, Science.

[63]  Ruiguang Song,et al.  Estimated HIV Incidence in the United States, 2006–2009 , 2011, PloS one.

[64]  Christopher D. Manning,et al.  Better Arabic Parsing: Baselines, Evaluations, and Analysis , 2010, COLING.

[65]  J. Robins,et al.  Transmissibility of 1918 pandemic influenza , 2004, Nature.

[66]  Hosung Park,et al.  What is Twitter, a social network or a news media? , 2010, WWW '10.

[67]  Matthew S. Gerber,et al.  Automatic detection of cyber-recruitment by violent extremists , 2014, Security Informatics.