Abstract
Extremist organizations are heavily utilizing Internet technologies to increase their abilities to influence the world. Studying those global extremist organizations’ Internet presence would allow us to better understand extremist organizations’ technical sophistication and their propaganda plans. In this work, we explore an integrated approach for collecting and analyzing extremist Internet presence. We employed automatic Web crawling techniques to build a comprehensive international extremist Web collection. We then used a systematic content analysis tool called the Dark Web Attribute System to analyze and compare these extremist organizations’ Internet usage from three perspectives: technical sophistication, content richness, and Web interactivity. By studying 1.7 million multimedia Web documents from around 224 Web sites of extremist organizations, we found that while all extremist organizations covered in this study demonstrate high level of technical sophistication in their Web presence, Middle Eastern extremists are among the most sophisticated groups in both technical sophistication and media richness. US groups are the most active in supporting Internet communications. Our analysis results will help domain experts deepen their understanding on the global extremism movements and make better counter-extremism measures on the Internet.
Similar content being viewed by others
References
9/11 Commision Report. (2004). Published by the National Commission on Terrorist Attacks Upon the United States, available at http://govinfo.library.unt.edu/911/report/911Report.pdf
Albertsen, K. (2003). The Paradigma Web Harvesting Environment. In Proc. of 3rd European Conference of Research and Advanced Technology for Digital Libraries (ECDL) Workshop on Web Archives 2003.
Armstrong, H. L., & Forde, P. J. (2003). Internet anonymity practices in computer crime. Information Management & Computer Security, 11(5), 209–215.
Bowers, F. (2004). Terrorists spread their messages online. Christian Science Monitor, July 28, 2004, available at http://www.csmonitor.com/2004/0728/p03s01-usgn.htm.
Bunt, G. R. (2003). Islam in the Digital Age: E-jihad, Online Fatwas and Cyber Islamic Environments. London: Pluto Press.
Burris, V., Smith, E., & Strahm, A. (2000). White supremacist networks on the Internet. Sociological focus, 33(2), 215-234.
Chau, M., & Chen, H. (2003). Comparison of three vertical search spiders. IEEE Computer, 36, 56–62.
Chau, M., Qin, J., Zhou, Y., Tseng, C., & Chen, H. (2008). SpidersRUs: creating specialized search engines in multiple languages. Decision Support Systems, 45, 621–640.
Chen, H., Qin, J., Reid, E., Chung, W., Zhou, Y., Xi, W., et al. (2004). The Dark Web Portal: Collecting and Analyzing the Presence of Domestic and International Terrorist Groups on the Web. In Proc. of International IEEE Conference on Intelligent Transportation Systems.
Chou, C. (2003). Interactivity and interactive functions in web-based learning systems: a technical framework for designers. British Journal of Educational Technology, 34(3), 265–279.
Coll, S. & Glasser, S. B. (2005). Terrorists Turn to the Web as Base of Operations. Washington Post, Aug 7, 2005.
Demchak, C., Friis, C., & La Porte, T. M. (2001). Webbing governance: National differences in constructing the face of public organizations. Handbook of public information systems. G. D. Garson. NYC: Marcel Dekker.
Denning, D. E. (2004). Information Operations and Terrorism,” Journal of Information Warfare (draft), 2004, available at http://www.jinfowar.com.
Gerstenfeld, P. B., Grant, D. R., & Chiang, C. (2003). Hate Online: A Content Analysis of Extremist Internet Sites. Analyses of Social Issues and Public Policy, 3(1), 29-44.
Internet Haganah, Internet Haganah report, 2005, available at http://en.wikipedia.org/wiki/Internet_Haganah.
ISTS (2004). Examining the Cyber Capabilities of Islamic Terrorist Groups”. Report, Institute for Security Technology Studies, 2004. http://www.ists.dartmouth.edu/
Jenkins, B. M. (2004). World becomes the hostage of media-savvy terrorists: Commentary. USA Today, August 22, 2004. http://www.rand.org/.
Kleinberg, J. (1999). Authoritative Sources in a Hyperlinked Environment. Journal of the ACM, 46(5), 604-632.
Muriel, D. (2004). Terror Moves to the Virtual World. CNN News, April 8, 2004, available at http://edition.cnn.com/2004/TECH/04/08/internet.terror/.
Nunnelly, J. (1978). Psychometric theory. New York: McGraw Hill.
Palmer, J. W., & Griffith, D. A. (1998). An emerging model of Web site design for marketing. Communications of the ACM, 41(3), 45–51.
Qin, J., Zhou, Y., Reid, E., Lai, G., & Chen, H. (2007). Analyzing terror campaigns on the internet: technical sophistication, content richness, and Web interactivity. International Journal on Human Computer Studies, 65(1), 71–84.
Schneider, S. M., Foot, K., Kimpton, M., & Jones, G. (2003). Building thematic web collections: Challenges and experiences from the September 11 Web Archive and the Election 2002 Web Archive. In Proc. of the 3rd ECDL Workshop on Web Archives, Trondheim, Norway, August 2003.
SITE (2004). Special report published by SITE Institute, http://siteinstitute.org.
Thomas, T. L. (2003). Al Qaeda and the Internet: The Danger of ‘Cyberplanning’. Parameters, Spring 2003, pp. 112–23, available at http://carlisle-www.army.mil/usawc/Parameters/03spring/thomas.htm.
Tsfati, Y., & Weimann, G. (2002). www.terrorism.com: terror on the internet. Studies in Conflict & Terrorism, 25, 317–332.
Weimann, G. (2004). www.terror.net: How modern terrorism use the internet. Special Report, U.S. Institute of Peace. Available at http://www.usip.org/pubs/specialreports/sr116.pdf.
Whine, M. (1999). Cyberspace: A new medium for communication, command and control by extremists. Available at http://www.ict.org.il/articles/cyberspace.htm
Zhou, Y., Reid, E., Qin, J., Chen, H., & Lai, G. (2005). U.S. domestic extremist groups on the Web: link and content analysis. IEEE Intelligent Systems Special Issue on Homeland Security, 20(5), 44–51.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Qin, J., Zhou, Y. & Chen, H. A multi-region empirical study on the internet presence of global extremist organizations. Inf Syst Front 13, 75–88 (2011). https://doi.org/10.1007/s10796-010-9277-6
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10796-010-9277-6