SlideShare uma empresa Scribd logo
1 de 42
The Terrorism Knowledge Portal Advanced Methodologies for Collecting and Analyzing Information from the “Dark Web” and Terrorism Research Resources By:  Hsinchun Chen, PhD, with Wingyan Chung; Cathy Larson; Edna Reid, DLS; Wei Xi; Alfonso Bonillas; Chun Yin; Yu Su and Greg Lai;  The University of Arizona August 14, 2003 We gratefully acknowledge support from the National Science Foundation
“ There is a potential here to reach millions [Black said of the Internet]. I think it’s a major breakthrough. I don’t know if it’s the ultimate solution to developing a white rights movement in this country, but it’s certainly a significant advance.” -- Don Black, white supremacist, KKK, launched  Stormfront , the first extremist hate web site on WWW “ Up until now, unless someone met me personally, or read my material, the only way they could judge me is by what the liberal-biased media says. Now, that situation has changed. Millions of people are going online in America. Now, if they want to find out about me and my ideas and issues all they have to do is go into one of the search engines and search for “David Duke.” Hundreds [actually about 1,080,000] of sources will show up.”-- David Duke, Knights of the KKK, in  “The Coming White Revolution – Born on the Internet”
“ Terrorist groups are increasingly using new information technology and the Internet to formulate plans, recruit members, communicate between cells and members, raise funds, and spread propaganda. Terrorist groups including Hizballah, the Abu Nidal Organization, and bin Laden’s Al-Queda Organization are using computerized files, email, and encryption to support their operations.” – Louis J. Freeh, Director, FBI, Congressional Statement,  “Threat of Terrorism to the United States,”  2001
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Background
Misuse of the Internet ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Important Definitions ,[object Object],[object Object],[object Object],Source:  U.S. State Dept.,  Patterns of Global Terrorism 2002 .  “The US Government has employed this definition of terrorism for statistical and analytical purposes since 1983.”
Intelligence from the Dark Web ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Problems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Terrorist Knowledge Portal ,[object Object],[object Object],[object Object],[object Object]
Review of Terrorism Research Information and Terrorist Groups
Review ,[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Information about Terrorism
A Few Examples ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
From the Dark Web: Domestic Terrorist Groups ,[object Object],[object Object],Numerous groups have openly posted their web sites to the public web, but many more are not so easily accessible
From the Dark Web: International Groups ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
From the Dark Web: International Groups ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
From the Dark Web: Findings ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Data Collection and Data Analysis for Testbed Creation An Overview and Analysis of Potential Methods
Purpose ,[object Object],[object Object],[object Object],[object Object],[object Object]
Data Collection Methods (1) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Data Collection Methods (2) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Data Collection Methods (3) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Data Collection Methods (4) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Other methods ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Data Analysis (1) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Data Analysis (2) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Proposed Methodology
An Automatic Text Mining Approach  ,[object Object],[object Object],[object Object],[object Object],[object Object]
Information Sources Collection Methods Automatic Spidering Back link search Personal Profile Search Meta Searching Downloading from Gov’t Web sites Filtering Data Storage Domestic Terrorism International Terrorism Terrorism research information The Web Dark Web Hate Groups | Racial Supremacy | Suicidal Attackers | Activists / Extremists | Anti-Government |  …  Terrorist Group Web sites Search Engines Terrorism databases Government information
Testbeds ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],The basic unit in each testbed is a Web page, article or report
Plan for Developing the Testbed ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Research Issues ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Challenges ,[object Object],[object Object],[object Object],[object Object],[object Object]
Current Progress
Current Progress ,[object Object],[object Object],[object Object],[object Object]
Terrorism Knowledge Portal (1) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Terrorism Knowledge Portal (2) ,[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object]
Dark Web testbed: Domestic Terrorist Groups ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Dark Web testbed: International Terrorist Groups ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Contact: Hsinchun Chen [email_address] For more information, please visit http://ai.eller.arizona.edu/

Mais conteúdo relacionado

Mais procurados

Information Retrieval and Social Media
Information Retrieval and Social MediaInformation Retrieval and Social Media
Information Retrieval and Social MediaArjen de Vries
 
Internet Resources Power Point
Internet Resources Power PointInternet Resources Power Point
Internet Resources Power PointPhillip0582
 
Freewebslideshare
FreewebslideshareFreewebslideshare
Freewebslidesharefreeweb
 
Online Searching Tips
Online Searching TipsOnline Searching Tips
Online Searching TipsMindy McAdams
 
Data-Mining Twitter for Political Science -Hickman, Alfredo - Honors Thesis
Data-Mining Twitter for Political Science -Hickman, Alfredo - Honors ThesisData-Mining Twitter for Political Science -Hickman, Alfredo - Honors Thesis
Data-Mining Twitter for Political Science -Hickman, Alfredo - Honors ThesisAlfredo Hickman
 
Information literacy
Information literacyInformation literacy
Information literacySean Socha
 
Deep Web
Deep WebDeep Web
Deep WebSt John
 
Super Searching 3
Super Searching 3Super Searching 3
Super Searching 3lwmurray1
 
Annex 9 Recap Knowledge, Learning, Networks
Annex 9 Recap Knowledge, Learning, NetworksAnnex 9 Recap Knowledge, Learning, Networks
Annex 9 Recap Knowledge, Learning, NetworksRAIN Foundation
 
BIZ 2401 First Class
BIZ 2401 First ClassBIZ 2401 First Class
BIZ 2401 First ClassTraciwm
 
Cross-Platform Profiling tutorial at the Digital Methods Summer School 2013
Cross-Platform Profiling tutorial at the Digital Methods Summer School 2013Cross-Platform Profiling tutorial at the Digital Methods Summer School 2013
Cross-Platform Profiling tutorial at the Digital Methods Summer School 2013Digital Methods Initiative
 
What Your Tweets Tell Us About You, Speaker Notes
What Your Tweets Tell Us About You, Speaker NotesWhat Your Tweets Tell Us About You, Speaker Notes
What Your Tweets Tell Us About You, Speaker NotesKrisKasianovitz
 

Mais procurados (19)

Information Retrieval and Social Media
Information Retrieval and Social MediaInformation Retrieval and Social Media
Information Retrieval and Social Media
 
Internet Resources Power Point
Internet Resources Power PointInternet Resources Power Point
Internet Resources Power Point
 
HathiTrust
HathiTrustHathiTrust
HathiTrust
 
Freewebslideshare
FreewebslideshareFreewebslideshare
Freewebslideshare
 
Online Searching Tips
Online Searching TipsOnline Searching Tips
Online Searching Tips
 
Introtointernet1
Introtointernet1Introtointernet1
Introtointernet1
 
Data-Mining Twitter for Political Science -Hickman, Alfredo - Honors Thesis
Data-Mining Twitter for Political Science -Hickman, Alfredo - Honors ThesisData-Mining Twitter for Political Science -Hickman, Alfredo - Honors Thesis
Data-Mining Twitter for Political Science -Hickman, Alfredo - Honors Thesis
 
Information literacy
Information literacyInformation literacy
Information literacy
 
Deep Web
Deep WebDeep Web
Deep Web
 
Deep web Seminar
Deep web Seminar Deep web Seminar
Deep web Seminar
 
How to share and publish data: resources, law, and policy
How to share and publish data: resources, law, and policyHow to share and publish data: resources, law, and policy
How to share and publish data: resources, law, and policy
 
Super Searching 3
Super Searching 3Super Searching 3
Super Searching 3
 
Annex 9 Recap Knowledge, Learning, Networks
Annex 9 Recap Knowledge, Learning, NetworksAnnex 9 Recap Knowledge, Learning, Networks
Annex 9 Recap Knowledge, Learning, Networks
 
BIZ 2401 First Class
BIZ 2401 First ClassBIZ 2401 First Class
BIZ 2401 First Class
 
Cross-Platform Profiling tutorial at the Digital Methods Summer School 2013
Cross-Platform Profiling tutorial at the Digital Methods Summer School 2013Cross-Platform Profiling tutorial at the Digital Methods Summer School 2013
Cross-Platform Profiling tutorial at the Digital Methods Summer School 2013
 
What Your Tweets Tell Us About You, Speaker Notes
What Your Tweets Tell Us About You, Speaker NotesWhat Your Tweets Tell Us About You, Speaker Notes
What Your Tweets Tell Us About You, Speaker Notes
 
Evaluating websites2
Evaluating websites2Evaluating websites2
Evaluating websites2
 
Using Search Engines
Using Search EnginesUsing Search Engines
Using Search Engines
 
63demo dfa
63demo dfa63demo dfa
63demo dfa
 

Destaque (10)

Scuba diving into The Deep Dark Web
Scuba diving into The Deep Dark WebScuba diving into The Deep Dark Web
Scuba diving into The Deep Dark Web
 
Deep web (Dark side)
Deep web (Dark side)Deep web (Dark side)
Deep web (Dark side)
 
Dark web markets: from the silk road to alphabay, trends and developments
Dark web markets: from the silk road to alphabay, trends and developmentsDark web markets: from the silk road to alphabay, trends and developments
Dark web markets: from the silk road to alphabay, trends and developments
 
The Dark Net
The Dark NetThe Dark Net
The Dark Net
 
Deep Web & Dark Web
Deep Web & Dark WebDeep Web & Dark Web
Deep Web & Dark Web
 
The Dark Web
The Dark WebThe Dark Web
The Dark Web
 
Dark Web and Privacy
Dark Web and PrivacyDark Web and Privacy
Dark Web and Privacy
 
Darknet
DarknetDarknet
Darknet
 
Deep web
Deep webDeep web
Deep web
 
The Deep and Dark Web
The Deep and Dark WebThe Deep and Dark Web
The Deep and Dark Web
 

Semelhante a The Terrorism Knowledge Portal: Advanced Methodologies for Collecting and Analyzing Information from the ‘Dark Web’ and Terrorism Research Resources

The impact of internet in radicalization of terrorists.docx
The impact of internet in radicalization of terrorists.docxThe impact of internet in radicalization of terrorists.docx
The impact of internet in radicalization of terrorists.docx4934bk
 
Should the ″Dark Web″ be monitored, shut down completely, or left alone?
Should the ″Dark Web″ be monitored, shut down completely, or left alone?Should the ″Dark Web″ be monitored, shut down completely, or left alone?
Should the ″Dark Web″ be monitored, shut down completely, or left alone?Kimberly Williams
 
Wini's Presentation on Racial Cyberhates Targeting Young People
Wini's Presentation on Racial Cyberhates Targeting Young PeopleWini's Presentation on Racial Cyberhates Targeting Young People
Wini's Presentation on Racial Cyberhates Targeting Young Peopleartatipratiwi
 
Dark web presentation
Dark web presentationDark web presentation
Dark web presentationTo Mal
 
Ass3 Summative
Ass3 SummativeAss3 Summative
Ass3 Summativemani125
 
Rogers studyingpoliticalissues mar2014_optimized_ii_
Rogers studyingpoliticalissues mar2014_optimized_ii_Rogers studyingpoliticalissues mar2014_optimized_ii_
Rogers studyingpoliticalissues mar2014_optimized_ii_Digital Methods Initiative
 
A Semantic Graph-based Approach for Radicalisation Detection on Social Media
A Semantic Graph-based Approach for Radicalisation Detection on Social MediaA Semantic Graph-based Approach for Radicalisation Detection on Social Media
A Semantic Graph-based Approach for Radicalisation Detection on Social MediaCOMRADES project
 
1. Discussion Points (Use your browser to conduct research on the .docx
1. Discussion Points (Use your browser to conduct research on the .docx1. Discussion Points (Use your browser to conduct research on the .docx
1. Discussion Points (Use your browser to conduct research on the .docxSONU61709
 
Online Journalism Story Ideas Feb12 2008[1]
Online Journalism Story Ideas Feb12 2008[1]Online Journalism Story Ideas Feb12 2008[1]
Online Journalism Story Ideas Feb12 2008[1]Neil Foote
 
Capstone_SingleSpaced
Capstone_SingleSpacedCapstone_SingleSpaced
Capstone_SingleSpacedCameron Banks
 
Searchthewebtutorial2014
Searchthewebtutorial2014Searchthewebtutorial2014
Searchthewebtutorial2014Joyce Miller
 
Future_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RESFuture_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RESJenny O'Meara
 
Fake news learner packet
Fake news learner packetFake news learner packet
Fake news learner packetPhill Briscoe
 
Library session for POLS 3760 - Looking at Alternative Viewpoints
Library session for POLS 3760 - Looking at Alternative ViewpointsLibrary session for POLS 3760 - Looking at Alternative Viewpoints
Library session for POLS 3760 - Looking at Alternative ViewpointsChris Chan
 
Terrorism 15 May 2009
Terrorism 15 May 2009Terrorism 15 May 2009
Terrorism 15 May 2009karsalan
 

Semelhante a The Terrorism Knowledge Portal: Advanced Methodologies for Collecting and Analyzing Information from the ‘Dark Web’ and Terrorism Research Resources (20)

The impact of internet in radicalization of terrorists.docx
The impact of internet in radicalization of terrorists.docxThe impact of internet in radicalization of terrorists.docx
The impact of internet in radicalization of terrorists.docx
 
Should the ″Dark Web″ be monitored, shut down completely, or left alone?
Should the ″Dark Web″ be monitored, shut down completely, or left alone?Should the ″Dark Web″ be monitored, shut down completely, or left alone?
Should the ″Dark Web″ be monitored, shut down completely, or left alone?
 
Wini's Presentation on Racial Cyberhates Targeting Young People
Wini's Presentation on Racial Cyberhates Targeting Young PeopleWini's Presentation on Racial Cyberhates Targeting Young People
Wini's Presentation on Racial Cyberhates Targeting Young People
 
Julie Clegg
Julie CleggJulie Clegg
Julie Clegg
 
Dark web presentation
Dark web presentationDark web presentation
Dark web presentation
 
Polinter06
Polinter06Polinter06
Polinter06
 
Ass3 Summative
Ass3 SummativeAss3 Summative
Ass3 Summative
 
Rogers studyingpoliticalissues mar2014_optimized_ii_
Rogers studyingpoliticalissues mar2014_optimized_ii_Rogers studyingpoliticalissues mar2014_optimized_ii_
Rogers studyingpoliticalissues mar2014_optimized_ii_
 
A Semantic Graph-based Approach for Radicalisation Detection on Social Media
A Semantic Graph-based Approach for Radicalisation Detection on Social MediaA Semantic Graph-based Approach for Radicalisation Detection on Social Media
A Semantic Graph-based Approach for Radicalisation Detection on Social Media
 
1. Discussion Points (Use your browser to conduct research on the .docx
1. Discussion Points (Use your browser to conduct research on the .docx1. Discussion Points (Use your browser to conduct research on the .docx
1. Discussion Points (Use your browser to conduct research on the .docx
 
Intelligence Collection
Intelligence CollectionIntelligence Collection
Intelligence Collection
 
Open Data Journalism
Open Data JournalismOpen Data Journalism
Open Data Journalism
 
Online Journalism Story Ideas Feb12 2008[1]
Online Journalism Story Ideas Feb12 2008[1]Online Journalism Story Ideas Feb12 2008[1]
Online Journalism Story Ideas Feb12 2008[1]
 
Capstone_SingleSpaced
Capstone_SingleSpacedCapstone_SingleSpaced
Capstone_SingleSpaced
 
Searchthewebtutorial2014
Searchthewebtutorial2014Searchthewebtutorial2014
Searchthewebtutorial2014
 
The Role of Social Media in Da'awah
The Role of Social Media in Da'awahThe Role of Social Media in Da'awah
The Role of Social Media in Da'awah
 
Future_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RESFuture_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RES
 
Fake news learner packet
Fake news learner packetFake news learner packet
Fake news learner packet
 
Library session for POLS 3760 - Looking at Alternative Viewpoints
Library session for POLS 3760 - Looking at Alternative ViewpointsLibrary session for POLS 3760 - Looking at Alternative Viewpoints
Library session for POLS 3760 - Looking at Alternative Viewpoints
 
Terrorism 15 May 2009
Terrorism 15 May 2009Terrorism 15 May 2009
Terrorism 15 May 2009
 

Mais de suyu22

Ucd presentation miami_no_animation
Ucd presentation miami_no_animationUcd presentation miami_no_animation
Ucd presentation miami_no_animationsuyu22
 
New Directions in Metadata
New Directions in MetadataNew Directions in Metadata
New Directions in Metadatasuyu22
 
Managing Software Selection and Acquisition: From Problem to Solution
Managing Software Selection and Acquisition: From Problem to SolutionManaging Software Selection and Acquisition: From Problem to Solution
Managing Software Selection and Acquisition: From Problem to Solutionsuyu22
 
It’s Local, It’s Personal -- Search Engine & Information Service Trends
It’s Local, It’s Personal -- Search Engine & Information Service TrendsIt’s Local, It’s Personal -- Search Engine & Information Service Trends
It’s Local, It’s Personal -- Search Engine & Information Service Trendssuyu22
 
The Making of A Natural History Digital Library
The Making of A Natural History Digital LibraryThe Making of A Natural History Digital Library
The Making of A Natural History Digital Librarysuyu22
 
User Contribution in Knowledge Management – A Journey to Semantic Technology
User Contribution in Knowledge Management – A Journey to Semantic TechnologyUser Contribution in Knowledge Management – A Journey to Semantic Technology
User Contribution in Knowledge Management – A Journey to Semantic Technologysuyu22
 

Mais de suyu22 (6)

Ucd presentation miami_no_animation
Ucd presentation miami_no_animationUcd presentation miami_no_animation
Ucd presentation miami_no_animation
 
New Directions in Metadata
New Directions in MetadataNew Directions in Metadata
New Directions in Metadata
 
Managing Software Selection and Acquisition: From Problem to Solution
Managing Software Selection and Acquisition: From Problem to SolutionManaging Software Selection and Acquisition: From Problem to Solution
Managing Software Selection and Acquisition: From Problem to Solution
 
It’s Local, It’s Personal -- Search Engine & Information Service Trends
It’s Local, It’s Personal -- Search Engine & Information Service TrendsIt’s Local, It’s Personal -- Search Engine & Information Service Trends
It’s Local, It’s Personal -- Search Engine & Information Service Trends
 
The Making of A Natural History Digital Library
The Making of A Natural History Digital LibraryThe Making of A Natural History Digital Library
The Making of A Natural History Digital Library
 
User Contribution in Knowledge Management – A Journey to Semantic Technology
User Contribution in Knowledge Management – A Journey to Semantic TechnologyUser Contribution in Knowledge Management – A Journey to Semantic Technology
User Contribution in Knowledge Management – A Journey to Semantic Technology
 

Último

Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesShubhangi Sonawane
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfChris Hunter
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 

Último (20)

Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 

The Terrorism Knowledge Portal: Advanced Methodologies for Collecting and Analyzing Information from the ‘Dark Web’ and Terrorism Research Resources

  • 1. The Terrorism Knowledge Portal Advanced Methodologies for Collecting and Analyzing Information from the “Dark Web” and Terrorism Research Resources By: Hsinchun Chen, PhD, with Wingyan Chung; Cathy Larson; Edna Reid, DLS; Wei Xi; Alfonso Bonillas; Chun Yin; Yu Su and Greg Lai; The University of Arizona August 14, 2003 We gratefully acknowledge support from the National Science Foundation
  • 2. “ There is a potential here to reach millions [Black said of the Internet]. I think it’s a major breakthrough. I don’t know if it’s the ultimate solution to developing a white rights movement in this country, but it’s certainly a significant advance.” -- Don Black, white supremacist, KKK, launched Stormfront , the first extremist hate web site on WWW “ Up until now, unless someone met me personally, or read my material, the only way they could judge me is by what the liberal-biased media says. Now, that situation has changed. Millions of people are going online in America. Now, if they want to find out about me and my ideas and issues all they have to do is go into one of the search engines and search for “David Duke.” Hundreds [actually about 1,080,000] of sources will show up.”-- David Duke, Knights of the KKK, in “The Coming White Revolution – Born on the Internet”
  • 3. “ Terrorist groups are increasingly using new information technology and the Internet to formulate plans, recruit members, communicate between cells and members, raise funds, and spread propaganda. Terrorist groups including Hizballah, the Abu Nidal Organization, and bin Laden’s Al-Queda Organization are using computerized files, email, and encryption to support their operations.” – Louis J. Freeh, Director, FBI, Congressional Statement, “Threat of Terrorism to the United States,” 2001
  • 4.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11. Review of Terrorism Research Information and Terrorist Groups
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19. Data Collection and Data Analysis for Testbed Creation An Overview and Analysis of Potential Methods
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 29.
  • 30. Information Sources Collection Methods Automatic Spidering Back link search Personal Profile Search Meta Searching Downloading from Gov’t Web sites Filtering Data Storage Domestic Terrorism International Terrorism Terrorism research information The Web Dark Web Hate Groups | Racial Supremacy | Suicidal Attackers | Activists / Extremists | Anti-Government | … Terrorist Group Web sites Search Engines Terrorism databases Government information
  • 31.
  • 32.
  • 33.
  • 34.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42. Contact: Hsinchun Chen [email_address] For more information, please visit http://ai.eller.arizona.edu/