Semelhante a The Terrorism Knowledge Portal: Advanced Methodologies for Collecting and Analyzing Information from the ‘Dark Web’ and Terrorism Research Resources
Semelhante a The Terrorism Knowledge Portal: Advanced Methodologies for Collecting and Analyzing Information from the ‘Dark Web’ and Terrorism Research Resources (20)
Z Score,T Score, Percential Rank and Box Plot Graph
The Terrorism Knowledge Portal: Advanced Methodologies for Collecting and Analyzing Information from the ‘Dark Web’ and Terrorism Research Resources
1. The Terrorism Knowledge Portal Advanced Methodologies for Collecting and Analyzing Information from the “Dark Web” and Terrorism Research Resources By: Hsinchun Chen, PhD, with Wingyan Chung; Cathy Larson; Edna Reid, DLS; Wei Xi; Alfonso Bonillas; Chun Yin; Yu Su and Greg Lai; The University of Arizona August 14, 2003 We gratefully acknowledge support from the National Science Foundation
2. “ There is a potential here to reach millions [Black said of the Internet]. I think it’s a major breakthrough. I don’t know if it’s the ultimate solution to developing a white rights movement in this country, but it’s certainly a significant advance.” -- Don Black, white supremacist, KKK, launched Stormfront , the first extremist hate web site on WWW “ Up until now, unless someone met me personally, or read my material, the only way they could judge me is by what the liberal-biased media says. Now, that situation has changed. Millions of people are going online in America. Now, if they want to find out about me and my ideas and issues all they have to do is go into one of the search engines and search for “David Duke.” Hundreds [actually about 1,080,000] of sources will show up.”-- David Duke, Knights of the KKK, in “The Coming White Revolution – Born on the Internet”
3. “ Terrorist groups are increasingly using new information technology and the Internet to formulate plans, recruit members, communicate between cells and members, raise funds, and spread propaganda. Terrorist groups including Hizballah, the Abu Nidal Organization, and bin Laden’s Al-Queda Organization are using computerized files, email, and encryption to support their operations.” – Louis J. Freeh, Director, FBI, Congressional Statement, “Threat of Terrorism to the United States,” 2001
30. Information Sources Collection Methods Automatic Spidering Back link search Personal Profile Search Meta Searching Downloading from Gov’t Web sites Filtering Data Storage Domestic Terrorism International Terrorism Terrorism research information The Web Dark Web Hate Groups | Racial Supremacy | Suicidal Attackers | Activists / Extremists | Anti-Government | … Terrorist Group Web sites Search Engines Terrorism databases Government information