05.06.2013 Views

Vo.4-Moshirnia-Final

Vo.4-Moshirnia-Final

Vo.4-Moshirnia-Final

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

401 Harvard National Security Journal / Vol. 4<br />

These non-indexed sites may use a variety of methods to prevent detection<br />

from web crawlers (that is, automated browsers that follow hyperlinks,<br />

indexing sites for later queries). 86<br />

Analysts in 2006 began a detailed web analysis in order to detect<br />

Internet use patterns. 87 Specifically, analysts sought to determine the<br />

technological sophistication of various terror groups, their preferred avenues<br />

for disseminating technological propaganda, and their use of covert<br />

messaging. As a first step, analysts compiled a list of known terrorist groups<br />

and their associated URLs. 88 Next, this set of URLs was expanded through<br />

link and forum analysis—that is, an automated process examining out-links<br />

and in-links from a target URL and a semi-automated process combing<br />

message boards for links to forums posted by extremists. 89 <strong>Final</strong>ly, after<br />

arriving at this expanded list, analysts tailored a web crawler to download all<br />

files, both textual and multimedia, from these sites. 90 This automated<br />

crawler populated the study database with 1.7 million documents. 91 The<br />

resulting investigation of coding style, file type, total link-ins, and other<br />

objective measures allowed for statistical analysis of organizational<br />

technological sophistication, content richness (examining the use of video<br />

and audio files), and site interconnectedness. 92<br />

Analysis of Jihadi Recruitment Videos. Using a similar harvesting method,<br />

researchers downloaded 705 multimedia files used in jihadi recruitment. 93<br />

86 James Bruce, How To Build A Basic Web Crawler To Pull Information From A Website (Part 1),<br />

MAKEUSEOF.COM (Dec. 10, 2010), http://www.makeuseof.com/tag/build-basic-webcrawler-pull-information-website/.<br />

87 Jialun Qin, Yilu Zhou, Edna Reid, & Hsinchun Chen, Studying Global Extremist<br />

Organizations’ Internet Presence Using the Dark Web Attribute System: A Three Region Comparison<br />

Study, in TERRORISM INFORMATICS: KNOWLEDGE MANAGEMENT AND DATA MINING FOR<br />

HOMELAND SECURITY 244–45 (Hsinchun Chen et al. eds., 2008).<br />

88 Jialun Qin, Yilu Zhou, Edna Reid, & Hsinchun Chen, Studying Global Extremist<br />

Organizations’ Internet Presence Using the Dark Web Attribute System: A Three Region Comparison<br />

Study, in TERRORISM INFORMATICS: KNOWLEDGE MANAGEMENT AND DATA MINING FOR<br />

HOMELAND SECURITY 237 (Hsinchun Chen et al. eds., 2008).<br />

89 Id. at 244.<br />

90 Id.<br />

91 Id. at 245.<br />

92 Id. at 248–62.<br />

93 Arab Salem, Edna Reid, & Hsinchun Chen, Content Analysis of Jihadi Extremist Groups’<br />

Videos, in TERRORISM INFORMATICS: KNOWLEDGE MANAGEMENT AND DATA MINING<br />

FOR HOMELAND SECURITY 273 (Hsinchun Chen et al. eds., 2008) (see text and Table 13-<br />

2).

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!