Vo.4-Moshirnia-Final
Vo.4-Moshirnia-Final
Vo.4-Moshirnia-Final
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
401 Harvard National Security Journal / Vol. 4<br />
These non-indexed sites may use a variety of methods to prevent detection<br />
from web crawlers (that is, automated browsers that follow hyperlinks,<br />
indexing sites for later queries). 86<br />
Analysts in 2006 began a detailed web analysis in order to detect<br />
Internet use patterns. 87 Specifically, analysts sought to determine the<br />
technological sophistication of various terror groups, their preferred avenues<br />
for disseminating technological propaganda, and their use of covert<br />
messaging. As a first step, analysts compiled a list of known terrorist groups<br />
and their associated URLs. 88 Next, this set of URLs was expanded through<br />
link and forum analysis—that is, an automated process examining out-links<br />
and in-links from a target URL and a semi-automated process combing<br />
message boards for links to forums posted by extremists. 89 <strong>Final</strong>ly, after<br />
arriving at this expanded list, analysts tailored a web crawler to download all<br />
files, both textual and multimedia, from these sites. 90 This automated<br />
crawler populated the study database with 1.7 million documents. 91 The<br />
resulting investigation of coding style, file type, total link-ins, and other<br />
objective measures allowed for statistical analysis of organizational<br />
technological sophistication, content richness (examining the use of video<br />
and audio files), and site interconnectedness. 92<br />
Analysis of Jihadi Recruitment Videos. Using a similar harvesting method,<br />
researchers downloaded 705 multimedia files used in jihadi recruitment. 93<br />
86 James Bruce, How To Build A Basic Web Crawler To Pull Information From A Website (Part 1),<br />
MAKEUSEOF.COM (Dec. 10, 2010), http://www.makeuseof.com/tag/build-basic-webcrawler-pull-information-website/.<br />
87 Jialun Qin, Yilu Zhou, Edna Reid, & Hsinchun Chen, Studying Global Extremist<br />
Organizations’ Internet Presence Using the Dark Web Attribute System: A Three Region Comparison<br />
Study, in TERRORISM INFORMATICS: KNOWLEDGE MANAGEMENT AND DATA MINING FOR<br />
HOMELAND SECURITY 244–45 (Hsinchun Chen et al. eds., 2008).<br />
88 Jialun Qin, Yilu Zhou, Edna Reid, & Hsinchun Chen, Studying Global Extremist<br />
Organizations’ Internet Presence Using the Dark Web Attribute System: A Three Region Comparison<br />
Study, in TERRORISM INFORMATICS: KNOWLEDGE MANAGEMENT AND DATA MINING FOR<br />
HOMELAND SECURITY 237 (Hsinchun Chen et al. eds., 2008).<br />
89 Id. at 244.<br />
90 Id.<br />
91 Id. at 245.<br />
92 Id. at 248–62.<br />
93 Arab Salem, Edna Reid, & Hsinchun Chen, Content Analysis of Jihadi Extremist Groups’<br />
Videos, in TERRORISM INFORMATICS: KNOWLEDGE MANAGEMENT AND DATA MINING<br />
FOR HOMELAND SECURITY 273 (Hsinchun Chen et al. eds., 2008) (see text and Table 13-<br />
2).