Share with your friends










Submit

Analytics Magazine

Fighting terrorists online: Identifying extremists before they post content

Fighting terrorist online: Identifying extremists before they post content

Image source: ThinkStock

New research has found a way to identify extremists, such as those associated with the terrorist group ISIS, by monitoring their social media accounts, and can identify them even before they post threatening content. The research, “Finding Extremists in Online Social Networks,” which was recently published in the INFORMS journal Operations Research, was conducted by Tauhid Zaman of the MIT, Lt. Col. Christopher E. Marks of the U.S. Army and Jytte Klausen of Brandeis University.

The number and size of online extremist groups using social networks to harass users, recruit new members and incite violence is rapidly increasing. While social media platforms are working to combat this (in 2016, Twitter reported it had shut down 360,000 ISIS accounts) they traditionally rely heavily on users’ reports to identify these accounts.

In addition, once an account has been suspended, there is little that can be done to prevent a user from opening up a new account or multiple accounts.

“Social media has become a powerful platform for extremist groups, ranging from ISIS to white nationalist alt-right groups,” Zaman says. “These groups use social networks to spread hateful propaganda and incite violence and terror attacks, making them a threat to the general public.”

The researchers collected Twitter data from approximately 5,000 “seed” users who were either known ISIS members or who were connected to many known ISIS members as friends or followers. They obtained their names through news stories, blogs and reports released by law enforcement agencies and think tanks.

In addition to reviewing the content of 4.8 million tweets from these users’ timelines (including text, links, hash tags and mentions), they also tracked account suspensions, as well as any suspensions of their friends and followers accounts.

For the purpose of this study, the researchers focused on the account networks forged by known ISIS and Al Qaeda sympathizers and known foreign fighters and content that had been flagged by Twitter as terrorist in nature.

Using statistical modeling of extremist behavior with optimized search policies and actual ISIS user data, the researchers developed a method to predict new extremist users, identify if more than one account belongs to the same user, as well as predict network connections of suspended extremist users who start a new account.

In addition, by tracking and comparing data on screen names, user name, profile images and banner images, the researchers were also able to identify 70 percent of additional Twitter profiles held by extremist users, with only a 2 percent incidence of misclassifying profiles.

“We created a new set of operational capabilities to deal with the threat posed by online extremists in social networks,” Marks says. “We are able to predict who is an extremist before they post any content, and then predict where they will re-enter the network after they are suspended. In short, we can automatically figure out who is an extremist and keep them of the social network.”

While the study was conducted using data from accounts belonging to ISIS extremists on Twitter, their methodology can be applied to any extremist group and any social network.

“Users that engage in some form of online extremism or harassment will have very similar behavioral characteristics in social networks,” Klausen says. “They will connect to a specific set of users that form their extremist group. They will create new accounts which will resemble their old accounts after being suspended, and when the return to the social network following a suspension, there is a high probability they will reconnect with certain former friends.”

To read the full study, click here.

Related Posts

  • 44
    Can publicly available data from large-scale social media networks be used to help predict catastrophic events within the country’s infrastructure, such as threats to national security, the energy system or even the economy? Conrad Tucker, associate professor of engineering design and industrial engineering, has received funding from the U.S. Air…
    Tags: data, social, media, networks, predict, researchers
  • 40
    With the rise of big data – and the processes and tools related to utilizing and managing large data sets – organizations are recognizing the value of data as a critical business asset to identify trends, patterns and preferences to drive improved customer experiences and competitive advantage. The problem is,…
    Tags: data
  • 39
    It’s long been popular to talk about customer interaction data such as clickstream, social activity, inbound email and call center verbatims as “unstructured data.” Wikipedia says of the term that it “…refers to information that either does not have a pre-defined data model or is not organized in a pre-defined…
    Tags: data
  • 36
    Many organizations have noticed that the data they own and how they use it can make them different than others to innovate, to compete better and to stay in business. That’s why organizations try to collect and process as much data as possible, transform it into meaningful information with data-driven…
    Tags: data
  • 34
    The Internet of Things (IoT) is considered to be the next revolution that touches every part of our daily life, from restocking ice cream to warning of pollutants. Analytics professionals understand the importance of data, especially in a complicated field such as healthcare. This article offers a framework on integrating…
    Tags: data


Headlines

Fighting terrorists online: Identifying extremists before they post content

New research has found a way to identify extremists, such as those associated with the terrorist group ISIS, by monitoring their social media accounts, and can identify them even before they post threatening content. The research, “Finding Extremists in Online Social Networks,” which was recently published in the INFORMS journal Operations Research, was conducted by Tauhid Zaman of the MIT, Lt. Col. Christopher E. Marks of the U.S. Army and Jytte Klausen of Brandeis University. Read more →

Syrian conflict yields model for attrition dynamics in multilateral war

Based on their study of the Syrian Civil War that’s been raging since 2011, three researchers created a predictive model for multilateral war called the Lanchester multiduel. Unless there is a player so strong it can guarantee a win regardless of what others do, the likely outcome of multilateral war is a gradual stalemate that culminates in the mutual annihilation of all players, according to the model. Read more →

SAS, Samford University team up to generate sports analytics talent

Sports teams try to squeeze out every last bit of talent to gain a competitive advantage on the field. That’s also true in college athletic departments and professional team offices, where entire departments devoted to analyzing data hunt for sports analytics experts that can give them an edge in a game, in the stands and beyond. To create this talent, analytics company SAS will collaborate with the Samford University Center for Sports Analytics to support teaching, learning and research in all areas where analytics affects sports, including fan engagement, sponsorship, player tracking, sports medicine, sports media and operations. Read more →

UPCOMING ANALYTICS EVENTS

INFORMS-SPONSORED EVENTS

INFORMS Annual Meeting
Nov. 4-7, 2018, Phoenix

Winter Simulation Conference
Dec. 9-12, 2018, Gothenburg, Sweden

OTHER EVENTS

Making Data Science Pay
Oct. 29 -30, 12 p.m.-5 p.m.


Applied AI & Machine Learning | Comprehensive
Starts Oct. 29, 2018 (live online)


The Analytics Clinic
Citizen Data Scientists | Why Not DIY AI?
Nov. 8, 2018, 11 a.m. – 12:30 p.m.


Advancing the Analytics-Driven Organization
Jan. 28–31, 2019, 1 p.m.– 5 p.m. (live online)


CAP® EXAM SCHEDULE

CAP® Exam computer-based testing sites are available in 700 locations worldwide. Take the exam close to home and on your schedule:


 
For more information, go to 
https://www.certifiedanalytics.org.