Share with your friends


Analytics Magazine

Fighting terrorists online: Identifying extremists before they post content

Fighting terrorist online: Identifying extremists before they post content

Image source: ThinkStock

New research has found a way to identify extremists, such as those associated with the terrorist group ISIS, by monitoring their social media accounts, and can identify them even before they post threatening content. The research, “Finding Extremists in Online Social Networks,” which was recently published in the INFORMS journal Operations Research, was conducted by Tauhid Zaman of the MIT, Lt. Col. Christopher E. Marks of the U.S. Army and Jytte Klausen of Brandeis University.

The number and size of online extremist groups using social networks to harass users, recruit new members and incite violence is rapidly increasing. While social media platforms are working to combat this (in 2016, Twitter reported it had shut down 360,000 ISIS accounts) they traditionally rely heavily on users’ reports to identify these accounts.

In addition, once an account has been suspended, there is little that can be done to prevent a user from opening up a new account or multiple accounts.

“Social media has become a powerful platform for extremist groups, ranging from ISIS to white nationalist alt-right groups,” Zaman says. “These groups use social networks to spread hateful propaganda and incite violence and terror attacks, making them a threat to the general public.”

The researchers collected Twitter data from approximately 5,000 “seed” users who were either known ISIS members or who were connected to many known ISIS members as friends or followers. They obtained their names through news stories, blogs and reports released by law enforcement agencies and think tanks.

In addition to reviewing the content of 4.8 million tweets from these users’ timelines (including text, links, hash tags and mentions), they also tracked account suspensions, as well as any suspensions of their friends and followers accounts.

For the purpose of this study, the researchers focused on the account networks forged by known ISIS and Al Qaeda sympathizers and known foreign fighters and content that had been flagged by Twitter as terrorist in nature.

Using statistical modeling of extremist behavior with optimized search policies and actual ISIS user data, the researchers developed a method to predict new extremist users, identify if more than one account belongs to the same user, as well as predict network connections of suspended extremist users who start a new account.

In addition, by tracking and comparing data on screen names, user name, profile images and banner images, the researchers were also able to identify 70 percent of additional Twitter profiles held by extremist users, with only a 2 percent incidence of misclassifying profiles.

“We created a new set of operational capabilities to deal with the threat posed by online extremists in social networks,” Marks says. “We are able to predict who is an extremist before they post any content, and then predict where they will re-enter the network after they are suspended. In short, we can automatically figure out who is an extremist and keep them of the social network.”

While the study was conducted using data from accounts belonging to ISIS extremists on Twitter, their methodology can be applied to any extremist group and any social network.

“Users that engage in some form of online extremism or harassment will have very similar behavioral characteristics in social networks,” Klausen says. “They will connect to a specific set of users that form their extremist group. They will create new accounts which will resemble their old accounts after being suspended, and when the return to the social network following a suspension, there is a high probability they will reconnect with certain former friends.”

To read the full study, click here.

Related Posts

  • 44
    Can publicly available data from large-scale social media networks be used to help predict catastrophic events within the country’s infrastructure, such as threats to national security, the energy system or even the economy? Conrad Tucker, associate professor of engineering design and industrial engineering, has received funding from the U.S. Air…
    Tags: data, social, media, networks, predict, researchers
  • 40
    With the rise of big data – and the processes and tools related to utilizing and managing large data sets – organizations are recognizing the value of data as a critical business asset to identify trends, patterns and preferences to drive improved customer experiences and competitive advantage. The problem is,…
    Tags: data
  • 39
    It’s long been popular to talk about customer interaction data such as clickstream, social activity, inbound email and call center verbatims as “unstructured data.” Wikipedia says of the term that it “…refers to information that either does not have a pre-defined data model or is not organized in a pre-defined…
    Tags: data
  • 36
    Many organizations have noticed that the data they own and how they use it can make them different than others to innovate, to compete better and to stay in business. That’s why organizations try to collect and process as much data as possible, transform it into meaningful information with data-driven…
    Tags: data
  • 34
    The Internet of Things (IoT) is considered to be the next revolution that touches every part of our daily life, from restocking ice cream to warning of pollutants. Analytics professionals understand the importance of data, especially in a complicated field such as healthcare. This article offers a framework on integrating…
    Tags: data


Using machine learning and optimization to improve refugee integration

Andrew C. Trapp, a professor at the Foisie Business School at Worcester Polytechnic Institute (WPI), received a $320,000 National Science Foundation (NSF) grant to develop a computational tool to help humanitarian aid organizations significantly improve refugees’ chances of successfully resettling and integrating into a new country. Built upon ongoing work with an international team of computer scientists and economists, the tool integrates machine learning and optimization algorithms, along with complex computation of data, to match refugees to communities where they will find appropriate resources, including employment opportunities. Read more →

Gartner releases Healthcare Supply Chain Top 25 rankings

Gartner, Inc. has released its 10th annual Healthcare Supply Chain Top 25 ranking. The rankings recognize organizations across the healthcare value chain that demonstrate leadership in improving human life at sustainable costs. “Healthcare supply chains today face a multitude of challenges: increasing cost pressures and patient expectations, as well as the need to keep up with rapid technology advancement, to name just a few,” says Stephen Meyer, senior director at Gartner. Read more →

Meet CIMON, the first AI-powered astronaut assistant

CIMON, the world’s first artificial intelligence-enabled astronaut assistant, made its debut aboard the International Space Station. The ISS’s newest crew member, developed and built in Germany, was called into action on Nov. 15 with the command, “Wake up, CIMON!,” by German ESA astronaut Alexander Gerst, who has been living and working on the ISS since June 8. Read more →



INFORMS Computing Society Conference
Jan. 6-8, 2019; Knoxville, Tenn.

INFORMS Conference on Business Analytics & Operations Research
April 14-16, 2019; Austin, Texas

INFORMS International Conference
June 9-12, 2019; Cancun, Mexico

INFORMS Marketing Science Conference
June 20-22; Rome, Italy

INFORMS Applied Probability Conference
July 2-4, 2019; Brisbane, Australia

INFORMS Healthcare Conference
July 27-29, 2019; Boston, Mass.

2019 INFORMS Annual Meeting
Oct. 20-23, 2019; Seattle, Wash.

Winter Simulation Conference
Dec. 8-11, 2019: National Harbor, Md.


Advancing the Analytics-Driven Organization
Jan. 28–31, 2019, 1 p.m.– 5 p.m. (live online)


CAP® Exam computer-based testing sites are available in 700 locations worldwide. Take the exam close to home and on your schedule:

For more information, go to