CounterterrorismUsing Social Media to Analyze, Thwart Terrorist Activity
It is known that much terrorist activity utilizes the power and immediacy of online social media and social networking tools to coordinate its attacks, rally support and spread the various agendas of the different groups and networks. Researchers explains how we might turn the tables on the terrorists and use those tools to analyze terrorist activity and make predictions about future scenarios, and so have the tools to thwart them in their deadly endeavors.
It is known that much terrorist activity utilizes the power and immediacy of online social media and social networking tools to coordinate its attacks, rally support and spread the various agendas of the different groups and networks. Writing in the International Journal of Grid and Utility Computing, a team from China explains how we might turn the tables on the terrorists and use those tools to analyze terrorist activity and so make predictions about future scenarios, and so have the tools to thwart them in their deadly endeavors.
The researcheers have demonstrated how they can look at two kinds of different intelligence sources in China and apply social network analysis and mathematical statistics to understand the information.
First, they used the social network analysis tool to construct an activity meta-network for the text information. This allowed them to extract four categories of information: person, places, organizations and time. They could then decompose the intelligence into person-organization and person-location, organization-location, organization-time. They then applied statistical methods to this extracted data for the years 1989 to 2015.
The team says that the use of big data can help in combating terrorism whether that emerges from networks and cells within a terrorist organization or even the so-called “lone wolf” attack
“We will never eradicate terrorism, but if more attacks can be thwarted through such analysis and the development of predictive tools, then its toll on lives and society as a whole might be reduced,” the authors say.
— Read more in X. Guo et al., ‘Winning the war on terror: using social networking tools and GTD to analyze the regularity of terrorism activities,” International Journal of Grid and Utility Computing 10, no. 4 (2019) (DOI: 10.1504/IJGUC.2019.10022137)