Akemi Takeoka Chatfield, Christopher G. Reddick, Uuf Brajawidagda

Slides:



Advertisements
Similar presentations
SS7H2 The student will analyze continuity and change in Southwest Asia (Middle East) leading to the 21st century. d. Explain U.S. presence and interest.
Advertisements

Threats to World Security Chapter 33 Section 3.
 What did the Balfour Declaration declare?  What does PLO stand for?  Who was Iran’s leader from that set up Islamic law in Iran?
–Middle East History Ottoman Empire Israel Arab-Israel Conflict U.S. Involvement Random
Overview of Middle Eastern Countries. Syria  Part of Ottoman Empire until 1918  French and British take over until 1947  Independence led to.
ISLAMIC TERRORISTS PROPAGANDA An Insight Into the Machine Mario Fitzpatrick: Hug High School Katie Anderson: Teaching American History Project.
Middle East Fundamentalism.  1.What are the roots of modern Islamic Fundamentalism? 2.What was the United States’ response to global terrorism? 3.What.
PIG Final Review Day 2. Education Support of Common Core The Common Core Standards prepare students for a competitive global economy Provide national.
Today we will be talking about September 11 th for the entire class period. To begin, get a worksheet from the front and answer the “Warm-Up Questions”
BELLWORK 1.Brainstorm a list of facts, terms, people relating to the September 11 th attacks. (Try to get at least 5!) You will be broken up into groups.
DATA Competitor Analysis Behavior GT DATA: -Formerly Al Qaeda in Iraq -20,000 – 32,000 Fighters (CIA estimate) -2,000 westerners in ranks (10%) -Control.
National Security BY: ALEXIE BURNETTE ZSAYKARYZMH HARRIS LEILANI HICIANO GENESY SENCION ROBIN WILLIAMS.
Understanding ISIS An introduction. What is ISIS? Jihadist extremist militant group Declared itself a Caliphate in 2014 Origins in 1999 Joined w/Al-Qaeda.
BELLWORK 1.Brainstorm a list of facts, terms, people relating to the September 11 th attacks. (Try to get at least 5!) You will be broken up into groups.
How Did ISIS Start? ISIS as a terrorist group started long before any of the talk of liberating the Islamic people and the events today transpired. They.
A Threat to Our National Security.  Muslim Extremist group  Founded by Osama Bin Laden, Abdullah Azzam, and other militant leaders  Between 16,000.
Terrorist Groups Mujahideen – warriors fighting to defend fellow Muslims. Also known as guerrilla fighters in Islamic countries, especially those who are.
On 13 th Dec a man was stabbed by a suspected terrorist at a tube station. A Muslim security guard who witnessed the event shouted “You ain’t no Muslim,
TEKS 8C: Calculate percent composition and empirical and molecular formulas. Terrorism and Global Security.
Today’s Issues: The US and Canada Ch. 8 Intro to Geography.
ISIS The Islamic State group of Iraq and Syria. Bell Work #7 – 5/12-13 Should the United States be involved in the fight against ISIS? Why or why not?
Prime Minister Nuri Kemal Al- Maliki The Current I.S.I.S-Iraq Crisis.
ISIS The Islamic State group of Iraq and Syria. KEY QUESTION Should the United States be involved in the fight against ISIS?
SS7H2d Explain U.S. presence and interest in Southwest Asia; include the Persian Gulf conflict and invasions of Afghanistan and Iraq. Concepts: Conflict.
All Saints’ Catholic School Prevent Agenda 12 th February 2016.
The Islamic State (IS) burst on to the international scene in 2014.
The war against Al-Qaeda…or is it?
ISIS.
After 9/11- The War on Terror
Can ISIS (Daesh) ever be defeated?
PREVENT 2015 The Prevent Strategy “Stopping people becoming
ISIS, International Security, and the Global Economy
Foreign Policy GOVT Module 16.
Terrorism 2027 James J.F. Forest, Ph.D. May 5, 2017.
WEEK 4 September 11th, Global Terrorism and War on Terrorism
The Rise of Terror.
Islamic State.
Stopping people becoming terrorists or supporting terrorism.
Threats to World Security Chapter 33 Section 3.
Terrorist Groups Mujahideen – warriors fighting to defend fellow Muslims. Also known as guerrilla fighters in Islamic countries, especially those who are.
What happened to Al Qaeda?
Contemporary Global Issues
ISIS (We’ll be taking note today)
ISLAMIC STATE’S USE OF SOCIAL MEDIA
Why has the United States become involved in Middle Eastern conflicts?
9/11 and the War on Terror.
OIL RICH country but people poor
The war against Al-Qaeda…or is it?
What were the major events of the George W. Bush presidency?
What were the major events of the George W. Bush presidency?
DO NOW – Reading Quiz How does the U.S. State department define terrorism? Politically motivated violence directed at governments Religiously motivated.
Analise and Hope ISIL in Iraq.
Southwest Asia The Middle East
Inside Syria’s Civil War 60 minutes- youtube. com/watch
Southwest Asia The Middle East
Terrorism By Kyle,Hunter,Seth World Geo 3rd.
Civil War in Iraq and Syria
Middle East Conflict SS7H2d
The war against Al-Qaeda…or is it?
The current state of isis
Modern Conflicts.
In the late 19th and early 20th centuries, Great Britain fought three wars with Afghanistan, all in an attempt to consolidate its Indian empire and prevent.
Objectives Explain why nuclear, biological, and chemical weapons threaten global security. Analyze the various terrorist groups and why they are becoming.
A Brief overview of issues in the middle east
Modern America 1982—Present PART 5 OF 5
Contemporary History 4 Corners
33.3: Threats to World Security
Terrorism in the Middle East
The Rise OF ISIS A Documentary Film.
Presentation transcript:

Akemi Takeoka Chatfield, Christopher G. Reddick, Uuf Brajawidagda Tweeting Propaganda, Radicalization and Recruitment:Islamic State Supporters Multi-Sided Twitter Networks Akemi Takeoka Chatfield, Christopher G. Reddick, Uuf Brajawidagda Presented By: Abel Jose, Adarsh Pillay, Deepak Begrajka, Rudra Gupta

CONTENT Background Introduction Framework Research Methodology Experiments Performed Results Project Proposal Conclusion

BACKGROUND- Attack 1 Paris Attack, November 2015

Attack 2 San Bernardino Attack, December 2015

Attack 3 Orlando Attack, June 2016

COMMON ELEMENTS TERRORISM HOMEGROWN TERRORISM RELATIONSHIP WITH ISIS COMMUNICATION WITH ISIS SOCIAL MEDIA

INTRODUCTION - Ex-President Barack Obama earlier referred to Islamic State (IS) – Islamic terrorist networks of predominantly Sunni Muslim extremists, foreign fighters, and sympathizers – as a “Junior Varsity” version of Al Qaeda”. - Since then the rapid rise and resilience of the IS militants in Syria and Iraq against the US led coalition of 60-plus nations, however, seems to pose a serious threat. - IS is World’s richest terrorist group and their main funding comes from illegal revenue generated from oil fields, also bank assets in their city.

Two Reasons for Concerns - First: Both al-Qaeda and IS hold the political goal of establishing a new Islamic state (or “caliphate”) where Sharia law is the highest authority and jihad is sanctioned. - Second: Al-Qaeda exploits mass media and the Internet for terrorism propaganda. IS use social media to lure younger Muslims and the Westerners alike to fight with its IS multi-ethnic force in Syria and Iraq.

AIR STRIKES IS control of Syria and Iraq 2014 UNSC report shows 15,000 foreign fighters recruited by ISIS from 80 countries to fight in Syria and Iraq. - CIA predict 20,000-31500 fighters recruited. IS control of Syria and Iraq

FRAMEWORK Framework for multi-sided Twitter networks in the global Islamic terrorist communication environment

FRAMEWORK (Contd.) Propaganda is defined as information, especially of a biased or misleading nature, used to promote a political cause or point of view. Radicalization is defined as increasing extremity of beliefs, feelings, and behaviors in support of intergroup conflict and violence. Terrorist Recruitment is defined as enticing other, similarly situated young men, to join them in terrorizing and fighting the jihad war

RESEARCH METHODOLOGY How do IS members/supporters use Twitter for terrorism communication: propaganda, radicalization, and recruitment? KEYWORDS “propaganda AND (terrorism or terrorist)” “radicalization AND Islam” “radicalization AND ‘Islamic extremism’” "terrorist recruitment"

EXPERIMENTS PERFORMED @shamiwitness Analyzed @shamiwitness tweets from Oct 6 to Oct 27, 2014 which were a total of 3,039 tweets. Types of Analysis Performed Trend Analysis Content Analysis Social Network Analysis

RESULTS TREND ANALYSIS 60% were RT’s & 40% were his own Daily Work Rate - 16 Hours 9 minutes 57 Tweets of his own and 138 retweets on an average per day

RESULTS (contd.) Multi-sided Twitter networks of users mentioned in @shamiwitness tweets

SAMPLE TWEETS

Project Proposal What problems are we trying to address? Inconclusive or inefficient methods of catching and preventing homegrown terrorists Extremists from other countries work to recruit individuals in the US through social media Primarily Twitter Even if an account is deactivated users can create a new profile and continue their practices The problem we are trying to address: Currently the methods used to identify or stop cyber terrorists is sparse Investigation and prevention methods tend to be focused on rooting out extremists who have already been radicalized and are in the country. We want to focus on working to eliminate external terrorists who work to spread hateful propaganda and recruit in different countries through social mdeia (specifically Twitter). Many of these individuals are persistent

Project Proposal (contd.) Solution : Create an efficient content moderation system aimed specifically at radicalization and recruitment on twitter How: Graph pattern matching Investigative simulation Analyze a series of terrorist profiles and create graphs where the node is the terrorist user profile and edges are connections to their tweets, retweets, profile descriptions Match these graphs to an “ideal graph” of an online terrorist Our proposed solution is to create a specialized content moderation system aimed at cyber terrorists who use twitter as their recruitment and radicalization grounds. We hope to do this by using an investigative simulation approach to graph pattern matching. Which is basically a process for searching for and prioritizing persons of interest who may exhibit part or all of a pattern of suspicious behaviors or connections.

Project Proposal (contd.) Novelty Create a predictive analyzer Train a model using all created cyber terrorist graphs Monitor new user profiles and tweets Report known or highly suspected cyber terrorists to twitter content mods Receive feedback and use it to strengthen our model We will then use the graphs that we have in order to train a predictive analysis model. This model will take in a user profile along with relevant connections and give a prediction of how similar this is to a previous profile or just a general profile of a cyber terrorist. Once an individual is selected they are added to a database and if we find enough evidence to assume that the individual has connections to terrorist groups we will report to Twitter content moderators. Hopefully they will block the account .

CONCLUSION The research paper calls for urgent attention to have a look on the potential power of multi-sided Twitter networks in more effectively and more efficiently promoting the radical Islamic propaganda, radicalization, and recruitment messages to the global audiences. It is limited here by focusing on @shamiwitness and his Twitter networks.

QUESTIONS ?