Log in

Analyzing a Dark Web forum page in the context of terrorism: a topic modeling approach

  • Original Article
  • Published:
Security Journal Aims and scope Submit manuscript

Abstract

Dark Web has turned into a platform for a variety of criminal activities, including weapon trafficking, pornography, fake documents, drug trafficking, and, most notably terrorism as detailed in this study. This article uses an LDA-based topic modeling approach to identify the topics addressed in discussions on the Dark Web. The main purpose is to present an overview of jihadists’ communication in cyberspace for the detection of unusual behavior or terrorism-related purposes. According to the findings, conversations in the context of recruitment and propaganda predominated at the forum. There was no direct evidence of terrorist collaboration at the conclusion of the investigation. This does not, however, imply that these sites are risk-free. Propaganda and recruitment tools feed the terrorist activities.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (United Kingdom)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  • Alayda, Sara, Najd A Almowaysher, Faeiz Alserhani, and Mamoona Humayun. 2021. Terrorism on Dark Web. 12 (10): 3000–3005.

  • Aldera, Saja, Ahmad Emam, Muhammad Al-Qurishi, Majed Alrubaian, and Abdulrahman Alothaim. 2021. Online Extremism Detection in Textual Content: A Systematic Literature Review. IEEE Access 9: 42384–42396. https://doi.org/10.1109/ACCESS.2021.3064178.

    Article  Google Scholar 

  • Alharbi, Abdullah, Mohd Faizan, Wael Alosaimi, Hashem Alyami, Mohd Nadeem, Suhel Ahmad Khan, Alka Agrawal, and Raees Ahmad Khan. 2021. A Link Analysis Algorithm for Identification of Key Hidden Services. Computers, Materials and Continua 68 (1): 877–886. https://doi.org/10.32604/cmc.2021.016887.

    Article  Google Scholar 

  • Aliyu, Mansur, Abubakar B. Tambawal, Murni Mahmud, and Rasheed M. Nassr. 2016. Features of Islamic Websites, Perceptions of Muslim Users and Utilization Behavior: A Conceptual Model. The Beam: Journal of Arts & Science 9.

  • Alnabulsi, Hussein, and Rafiqul Islam. 2019. Identification of Illegal Forum Activities inside the Dark Net. In Proceedings—International Conference on Machine Learning and Data Engineering, ICMLDE 2018, 30–34. Institute of Electrical and Electronics Engineers Inc. https://doi.org/10.1109/iCMLDE.2018.00015.

  • Artificial Intelligence Lab. 2012. Dark Web Forums. https://www.azsecure-data.org/dark-web-forums.html.

  • Bedjou, Khaled, Faiçal Azouaou, and Abdelouhab Aloui. 2019. Detection of Terrorist Threats on Twitter Using SVM. ACM International Conference Proceeding Series. https://doi.org/10.1145/3341325.3342011.

    Article  Google Scholar 

  • Bellegarda, Jerome R. 2008. Latent Semantic Map**: Principles & Applications. San Rafael: Morgan and Claypool Publishers.

    Google Scholar 

  • Berton, Beatrice. 2015. The Dark Side of the Web : ISIL’s One-Stop Shop ?, no. June: 1–2. https://doi.org/10.2815/454889.

  • Blei, David M., Andrew Y. Ng, and Michael Jordan. 2003. Latent Dirichlet Allocation. Journal of Machine Learning Research 3: 993–1022.

    Google Scholar 

  • Chaabene, Nour El Houda ben, Amel Bouzeghoub, Ramzi Guetari, and Henda Hajjami Ben Ghezala. 2021. Applying Machine Learning Models for Detecting and Predicting Militant Terrorists Behaviour in Twitter. Conference Proceedings—IEEE International Conference on Systems, Man and Cybernetics, 309–314. https://doi.org/10.1109/SMC52423.2021.9659253.

  • Chatfield, Akemi Takeoka, Christopher G. Reddick, and Uuf Brajawidagda. 2015. Tweeting Propaganda, Radicalization and Recruitment. In Proceedings of the 16th annual international conference on digital government research, 239–249. https://doi.org/10.1145/2757401.2757408.

  • Chaudhary, Megha, Sachin Vashistha, and Divya Bansal. 2022. Automated Detection of Anti-National Textual Response to Terroristic Events on Online Media. Cybernetics and Systems. https://doi.org/10.1080/01969722.2022.2044596.

    Article  Google Scholar 

  • Chen, Hsinchun. 2008. Sentiment and Affect Analysis of Dark Web Forums: Measuring Radicalization on the Internet. IEEE International Conference on Intelligence and Security Informatics, 2008, IEEE ISI 2008, 104–109. https://doi.org/10.1109/ISI.2008.4565038.

  • Chen, Hsinchun. 2012. Dark Web: Exploring and Data Mining the Dark Side of the Web. In International Conference on Formal Concept Analysis.

  • Chen, Hsinchun, Wingyan Chung Chung, Jialun Qin, Edna Reid, Marc Sageman, and Gabriel Weimann. 2008. Uncovering the DarkWeb: A Case Study of Jihad on the Web. Journal of the American Society for Information Science and Technology 59 (8): 1347–1359. https://doi.org/10.1002/asi.

    Article  Google Scholar 

  • Chertoff, Michael, and Tobby Simon. 2015. The Impact of the Dark Web on Internet Governance and Cyber Security. Global Commission on Internet Govrnance, no. 6: 6–8. https://www.cigionline.org/sites/default/files/gcig_paper_no6.pdf.

  • Cohen, Katie, and Lisa Kaati. 2018. Digital Jihad.

  • Corbin, Caroline Mala. 2017. Terrorists Are Always Muslim but Never White: At the Intersection of Critical Race Theory and Propaganda. Fordham Law Review 86 (2): 455.

    Google Scholar 

  • Davies, Gemma. 2020. Shining a Light on Policing of the Dark Web: An Analysis of UK Investigatory Powers. The Journal of Criminal Law 84 (5): 407–426. https://doi.org/10.1177/0022018320952557.

    Article  Google Scholar 

  • Ekinci, Ekin, Sevinç İlhan Omurca, Elif Kırık, and Şeymanur Taşçı. 2020. Tıp Veri Kümesi Için Gizli Dirichlet Ayrımı. Deu Muhendislik Fakultesi Fen ve Muhendislik 22 (64): 67–80. https://doi.org/10.21205/deufmd.2020226408.

    Article  Google Scholar 

  • Finklea, Kristin. 2017. Dark Web. Congressional Research Service. New York: Taylor and Francis Inc. https://doi.org/10.1080/1057610X.2015.1119546.

    Book  Google Scholar 

  • Gehl, Robert W. 2016. Power/Freedom on the Dark Web: A Digital Ethnography of the Dark Web Social Network. New Media and Society 18 (7): 1219–1235. https://doi.org/10.1177/1461444814554900.

    Article  Google Scholar 

  • Girolami, M., and A. Kabán. 2003. On an Equivalence between PLSI and LDA. In 26th Annual International ACM SIGIR Conference on Research and Development in Informaion Retrieval, 433–434.

  • Jenkins, Brian Michael. 2007. Building an Army of Believers: Jihadist Radicalization and Recruitment.

  • Kalpakis, George, Theodora Tsikrika, Neil Cunningham, Christos Iliou, Stefanos Vrochidis, Jonathan Middleton, and Ioannis Kompatsiaris. 2016. OSINT and the Dark Web. In Advanced Sciences and Technologies for Security Applications, 111–132. Springer. https://doi.org/10.1007/978-3-319-47671-1_8.

  • Kavallieros, Dimitrios, Dimitrios Myttas, Emmanouil Kermitsis, Euthimios Lissaris, Georgios Giataganas, and Eleni Darra. 2021. Understanding the Dark Web, 3–26. https://doi.org/10.1007/978-3-030-55343-2_1.

  • Kayode-Adedeji, Tolulope, Olusola Oyero, and Stella Aririguzoh. 2019. Dataset on Online Mass Media Engagements on YouTube for Terrorism Related Discussions. Data in Brief 23: 103581. https://doi.org/10.1016/J.DIB.2018.12.020.

    Article  PubMed  PubMed Central  Google Scholar 

  • Keene, Shima D. 2011. Terrorism and the Internet : A Double-Edged Sword. Journal of Money Laundering Control 14 (4): 359–370. https://doi.org/10.1108/13685201111173839.

    Article  Google Scholar 

  • Kelley, Jack. 2002. Militants Wire Web With Links to Jihad.

  • Lakomy, Miron. 2019. Recruitment and Incitement to Violence in the Islamic State’s Online Propaganda: Comparative Analysis of Dabiq and Rumiyah. https://doi.org/10.1080/1057610X.2019.1568008.

  • Liu, Zelong. 2013. High Performance Latent Dirichlet Allocation for Text Mining. Uxbridge: Brunel University.

    Google Scholar 

  • Mabey, Ben. 2018. PyLDAvis Documentation Release 2.1.2.

  • Malik, Nikita. 2018. Terror in the Dark. London. http://henryjacksonsociety.org/wp-content/uploads/2018/04/Terror-in-the-Dark.pdf.

  • Mallet. 2020. MALLET Homepage. 2020. http://mallet.cs.umass.edu/.

  • Masada, T., S. Kiyasu, and S. Miyahara. 2008. Comparing LDA with PLSI as a Dimensionality Reduction Method in Document Clustering. LKR’08 Proceedings of the 3rd International Conference on Large-Scale Knowledge Resources: Construction and Application, 13–26.

  • MEMRI. 2014. The ‘Dark Web’ And Jihad: A Preliminary Review Of Jihadis’ Perspective On The Underside Of The World Wide Web. May 21, 2014. https://www.memri.org/jttm/dark-web-and-jihad-preliminary-review-jihadis-perspective-underside-world-wide-web.

  • Moore, Daniel, and Thomas Rid. 2016. Cryptopolitik and the Darknet. Survival 58 (1): 7–38. https://doi.org/10.1080/00396338.2016.1142085.

    Article  Google Scholar 

  • Mouhssine, Errais, and Khalid Chougdali. 2018. Social Big Data Mining Framework for Extremist Content Detection in Social Networks. 2018. https://www.webofscience.com/wos/woscc/full-record/WOS:000459850100010.

  • Murthy, Dhiraj. 2021. Evaluating Platform Accountability: Terrorist Content on YouTube. American Behavioral Scientist 65 (6): 800–824. https://doi.org/10.1177/0002764221989774.

    Article  Google Scholar 

  • Musawı, Mohammed Ali. 2010. How Jihadists Use Internet Discussion Forums. 2010. https://www.media-diversity.org/additional-files/cheering-for-osama.pdf.

  • Najjar, Esraa, and Salam Al-augby. 2021. Sentiment Analysis Combination in Terrorist Detection on Twitter: A Brief Survey of Approaches and Techniques. 231–240. https://doi.org/10.1007/978-981-15-7527-3_23.

  • National Coordinator for Counterterrorism. 2010. Jihadists and the Internet.

  • Nurse, Jason R. C., and Maria Bada. 2019. The Group Element of Cybercrime: Types, Dynamics, and Criminal Operations. https://doi.org/10.1093/oxfordhb/9780198812746.013.36.

  • Pektaş, Şerafettin, and Johan Leman. 2019. Militant Jihadism Today and Tomorrow.

  • Phillips, Elizabeth, Jason R. C. Nurse, Michael Goldsmith, and Sadie Creese. 2015. Extracting Social Structure from DarkWeb Forums. In 5th International Conference on Social Media Technologies, Communication, and Informatics (SOTICS ’15), 2015.

  • Qin, Jialun, Yilu Zhou, Edna Reid, Guanpi Lai, and Hsinchun Chen. 2006. Unraveling International Terrorist Groups’ Exploitation of the Web: Technical Sophistication, Media Richness, and Web Interactivity. In Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 3917 LNCS:4–15. https://doi.org/10.1007/11734628_2.

  • Qin, Jialun, Yilu Zhou, Edna Reid, Guanpi Lai, and Hsinchun Chen. 2007. Analyzing Terror Campaigns on the Internet: Technical Sophistication, Content Richness, and Web Interactivity. International Journal of Human Computer Studies 65 (1): 71–84. https://doi.org/10.1016/j.ijhcs.2006.08.012.

    Article  Google Scholar 

  • Rehurek, Radim. 2020. Gensim-Project Description. 2020. https://pypi.org/project/gensim/.

  • Robertson, John, Ahmad Diab, Ericsson Marin, Eric Nunes, Vivin Paliath, Jana Shakarian, and Paulo Shakarian. 2017. Darkweb Cyber Threat Intelligence Mining. Cambridge: Cambridge University Press. https://doi.org/10.1017/9781316888513.

    Book  Google Scholar 

  • Sabbah, Thabit, Ali Selamat, Md Hafiz Selamat, Roliana Ibrahim, and Hamido Fujita. 2016. Hybridized Term-Weighting Method for Dark Web Classification. Neurocomputing 173: 1908–1926. https://doi.org/10.1016/j.neucom.2015.09.063.

    Article  Google Scholar 

  • Saleh, Hasan. 2023. Beneath the Surface: Exploring the Dark Web and Its Societal Impacts Programme. Sweden: Uppsala Universitet.

    Google Scholar 

  • Scanlon, Jacob R., and Matthew S. Gerber. 2015. Forecasting Violent Extremist Cyber Recruitment. IEEE Transactions on Information Forensics and Security 10 (11): 2461–2470. https://doi.org/10.1109/TIFS.2015.2464775.

    Article  Google Scholar 

  • Shillito, Matthew Robert. 2019. Untangling the ‘Dark Web’: An Emerging Technological Challenge for the Criminal Law. Information & Communications Technology Law 28 (2): 186–207. https://doi.org/10.1080/13600834.2019.1623449.

    Article  Google Scholar 

  • SITE Intelligence Group. 2009. Al Qa’ida Urges Gaza Reprisals in Western, Arab Capitals.

  • Soska, Kyle, and Nicolas Christin. 2015. Measuring the Longitudinal Evolution of the Online Anonymous Marketplace Ecosystem. In Proceedings of the 24th USENIX Security Symposium, 33–48.

  • Sultana, Jabeen, and Abdul Khader Jilani. 2021. Exploring and Analysing Surface, Deep, Dark Web and Attacks. EAI/Springer Innovations in Communication and Computing, 85–96. https://doi.org/10.1007/978-3-030-69174-5_5/FIGURES/8.

  • The Institute for National Security Studies (INSS). 2013. Backdoor Plots: The Darknet as a Field for Terrorism. 2013. https://www.inss.org.il/index.aspx?id=4538&articleid=5574.

  • Theohary, Catherine A., and John Rollins. 2011. Terrorist Use of the Internet: Information Operations in Cyberspace. Collingdale: DIANE Publishing.

    Google Scholar 

  • Thomas, Timothy L. 2003. Al Qaeda and the Internet: The Danger of Cyberplanning. Parameters. 2003. https://www.researchgate.net/publication/237468015_Al_Qaeda_and_the_Internet_The_Danger_of_Cyberplanning.

  • Tundis, Andrea, Archit Jain, Gaurav Bhatia, and Max Muhlhauser. 2019. Similarity Analysis of Criminals on Social Networks: An Example on Twitter. In Proceedings—International Conference on Computer Communications and Networks, ICCCN 2019-July. https://doi.org/10.1109/ICCCN.2019.8847028.

  • United Nations Office on Drugs and Crime. 2012. The Use of the Internet for Terrorist Purposes.

  • Vilic, Vida. 2007. Dark Web, Cyber Terrorism and Cyber Warfare: Dark Side of The Cyberspace. 2007. https://www.researchgate.net/publication/324720749_DARK_WEB_CYBER_TERRORISM_AND_CYBER_WARFARE_DARK_SIDE_OF_THE_CYBERSPACE.

  • Warius, Abdullah, and Brian Fishman. 2009. A Jihadist’s Course in the Art of Recruitment. CTC SENTİNEL 2 (2).

  • Warner, Charlotte. 2023. Law Enforcement and Digital Policing of the Dark Web: An Assessment of the Technical, Ethical and Legal Issues, 105–115. https://doi.org/10.1007/978-3-031-40118-3_7/COVER.

  • Weimann, Gabriel. 2015. Going Darker ? The Challenge of Dark Net Terrorism.

  • Weimann, Gabriel. 2016. Going Dark: Terrorism on the Dark Web Studies in Conflict and Terrorism 39 (3): 195–206. https://doi.org/10.1080/1057610X.2015.1119546.

    Article  Google Scholar 

  • Wimmer, Andreas, and Aulia Nastiti. 2015. Dark Net, Social Media and Extremism: Addressing Indonesian Counter Terrorism on the Internet. Deutsches Asienforschungszentrum Asian Series Commentaries 30.

  • Xu, Feng, Duoyong Sun, Ze Li, and Bo Li. 2018. Exploring Structural Features of Terrorist Organization’s Online Supporting Community via Social Network Modeling. In 2017 3rd IEEE International Conference on Computer and Communications, ICCC 2017 2018: 274–278. https://doi.org/10.1109/CompComm.2017.8322555.

  • Xu, Jennifer, Hsinchun Chen, Yilu Zhou, and Jialun Qin. 2006. On the Topology of the Dark Web of Terrorist Groups. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 3975 LNCS: 367–376. https://doi.org/10.1007/11760146_32.

  • Xu, **aotian, and Shanshan Ding. 2021. Latent Dirichlet Allocation and Predatory Pricing Online Data. Department of Applied Economics and Statistics, University of Delaware, Newark, DE. https://udspace.udel.edu/handle/19716/28820.

  • Zhou, Yilu, Jialun Qin, Edna Reid, Guanpi Lai, and Hsinchun Chen. 2005. Studying the Presence of Terrorism on the Web. In 402. Association for Computing Machinery (ACM). https://doi.org/10.1145/1065385.1065505.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Eda Sonmez.

Ethics declarations

Conflict of interest

On behalf of all authors, the corresponding author states that there is no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sonmez, E., Seckin Codal, K. Analyzing a Dark Web forum page in the context of terrorism: a topic modeling approach. Secur J (2024). https://doi.org/10.1057/s41284-024-00421-9

Download citation

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1057/s41284-024-00421-9

Keywords

Navigation