Skip to main content
Erschienen in: Social Network Analysis and Mining 1/2024

01.12.2024 | Original Article

A longitudinal dataset and analysis of Twitter ISIS users and propaganda

verfasst von: Younes Karimi, Anna Squicciarini, Peter Kent Forster

Erschienen in: Social Network Analysis and Mining | Ausgabe 1/2024

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Although ISIS was driven out of its last territory in Syria and its physical caliphate collapsed in 2019, recent terrorist attacks and incidents in various areas, such as Central Africa, and recently designated terrorists by the Department of State signify the presence and growth of ISIS affiliates. Yet, once under scrutiny, their whereabouts have been less known and studied since then. In this paper, we aim to reopen this line of investigation to further our understanding of the recent ISIS online presence. We collect and analyze a longitudinal dataset of tweets from potential ISIS affiliates and an existing dataset of ISIS Twitter activities around 2015—when Twitter cracked down on many ISIS accounts. We build a user classifier to identify ISIS supporters on Twitter. We further investigate different types of content and topics used by known ISIS accounts and compare these attributes among ISIS and its potential affiliates. We also identify messages that gained abnormal attention and support and presumably were used to spread propaganda and influence and manipulate the online community. Finally, we build and evaluate an image classifier using the residual network pretrained image classification models to categorize the photos attached to the candidate propaganda tweets of ISIS and identify the major themes in those media files.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Fußnoten
1
Also known as the Islamic State in Iraq and al-Sham, the Islamic State of Iraq and the Levant (ISIL), the Islamic State (IS), and in Arabic, Daesh (an acronym formed from the initial letters of the group’s previous name in Arabic—“al-Dawla al-Islamiya fil Iraq wa al-Sham”—which means to tread underfoot, trample down, or crush something, and sounds unpleasant to their supporters) is a militant Sunni Islamist extremist group that follows a Salafi jihadist doctrine.
 
6
As of 2021, four Twitter users with similar usernames of @CtrlSec (https://​twitter.​com/​CtrlSec), @CtrlSec0, @CtrlSec1, and @CtrlSec2 are directly associated to this campaign.
 
9
We used https://​www.​wordclouds.​com to generate the word clouds.
 
16
This uniqueness is solely based on the tweet IDs, the author of the tweets, and the media keys. We did not remove photos that are visual duplicates.
 
19
IS-K or ISIS-K stands for the Islamic State - Khorasan Province.
 
Literatur
Zurück zum Zitat Ahmad S, Asghar MZ, Alotaibi FM, Awan I (2019) Detection and classification of social media-based extremist affiliations using sentiment analysis techniques. HCIS 9:1–23 Ahmad S, Asghar MZ, Alotaibi FM, Awan I (2019) Detection and classification of social media-based extremist affiliations using sentiment analysis techniques. HCIS 9:1–23
Zurück zum Zitat Aïmeur E, Amri S, Brassard G (2023) Fake news, disinformation and misinformation in social media: a review. Soc Netw Anal Min 13(1):30CrossRef Aïmeur E, Amri S, Brassard G (2023) Fake news, disinformation and misinformation in social media: a review. Soc Netw Anal Min 13(1):30CrossRef
Zurück zum Zitat Alfifi M, Kaghazgaran P, Caverlee J, Morstatter F (2019) A large-scale study of ISIS social media strategy: community size, collective influence, and behavioral impact. Proc Int AAAI Conf Web Soc Med 13(01):58–67CrossRef Alfifi M, Kaghazgaran P, Caverlee J, Morstatter F (2019) A large-scale study of ISIS social media strategy: community size, collective influence, and behavioral impact. Proc Int AAAI Conf Web Soc Med 13(01):58–67CrossRef
Zurück zum Zitat Alfifi M, Kaghazgaran P, Caverlee J, Morstatter F (2018) Measuring the impact of isis social media strategy. MIS2. Marina Del Ray, California Alfifi M, Kaghazgaran P, Caverlee J, Morstatter F (2018) Measuring the impact of isis social media strategy. MIS2. Marina Del Ray, California
Zurück zum Zitat Barrón-Cedeno A, Jaradat I, Da San Martino G, Nakov P (2019) Proppy: organizing the news based on their propagandistic content. Inform Process Manag 56(5):1849–1864CrossRef Barrón-Cedeno A, Jaradat I, Da San Martino G, Nakov P (2019) Proppy: organizing the news based on their propagandistic content. Inform Process Manag 56(5):1849–1864CrossRef
Zurück zum Zitat Benigni M, Carley KM (2016) From tweets to intelligence: Understanding the islamic jihad supporting community on twitter. In: Social, Cultural, and Behavioral Modeling: 9th International Conference, SBP-BRiMS 2016, Washington, DC, USA, June 28-July 1, 2016, Proceedings 9, pp. 346–355. Springer Benigni M, Carley KM (2016) From tweets to intelligence: Understanding the islamic jihad supporting community on twitter. In: Social, Cultural, and Behavioral Modeling: 9th International Conference, SBP-BRiMS 2016, Washington, DC, USA, June 28-July 1, 2016, Proceedings 9, pp. 346–355. Springer
Zurück zum Zitat Berger JM, Morgan J (2015) The ISIS twitter census: defining and describing the population of ISIS supporters on twitter. Brook Project US Relations Islamic World 3(20):1–42529 Berger JM, Morgan J (2015) The ISIS twitter census: defining and describing the population of ISIS supporters on twitter. Brook Project US Relations Islamic World 3(20):1–42529
Zurück zum Zitat Berger J, Strathearn B (2013) Who matters online: Measuring influence, evaluating content and countering violent extremism in online social networks Berger J, Strathearn B (2013) Who matters online: Measuring influence, evaluating content and countering violent extremism in online social networks
Zurück zum Zitat Bolsover G, Howard P (2017) Computational propaganda and political big data: Moving toward a more critical research agenda. Mary Ann Liebert, Inc. 140 Huguenot Street, 3rd Floor New Rochelle, NY 10801 USA Bolsover G, Howard P (2017) Computational propaganda and political big data: Moving toward a more critical research agenda. Mary Ann Liebert, Inc. 140 Huguenot Street, 3rd Floor New Rochelle, NY 10801 USA
Zurück zum Zitat Chu Z, Gianvecchio S, Wang H, Jajodia S (2012) Detecting automation of twitter accounts: Are you a human, bot, or cyborg? IEEE Trans Dependable Secure Comput 9(6):811–824CrossRef Chu Z, Gianvecchio S, Wang H, Jajodia S (2012) Detecting automation of twitter accounts: Are you a human, bot, or cyborg? IEEE Trans Dependable Secure Comput 9(6):811–824CrossRef
Zurück zum Zitat Comito C (2021) How covid-19 information spread in us? The role of twitter as early indicator of epidemics. IEEE Trans Serv Comput 15(3):1193–1205CrossRef Comito C (2021) How covid-19 information spread in us? The role of twitter as early indicator of epidemics. IEEE Trans Serv Comput 15(3):1193–1205CrossRef
Zurück zum Zitat Dalton A, Aghaei E, Al-Shaer E, Bhatia A, Castillo E, Cheng Z, Dhaduvai S, Duan Q, Hebenstreit B, Islam MM, et al(2020) Active defense against social engineering: The case for human language technology. In: Proceedings for the First International Workshop on Social Threats in Online Conversations: Understanding and Management, pp. 1–8 Dalton A, Aghaei E, Al-Shaer E, Bhatia A, Castillo E, Cheng Z, Dhaduvai S, Duan Q, Hebenstreit B, Islam MM, et al(2020) Active defense against social engineering: The case for human language technology. In: Proceedings for the First International Workshop on Social Threats in Online Conversations: Understanding and Management, pp. 1–8
Zurück zum Zitat Fernandez M, Alani H (2018) Contextual semantics for radicalisation detection on twitter. In: Semantic Web for Social Good Workshop (SW4SG) at International Semantic Web Conference 2018, vol. 2182. CEUR Workshop Proceedings Fernandez M, Alani H (2018) Contextual semantics for radicalisation detection on twitter. In: Semantic Web for Social Good Workshop (SW4SG) at International Semantic Web Conference 2018, vol. 2182. CEUR Workshop Proceedings
Zurück zum Zitat Ferrara E, Wang W-Q, Varol O, Flammini A, Galstyan A (2016) Predicting online extremism, content adopters, and interaction reciprocity. In: Social Informatics: 8th International Conference, SocInfo 2016, Bellevue, WA, USA, November 11-14, 2016, Proceedings, Part II 8, pp. 22–39. Springer Ferrara E, Wang W-Q, Varol O, Flammini A, Galstyan A (2016) Predicting online extremism, content adopters, and interaction reciprocity. In: Social Informatics: 8th International Conference, SocInfo 2016, Bellevue, WA, USA, November 11-14, 2016, Proceedings, Part II 8, pp. 22–39. Springer
Zurück zum Zitat Gaikwad M, Ahirrao S, Phansalkar S, Kotecha K (2021) Online extremism detection: a systematic literature review with emphasis on datasets, classification techniques, validation methods, and tools. IEEE Access 9:48364–48404CrossRef Gaikwad M, Ahirrao S, Phansalkar S, Kotecha K (2021) Online extremism detection: a systematic literature review with emphasis on datasets, classification techniques, validation methods, and tools. IEEE Access 9:48364–48404CrossRef
Zurück zum Zitat Grave E, Bojanowski P, Gupta P, Joulin A, Mikolov T (2018) Learning word vectors for 157 languages. In: Proceedings of the International Conference on Language Resources and Evaluation (LREC 2018) Grave E, Bojanowski P, Gupta P, Joulin A, Mikolov T (2018) Learning word vectors for 157 languages. In: Proceedings of the International Conference on Language Resources and Evaluation (LREC 2018)
Zurück zum Zitat He K, Zhang X, Ren S, Sun J (2016) Deep residual learning for image recognition. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 770–778 He K, Zhang X, Ren S, Sun J (2016) Deep residual learning for image recognition. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 770–778
Zurück zum Zitat How to detect propaganda (1938) In Publications of the Institute for Propaganda Analysis, 210–218 How to detect propaganda (1938) In Publications of the Institute for Propaganda Analysis, 210–218
Zurück zum Zitat Hristakieva K, Cresci S, Da San Martino G, Conti M, Nakov P (2022) The spread of propaganda by coordinated communities on social media. In: 14th ACM Web Science Conference 2022, pp. 191–201 Hristakieva K, Cresci S, Da San Martino G, Conti M, Nakov P (2022) The spread of propaganda by coordinated communities on social media. In: 14th ACM Web Science Conference 2022, pp. 191–201
Zurück zum Zitat International Assoc of Chiefs of Policec. IA, of Operations B, Research of America US. (1975) Clandestine tactics and technology-a technical and background intelligence data service, volume 3 International Assoc of Chiefs of Policec. IA, of Operations B, Research of America US. (1975) Clandestine tactics and technology-a technical and background intelligence data service, volume 3
Zurück zum Zitat Karimi Y, Squicciarini A, Wilson S (2022) Automated detection of doxing on twitter. Proc ACM Hum-Comput Interact 6(CSCW2):1–24CrossRef Karimi Y, Squicciarini A, Wilson S (2022) Automated detection of doxing on twitter. Proc ACM Hum-Comput Interact 6(CSCW2):1–24CrossRef
Zurück zum Zitat Karimi Y, Squicciarini A, Forster PK, Leavitt KM (2022) A longitudinal dataset of twitter isis users. arXiv preprint arXiv:2202.00878 Karimi Y, Squicciarini A, Forster PK, Leavitt KM (2022) A longitudinal dataset of twitter isis users. arXiv preprint arXiv:​2202.​00878
Zurück zum Zitat Lotan G, Graeff E, Ananny M, Gaffney D, Pearce I et al (2011) The Arab spring\(\vert\) the revolutions were tweeted: information flows during the 2011 Tunisian and Egyptian revolutions. Int J Commun 5:31 Lotan G, Graeff E, Ananny M, Gaffney D, Pearce I et al (2011) The Arab spring\(\vert\) the revolutions were tweeted: information flows during the 2011 Tunisian and Egyptian revolutions. Int J Commun 5:31
Zurück zum Zitat Magdy W, Darwish K, Weber I (2015) # failedrevolutions: Using twitter to study the antecedents of isis support. arXiv preprint arXiv:1503.02401 Magdy W, Darwish K, Weber I (2015) # failedrevolutions: Using twitter to study the antecedents of isis support. arXiv preprint arXiv:​1503.​02401
Zurück zum Zitat Martino GDS, Yu S, Barrón-Cedeño A, Petrov R, Nakov P (2019) Fine-grained analysis of propaganda in news articles. arXiv preprint arXiv:1910.02517 Martino GDS, Yu S, Barrón-Cedeño A, Petrov R, Nakov P (2019) Fine-grained analysis of propaganda in news articles. arXiv preprint arXiv:​1910.​02517
Zurück zum Zitat McMinimy K, Winkler CK, Lokmanoglu AD, Almahmoud M (2021) Censoring extremism: influence of online restriction on official media products of isis. Terrorism and Political Violence, 1–17 McMinimy K, Winkler CK, Lokmanoglu AD, Almahmoud M (2021) Censoring extremism: influence of online restriction on official media products of isis. Terrorism and Political Violence, 1–17
Zurück zum Zitat Mehrotra S, Squicciarini AC, Serra E, Karimi Y (2022) Covid-19 and haters-a user model perspective. In: 2022 IEEE 9th international conference on data science and advanced analytics (DSAA), pp. 1–9. IEEE Mehrotra S, Squicciarini AC, Serra E, Karimi Y (2022) Covid-19 and haters-a user model perspective. In: 2022 IEEE 9th international conference on data science and advanced analytics (DSAA), pp. 1–9. IEEE
Zurück zum Zitat Meleagrou-Hitchens A, Hughes S (2017) The threat to the united states from the islamic state’s virtual entrepreneurs. CTC Sentinel 10(3):1–8 Meleagrou-Hitchens A, Hughes S (2017) The threat to the united states from the islamic state’s virtual entrepreneurs. CTC Sentinel 10(3):1–8
Zurück zum Zitat Moussaoui M, Zaghdoud M, Akaichi J (2019) A possibilistic framework for the detection of terrorism-related twitter communities in social media. Concurr Compu: Pract Exp 31(13):5077CrossRef Moussaoui M, Zaghdoud M, Akaichi J (2019) A possibilistic framework for the detection of terrorism-related twitter communities in social media. Concurr Compu: Pract Exp 31(13):5077CrossRef
Zurück zum Zitat Murugan P, Karimi Y, Squicciarini A, Griffin C (2021) Modeling longitudinal behavior dynamics among extremist users in twitter data. In: 2021 IEEE international conference on big data (Big Data), pp 4906–4914. IEEE Murugan P, Karimi Y, Squicciarini A, Griffin C (2021) Modeling longitudinal behavior dynamics among extremist users in twitter data. In: 2021 IEEE international conference on big data (Big Data), pp 4906–4914. IEEE
Zurück zum Zitat Rashkin H, Choi E, Jang JY, Volkova S, Choi Y (2017) Truth of varying shades: Analyzing language in fake news and political fact-checking. In: Proceedings of the 2017 Conference on Empirical Methods in Natural Language Processing, pp. 2931–2937 Rashkin H, Choi E, Jang JY, Volkova S, Choi Y (2017) Truth of varying shades: Analyzing language in fake news and political fact-checking. In: Proceedings of the 2017 Conference on Empirical Methods in Natural Language Processing, pp. 2931–2937
Zurück zum Zitat Saif H, Dickinson T, Kastler L, Fernandez M, Alani H (2017) A semantic graph-based approach for radicalisation detection on social media. In: The Semantic Web: 14th International Conference, ESWC 2017, Portorož, Slovenia, May 28–June 1, 2017, Proceedings, Part I 14, pp. 571–587. Springer Saif H, Dickinson T, Kastler L, Fernandez M, Alani H (2017) A semantic graph-based approach for radicalisation detection on social media. In: The Semantic Web: 14th International Conference, ESWC 2017, Portorož, Slovenia, May 28–June 1, 2017, Proceedings, Part I 14, pp. 571–587. Springer
Zurück zum Zitat Starbird K, Palen L (2012) (how) will the revolution be retweeted?: information diffusion and the 2011 egyptian uprising. In: Proceedings of the Acm 2012 conference on computer supported cooperative work, pp 7–16. ACM Starbird K, Palen L (2012) (how) will the revolution be retweeted?: information diffusion and the 2011 egyptian uprising. In: Proceedings of the Acm 2012 conference on computer supported cooperative work, pp 7–16. ACM
Zurück zum Zitat Vidino L, Hughes S (2015) ISIS in America: From Retweets to Raqqa (George Washington University: Program on Extremism, 2015) 7 Vidino L, Hughes S (2015) ISIS in America: From Retweets to Raqqa (George Washington University: Program on Extremism, 2015) 7
Zurück zum Zitat Weirman S, Alexander A (2020) Hyperlinked sympathizers: Urls and the islamic state. Stud Conflict Terrorism 43(3):239–257CrossRef Weirman S, Alexander A (2020) Hyperlinked sympathizers: Urls and the islamic state. Stud Conflict Terrorism 43(3):239–257CrossRef
Zurück zum Zitat Yu S, Di Pietro R, Nakov P (2020) A survey on computational propaganda detection Yu S, Di Pietro R, Nakov P (2020) A survey on computational propaganda detection
Zurück zum Zitat Zhang J, Zhang R, Zhang Y, Yan G (2016) The rise of social botnets: attacks and countermeasures. IEEE Trans Dependable Secure Comput 15(6):1068–1082MathSciNetCrossRef Zhang J, Zhang R, Zhang Y, Yan G (2016) The rise of social botnets: attacks and countermeasures. IEEE Trans Dependable Secure Comput 15(6):1068–1082MathSciNetCrossRef
Metadaten
Titel
A longitudinal dataset and analysis of Twitter ISIS users and propaganda
verfasst von
Younes Karimi
Anna Squicciarini
Peter Kent Forster
Publikationsdatum
01.12.2024
Verlag
Springer Vienna
Erschienen in
Social Network Analysis and Mining / Ausgabe 1/2024
Print ISSN: 1869-5450
Elektronische ISSN: 1869-5469
DOI
https://doi.org/10.1007/s13278-023-01177-7

Weitere Artikel der Ausgabe 1/2024

Social Network Analysis and Mining 1/2024 Zur Ausgabe

Premium Partner