Skip to main content
Top
Published in: Social Network Analysis and Mining 1/2024

01-12-2024 | Original Article

A longitudinal dataset and analysis of Twitter ISIS users and propaganda

Authors: Younes Karimi, Anna Squicciarini, Peter Kent Forster

Published in: Social Network Analysis and Mining | Issue 1/2024

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Although ISIS was driven out of its last territory in Syria and its physical caliphate collapsed in 2019, recent terrorist attacks and incidents in various areas, such as Central Africa, and recently designated terrorists by the Department of State signify the presence and growth of ISIS affiliates. Yet, once under scrutiny, their whereabouts have been less known and studied since then. In this paper, we aim to reopen this line of investigation to further our understanding of the recent ISIS online presence. We collect and analyze a longitudinal dataset of tweets from potential ISIS affiliates and an existing dataset of ISIS Twitter activities around 2015—when Twitter cracked down on many ISIS accounts. We build a user classifier to identify ISIS supporters on Twitter. We further investigate different types of content and topics used by known ISIS accounts and compare these attributes among ISIS and its potential affiliates. We also identify messages that gained abnormal attention and support and presumably were used to spread propaganda and influence and manipulate the online community. Finally, we build and evaluate an image classifier using the residual network pretrained image classification models to categorize the photos attached to the candidate propaganda tweets of ISIS and identify the major themes in those media files.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Footnotes
1
Also known as the Islamic State in Iraq and al-Sham, the Islamic State of Iraq and the Levant (ISIL), the Islamic State (IS), and in Arabic, Daesh (an acronym formed from the initial letters of the group’s previous name in Arabic—“al-Dawla al-Islamiya fil Iraq wa al-Sham”—which means to tread underfoot, trample down, or crush something, and sounds unpleasant to their supporters) is a militant Sunni Islamist extremist group that follows a Salafi jihadist doctrine.
 
6
As of 2021, four Twitter users with similar usernames of @CtrlSec (https://​twitter.​com/​CtrlSec), @CtrlSec0, @CtrlSec1, and @CtrlSec2 are directly associated to this campaign.
 
9
We used https://​www.​wordclouds.​com to generate the word clouds.
 
16
This uniqueness is solely based on the tweet IDs, the author of the tweets, and the media keys. We did not remove photos that are visual duplicates.
 
19
IS-K or ISIS-K stands for the Islamic State - Khorasan Province.
 
Literature
go back to reference Ahmad S, Asghar MZ, Alotaibi FM, Awan I (2019) Detection and classification of social media-based extremist affiliations using sentiment analysis techniques. HCIS 9:1–23 Ahmad S, Asghar MZ, Alotaibi FM, Awan I (2019) Detection and classification of social media-based extremist affiliations using sentiment analysis techniques. HCIS 9:1–23
go back to reference Aïmeur E, Amri S, Brassard G (2023) Fake news, disinformation and misinformation in social media: a review. Soc Netw Anal Min 13(1):30CrossRef Aïmeur E, Amri S, Brassard G (2023) Fake news, disinformation and misinformation in social media: a review. Soc Netw Anal Min 13(1):30CrossRef
go back to reference Alfifi M, Kaghazgaran P, Caverlee J, Morstatter F (2019) A large-scale study of ISIS social media strategy: community size, collective influence, and behavioral impact. Proc Int AAAI Conf Web Soc Med 13(01):58–67CrossRef Alfifi M, Kaghazgaran P, Caverlee J, Morstatter F (2019) A large-scale study of ISIS social media strategy: community size, collective influence, and behavioral impact. Proc Int AAAI Conf Web Soc Med 13(01):58–67CrossRef
go back to reference Alfifi M, Kaghazgaran P, Caverlee J, Morstatter F (2018) Measuring the impact of isis social media strategy. MIS2. Marina Del Ray, California Alfifi M, Kaghazgaran P, Caverlee J, Morstatter F (2018) Measuring the impact of isis social media strategy. MIS2. Marina Del Ray, California
go back to reference Barrón-Cedeno A, Jaradat I, Da San Martino G, Nakov P (2019) Proppy: organizing the news based on their propagandistic content. Inform Process Manag 56(5):1849–1864CrossRef Barrón-Cedeno A, Jaradat I, Da San Martino G, Nakov P (2019) Proppy: organizing the news based on their propagandistic content. Inform Process Manag 56(5):1849–1864CrossRef
go back to reference Benigni M, Carley KM (2016) From tweets to intelligence: Understanding the islamic jihad supporting community on twitter. In: Social, Cultural, and Behavioral Modeling: 9th International Conference, SBP-BRiMS 2016, Washington, DC, USA, June 28-July 1, 2016, Proceedings 9, pp. 346–355. Springer Benigni M, Carley KM (2016) From tweets to intelligence: Understanding the islamic jihad supporting community on twitter. In: Social, Cultural, and Behavioral Modeling: 9th International Conference, SBP-BRiMS 2016, Washington, DC, USA, June 28-July 1, 2016, Proceedings 9, pp. 346–355. Springer
go back to reference Berger JM, Morgan J (2015) The ISIS twitter census: defining and describing the population of ISIS supporters on twitter. Brook Project US Relations Islamic World 3(20):1–42529 Berger JM, Morgan J (2015) The ISIS twitter census: defining and describing the population of ISIS supporters on twitter. Brook Project US Relations Islamic World 3(20):1–42529
go back to reference Berger J, Strathearn B (2013) Who matters online: Measuring influence, evaluating content and countering violent extremism in online social networks Berger J, Strathearn B (2013) Who matters online: Measuring influence, evaluating content and countering violent extremism in online social networks
go back to reference Bolsover G, Howard P (2017) Computational propaganda and political big data: Moving toward a more critical research agenda. Mary Ann Liebert, Inc. 140 Huguenot Street, 3rd Floor New Rochelle, NY 10801 USA Bolsover G, Howard P (2017) Computational propaganda and political big data: Moving toward a more critical research agenda. Mary Ann Liebert, Inc. 140 Huguenot Street, 3rd Floor New Rochelle, NY 10801 USA
go back to reference Chu Z, Gianvecchio S, Wang H, Jajodia S (2012) Detecting automation of twitter accounts: Are you a human, bot, or cyborg? IEEE Trans Dependable Secure Comput 9(6):811–824CrossRef Chu Z, Gianvecchio S, Wang H, Jajodia S (2012) Detecting automation of twitter accounts: Are you a human, bot, or cyborg? IEEE Trans Dependable Secure Comput 9(6):811–824CrossRef
go back to reference Comito C (2021) How covid-19 information spread in us? The role of twitter as early indicator of epidemics. IEEE Trans Serv Comput 15(3):1193–1205CrossRef Comito C (2021) How covid-19 information spread in us? The role of twitter as early indicator of epidemics. IEEE Trans Serv Comput 15(3):1193–1205CrossRef
go back to reference Dalton A, Aghaei E, Al-Shaer E, Bhatia A, Castillo E, Cheng Z, Dhaduvai S, Duan Q, Hebenstreit B, Islam MM, et al(2020) Active defense against social engineering: The case for human language technology. In: Proceedings for the First International Workshop on Social Threats in Online Conversations: Understanding and Management, pp. 1–8 Dalton A, Aghaei E, Al-Shaer E, Bhatia A, Castillo E, Cheng Z, Dhaduvai S, Duan Q, Hebenstreit B, Islam MM, et al(2020) Active defense against social engineering: The case for human language technology. In: Proceedings for the First International Workshop on Social Threats in Online Conversations: Understanding and Management, pp. 1–8
go back to reference Fernandez M, Alani H (2018) Contextual semantics for radicalisation detection on twitter. In: Semantic Web for Social Good Workshop (SW4SG) at International Semantic Web Conference 2018, vol. 2182. CEUR Workshop Proceedings Fernandez M, Alani H (2018) Contextual semantics for radicalisation detection on twitter. In: Semantic Web for Social Good Workshop (SW4SG) at International Semantic Web Conference 2018, vol. 2182. CEUR Workshop Proceedings
go back to reference Ferrara E, Wang W-Q, Varol O, Flammini A, Galstyan A (2016) Predicting online extremism, content adopters, and interaction reciprocity. In: Social Informatics: 8th International Conference, SocInfo 2016, Bellevue, WA, USA, November 11-14, 2016, Proceedings, Part II 8, pp. 22–39. Springer Ferrara E, Wang W-Q, Varol O, Flammini A, Galstyan A (2016) Predicting online extremism, content adopters, and interaction reciprocity. In: Social Informatics: 8th International Conference, SocInfo 2016, Bellevue, WA, USA, November 11-14, 2016, Proceedings, Part II 8, pp. 22–39. Springer
go back to reference Gaikwad M, Ahirrao S, Phansalkar S, Kotecha K (2021) Online extremism detection: a systematic literature review with emphasis on datasets, classification techniques, validation methods, and tools. IEEE Access 9:48364–48404CrossRef Gaikwad M, Ahirrao S, Phansalkar S, Kotecha K (2021) Online extremism detection: a systematic literature review with emphasis on datasets, classification techniques, validation methods, and tools. IEEE Access 9:48364–48404CrossRef
go back to reference Grave E, Bojanowski P, Gupta P, Joulin A, Mikolov T (2018) Learning word vectors for 157 languages. In: Proceedings of the International Conference on Language Resources and Evaluation (LREC 2018) Grave E, Bojanowski P, Gupta P, Joulin A, Mikolov T (2018) Learning word vectors for 157 languages. In: Proceedings of the International Conference on Language Resources and Evaluation (LREC 2018)
go back to reference He K, Zhang X, Ren S, Sun J (2016) Deep residual learning for image recognition. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 770–778 He K, Zhang X, Ren S, Sun J (2016) Deep residual learning for image recognition. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 770–778
go back to reference How to detect propaganda (1938) In Publications of the Institute for Propaganda Analysis, 210–218 How to detect propaganda (1938) In Publications of the Institute for Propaganda Analysis, 210–218
go back to reference Hristakieva K, Cresci S, Da San Martino G, Conti M, Nakov P (2022) The spread of propaganda by coordinated communities on social media. In: 14th ACM Web Science Conference 2022, pp. 191–201 Hristakieva K, Cresci S, Da San Martino G, Conti M, Nakov P (2022) The spread of propaganda by coordinated communities on social media. In: 14th ACM Web Science Conference 2022, pp. 191–201
go back to reference International Assoc of Chiefs of Policec. IA, of Operations B, Research of America US. (1975) Clandestine tactics and technology-a technical and background intelligence data service, volume 3 International Assoc of Chiefs of Policec. IA, of Operations B, Research of America US. (1975) Clandestine tactics and technology-a technical and background intelligence data service, volume 3
go back to reference Karimi Y, Squicciarini A, Wilson S (2022) Automated detection of doxing on twitter. Proc ACM Hum-Comput Interact 6(CSCW2):1–24CrossRef Karimi Y, Squicciarini A, Wilson S (2022) Automated detection of doxing on twitter. Proc ACM Hum-Comput Interact 6(CSCW2):1–24CrossRef
go back to reference Lotan G, Graeff E, Ananny M, Gaffney D, Pearce I et al (2011) The Arab spring\(\vert\) the revolutions were tweeted: information flows during the 2011 Tunisian and Egyptian revolutions. Int J Commun 5:31 Lotan G, Graeff E, Ananny M, Gaffney D, Pearce I et al (2011) The Arab spring\(\vert\) the revolutions were tweeted: information flows during the 2011 Tunisian and Egyptian revolutions. Int J Commun 5:31
go back to reference Magdy W, Darwish K, Weber I (2015) # failedrevolutions: Using twitter to study the antecedents of isis support. arXiv preprint arXiv:1503.02401 Magdy W, Darwish K, Weber I (2015) # failedrevolutions: Using twitter to study the antecedents of isis support. arXiv preprint arXiv:​1503.​02401
go back to reference Martino GDS, Yu S, Barrón-Cedeño A, Petrov R, Nakov P (2019) Fine-grained analysis of propaganda in news articles. arXiv preprint arXiv:1910.02517 Martino GDS, Yu S, Barrón-Cedeño A, Petrov R, Nakov P (2019) Fine-grained analysis of propaganda in news articles. arXiv preprint arXiv:​1910.​02517
go back to reference McMinimy K, Winkler CK, Lokmanoglu AD, Almahmoud M (2021) Censoring extremism: influence of online restriction on official media products of isis. Terrorism and Political Violence, 1–17 McMinimy K, Winkler CK, Lokmanoglu AD, Almahmoud M (2021) Censoring extremism: influence of online restriction on official media products of isis. Terrorism and Political Violence, 1–17
go back to reference Mehrotra S, Squicciarini AC, Serra E, Karimi Y (2022) Covid-19 and haters-a user model perspective. In: 2022 IEEE 9th international conference on data science and advanced analytics (DSAA), pp. 1–9. IEEE Mehrotra S, Squicciarini AC, Serra E, Karimi Y (2022) Covid-19 and haters-a user model perspective. In: 2022 IEEE 9th international conference on data science and advanced analytics (DSAA), pp. 1–9. IEEE
go back to reference Meleagrou-Hitchens A, Hughes S (2017) The threat to the united states from the islamic state’s virtual entrepreneurs. CTC Sentinel 10(3):1–8 Meleagrou-Hitchens A, Hughes S (2017) The threat to the united states from the islamic state’s virtual entrepreneurs. CTC Sentinel 10(3):1–8
go back to reference Moussaoui M, Zaghdoud M, Akaichi J (2019) A possibilistic framework for the detection of terrorism-related twitter communities in social media. Concurr Compu: Pract Exp 31(13):5077CrossRef Moussaoui M, Zaghdoud M, Akaichi J (2019) A possibilistic framework for the detection of terrorism-related twitter communities in social media. Concurr Compu: Pract Exp 31(13):5077CrossRef
go back to reference Murugan P, Karimi Y, Squicciarini A, Griffin C (2021) Modeling longitudinal behavior dynamics among extremist users in twitter data. In: 2021 IEEE international conference on big data (Big Data), pp 4906–4914. IEEE Murugan P, Karimi Y, Squicciarini A, Griffin C (2021) Modeling longitudinal behavior dynamics among extremist users in twitter data. In: 2021 IEEE international conference on big data (Big Data), pp 4906–4914. IEEE
go back to reference Rashkin H, Choi E, Jang JY, Volkova S, Choi Y (2017) Truth of varying shades: Analyzing language in fake news and political fact-checking. In: Proceedings of the 2017 Conference on Empirical Methods in Natural Language Processing, pp. 2931–2937 Rashkin H, Choi E, Jang JY, Volkova S, Choi Y (2017) Truth of varying shades: Analyzing language in fake news and political fact-checking. In: Proceedings of the 2017 Conference on Empirical Methods in Natural Language Processing, pp. 2931–2937
go back to reference Saif H, Dickinson T, Kastler L, Fernandez M, Alani H (2017) A semantic graph-based approach for radicalisation detection on social media. In: The Semantic Web: 14th International Conference, ESWC 2017, Portorož, Slovenia, May 28–June 1, 2017, Proceedings, Part I 14, pp. 571–587. Springer Saif H, Dickinson T, Kastler L, Fernandez M, Alani H (2017) A semantic graph-based approach for radicalisation detection on social media. In: The Semantic Web: 14th International Conference, ESWC 2017, Portorož, Slovenia, May 28–June 1, 2017, Proceedings, Part I 14, pp. 571–587. Springer
go back to reference Starbird K, Palen L (2012) (how) will the revolution be retweeted?: information diffusion and the 2011 egyptian uprising. In: Proceedings of the Acm 2012 conference on computer supported cooperative work, pp 7–16. ACM Starbird K, Palen L (2012) (how) will the revolution be retweeted?: information diffusion and the 2011 egyptian uprising. In: Proceedings of the Acm 2012 conference on computer supported cooperative work, pp 7–16. ACM
go back to reference Vidino L, Hughes S (2015) ISIS in America: From Retweets to Raqqa (George Washington University: Program on Extremism, 2015) 7 Vidino L, Hughes S (2015) ISIS in America: From Retweets to Raqqa (George Washington University: Program on Extremism, 2015) 7
go back to reference Weirman S, Alexander A (2020) Hyperlinked sympathizers: Urls and the islamic state. Stud Conflict Terrorism 43(3):239–257CrossRef Weirman S, Alexander A (2020) Hyperlinked sympathizers: Urls and the islamic state. Stud Conflict Terrorism 43(3):239–257CrossRef
go back to reference Yu S, Di Pietro R, Nakov P (2020) A survey on computational propaganda detection Yu S, Di Pietro R, Nakov P (2020) A survey on computational propaganda detection
go back to reference Zhang J, Zhang R, Zhang Y, Yan G (2016) The rise of social botnets: attacks and countermeasures. IEEE Trans Dependable Secure Comput 15(6):1068–1082MathSciNetCrossRef Zhang J, Zhang R, Zhang Y, Yan G (2016) The rise of social botnets: attacks and countermeasures. IEEE Trans Dependable Secure Comput 15(6):1068–1082MathSciNetCrossRef
Metadata
Title
A longitudinal dataset and analysis of Twitter ISIS users and propaganda
Authors
Younes Karimi
Anna Squicciarini
Peter Kent Forster
Publication date
01-12-2024
Publisher
Springer Vienna
Published in
Social Network Analysis and Mining / Issue 1/2024
Print ISSN: 1869-5450
Electronic ISSN: 1869-5469
DOI
https://doi.org/10.1007/s13278-023-01177-7

Other articles of this Issue 1/2024

Social Network Analysis and Mining 1/2024 Go to the issue

Premium Partner