1. bookVolume 12 (2021): Issue 1 (April 2021)
Journal Details
License
Format
Journal
First Published
06 Mar 2017
Publication timeframe
3 times per year
Languages
English
access type Open Access

Illicit Activities Beneath the Surface Web: Investigating Domestic Extremism on Anonymous Social Media Platforms

Published Online: 27 Apr 2021
Page range: 27 - 40
Received: 01 Feb 2021
Accepted: 01 Mar 2021
Journal Details
License
Format
Journal
First Published
06 Mar 2017
Publication timeframe
3 times per year
Languages
English
Abstract

At the beginning of 2021, the Internet was used to spread words to incite insurrection and violence through social media, incited a pro-Trump mob riot into a U.S. Capitol building. Furthermore, due to recent acts of domestic terrorism in Texas, New Zealand, and California, police authorities have begun investigating social media presence that premeditated harmful acts. In all three instances, the shooters posted their manifesto online and had a presence on 8chan. The common thread among all shooters is their identification as a white nationalist and their social media site affiliation with Infinitechan, where they hid their radical ideas. Similarities in the shooters’ profiles include their perceived viewpoints of population groups regarding their political, ethnic, and social identities. This paper will provide insight into the forums where domestic terrorists spread their agendas. It will also set the foundation for further research towards a strategic algorithm that compiles and analyses relevant users’ profiles by using OSINT and data analytics techniques).

Keywords

Balduzzi, M., & Ciancaglini, V. n.d.. Cybercrime in the Deep Web. In Black Hat EU, Amsterdam 2015. Retrieved from https://www.blackhat.com/docs/eu-15/materials/eu-15-Balduzzi-Cybercrmine-In-The-Deep-Web-wp.pdf.Search in Google Scholar

Bergman, M. K. (2001). White paper: the deep web: surfacing hidden value. Journal of electronic publishing, 7(1).Search in Google Scholar

Bernstein, M. S., Monroy-Hernandez, A., Harry, D., Andre, P., Panovich, K., & Vargas, G. n.d.. 4chan and /b/: An Analysis of Anonymity and Ephemerality in a Large Online Community. 8.Search in Google Scholar

Best, C. (2011). Challenges in open source intelligence. Intelligence and Security Informatics Conference (EISIC), IEEE: 58-62).Search in Google Scholar

Cardenas-Haro, J. A., & Dawson, M. (2017). Tails Linux Operating System: The Amnesiac Incognito System in Times of High Surveillance, Its Security Flaws, Limitations, and Strengths in the Fight for Democracy in Security Solutions for Hyperconnectivity and the Internet of Things, 260-271. IGI Global.Search in Google Scholar

Committee on Homeland Security 8chan Inquiry before the U.S. House of Representatives, 106th Cong. (2019).Search in Google Scholar

Dawson, M., & Cárdenas-Haro, J. A. (2017). Tails Linux Operating System: Remaining Anonymous with the Assistance of an Incognito System in Times of High Surveillance. International Journal of Hyperconnectivity and the Internet of Things (IJHIoT), 1(1), 47-55.Search in Google Scholar

Dawson, M., Kisku, D. R., Gupta, P., Sing, J. K., & Li, W. (Eds.). (2016). Developing Next-Generation Countermeasures for Homeland Security Threat Prevention. IGI Global.Search in Google Scholar

Denis, M., Zena, C., & Hayajneh, T. (2016). Penetration testing: Concepts, attack methods, and defense strategies. 2016 IEEE Long Island Systems, Applications and Technology Conference (LISAT). doi:10.1109/lisat.2016.7494156Search in Google Scholar

Duggan, M., & Smith, A. (2013). 6% of online adults are reddit users. Pew Internet & American Life Project, 3: 1-10.Search in Google Scholar

Griffith, E. (2018). The Dark Side of Crypto Revolution. Accessed December 10, 2018. https://www.wired.com/story/the-dark-side-of-the-crypto-revolution/.Search in Google Scholar

Harris, S., & Meyers, M. (2002). CISSP. McGrawHill/OsborneSearch in Google Scholar

Janczewski, L., & Colarik, A. (2007). Cyber Warfare and Cyber Terrorism. Hershey. PA: IGI Global. doi:10.4018/978-1-59140-991-5Search in Google Scholar

Lapowsky, I. (2018). How Russian Facebook Ads Divided and Targeted US Voters Before the 2016 Election. Accessed December 3, 2018. https://www.wired.com/story/russian-facebookads-targeted-us-voters-before-2016-election/.Search in Google Scholar

Lima, D. (2016). Lessons to be learned from Adult FriendFinder hack of 412M accounts. Accessed December 19, 2018. https://www.bizjournals.com/southflorida/news/2016/11/21/lessons-to-be-learned-from-adult-friendfinder-hack.html.Search in Google Scholar

Nagle, A. (2017). Kill all normies: Online culture wars from 4chan and Tumblr to Trump and the alt-right. John Hunt Publishing.Search in Google Scholar

Osint framework. n.d.. Accessed January 9, 2021. https://osintframework.com/.Search in Google Scholar

Pingle, B., Mairaj, A., & Javaid, A. Y. (2018). Real-World Man-in-the-Middle (MITM) Attack Implementation Using Open Source Tools for Instructional Use. 2018 IEEE International Conference on Electro/Information Technology (EIT). doi:10.1109/eit.2018.8500082Search in Google Scholar

Qin, J., Zhou, Y., Lai, G., Reid, E., Sageman, M., & Chen, H. (2005). The dark web portal project: collecting and analysing the presence of terrorist groups on the web, in Proceedings of the 2005 IEEE international conference on Intelligence and Security Informatics, 623-624. Springer-Verlag.Search in Google Scholar

Shoaib, M., Ilyas, M., & Khiyal, M. S. (2013). Official digital currency. Eighth International Conference on Digital Information Management (ICDIM 2013). doi:10.1109/icdim.2013.6693982Search in Google Scholar

Telford, T., & Timberg, C. (2018). Marriott discloses massive data breach affecting up to 500 million guests. Accessed December 19, 2018. https://www.washingtonpost.com/business/2018/11/30/marriott-discloses-massive-data-breach-impacting-million-guests/?noredirect=on&utm_term=.717f57eb3cea.Search in Google Scholar

Wang, J., & Yang, T. (2018). Subliminal Channel and Digital Currency Pay Security. 2018 International Conference on Intelligent Transportation, Big Data & Smart City (ICITBS). doi:10.1109/icitbs.2018.00041Search in Google Scholar

Wang, P., Dawson, M., & Williams, K. L. (2018). Improving Cyber Defense Education through National Standard Alignment: Case Studies. International Journal of Hyperconnectivity and the Internet of Things (IJHIoT), 2(1), 12-28.Search in Google Scholar

Recommended articles from Trend MD

Plan your remote conference with Sciendo