This 2013 article examines the case of a Marine Corps reservist who perpetrated a series of attacks against military facilities in Virginia in October and November 2010.
This 2014 article uses a case study method to examine the implications of using the emerging technology of predictive analytics in a homeland security context, to provide increased intelligence for counterterrorism initiatives.
This 2013 paper introduces a methodology that incorporates information available on terrorist networks, into the analysis of social networks underlying terrorist groups.
This 2012 paper presents a model that was built using sentiment analysis scores from analyzing selected web forums that included radical content. The study looked at two Arabic language web forums and extracted a sample of 500 sentences from each, which were then manually translated.
This 2013 article analyzes content generated on Twitter during the attacks at the Boston Marathon in April 2013. The authors perform an in-depth characterization of what factors influenced malicious content and profiles becoming viral.
This 2014 paper utilizes a form of network representation that incorporates multiple data views to uncover and categorize networks of accounts that fall into four broadly defined groups in the Syrian conflict.
This article focuses on the use of linguistic “weak signals”—digital traces of intent—in social media as a tool of counterterrorism aimed at preventing lone-wolf attacks.
This portal gathers an annotated collection of recent research on the ways in which social media and new technologies may be leveraged in the fight against violent extremism
+1-613-755-4007 • info@secdev.foundation
Copyright © 2014 - 2017 • The SecDev Foundation