Anda di halaman 1dari 15

GROUP 2 CASE STUDY 1

PRESENTATION
TOPIC NAME:
WILDCATS FIGHT CYBER
TERRORISTS

By:
JOHN ADEBIYI
KASHIM IDRIS
MONDAY ABDULLAWAL ABUBAKAR ETEMEYE 1
AND DEBORAH ROKPORONKE

A team of computer scientists from the University of Arizona (UA), whose mascot is
the wildcat,
is tracking and analyzing the use of the Internet by terrorists to recruit new members,
train supporters in terrorist tactics and methods, and spread propaganda. This
research project, dubbed Dark
Web, is supported by the National Science Foundation and other federal agencies. Its
goal is to
collect and analyze all terrorist content on the Internet, including e-mail, Internet
forums, and
terrorist-related Web sites (now estimated to exceed 50,000).42 The project team is
made up of
roughly one dozen UA professors and graduate students.
At its initiation, the Dark Web was only able to collect and analyze Internet
communications
in English, Arabic, and Spanish. German and French were quickly added. Chinese, Farsi
(spoken
in Iran, Afghanistan, and Tajikistan), Dutch, and other languages are also being added.

UA received a $1.5 million grant to study how


terrorists use the Internet to train their followers
to build, plant, and explode improvised explosive
devices (IEDs). These deadly roadside bombs
have killed and maimed thousands of people in
Iraq and other countries. Our young soldiers,
before theyre deployed, will know the IEDs
through the enemies eyes, said Hsinchun
Chen,
director of UAs Artificial Lab, home of the Dark
Web project.43 The ability to study this
information
and to know where it has been downloaded has
led to countermeasures that protect soldiers and

Another research area is the identification of


the kinds of individuals who are more
susceptible to recruitment by extremist groups,
and what messages are more effective in
recruiting people.
A surprising discovery by the Dark Web project
team is that the terrorist Web sites are much
richer
in multimedia content (audio and video) and
much more effective in creating an active
community
of frequent visitors than are U.S. government
Web sites.

The Dark Web project team has also developed


a technique called Write print, which can be
used to determine the author of anonymous
postings and e-mail. It does this by matching
new
anonymous postings to the lingual, structural,
and semantic features in hundreds of thousands
of online postings by known authors. The
accuracy rate is estimated to exceed 95
percent.

Market researchers in many organizations are


experimenting with the use of sentiment
analysis to determine the attitude of a writer
or speaker with respect to a certain subject. It
is used in
market research to evaluate how people feel
about a new product or a just-released movie.
One
approach to sentiment analysis is to separate
objective (fact-based) from subjective (opinion
based) sentences and to separate positive
from negative comments. In fighting cyber
terrorists,
Dark Web researchers apply it to find

Terrorism experts point out that terrorists are trained


to maintain a wide separation between
the political wing (recruiters, propagandists) and the
action wing (bomb makers, murderers). Given
this separation, it is likely that the Dark Web is
collecting and analyzing the communications of the
members of the political wings of terrorist groups.
Dark Web is not likely to come across the
communications of the action wings, as these
communications do not flow through the Internet
(unless
carefully encrypted). Thus, the Dark Web is not likely
to intercept communications about planned

Discussion

Questions 1. There are some who think


that the techniques and tools used in the
Dark Web project could
be used in a way that could negatively
affect our way of life. The executive director
of the
Electronic Privacy Information Center, Marc
Rotenberg, fears the very same tools that
can
be used to track terrorists can also be used
to track political opponents.48 What are
some
of the negative ways such tools can be
used against U.S. citizens? Do you think
that this is

Answer:
On my opinion, the techniques and tools applied
in the Dark Web project is helpful but I think they
must consider the risky effects of it especially
the people who are innocent. As we all know
that it is not safe to add any personal and some
other information in the internet because there
are many hackers who are enable to steal any
confidential data that in the future may cause
bad effects in our lives.

Question 2. Identify three positive ways that


this technology could be used to improve the
performance
of organizations or to help us in our daily lives.

Answer:
These are the positive ways that this technology
could be used to improve the performance of
organizations or to help us in our daily live:
1.The organization used tracking and analyzing it
would be very helpful to us to be aware if there is
Terrorist within our area or somewhere.
2.It also helps the organizations progress in terms of
their performance and competency.
3.It may also stop the agony of the people about
terrorist because of their tracking and analyzing
technique.

3. Do a Web search to find current


information about the Dark Web research
being carried out
at UA, including information about the
budget for this effort, the number of
researchers currently employed, and any
new tools or techniques theyve
developed. Write a brief summary
of your findings.

Answer:
Dark web also employs social-network analysis to
map extremist networks. NSF of the National
Science Foundation supports fundamental
research and education across all fields of science
and engineering , with an annual budget of $5.92
billion.
They can have as many as 20,000 members and
half a million postings, making the Web
Information Analysis. Dark Web utilizes sort of
existing technologies which includes, Web
speeding, content analysis, authorship analysis,
link analysis, sentiment analysis, statistical
analysis, cluster analysis and multimedia analysis.

Anda mungkin juga menyukai