Skip to main content

Content Analysis of Jihadi Extremist Groups’ Videos

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 3975))

Abstract

This paper presents an exploratory study of jihadi extremist groups’ videos using content analysis and a multimedia coding tool to explore the types of videos, groups’ modus operandi, and production features. The videos convey messages powerful enough to mobilize members, sympathizers, and even new recruits to launch attacks that will once again be captured and disseminated via the Internet. The content collection and analysis of the groups’ videos can help policy makers, intelligence analysts, and researchers better understand the groups’ terror campaigns and modus operandi, and help suggest counter-intelligence strategies and tactics for troop training.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Aikat, D.: Streaming Violent Genres Online: Visual Images in Music Videos on BET.com, Country.com, MTV.com, VH1.com. Popular Music and Society 27 (2004)

    Google Scholar 

  2. Becker, A.: Technology and Terror: the New Modus Operandi. Frontline. Washington, D.C., PBS (2005)

    Google Scholar 

  3. Berger, J.M.: Short Primer on Terrorist Videos. Intelfiles, Alexandria, Virginia (2005), http://www.intelfiles.com

  4. Chen, H., Qin, J., et al.: Dark Web Portal: Collecting and Analyzing the Presence of Domestic and International Terrorist Groups on the Web. In: IEEE Intelligence Transportation Conference. IEEE, Washington (2004)

    Google Scholar 

  5. Guitonni, A., Boury-Brisset, A., et al.: Automatic Documents Analyzer and Classifier. In: 7th International Command and Control Research and Technology Symposium, Quebec (2002)

    Google Scholar 

  6. Holsti, O.R.: Content Analysis for the Social Sciences and Humanities. Addison-Wesley, Reading (1969)

    Google Scholar 

  7. IntelCenter, Al Qaeda Videos & 3rd 9-11 Anniversary v1.0. IntelCenter, Alexandria, Virginia (2004), http://www.intelcenter.com

  8. IntelCenter, Evolution of Jihad Video, v1.0. IntelCenter, Alexandria, Virginia (2005)

    Google Scholar 

  9. Lachlan, K.M.S., Stacy, L., et al.: Popular Video Games: Assessing the Amount and Context of Violence. In: Annual Meeting of the National Communication Association, Seattle, Washington (2003)

    Google Scholar 

  10. Makris, G.: Searching for Violence on the Internet: an Exploratory Analysis of MTV Online Music Video Clips. North Carolina Chapel Hill (1999)

    Google Scholar 

  11. Mannes, A., Golbeck, J.: Building a Terrorism Ontology. In: ISWC Workshop on Ontology Patterns for the Semantic Web (2005)

    Google Scholar 

  12. MOCA, Overview: Movie Content Analysis Project (MoCA). Univ. Mannheim, Mannheim (2005)

    Google Scholar 

  13. SITE, Jaish Ansar al Sunah Insurgency Group in Iraq Issues a Clarification Statement and Video Regarding the Blessed Attack Against the American Base in Mosul. SITE Institute. Washington (2004a)

    Google Scholar 

  14. Wactlar, H.: Informedia: Search and Summarization in the Video Medium. In: Proceedings of Imagina 2000 Conference, Monaco, France, January 31-Februrary 2 (2000)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Salem, A., Reid, E., Chen, H. (2006). Content Analysis of Jihadi Extremist Groups’ Videos. In: Mehrotra, S., Zeng, D.D., Chen, H., Thuraisingham, B., Wang, FY. (eds) Intelligence and Security Informatics. ISI 2006. Lecture Notes in Computer Science, vol 3975. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11760146_66

Download citation

  • DOI: https://doi.org/10.1007/11760146_66

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-34478-0

  • Online ISBN: 978-3-540-34479-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics