{"id":131669,"date":"2017-11-15T08:35:28","date_gmt":"2017-11-15T13:35:28","guid":{"rendered":"https:\/\/today.uconn.edu\/?p=131669"},"modified":"2017-12-07T12:24:34","modified_gmt":"2017-12-07T17:24:34","slug":"new-software-can-pinpoint-hate-groups-radicalization-sites","status":"publish","type":"post","link":"https:\/\/today.uconn.edu\/2017\/11\/new-software-can-pinpoint-hate-groups-radicalization-sites\/","title":{"rendered":"New Software Can Pinpoint Hate Groups\u2019 Radicalization Sites"},"content":{"rendered":"<p>A fascinating trait of mass murderers and terrorists is that they often leave a lengthy manifesto detailing the impetus for their actions.<\/p>\n<figure id=\"attachment_131615\" aria-describedby=\"caption-attachment-131615\" style=\"width: 250px\" class=\"wp-caption alignright\"><a href=\"https:\/\/today.uconn.edu\/wp-content\/uploads\/2017\/11\/2017_09_27_new-faculty-uetudo.jpg\"><img decoding=\"async\" class=\"wp-image-131615 img-responsive lazyload\" data-src=\"https:\/\/today.uconn.edu\/wp-content\/uploads\/2017\/11\/2017_09_27_new-faculty-uetudo.jpg\" alt=\"Ugochukwu 'Ugo' Etudo, assistant professor of operations and information management in the School of Business at UConn Stamford.\" width=\"250\" height=\"250\" data-srcset=\"https:\/\/today.uconn.edu\/wp-content\/uploads\/2017\/11\/2017_09_27_new-faculty-uetudo.jpg 500w, https:\/\/today.uconn.edu\/wp-content\/uploads\/2017\/11\/2017_09_27_new-faculty-uetudo-150x150.jpg 150w, https:\/\/today.uconn.edu\/wp-content\/uploads\/2017\/11\/2017_09_27_new-faculty-uetudo-300x300.jpg 300w, https:\/\/today.uconn.edu\/wp-content\/uploads\/2017\/11\/2017_09_27_new-faculty-uetudo-420x420.jpg 420w, https:\/\/today.uconn.edu\/wp-content\/uploads\/2017\/11\/2017_09_27_new-faculty-uetudo-100x100.jpg 100w, https:\/\/today.uconn.edu\/wp-content\/uploads\/2017\/11\/2017_09_27_new-faculty-uetudo-275x275.jpg 275w, https:\/\/today.uconn.edu\/wp-content\/uploads\/2017\/11\/2017_09_27_new-faculty-uetudo-32x32.jpg 32w, https:\/\/today.uconn.edu\/wp-content\/uploads\/2017\/11\/2017_09_27_new-faculty-uetudo-50x50.jpg 50w, https:\/\/today.uconn.edu\/wp-content\/uploads\/2017\/11\/2017_09_27_new-faculty-uetudo-64x64.jpg 64w, https:\/\/today.uconn.edu\/wp-content\/uploads\/2017\/11\/2017_09_27_new-faculty-uetudo-96x96.jpg 96w, https:\/\/today.uconn.edu\/wp-content\/uploads\/2017\/11\/2017_09_27_new-faculty-uetudo-128x128.jpg 128w\" data-sizes=\"(max-width: 250px) 100vw, 250px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 250px; --smush-placeholder-aspect-ratio: 250\/250;\" \/><\/a><figcaption id=\"caption-attachment-131615\" class=\"wp-caption-text\">Ugochukwu &#8216;Ugo&#8217; Etudo, assistant professor of operations and information management in the School of Business at UConn Stamford.<\/figcaption><\/figure>\n<p>Those diatribes are like gold to UConn operations and information management professor Ugochukwu \u201cUgo\u201d Etudo. He has used them to create software that can search mainstream websites, as well as the dark web, to help identify websites that espouse radical, terrorist ideologies encouraging people to cause harm.<\/p>\n<p>\u201cI\u2019m interested in the ideologies that could drive people to commit such terrible acts,\u201d says Etudo, who joined the faculty at UConn Stamford this semester.\u00a0He believes that scrutinizing potential terrorists is only half the equation. Governments also need to attack the propaganda that persuades potential terrorists to act.<\/p>\n<p>Etudo says its well known that terrorist groups are increasingly using the internet as a platform for the dissemination of radical, violent ideologies. The internet has also become a breeding ground for potential lone-wolf terrorists \u2013 individuals who commit acts of terror inspired by the ideological rhetoric that terrorist organizations put out. But because these individuals generally lack formal affiliation with a terror organization, they can be difficult to intercept with traditional intelligence techniques.<\/p>\n<p>What many have in common, however, is that they tend to write about their plans.<\/p>\n<p>\u201cAlmost all lone wolves leave a memoir,\u201d he says. \u201cThey like to broadcast their intent.&#8221;<\/p>\n<p><strong>Terror Organizations More Similar Than Different<\/strong><\/p>\n<p>In 2011, a far-right terrorist named Anders Breivik committed two heinous acts in Norway \u2013 a bombing, followed by a shooting, that together left 77 people dead. Afterwards, authorities discovered a 1,000-page document highlighting his many gripes, ranging from opposition to Islam to blaming feminism for European \u201ccultural suicide.\u201d<\/p>\n<p>That document is public record, and Etudo has studied it extensively.<\/p>\n<p>But he didn\u2019t stop there. He collected materials from Al Qaeda; the Animal Liberation Front; the Ku Klux Klan; and the Popular Front for the Liberation of Palestine. More recently he examined ISIS propaganda, including its glossy magazines.<\/p>\n<p>When he looked at terrorist propaganda, he found commonality across many different causes. Often terror proponents are diagnosing a problem or injustice that\u2019s close to home, linking the issue with a perceived enemy, and warning that although members of that group may seem like friends, they are not, he says. Then they try to motivate followers by outlining a course of action.<\/p>\n<p>\u201cThey almost all have a mantra that says, \u2018Be on our side. We are winning!\u2019\u201d Etudo notes. \u201cThat pattern exists over and over again.<\/p>\n<p>\u201cOne example might be an extremist animal cruelty organization that bombards followers with statements like, \u2018How can you possibly sleep at night? Every time you look at your pet, you know someone is harming another animal.\u2019\u201d<\/p>\n<p><strong>The \u2018Wild, Wild West\u2019 of Data Analytics<\/strong><\/p>\n<p>After identifying these patterns, in conjunction with his Virginia Commonwealth University Ph.D. adviser Victoria Yoon, Etudo set out to create a software program that could comb through these manuscripts quickly.<\/p>\n<p>He was able to cull examples and distinguish word sequences, negative tones, and implications of a worsening situation, and train the software to identify these warning signs. It can review the content of a manuscript in minutes, a task that would take a person many days.<\/p>\n<blockquote>\n  <p>Almost all lone wolves leave a memoir. They like to broadcast their intent. <cite> &#8212 Ugochukwu Etudo<\/cite><\/p>\n<\/blockquote>\n<p>His software can autonomously \u201ccrawl\u201d from site to site, enabling it to explore domains that don\u2019t have a formal web address, thereby investigating related propaganda on the dark web. Etudo says the program is accurate 87 percent of the time.<\/p>\n<p>\u201cA goal of this system is to make sense of radical, terrorist propaganda at scale. It can \u2018consume\u2019 massive amounts of information requiring far too much human effort,\u201d he says. \u201cMost analytics work involves numbers, but this is unique because it analyzes text.<\/p>\n<p>\u201cAccess to this information, in the data analytics world, is kind of similar to the wild, Wild West,\u201d he adds.<\/p>\n<p>The project has been three years in the works. This past summer,\u00a0Etudo earned the Virginia Commonwealth University Presidential Research Quest Fund Grant, a $50,000 grant to support continued research on automated systems for identifying terrorist content on the web.<\/p>\n<p>He is now looking for additional funding to extend his project. Currently his software can only analyze text that is in English. He would like to make it multilingual, and improve its accuracy rate.<\/p>\n<p>\u201cUsing these tools should be as simple as using a colander,\u201d he says. \u201cThis should be a filtering tool that detects those that may be espousing radical ideology.&#8221;<\/p>\n<p>He cautions that he doesn\u2019t think the police should be knocking on the door of anyone who espouses negative or unusual beliefs. Instead, he hopes the software will serve as a filter that can allow human experts to investigate the sites that are generating the most concern.<\/p>\n<p>The recent spate of mass murders in the U.S. drives home the urgency of these efforts.<\/p>\n<p>\u201cRecent events underscore the need for us to gather as much intelligence as we can on the make-up of these radical ideologies,\u201d Etudo says. \u201cSuch intelligence is particularly useful for identifying emerging targets and the rationale of terrorist violence.\u201d<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A UConn Stamford business professor has developed software that can comb the internet, including the dark web, and identify terrorist content.<\/p>\n","protected":false},"author":121,"featured_media":131592,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_crdt_document":"","wds_primary_category":0,"wds_primary_series":0,"wds_primary_attribution":0,"footnotes":""},"categories":[2076,1862,174],"tags":[],"magazine-issues":[],"coauthors":[2105],"class_list":["post-131669","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-research","category-busn","category-uconn-stamford"],"pp_statuses_selecting_workflow":false,"pp_workflow_action":"current","pp_status_selection":"publish","acf":[],"publishpress_future_action":{"enabled":false,"date":"2026-05-08 11:31:55","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/today.uconn.edu\/wp-rest\/wp\/v2\/posts\/131669","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/today.uconn.edu\/wp-rest\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/today.uconn.edu\/wp-rest\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/today.uconn.edu\/wp-rest\/wp\/v2\/users\/121"}],"replies":[{"embeddable":true,"href":"https:\/\/today.uconn.edu\/wp-rest\/wp\/v2\/comments?post=131669"}],"version-history":[{"count":5,"href":"https:\/\/today.uconn.edu\/wp-rest\/wp\/v2\/posts\/131669\/revisions"}],"predecessor-version":[{"id":132458,"href":"https:\/\/today.uconn.edu\/wp-rest\/wp\/v2\/posts\/131669\/revisions\/132458"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/today.uconn.edu\/wp-rest\/wp\/v2\/media\/131592"}],"wp:attachment":[{"href":"https:\/\/today.uconn.edu\/wp-rest\/wp\/v2\/media?parent=131669"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/today.uconn.edu\/wp-rest\/wp\/v2\/categories?post=131669"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/today.uconn.edu\/wp-rest\/wp\/v2\/tags?post=131669"},{"taxonomy":"magazine-issue","embeddable":true,"href":"https:\/\/today.uconn.edu\/wp-rest\/wp\/v2\/magazine-issues?post=131669"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/today.uconn.edu\/wp-rest\/wp\/v2\/coauthors?post=131669"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}