1887
image of A cyberterrorist behind the keyboard

Abstract

Abstract

Given the diverse backgrounds of people living in modern societies as well as the international nature of cyber-terrorist threats, profiling the type of person behind cyber-mediated crimes has become a norm in terrorist profiling practice. This study contributes to timely efficient terrorist profiling and threat assessment by showcasing an automated content analysis of cyber-mediated terrorist texts, using natural language processing technology and AI-assisted analysis. To characterise the terrorist type of texts and provide clues to threats, the study employs a ‘psycholinguistic profiling’ approach to authorship analysis (Grant 2008). That is, it seeks to describe the likelihood of an author’s engagement in violent extremist activity, identify motives for violence, and provide clues vis-a-vis would-be and actual violent behaviours. The study takes twenty texts produced by international terrorists involved in jihadism and far-right violent extremism as a case study. The findings reveal the investigative value of automated psycholinguistic profiling for security and intelligence practitioners, with the semantic patterns yielding helpful information for an understanding of the criminal nature of terrorist language. Also revealed is the attentional pattern of extremists and their discourse together with clues-based conclusions about text type, as well as ‘warning’ behaviours and motives for aggression which vary according to the authors’ ideological differences.

Available under the CC BY 4.0 license.
Loading

Article metrics loading...

/content/journals/10.1075/jlac.00120.eta
2024-09-03
2024-09-15
Loading full text...

Full text loading...

/deliver/fulltext/10.1075/jlac.00120.eta/jlac.00120.eta.html?itemId=/content/journals/10.1075/jlac.00120.eta&mimeType=html&fmt=ahah

References

  1. Almela, Ángela, Gema Alcaraz-Mármol, Arancha García-Pinar, and Clara Pallejá
    2019 “Developing and Analyzing a Spanish Corpus for Forensic Purposes.” Linguistic Evidence in Security, Law and Intelligence: –. 10.5195/lesli.2019.19
    https://doi.org/10.5195/lesli.2019.19 [Google Scholar]
  2. Argomaniz, Javier
    2015 “European Union Responses to Terrorist Use of the Internet.” Cooperation and Conflict(): –. www.jstor.org/stable/45084352
    [Google Scholar]
  3. Baider, Fabienne, and Maria Constantinou
    2014 “How to Make People Feel Good when Wishing Hell: Golden Dawn and National Front Discourse, Emotions and Argumentation.” InYearbook of Corpus Linguistics and Pragmatics, edited byJesus Romero-Trillo, –. Cham: Springer.
    [Google Scholar]
  4. Baker, Paul, and Rachelle Vessey
    2018 “A Corpus-driven Comparison of English and French Islamist Extremist Texts.” International Journal of Corpus Linguistics(): –. 10.1075/ijcl.17108.bak
    https://doi.org/10.1075/ijcl.17108.bak [Google Scholar]
  5. Baker-Beall, Christopher, and Gareth Mott
    2022 “Understanding the European Union’s Perception of the Threat of Cyberterrorism: A Discursive Analysis.” JCMS: Journal of Common Market Studies(): –. 10.1111/jcms.13300
    https://doi.org/10.1111/jcms.13300 [Google Scholar]
  6. Bandura, Albert
    2016Moral Disengagement: How People Do Harm and Live with Themselves. New York: Worth Publishers.
    [Google Scholar]
  7. Borum, Randy
    2003 “Understanding the Terrorist Mindset.” FBI Law Enforcement Bulletin, July: 72, 7. RetrievedJune 29, 2022fromhttps://www.ojp.gov/pdffiles1/nij/grants/201462.pdf
    [Google Scholar]
  8. Boyd, Ryan, and Andrew H. Schwartz
    2021 “Natural Language Analysis and the Psychology of Verbal Behavior: The Past, Present, and Future States of the Field.” Journal of Language and Social Psychology(): –. 10.1177/0261927X20967028
    https://doi.org/10.1177/0261927X20967028 [Google Scholar]
  9. Breeze, Ruth
    2020 “Angry Tweets: A Corpus-Assisted Study of Anger in Populist Political Discourse.” Journal of Language Aggression and Conflict(): –. 10.1075/jlac.00033.bre
    https://doi.org/10.1075/jlac.00033.bre [Google Scholar]
  10. Buhrmester, Michael, Martha Newson, Alexandra Vázquez, Wallisen Hattori, and Harvey Whitehouse
    2018 “Winning at any Cost: Identity Fusion, Group Essence, and Maximizing Ingroup Advantage.” Self and Identity(): –. 10.1080/15298868.2018.1452788
    https://doi.org/10.1080/15298868.2018.1452788 [Google Scholar]
  11. Carley, Kathleen
    2020 “Social Cybersecurity: An Emerging Science.” Computational and Mathematical Organization Theory(): –. RetrievedJune 29, 2023fromhttps://link.springer.com/article/10.1007/s10588-020-09322-9. 10.1007/s10588‑020‑09322‑9
    https://doi.org/10.1007/s10588-020-09322-9 [Google Scholar]
  12. Chaski, Carole
    2001 “Empirical Evaluations of Language-based Authorship Identification Techniques.” International Journal of Speech, Language and the Law(): –. 10.1558/sll.2001.8.1.1
    https://doi.org/10.1558/sll.2001.8.1.1 [Google Scholar]
  13. 2006 “The Computational-Linguistic Approach to Forensic Authorship Attribution.” RetrievedJune 29, 2023fromhttps://pdfs.semanticscholar.org/b8bb/5ee24b7c5084f61a745153ab1ae2300c1792.pdf
  14. Curry, Niall, Paul Baker, and Gavin Brookes
    2024 “Generative AI for Corpus Approaches to Discourse Studies: A Critical Evaluation of ChatGPT.” Applied Corpus Linguistics(): –. 10.1016/j.acorp.2023.100082
    https://doi.org/10.1016/j.acorp.2023.100082 [Google Scholar]
  15. Dean, Geoff
    2007 “Criminal Profiling in a Terrorism Context.” InCriminal Profiling: International Theory, Research, and Practice, edited byRichard N. Kocsis, –. Totowa, New Jersey: Humana Press. 10.1007/978‑1‑60327‑146‑2_8
    https://doi.org/10.1007/978-1-60327-146-2_8 [Google Scholar]
  16. Dennis, Michael
    2023 “Cybercrime.” RetrievedSeptember 7, 2023fromhttps://www.britannica.com/summary/cybercrime
  17. Ebner, Julia
    2018The Rage: The Vicious Circle of Islamist and Far-Right Extremism. London: I.B. Tauris.
    [Google Scholar]
  18. Etaywe, Awni
    2022a “Exploring the Grammar of Othering and Antagonism as Enacted in Terrorist Discourse: Verbal Aggression in Service of Radicalisation.” Humanities Social Science Communication(): –. 10.1057/s41599‑022‑01178‑5
    https://doi.org/10.1057/s41599-022-01178-5 [Google Scholar]
  19. 2022b “Language as Evidence: A Discourse Semantic and Corpus Linguistic Approach to Examining Written Terrorist Threatening Communication.” Doctoral Thesis, UNSW Sydney. 10.26190/unsworks/24434
    https://doi.org/10.26190/unsworks/24434 [Google Scholar]
  20. 2023a “Language as Evidence: A Discourse Semantic and Corpus Linguistic Approach to Examining Written Terrorist Threatening Communication.” The International Journal of Speech, Language and the Law(): –. 10.1558/ijsll.24678
    https://doi.org/10.1558/ijsll.24678 [Google Scholar]
  21. 2023b “Heteroglossia and Identifying Victims of Violence and its Purpose as Constructed in Terrorist Threatening Discourse Online.” International Journal for the Semiotics of Law(): –. https://link.springer.com/article/10.1007/s11196-023-09974-1. 10.1007/s11196‑023‑09974‑1
    https://doi.org/10.1007/s11196-023-09974-1 [Google Scholar]
  22. 2023c “The Role of (De)Bonding in the Legitimation of Violence in Extremists’ Public Threatening Communication.” InSystemic Functional Linguistics Theory and Application in Global Contexts, edited byVinh To, Thomas Amundrud, and Sally Humphrey, –). University of Tasmania.
    [Google Scholar]
  23. 2024a “Discursive Pragmatics of Justification in Terrorist Threat Texts: Victim-Blaming, Denying, Discrediting, Legitimating, Manipulating, and Retaliation.” Discourse & Society(): –. 10.1177/09579265241251480
    https://doi.org/10.1177/09579265241251480 [Google Scholar]
  24. 2024b “Moral Disaffiliation in Cyber Incitement to Hatred and Violence: A Discourse Semantic Approach.” In theRoutledge International Handbook of Online Deviance, edited byRoderick Graham, Stephan Humer, Claire Lee, and Veronika Nagy, –. London & New York: Routledge. 10.4324/9781003277675‑27
    https://doi.org/10.4324/9781003277675-27 [Google Scholar]
  25. Etaywe, Awni, and Michele Zappavigna
    2021 “Identity, Ideology, and Threatening Communication: An Investigation of Patterns of Attitude in Terrorist Discourse.” Journal of Language Aggression and Conflict(): –. 10.1075/jlac.00058.eta
    https://doi.org/10.1075/jlac.00058.eta [Google Scholar]
  26. 2023 “The Role of Social Affiliation in Incitement: A Social Semiotic Approach to Far-Right Terrorists’ Incitement to Violence.” Language in Society–. 10.1017/S0047404523000404
    https://doi.org/10.1017/S0047404523000404 [Google Scholar]
  27. Europol
    Europol 2023 “ChatGPT: The Impact of Large Language Models on Law Enforcement.” RetrievedOctober 20, 2023fromhttps://www.europol.europa.eu/publications-events/publications/chatgpt-impact-of-large-language-models-law-enforcement
  28. Fernández-Cabana, Mercedes, Julio Jiménez-Féliz, María Alves-Pérez, Raimundo Mateos, Ignacio Gómez-Reino Rodríguez, and Alejandro García-Caballero
    2015 “Linguistic Analysis of Suicide Notes in Spain.” The European Journal of Psychiatry(): –. 10.4321/S0213‑61632015000200006
    https://doi.org/10.4321/S0213-61632015000200006 [Google Scholar]
  29. Gales, Tammy
    2010 “Ideologies of Violence: A Corpus and Discourse Analytic Approach to Stance in Threatening Communications.” Doctoral Thesis, University of California, Davis.
    [Google Scholar]
  30. Garten, Justin, Brendan Kennedy, Joe Hoover, Kenji Sagae, and Morteza Dehghani
    2019 “Incorporating Demographic Embeddings into Language Understanding.” Cognitive Science(): e12701. 10.1111/cogs.12701
    https://doi.org/10.1111/cogs.12701 [Google Scholar]
  31. Gilardi, Fabrizio, Meysam Alizadeh, and Mael Kubli
    2023 “ChatGPT Outperforms Crowd-Workers for Text-Annotation Tasks.” Proceedings of the National Academy of Sciences(): e2305016120. 10.1073/pnas.2305016120
    https://doi.org/10.1073/pnas.2305016120 [Google Scholar]
  32. Global Terrorism Index
    Global Terrorism Index 2020Global Terrorism Index: Measuring the Impact of Terrorism. Institute for Economics and Peace. RetrievedJune 29, 2023fromhttps://visionofhumanity.org/wp-content/uploads/2020/11/GTI-2020-web-1.pdf
    [Google Scholar]
  33. Grant, Tim
    2008 “Approaching Questions in Forensic Authorship Analysis.” InDimensions of Forensic Linguistics, edited byJohn Gibbons, and Teresa Turell, –. Amsterdam: John Benjamins. 10.1075/aals.5.15gra
    https://doi.org/10.1075/aals.5.15gra [Google Scholar]
  34. Holt-Nguyen, Courtlin
    2022 “Sentiment Analysis Showdown: ChatGPT vs. Traditional ML NLP Methods. Artificial Corner.” RetrievedOctober 7, 2023fromhttps://artificialcorner.com/sentiment-analysis-showdown-chatgpt-vs-traditional-ml-nlp-methods-dff9d6c4a503
  35. Johnson, Kent
    2008 “An Overview of Lexical Semantics.” Philosophy Compass(): –. 10.1111/j.1747‑9991.2007.00101.x
    https://doi.org/10.1111/j.1747-9991.2007.00101.x [Google Scholar]
  36. Jurafsky, Dan, and James Martin
    2008Speech and Language Processing: An Introduction to Speech Recognition, Computational Linguistics and Natural Language Processing. Upper Saddle River, NJ: Prentice Hall.
    [Google Scholar]
  37. Koppel, Moshe, Jonathan Schler, and Shlomo Argamon
    2009 “Computational Methods in Authorship Attribution.” Journal of the American Society for Information Science and Technology(): –. 10.1002/asi.20961
    https://doi.org/10.1002/asi.20961 [Google Scholar]
  38. Kupper, Julia, and Reid Meloy
    2021 “TRAP-18 Indicators Validated through the Forensic Linguistic Analysis of Targeted Violence Manifestos.” Journal of Threat Assessment and Management(): –. 10.1037/tam0000165
    https://doi.org/10.1037/tam0000165 [Google Scholar]
  39. Leese, Matthias
    2014 “The New Profiling: Algorithms, Black Boxes, and the Failure of Anti-Discriminatory Safeguards in the European Union.” Security Dialogue(): –. 10.1177/0967010614544204
    https://doi.org/10.1177/0967010614544204 [Google Scholar]
  40. Lutz, James, and Brenda Lutz
    2008Global Terrorism. London and New York: Routledge.
    [Google Scholar]
  41. Meloy, Reid, and Paul Gill
    2016 “The Lone-Actor Terrorist and the TRAP-18.” Journal of Threat Assessment and Management(): –. 10.1037/tam0000061
    https://doi.org/10.1037/tam0000061 [Google Scholar]
  42. Meloy, Reid J., and Jens Hoffmann
    2014International Handbook of Threat Assessment. Oxford: Oxford University Press.
    [Google Scholar]
  43. Manning, Christopher, and Hinrich Schutze
    1999Foundation of Statistical Natural Language Processing. Cambridge: MIT Press.
    [Google Scholar]
  44. Muschalik, Julia
    2018Threatening in English: A Mixed Method Approach. Amsterdam/Philadelphia: John Benjamins. 10.1075/pbns.284
    https://doi.org/10.1075/pbns.284 [Google Scholar]
  45. O’Keeffe, Anne, Brian Clancy, and Svenja Adolphs
    2011Introducing Pragmatics in Use. London: Routledge. 10.4324/9780203830949
    https://doi.org/10.4324/9780203830949 [Google Scholar]
  46. Pape, Robert
    2005Dying to Win: The Strategic Logic of Suicide Terrorism. New York: Random House.
    [Google Scholar]
  47. Pennebaker, James, and Cindy Chung
    2007 “Computerized Text Analysis of al-Qaeda Transcripts.” InA Content Analysis Reader, edited byKlaus Krippendorff, and Mary Angela Bock, –. Thousand Oaks, CA: Sage. RetrievedJune 29, 2023fromhttps://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.307.8411&rep=rep1&type=pdf
    [Google Scholar]
  48. Pennebaker, James, Roger Booth, and Martha Francis
    2007 “Linguistic Inquiry and Word Count: LIWC [Computer software].” Austin, TX: LIWC.net.
    [Google Scholar]
  49. Pennebaker, James, Roger Booth, Ryan Boyd, and Martha Francis
    2015Linguistic Inquiry and Word Count: LIWC2015. Austin: Pennebaker Conglomerates (www.LIWC.net).
    [Google Scholar]
  50. Rubenstein, Richard
    2003 “The Psycho-Political Sources of Terrorism.” InThe New Global Terrorism, edited byCharles Kegley, –. Upper Saddle River, New Jersey: Pearson Education.
    [Google Scholar]
  51. Rugala, Eugene, and James Fitzgerald
    2003 “Workplace Violence: From Threat to Intervention.” InClinics in Occupational and Environmental Medicine, edited byCarole Wilkinson, and Corrinne Peek-Assa. Philadelphia, PA: W.B. Saunders. 10.1016/S1526‑0046(03)00117‑1
    https://doi.org/10.1016/S1526-0046(03)00117-1 [Google Scholar]
  52. Schultheiss, Oliver
    2013 “Are Implicit Motives Revealed in Mere Words? Testing the Marker-Word Hypothesis with Computer-Based Text Analysis.” Front Psychology(): . 10.3389/fpsyg.2013.00748
    https://doi.org/10.3389/fpsyg.2013.00748 [Google Scholar]
  53. Shuy, Roger
    2010 “Linguistics and Terrorism Cases.” Inthe Routledge Handbook of Forensic Linguistics, edited byMalcolm Coulthard, and Alison Johnson, –. London: Routledge. 10.4324/9780203855607.ch36
    https://doi.org/10.4324/9780203855607.ch36 [Google Scholar]
  54. 2011 “Applied Linguistics in the Legal Arena.” Inthe Handbook of Communication in Organisations and Professions, edited byChristopher Candlin, and Srikant Sarangi–). Berlin, Boston: De Gruyter Mouton. 10.1515/9783110214222.83
    https://doi.org/10.1515/9783110214222.83 [Google Scholar]
  55. Shuy, Roger. W.
    2014The Language of Murder Cases: Intentionality, Predisposition, and Voluntariness. Oxford: Oxford University Press. 10.1093/acprof:oso/9780199354832.001.0001
    https://doi.org/10.1093/acprof:oso/9780199354832.001.0001 [Google Scholar]
  56. Shuy, Roger
    2021 “Terrorism and Forensic Linguistics: Linguistics in Terrorism Cases.” InThe Routledge Handbook of Forensic Linguistics, edited byMalcolm Coulthard, May Alison, and R. Sousa-Silva, –. Chichester: Wiley Blackwell.
    [Google Scholar]
  57. Smith, Allison
    2004 “From Words to Action: Exploring the Relationship between a Group’s Value References and its Likelihood of Engaging in Terrorism.” Studies in Conflict and Terrorism: –. 10.1080/10576100490483679
    https://doi.org/10.1080/10576100490483679 [Google Scholar]
  58. 2008 “The Implicit Motives of Terrorist Groups: How the Needs for Affiliation and Power Translate into Death and Destruction.” Political Psychology(): –. https://www.jstor.org/stable/20447098
    [Google Scholar]
  59. Smith, Sharon, and Roger Shuy
    2002 “Forensic Psycholinguistics: Using Language Analysis for Identifying and Assessing Offenders.” FBI Law Enforcement Bulletin–. RetrievedJune 29, 2023fromhttps://www.ojp.gov/ncjrs/virtual-library/abstracts/forensic-psycholinguistics-using-language-analysis-identifying-and
    [Google Scholar]
  60. Stryker, Sheldon, and Peter Burke
    2000 “The Past, Present, and Future of an Identity Theory.” Social Psychology Quarterly(): –. 10.2307/2695840
    https://doi.org/10.2307/2695840 [Google Scholar]
  61. Sykes, Mark
    1988 “From ‘Right’ to ‘Needs’: Official Discourse and the ‘Welfarization’ of Race.” InDiscourse and Discrimination, edited byGeneva Smitherman-Donaldson, and Teun van Dijk, –. Michigan: Wayne State University Press.
    [Google Scholar]
  62. Tarrant, Brenton
  63. Tausczik, Yla, and James Pennebaker
    2010 “The Psychological Meaning of Words: LIWC and Computerized Text Analysis Methods.” Journal of Language and Social Psychology(): –. 10.1177/0261927X09351676
    https://doi.org/10.1177/0261927X09351676 [Google Scholar]
  64. Townshend, Charles
    2002Terrorism: A Very Short Introduction. Oxford: Oxford University Press.
    [Google Scholar]
  65. Tsesis, Alexander
    2013 “Inflammatory Speech: Offense versus Incitement.” Minnesota Law Review: –. RetrievedJune 29, 2023fromhttps://papers.ssrn.com/sol3/papers.cfm?abstract_id=2234152
    [Google Scholar]
  66. Turner, James, and Michael Gelles
    2003Threat Assessment: A Risk Management Approach. New York: Haworth Press.
    [Google Scholar]
  67. U.N. Office on Drugs and Crime
    U.N. Office on Drugs and Crime 2012 “The Use of the Internet for Terrorist Purposes.” RetrievedSeptember 7, 2023fromhttps://www.unodc.org/documents/terrorism/Publications/Use_of_Internet_for_Terrorist_Purposes/ebook_use_of_the_internet_for_terrorist_purposes.pdf
  68. U.S. National Institute of Justice
    U.S. National Institute of Justice 2022 “The Changing Threat Landscape of Terrorism and Violent Extremism: Implications for Research and Policy.” RetrievedJune 22, 2022fromhttps://nij.ojp.gov/media/video/27866#transcript--0
  69. U.S. National Institute of Justice
    U.S. National Institute of Justice 2023 “The Changing Threat Landscape of Terrorism and Violent Extremism: Implications for Research and Policy.” U.S. Department of Justice. RetrievedJune 10, 2024fromhttps://nij.ojp.gov/media/video/27866
  70. UNESCO
    UNESCO 2023 “ChatGPT and Artificial Intelligence in Higher Education: Quick Start Guide.” RetrievedOctober 20, 2023fromhttps://www.iesalc.unesco.org/wp-content/uploads/2023/04/ChatGPT-and-Artificial-Intelligence-in-higher-education-Quick-Start-guide_EN_FINAL.pdf
  71. Vaisman-Tzachor, Reuben
    2006 “Psychological Profiles of Terrorists.” Forensic Examiner(): –. RetrievedSeptember 7, 2023fromhttps://www.proquest.com/docview/207654849
    [Google Scholar]
  72. van Dijk, Teun
    1995 “Discourse Semantics and Ideology.” Discourse and Society(): –. London: Sage. 10.1177/0957926595006002006
    https://doi.org/10.1177/0957926595006002006 [Google Scholar]
  73. Vološinov, Valentin
    1973Marxism and the Philosophy of Language. Translated byLadislav Matejka, and I. R. Titunik. Massachusetts and London: Cambridge University Press.
    [Google Scholar]
  74. Weinmann, Gabriel
    2004 “Cyberterrorism: How Real Is the Threat?” RetrievedOctober 20, 2023fromhttps://www.usip.org/sites/default/files/sr119.pdf
  75. Wright-Neville, David, and Debra Smith
    2009 “Political Rage: Terrorism and the Politics of Emotion.” Global Change, Peace & Security(): –. RetrievedJune 29, 2023fromhttps://research.monash.edu/en/publications/political-rage-terrorism-and-the-politics-of-emotion. 10.1080/14781150802659390
    https://doi.org/10.1080/14781150802659390 [Google Scholar]
  76. Zappavigna, Michele
    2023 “Hack your Corpus Analysis: How AI can Assist Corpus Linguists Deal with Messy Social Media Data.” Applied Corpus Linguistics(): 100067. 10.1016/j.acorp.2023.100067
    https://doi.org/10.1016/j.acorp.2023.100067 [Google Scholar]
/content/journals/10.1075/jlac.00120.eta
Loading
/content/journals/10.1075/jlac.00120.eta
Loading

Data & Media loading...

This is a required field
Please enter a valid email address
Approval was successful
Invalid data
An Error Occurred
Approval was partially successful, following selected items could not be processed due to error