Hiding true personality behind a façade is one of the basic tricks adopted by humans who live double lives for illegal purposes. In particular terrorists have historically adopted the protocol of a façade behaviour coupled with a second life consisting mainly in illegal activities and their planning.Nowadays a few cases of behaviours that hide a dangerous activity, possibly illegal, behind an apparentely neutral and mean public person, can be replicated, and sometimes just provided, by a social network profile. Recognizing that a social network profile is fake, in some extreme cases, a bot, and determining the contour relationships that limit such a condition is one of the most important weapons for terrorism fight.In this paper we show that what we name the \emph{Spider-man protocol}, a set of behaviour rules that bring to hiding a personality behind a façade, has several weaknesses, and it is prone to a set of attacks that permit to detect these behaviours. We provide the description of an experimental architecture that is used for determining violations of the protocol, and therefore breaches in the secrecy of the individual protection settled by the terrorists.

The spider-man behavior protocol: exploring both public and dark social networks for fake identity detection in terrorism informatics

TOMAZZOLI, Claudio;
2015-01-01

Abstract

Hiding true personality behind a façade is one of the basic tricks adopted by humans who live double lives for illegal purposes. In particular terrorists have historically adopted the protocol of a façade behaviour coupled with a second life consisting mainly in illegal activities and their planning.Nowadays a few cases of behaviours that hide a dangerous activity, possibly illegal, behind an apparentely neutral and mean public person, can be replicated, and sometimes just provided, by a social network profile. Recognizing that a social network profile is fake, in some extreme cases, a bot, and determining the contour relationships that limit such a condition is one of the most important weapons for terrorism fight.In this paper we show that what we name the \emph{Spider-man protocol}, a set of behaviour rules that bring to hiding a personality behind a façade, has several weaknesses, and it is prone to a set of attacks that permit to detect these behaviours. We provide the description of an experimental architecture that is used for determining violations of the protocol, and therefore breaches in the secrecy of the individual protection settled by the terrorists.
2015
sentiment analysis
social network
social network analysis
double life
spider man protocol
world wide web
natural language processing
dark web
computational linguistic
terrorist attack
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.12607/60611
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo

Citazioni
  • ???jsp.display-item.citation.pmc??? ND
social impact