Natural language processing of online propaganda as a means of passively monitoring an adversarial ideology

Download
Author
Holm, Raven R.
Date
2017Advisor
Kölsch, Mathias
Jones, Justin
Metadata
Show full item recordAbstract
Online propaganda embodies a potent new form of warfare; one that extends the strategic reach of our adversaries and overwhelms analysts. Foreign organizations have effectively leveraged an online presence to influence elections and distance-recruit. The Islamic State has also shown proficiency in outsourcing violence, proving that propaganda can enable an organization to wage physical war at very little cost and without the resources traditionally required. To augment new counter foreign propaganda initiatives, this thesis presents a pipeline for defining, detecting and monitoring ideology in text. A corpus of 3,049 modern online texts was assembled and two classifiers were created: one for detecting authorship and another for detecting ideology. The classifiers demonstrated 92.70% recall and 95.84% precision in detecting authorship, and detected ideological content with 76.53% recall and 95.61% precision. Both classifiers were combined to simulate how an ideology can be detected and how its composition could be passively monitored across time. Implementation of such a system could conserve manpower in the intelligence community and add a new dimension to analysis. Although this pipeline makes presumptions about the quality and integrity of input, it is a novel contribution to the fields of Natural Language Processing and Information Warfare.
Description
Reissued 30 May 2017 with Second Reader’s non-NPS affiliation added to title page.
Rights
This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.Collections
Related items
Showing items related by title, author, creator and subject.
-
Detecting Online Deception and Responding to It
Rowe, Neil C. (Monterey, California. Naval Postgraduate School, 2005);Since many forms of online deception are harmful, it is helpful to enumerate possible detection methods. We discuss low-levels clues such as pauses and overgenerality as well as ?cognitive? clues such as noticing of factual ... -
Mobile Konami codes: analysis of Android malware services utilizing sensor and resource-based state changes
Boomgaarden, Jacob L.; Corney, Joshua D. (Monterey, California: Naval Postgraduate School, 2015);Society’s pervasive use of mobile technologies has provided an incentive for the amount and kinds of mobile malware to steadily increase since 2004. Challenges in static analysis of mobile malware have stimulated the need ... -
Deception detection: accuracy levels among international military officers using content and contextual questioning methods
Buckley, John; Frӓnz, Andrew (Monterey, California: Naval Postgraduate School, 2016);This MBA research project is an extension and replication of recent diagnostic utility studies to determine if the methods used are (a) generalizable to a new population and (b) useful in identifying specific questioning ...