Skip to main content

Analyzing and Visualizing Criminal Network Dynamics: A Case Study

  • Conference paper
Intelligence and Security Informatics (ISI 2004)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3073))

Included in the following conference series:

Abstract

Dynamic criminal network analysis is important for national security but also very challenging. However, little research has been done in this area. In this paper we propose to use several descriptive measures from social network analysis research to help detect and describe changes in criminal organizations. These measures include centrality for individuals, and density, cohesion, and stability for groups. We also employ visualization and animation methods to present the evolution process of criminal networks. We conducted a field study with several domain experts to validate our findings from the analysis of the dynamics of a narcotics network. The feedback from our domain experts showed that our approaches and the prototype system could be very helpful for capturing the dynamics of criminal organizations and assisting crime investigation and criminal prosecution.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Baker, W.E., Faulkner, R.R.: The social organization of conspiracy: Illegal networks in the heavy electrical equipment industry. American Sociological Review 58(12), 837–860 (1993)

    Article  Google Scholar 

  2. Braam, R.R., Moed, H.F., van Raan, A.F.J.: Mapping of science by combined cocitation and word analysis ii: Dynamical aspects. Journal of American Society of Information Science 42(4), 252–266 (1991)

    Google Scholar 

  3. Burkhardt, M.E., Brass, D.J.: Changing patterns or patterns of change: The effects of a change in technology on social network structure and power. Administrative Science Quarterly 35, 104–127 (1990)

    Article  Google Scholar 

  4. Carley, K.M., et al.: Destabilizing dynamic covert networks. In: Proceedings of the 8th International Command and Control Research and Technology Symposium, Washington DC., VA (2003)

    Google Scholar 

  5. Carley, K.M., Lee, J., Krackhardt, D.: Destabilizing networks. Connections 24(3), 79–92 (2002)

    Google Scholar 

  6. Chen, C., Carr, L.: Trailblazing the literature of hypertext: Author co-citation analysis (1989-1998). In: Proceedings of the 10th ACM Conference on Hypertext and Hypermedia (1999)

    Google Scholar 

  7. Chen, C., Carr, L.: Visualizing the evolution of a subject domain: A case study. In: Proceedings of IEEE Symposium on Information Visualization, INFOVIS 1999 (1999)

    Google Scholar 

  8. Chen, C., et al.: Visualizing and tracking the growth of competing paradigms: Two case studies. Journal of American Society of Information Science and Technology 53(8), 678–689 (2002)

    Article  Google Scholar 

  9. Chen, C., Kuljis, J., Raul, R.J.: Visualizing latent domain knowledge. IEEE Transactions on Systems, Man, and Cybernetics–Part C: Applications and Reviews 31(4), 518–529 (2001)

    Article  Google Scholar 

  10. Chen, C., Paul, R.J.: Visualizing a knowledge domain’s intellectual structure. IEEE Computer 34(3), 65–71 (2001)

    Google Scholar 

  11. Chen, C., Paul, R.J., O’Keefe, B.: Fitting the jigsaw of citation: Information visualization in domain analysis. Journal of American Society of Information Science and Technology 52(4), 315–330 (2001)

    Article  Google Scholar 

  12. Culnan, M.J.: The intellectual development of management information systems, 1972-1982: A co-citation analysis. Management Science 32(2), 156–172 (1986)

    Article  Google Scholar 

  13. Dombroski, M.J., Carley, K.M.: Netest: Estimating a terrorist network’s structure. Computational & Mathematical Organization Theory 8, 235–241 (2002)

    Article  Google Scholar 

  14. Doreian, P., et al.: A brief history of balance through time. In: Doreian, P., Stokman, F.N. (eds.) Evolution of social networks, pp. 129–147. Gordon and Breach, Australia (1997)

    Google Scholar 

  15. Doreian, P., Stokman, F.N.: The dynamics and evolution of social networks. In: Doreian, P., Stokman, F.N. (eds.) Evolution of social networks, pp. 1–17. Gordon and Breach, Australia (1997)

    Google Scholar 

  16. Fennema, M., Schijf, H.: Analyzing interlocking directories: Theory and methods. Social Networks 1, 297–332 (1978/1979)

    Google Scholar 

  17. Freeman, L.C.: Centrality in social networks: Conceptual clarification. Social Networks 1, 215–240 (1979)

    Article  Google Scholar 

  18. Fruchterman, T.M.J., Reingold, E.M.: Graph drawing by force-directed placement. Software–Practice & Experience 21(11), 1129–1164 (1991)

    Article  Google Scholar 

  19. Hallinan, M.T.: The process of friendship formation. Social Networks 1, 193–210 (1978/1979)

    Google Scholar 

  20. Hummon, N.P.: Utility and dynamic social networks. Social Networks 22, 221–249 (2000)

    Article  Google Scholar 

  21. Kamada, T., Kawai, S.: An algorithm for drawing general undirected graphs. Information Processing Letters 31(1), 7–15 (1989)

    Article  MATH  MathSciNet  Google Scholar 

  22. Klerks, P.: The network paradigm applied to criminal organizations: Theoretical nitpicking or a relevant doctrine for investigators? Recent developments in the netherlands. Connections 24(3), 53–65 (2001)

    Google Scholar 

  23. Krebs, V.E.: Mapping networks of terrorist cells. Connections 24(3), 43–52 (2001)

    Google Scholar 

  24. Lee, R.C.T., Slagle, J.R., Blum, H.: A triangulation method for the sequential mapping of points from n-space to two-space. IEEE Transactions on Computers 26, 288–292 (1977)

    Article  Google Scholar 

  25. Leenders, R.: Evolution of friendship and best friendship choices. In: Doreian, P., Stokman, F.N. (eds.) Evolution of social networks, Gordon and Breach, Australia (1997)

    Google Scholar 

  26. McAndrew, D.: The structural analysis of criminal networks. In: Canter, D., Alison, L. (eds.) The social psychology of crime: Groups, teams, and networks. offender profiling series, vol. iii, Dartmouth, Aldershot (1999)

    Google Scholar 

  27. Nakao, K., Romney, A.K.: Longitudinal approach to subgroup formation: Reanalysis of newcomb’s fraternity data. Social Networks 15, 109–131 (1993)

    Article  Google Scholar 

  28. Newcomb, T.M.: The acquaintance process. Series. Holt, Rinehart, & Winston, New York (1961)

    Google Scholar 

  29. Noyons, E.C.M., Raan, A.F.J.v.: Monitoring scientific developments from a dynamic perspective: Self-organized structuring to map neural network research. Journal of American Society of Information Science 49(1), 68–81 (1998)

    Google Scholar 

  30. Ornstein, M.D.: Interlocking directorates in canada: Evidence from replacement patterns. Social Networks 4, 3–25 (1982)

    Article  Google Scholar 

  31. Small, H.: Visualizing science by citation mapping. Journal of American Society of Information Science 50(9), 799–813 (1999)

    Article  Google Scholar 

  32. Small, H.G.: A co-citation model of a scientific specialty: A longitudinal study of collagen research. Social Studies of Science 7, 139–166 (1977)

    Article  Google Scholar 

  33. Snijders, T.A.B.: Stochastic actor-oriented models for network change. In: Doreian, P., Stokman, F.N. (eds.) Evolution of social networks, Gordon and Breach, Australia (1997)

    Google Scholar 

  34. Snijders, T.A.B.: The statistical evaluation of social network dynamics. Sociological Methodology 31, 361–395 (2001)

    Article  Google Scholar 

  35. Sparrow, M.K.: The application of network analysis to criminal intelligence: An assessment of the prospects. Social Networks 13, 251–274 (1991)

    Article  Google Scholar 

  36. Sullivan, D., White, D.H., Barboni, E.J.: Co-citation analyses of science: An evaluation. Social Studies of Science 7, 223–240 (1997)

    Article  Google Scholar 

  37. van den Besselaar, P., Leydesdorff, L.: Mapping change in scientific specialties: A scientometric reconstruction of the development of artificial intelligence. Journal of American Society of Information Science 47(6), 415–436 (1996)

    Article  Google Scholar 

  38. Wasserman, S., Faust, K.: Social network analysis: Methods and applications. Series. Cambridge University Press, Cambridge (1994)

    Google Scholar 

  39. Wellman, B.: Structural analysis: From method and metaphor to theory and substance. In: Wellman, B., Berkowitz, S.D. (eds.) Social structures: A network approach, Cambridge University Press, Cambridge (1988)

    Google Scholar 

  40. White, H.D., McCain, K.W.: Visualizing a discipline: An author co-citation analysis of information science, 1972-1995. Journal of American Society of Information Science and Technology 49(4), 327–355 (1998)

    Google Scholar 

  41. Xu, J., Chen, H.: Untangling criminal networks: A case study. In: Chen, H., Miranda, R., Zeng, D.D., Demchak, C.C., Schroeder, J., Madhusudan, T. (eds.) ISI 2003. LNCS, vol. 2665, pp. 232–248. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  42. Xu, J., Chen, H.: Fighting organized crime: Using shortest-path algorithms to identify associations in criminal networks. Decision Support Systems (forthcoming)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Xu, J., Marshall, B., Kaza, S., Chen, H. (2004). Analyzing and Visualizing Criminal Network Dynamics: A Case Study. In: Chen, H., Moore, R., Zeng, D.D., Leavitt, J. (eds) Intelligence and Security Informatics. ISI 2004. Lecture Notes in Computer Science, vol 3073. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-25952-7_27

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-25952-7_27

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-22125-8

  • Online ISBN: 978-3-540-25952-7

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics