Fighting criminals: Adaptive inferring and choosing the next investigative objects in the criminal network

https://doi.org/10.1016/j.knosys.2008.03.004Get rights and content

Abstract

When a criminal probabilistic network has been constructed, criminal investigators can access verified information about some nodes of network after investigations. Effective and efficient techniques are needed to help law enforcement and intelligence agencies to infer the state of other nodes and choose the next new investigative objects in the criminal network. In this paper, we propose a technique that employs a belief propagation algorithm to help criminal investigators to infer the criminal probability of other members by using verified partial information. In an updated criminal probabilistic network, this paper also presents a technique called EMPFS which extends the modified PFS algorithm. EMPFS algorithm is used to solve choice of next key investigative objects from criminal network. Experimental results show that the precision and efficiency of two techniques might be improved by exact constructing of the crime probabilistic network.

Introduction

Internet newsgroups, bbs, and chartrooms are an appealing way for members of such groups to communicate because they are easily accessed from almost anywhere in the world and offer the potential for camouflaging organized crime among the numerous background communications. Members of organized crime networks are often camouflaged as legal Internet users. These users in the criminal networks (people, IP-address, etc.) are usually modeled by nodes of graphs. The connection relations (trust or dependent relation) between members are represented by the graph edges. Generally, a criminal network is composed of criminals and legal people. When probability is used to describe the criminal probability of each member and dependent or trust relation between two members in the criminal network, the criminal network becomes the criminal probabilistic network.

Since members in the criminal network may be criminals or legal people, crime investigators often use probability to evaluate whether the member is a criminal or a legal person. The criminal probability of each member is incarnated by the “belief” of the criminal investigator about whether the member is a criminal. When several members in the criminal network are verified to have committed criminal activities, the crime investigator can get partial information about the criminal network. Crime investigators hope to use partial information to do the following tasks: (1) to re-evaluate the criminal probability of other members in the criminal network by using partial information and (2) to choose the next investigative objects for crime investigators in the newly evaluated criminal network. Both tasks are very time-consuming and labor-intensive. To finish the above two tasks, investigators may spend a large amount of time performing extensive database searches, reading crime reports, looking for clues of crime associations, and individually inferring the crime probability of other members of the criminal network.

Some technologies [1], [2], [3], [10], [11], [12], [13] have achieved in analyzing criminal networks; for example COPLINK techniques [1], [2], [3], [16], [17], [18], [19] have been applied to identify associations in criminal networks. Also, some discrete or continuous Markov models are used in statistical analysis to predict future crime events or processes and to identify hidden groups in a criminal network [4], [5]. SNA [6], [7] is used to measure individual centrality in the network and clustering, centrality measures, block modeling, and multidimensional scaling (MDS) approaches from SNA is employed by Xu and Chen [8], [9] to study criminal networks based on crime incident data. However, these techniques cannot provide adequate solutions for the above two tasks.

To solve the above two tasks, we propose using belief propagation to update the beliefs of crime investigators about the criminal probability of other members in the criminal network using partial information. Belief propagation uses Bayesian rules and maintains an association probability distribution over each member (i.e., each node in the criminal network graph). In the newly updated criminal network, we propose using an extended MPFS (modified PFS) algorithm to choose some member as the next investigative object of crime investigators by using partial prior information. These investigative objects can help crime investigators to analyze criminal network at the lowest cost.

The rest of the paper is organized as follows. In Section 2, we present adaptive inferring and propose the ‘choosing next objects’ model. Section 3 presents the concept of updating criminal networks based on belief propagation. Modified BFS is introduced and Extended MPFS is presented in Section 4. Case study and experiments are presented in Section 5, and conclusions are included in final section.

Section snippets

Adaptive inferring and choosing next investigative objects (aico)

Intelligence and law enforcement domain investigators have long used networks to refer to criminal or terrorist organizations. Criminal network shows relationships between various individuals and entities. To describe criminal probability of each entity or individual, a criminal probabilistic network is employed by crime investigators. To verify whether a member of network is a criminal or a legal person, crime investigators often choose some member as the investigative object. When crime

Inferring based on belief propagation (BP)

In this section, we first review background information on belief propagation; updating and representing criminal network with belief propagation are presented in second part of the section.

Choosing the next investigative objects based on extended MPFS

To choose the next investigative objects for a crime investigator, we propose to extend the Modified PFS algorithm [1]. In this section three parts are included: network representation transformation with an information theory advisor, the modified PFS algorithm, and the extended MPFS algorithm.

Case study and experiments

Crime investigators receive partial information in order to infer the crime probability of other members using belief propagation; they then choose their next investigative objects using an extended MBFS algorithm. In this section we discuses the above methods presented in this paper through following case study.

Conclusions

In this paper, we propose an inference technique that employs a belief propagation algorithm to help crime investigators infer crime probability of other members using verified partial information. In updated crime probabilistic networks, this paper presents a technique called EMPFS which extends the modified PFS algorithm. Extendibility was made to the modified PFS algorithm in order to solve choice of the next key investigative objects from criminal networks for crime investigators. We give a

References (19)

  • Jennifer J. Xu et al.

    Fighting organized crimes: using shortest-path algorithms to identify associations in criminal networks

    Decision Support Systems

    (2004)
  • Z. Huang, H. Chen, A link analysis approach to recommendation with sparse data, in: Proceedings of 2004 Americas...
  • H.G. Goldberg, R.W.H. Wong, Restructuring transactional data for link analysis in the FinCen AI system, in: Proceedings...
  • M. Magdon-Ismail, M. Goldberg, W. Wallace, D. Siebecker, Locating Hidden Groups in Communication Networks Using Hidden...
  • J. Baumes, M. Goldberg, M. Magdon-Ismail, W.A. Wallace, Discovering Hidden Groups in Communication Networks...
  • A.Z. Tucson et al.

    The network paradigm applied to criminal organizations: theoretical nitpicking or a relevant doctrine for investigators? Recent developments in The Netherlands

    Connections

    (2001)
  • D. McAndrew, The structural analysis of criminal networks, in the social psychology of crime: groups, teams, and...
  • J. Xu, B. Marshall, S. Kaza, H. Chen, Analyzing and Visualizing Criminal Network Dynamics: A Case Study, ISI 2004,...
  • J. Xu, H. Chen. Untangling criminal networks: a case study, in: Proceedings of NSF/NIJ Symposium on Intelligence and...
There are more references available in the full text version of this article.

Cited by (13)

  • A novel measure of edge centrality in social networks

    2012, Knowledge-Based Systems
    Citation Excerpt :

    For instance, in [15] the authors focus on the criminal justice domain and, in particular, on the identification of social ties playing a crucial role in the transmission of sensitive information. In [42], the author provides a belief propagation algorithm which exploits social ties among members of a criminal social network to identify criminals. Our approach resembles that of [15] because both of them are able too associate each edge in a network with a score indicating the strength of the association between the nodes linked by that edge.

  • Community detection based on a semantic network

    2012, Knowledge-Based Systems
    Citation Excerpt :

    The users in these criminal networks (people, IP addresses, etc.) are usually modeled by nodes of graphs. The connection relations (trust or dependent relations) between members are represented by the graph edges [2]. With the help of pre-existing community-detection algorithms, we hope to divide all the latent criminals within the networks into several latent communities.

  • Crime Prediction Using Auto Regression Techniques for Time Series Data

    2018, 3rd International Conference and Workshops on Recent Advances and Innovations in Engineering, ICRAIE 2018
  • Diffusion in social networks: A multiagent perspective

    2015, IEEE Transactions on Systems, Man, and Cybernetics: Systems
  • Understanding social networks from a multiagent perspective

    2014, IEEE Transactions on Parallel and Distributed Systems
View all citing articles on Scopus

This material is based upon work supported by the JiangSu Province Science Technology Foundation under Grant No. BK2006567.

View full text