ABSTRACT
The influential members of a criminal organization are usually targeted by criminal investigators for removal or surveillance. Identifying and capturing these influential members will most likely to disrupt the organization. We propose in this paper a forensic analysis system called CLDRI that can identify the most influential members of a criminal organization. First, a network representing a criminal organization is built from Mobile Communication Data that belongs to the organization. In such a network, a vertex represents an individual criminal and an edge represents the communication attempts between two criminals. CLDRI employs formulas that quantify the degree of importance of each vertex in the network relative to all other vertices. We present these formulas through series of improvement refinements. All the formulas incorporate novel-weighting schemes for the edges of networks. We evaluated the quality of CLDRI by comparing it experimentally with two systems. Results showed improvement.
- Breiger, R. L. 2004. The analysis of social networks. In Handbook of Data Analysis, M. A. Hardy and A. Bryman, Eds. Sage Publications, London, U.K. 505--526.Google Scholar
- Breiger, R. L., Boorman, S. A., and Arabie, P. 1975. An algorithm for clustering relational data, with applications to social network analysis and comparison with multidimensional scaling. J. Math. Psych. 12, 328--383.Google ScholarCross Ref
- Baker, W. E. and Faulkner R. R. 1993. The social organization of conspiracy: Illegal networks in the heavy electrical equipment industry. Amer. Soc. Rev. 58, 837--860.Google ScholarCross Ref
- Burt, S. 1980. Models of network structure. Ann. Rev. Soc. 6, 79--141.Google Scholar
- Baldi, P. & Hatfield, W. (2002), DNA Microarrays and Gene Expression, Cambridge University Press, Cambridge, UK. {80}.Google ScholarCross Ref
- Enron Corporation: https://www.uwosh.edu/llce/conted/lir/courselistings/Enron%20Scandal.pdf.Google Scholar
- E. Ferrara, P. De Meo, S. Catanese, and G. Fiumara, "Detecting criminal organizations in mobile phone networks," Expert Systems with Applications, vol. 41, no. 13, pp. 5733--5750, 2014.Google ScholarCross Ref
- Enron Email Dataset. Available at: http://www-2.cs.cmu.edu/~enron/.Google Scholar
- Girvan, M., & Newman, M. (2002). Community structure in social and biological networks. Proceedings of the National Academy of Sciences, 99(12), 7821.Google ScholarCross Ref
- Glsser, Estimating Possible Criminal Organizations from Co-offending Data. Public Safety Canada, 2012.Google Scholar
- H. Sarvari, E. Abozinadah, A. Mbaziira, and D. McCoy, "Constructing and analyzing criminal networks," CA, USA, May 2014, pp. 84--91. Google ScholarDigital Library
- H. Wang, C. K. Chang, H.-I. Yang, and Y. Chen, "Estimating the relative importance of nodes in social networks," Journal of Information Processing, vol. 21, no. 3, pp. 414--422, 2013.Google ScholarCross Ref
- J. J. Xu and H. Chen, "CrimeNet explorer: A framework for criminal network knowledge discovery," ACM Trans. Inf. Syst., vol. 23, no. 2, pp. 201--226, Apr. 2005. Google ScholarDigital Library
- Keila, P.S. and D.B. Skillicorn (2005), 'Structure in the Enron email dataset', Computational & Mathematical Organization Theory, 11(3), 183--99. Google ScholarDigital Library
- L. C. Freeman, "Centrality in social networks conceptual clarification," Social networks, vol. 1, no. 3, pp. 215--239, 1979.Google ScholarCross Ref
- L. Cavique, A. B. Mendes, and J. M. Santos, "An algorithm to discover the k-clique cover in networks," Artificial Intelligence. Springer, 2009, pp. 363--373. Google ScholarDigital Library
- L. Langohr, "Methods for finding interesting vertices in weighted graphs," Ph.D. dissertation, 2014.Google Scholar
- McAndrew, D. 1999. The structural analysis of criminal networks. In The Social Psychology of Crime: Groups, Teams, and Networks. D. Canter and L. Alison, Eds. Dartmouth Publishing, Aldershot, UK, 53--94.Google Scholar
- M. Akbas, R. Avula, M. Bassiouni, and D. Turgut, "Social network generation and friend ranking based on mobile phone data," Jun. 2013, pp. 1444--1448.Google Scholar
- Newman, M. (2004). Fast algorithm for detecting community structure in networks. Physical Review E, 69(6), 066133.Google Scholar
- Pattillo, N. Youssef, and S. Butenko, "Clique relaxation models in social network analysis," in Handbook of Optimization in Complex Networks. Springer, 2012, pp. 143--162.Google Scholar
- Taha, K. "Determining the Semantic Similarities among Gene Ontology Terms". IEEE Journal of Biomedical and Health Informatics (IEEE JBHI), 2013, Vol. 17, Issue 3, pp. 512 - 525.Google ScholarCross Ref
- Taha, K., Homouz, D., Al Muhairi, H., and Al Mahmoud, Z. "GRank: A Middleware Search Engine for Ranking Genes by {502} Relevance to Given Genes". BMC Bioinformatics 2013, 14:251, doi:10.1186/1471-2105-14-251.Google Scholar
- Tversky A: Features of Similarity. Psycholog. Rev 1977, 84:327-352.Google Scholar
- Taha, K. and Elmasri, R. "SPGProfile: Speak Group Profile." Information Systems (IS), 2010, Elsevier, Vol. 35, No. 7, pp. 774--790. Google ScholarDigital Library
- Taha, K. and Elmasri, R. "BusSEngine: A Business Search Engine." Knowledge and Information Systems: An International Journal (KAIS), 2010, LNCS, Springer, Vol. 23, No. 2, pp. 153--197. Google ScholarDigital Library
- Taha, K. and Elmasri, R. "CXLEngine: A Comprehensive XML Loosely Structured Search Engine." DataX'08 (Database technologies for handling XML information on the web), Nantes, France, March 2008. Google ScholarDigital Library
- Taha, K. "Determining Semantically Related Significant Genes". IEEE/ACM Transactions on Computational Biology and Bioinformatics, 2014, Vol. 11, issue 6, pp. 1119 - 1130. Google ScholarDigital Library
- Taha, K. "GRtoGR: A System for Mapping GO Relations to Gene Relations". IEEE Transactions on NanoBioscience, 2013, Vol. 12, Issue 4.Google ScholarCross Ref
- U. Glsser, Estimating Possible Criminal Organizations from Co-offending Data. Public Safety Canada, 2012.Google Scholar
- Wellman, B. 1988. Structural analysis: From method and metaphor to theory and substance. In Social structures: A network approach, B. Wellman and S. D. Berkowitz, Eds. Cambridge University Press, Cambridge, UK, 19--61.Google Scholar
- White, H. C., Boorman, S. A., and Breiger, R. L. 1976. Social structure from multiple networks: I. Blockmodels of roles and positions. Amer. J. Soc. 81, 730--780.Google ScholarCross Ref
- A System for Analyzing Criminal Social Networks
Recommendations
Social Network Analysis in Multiple Social Networks Data for Criminal Group Discovery
CYBERC '12: Proceedings of the 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge DiscoveryA criminal network is a kind of social networks with both secrecy and efficiency. The hidden knowledge in criminal networks can be regarded as an important indicators for criminal investigations which can help finding the criminal's relationship and ...
Cybercrime on the menu? Examining cafeteria-style offending among financially motivated cybercriminals
AbstractCriminologists have frequently debated whether offenders are specialists, in that they consistently perform either one offense or similar offenses, or versatile by performing any crime based on opportunities and situational ...
Highlights- This study utilized data collected from 37 criminals investigations into cybercriminal networks.
Towards discovering criminal communities from textual data
SAC '11: Proceedings of the 2011 ACM Symposium on Applied ComputingIn many criminal cases, forensically collected data contain valuable information about a suspect's social networks. An investigator often has to manually extract information from the collected text documents and enter it into a police database for ...
Comments