skip to main content
10.1145/3231830.3231832acmotherconferencesArticle/Chapter ViewAbstractPublication PagesawictConference Proceedingsconference-collections
research-article

CLogVis: Crime Data Analysis and Visualization Tool

Authors Info & Claims
Published:13 November 2017Publication History

ABSTRACT

Recently, cell phone usage has increased incrementally to huge numbers. Statistics show that a total number of mobile phone users worldwide, from 2013 to 2019, is about 60 percent of the Earth's population. This reflects that the use of cell phones is the traditional way of communicating for most of the people in the world. Making calls and sending text messages are the main methods of communication used with cell phones. The purpose of this work is to present "CLogVis," a crime data analysis and visualization system that helps police departments and security agencies connect criminals and suspects by using their cell phone data. Cell phones contain a huge amount of information that helps agencies and police departments in various ways find relationships and connections between criminals. Moreover, information in cell phones will expand in an incremental way when the suspect uses the Internet through their cell phone. In our system, we will be looking to build relationships and connecttions between criminals by using phonebooks and call history (inbound and outbound) to find the relationships between suspects. Regarding the nature of crime organizations, which are built on networks, graph techniques are used to build connections throughout datasets gathered from arrested suspects, criminals, and Telecommunications Service Provider (TSP) log files.

References

  1. https://www.statista.com/statistics/274756/forecast-of-mobile-phone-users-in-finland/Google ScholarGoogle Scholar
  2. WILLIAM J. BUCHANAN. (2011). The Increasing Challenge of DIGITAL FORENSICS, 10--12. EDINBURGH NAPIER UNIVERSITY, UK.Google ScholarGoogle Scholar
  3. D. R. John Arquilla, Networks and Netwars:, www.rang.org, November 2001.Google ScholarGoogle Scholar
  4. E. Ferrara, P. De Meo, S. Catanese, and G. Fiumara, "Detecting criminal organizations in mobile phone networks," Expert Systems with Applications, vol. 41, pp. 5733--5750, 2014.Google ScholarGoogle Scholar
  5. S. A. Catanese and G. Fiumara, "A visual tool for forensic analysis of mobile phone traffic," in Proceedings of the 2nd ACM workshop on Multimedia in forensics, security, and intelligence, 2010, pp. 71--76. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Marturana, F., Me, G., Bertè, R., & Tacconi, S. (2011). A quantitative approach to triaging in mobile forensics. Proc. 10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. on FCST 2011, 582--588. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Didimo, W., Liotta, G., & Montecchiani, F. (2014). Network visualization for financial crime detection. Journal of Visual Languages and Computing, 25(4), 433--451. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. S.Z. Li, A.K. Jain (Eds.), Handbook of Face Recognition, Springer, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Terrettaz-Zufferey, A. L., Ratle, F., Ribaux, O., Esseiva, P., & Kanevski, M. (2007). Pattern detection in forensic case data using graph theory: Application to heroin cutting agents. Forensic Science International, 167(2--3), 242--246.Google ScholarGoogle Scholar
  10. P. Chamikara, D. Yapa, R. Kodituwakku and J. Gunathilake, "SLSecureNet: intelligent policing using data mining techniques,"International Journal of Soft Computing and Engineering, vol. 2, no. 1, pp. 175--180, 2012Google ScholarGoogle Scholar
  11. Jayaweera, I., Sajeewa, C., Liyanage, S., Wijewardane, T., Perera, I., & Wijayasiri, A. (2015). Crime analytics: Analysis of crimes through newspaper articles. MERCon 2015 -- MoratuwaGoogle ScholarGoogle Scholar
  12. GrTSPos, G. (2010). Exploratory Comparison of Forensic Evidence Recovery Techniques for a Windows Mobile Smartphone, 8(September), 23--36 Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Sgaras, C., Kechadi, M. T., & Le-Khac, N. A. (2015). Forensics acquisition and analysis of instant messaging and VoIP applications. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8915, 188--199Google ScholarGoogle Scholar
  14. Sai, D. M., Prasad, N. R. G. K., & Dekka, S. (2015). The Forensic Process Analysis of Mobile Device, 6(5), 4847--4850Google ScholarGoogle Scholar
  15. K. Ruohonen, Graph Theory, Tampere University of Technology, 2013Google ScholarGoogle Scholar
  16. Terrettaz-Zufferey, A. L., Ratle, F., Ribaux, O., Esseiva, P., & Kanevski, M. (2007). Pattern detection in forensic case data using graph theory: Application to heroin cutting agents. Forensic Science International, 167(2--3), 242--246.Google ScholarGoogle Scholar

Index Terms

  1. CLogVis: Crime Data Analysis and Visualization Tool

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        AWICT 2017: Proceedings of the Second International Conference on Advanced Wireless Information, Data, and Communication Technologies
        November 2017
        116 pages
        ISBN:9781450353106
        DOI:10.1145/3231830

        Copyright © 2017 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 13 November 2017

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Research
        • Refereed limited

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader