Now You See Me: Identifying Duplicate Network Personas

This work provides a decision-making framework at the intersection of social network analysis and law enforcement intelligence with the goal of identifying persons of interest in a social network. Criminal social networks are complex due to the limited and imperfect information available. Moreover, the participating entities tend to misrepresent themselves in order to stay hidden and covert. In this work, we propose a new integer programming formulation to assist in the identification of entities who are prone to misrepresent themselves in a social network. Our insight is that such personas will form large subgraphs of restricted diameter that are connected to other entities who do not communicate directly or within a short number of intermediates. We formally define the problem and derive its computational complexity. Additionally, we provide an integer programming formulation to solve it exactly with the use of a commercial solver. We then show how our framework behaves on the Krebs 9/11 network. Our approach is able to identify what are believed to be two distinct clusters of criminals participating in two separate subplots: the multiple flight hijacking on September 11; as well as a plot against the U.S. embassy in Paris in the year 2001.

[1]  Sergiy Butenko,et al.  Clique Relaxations in Social Network Analysis: The Maximum k-Plex Problem , 2011, Oper. Res..

[2]  Alexander Veremyev,et al.  Identifying large robust network clusters via new compact formulations of maximum k-club problems , 2012, Eur. J. Oper. Res..

[3]  Johan Håstad,et al.  Clique is hard to approximate within n/sup 1-/spl epsiv// , 1996, Proceedings of 37th Conference on Foundations of Computer Science.

[4]  W. Bernasco,et al.  Criminal groups and transnational illegal markets , 2004 .

[5]  J. Dinitz,et al.  Estimating landscape carrying capacity through maximum clique analysis. , 2012, Ecological applications : a publication of the Ecological Society of America.

[6]  Jose L. Walteros,et al.  Integer programming models for detecting graph bipartitions with structural requirements , 2018, Networks.

[7]  Benedikt Nordhoff,et al.  Dijkstra’s Algorithm , 2013 .

[8]  Malcolm K. Sparrow,et al.  The application of network analysis to criminal intelligence: An assessment of the prospects , 1991 .

[9]  Philip M. Spira,et al.  A New Algorithm for Finding all Shortest Paths in a Graph of Positive Arcs in Average Time 0(n2 log2n) , 1973, SIAM J. Comput..

[10]  Lars Engebretsen,et al.  Clique Is Hard To Approximate Within , 2000 .

[11]  Tewksbury Richard Qualitative versus Quantitative Methods: Understanding Why Qualitative Methods are Superior for Criminology and Criminal Justice , 2013 .

[12]  Duncan J. Watts,et al.  Six Degrees: The Science of a Connected Age , 2003 .

[13]  Stuart E. Dreyfus,et al.  An Appraisal of Some Shortest-Path Algorithms , 1969, Oper. Res..

[14]  Timothy M. Chan More Algorithms for All-Pairs Shortest Paths in Weighted Graphs , 2010, SIAM J. Comput..

[15]  P. Duijn,et al.  The Relative Ineffectiveness of Criminal Network Disruption , 2014, Scientific Reports.

[16]  Santo Fortunato,et al.  Community detection in graphs , 2009, ArXiv.

[17]  Predrag T. Tosic,et al.  Maximal Clique Based Distributed Group Formation for Autonomous Agent Coalitions , 2004 .

[18]  Gisela Bichler,et al.  Networks of Collaborating Criminals: Assessing the Structural Vulnerability of Drug Markets , 2011 .

[19]  Panos M. Pardalos,et al.  The maximum clique problem , 1994, J. Glob. Optim..

[20]  R. J. Mokken,et al.  Cliques, clubs and clans , 1979 .

[21]  Christian Sommer,et al.  Shortest-path queries in static networks , 2014, ACM Comput. Surv..

[22]  Balabhaskar Balasundaram,et al.  Graph theoretic generalizations of clique: optimization and extensions , 2009 .

[23]  Gilbert Laporte,et al.  An exact algorithm for the maximum k-club problem in an undirected graph , 1999, Eur. J. Oper. Res..

[24]  A. A. Aronowitz Smuggling and Trafficking in Human Beings: The Phenomenon, The Markets that Drive It and the Organisations that Promote It , 2001 .

[25]  R. Alba A graph‐theoretic definition of a sociometric clique† , 1973 .

[26]  Ryan Miller,et al.  Three is The Answer: Combining Relationships to Analyze Multilayered Terrorist Networks , 2017, 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM).

[27]  Jyun-Cheng Wang,et al.  Recommending trusted online auction sellers using social network analysis , 2008, Expert Syst. Appl..

[28]  Panos M. Pardalos,et al.  Statistical analysis of financial networks , 2005, Comput. Stat. Data Anal..

[29]  Hsinchun Chen,et al.  Criminal network analysis and visualization , 2005, CACM.

[30]  S. Koschade A Social Network Analysis of Jemaah Islamiyah: The Applications to Counterterrorism and Intelligence , 2006 .

[31]  Mary Crawford,et al.  Research and Activism Review: Sex Trafficking in Nepal: A Review of Intervention and Prevention Programs , 2011, Violence against women.

[32]  Matjaz Perc,et al.  Statistical physics of crime: A review , 2014, Physics of life reviews.

[33]  Gilbert Laporte,et al.  Heuristics for finding k-clubs in an undirected graph , 2000, Comput. Oper. Res..

[34]  Hsinchun Chen,et al.  The topology of dark networks , 2008, Commun. ACM.

[35]  Balabhaskar Balasundaram,et al.  On inclusionwise maximal and maximum cardinality k-clubs in graphs , 2012, Discret. Optim..

[36]  Valdis E. Krebs,et al.  Mapping Networks of Terrorist Cells , 2001 .

[37]  Hosseinali Salemi,et al.  Parsimonious formulations for low-diameter clusters , 2020, Math. Program. Comput..

[38]  Hsinchun Chen,et al.  Fighting organized crimes: using shortest-path algorithms to identify associations in criminal networks , 2004, Decis. Support Syst..