The (not so) Critical Nodes of Criminal Networks

One of the most basic question in the analysis of social networks is to find nodes that are of particular relevance in the network. The answer that emerged in the recent literature is that the importance, or centrality, of a node \(x\) is proportional to the number of nodes that get disconnected from the network when node \(x\) is removed. We show that while in social networks such important nodes lie in their cores (i.e., maximal subgraphs in which all nodes have degree higher than a certain value), this is not necessarily the case in criminal networks. This shows that nodes whose removal affects large portions of the criminal network prefer to operate from network peripheries, thus confirming the intuition of Baker and Faulkner [4]. Our results also highlight structural differences between criminal networks and other social networks, suggesting that classical definitions of importance (or centrality) in a network fail to capture the concept of key players in criminal networks.

[1]  Giorgio Ausiello,et al.  Real-time analysis of critical nodes in network cores , 2012, 2012 8th International Wireless Communications and Mobile Computing Conference (IWCMC).

[2]  J. Miro-Julia,et al.  Marvel Universe looks almost like a real social network , 2002 .

[3]  P. Duijn,et al.  The Relative Ineffectiveness of Criminal Network Disruption , 2014, Scientific Reports.

[4]  W. Zachary,et al.  An Information Flow Model for Conflict and Fission in Small Groups , 1977, Journal of Anthropological Research.

[5]  Pasquale De Meo,et al.  Detecting criminal organizations in mobile phone networks , 2014, Expert Syst. Appl..

[6]  Malcolm K. Sparrow,et al.  The application of network analysis to criminal intelligence: An assessment of the prospects , 1991 .

[7]  Pasquale De Meo,et al.  Visualizing criminal networks reconstructed from mobile phone records , 2014, HT.

[8]  Efstathios D. Mainas,et al.  The Analysis of Criminal and Terrorist Organisations as Social Network Structures: A Quasi-Experimental Study , 2012 .

[9]  Vladimir Batagelj,et al.  Generalized Cores , 2002, ArXiv.

[10]  W. Baker,et al.  THE SOCIAL ORGANIZATION OF CONSPIRACY: ILLEGAL NETWORKS IN THE HEAVY ELECTRICAL EQUIPMENT INDUSTRY* , 1993 .

[11]  M. Newman,et al.  Finding community structure in networks using the eigenvectors of matrices. , 2006, Physical review. E, Statistical, nonlinear, and soft matter physics.

[12]  Stephen P. Borgatti,et al.  Centrality and network flow , 2005, Soc. Networks.

[13]  Anthony Masys,et al.  Networks and network analysis for defence and security , 2013, 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2013).

[14]  Stephen B. Seidman,et al.  Network structure and minimum degree , 1983 .

[15]  Carlo Morselli,et al.  Inside Criminal Networks , 2008 .

[16]  D. M. Schwartz,et al.  Using social network analysis to target criminal networks , 2009 .

[17]  S. Borgatti The Key Player Problem , 2002 .

[18]  Stephen P. Borgatti,et al.  Identifying sets of key players in a social network , 2006, Comput. Math. Organ. Theory.

[19]  Giorgio Ausiello,et al.  The (betweenness) centrality of critical nodes and network cores , 2013, 2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC).

[20]  Jure Leskovec,et al.  Discovering social circles in ego networks , 2012, ACM Trans. Knowl. Discov. Data.

[21]  Duncan J. Watts,et al.  Collective dynamics of ‘small-world’ networks , 1998, Nature.

[22]  Hsinchun Chen,et al.  Criminal network analysis and visualization , 2005, CACM.