Using shortest path to discover criminal community

Extracting communities using existing community detection algorithms yields dense sub-networks that are difficult to analyse. Extracting a smaller sample that embodies the relationships of a list of suspects is an important part of the beginning of an investigation. In this paper, we present the efficacy of our shortest paths network search algorithm (SPNSA) that begins with an "algorithm feed", a small subset of nodes of particular interest, and builds an investigative sub-network. The algorithm feed may consist of known criminals or suspects, or persons of influence. This sets our approach apart from existing community detection algorithms. We apply the SPNSA on the Enron Dataset of e-mail communications starting with those convicted of money laundering in relation to the collapse of Enron as the algorithm feed. The algorithm produces sparse and small sub-networks that could feasibly identify a list of persons and relationships to be further investigated. In contrast, we show that identifying sub-networks of interest using either community detection algorithms or a k-Neighbourhood approach produces sub-networks of much larger size and complexity. When the 18 top managers of Enron were used as the algorithm feed, the resulting sub-network identified 4 convicted criminals that were not managers and so not part of the algorithm feed. We also directly tested the SPNSA by removing one of the convicted criminals from the algorithm feed and re-running the algorithm; in 5 out of 9 cases the left out criminal occurred in the resulting sub-network.

[1]  Muhammad Abulaish,et al.  A social graph based text mining framework for chat log investigation , 2014, Digit. Investig..

[2]  Stephen A. Davis,et al.  Identifying a Criminal's Network of Trust , 2014, 2014 Tenth International Conference on Signal-Image Technology and Internet-Based Systems.

[3]  Aparna Basu Social Network Analysis: A Methodology for Studying Terrorism , 2014 .

[4]  Muhammad Abulaish,et al.  Identifying cliques in dark web forums - An agglomerative clustering approach , 2012, 2012 IEEE International Conference on Intelligence and Security Informatics.

[5]  Ping Zhang Model Selection Via Multifold Cross Validation , 1993 .

[6]  Claudio Castellano,et al.  Defining and identifying communities in networks. , 2003, Proceedings of the National Academy of Sciences of the United States of America.

[7]  Jongsung Kim,et al.  A granular approach for user-centric network analysis to identify digital evidence , 2014, Peer-to-Peer Networking and Applications.

[8]  Xing-yuan Wang,et al.  Uncovering the overlapping community structure of complex networks by maximal cliques , 2014 .

[9]  C. Bron,et al.  Algorithm 457: finding all cliques of an undirected graph , 1973 .

[10]  Valdis E. Krebs,et al.  Uncloaking Terrorist Networks , 2002, First Monday.

[11]  Wenke Lee,et al.  Connected Colors: Unveiling the Structure of Criminal Networks , 2013, RAID.

[12]  Andries Petrus Engelbrecht,et al.  Unsupervised discovery of relations for analysis of textual data , 2010, Digit. Investig..

[13]  David B. Skillicorn,et al.  Detecting unusual email communication , 2005, CASCON.

[14]  J. Shao Bootstrap Model Selection , 1996 .

[15]  M E J Newman,et al.  Finding and evaluating community structure in networks. , 2003, Physical review. E, Statistical, nonlinear, and soft matter physics.

[16]  Pasquale De Meo,et al.  Detecting criminal organizations in mobile phone networks , 2014, Expert Syst. Appl..

[17]  T. Vicsek,et al.  Uncovering the overlapping community structure of complex networks in nature and society , 2005, Nature.

[18]  P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .

[19]  Tim Menzies,et al.  oftware effort models should be assessed via leave-one-out validation , 2013 .

[20]  Haluk Bingol,et al.  Community Detection in Complex Networks Using Genetic Algorithms , 2006, 0711.0491.

[21]  Malcolm S. Salter Innovation Corrupted: The Origins and Legacy of Enron's Collapse , 2008 .

[22]  Roger Piqueras Jover,et al.  Crime scene investigation: SMS spam data analysis , 2012, IMC '12.

[23]  Gang Wang,et al.  Crime data mining: a general framework and some examples , 2004, Computer.

[24]  Jian Pei,et al.  The k-anonymity and l-diversity approaches for privacy preservation in social networks against neighborhood attacks , 2011, Knowledge and Information Systems.

[25]  Amr M. Youssef,et al.  Mining criminal networks from unstructured text documents , 2012, Digit. Investig..

[26]  R. Carter 11 – IT and society , 1991 .

[27]  Mark Newman,et al.  Networks: An Introduction , 2010 .

[28]  M. Newman,et al.  Finding community structure in networks using the eigenvectors of matrices. , 2006, Physical review. E, Statistical, nonlinear, and soft matter physics.

[29]  Nicolas Christin,et al.  Dissecting one click frauds , 2010, CCS '10.

[30]  Tom Crick,et al.  Measuring UK crime gangs , 2014, 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2014).

[31]  Kathleen F. Brickey,et al.  From Enron to WorldCom and Beyond: Life and Crime After Sarbanes-Oxley , 2003 .

[32]  M E J Newman,et al.  Community structure in social and biological networks , 2001, Proceedings of the National Academy of Sciences of the United States of America.

[33]  Thomas T. Hills,et al.  Categorical structure among shared features in networks of early-learned nouns , 2009, Cognition.

[34]  Tobun Dorbin Ng,et al.  Terrorism and Crime Related Weblog Social Network: Link, Content Analysis and Information Visualization , 2007, 2007 IEEE Intelligence and Security Informatics.

[35]  M E J Newman,et al.  Fast algorithm for detecting community structure in networks. , 2003, Physical review. E, Statistical, nonlinear, and soft matter physics.

[36]  Gavin C. Cawley,et al.  Fast exact leave-one-out cross-validation of sparse least-squares support vector machines , 2004, Neural Networks.

[37]  Matthieu Latapy,et al.  Computing Communities in Large Networks Using Random Walks , 2004, J. Graph Algorithms Appl..

[38]  Jean-Loup Guillaume,et al.  Fast unfolding of communities in large networks , 2008, 0803.0476.

[39]  Jean-Marc Petit,et al.  Web Intelligence and Intelligent Agent Technology , 2011 .

[40]  Benjamin C. M. Fung,et al.  Mining Criminal Networks from Chat Log , 2012, 2012 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology.

[41]  Mao-Bin Hu,et al.  Detect overlapping and hierarchical community structure in networks , 2008, ArXiv.

[42]  K. K. Bhoyar,et al.  Email Mining: A Review , 2012 .

[43]  Xiuzhen Zhang,et al.  Anomaly detection in online social networks , 2014, Soc. Networks.

[44]  M. Newman,et al.  Finding community structure in very large networks. , 2004, Physical review. E, Statistical, nonlinear, and soft matter physics.

[45]  Walter Didimo,et al.  An advanced network visualization system for financial crime detection , 2011, 2011 IEEE Pacific Visualization Symposium.