Visual Analysis of Implicit Social Networks for Suspicious Behavior Detection

In this paper we show how social networks, implicitly built from communication data, can serve as a basis for suspicious behavior detection from large communications data (landlines and mobile phone calls) provided by communication services providers for criminal investigators following two procedures: lawful interception and data retention. We propose the following contributions: (i) a data model and a set of operators for querying this data in order to extract suspicious behavior and (ii) a user friendly and easy-to-navigate visual representation for communication data with a prototype implementation.

[1]  Detlef Schoder,et al.  Web Science 2.0: Identifying Trends through Semantic Social Network Analysis , 2008, 2009 International Conference on Computational Science and Engineering.

[2]  Bruce H. McCormick,et al.  Visualization: expanding scientific and engineering research opportunities , 1989, Computer.

[3]  Tamara Munzner,et al.  TopoLayout: Multilevel Graph Layout by Topological Features , 2007, IEEE Transactions on Visualization and Computer Graphics.

[4]  Danah Boyd,et al.  Vizster: visualizing online social networks , 2005, IEEE Symposium on Information Visualization, 2005. INFOVIS 2005..

[5]  Dino Pedreschi,et al.  Mining Mobility Behavior from Trajectory Data , 2009, 2009 International Conference on Computational Science and Engineering.

[6]  Krishna P. Gummadi,et al.  You are who you know: inferring user profiles in online social networks , 2010, WSDM '10.

[7]  Laks V. S. Lakshmanan,et al.  On Query Spreadsheets , 1998, ICDE 1998.

[8]  Yossi Matias,et al.  Suggesting friends using the implicit social graph , 2010, KDD.

[9]  Ching-Yung Lin,et al.  On the quality of inferring interests from social neighbors , 2010, KDD.

[10]  Laks V. S. Lakshmanan,et al.  Learning influence probabilities in social networks , 2010, WSDM '10.

[11]  Matthew Richardson,et al.  Mining knowledge-sharing sites for viral marketing , 2002, KDD.

[12]  B. John Oommen,et al.  Anomaly Detection in Dynamic Social Systems Using Weak Estimators , 2009, 2009 International Conference on Computational Science and Engineering.

[13]  Owen Rambow,et al.  Predicting Interests of People on Online Social Networks , 2009, 2009 International Conference on Computational Science and Engineering.

[14]  Hsinchun Chen,et al.  Criminal network analysis and visualization , 2005, CACM.

[15]  Ben Shneiderman,et al.  Systematic yet flexible discovery: guiding domain experts through exploratory data analysis , 2008, IUI '08.

[16]  Valdis E. Krebs,et al.  Mapping Networks of Terrorist Cells , 2001 .