Detecting criminal organizations in mobile phone networks

Abstract The study of criminal networks using traces from heterogeneous communication media is acquiring increasing importance in nowadays society. The usage of communication media such as mobile phones and online social networks leaves digital traces in the form of metadata that can be used for this type of analysis. The goal of this work is twofold: first we provide a theoretical framework for the problem of detecting and characterizing criminal organizations in networks reconstructed from phone call records. Then, we introduce an expert system to support law enforcement agencies in the task of unveiling the underlying structure of criminal networks hidden in communication data. This platform allows for statistical network analysis, community detection and visual exploration of mobile phone network data. It enables forensic investigators to deeply understand hierarchies within criminal organizations, discovering members who play central role and provide connection among sub-groups. Our work concludes illustrating the adoption of our computational framework for a real-word criminal investigation.

[1]  Boleslaw K. Szymanski,et al.  Overlapping community detection in networks: The state-of-the-art and comparative study , 2011, CSUR.

[2]  Emilio Ferrara,et al.  Topological Features of Online Social Networks , 2011, ArXiv.

[3]  Marti A. Hearst,et al.  Animated exploration of dynamic graphs with radial layout , 2001, IEEE Symposium on Information Visualization, 2001. INFOVIS 2001..

[4]  M E J Newman,et al.  Modularity and community structure in networks. , 2006, Proceedings of the National Academy of Sciences of the United States of America.

[5]  D. Mcandrew The Structural Analysis of Criminal Networks , 2021, The Social Psychology of Crime.

[6]  Sharon L. Milgram,et al.  The Small World Problem , 1967 .

[7]  Lin Gao,et al.  Identification of overlapping and non-overlapping community structure by fuzzy clustering in complex networks , 2011, Inf. Sci..

[8]  Alexander W. Skaburskis,et al.  The Sandbox for analysis: concepts and methods , 2006, CHI.

[9]  Kathleen M. Carley Destabilization of covert networks , 2006, Comput. Math. Organ. Theory.

[10]  W. Baker,et al.  THE SOCIAL ORGANIZATION OF CONSPIRACY: ILLEGAL NETWORKS IN THE HEAVY ELECTRICAL EQUIPMENT INDUSTRY* , 1993 .

[11]  Mark E. J. Newman A measure of betweenness centrality based on random walks , 2005, Soc. Networks.

[12]  Edward M. Reingold,et al.  Graph drawing by force‐directed placement , 1991, Softw. Pract. Exp..

[13]  A. Silke The Devil You Know: Continuing Problems with Research on Terrorism , 2001 .

[14]  Salvatore Catanese,et al.  Crawling Facebook for social network analysis purposes , 2011, WIMS '11.

[15]  Valdis E. Krebs,et al.  Mapping Networks of Terrorist Cells , 2001 .

[16]  M E J Newman,et al.  Finding and evaluating community structure in networks. , 2003, Physical review. E, Statistical, nonlinear, and soft matter physics.

[17]  Margaret Martonosi,et al.  ON CELLULAR , 2022 .

[18]  Marc Sageman,et al.  Understanding terror networks. , 2004, International journal of emergency mental health.

[19]  Pasquale De Meo,et al.  Extraction and Analysis of Facebook Friendship Relations , 2012, Computational Social Networks.

[20]  M E J Newman,et al.  Fast algorithm for detecting community structure in networks. , 2003, Physical review. E, Statistical, nonlinear, and soft matter physics.

[21]  Stanley Wasserman,et al.  Social Network Analysis: Methods and Applications , 1994, Structural analysis in the social sciences.

[22]  David Lazer,et al.  Mobile Phone Data for Inferring Social Network Structure , 2008 .

[23]  Filippo Menczer,et al.  The Geospatial Characteristics of a Social Movement Communication Network , 2013, PloS one.

[24]  Uffe Kock Wiil,et al.  Measuring Link Importance in Terrorist Networks , 2010, 2010 International Conference on Advances in Social Networks Analysis and Mining.

[25]  D.M. Hart,et al.  Networks and Netwars: The Future of Terror, Crime, and Militancy. John Arquilla and David Ronfeldt (eds). RAND: National Defense Research Institute, 2001. 374pp. £21.50/$25 , 2002 .

[26]  M E J Newman,et al.  Community structure in social and biological networks , 2001, Proceedings of the National Academy of Sciences of the United States of America.

[27]  G. Madey,et al.  Uncovering individual and collective human dynamics from mobile phone records , 2007, 0710.2939.

[28]  Filippo Menczer,et al.  The Digital Evolution of Occupy Wall Street , 2013, PloS one.

[29]  Varvara Mitliaga,et al.  Networks and Netwars - The Future of Terror, Crime, and Militancy , 2002, Int. J. Law Inf. Technol..

[30]  Hsinchun Chen,et al.  COPLINK: managing law enforcement data and knowledge , 2003, CACM.

[31]  W. Zachary,et al.  An Information Flow Model for Conflict and Fission in Small Groups , 1977, Journal of Anthropological Research.

[32]  Hsinchun Chen,et al.  CrimeNet explorer: a framework for criminal network knowledge discovery , 2005, TOIS.

[33]  Albert-László Barabási,et al.  Statistical mechanics of complex networks , 2001, ArXiv.

[34]  Carlo Morselli,et al.  Assessing Vulnerable and Strategic Positions in a Criminal Network , 2010 .

[35]  Malcolm K. Sparrow,et al.  The application of network analysis to criminal intelligence: An assessment of the prospects , 1991 .

[36]  D. M. Hart Networks and Netwars: The Future of Terror, Crime, and Militancy. John Arquilla and David Ronfeldt (eds). RAND: National Defense Research Institute, 2001. 374pp. £21.50/$25 , 2002 .

[37]  Jean-Loup Guillaume,et al.  Fast unfolding of communities in large networks , 2008, 0803.0476.

[38]  Richard F. Deckro,et al.  A Social Network Analysis of the Iranian Government , 2001 .

[39]  S. Fortunato,et al.  Resolution limit in community detection , 2006, Proceedings of the National Academy of Sciences.

[40]  Albert-László Barabási,et al.  Internet: Diameter of the World-Wide Web , 1999, Nature.

[41]  P. Klerks The Network Paradigm Applied to Criminal Organisations: Theoretical nitpicking or a relevant doctrine for investigators? Recent developments in the Netherlands , 2001 .

[42]  Virgílio A. F. Almeida,et al.  Characterizing user behavior in online social networks , 2009, IMC '09.

[43]  A. Barabasi,et al.  Analysis of a large-scale weighted network of one-to-one human communication , 2007, physics/0702158.

[44]  Stanley Milgram,et al.  An Experimental Study of the Small World Problem , 1969 .

[45]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[46]  Seungyeop Han,et al.  Analysis of topological characteristics of huge online social networking services , 2007, WWW '07.

[47]  A-L Barabási,et al.  Structure and tie strengths in mobile communication networks , 2006, Proceedings of the National Academy of Sciences.

[48]  Hsinchun Chen,et al.  Criminal network analysis and visualization , 2005, CACM.

[49]  Danah Boyd,et al.  Vizster: visualizing online social networks , 2005, IEEE Symposium on Information Visualization, 2005. INFOVIS 2005..

[50]  Nicholas J. Pioch,et al.  POLESTAR: collaborative knowledge management and sensemaking tools for intelligence analysts , 2006, CIKM '06.

[51]  T. Vicsek,et al.  Uncovering the overlapping community structure of complex networks in nature and society , 2005, Nature.

[52]  David W. Brannan,et al.  Talking to "Terrorists": Towards an Independent Analytical Framework for the Study of Violent Substate Activism , 2001 .

[53]  David Lazer,et al.  Inferring friendship network structure by using mobile phone data , 2009, Proceedings of the National Academy of Sciences.

[54]  Santo Fortunato,et al.  Community detection in graphs , 2009, ArXiv.