Detecting criminal organizations in mobile phone networks

被引:110
作者
Ferrara, Emilio [1 ]
De Meo, Pasquale [2 ]
Catanese, Salvatore [3 ]
Fiumara, Giacomo [3 ]
机构
[1] Indiana Univ, Sch Informat & Comp, Ctr Complex Networks & Syst Res, Bloomington, IN 47408 USA
[2] Univ Messina, Dept Ancient & Modern Civilizat, I-98168 Messina, Italy
[3] Univ Messina, Dept Math & Comp Sci, I-98166 Messina, Italy
关键词
Criminal networks; Community detection; Criminal communities; COMMUNITY STRUCTURE;
D O I
10.1016/j.eswa.2014.03.024
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The study of criminal networks using traces from heterogeneous communication media is acquiring increasing importance in nowadays society. The usage of communication media such as mobile phones and online social networks leaves digital traces in the form of metadata that can be used for this type of analysis. The goal of this work is twofold: first we provide a theoretical framework for the problem of detecting and characterizing criminal organizations in networks reconstructed from phone call records. Then, we introduce an expert system to support law enforcement agencies in the task of unveiling the underlying structure of criminal networks hidden in communication data. This platform allows for statistical network analysis, community detection and visual exploration of mobile phone network data. It enables forensic investigators to deeply understand hierarchies within criminal organizations, discovering members who play central role and provide connection among sub-groups. Our work concludes illustrating the adoption of our computational framework for a real-word criminal investigation. (C) 2014 Elsevier Ltd. All rights reserved.
引用
收藏
页码:5733 / 5750
页数:18
相关论文
共 50 条
[41]  
Todd M., 2011, TRUTH LEFT INSIDE KI
[42]   EXPERIMENTAL STUDY OF SMALL WORLD PROBLEM [J].
TRAVERS, J ;
MILGRAM, S .
SOCIOMETRY, 1969, 32 (04) :425-443
[43]  
Wasserman S., 1994, Social network analysis: Methods and applications, DOI [10.1017/CBO9780511815478, DOI 10.1017/CBO9780511815478]
[44]   Measuring Link Importance in Terrorist Networks [J].
Wiil, Uffe Kock ;
Gniadek, Jolanta ;
Memon, Nasrullah .
2010 INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING (ASONAM 2010), 2010, :225-232
[45]  
Wright W., 2006, Conference on Human Factors in Computing Systems. CHI2006, P801
[46]   Overlapping Community Detection in Networks: The State-of-the-Art and Comparative Study [J].
Xie, Jierui ;
Kelley, Stephen ;
Szymanski, Boleslaw K. .
ACM COMPUTING SURVEYS, 2013, 45 (04)
[47]   Criminal network analysis and visualization [J].
Xu, J ;
Chen, HC .
COMMUNICATIONS OF THE ACM, 2005, 48 (06) :100-107
[48]   CrimeNet explorer: A framework for criminal network knowledge discovery [J].
Xu, JJ ;
Chen, HC .
ACM TRANSACTIONS ON INFORMATION SYSTEMS, 2005, 23 (02) :201-226
[49]  
Yee KP, 2001, IEEE SYMPOSIUM ON INFORMATION VISUALIZATION 2001, PROCEEDINGS, P43
[50]   INFORMATION-FLOW MODEL FOR CONFLICT AND FISSION IN SMALL-GROUPS [J].
ZACHARY, WW .
JOURNAL OF ANTHROPOLOGICAL RESEARCH, 1977, 33 (04) :452-473