56,765 research outputs found
Identifying a Criminal's Network of Trust
Tracing criminal ties and mining evidence from a large network to begin a
crime case analysis has been difficult for criminal investigators due to large
numbers of nodes and their complex relationships. In this paper, trust networks
using blind carbon copy (BCC) emails were formed. We show that our new shortest
paths network search algorithm combining shortest paths and network centrality
measures can isolate and identify criminals' connections within a trust
network. A group of BCC emails out of 1,887,305 Enron email transactions were
isolated for this purpose. The algorithm uses two central nodes, most
influential and middle man, to extract a shortest paths trust network.Comment: 2014 Tenth International Conference on Signal-Image Technology &
Internet-Based Systems (Presented at Third International Workshop on Complex
Networks and their Applications,SITIS 2014, Marrakesh, Morocco, 23-27,
November 2014
Early Identification of Violent Criminal Gang Members
Gang violence is a major problem in the United States accounting for a large
fraction of homicides and other violent crime. In this paper, we study the
problem of early identification of violent gang members. Our approach relies on
modified centrality measures that take into account additional data of the
individuals in the social network of co-arrestees which together with other
arrest metadata provide a rich set of features for a classification algorithm.
We show our approach obtains high precision and recall (0.89 and 0.78
respectively) in the case where the entire network is known and out-performs
current approaches used by law-enforcement to the problem in the case where the
network is discovered overtime by virtue of new arrests - mimicking real-world
law-enforcement operations. Operational issues are also discussed as we are
preparing to leverage this method in an operational environment.Comment: SIGKDD 201
Analyzing covert social network foundation behind terrorism disaster
This paper addresses a method to analyze the covert social network foundation
hidden behind the terrorism disaster. It is to solve a node discovery problem,
which means to discover a node, which functions relevantly in a social network,
but escaped from monitoring on the presence and mutual relationship of nodes.
The method aims at integrating the expert investigator's prior understanding,
insight on the terrorists' social network nature derived from the complex graph
theory, and computational data processing. The social network responsible for
the 9/11 attack in 2001 is used to execute simulation experiment to evaluate
the performance of the method.Comment: 17pages, 10 figures, submitted to Int. J. Services Science
Inference of the Russian drug community from one of the largest social networks in the Russian Federation
The criminal nature of narcotics complicates the direct assessment of a drug
community, while having a good understanding of the type of people drawn or
currently using drugs is vital for finding effective intervening strategies.
Especially for the Russian Federation this is of immediate concern given the
dramatic increase it has seen in drug abuse since the fall of the Soviet Union
in the early nineties. Using unique data from the Russian social network
'LiveJournal' with over 39 million registered users worldwide, we were able for
the first time to identify the on-line drug community by context sensitive text
mining of the users' blogs using a dictionary of known drug-related official
and 'slang' terminology. By comparing the interests of the users that most
actively spread information on narcotics over the network with the interests of
the individuals outside the on-line drug community, we found that the 'average'
drug user in the Russian Federation is generally mostly interested in topics
such as Russian rock, non-traditional medicine, UFOs, Buddhism, yoga and the
occult. We identify three distinct scale-free sub-networks of users which can
be uniquely classified as being either 'infectious', 'susceptible' or 'immune'.Comment: 12 pages, 11 figure
Uncovering the Wider Structure of Extreme Right Communities Spanning Popular Online Networks
Recent years have seen increased interest in the online presence of extreme
right groups. Although originally composed of dedicated websites, the online
extreme right milieu now spans multiple networks, including popular social
media platforms such as Twitter, Facebook and YouTube. Ideally therefore, any
contemporary analysis of online extreme right activity requires the
consideration of multiple data sources, rather than being restricted to a
single platform. We investigate the potential for Twitter to act as a gateway
to communities within the wider online network of the extreme right, given its
facility for the dissemination of content. A strategy for representing
heterogeneous network data with a single homogeneous network for the purpose of
community detection is presented, where these inherently dynamic communities
are tracked over time. We use this strategy to discover and analyze persistent
English and German language extreme right communities.Comment: 10 pages, 11 figures. Due to use of "sigchi" template, minor changes
were made to ensure 10 page limit was not exceeded. Minor clarifications in
Introduction, Data and Methodology section
- …