868 research outputs found

    Disrupting resilient criminal networks through data analysis: The case of sicilian mafia

    Get PDF
    Compared to other types of social networks, criminal networks present particularly hard challenges, due to their strong resilience to disruption, which poses severe hurdles to LawEnforcement Agencies (LEAs). Herein, we borrow methods and tools from Social Network Analysis (SNA) to (i) unveil the structure and organization of Sicilian Mafia gangs, based on two real-world datasets, and (ii) gain insights as to how to efficiently reduce the Largest Connected Component (LCC) of two networks derived from them. Mafia networks have peculiar features in terms of the links distribution and strength, which makes them very different from other social networks, and extremely robust to exogenous perturbations. Analysts also face difficulties in collecting reliable datasets that accurately describe the gangs' internal structure and their relationships with the external world, which is why earlier studies are largely qualitative, elusive and incomplete. An added value of our work is the generation of two realworld datasets, based on raw data extracted from juridical acts, relating to a Mafia organization that operated in Sicily during the first decade of 2000s. We created two different networks, capturing phone calls and physical meetings, respectively. Our analysis simulated different intervention procedures: (i) arresting one criminal at a time (sequential node removal); and (ii) police raids (node block removal). In both the sequential, and the node block removal intervention procedures, the Betweenness centrality was the most effective strategy in prioritizing the nodes to be removed. For instance, when targeting the top 5% nodes with the largest Betweenness centrality, our simulations suggest a reduction of up to 70% in the size of the LCC. We also identified that, due the peculiar type of interactions in criminal networks (namely, the distribution of the interactions' frequency), no significant differences exist between weighted and unweighted network analysis. Our work has significant practical applications for perturbing the operations of criminal and terrorist networks

    L'identification des rĂŽles dans un trafic de stupĂ©fiants par la gĂ©olocalisation des donnĂ©es tĂ©lĂ©phoniques recueillies au cours de l'enquĂȘte

    Get PDF
    La surveillance tĂ©lĂ©phonique est un des principaux moyens utilisĂ©s dans les enquĂȘtes sur le trafic de stupĂ©fiants afin de reconstituer l’activitĂ© dĂ©lictueuse, identifier les acteurs impliquĂ©s, dĂ©terminer leurs rĂŽles respectifs et les localiser. À ce jour, les recherches sur l’exploitation de la tĂ©lĂ©phonie afin d’étudier des groupes criminels portent principalement sur les transcriptions des communications intĂ©grĂ©es dans les dĂ©cisions de justice. Cette recherche exploratoire bĂ©nĂ©ficie quant Ă  elle d’un accĂšs privilĂ©giĂ© aux donnĂ©es de tĂ©lĂ©phonie provenant de mesures de surveillance en temps rĂ©el et rĂ©troactive durant l’enquĂȘte. Cette recherche se focalise sur le lien entre le rĂŽle d’un individu impliquĂ© dans le trafic de stupĂ©fiants et les patterns spatiaux dĂ©tectĂ©s dans les traces tĂ©lĂ©phoniques. La question de recherche posĂ©e est : le rĂŽle d’un acteur, Ă  savoir la fonction qu’il remplit et la place qu’il occupe au sein du groupe, peut-il ĂȘtre infĂ©rĂ© Ă  partir de ses activitĂ©s tĂ©lĂ©phoniques ? Cet article aborde cette question Ă  travers l’analyse spatio-temporelle des contrĂŽles tĂ©lĂ©phoniques rĂ©troactifs et en temps rĂ©el de 20 individus distincts impliquĂ©s dans le trafic de stupĂ©fiants. Les individus sĂ©lectionnĂ©s sont rĂ©partis selon trois rĂŽles : livreurs, grossistes ou semi-grossistes et transporteurs. Pour mesurer leur mobilitĂ©, la localisation mĂ©diane, l’aire de l’enveloppe convexe, et la moyenne des distances parcourues par jour sont notamment calculĂ©es pour chaque individu et par type de rĂŽle. Les rĂ©sultats soutiennent l’hypothĂšse selon laquelle le rĂŽle de l’utilisateur influence les patterns observĂ©s dans ses donnĂ©es tĂ©lĂ©phoniques. Les transporteurs semblent ainsi pouvoir ĂȘtre diffĂ©renciĂ©s des livreurs et grossistes selon des patterns gĂ©ographiques identifiables. Les livreurs semblent Ă©galement pouvoir ĂȘtre diffĂ©renciĂ©s des grossistes. Ces rĂ©sultats tendent Ă  confirmer l’approche proposĂ©e et rĂ©vĂšlent un potentiel d’exploration des donnĂ©es de tĂ©lĂ©phonie pour infĂ©rer le rĂŽle des acteurs dans un trafic

    Visualization and analysis of mobile phone location data

    Get PDF
    This thesis investigates the use of passively-collected data from mobile phone networks to map population movements. In Australia, as in most other developed countries, nearly all teenagers and working-age adults carry a mobile phone. When these phones communicate with the network they reveal their location to be within the coverage area of the base station antenna that received their transmission. This location data, if it were collected, could be used to derive movement information for most of the population. Such information does not currently exist. The thesis begins by investigating what information is available within a mobile phone network during normal operations. It looks at how difficult it is to extract this information, how frequently it is generated, and the spatial accuracy when it is used to locate a mobile handset. A new technique is described for estimating the location of a handset within the coverage area of a directional antenna. The theoretical investigation is supplemented by the collection of field data with a GPSequipped smart phone running custom software; by simulating the movement of Australia's mobile phones using census data and a database of base station antenna locations; and by analyzing the mobile phone billing records of an individual who elected to make his data public. Having researched the accuracy and availability of mobile phone location data, the thesis then looks at the feasibility of using it for various applications. These applications include sending alerts to people in the path of a tsunami; predicting the utilization of a new public transport route; tracking the movements of fugitives and missing persons; measuring internal migration within Australia; identifying abnormal population concentrations in real-time; and measuring the population of a region throughout the day/year. Finally, the thesis looks at techniques for visualizing the data. Existing techniques are explored, and a new one is proposed that makes use of clustered velocity vectors. This new approach can display the location, quantity, speed, and direction of large numbers of people at a point in time, and do so efficiently in terms of computational speed. The thesis concludes by summarizing the potential applications of mobile phone location data and suggesting areas of further research

    Disrupting resilient criminal networks through data analysis: The case of Sicilian Mafia

    Get PDF
    Compared to other types of social networks, criminal networks present particularly hard challenges, due to their strong resilience to disruption, which poses severe hurdles to Law-Enforcement Agencies (LEAs). Herein, we borrow methods and tools from Social Network Analysis (SNA) to (i) unveil the structure and organization of Sicilian Mafia gangs, based on two real-world datasets, and (ii) gain insights as to how to efficiently reduce the Largest Connected Component (LCC) of two networks derived from them. Mafia networks have peculiar features in terms of the links distribution and strength, which makes them very different from other social networks, and extremely robust to exogenous perturbations. Analysts also face difficulties in collecting reliable datasets that accurately describe the gangs’ internal structure and their relationships with the external world, which is why earlier studies are largely qualitative, elusive and incomplete. An added value of our work is the generation of two real-world datasets, based on raw data extracted from juridical acts, relating to a Mafia organization that operated in Sicily during the first decade of 2000s. We created two different networks, capturing phone calls and physical meetings, respectively. Our analysis simulated different intervention procedures: (i) arresting one criminal at a time (sequential node removal); and (ii) police raids (node block removal). In both the sequential, and the node block removal intervention procedures, the Betweenness centrality was the most effective strategy in prioritizing the nodes to be removed. For instance, when targeting the top 5% nodes with the largest Betweenness centrality, our simulations suggest a reduction of up to 70% in the size of the LCC. We also identified that, due the peculiar type of interactions in criminal networks (namely, the distribution of the interactions’ frequency), no significant differences exist between weighted and unweighted network analysis. Our work has significant practical applications for perturbing the operations of criminal and terrorist networks

    Dystopian Trademark Revelations

    Get PDF
    Uncovering dystopian technologies is challenging. Nondisclosure agreements, procurement policies, trade secrets, and strategic obfuscation collude to shield the development and deployment of these technologies from public scrutiny until it is too late to combat them with law or policy. But occasionally, exposing dystopian technologies is simple. Corporations choose technology trademarks inspired by dystopian philosophies and novels or similar elements of real life—all warnings that their potential uses are dystopian as well. That pronouncement is not necessarily trumpeted on social media or corporate websites, however. It is revealed in a more surprising place: trademark registrations at the U.S. Patent and Trademark Office (USPTO). To grant registrations, the USPTO demands detailed disclosures about applied-for trademarks. These include the mark itself as well as information about how the applicant will use the mark, forcing corporations to admit their intent for their technologies. But these details do not always provide the full picture. The public can strategically supplement trademark disclosures with knowledge of the dystopian inspiration for the marks to understand corporations’ plans for their products. This Essay uses the marks PALANTIR for big data analytics, PANOPTO for classroom recording systems, and MECHANICAL TURK for on-demand work to illustrate the power of coupling trademark registrations with underlying namesakes to understand technologies’ dystopian implementations. Dystopian trademarks signal dystopian technologies, and the public is well-positioned to seek them out and develop strategies to combat their entrenchment
    • 

    corecore