• DocumentCode
    3585328
  • Title

    Identifying a Criminal´s Network of Trust

  • Author

    Magalingam, Pritheega ; Rao, Asha ; Davis, Stephen

  • Author_Institution
    Sch. of Math. & Geospatial Sci., RMIT Univ., Melbourne, VIC, Australia
  • fYear
    2014
  • Firstpage
    309
  • Lastpage
    316
  • Abstract
    Tracing criminal ties and mining evidence from a large network to begin a crime case analysis has been difficult for criminal investigators due to large numbers of nodes and their complex relationships. In this paper, trust networks using blind carbon copy (BCC) emails were formed. We show that our new shortest paths network search algorithm combining shortest paths and network centrality measures can isolate and identify criminals´ connections within a trust network. A group of BCC emails out of 1,887,305 Enron email transactions were isolated for this purpose. The algorithm uses two central nodes, most influential and middle man, to extract a shortest paths trust network.
  • Keywords
    search problems; social networking (online); trusted computing; BCC emails; Enron email transactions; blind carbon copy emails; criminal connection identification; criminal network identification; network centrality measures; shortest paths network search algorithm; trust networks; Algorithm design and analysis; Arrays; Blogs; Business; Electronic mail; Joining processes; Social network services; Shortest path; ego network; middle man (MM); most influential (MI); trust;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Signal-Image Technology and Internet-Based Systems (SITIS), 2014 Tenth International Conference on
  • Type

    conf

  • DOI
    10.1109/SITIS.2014.64
  • Filename
    7081564