Title :
Identifying a Criminal´s Network of Trust
Author :
Magalingam, Pritheega ; Rao, Asha ; Davis, Stephen
Author_Institution :
Sch. of Math. & Geospatial Sci., RMIT Univ., Melbourne, VIC, Australia
Abstract :
Tracing criminal ties and mining evidence from a large network to begin a crime case analysis has been difficult for criminal investigators due to large numbers of nodes and their complex relationships. In this paper, trust networks using blind carbon copy (BCC) emails were formed. We show that our new shortest paths network search algorithm combining shortest paths and network centrality measures can isolate and identify criminals´ connections within a trust network. A group of BCC emails out of 1,887,305 Enron email transactions were isolated for this purpose. The algorithm uses two central nodes, most influential and middle man, to extract a shortest paths trust network.
Keywords :
search problems; social networking (online); trusted computing; BCC emails; Enron email transactions; blind carbon copy emails; criminal connection identification; criminal network identification; network centrality measures; shortest paths network search algorithm; trust networks; Algorithm design and analysis; Arrays; Blogs; Business; Electronic mail; Joining processes; Social network services; Shortest path; ego network; middle man (MM); most influential (MI); trust;
Conference_Titel :
Signal-Image Technology and Internet-Based Systems (SITIS), 2014 Tenth International Conference on
DOI :
10.1109/SITIS.2014.64