DocumentCode
3585328
Title
Identifying a Criminal´s Network of Trust
Author
Magalingam, Pritheega ; Rao, Asha ; Davis, Stephen
Author_Institution
Sch. of Math. & Geospatial Sci., RMIT Univ., Melbourne, VIC, Australia
fYear
2014
Firstpage
309
Lastpage
316
Abstract
Tracing criminal ties and mining evidence from a large network to begin a crime case analysis has been difficult for criminal investigators due to large numbers of nodes and their complex relationships. In this paper, trust networks using blind carbon copy (BCC) emails were formed. We show that our new shortest paths network search algorithm combining shortest paths and network centrality measures can isolate and identify criminals´ connections within a trust network. A group of BCC emails out of 1,887,305 Enron email transactions were isolated for this purpose. The algorithm uses two central nodes, most influential and middle man, to extract a shortest paths trust network.
Keywords
search problems; social networking (online); trusted computing; BCC emails; Enron email transactions; blind carbon copy emails; criminal connection identification; criminal network identification; network centrality measures; shortest paths network search algorithm; trust networks; Algorithm design and analysis; Arrays; Blogs; Business; Electronic mail; Joining processes; Social network services; Shortest path; ego network; middle man (MM); most influential (MI); trust;
fLanguage
English
Publisher
ieee
Conference_Titel
Signal-Image Technology and Internet-Based Systems (SITIS), 2014 Tenth International Conference on
Type
conf
DOI
10.1109/SITIS.2014.64
Filename
7081564
Link To Document