Skip to main content

Advertisement

Log in

By investigation, I mean computation

A framework to investigate the societal dimension of crime

  • Published:
Trends in Organized Crime Aims and scope Submit manuscript

Abstract

The computational analysis of the societal dimension of crime has aroused an increasing interest in recent years. Data mining, social network analysis (SNA), and visualization techniques are offering promising opportunities to the scientific and investigative study of criminal organizations. In spite of that, the spread of technological innovation faces serious difficulties due to the concurrence of different factors: the absence of user friendly crime analysis tools, the lack of technical skills of investigators (public prosecutors, police officers), two factors that, when combined with the pressure of daily routine, often result into a resistance to change. In this work we present an ongoing research project aiming to foster the potentialities of SNA and computation into criminal investigation. We define an holistic methodology that combines document-enhancement, social network analysis, and visualization techniques to support public prosecutors and criminal investigation departments in exploring the societal dimension of criminal groups. This approach has been deployed in a computational framework, CrimeMiner, validated with a case study based on data coming from real criminal investigations.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

Notes

  1. https://angular.io/

  2. https://github.com/Linkurious/linkurious.js

  3. Italian Supreme Court of Cassation, 1st Criminal Division, Judgement n.13967/2016 of 05 May 2015, available online at http://www.italgiure.giustizia.it/sncass/

References

  • Blondel VD, Guillaume JL, Lambiotte R, Lefebvre E (2008) Fast unfolding of communities in large networks. J Stat Mech: Theory Exp 2008(10):P10,008

    Article  Google Scholar 

  • Byrne J, Marx G (2011) Technological innovations in crime prevention and policing. a review of the research on implementation and impact. J Police Stud 20 (3):17–40

    Google Scholar 

  • Chan JB (2001) The technological game: How information technology is transforming police practice. Criminol Crim Just 1(2):139–159

    Article  Google Scholar 

  • De Pauw E, Ponsaers P, Bruggeman W, Deelman P, Van Der Vijver K (2011) Technology-led policing, Journal of Police Studies, vol. 20 Maklu

  • Dècary-Hètu D (2012) Dupont: The Social Network of Hackers. Glob Crime 13(3):160–175

    Article  Google Scholar 

  • Didimo W, Liotta G, Montecchiani F (2014) Network visualization for financial crime detection. J Vis Lang Comput 25(4):433–451

    Article  Google Scholar 

  • Easley D, Kleinberg J (2010) Networks, crowds, and markets: Reasoning about a highly connected world. Cambridge University Press, Cambridge

    Book  Google Scholar 

  • Ferrara E, Meo PD, Catanese S, Fiumara G (2014) Detecting criminal organizations in mobile phone networks. Expert Syst Appl 41(13):5733–5750

    Article  Google Scholar 

  • Freeman LC (1979) Centrality in social networks conceptual clarification. Soc Networks 1(3):215–239

    Article  Google Scholar 

  • Haynie DL (2001) Delinquent peers revisited: Does network structure matter? 1. Am J Sociol 106(4):1013–1057

    Article  Google Scholar 

  • Hutchins CE, Benham-Hutchins M (2010) Hiding in Plain Sight: Criminal Network Analysis. Comput Math Organ Theory 16(1):89–111

    Article  Google Scholar 

  • Johnson JA (2010) To catch a curious clicker a social network analysis of the online pornography industry, in Everyday Pornography Routledge

  • Keim DA, Mansmann F, Schneidewind J, Thomas J, Ziegler H (2008) Visual analytics: Scope and challenges Springer

  • Keim ED, Kohlhammer J, Ellis G (2010) Mastering the information age: Solving problems with visual analytics eurographics association

  • Kohlhammer J, Keim D, Pohl M, Santucci G, Andrienko G (2011) Solving Problems with Visual Analytics. Procedia Comput Sci 7:117–120. Proceedings of the 2nd European Future Technologies Conference and Exhibition 2011 (FET 11)

    Article  Google Scholar 

  • Krebs V (2002) Mapping Networks of Terrorist Cells. Connections 24(3):43–52

    Google Scholar 

  • von Lampe K (2006) The interdisciplinary dimensions of the study of organized crime. Trends in Organized Crime 9(3):77–95

    Article  Google Scholar 

  • Lettieri N, Malandrino D, Spinelli R (2013) Text and Social Network Analysis As Investigative Tools: A Case Study. In: Nicola L., Sebastiano F. (eds) Law and Computational Social Science. ESI

  • Lettieri N, Malandrino D, Vicidomini L (2014) Document-enhancement and network analysis for criminal investigation: an holistic approach. In: Nicola L., Winkels R. (eds) Law and Computational Social Science. ESI. http://www.leibnizcenter.org/~winkels/NAiL2014-pre-proceedings.pdf

  • Lu Y, Luo X, Polgar M, Cao Y (2010) Social network analysis of a criminal hacker community. J Comput Inf Syst 51(2):31

    Google Scholar 

  • Memon N, Larsen HL (2006) Practical algorithms for destabilizing terrorist networks. In: Proceedings of the 4th IEEE International Conference on Intelligence and Security Informatics, ISI’06. Springer, Berlin, pp 389–400

  • Morselli C (2009) Inside Criminal Networks Studies of Organized Crime

  • Patacchini E, Zenou Y (2008) The strength of weak ties in crime. Eur Econ Rev 52(2):209–236. doi:10.1016/j.euroecorev.2007.09.002, http://www.sciencedirect.com/science/article/pii/S0014292107001274

    Article  Google Scholar 

  • Reichert K (2001) Use of information technology by law enforcement Promising Approaches to Addressing Crime Series

  • Richard R (2002) From Whole Cloth: Making up the terrorist network. Connections 24(3):36–42

    Google Scholar 

  • Schroeder J, Xu J, Chen H (2003) Crimelink explorer: Using domain knowledge to facilitate automated crime association analysis. In: Intelligence and Security Informatics. Springer, pp 168– 180

  • Sykes G (1992) Stability amid change. In: Police Management: Issues and Perspectives. Washington: Police Executive Research Forum

  • Thomas S (2001) Six degrees of mohamed atta

  • Wong PC, Thomas J (2004) Visual analytics. IEEE Comput Graph Appl 24(5):20–21. doi:10.1109/MCG.2004.39

    Article  Google Scholar 

  • Xu J, Chen H (2005) Criminal Network Analysis and Visualization. Commun. ACM 48(6):100–107

    Article  Google Scholar 

  • Xu JJ, Chen H (2005) Crimenet explorer: A framework for criminal network knowledge discovery. ACM Trans Inf Syst 23(2):201–226

    Article  Google Scholar 

  • Zhang J (2008) Visualization for Information Retrieval (The Information Retrieval Series), 1 edn

  • Ziegler H, Nietzschmann T, Keim DA (2008) Visual analytics on the financial market: Pixel-based analysis and comparison of long-term investments. In: Information Visualisation, 2008. IV’08. 12th International Conference, pp 287–295

Download references

Acknowledgments

We would like to thank for their useful contribution, suggestions and comments: Dr. Attilio Scaglione from the University of Palermo and Dr. Luigi Landolfi, deputy prosecutor of the Antimafia District Department of Naples. We would also thank Claudia Coscia, Francesco Orciuoli, and Raffaele Costantino for their support in the analysis phase.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nicola Lettieri.

Ethics declarations

Conflict of interests

Authors declare that they have no conflict of interest. This article does not contain any studies with human participants or animals performed by any of the authors.

Additional information

The autorship of the work here presented can be attributed as follows: Nicola Lettieri: concept and functional design of CrimeMiner; legal, Computational social science and Legal informatics profiles of the research. Delfina Malandrino and Luca Vicidomini: system design, computer science profiles. The case study is the result of a joint effort of the authors.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Lettieri, N., Malandrino, D. & Vicidomini, L. By investigation, I mean computation. Trends Organ Crim 20, 31–54 (2017). https://doi.org/10.1007/s12117-016-9284-1

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12117-016-9284-1

Keywords

Navigation