Advertisement

Detecting suspicious entities in Offshore Leaks networks

  • Mikel Joaristi
  • Edoardo SerraEmail author
  • Francesca Spezzano
Original Article
  • 60 Downloads

Abstract

The ICIJ Offshore Leaks Database represents a large set of relationships between people, companies, and organizations involved in the creation of offshore companies in tax-heaven territories, mainly for hiding their assets. This data are organized into four networks of entities and their interactions: Panama Papers, Paradise Papers, Offshore Leaks, and Bahamas Leaks. For instance, the entities involved in the Panama Papers networks are people or companies that had affairs with the Panamanian offshore law firm Mossack Fonseca, often with the purpose of laundering money. In this paper, we address the problem of searching the ICIJ Offshore Leaks Database for people and companies that may be involved in illegal acts. We use a collection of international blacklists of sanctioned people and organizations as ground truth for bad entities. We propose a new ranking algorithm, named Suspiciousness Rank Back and Forth (SRBF), that, given one of the networks in the ICIJ Offshore Leaks Database, leverages the network structure and the blacklist ground truth to assign a degree of suspiciousness to each entity in the network. We experimentally show that our algorithm outperforms existing techniques for node classification achieving area under the ROC curve ranging from 0.69 to 0.85 and an area under the recall curve ranging from 0.70 to 0.84 on three of the four considered networks. Moreover, our algorithm retrieves bad entities earlier in the rank than competitors. Further, we show the effectiveness of SRBF on a case study on the Panama Papers network.

Notes

Acknowledgements

Part of this work was supported by Army Research Office under the Grant W911NF-19-1-0438.

References

  1. Andrews IA, Kumar S, Spezzano F, Subrahmanian VS (2015) SPINN: suspicion prediction in nuclear networks. In: 2015 IEEE international conference on intelligence and security informatics, ISI 2015, pp 19–24Google Scholar
  2. Bixler R, Huang B (2018) Sparse-matrix belief propagation. In: Conference on uncertainty in artificial intelligenceGoogle Scholar
  3. Bonacich P (1972) Factoring and weighting approaches to status scores and clique identification. J Math Sociol 2(1):113–120CrossRefGoogle Scholar
  4. Brin S, Page L (1998) The anatomy of a large-scale hypertextual web search engine. Comput Netw ISDN Syst 30(1):107–117CrossRefGoogle Scholar
  5. Callahan D, Shakarian P, Nielsen J, Johnson AN (2012) Shaping operations to attack robust terror networks. In: 2012 international conference on social informatics (SocialInformatics), pp 13–18Google Scholar
  6. Economist T (2016). http://econ.st/2xoqggR
  7. Freeman LC (1977) A set of measures of centrality based on betweenness. Sociometry 40:35–41CrossRefGoogle Scholar
  8. Freeman LC (1978) Centrality in social networks conceptual clarification. Soc Netw 1(3):215–239CrossRefGoogle Scholar
  9. Goyal P, Ferrara E (2017) Graph embedding techniques, applications, and performance: a survey. IEEE Trans Pattern Anal Mach Intell 151:78–94Google Scholar
  10. Grover A, Leskovec J (2016) node2vec: Scalable feature learning for networks. In: Proceedings of the 22nd ACM SIGKDD international conference on knowledge discovery and data mining, pp 855–864Google Scholar
  11. Investigative Journalists IC (2019). https://offshoreleaks.icij.org/pages/about
  12. IC of Investigative Journalists (2019) Offshore leaks database. https://offshoreleaks.icij.org/pages/database
  13. Joaristi M, Serra E, Spezzano F (2018) Inferring bad entities through the panama papers network. In: IEEE/ACM 2018 international conference on advances in social networks analysis and mining, ASONAM 2018, Barcelona, Spain, August 28–31, 2018, pp 767–773Google Scholar
  14. Kindermann R (1980) Markov random fields and their applications. American Mathematical Society, New YorkCrossRefGoogle Scholar
  15. Lindelauf R, Borm P, Hamers H (2009) The influence of secrecy on the communication structure of covert networks. Soc Netw 31(2):126–137CrossRefGoogle Scholar
  16. Memon N, Larsen HL (2006) Practical algorithms for destabilizing terrorist networks. IEEE international conference on intelligence and security informatics, ISI 2006, pp 389–400Google Scholar
  17. Ovelgönne M, Kang C, Sawant A, Subrahmanian VS (2012) Covertness centrality in networks. In: International conference on advances in social networks analysis and mining, ASONAM 2012, pp 863–870Google Scholar
  18. Petersen RR, Rhodes CJ, Wiil UK (2011) Node removal in criminal networks. In: European intelligence and security informatics conference, EISIC 2011, pp 360–365Google Scholar
  19. Rabab’ah A, Al-Ayyoub M, Shehab MA, Jararweh Y, Jansen, BJ (2016) Using the panama papers to explore the financial networks of the middle east. In: 11th international conference for internet technology and secured transactions, ICITST 2016, pp 92–97Google Scholar
  20. Ribeiro LF, Saverese PH, Figueiredo DR (2017) struc2vec: Learning node representations from structural identity. In: Proceedings of the 23rd ACM sigkdd international conference on knowledge discovery and data mining, ACM, pp 385–394Google Scholar
  21. Serra E, Subrahmanian VS (2014) Behavior informatics: a new perspective– should behavioral models of terror groups be disclosed? IEEE Intell Syst 29(4):62–80CrossRefGoogle Scholar
  22. Serra E, Subrahmanian VS (2014) A survey of quantitative models of terror group behavior and an analysis of strategic disclosure of behavioral models. IEEE Trans Comput Soc Syst 1(1):66–88CrossRefGoogle Scholar
  23. Skillicorn DB (2011) Computational approaches to suspicion in adversarial settings. Inf Syst Front 13(1):21–31CrossRefGoogle Scholar
  24. Skillicorn DB, Spezzano F, Subrahmanian VS, Garber M (2014) Understanding south asian violent extremist group-group interactions. In: 2014 IEEE/ACM international conference on advances in social networks analysis and mining, ASONAM 2014, pp 687–694Google Scholar
  25. Spezzano F, Subrahmanian V, Mannes A (2014) Reshaping terrorist networks. Commun ACM 57(8):60–69CrossRefGoogle Scholar
  26. Spezzano F, Subrahmanian VS, Mannes A (2013) STONE: shaping terrorist organizational network efficiency. In: Advances in social networks analysis and mining 2013, ASONAM 2013, pp 348–355Google Scholar
  27. Swissinfo.ch (2016). http://bit.ly/2X4HB7c
  28. Watts DJ, Strogatz SH (1998) Collective dynamics of’small-world’networks. Nature 393(6684):440CrossRefGoogle Scholar
  29. Wikipedia. Parmalat (2019). https://en.wikipedia.org/wiki/Parmalat
  30. Yedidia JS, Freeman WT, Weiss Y (2003) Understanding belief propagation and its generalizations. Explor Artif Intell New Millenn 8:236–239Google Scholar
  31. Zheng Q, Skillicorn D (2017) Social networks with rich edge semantics. CRC Press, Boca RatonCrossRefGoogle Scholar

Copyright information

© Springer-Verlag GmbH Austria, part of Springer Nature 2019

Authors and Affiliations

  • Mikel Joaristi
    • 1
  • Edoardo Serra
    • 1
    Email author
  • Francesca Spezzano
    • 1
  1. 1.Computer Science DepartmentBoise State UniversityBoiseUSA

Personalised recommendations