Scanning of Open Data for Detection of Emerging Organized Crime Threats—The ePOOLICE Project
In fighting organized crime, open data provide an important source for both detecting emerging threats, as well as forecasting future threats. This allows the police to plan their resources and capacity for countering the threats in due time to prevent it or at least to mitigate its effects. A vital part of a system supporting the police analysts for this purpose is an efficient and effective system for scanning the open data providing information about the relevant factors in the environment. This chapter presents the ePOOLICE project, aimed at developing a solution, the “ePOOLICE system”, for such a scanning system. Through a prototype demonstrated with use cases, the project provided a proof of concept of an efficient and effective environmental scanning system as part of the early warning system for discovering emerging, as well as likely future, organized crime threats. Main elements in the solution include a central information and knowledge repository; information and knowledge management, including uncertainty management and traceability support; application methodology involving the analyst user in the loop; information fusion; and a comprehensive analysis of legal and ethical issues in deploying such systems. One of the outcomes from the end-user evaluation of the prototype was the desire to integrate internal data to support not only strategic, but also operational analysis and investigation.
KeywordsEnvironmental scanning Organized crime Open data Open-source intelligence Strategic early warning Crime threat detection Crime-relevant factors
Research leading to these results has received funding from the European Union’s Seventh Framework Programme (FP7/2007-2013) under grant agreement n° 312651.
- Andrews, S., Akhgar, B., Yates, S. J., Stedmon, A. W., & Hirsch, L. (2013). Using formal concept analysis to detect and monitor organised crime. In H. L. Larsen et al. (Eds.), Flexible Query Answering Systems (FQAS 2013), LNAI 8132 (pp. 124–133). Berlin, Heidelberg: Springer.Google Scholar
- Brewster, B., Akhgar, B., Staniforth, A., Waddington, D., Andrews, S., Mitchell, S. J., et al. (2014a). Towards a model for the integration of knowledge management in law enforcement agencies. International Journal of Electronic Security and Digital Forensics, 6(1), 1–17. doi: 10.1504/IJESDF.2014.060169
- Brewster, B., Andrews, S., Polovina, S., Hirsch, L., & Akhgar, B. (2014c). Environmental scanning and knowledge representation for the detection of organised crime threats. In Proceedings of Graph-Based Representation and Reasoning, 21st International Conference on Conceptual Structures, ICCS 2014, Iaşi, Romania, July 27–30, 2014, LNAI 8577 (pp. 275–280). doi: 10.1007/978-3-319-08389-6_22
- Brewster, B., Ingle, T., & Rankin, G. (2014b). Crawling open-source data for indicators of human trafficking. In 2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing (pp. 714–719).Google Scholar
- Brewster, B., Polovina, S., Rankin, G., & Andrews, S. (2014d). Knowledge management and human trafficking: Using conceptual knowledge representation, text analytics and open-source data to combat organized crime. ICCS, 104–117. doi: 10.1007/978-3-319-08389-6_10
- Conway, M. (2009). Environmental scanning: What it is, how to do it…. Thinking Futures, 2009. https://socialenterprise.us/wp-content/uploads/2016/03/ES-Guide-April-09.pdf. Accessed October 19, 2016.
- Cavoukian, A. (2011). Privacy by design—The 7 foundational principles. https://www.iab.org/wp-content/IAB-uploads/2011/03/fred_carter.pdf. Accessed October 10, 2016.
- Delgado, M., Martín-Bautista, M. J., Ruiz, M. D., & Sánchez, D. (2013). Detecting anomalous and exceptional behaviour on credit data by means of association rules. In H. L. Larsen et al. (Eds.), Flexible Query Answering Systems (FQAS 2013), LNAI 8132 (pp. 143–154). Berlin, Heidelberg: Springer. doi: 10.1007/978-3-642-40769-7_13
- De Marco, E., et al. (2014). D3.3—Legal recommendations. ePOOLICE report, Document ID: EPO-1408-WP03-001-V1.2-DV-RE. August 29, 2014. Available at https://www.epoolice.eu/. Accessed December 2, 2016.
- De Marco, E., Semmar, N., et al. (2015). D3.4—Final report. ePOOLICE report, Document ID: EPO-1511-WP03-001-DV-RE. November 19, 2015. Available at https://www.epoolice.eu/. Accessed December 2, 2016.
- EUROPOL. (2013). SOCTA 2013—EU serious organized crime threat assessment. Available from https://www.europol.europa.eu/content/eu-serious-and-organised-crime-threat-assessment-socta. Accessed October 10, 2016.
- EUROPOL. (2015). Exploring tomorrows organised crime. European Police Office, 2015. https://www.europol.europa.eu/sites/default/files/Europol_OrgCrimeReport_web-final.pdf. Accessed October 10, 2016.
- FQAS. (2013). Proceedings of 10th International Conference on Flexible Query Answering Systems (FQAS 2013) (Larsen et al., Eds.). Conference website: http://idbis.ugr.es/fqas2013/. Accessed October 10, 2016.
- Gerdes, A. (2014). A privacy preserving design framework in relation to an environmental scanning system for fighting organized crime. Presented at the 11th IFIP TC9 Human Choice and Computers Conference—HCC 11, July 30th–August 1st, 2014, Turku Finland, ICT and Society. Published in: ICT and Society, IFIP Advances in Information and Communication Technology (Vol. 431, pp. 226–238). doi: 10.1007/978-3-662-44208-1_19
- Gerdes, A. (2015a). State of the art—An ongoing EU research project: Security technology facilitating LEAS long term strategic decision making: ePOOLICE. In Workshop on Technology Led Policing—Balancing Crime Fighting and Citizens’ Privacy, January 14–16, 2015, at Council for scientific and industrial research (CSIR), Pretoria, South Africa. Google Scholar
- Gerdes, A. (2015b). ePOOLICE security technology: Fighting organized crime whilst balancing privacy and national security. In 10th International Conference on Cyber Warfare and Security ICCWS-2015, South Africa, March 24–25 (pp. 102–107).Google Scholar
- Gerdes, A., Larsen, H. L., & Rouces, J. (2013). Issues of security and informational privacy in relation to an environmental scanning system for fighting organized crime. In H. L. Larsen et al. (Eds.), Flexible Query Answering Systems (FQAS 2013), LNAI 8132 (pp. 155–163). Berlin, Heidelberg: Springer. doi: 10.1007/978-3-642-40769-7_14
- Gilad, B. (2003). Early Warning—Using Competitive Intelligence to Anticipate Market Shifts, Control Risk, and Create Powerful Strategies (AMACOM, 2003).Google Scholar
- Graettinger, C. P., Garcia, S., Mel, C., Peter, S., Rdec, C., Siviy, J., et al. (2002). Using the Technology Readiness Levels Scale to Support Technology Management in the DoD’s ATD/STO Environments. SPECIAL REPORT, CMU/SEI-2002-SR-027.Google Scholar
- Larsen, H. L., Martin-Bautista, M. J., Vila, M. A., Andreasen, T., & Christiansen, H. (Eds.). (2013). Flexible query answering systems (FQAS 2013). In Proceeding from the 10th International Conference, Granada, Spain, September 18–20, 2013, LNAI 8132. Berlin, Heidelberg: Springer (With Special Session devoted to ePOOLICE: Environmental scanning for strategic early warning). doi: 10.1007/978-3-642-40769-7
- Ortiz-Arroyo, D. (2013). Analysis of semantic networks using complex networks concepts. In H. L. Larsen et al. (Eds.), Flexible Query Answering Systems (FQAS 2013), LNAI 8132 (pp. 134–142). Berlin, Heidelberg: Springer.Google Scholar
- Rouces, J., Melo, G. D., & Hose, K. (2015a). FrameBase: Representing N-Ary relations using semantic frames. In 12th Extended Semantic Web Conference (ESWC 2015). doi: 10.1007/978-3-319-18818-8_31
- Rouces, J., Melo, G. D., & Hose, K. (2015b). Integrating heterogeneous knowledge with framebase. Semantic Web–Interoperability, Usability, Applicability an IOS Press Journal. http://www.semantic-web-journal.net/system/files/swj1239.pdf. Accessed October 19, 2016.
- Rouces, J., Melo, G. D., & Hose, K. (2015c). Representing specialized events with FrameBase. In 4th International Workshop on Detection, Representation, and Exploitation of Events in the Semantic Web (DeRiVE 2015) (pp. 58–69).Google Scholar
- Ruiz, M. D., Gómez-Romero, J., Martín-Bautista, M. J., Sánchez, D., & Delgado, M. (2014b). Meta-association rules for fusing regular association rules from different databases. FUSION 2014.Google Scholar
- Ruiz, M. D., Gómez-Romero, J., Martín-Bautista, M. J., Sánchez, D., & Delgado, M. (2015a). Fuzzy meta-association rules for information fusion. FUSION 2015.Google Scholar
- Ruiz, M. D., Gómez-Romero, J., Martín-Bautista, M. J., Sánchez, D., Vila, M. A., & Delgado, M. (2015b). Fuzzy meta-association rules. IFSA-EUSFLAT.Google Scholar
- Ruiz, M. D., Martín-Bautista, M. J., Sánchez, D., & Delgado, M. (2015c). Discovering fuzzy exception and anomalous rules. International Journal of IEEE Transactions on Fuzzy Systems, 24(4), 930–944. doi: 10.1109/TFUZZ.2015.2489240
- Ruiz, M. D., Martín-Bautista, M. J., Sánchez, D., Vila, M. A., & Delgado, M. (2014a). Anomaly detection using fuzzy association rules. International Journal of Electronic Security and Digital Forensics, 6(1), 25–37. doi: 10.1504/IJESDF.2014.060171
- Semmar, N., Zennaki, O., & Laib, M. (2014). Using cross-language information retrieval and statistical language modelling in example-based machine translation. In 36th Conference on Translating and the Computer (pp. 36–44). http://www.tradulex.com/varia/TC36-london2014.pdf#page=37. Accessed October 19, 2016.
- Semmar, N., Zennaki, O., & Laib, M. (2015). Evaluating the impact of using a domain-specific bilingual lexicon on the performance of a hybrid machine translation approach. In Proceedings of Recent Advances in Natural Language Processing, Hissar, Bulgaria. https://www.aclweb.org/anthology/R/R15/R15-1075.pdf. Accessed October 19, 2016.
- Valls-Prieto, J. (2013). Legal and ethical problems linked to the processing of personal data for the purposes of prevention, investigation, detection or prosecution of criminal offences, Detection or prosecution of criminal offence. In ITC Law 2013 (pp. 67–75). Department of Technology and Law, Porto University.Google Scholar
- Valls-Prieto, J. (2014). Fighting cybercrime and protecting privacy: DDoS, spy software, and online attacks. In Handbook of research on digital crime, cyberspace security, and information assurance (pp. 146–155). doi: 10.4018/978-1-4666-6324-4.ch010
- Wang, W., Besançon, R., Ferret, O., & Grau, B. (2014). Semantic clustering of relations between named entities. In: Advances in natural language processing, 8686. doi: 10.1007/978-3-319-10888-9_36
- Wille, R. (2005). Formal concept analysis as mathematical theory of concepts and concept hierarchies. In B. Ganter et al. (Eds.), Formal Concept Analysis, LNAI 3626 (pp. 1–33). Berlin, Heidelberg: Springer.Google Scholar