Abstract
The ICIJ Offshore Leaks Database represents a large set of relationships between people, companies, and organizations involved in the creation of offshore companies in tax-heaven territories, mainly for hiding their assets. This data are organized into four networks of entities and their interactions: Panama Papers, Paradise Papers, Offshore Leaks, and Bahamas Leaks. For instance, the entities involved in the Panama Papers networks are people or companies that had affairs with the Panamanian offshore law firm Mossack Fonseca, often with the purpose of laundering money. In this paper, we address the problem of searching the ICIJ Offshore Leaks Database for people and companies that may be involved in illegal acts. We use a collection of international blacklists of sanctioned people and organizations as ground truth for bad entities. We propose a new ranking algorithm, named Suspiciousness Rank Back and Forth (SRBF), that, given one of the networks in the ICIJ Offshore Leaks Database, leverages the network structure and the blacklist ground truth to assign a degree of suspiciousness to each entity in the network. We experimentally show that our algorithm outperforms existing techniques for node classification achieving area under the ROC curve ranging from 0.69 to 0.85 and an area under the recall curve ranging from 0.70 to 0.84 on three of the four considered networks. Moreover, our algorithm retrieves bad entities earlier in the rank than competitors. Further, we show the effectiveness of SRBF on a case study on the Panama Papers network.
Similar content being viewed by others
Notes
The information reported in this section is taken from the ICIJ website (Investigative Journalists IC 2019) and Wikipedia.
Parmalat is an Italian leading global company in the production of long-life milk. The company collapsed in 2003 and remains Europe’s biggest bankruptcy (Wikipedia. Parmalat 2019).
References
Andrews IA, Kumar S, Spezzano F, Subrahmanian VS (2015) SPINN: suspicion prediction in nuclear networks. In: 2015 IEEE international conference on intelligence and security informatics, ISI 2015, pp 19–24
Bixler R, Huang B (2018) Sparse-matrix belief propagation. In: Conference on uncertainty in artificial intelligence
Bonacich P (1972) Factoring and weighting approaches to status scores and clique identification. J Math Sociol 2(1):113–120
Brin S, Page L (1998) The anatomy of a large-scale hypertextual web search engine. Comput Netw ISDN Syst 30(1):107–117
Callahan D, Shakarian P, Nielsen J, Johnson AN (2012) Shaping operations to attack robust terror networks. In: 2012 international conference on social informatics (SocialInformatics), pp 13–18
Economist T (2016). http://econ.st/2xoqggR
Freeman LC (1977) A set of measures of centrality based on betweenness. Sociometry 40:35–41
Freeman LC (1978) Centrality in social networks conceptual clarification. Soc Netw 1(3):215–239
Goyal P, Ferrara E (2017) Graph embedding techniques, applications, and performance: a survey. IEEE Trans Pattern Anal Mach Intell 151:78–94
Grover A, Leskovec J (2016) node2vec: Scalable feature learning for networks. In: Proceedings of the 22nd ACM SIGKDD international conference on knowledge discovery and data mining, pp 855–864
Investigative Journalists IC (2019). https://offshoreleaks.icij.org/pages/about
IC of Investigative Journalists (2019) Offshore leaks database. https://offshoreleaks.icij.org/pages/database
Joaristi M, Serra E, Spezzano F (2018) Inferring bad entities through the panama papers network. In: IEEE/ACM 2018 international conference on advances in social networks analysis and mining, ASONAM 2018, Barcelona, Spain, August 28–31, 2018, pp 767–773
Kindermann R (1980) Markov random fields and their applications. American Mathematical Society, New York
Lindelauf R, Borm P, Hamers H (2009) The influence of secrecy on the communication structure of covert networks. Soc Netw 31(2):126–137
Memon N, Larsen HL (2006) Practical algorithms for destabilizing terrorist networks. IEEE international conference on intelligence and security informatics, ISI 2006, pp 389–400
Ovelgönne M, Kang C, Sawant A, Subrahmanian VS (2012) Covertness centrality in networks. In: International conference on advances in social networks analysis and mining, ASONAM 2012, pp 863–870
Petersen RR, Rhodes CJ, Wiil UK (2011) Node removal in criminal networks. In: European intelligence and security informatics conference, EISIC 2011, pp 360–365
Rabab’ah A, Al-Ayyoub M, Shehab MA, Jararweh Y, Jansen, BJ (2016) Using the panama papers to explore the financial networks of the middle east. In: 11th international conference for internet technology and secured transactions, ICITST 2016, pp 92–97
Ribeiro LF, Saverese PH, Figueiredo DR (2017) struc2vec: Learning node representations from structural identity. In: Proceedings of the 23rd ACM sigkdd international conference on knowledge discovery and data mining, ACM, pp 385–394
Serra E, Subrahmanian VS (2014) Behavior informatics: a new perspective– should behavioral models of terror groups be disclosed? IEEE Intell Syst 29(4):62–80
Serra E, Subrahmanian VS (2014) A survey of quantitative models of terror group behavior and an analysis of strategic disclosure of behavioral models. IEEE Trans Comput Soc Syst 1(1):66–88
Skillicorn DB (2011) Computational approaches to suspicion in adversarial settings. Inf Syst Front 13(1):21–31
Skillicorn DB, Spezzano F, Subrahmanian VS, Garber M (2014) Understanding south asian violent extremist group-group interactions. In: 2014 IEEE/ACM international conference on advances in social networks analysis and mining, ASONAM 2014, pp 687–694
Spezzano F, Subrahmanian V, Mannes A (2014) Reshaping terrorist networks. Commun ACM 57(8):60–69
Spezzano F, Subrahmanian VS, Mannes A (2013) STONE: shaping terrorist organizational network efficiency. In: Advances in social networks analysis and mining 2013, ASONAM 2013, pp 348–355
Swissinfo.ch (2016). http://bit.ly/2X4HB7c
Watts DJ, Strogatz SH (1998) Collective dynamics of’small-world’networks. Nature 393(6684):440
Wikipedia. Parmalat (2019). https://en.wikipedia.org/wiki/Parmalat
Yedidia JS, Freeman WT, Weiss Y (2003) Understanding belief propagation and its generalizations. Explor Artif Intell New Millenn 8:236–239
Zheng Q, Skillicorn D (2017) Social networks with rich edge semantics. CRC Press, Boca Raton
Acknowledgements
Part of this work was supported by Army Research Office under the Grant W911NF-19-1-0438.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
This paper is an extended version of the conference paper “Mikel Joaristi, Edoardo Serra, and Francesca Spezzano, Inferring Bad Entities through the Panama Papers Network” In Proceedings of the 2018 International Symposium on Foundations of Open Source Intelligence and Security Informatics (FOSINT-SI) in conjunction with ASONAM 2018, pp. 767–773, Barcelona, Spain, Aug 28–31, 2018 (Joaristi et al. 2018).
Rights and permissions
About this article
Cite this article
Joaristi, M., Serra, E. & Spezzano, F. Detecting suspicious entities in Offshore Leaks networks. Soc. Netw. Anal. Min. 9, 62 (2019). https://doi.org/10.1007/s13278-019-0607-5
Received:
Revised:
Accepted:
Published:
DOI: https://doi.org/10.1007/s13278-019-0607-5