Skip to main content
Log in

Detecting suspicious entities in Offshore Leaks networks

  • Original Article
  • Published:
Social Network Analysis and Mining Aims and scope Submit manuscript

Abstract

The ICIJ Offshore Leaks Database represents a large set of relationships between people, companies, and organizations involved in the creation of offshore companies in tax-heaven territories, mainly for hiding their assets. This data are organized into four networks of entities and their interactions: Panama Papers, Paradise Papers, Offshore Leaks, and Bahamas Leaks. For instance, the entities involved in the Panama Papers networks are people or companies that had affairs with the Panamanian offshore law firm Mossack Fonseca, often with the purpose of laundering money. In this paper, we address the problem of searching the ICIJ Offshore Leaks Database for people and companies that may be involved in illegal acts. We use a collection of international blacklists of sanctioned people and organizations as ground truth for bad entities. We propose a new ranking algorithm, named Suspiciousness Rank Back and Forth (SRBF), that, given one of the networks in the ICIJ Offshore Leaks Database, leverages the network structure and the blacklist ground truth to assign a degree of suspiciousness to each entity in the network. We experimentally show that our algorithm outperforms existing techniques for node classification achieving area under the ROC curve ranging from 0.69 to 0.85 and an area under the recall curve ranging from 0.70 to 0.84 on three of the four considered networks. Moreover, our algorithm retrieves bad entities earlier in the rank than competitors. Further, we show the effectiveness of SRBF on a case study on the Panama Papers network.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

Notes

  1. The information reported in this section is taken from the ICIJ website (Investigative Journalists IC 2019) and Wikipedia.

  2. http://www.opensanctions.org/#downloads.

  3. We chose the PageRank as it is the best performing centrality measure (cf. Tables 6, 7).

  4. Parmalat is an Italian leading global company in the production of long-life milk. The company collapsed in 2003 and remains Europe’s biggest bankruptcy (Wikipedia. Parmalat 2019).

References

  • Andrews IA, Kumar S, Spezzano F, Subrahmanian VS (2015) SPINN: suspicion prediction in nuclear networks. In: 2015 IEEE international conference on intelligence and security informatics, ISI 2015, pp 19–24

  • Bixler R, Huang B (2018) Sparse-matrix belief propagation. In: Conference on uncertainty in artificial intelligence

  • Bonacich P (1972) Factoring and weighting approaches to status scores and clique identification. J Math Sociol 2(1):113–120

    Article  Google Scholar 

  • Brin S, Page L (1998) The anatomy of a large-scale hypertextual web search engine. Comput Netw ISDN Syst 30(1):107–117

    Article  Google Scholar 

  • Callahan D, Shakarian P, Nielsen J, Johnson AN (2012) Shaping operations to attack robust terror networks. In: 2012 international conference on social informatics (SocialInformatics), pp 13–18

  • Economist T (2016). http://econ.st/2xoqggR

  • Freeman LC (1977) A set of measures of centrality based on betweenness. Sociometry 40:35–41

    Article  Google Scholar 

  • Freeman LC (1978) Centrality in social networks conceptual clarification. Soc Netw 1(3):215–239

    Article  Google Scholar 

  • Goyal P, Ferrara E (2017) Graph embedding techniques, applications, and performance: a survey. IEEE Trans Pattern Anal Mach Intell 151:78–94

    Google Scholar 

  • Grover A, Leskovec J (2016) node2vec: Scalable feature learning for networks. In: Proceedings of the 22nd ACM SIGKDD international conference on knowledge discovery and data mining, pp 855–864

  • Investigative Journalists IC (2019). https://offshoreleaks.icij.org/pages/about

  • IC of Investigative Journalists (2019) Offshore leaks database. https://offshoreleaks.icij.org/pages/database

  • Joaristi M, Serra E, Spezzano F (2018) Inferring bad entities through the panama papers network. In: IEEE/ACM 2018 international conference on advances in social networks analysis and mining, ASONAM 2018, Barcelona, Spain, August 28–31, 2018, pp 767–773

  • Kindermann R (1980) Markov random fields and their applications. American Mathematical Society, New York

    Book  Google Scholar 

  • Lindelauf R, Borm P, Hamers H (2009) The influence of secrecy on the communication structure of covert networks. Soc Netw 31(2):126–137

    Article  Google Scholar 

  • Memon N, Larsen HL (2006) Practical algorithms for destabilizing terrorist networks. IEEE international conference on intelligence and security informatics, ISI 2006, pp 389–400

  • Ovelgönne M, Kang C, Sawant A, Subrahmanian VS (2012) Covertness centrality in networks. In: International conference on advances in social networks analysis and mining, ASONAM 2012, pp 863–870

  • Petersen RR, Rhodes CJ, Wiil UK (2011) Node removal in criminal networks. In: European intelligence and security informatics conference, EISIC 2011, pp 360–365

  • Rabab’ah A, Al-Ayyoub M, Shehab MA, Jararweh Y, Jansen, BJ (2016) Using the panama papers to explore the financial networks of the middle east. In: 11th international conference for internet technology and secured transactions, ICITST 2016, pp 92–97

  • Ribeiro LF, Saverese PH, Figueiredo DR (2017) struc2vec: Learning node representations from structural identity. In: Proceedings of the 23rd ACM sigkdd international conference on knowledge discovery and data mining, ACM, pp 385–394

  • Serra E, Subrahmanian VS (2014) Behavior informatics: a new perspective– should behavioral models of terror groups be disclosed? IEEE Intell Syst 29(4):62–80

    Article  Google Scholar 

  • Serra E, Subrahmanian VS (2014) A survey of quantitative models of terror group behavior and an analysis of strategic disclosure of behavioral models. IEEE Trans Comput Soc Syst 1(1):66–88

    Article  Google Scholar 

  • Skillicorn DB (2011) Computational approaches to suspicion in adversarial settings. Inf Syst Front 13(1):21–31

    Article  Google Scholar 

  • Skillicorn DB, Spezzano F, Subrahmanian VS, Garber M (2014) Understanding south asian violent extremist group-group interactions. In: 2014 IEEE/ACM international conference on advances in social networks analysis and mining, ASONAM 2014, pp 687–694

  • Spezzano F, Subrahmanian V, Mannes A (2014) Reshaping terrorist networks. Commun ACM 57(8):60–69

    Article  Google Scholar 

  • Spezzano F, Subrahmanian VS, Mannes A (2013) STONE: shaping terrorist organizational network efficiency. In: Advances in social networks analysis and mining 2013, ASONAM 2013, pp 348–355

  • Swissinfo.ch (2016). http://bit.ly/2X4HB7c

  • Watts DJ, Strogatz SH (1998) Collective dynamics of’small-world’networks. Nature 393(6684):440

    Article  Google Scholar 

  • Wikipedia. Parmalat (2019). https://en.wikipedia.org/wiki/Parmalat

  • Yedidia JS, Freeman WT, Weiss Y (2003) Understanding belief propagation and its generalizations. Explor Artif Intell New Millenn 8:236–239

    Google Scholar 

  • Zheng Q, Skillicorn D (2017) Social networks with rich edge semantics. CRC Press, Boca Raton

    Book  Google Scholar 

Download references

Acknowledgements

Part of this work was supported by Army Research Office under the Grant W911NF-19-1-0438.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Edoardo Serra.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This paper is an extended version of the conference paper “Mikel Joaristi, Edoardo Serra, and Francesca Spezzano, Inferring Bad Entities through the Panama Papers Network” In Proceedings of the 2018 International Symposium on Foundations of Open Source Intelligence and Security Informatics (FOSINT-SI) in conjunction with ASONAM 2018, pp. 767–773, Barcelona, Spain, Aug 28–31, 2018 (Joaristi et al. 2018).

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Joaristi, M., Serra, E. & Spezzano, F. Detecting suspicious entities in Offshore Leaks networks. Soc. Netw. Anal. Min. 9, 62 (2019). https://doi.org/10.1007/s13278-019-0607-5

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s13278-019-0607-5

Navigation