Constructing and analyzing criminal networks

Hamed Sarvari, Ehab Abozinadah, Alex Mbaziira, Damon McCoy

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Abstract

    Analysis of criminal social graph structures can enable us to gain valuable insights into how these communities are organized. Such as, how large scale and centralized these criminal communities are currently? While these types of analysis have been completed in the past, we wanted to explore how to construct a large scale social graph from a smaller set of leaked data that included only the criminal's email addresses. We begin our analysis by constructing a 43 thousand node social graph from one thousand publicly leaked criminals' email addresses. This is done by locating Facebook profiles that are linked to these same email addresses and scraping the public social graph from these profiles. We then perform a large scale analysis of this social graph to identify profiles of high rank criminals, criminal organizations and large scale communities of criminals. Finally, we perform a manual analysis of these profiles that results in the identification of many criminally focused public groups on Facebook. This analysis demonstrates the amount of information that can be gathered by using limited data leaks.

    Original languageEnglish (US)
    Title of host publicationProceedings - 2014 IEEE Security and Privacy Workshops, SPW 2014
    PublisherInstitute of Electrical and Electronics Engineers Inc.
    Pages84-91
    Number of pages8
    Volume2014-January
    ISBN (Print)9781479951031
    DOIs
    StatePublished - Nov 13 2014
    Event2014 IEEE Computer Society's Security and Privacy Workshops, SPW 2014 - San Jose, United States
    Duration: May 17 2014May 18 2014

    Other

    Other2014 IEEE Computer Society's Security and Privacy Workshops, SPW 2014
    CountryUnited States
    CitySan Jose
    Period5/17/145/18/14

    Fingerprint

    Electronic mail

    Keywords

    • Analysis
    • Community detection
    • Criminal networks
    • Cybercrime
    • Social graph

    ASJC Scopus subject areas

    • Safety, Risk, Reliability and Quality
    • Software
    • Computer Networks and Communications

    Cite this

    Sarvari, H., Abozinadah, E., Mbaziira, A., & McCoy, D. (2014). Constructing and analyzing criminal networks. In Proceedings - 2014 IEEE Security and Privacy Workshops, SPW 2014 (Vol. 2014-January, pp. 84-91). [6957290] Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/SPW.2014.22

    Constructing and analyzing criminal networks. / Sarvari, Hamed; Abozinadah, Ehab; Mbaziira, Alex; McCoy, Damon.

    Proceedings - 2014 IEEE Security and Privacy Workshops, SPW 2014. Vol. 2014-January Institute of Electrical and Electronics Engineers Inc., 2014. p. 84-91 6957290.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Sarvari, H, Abozinadah, E, Mbaziira, A & McCoy, D 2014, Constructing and analyzing criminal networks. in Proceedings - 2014 IEEE Security and Privacy Workshops, SPW 2014. vol. 2014-January, 6957290, Institute of Electrical and Electronics Engineers Inc., pp. 84-91, 2014 IEEE Computer Society's Security and Privacy Workshops, SPW 2014, San Jose, United States, 5/17/14. https://doi.org/10.1109/SPW.2014.22
    Sarvari H, Abozinadah E, Mbaziira A, McCoy D. Constructing and analyzing criminal networks. In Proceedings - 2014 IEEE Security and Privacy Workshops, SPW 2014. Vol. 2014-January. Institute of Electrical and Electronics Engineers Inc. 2014. p. 84-91. 6957290 https://doi.org/10.1109/SPW.2014.22
    Sarvari, Hamed ; Abozinadah, Ehab ; Mbaziira, Alex ; McCoy, Damon. / Constructing and analyzing criminal networks. Proceedings - 2014 IEEE Security and Privacy Workshops, SPW 2014. Vol. 2014-January Institute of Electrical and Electronics Engineers Inc., 2014. pp. 84-91
    @inproceedings{9e900f5198e74124bffbf74e57f59024,
    title = "Constructing and analyzing criminal networks",
    abstract = "Analysis of criminal social graph structures can enable us to gain valuable insights into how these communities are organized. Such as, how large scale and centralized these criminal communities are currently? While these types of analysis have been completed in the past, we wanted to explore how to construct a large scale social graph from a smaller set of leaked data that included only the criminal's email addresses. We begin our analysis by constructing a 43 thousand node social graph from one thousand publicly leaked criminals' email addresses. This is done by locating Facebook profiles that are linked to these same email addresses and scraping the public social graph from these profiles. We then perform a large scale analysis of this social graph to identify profiles of high rank criminals, criminal organizations and large scale communities of criminals. Finally, we perform a manual analysis of these profiles that results in the identification of many criminally focused public groups on Facebook. This analysis demonstrates the amount of information that can be gathered by using limited data leaks.",
    keywords = "Analysis, Community detection, Criminal networks, Cybercrime, Social graph",
    author = "Hamed Sarvari and Ehab Abozinadah and Alex Mbaziira and Damon McCoy",
    year = "2014",
    month = "11",
    day = "13",
    doi = "10.1109/SPW.2014.22",
    language = "English (US)",
    isbn = "9781479951031",
    volume = "2014-January",
    pages = "84--91",
    booktitle = "Proceedings - 2014 IEEE Security and Privacy Workshops, SPW 2014",
    publisher = "Institute of Electrical and Electronics Engineers Inc.",

    }

    TY - GEN

    T1 - Constructing and analyzing criminal networks

    AU - Sarvari, Hamed

    AU - Abozinadah, Ehab

    AU - Mbaziira, Alex

    AU - McCoy, Damon

    PY - 2014/11/13

    Y1 - 2014/11/13

    N2 - Analysis of criminal social graph structures can enable us to gain valuable insights into how these communities are organized. Such as, how large scale and centralized these criminal communities are currently? While these types of analysis have been completed in the past, we wanted to explore how to construct a large scale social graph from a smaller set of leaked data that included only the criminal's email addresses. We begin our analysis by constructing a 43 thousand node social graph from one thousand publicly leaked criminals' email addresses. This is done by locating Facebook profiles that are linked to these same email addresses and scraping the public social graph from these profiles. We then perform a large scale analysis of this social graph to identify profiles of high rank criminals, criminal organizations and large scale communities of criminals. Finally, we perform a manual analysis of these profiles that results in the identification of many criminally focused public groups on Facebook. This analysis demonstrates the amount of information that can be gathered by using limited data leaks.

    AB - Analysis of criminal social graph structures can enable us to gain valuable insights into how these communities are organized. Such as, how large scale and centralized these criminal communities are currently? While these types of analysis have been completed in the past, we wanted to explore how to construct a large scale social graph from a smaller set of leaked data that included only the criminal's email addresses. We begin our analysis by constructing a 43 thousand node social graph from one thousand publicly leaked criminals' email addresses. This is done by locating Facebook profiles that are linked to these same email addresses and scraping the public social graph from these profiles. We then perform a large scale analysis of this social graph to identify profiles of high rank criminals, criminal organizations and large scale communities of criminals. Finally, we perform a manual analysis of these profiles that results in the identification of many criminally focused public groups on Facebook. This analysis demonstrates the amount of information that can be gathered by using limited data leaks.

    KW - Analysis

    KW - Community detection

    KW - Criminal networks

    KW - Cybercrime

    KW - Social graph

    UR - http://www.scopus.com/inward/record.url?scp=84939497405&partnerID=8YFLogxK

    UR - http://www.scopus.com/inward/citedby.url?scp=84939497405&partnerID=8YFLogxK

    U2 - 10.1109/SPW.2014.22

    DO - 10.1109/SPW.2014.22

    M3 - Conference contribution

    AN - SCOPUS:84939497405

    SN - 9781479951031

    VL - 2014-January

    SP - 84

    EP - 91

    BT - Proceedings - 2014 IEEE Security and Privacy Workshops, SPW 2014

    PB - Institute of Electrical and Electronics Engineers Inc.

    ER -