SlideShare uma empresa Scribd logo
1 de 34
CRIMINAL NETWORK INVEST IGAT ION:
PROCESSES, TOOLS, AND TECHNIQUES
Ph.D. defense
by Rasmus Rosenqvist PetersenDecem ber 13th
Outline
 Evaluation
 Conclus ions and future work
 Introduction
 Method
 Crim inal network inves tigation
 T heory and technology (brief, prom is e)
 Problem definition (a clos er look)
 Proces s model and tasks
 Crim eF ighter Inves tigator concepts
 Analys is and support of tas ks
 Work flow support: node rem oval
INTRODUCTION
THE DOMAIN
THE TOOL
EVALUATION &
CONCLUSION
Introduction
Debunking a myth
WHO DID IT?
Introduction
B ut what is it about, then?
Criminal Network Investigation
 network dom ain
 not crim inal:
sus pects , relatives ,
random people
 inform ation
 as s ociations
 proces s
 inves tigation
dom ain
Organized crime
Terrorism
National security
WMDs
Fraud
Extremism
Right
Left
Homicide
Introduction
Challenges and res earch focus
Inform ationInvestigator
centric
Institution or
environment
centric
Quantitative
External
Qualitative
Internal
Proces s
Hum an factors
Tacit knowledge
Context
Politics & legal framework
Managem ent
A software system addressing information, process, and human
factors challenges would be a useful tool for assisting criminal
network investigators in their work.
Research hypothesis
Method
B ardram ’s F is h Model
Write the thes is
Wrapping up!
I started here
I wanted to go here
DONE! (really, this is where I wanted to go)
Vis it to Imperial
College and
Univers ity of Hof,
Tool
developm ent
Write papers ,
book chapter,
journal paper
Prototyping, tool
tes ting
Literature studies ,
conferences ,
cours es ,
Developm ent method
P roof-of-concept prototyping
Crim inal network inves tigation
Organizational crim inal network
s tructures
Hierarchy Cellular Flat
Crim inal network inves tigation
Sub-s tructures in crim inal networks
Clique Bridge
Hub
Crim inal
network
Crim inal network inves tigation
Linear proces s m odels
Crim inal network inves tigation
Linear proces s exam ple
Crim inal network inves tigation
Target-centric proces s m odels
Crim inal network inves tigation
Exam ple: Daniel P earl inves tigation
Crim inal network inves tigation
cas e: Daniel P earl inves tigation
Screens hots from the movie ’A Mighty Heart’
Target
AttributesEntities
Relations
T heory and technology
P illars
T heory and technology
Hypertext I
 Organizing and making sense of information
has been the main focus of hypertext research
from its very beginning.
 Structure dom ains :
 Ass ociative structures
 Spatial structures
 Taxonom ic structures
 Iss ue-bas ed structures
 Annotation and meta data structures
T heory and technology
Hypertext II
Associative structures Spatial structures
Problem definition
Inform ation
 Problem s :
 Inform ation amount
 inform ation incom pletenes s
 inform ation com plexity
“We typically have much less
data, or not so many attributes,
as it was the case in the
investigation you presented”
British Home Office analyst
(2011)
 Res earch focus requirem ents :
 Information #1: em erging and fragile structure
 Information #2: integrating inform ation sources
 Information #3: awarenes s and notification
 Information #4: vers ioning support
Problem definition
P roces s
 Problem s :
 Increm ental deterioration
 res pons ibility
 overlapping proces s es
 inform ation sharing
 Res earch focus requirem ents :
 Process #1: target-centric and iterative
 Process #2: los s les s data abs tractions
 Process #3: make everybody stakeholders
 Process #4: integrate conceptual and com putational
models
“With a better working
methodology and a wider focus, the
Norwegian police security service
(PST) could have tracked down the
offender prior to July 22.”
22nd July Commission Report
(2012)
Problem definition
Hum an factors
 Problem s :
 Hum an cognition and creativity,
 making hum ans more capable,
 habitual and biased thinking,
 trus t
 Res earch focus requirem ents :
 Human factors #1: augm ent hum an intellect
 Human factors #2: trans parency and owners hip
 Human factors #3: sim ple tools eas e-of-us e
 Human factors #4: hum an-tool synergy
The human mind … operates
by association. With one
item in its grasp, it snaps
instantly to the next that is
suggested by the association
of thoughts.
Vannevar Bush (1945)
P roces s m odel
Target-centric, hum an-centered
TARGET
processing
collection
disseminationacquisition
sense-making
cooperation
sense-making
synthesis
cooperation flowinformation flow investigative process
shared investigative process
Toolsupport
synthesis
customer
investigatorinvestigator
collector
process influence
Tas ks
 Acquis ition:
 Acuis ition methods , dynam ic attributes , and attribute mapping.
 Synthes is :
 CRUD entities , CRUD ass ociations , re-s tructuring, grouping,
collaps ing and expanding, brains torm ing, inform ation types ,
em erging attributes .
 Sens e-m aking:
 Retracing the steps , creating hypothes es , adaptive modeling,
prediction, alias detection, exploring pres pectives , decis ion-
making, social network analys is , terroris t network analys is .
 Diss em ination:
 Storytelling, report generation.
 Co-operation:
 Shared inform ation space, discover em ergent collaboration,
shared work flows .
Crim eF ighter Inves tigator
Concepts
Acquis ition tas ks
Dynam ic attributes and attribute mapping
Synthes is tas ks
Create entities and as s ociations
Sens e-m aking tas ks
Create hypothes es and prediction
Tes ting the hypothes is
Work flow s upport: ’what-if’ ques tions
Novem ber 17,
partially obs erved
network
Asking what-if
ques tions
Tes ting the hypothes is
Work flow s upport: node rem oval
Evaluation
Methods and requirem ents coverage
 T hree methods :
 Capability com paris ons (m odels and tas ks )
 End us er interviews
 Meas ures of perform ance
 Good coverage!
Evalution
Capability com paris on of tas ks
Evaluation
Sum m ary
Conclus ion
Res earch focus requirem ents and hypothes is
 Res earch focus requirem ents
 Support of the hypothes is
A software system addressing information, process, and
human factors challenges would be a useful tool for
assisting criminal network investigators in their work.
Conclus ion
Contributions
 Challenges
 Proces s model
 Tas k lis t
 Tool support
 Novel approach to tool support
 Com ponents for tool support
 Publications
F uture work
Tool developm ent and evaluation
 Tool developm ent
Branched his tory
Vis ualization and filtering
Cus tom algorithm s (s ave work flows ,
dedicated editor)
Prediction (im prove mops )
 Tool evaluation
Us ability experim ents
Capability com paris ons

Mais conteúdo relacionado

Mais procurados

Soft computing from net
Soft computing from netSoft computing from net
Soft computing from netEasyMedico.com
 
Fueling the future with Semantic Web patterns - Keynote at WOP2014@ISWC
Fueling the future with Semantic Web patterns - Keynote at WOP2014@ISWCFueling the future with Semantic Web patterns - Keynote at WOP2014@ISWC
Fueling the future with Semantic Web patterns - Keynote at WOP2014@ISWCValentina Presutti
 
Excerpt from a letter of recommendation by Dr
Excerpt from a letter of recommendation by DrExcerpt from a letter of recommendation by Dr
Excerpt from a letter of recommendation by DrJohn Harvey
 
scklinkedin-v1
scklinkedin-v1scklinkedin-v1
scklinkedin-v1Sing Koo
 
Modeling Causal Reasoning in Complex Networks through NLP: an Introduction
Modeling Causal Reasoning in Complex Networks through NLP: an IntroductionModeling Causal Reasoning in Complex Networks through NLP: an Introduction
Modeling Causal Reasoning in Complex Networks through NLP: an IntroductionLuca Nannini
 
Cover Letter and Resume
Cover Letter and ResumeCover Letter and Resume
Cover Letter and ResumeZhaolun Wang
 

Mais procurados (7)

Soft computing from net
Soft computing from netSoft computing from net
Soft computing from net
 
Fueling the future with Semantic Web patterns - Keynote at WOP2014@ISWC
Fueling the future with Semantic Web patterns - Keynote at WOP2014@ISWCFueling the future with Semantic Web patterns - Keynote at WOP2014@ISWC
Fueling the future with Semantic Web patterns - Keynote at WOP2014@ISWC
 
Excerpt from a letter of recommendation by Dr
Excerpt from a letter of recommendation by DrExcerpt from a letter of recommendation by Dr
Excerpt from a letter of recommendation by Dr
 
scklinkedin-v1
scklinkedin-v1scklinkedin-v1
scklinkedin-v1
 
Modeling Causal Reasoning in Complex Networks through NLP: an Introduction
Modeling Causal Reasoning in Complex Networks through NLP: an IntroductionModeling Causal Reasoning in Complex Networks through NLP: an Introduction
Modeling Causal Reasoning in Complex Networks through NLP: an Introduction
 
Big Data Social Network Analysis
Big Data Social Network AnalysisBig Data Social Network Analysis
Big Data Social Network Analysis
 
Cover Letter and Resume
Cover Letter and ResumeCover Letter and Resume
Cover Letter and Resume
 

Destaque

Visualizing the neo4j graph database with key lines
Visualizing the neo4j graph database with key linesVisualizing the neo4j graph database with key lines
Visualizing the neo4j graph database with key linesCambridge Intelligence
 
Talk london quantified self (~sept 2014)
Talk london quantified self (~sept 2014)Talk london quantified self (~sept 2014)
Talk london quantified self (~sept 2014)Rasmus Petersen
 
Talk London Quantified Self meetup (~sept 2013)
Talk London Quantified Self meetup (~sept 2013)Talk London Quantified Self meetup (~sept 2013)
Talk London Quantified Self meetup (~sept 2013)Rasmus Petersen
 
Quantified Self and Behaviour Change: are we there yet?
Quantified Self and Behaviour Change: are we there yet?Quantified Self and Behaviour Change: are we there yet?
Quantified Self and Behaviour Change: are we there yet?Lukasz Piwek
 
SOA guest lecture at DIKU by Dr. Rasmus Petersen (Dec 17 2015)
SOA guest lecture at DIKU by Dr. Rasmus Petersen (Dec 17 2015)SOA guest lecture at DIKU by Dr. Rasmus Petersen (Dec 17 2015)
SOA guest lecture at DIKU by Dr. Rasmus Petersen (Dec 17 2015)Rasmus Petersen
 
Project management strategies at Netcompany - Guest lecture (May 13 2016)
Project management strategies at Netcompany - Guest lecture (May 13 2016)Project management strategies at Netcompany - Guest lecture (May 13 2016)
Project management strategies at Netcompany - Guest lecture (May 13 2016)Rasmus Petersen
 
Behavioral Analytics for Financial Intelligence
Behavioral Analytics for Financial IntelligenceBehavioral Analytics for Financial Intelligence
Behavioral Analytics for Financial IntelligenceJohn Liu
 
SAS for Claims Fraud
SAS for Claims FraudSAS for Claims Fraud
SAS for Claims Fraudstuartdrose
 
SAS Fraud Framework for Insurance
SAS Fraud Framework for InsuranceSAS Fraud Framework for Insurance
SAS Fraud Framework for Insurancestuartdrose
 
Fraud Detection presentation
Fraud Detection presentationFraud Detection presentation
Fraud Detection presentationHernan Huwyler
 

Destaque (11)

Visualizing the neo4j graph database with key lines
Visualizing the neo4j graph database with key linesVisualizing the neo4j graph database with key lines
Visualizing the neo4j graph database with key lines
 
Talk london quantified self (~sept 2014)
Talk london quantified self (~sept 2014)Talk london quantified self (~sept 2014)
Talk london quantified self (~sept 2014)
 
Talk London Quantified Self meetup (~sept 2013)
Talk London Quantified Self meetup (~sept 2013)Talk London Quantified Self meetup (~sept 2013)
Talk London Quantified Self meetup (~sept 2013)
 
Quantified Self and Behaviour Change: are we there yet?
Quantified Self and Behaviour Change: are we there yet?Quantified Self and Behaviour Change: are we there yet?
Quantified Self and Behaviour Change: are we there yet?
 
SOA guest lecture at DIKU by Dr. Rasmus Petersen (Dec 17 2015)
SOA guest lecture at DIKU by Dr. Rasmus Petersen (Dec 17 2015)SOA guest lecture at DIKU by Dr. Rasmus Petersen (Dec 17 2015)
SOA guest lecture at DIKU by Dr. Rasmus Petersen (Dec 17 2015)
 
Project management strategies at Netcompany - Guest lecture (May 13 2016)
Project management strategies at Netcompany - Guest lecture (May 13 2016)Project management strategies at Netcompany - Guest lecture (May 13 2016)
Project management strategies at Netcompany - Guest lecture (May 13 2016)
 
Behavioral Analytics for Financial Intelligence
Behavioral Analytics for Financial IntelligenceBehavioral Analytics for Financial Intelligence
Behavioral Analytics for Financial Intelligence
 
SAS for Claims Fraud
SAS for Claims FraudSAS for Claims Fraud
SAS for Claims Fraud
 
SAS Fraud Framework for Insurance
SAS Fraud Framework for InsuranceSAS Fraud Framework for Insurance
SAS Fraud Framework for Insurance
 
Fraud Management Solutions
Fraud Management SolutionsFraud Management Solutions
Fraud Management Solutions
 
Fraud Detection presentation
Fraud Detection presentationFraud Detection presentation
Fraud Detection presentation
 

Semelhante a Criminal network investigation: Processes, tools, and techniques

Transparency in ML and AI (humble views from a concerned academic)
Transparency in ML and AI (humble views from a concerned academic)Transparency in ML and AI (humble views from a concerned academic)
Transparency in ML and AI (humble views from a concerned academic)Paolo Missier
 
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...REVULN
 
Digital Reasoning at AirSummit 2014
Digital Reasoning at AirSummit 2014Digital Reasoning at AirSummit 2014
Digital Reasoning at AirSummit 2014Marten den Haring
 
Digital forensics research: The next 10 years
Digital forensics research: The next 10 yearsDigital forensics research: The next 10 years
Digital forensics research: The next 10 yearsMehedi Hasan
 
CRIME-INVEST-PPP.pptx
CRIME-INVEST-PPP.pptxCRIME-INVEST-PPP.pptx
CRIME-INVEST-PPP.pptxoluobes
 
Crime Analysis using Data Analysis
Crime Analysis using Data AnalysisCrime Analysis using Data Analysis
Crime Analysis using Data AnalysisChetan Hireholi
 
Text Analytics: From Colored Pens and Crumbly Papers to Custom Machine Classi...
Text Analytics: From Colored Pens and Crumbly Papers to Custom Machine Classi...Text Analytics: From Colored Pens and Crumbly Papers to Custom Machine Classi...
Text Analytics: From Colored Pens and Crumbly Papers to Custom Machine Classi...Stuart Shulman
 
Digital Forensics: The next 10 years
Digital Forensics: The next 10 yearsDigital Forensics: The next 10 years
Digital Forensics: The next 10 yearsAl Imran, CISA
 
Forensics for IT, final attempt
Forensics for IT, final attemptForensics for IT, final attempt
Forensics for IT, final attemptj9lai
 
Forensics for IT - ACC 626
Forensics for IT - ACC 626Forensics for IT - ACC 626
Forensics for IT - ACC 626j9lai
 
Acc 626 slidecast - Forensics for IT
Acc 626 slidecast - Forensics for ITAcc 626 slidecast - Forensics for IT
Acc 626 slidecast - Forensics for ITj9lai
 
Acc 626 slidecast
Acc 626 slidecastAcc 626 slidecast
Acc 626 slidecastj9lai
 
ACC 626 - Forensics for IT
ACC 626 - Forensics for ITACC 626 - Forensics for IT
ACC 626 - Forensics for ITj9lai
 
ACC 626 - Forensics for IT
ACC 626 - Forensics for ITACC 626 - Forensics for IT
ACC 626 - Forensics for ITj9lai
 
Acc 626 slidecast - Forensics for IT
Acc 626 slidecast - Forensics for ITAcc 626 slidecast - Forensics for IT
Acc 626 slidecast - Forensics for ITj9lai
 
Acc 626 slidecast
Acc 626 slidecastAcc 626 slidecast
Acc 626 slidecastj9lai
 
Graphs in Government
Graphs in GovernmentGraphs in Government
Graphs in GovernmentNeo4j
 
Human Trafficking-A Perspective from Computer Science and Organizational Lead...
Human Trafficking-A Perspective from Computer Science and Organizational Lead...Human Trafficking-A Perspective from Computer Science and Organizational Lead...
Human Trafficking-A Perspective from Computer Science and Organizational Lead...Turner Sparks
 
Frontiers of Computational Journalism week 8 - Visualization and Network Anal...
Frontiers of Computational Journalism week 8 - Visualization and Network Anal...Frontiers of Computational Journalism week 8 - Visualization and Network Anal...
Frontiers of Computational Journalism week 8 - Visualization and Network Anal...Jonathan Stray
 
Data fluency for the 21st century
Data fluency for the 21st centuryData fluency for the 21st century
Data fluency for the 21st centuryMartinFrigaard
 

Semelhante a Criminal network investigation: Processes, tools, and techniques (20)

Transparency in ML and AI (humble views from a concerned academic)
Transparency in ML and AI (humble views from a concerned academic)Transparency in ML and AI (humble views from a concerned academic)
Transparency in ML and AI (humble views from a concerned academic)
 
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
 
Digital Reasoning at AirSummit 2014
Digital Reasoning at AirSummit 2014Digital Reasoning at AirSummit 2014
Digital Reasoning at AirSummit 2014
 
Digital forensics research: The next 10 years
Digital forensics research: The next 10 yearsDigital forensics research: The next 10 years
Digital forensics research: The next 10 years
 
CRIME-INVEST-PPP.pptx
CRIME-INVEST-PPP.pptxCRIME-INVEST-PPP.pptx
CRIME-INVEST-PPP.pptx
 
Crime Analysis using Data Analysis
Crime Analysis using Data AnalysisCrime Analysis using Data Analysis
Crime Analysis using Data Analysis
 
Text Analytics: From Colored Pens and Crumbly Papers to Custom Machine Classi...
Text Analytics: From Colored Pens and Crumbly Papers to Custom Machine Classi...Text Analytics: From Colored Pens and Crumbly Papers to Custom Machine Classi...
Text Analytics: From Colored Pens and Crumbly Papers to Custom Machine Classi...
 
Digital Forensics: The next 10 years
Digital Forensics: The next 10 yearsDigital Forensics: The next 10 years
Digital Forensics: The next 10 years
 
Forensics for IT, final attempt
Forensics for IT, final attemptForensics for IT, final attempt
Forensics for IT, final attempt
 
Forensics for IT - ACC 626
Forensics for IT - ACC 626Forensics for IT - ACC 626
Forensics for IT - ACC 626
 
Acc 626 slidecast - Forensics for IT
Acc 626 slidecast - Forensics for ITAcc 626 slidecast - Forensics for IT
Acc 626 slidecast - Forensics for IT
 
Acc 626 slidecast
Acc 626 slidecastAcc 626 slidecast
Acc 626 slidecast
 
ACC 626 - Forensics for IT
ACC 626 - Forensics for ITACC 626 - Forensics for IT
ACC 626 - Forensics for IT
 
ACC 626 - Forensics for IT
ACC 626 - Forensics for ITACC 626 - Forensics for IT
ACC 626 - Forensics for IT
 
Acc 626 slidecast - Forensics for IT
Acc 626 slidecast - Forensics for ITAcc 626 slidecast - Forensics for IT
Acc 626 slidecast - Forensics for IT
 
Acc 626 slidecast
Acc 626 slidecastAcc 626 slidecast
Acc 626 slidecast
 
Graphs in Government
Graphs in GovernmentGraphs in Government
Graphs in Government
 
Human Trafficking-A Perspective from Computer Science and Organizational Lead...
Human Trafficking-A Perspective from Computer Science and Organizational Lead...Human Trafficking-A Perspective from Computer Science and Organizational Lead...
Human Trafficking-A Perspective from Computer Science and Organizational Lead...
 
Frontiers of Computational Journalism week 8 - Visualization and Network Anal...
Frontiers of Computational Journalism week 8 - Visualization and Network Anal...Frontiers of Computational Journalism week 8 - Visualization and Network Anal...
Frontiers of Computational Journalism week 8 - Visualization and Network Anal...
 
Data fluency for the 21st century
Data fluency for the 21st centuryData fluency for the 21st century
Data fluency for the 21st century
 

Último

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 

Último (20)

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 

Criminal network investigation: Processes, tools, and techniques

  • 1. CRIMINAL NETWORK INVEST IGAT ION: PROCESSES, TOOLS, AND TECHNIQUES Ph.D. defense by Rasmus Rosenqvist PetersenDecem ber 13th
  • 2. Outline  Evaluation  Conclus ions and future work  Introduction  Method  Crim inal network inves tigation  T heory and technology (brief, prom is e)  Problem definition (a clos er look)  Proces s model and tasks  Crim eF ighter Inves tigator concepts  Analys is and support of tas ks  Work flow support: node rem oval INTRODUCTION THE DOMAIN THE TOOL EVALUATION & CONCLUSION
  • 4. Introduction B ut what is it about, then? Criminal Network Investigation  network dom ain  not crim inal: sus pects , relatives , random people  inform ation  as s ociations  proces s  inves tigation dom ain Organized crime Terrorism National security WMDs Fraud Extremism Right Left Homicide
  • 5. Introduction Challenges and res earch focus Inform ationInvestigator centric Institution or environment centric Quantitative External Qualitative Internal Proces s Hum an factors Tacit knowledge Context Politics & legal framework Managem ent A software system addressing information, process, and human factors challenges would be a useful tool for assisting criminal network investigators in their work. Research hypothesis
  • 6. Method B ardram ’s F is h Model Write the thes is Wrapping up! I started here I wanted to go here DONE! (really, this is where I wanted to go) Vis it to Imperial College and Univers ity of Hof, Tool developm ent Write papers , book chapter, journal paper Prototyping, tool tes ting Literature studies , conferences , cours es ,
  • 7. Developm ent method P roof-of-concept prototyping
  • 8. Crim inal network inves tigation Organizational crim inal network s tructures Hierarchy Cellular Flat
  • 9. Crim inal network inves tigation Sub-s tructures in crim inal networks Clique Bridge Hub Crim inal network
  • 10. Crim inal network inves tigation Linear proces s m odels
  • 11. Crim inal network inves tigation Linear proces s exam ple
  • 12. Crim inal network inves tigation Target-centric proces s m odels
  • 13. Crim inal network inves tigation Exam ple: Daniel P earl inves tigation
  • 14. Crim inal network inves tigation cas e: Daniel P earl inves tigation Screens hots from the movie ’A Mighty Heart’ Target AttributesEntities Relations
  • 15. T heory and technology P illars
  • 16. T heory and technology Hypertext I  Organizing and making sense of information has been the main focus of hypertext research from its very beginning.  Structure dom ains :  Ass ociative structures  Spatial structures  Taxonom ic structures  Iss ue-bas ed structures  Annotation and meta data structures
  • 17. T heory and technology Hypertext II Associative structures Spatial structures
  • 18. Problem definition Inform ation  Problem s :  Inform ation amount  inform ation incom pletenes s  inform ation com plexity “We typically have much less data, or not so many attributes, as it was the case in the investigation you presented” British Home Office analyst (2011)  Res earch focus requirem ents :  Information #1: em erging and fragile structure  Information #2: integrating inform ation sources  Information #3: awarenes s and notification  Information #4: vers ioning support
  • 19. Problem definition P roces s  Problem s :  Increm ental deterioration  res pons ibility  overlapping proces s es  inform ation sharing  Res earch focus requirem ents :  Process #1: target-centric and iterative  Process #2: los s les s data abs tractions  Process #3: make everybody stakeholders  Process #4: integrate conceptual and com putational models “With a better working methodology and a wider focus, the Norwegian police security service (PST) could have tracked down the offender prior to July 22.” 22nd July Commission Report (2012)
  • 20. Problem definition Hum an factors  Problem s :  Hum an cognition and creativity,  making hum ans more capable,  habitual and biased thinking,  trus t  Res earch focus requirem ents :  Human factors #1: augm ent hum an intellect  Human factors #2: trans parency and owners hip  Human factors #3: sim ple tools eas e-of-us e  Human factors #4: hum an-tool synergy The human mind … operates by association. With one item in its grasp, it snaps instantly to the next that is suggested by the association of thoughts. Vannevar Bush (1945)
  • 21. P roces s m odel Target-centric, hum an-centered TARGET processing collection disseminationacquisition sense-making cooperation sense-making synthesis cooperation flowinformation flow investigative process shared investigative process Toolsupport synthesis customer investigatorinvestigator collector process influence
  • 22. Tas ks  Acquis ition:  Acuis ition methods , dynam ic attributes , and attribute mapping.  Synthes is :  CRUD entities , CRUD ass ociations , re-s tructuring, grouping, collaps ing and expanding, brains torm ing, inform ation types , em erging attributes .  Sens e-m aking:  Retracing the steps , creating hypothes es , adaptive modeling, prediction, alias detection, exploring pres pectives , decis ion- making, social network analys is , terroris t network analys is .  Diss em ination:  Storytelling, report generation.  Co-operation:  Shared inform ation space, discover em ergent collaboration, shared work flows .
  • 23. Crim eF ighter Inves tigator Concepts
  • 24. Acquis ition tas ks Dynam ic attributes and attribute mapping
  • 25. Synthes is tas ks Create entities and as s ociations
  • 26. Sens e-m aking tas ks Create hypothes es and prediction
  • 27. Tes ting the hypothes is Work flow s upport: ’what-if’ ques tions Novem ber 17, partially obs erved network Asking what-if ques tions
  • 28. Tes ting the hypothes is Work flow s upport: node rem oval
  • 29. Evaluation Methods and requirem ents coverage  T hree methods :  Capability com paris ons (m odels and tas ks )  End us er interviews  Meas ures of perform ance  Good coverage!
  • 32. Conclus ion Res earch focus requirem ents and hypothes is  Res earch focus requirem ents  Support of the hypothes is A software system addressing information, process, and human factors challenges would be a useful tool for assisting criminal network investigators in their work.
  • 33. Conclus ion Contributions  Challenges  Proces s model  Tas k lis t  Tool support  Novel approach to tool support  Com ponents for tool support  Publications
  • 34. F uture work Tool developm ent and evaluation  Tool developm ent Branched his tory Vis ualization and filtering Cus tom algorithm s (s ave work flows , dedicated editor) Prediction (im prove mops )  Tool evaluation Us ability experim ents Capability com paris ons