A Case Study of Crime Organization Structure Based on Social Network Method

Similar documents
Wasserman & Faust, chapter 5

GREENDALE SECONDARY SCHOOL HUMANITIES DEPARTMENT Geography Elective

The Development of FTA Rules of Origin Functions

Al Qaeda: Corporate hierarchy or biological entity?

Analyzing and Representing Two-Mode Network Data Week 8: Reading Notes

Essential Questions Content Skills Assessments Standards/PIs. Identify prime and composite numbers, GCF, and prime factorization.

Transformation of Chinese Government s Economic Function under Globalization

A Behavioral Perspective on Money Laundering

Designing police patrol districts on street network

Terrorism: Minnesota Responds to the Clear and Present Danger

Good afternoon everybody.

Estimating the Margin of Victory for Instant-Runoff Voting

Sexuální vykořisťování jako forma závažné organizované kriminality Sexual exploitation as a serious form of organised crime Summary

Analyzing Terrorist Networks - Theories & Techniques

Influence of Identity on Development of Urbanization. WEI Ming-gao, YU Gao-feng. University of Shanghai for Science and Technology, Shanghai, China

VISA LOTTERY SERVICES REPORT FOR DV-2007 EXECUTIVE SUMMARY

Georgia Studies. Unit 7: Modern Georgia and Civil Rights. Lesson 3: Georgia in Recent History. Study Presentation

Policy Framework for the Regional Biometric Data Exchange Solution

University's Ideological and Political Education Innovation in Network Environment. Wei Zhang

Competitiveness and Value Creation of Tourism Sector: In the Case of 10 ASEAN Economies

Predicting Information Diffusion Initiated from Multiple Sources in Online Social Networks

The plural social governance and system construction in China

On the New Characteristics and New Trend of Political Education Development in the New Period Chengcheng Ma 1

Page 20 THE SECRET FILES 9/11 IS OFFICIALLY THE LARGEST CRIMINAL CASE IN HISTORY- BUT CLASSIFIED. Headline. Caption

Michael Laver and Ernest Sergenti: Party Competition. An Agent-Based Model

Operation Mode Analysis-Based National Sports Non-Profit Organization Modern Administrative Research

Trials and Tribulations of Shooting a Water Well. by Wes Bender

Host-guest Interaction: A Study Based on Cognitions and Attitudes of Residents in Ethnic Tourism Regions on Tourism Impacts

PIPA-Knowledge Networks Poll: Americans on Iraq & the UN Inspections II. Questionnaire

Comparison on the Developmental Trends Between Chinese Students Studying Abroad and Foreign Students Studying in China

TASK FORCE ON DISPLACEMENT

An Integrated Tag Recommendation Algorithm Towards Weibo User Profiling

Belonging and Exclusion in the Internet Era: Estonian Case

Integrative Analytics for Detecting and Disrupting Transnational Interdependent Criminal Smuggling, Money, and Money-Laundering Networks

The following text is an edited transcript of Professor. Fisher s remarks at the November 13 meeting. Afghanistan: Negotiation in the Face of Terror

Design and Analysis of College s CPC-Building. System Based on.net Platform

School of Management and Economics

Chapter Five: Forces. Ø 5.1 Forces. Ø 5.2 Friction. Ø 5.3 Forces and Equilibrium

Drug trafficking and the case study in narco-terrorism. "If you quit drugs, you join the fight against terrorism." President George W.

Graduate School of Political Economy Dongseo University Master Degree Course List and Course Descriptions

Through Different Lenses

The Impact of Science and Technology

The Cultural Landscape by Rubenstein Chapter 3: Migration

Key Issue 1: Where Are Migrants Distributed?

17.1 Introduction. Giulia Massini and Massimo Buscema

Theories Of International Relations Contending Approaches To World Politics

Challenges Facing the Asian-African States in the Contemporary. Era: An Asian-African Perspective

7 TH GRADE SOCIAL SCIENCE CHECKLIST Goals Illinois Learning Standards A F

Social Analysis of an Urban Community Regarding Security Satisfaction

Reforming African Customs: The Results of the Cameroonian Performance Contract Pilot 1. Africa Trade Policy Notes Note #13

State of the World by United Nations Indicators. Audrey Matthews, Elizabeth Curtis, Wes Biddle, Valery Bonar

TOWARDS A PAN-EUROPEAN MONITORING SYSTEM ON TRAFFICKING IN HUMAN BEINGS

Role of Political Identity in Friendship Networks

Do two parties represent the US? Clustering analysis of US public ideology survey

Example 8.2 The Economics of Terrorism: Externalities and Strategic Interaction

Empirical Analysis of Rural Citizens Political Participation in the Underdeveloped Regions of Chinese Eastern Provinces

An Exploratory study of the Video Bloggers Community

Abstract: Submitted on:

Voter turnout and the first voters

Global Interdependence. Chapter Present

Money flow and its impacts in Ethiopian Politics a Causal Loop Diagram analysis

Research on the Innovation of College Students' Ideological and Political Education based on the Synergetics Theory

Intentional Electromagnetic Interference EM Terrorism

Hyo-Shin Kwon & Yi-Yi Chen

HASHGRAPH CONSENSUS: DETAILED EXAMPLES

Statistical Yearbook for Asia and the Pacific Statistical Yearbook. for Asia and the Pacific

Performance Evaluation of Cluster Based Techniques for Zoning of Crime Info

REPUBLIC OF MONTENEGRO GOVERNMENT OF THE REPUBLIC OF MONTENEGRO MINISTRY OF INTERIOR LAW ON THE STATE BORDER SURVEILLANCE. Podgorica, July 2005.

CITY OF HUNTINGTON REQUEST FOR PROPOSAL FOR MUNICIPAL CODE PRINTING, WEB HOSTING AND EDITING SUPPLEMENTATION SERVICES FOR THE CITY FISCAL

WORKSHOP ON INTERNATIONAL STANDARDS

Governing for Growth and the Resilience of the Chinese Communist Party

NAME DATE PER Chapter Three Migration Study Guide: Key Issues 1 & 2 Key Issue 1: Where Are Migrants Distributed? (pgs 78-83)

Section One SYNOPSIS: UNIFORM CRIME REPORTING PROGRAM. Synopsis: Uniform Crime Reporting System

Estonian National Electoral Committee. E-Voting System. General Overview

TYPE OF ORDER NUMBER/SERIES ISSUE DATE EFFECTIVE DATE General Order /3/2013 5/5/2013

CS 4407 Algorithms Greedy Algorithms and Minimum Spanning Trees

MATH 1340 Mathematics & Politics

COOPERATION AGREEMENT between the European Community and the Lao People's Democratic Republic

Subreddit Recommendations within Reddit Communities

4.2 explain indicators that can be used to measure quality of life. 4.3 explain how innovations and ideas in the past influenced quality of life

Section One SYNOPSIS: UNIFORM CRIME REPORTING PROGRAM. Synopsis: Uniform Crime Reporting Program

The Conflict and Coordination Between the Procuratorial Organ Bringing Civil Public Interest Litigation and Its Responsibilities of Trail Supervision

Three essential ways of anti-corruption. Wen Fan 1

Key Findings and an Action Plan to Reduce Gun Violence

Stratification: Rich and Famous or Rags and Famine? 2015 SAGE Publications, Inc.

Network Indicators: a new generation of measures? Exploratory review and illustration based on ESS data

A survey of 200 adults in the U.S. found that 76% regularly wear seatbelts while driving. True or false: 76% is a parameter.

Introduction: Summary of the Survey Results

Parties, Candidates, Issues: electoral competition revisited

Evolutionary Game Path of Law-Based Government in China Ying-Ying WANG 1,a,*, Chen-Wang XIE 2 and Bo WEI 2

Approval Voting Theory with Multiple Levels of Approval

Chapter. Estimating the Value of a Parameter Using Confidence Intervals Pearson Prentice Hall. All rights reserved

Telephone Survey. Contents *

Assessment of Policies & Programs to Combat Human Trafficking and Implications for Massachusetts

International Conference on Education Technology, Management and Humanities Science (ETMHS 2015)

Treaty on the State Border between the Republic of Croatia and Bosnia and Herzegovina, 30 July 1999

1920 DOI /j. cnki

Publication Info: UC Irvine, Structure and Dynamics, Social Dynamics and Complexity, Institute for Mathematical Behavioral Sciences

Abstract. "The Use of Guerrilla Forces for the Intelligence Purposes of the Soviet. Partisan Movement, "

Transcription:

2016 2 nd Asia-Pacific Management and Engineering Conference (APME 2016) ISBN: 978-1-60595-434-9 A Case Study of Crime Organization Structure Based on Social Network Method RUI-WANG and JUN-HUI GAO ABSTRACT In this paper, we apply social network approach and analyze the structure of the plurality of criminal organizations, including Pyramid Selling, 911 hijacking organizations, transnational drug trafficking organizations. In the hierarchical organization of MLM, we found that two parameters of network Out2Local, in-harmonic Closeness difference have huge difference between the different levels of nodes. For relational data of 911 hijacking organization, we use Girvan-Newman algorithm to calculate the number of modules of different societies. When the highest number of associations appears to be four, hijacked planes also happens to be four and we conducted a comparative study based on the result. For structure of cross-border drug crime organization, we summarize Huanghui Xia s studies. Finally, from the perspective of social network approach, we investigate the efficiency and safety of different types of criminal organizations structure. KEYWORDS Structure of criminal networks, Social Network, Examples, Pyramid Selling, 911 terrorists attack. INTRODUCTION The real darkness is always hidden behind of the evil on the surface. To get a closer contact with the darkness of the society, scientists and researchers use data-analyzing to figure out the structures of organized criminal groups. Dr. Qin Zonggen (2009) mentioned that the original structure of several drug gangs such as 1~15 group arrested in January 2007 and 5;22 group detected in May 2001 can be classified as the combination of many criminal chains which finally be formed as a pyramid. Different layers of the pyramid represent different status and job which make the whole group more stable and organized[1]. Professor Han Jinxia (2003) mainly worked on the structure of gangland, the underworld society. She blend the penal code and criminal law and criminal policy together, inquire into the Concept and character of Underground nature organization; Rui Wang, Jiangsu Tianyi High School, Wuxi, China. Junhui Gao, American and European International Study Center, Wuxi, China. Corresponding author, Email: Jhgao68@163.com. 522

and finally analyzed the differences among the connected concepts which lead to the real structure of the whole criminal group which seem to be a Metro Rail FIG[2]. Professor Huang Huixia studied the condition of crimes that happened in border defense. This time, the she used many examples to get the exact and convincing result. Professor Huang plotted a scatter-plot which can be classified as a new structure[3]. Dr. Ma Fang (2012) figured out a common structure of various kinds of crimes. He found that all of the crimes are related within several networks that exactly showed the close index of the group members. In this way, criminal groups can be classified as star structure, reticular structure and chain structure. The use of several structures is for a better connection and secrecy which will promote the development of the criminal group in various ways[4]. Several foreign researchers also contributed to this topic a lot. The professor groups of College of Computing, Georgia Institute of Technology and Damballa, Inc studied the structure of criminal networks, groups of related malicious infrastructures that can work in correct to provide hosting for criminal activities. They construct graphs to show the relationship which can be finally concluded as the transfer form leaders to followers[5]. In this article, We use our own way to figure out the structure of several different crimes like gangland, hijack political crimes and drug trafficking. We will also find the relationship between the leaders and followers with graphs and tabulations. SYNOPSIS OF SOCIAL NETWORK Social network analysis is an approach for sociologist to perform quantitative analysis based on developed mathematical methods and graph theory. In recent years, the method is widely used, in the field of occupational mobility, the impact of urbanization on individual happiness, world political and economic system, international trade, etc. And this method has played an important role. Social network analysis is a relatively mature method of sociology, social scientists can use it to explain some of the intractable problems. Experts such era knowledge-economy. When facing so many challenges, they begin to learn thinking about research methods from other disciplines and social network analysis is one of them. Network refers to various associations, and Social Network can be simply referred to the structure constituted by social relations. Social Network Analysis (SNA) origins in physics adaptive network through studying network can help "macro" structure of relations between individuals, "micro" and the large-scale social network systems be combined up by mathematical methods graph theory and other quantitative analysis method. It is a new research branch which has developed since the 1970s in fields of sociology, psychology, anthropology, math, science and communication. Starting from the perspective of social networks, the interaction of people in the social environment can be expressed as a model or rule-based relationship, and this relationship is based on a regular pattern which reflects the social structure. The quantitative analysis of this structure is the beginning point of analysis performed on social network. Social network analysis is not just a tool, but also a way of thinking on the relationship. It can be used to explain some areas of sociology, economics, management and other issues. In recent years, this method is widely used in the field of 523

occupational mobility, the impact of urbanization on individual happiness, world political and economic system, international trade, and played an important role. ANALYSIS TOOLS NETDRAW Our primary analysis tool is NetDraw[6]. Developed by the professors from American College of Business and Economics University of Kentucky Department of Management, Gatton and Steve Borgatti, NetDraw is very representative of a social network analysis software, image NetDraw its intuitive graphical display, simple and easy maneuverability, excellent open compatibility to our social network analysis has injected new vitality, it has been widely used in social networks study. NetDraw is free, that s another reason for us to choose, you can download from http://www.analytictech.com/ ANALYSIS OF CASEES Then, we will analyze several criminal organizations, including Pyramid selling, 911 hijacking organizations and transnational drug trafficking organizations. Structural Analysis of Pyramid Selling Pyramid selling refers to the organizer or operator development officers, was developed by its staff or the number of personnel directly or indirectly from sales and development as the basis for calculating remuneration and development or require the person to pay a fee to obtain qualifications to join conditions and obtain benefits. April 21, 1998, the Chinese government announced a total ban on pyramid schemes, issued "Notice on the prohibition of marketing and business activities of pyramid selling." In document[7],the author provides an example of pyramid selling,shown in figure 1. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 Figure 1. Typical example of pyramid selling. This example of this pyramid is divided into four layers, the first layer is only one node; layer 2 has five nodes connected to the node 1; Layer 3 is the number of connected nodes 7-17, connecting respectively with the second layer node; such as the nodes 12, 13 which are connected to the node 4; layer 4 is the reference numerals 18 to 44 nodes, respectively, up to the third layer is connected to a node. NetDraw with network analysis and found that the two parameters Out2Local four networks, 524

in-harmonic Closeness difference is relatively large, the specific data are shown in Table 1. Table 1. Parameters of 4-layer MLM organization. Layer Node number Out2Local In-Harmonic Closeness First layer 1 11 0 Second layer 2-6 8 2 7 2 8 1 Third layer 7-17 0 1.5 Forth layer 18-44 0 1.833 Out2Local is a parameter which represents the sum of number of all neighbors neighbors and can also be understood as the total number of nodes which is 2 distance away from each other. In Figure 1, choosing Node 3 as an example, we consider a directed graph with node 3 from the node 2 is only 26 and 27, the node Out2Local 3 to 2. As what can be seen from Table 1, the first layer Out2Local is maximum and Out2Local of layer 3,4 is zero. Closeness, tightness of Closeness is mainly related with the concept of center which is measured by the distance between the vertices of each figure. When number of closeness becomes greater, the apex lives nearer the center of the network, indicating a more important role. By considering a directed graph, we can calculate the In-Closeness and Out-Closeness of the model. Harmonic Closeness is a similar index as Closeness. In-Harmonic Closeness is defined as: sum of reciprocals of lengths of incoming geodesic paths. Choosing the node 14 in Figure 1 as an example, there are two paths to the node 14, one arrives directly from node 5, the length is one; the other one starts from node 1 to node 5 then arrives node 14, the length is 2. Finally, we calculate the reciprocal number of the two lengths and put them together and get 1.5. From Table 1, we found that the in-harmonic Closeness of first layer is 0, the second layer is 1, layer 3 is 1.5, 4th floor is 1.833. Structural Analysis of 911 Hijacking Organization September 11, 2001 morning, two hijacked airliners rammed first and second building of the World Trade Center in New York, two buildings collapsed one after another after the attack in the World Trade Center while the remaining five buildings are also destroyed by the collapse; 9 pm, another hijacked airliner crashed into the US Department of Defense in Washington the Pentagon, Pentagon localized structural damage and collapse. 10:02:23, United Airlines Flight 93 crashed at 580 miles an hour on the Pennsylvania Shanks Weir an open space, away from Washington, DC, only about 20 minutes of flight time. Our data come from the literature[8]. The definition of a network of community structure has not yet been widely recognized and the one that more commonly used is based on the definition of the relative frequency of connections: a network of vertices can be divided into groups, the group connection between dense and sparse group connection. We, use Girvan-Newman algorithm to module number of different societies (Q-value), when the community is 4, the module is highest. We organize the data in Table 2. Through line 1 to 4 are the names of the terrorists, community number, degree, where the aircraft. Table marked only four Leader (pilot) degree. 525

Table 2. 911 hijacking members of the network packet, the degree and location Flights. Name Group Degree Flight Name Group Degree Flight aalghamdi 2 175 halghamdi 2 175 alhaznawi 2 93 hanjour 4 10 77 almihdhar 4 77 jarrah 1 7 93 alnami 2 93 malshehri 3 175 alomari 3 11 moqed 4 77 al-shehhi 1 12 175 nalhazmi 4 77 alshehri 3 11 salghamdi 2 93 alsuqami 3 11 salhazmi 4 77 atta 1 14 11 walshehri 3 11 banihammad 3 175 We found that degree of four leaders among the total 19 people are located in position 1,2,3,5, and partitioned in four flights. We also found that the number of communities where the aircraft is not a one to one correspondence between the two which is shown in table 3. Table 3. Associations number and location of aircraft correspondence table. F175 F93 F77 F11 G1 1 1 1 G2 2 3 G3 2 4 G4 5 From the perspective of a criminal organization, the F93 can be considered not complete the task. Compared with several other flights, this aircraft allocated only four people, the other three flights are equipped with five people. Also consider parameters Degree. Degree is the degree of vertex refers to the number of edges and vertices associated. Leader jarrah's Degree is the lowest of four leaders, if this is also a factor. The center of Atta HAS the highest degree, approximately at the center which confirmed Mohamed Atta was a leader figure. Structural Analysis of Cross-border Drug Trafficking Organizations Drug crime is an anti-narcotics legislation and undermine anti-drug control activities, should be subject to criminal law punishment. The cross-border drug crime refers to drug-related crime happen between state and country. Cross-border drug-related crimes is one of the prominent factors which destroyed national security and stability of the border. Huanghui Xia has studied cross-border drug crime organization structure for a long period [3] [9], we briefly describe her results here. Source is a typical case of Chinese Public Security Border Defense Criminal Investigative Selected from 1999 to 2006 data. Software tools are UCINET. When Huanghui Xia analyzed data of border drug trafficking organizations in recent years, she also found that the characteristics of a criminal organization has a network structure. Through the study of cross-border drug crime, she got2 the following conclusions: 526

1) In a network of cross-border drug-related crimes, the majority of cross-border drug crime network is similar to the small-world networks. Most of the cross-border drug crime cases are available to run the group through operating crimes and attracting new members. Small average distance also showed a weak relationship between their widespread network which connects different small groups. For each internal relatively homogeneous, small groups can provide and expand the channels of communication. 2) The number of cross-border network of small groups is proportional to that of drug-related crime; cross-border criminal networks of drug groups and intermediary network size also showed a positive correlation.a smaller network has lower possibility to keep information and make it be monopolized by few people.while a larger network has higher possibility to keep information among a small group of members. That is, more complex networks are more likely to maintain the presence of an intermediary link between small groups than a simple network. 3) After the study, authors found that when public security combat cross-border drug-related crimes in the network, the organization is more likely to develop a certain degree of elasticity of the network of anti-strike. Thus, in the case of the investigation cannot be limited to operations associated with a greater degree of criminal suspects, and to simultaneously focus on those larger intermediary, that play an important role in the maintenance of the suspects on the association of the network. 4) The main point of cross-border drug crime network to maintain network resiliency is that crime keeps an important basic role/position, and cross-border drug crime networks remain an important role/position or not, and their advantageous position in the network has a policy network with close relationship. DISCUSSION Compared with three former examples in this article, we find that different types of criminal organizations don t have the same structures. The main reason for this difference is due to two factors: criminal organizations efficiency and safety, which is a contradiction of factors. Evan. W. M. (2001) believes that the typical criminal networks have topology chain, star and mesh structure[10], which we acknowledge, let each of the three previous example of the structure and efficiency of safety discussion. Pyramid Selling Organization Pyramid selling organization belongs to close networks with significant hierarchy, high efficiency and low security. The crime summit is the central figure in the network, like the sun surrounded by the planets and members of the network only get contact with the central figure. However, the members rarely have contact with each other, any one point to another point is associated with the occurrence of all through the central node. Such an organization has a clear structure, simple operation mode, high working-efficiency, but it is very risky. Once the core member is exposed, the entire criminal organizations can easily collapse. Terrorist Organizations Terrorist organizations generally have a long period of planning, organization and implementation of terrorist activities, so its consequences are very serious such as a 527

large number of casualties and economic losses. Therefore, this type of criminal organizations has a very high security requirements in the planning of terrorist activities of the organization and even one single mistake will lead to the destruction of the whole group. In these terrorist organizations, members are connected by the strong relationship, with a clear goal. But if once the network has been identified, each of grassroots organizations is relatively easy to be monitored and destructed when the entire terrorist network remains sound. A high degree of cohesiveness and lower degree of separation is not just to ensure the efficient transfer of information and other resources, even network members are in the event of large-scale change, it will not destroy the structure of the entire network. Thus, the random destruction of each member does not make any sense. Terrorist criminal organizations belong to a distributed network with significant network structure. Figure 2 is a network diagram of 911 hijacking which is depicted by us. From this figure we can find that the network is very sparse, even among members of the same team are far apart and the spacing of many team members beyond the critical value of the observation. If the distance between the two terrorists is no more than two steps, keeping constant distance between team members and between teams, terrorists can minimize damage caused by the arrest of other network members. As Osama bin Laden in his famous videotape said: "The Training of hijacking another person does not know, members of one team do not know the situation of the other teams." Figure 2. 911 hijacking organization's network diagram. In addition, Krebs, in his study, found that the 19 hijackers composed a large network of organizations which has shortest distance, the shortest average distance between members reached 4.75. This network structure ensures that even if one member is arrested by the police nor will the security of the entire organization be affected. Drug Trafficking Organizations Drug trafficking organization has a clear chain structure which is constituted by different interrelated groups. This network should be run by several gang leaders working together and be implemented. Each gang leader is responsible for the management and control of the gang members, and his or her control over the gang members is unique and exclusive. The network does not have a central figure who leads 528

authority decision, but as an important "middleman" or "gatekeepers", to get contact among several groups, coordination, communication, in order to maintain balance and operation of the network. CONCLUSION This paper reviews the research of criminal networks using social networking methods and the study of a number of scholars before. Then we briefly introduce the social network approach. Then we have three different types of criminal organizations structure of social network analysis, examples of 911 hijacking organization and direct sales organization. We carried out our own analysis and the analysis of drug-trafficking organizations is related with two papers of Professor Huanghui Xia. Finally, we discuss the efficiency and safety of different types of criminal organizations structure. Through the study of examples, we found that social network methods can get some accurate and interesting results. REFERENCES 1. Qin Zonggen, Organizational structure and trends of organized drug crime inquiry, May 2009. 2. Han Jinxia, Based MLM Network branch graph model, August 2006. 3. Huang Huixia, Organizational structure and network resiliency round of cross-border drug crime networks, March 2006. 4. Ma Fang, Social Network Analysis in organized crime research applications, April 2014. 5. Yacin Nadji, Manos Antonakakis, Roberto Perdisci, and Wenke Lee, Connected Colors: Unveiling the Structure of Criminal Networks 6. http://www.analytictech.com/ 7. Tang Yan, Based MLM Network branch graph model, Yunnan University of Finance and Economics master's degree thesis, 2012. 8. VE Krebs, Mapping Networks of Terrorist Cells, 24(3):43-52, 2002, INSNA. 9. Huang Huixia, Social network analysis of cross board drug crime organizations[j].journal of Chinese People s Public Security University (Social Sciences Edition), 2010, 143:29-40. 10. Evan, W. M. Anorganization set model of inter-organizational relations. In Interorganizational Decision-Making[M]. Chicago: Aldine Publishers, 2001: 181 200. 529