A Software to Extract Criminal Networks from Unstructured Text in Spanish; the Case of Peruvian Criminal Networks

  • Raúl Silvestre CastilloEmail author
Conference paper
Part of the Studies in Computational Intelligence book series (SCI, volume 813)


Understanding criminal networks and their activities is relevant for law enforcement authorities (LEAs) to comprehend their complex structures before designing strategies to defeat them. However, getting information to understand these organizations is a difficult matter, which requires a meticulous method to discover and to map the relationships between criminal organizations’ members. In this paper, a software to support this process is presented. This software ingests unstructured text written in Spanish, i.e. journalistic articles, and provides a pipeline, which includes Named Entity Recognition (NER), Named Entity Classification (NEC), clustering and co-occurrence to generate a graph. This graph can be analyzed using Social Network Analysis (SNA) getting insights about a criminal organization under investigation. Furthermore, a Peruvian criminal network is analyzed using this software and its outcomes are compared with publicly available results produced by Peruvian LEAs.


Law enforcement authorities (LEA) Named entity recognition (NER) Named entity classification (NEC) Clustering Co-Occurrence Social network analysis (SNA) 


  1. 1.
    Referencesvan Dun, M.: Exploring narco-sovereignty/violence: Analyzing illegal networks, crime, violence, and legitimation in a Peruvian cocaine enclave (2003–2007). J. Contemp. Ethnogr. 43(4), 395–418 (2014)CrossRefGoogle Scholar
  2. 2.
    Teirilä, O.J.: The challenges to cooperation posed by the nexus of terrorism and organized crime: comparing the situations between the andean and the sahel regions, studies in conflict & terrorism 37(1) 18 (2014)Google Scholar
  3. 3.
    Morselli, C.: Inside Criminal Networks. Springer, New York (2009)CrossRefGoogle Scholar
  4. 4.
    Klerks, Peter: The Network Paradigm Applied to Criminal Organisations: Theoretical nitpicking or a relevant doctrine for investigators? Recent developments in the Netherlands. Connections 24, 53–65 (2001)Google Scholar
  5. 5.
    Ferrara, E., De Meo, P., Catanese, S., Fiumara, G.: Visualizing criminal networks reconstructed from mobile phone records, arXiv, EBSCOhost (2014)Google Scholar
  6. 6.
    Jennifer, X., Hsinchun, C.: Criminal network analysis and visualization. Commun. ACM 48(6), 100–107 (2005)CrossRefGoogle Scholar
  7. 7.
    Lu, Y., Polgar, M., Luo, X., Cao, Y.: Social network analysis of a criminal hacker community. J. Comput. Inf. Syst. 51(2), 31–41 (2010)Google Scholar
  8. 8.
    Al-Zaidy, R., Fung, B., Youssef, A., Fortin, F.: Mining criminal networks from unstructured text documents. Digit. Investig. 8, 147–160 (2012)CrossRefGoogle Scholar
  9. 9.
    Campbell, William M., Dagli, Charlie K., Weinstein, Clifford J.: Social network analysis with content and graphs. Lincoln Lab. J. 20(1), 61–81 (2013)Google Scholar
  10. 10.
    Fürnkranz, J., Scheffer, T., Spiliopoulou, M., Jian, H., Ertekin, S., Giles, C.: Efficient name disambiguation for large-scale databases. In: Knowledge Discovery in Databases: PKDD, p. 536 (2006)Google Scholar
  11. 11.
    Padró, L., Stanilovsky, E.: FreeLing 3.0: towards wider multilinguality. In: Proceed-ings of the Language Resources and Evaluation Conference ELRA. Istanbul, Turkey (2012)Google Scholar
  12. 12.
    Li, H.: Smile - Statistical Machine Intelligence & Learning Engine. (2016). Accessed 06 Aug 18
  13. 13.
    Carley K and Reminga J.: ORA: Organization Risk Analyzer. (2012). Accessed 06 Aug 18
  14. 14.
    Bastian, M., Heymann, S., Jacomy, M.: Gephi: an open source software for ex-ploring and manipulating networks. In: International AAAI Conference on Weblogs and Social Media (2009)Google Scholar
  15. 15.
    Castillo Castillo, R.: Analysing criminal organisations through the use of social network analysis. Dissertation, University of Liverpool (2016)Google Scholar
  16. 16.
    Ester, M., Kriegel, H., Sander, J., Xu, X.: A density-based algorithm for discovering clusters in large spatial databases with noise. In: International Conference On Knowledge Discovery And Data Mining, pp. 226–231 (1996)Google Scholar
  17. 17.
    Rajaraman, A.: Mining of Massive Datasets. 1 Edn. Cambridge University Press, Cambridge (2011)Google Scholar
  18. 18.
    McCulloh, I., Armstrong, H., Johnson, A.: Social Network Analysis with Applications. Wiley, Somerset (2013)Google Scholar
  19. 19.
    Peralta, A.: Peru’s Most Wanted Gangster Captured after 4 Months on the Run (2014). Accessed: 14 Dec 2016
  20. 20.
    Wohlgemuth, J., Matache, M.T.: Small-world properties of facebook group networks. Complex Syst. 23(3), 197–225 (2014)MathSciNetzbMATHGoogle Scholar
  21. 21.
    Ronnqvist, S., Sarlin, P.: Bank networks from text: interrelations, centrality and determinants. Quant. Financ. 15(10), 1619–1635 (2015)MathSciNetCrossRefGoogle Scholar
  22. 22.
    Klepac, G., Kopal, R., Mršić, L.: Social network metrics integration into fuzzy expert system and bayesian network for better data science solution performance. In: Banati, H., Bhattacharyya, S., Mani, A., Köppen, M. (eds.) Hybrid Intelligence for Social Networks. Springer, Cham (2017)Google Scholar
  23. 23.
    Peruvian Congress: Final Report of the Investigating Commission process of transfers of land from the Hermilio Valdizán Hospital and other events in which Mr. Rodolfo Orellana Rengifo is linked [In Spanish].$FILE/OFICIO-1644-01-2014-2015-CIOR-CR.pdf (2015). Accessed 12 Oct 2018

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Universidad Nacional Mayor de San Marcos (UNMSM)LimaPeru
  2. 2.University of LiverpoolLiverpoolUK

Personalised recommendations