Abstract
Understanding criminal networks and their activities is relevant for law enforcement authorities (LEAs) to comprehend their complex structures before designing strategies to defeat them. However, getting information to understand these organizations is a difficult matter, which requires a meticulous method to discover and to map the relationships between criminal organizations’ members. In this paper, a software to support this process is presented. This software ingests unstructured text written in Spanish, i.e. journalistic articles, and provides a pipeline, which includes Named Entity Recognition (NER), Named Entity Classification (NEC), clustering and co-occurrence to generate a graph. This graph can be analyzed using Social Network Analysis (SNA) getting insights about a criminal organization under investigation. Furthermore, a Peruvian criminal network is analyzed using this software and its outcomes are compared with publicly available results produced by Peruvian LEAs.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Referencesvan Dun, M.: Exploring narco-sovereignty/violence: Analyzing illegal networks, crime, violence, and legitimation in a Peruvian cocaine enclave (2003–2007). J. Contemp. Ethnogr. 43(4), 395–418 (2014)
Teirilä, O.J.: The challenges to cooperation posed by the nexus of terrorism and organized crime: comparing the situations between the andean and the sahel regions, studies in conflict & terrorism 37(1) 18 (2014)
Morselli, C.: Inside Criminal Networks. Springer, New York (2009)
Klerks, Peter: The Network Paradigm Applied to Criminal Organisations: Theoretical nitpicking or a relevant doctrine for investigators? Recent developments in the Netherlands. Connections 24, 53–65 (2001)
Ferrara, E., De Meo, P., Catanese, S., Fiumara, G.: Visualizing criminal networks reconstructed from mobile phone records, arXiv, EBSCOhost (2014)
Jennifer, X., Hsinchun, C.: Criminal network analysis and visualization. Commun. ACM 48(6), 100–107 (2005)
Lu, Y., Polgar, M., Luo, X., Cao, Y.: Social network analysis of a criminal hacker community. J. Comput. Inf. Syst. 51(2), 31–41 (2010)
Al-Zaidy, R., Fung, B., Youssef, A., Fortin, F.: Mining criminal networks from unstructured text documents. Digit. Investig. 8, 147–160 (2012)
Campbell, William M., Dagli, Charlie K., Weinstein, Clifford J.: Social network analysis with content and graphs. Lincoln Lab. J. 20(1), 61–81 (2013)
Fürnkranz, J., Scheffer, T., Spiliopoulou, M., Jian, H., Ertekin, S., Giles, C.: Efficient name disambiguation for large-scale databases. In: Knowledge Discovery in Databases: PKDD, p. 536 (2006)
Padró, L., Stanilovsky, E.: FreeLing 3.0: towards wider multilinguality. In: Proceed-ings of the Language Resources and Evaluation Conference ELRA. Istanbul, Turkey (2012)
Li, H.: Smile - Statistical Machine Intelligence & Learning Engine. http://haifengl.github.io/smile (2016). Accessed 06 Aug 18
Carley K and Reminga J.: ORA: Organization Risk Analyzer. http://www.casos.cs.cmu.edu/projects/ora/publications.php (2012). Accessed 06 Aug 18
Bastian, M., Heymann, S., Jacomy, M.: Gephi: an open source software for ex-ploring and manipulating networks. In: International AAAI Conference on Weblogs and Social Media (2009)
Castillo Castillo, R.: Analysing criminal organisations through the use of social network analysis. Dissertation, University of Liverpool (2016)
Ester, M., Kriegel, H., Sander, J., Xu, X.: A density-based algorithm for discovering clusters in large spatial databases with noise. In: International Conference On Knowledge Discovery And Data Mining, pp. 226–231 (1996)
Rajaraman, A.: Mining of Massive Datasets. 1 Edn. Cambridge University Press, Cambridge (2011)
McCulloh, I., Armstrong, H., Johnson, A.: Social Network Analysis with Applications. Wiley, Somerset (2013)
Peralta, A.: Peru’s Most Wanted Gangster Captured after 4 Months on the Run https://panampost.com/adriana-peralta/2014/11/14/perus-most-wanted-gangster-captured-after-4-months-on-the-run (2014). Accessed: 14 Dec 2016
Wohlgemuth, J., Matache, M.T.: Small-world properties of facebook group networks. Complex Syst. 23(3), 197–225 (2014)
Ronnqvist, S., Sarlin, P.: Bank networks from text: interrelations, centrality and determinants. Quant. Financ. 15(10), 1619–1635 (2015)
Klepac, G., Kopal, R., Mršić, L.: Social network metrics integration into fuzzy expert system and bayesian network for better data science solution performance. In: Banati, H., Bhattacharyya, S., Mani, A., Köppen, M. (eds.) Hybrid Intelligence for Social Networks. Springer, Cham (2017)
Peruvian Congress: Final Report of the Investigating Commission process of transfers of land from the Hermilio Valdizán Hospital and other events in which Mr. Rodolfo Orellana Rengifo is linked [In Spanish]. http://www2.congreso.gob.pe/Sicr/TraDocEstProc/Contdoc03_2011.nsf/dff31fef3f6852be05257e22000b22a3/79ea045bc0af47b205257f1c000480a4/$FILE/OFICIO-1644-01-2014-2015-CIOR-CR.pdf (2015). Accessed 12 Oct 2018
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Silvestre Castillo, R. (2019). A Software to Extract Criminal Networks from Unstructured Text in Spanish; the Case of Peruvian Criminal Networks. In: Aiello, L., Cherifi, C., Cherifi, H., Lambiotte, R., Lió, P., Rocha, L. (eds) Complex Networks and Their Applications VII. COMPLEX NETWORKS 2018. Studies in Computational Intelligence, vol 813. Springer, Cham. https://doi.org/10.1007/978-3-030-05414-4_1
Download citation
DOI: https://doi.org/10.1007/978-3-030-05414-4_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-05413-7
Online ISBN: 978-3-030-05414-4
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)