Abstract
Nowadays it is difficult to imagine a modern person without such means of communication as the Internet and mobile communications. Almost all modern crimes starting from preparation and to commitment are carried out by using electronic means of communication and leave heterogeneous traces in cyberspace. In accordance with the law some of these tracks are collected and accumulated by law enforcement agencies. Because of large volumes of data they can’t be processed manually. Not long ago a separate scientific direction – analysis of social networks, with analysis of criminal networks as a subdivision, appeared at the crossing of sociology and the theory of complex networks. This paper proposes the structure of expert system aimed at detection and analysis of organized criminal groups on the basis of automatic data processing of billing information of mobile operators. A method is proposed which allows identify criminal groups based on a pool of regular social contacts in telephone communication networks. The proposed method was tested in real social and criminal networks and results are given in this paper. Methods of effective destructive actions planning and implementation of active operational measures in relation to organized crime are described. In addition, the author proposes the method of disclosing internal structure of criminal networks, based on the modification of the famous search algorithm of relevant web pages.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: Ukrainian Scientific Journal of Information Security
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.