Experiencing the Detection of Radicalized Criminals on Facebook Social Network and Data-related Issues

  • Andrea Tundis Department of Computer Science, Technische Universität Darmstadt (TUDA), Darmstadt, Germany
  • Leon Böck Department of Computer Science, Technische Universität Darmstadt (TUDA), Darmstadt, Germany
  • Victoria Stanilescu Siemens AG, Marburg, Germany
  • Max Mühlhäuser Department of Computer Science, Technische Universität Darmstadt (TUDA), Darmstadt, Germany
Keywords: Crime detection, Cyber-criminality, Online Social Networks Analysis, Radicalization, Terrorist Networks, Machine Learning, Internet-based crime

Abstract

Online social networks (OSNs) represent powerful digital tools to communicate and quickly disseminate information in a unofficial way. As they are freely accessible and easy to use, criminals abuse of them for achieving their purposes, for example, by spreading propaganda and radicalising people. Unfortunately, due to their vast usage, it is not always trivial to identify criminals using them unlawfully. Machine learning techniques have shown benefits in problem solving belonging to different application domains, when, due to the huge dimension in terms of data and variables to consider, it is not feasible their manual assessment. However, since the OSNs domain is relatively young, a variety of issues related to data availability makes it difficult to apply and immediately benefit from such techniques, in supporting the detection of criminals on OSNs. In this perspective, this paper wants to share the experience conducted in using a public dataset containing information related to criminals in order to both (i) extract specific features and to build a model for the detection of terrorists on Facebook social network, and (ii) to highlight the current limits. The research methodology as well as the gathered results are fully presented and then the data-related issues, emerged from this experience, are discussed ().

.

Downloads

Download data is not yet available.

Author Biographies

Andrea Tundis, Department of Computer Science, Technische Universität Darmstadt (TUDA), Darmstadt, Germany

Andrea Tundis is a Senior Researcher and his area of expertise are infrastructure protection, Internet organized crime and human safety. In 2014 he got a Ph.D. degree in Systems and Computer Science from the DIMES department at University of Calabria (Italy). He is currently working at Department of Computer Science at Technische Universität Darmstadt (TUDA) in Germany and member of the Telecooperation Division (TK). He is involved in a Horizon 2020 European research project on organized cyber-crime and terrorist networks by investigating on models and methods for the identification, prevention and response of Internet-based crimes.

Leon Böck, Department of Computer Science, Technische Universität Darmstadt (TUDA), Darmstadt, Germany

Leon Böck is a Ph.D. candidate at the Telecooperation Labs at Technische Universität Darmstadt. His research focus is detection, monitoring and prevention of Peer-to-Peer botnets. In addition to the technical aspects of his research, he is interested in the legal and privacy concerns related to fighting botnets and malware. He received his M.Sc. in computer science from TU Darmstadt in 2017 with a master thesis on the topic “On P2P botnet monitoring in adverse conditions”.

Victoria Stanilescu, Siemens AG, Marburg, Germany

Victoria Stanilescu is a master student at Technische Universität Darmstadt (TUDA), in Germany. She received her B.Sc. degree in Economics from the Municipal University of Chisinau, Moldova as well as a Bachelor degree in Informatics TUDA, in 2019. She is currently working as MES-Developer at Siemens AG.

Max Mühlhäuser, Department of Computer Science, Technische Universität Darmstadt (TUDA), Darmstadt, Germany

Max Mühlhäuser is a full professor at Technische Universität Darmstadt and head of Telecooperation Lab. He holds key positions in several large collaborative research centers and is leading the Doctoral School on Privacy and Trust for Mobile Users. He and his lab members conduct research on The Future Internet, Human Computer Interaction and Cybersecurity, Privacy & Trust. Max founded and managed industrial research centers, and worked as either professor or visiting professor at universities in Germany, the US, Canada, Australia, France, and Austria. He is a member of acatech, the German Academy of the Technical Sciences.

References

H. Abadinsky. Organized crime, 10th Ed. Wadsworth, Belmont, USA,

R. Adderley, A. Badii, and C. Wu. The automatic identification and prioritization

of criminal networks from police crime data, EuroISI 2008,

LNCS 5376, Springer-Verlag Berlin Heidelberg, pages 5–14, 2008.

R. Adderley and P. B. Mushgrove. Data mining case study: Modeling the

behavior of offenders who commit sexual assaults, ACM SIGKDD 2001

International Conference on Knowledge Discovery and Data Mining,

New York, pages 215–220, 2001.

M. Chau, J. Xu, and H. Chen. Extracting meaningful entities from

police narrative reports. In: National Conference on Digital Government

Research, 2001.

H. G. Goldberg and R.W. H.Wong. Restructuring transactional data for

link analysis. In: FinCEN AI System, AAAI Fall Symposium, 1998.

G. C. Oatley, J. Zeleznikov, and B. W. Ewart. Matching and predicting

crimes. At: AI2004-The 24th SGAI International Conference on

Knowledge Based Systems and Applications of Artificial Intelligence,

D. B. Skillicorn. Clusters within clusters: SVD and counterterrorism,

At: Workshop on Data Mining for Counterterrorism and Security, 2003.

A. Tundis, G. Bhatia, A. Jain, and M. Mühlhäuser. “Supporting the

Identification and the Assessment of Suspicious Users on Twitter Social

Media,” 2018 IEEE 17th International Symposium on Network Computing

and Applications (NCA), Cambridge, MA, 2018, pp. 1–10.

doi: 10.1109/NCA.2018.8548321.

J. Xu and H. Chen: CrimeNet Explorer: A Framework for Criminal

Network Knowledge Discovery. In: ACM Transactions on Information

Systems, Vol. 23, No. 2, pages 201–226, 2005.

J. Xu and H. Chen: Fighting Organised Crimes: using shortest-path

algorithms to identify associations in criminal networks. In: Decision

Support Systems, vol. 38, no. 3, pages 473–487, 2003.

J. Xu and H. Chen: The topology of dark networks. In: Communications

of the ACM, Vol. 51, No. 10, pages 58–65, 2008.

B. Wellman: The network community: An introduction. In B. Wellman

(Ed.). Networks in the Global Community, pages 1–47,Westview Press,

Boulder, USA, 1999.

W. Chung, E. Mustaine, and D. Zeng. “Criminal intelligence surveillance

and monitoring on social media: Cases of cyber-trafficking,” IEEE

International Conference on Intelligence and Security Informatics (ISI),

Beijing, 2017, pp. 191–193. doi: 10.1109/ISI.2017.8004908.

T. De Smedt, G. De Pauw and P. Van Ostaeyen, 2018. Automatic

Detection of Online Jihadist Hate Speech. In Computational Linguistics

and Psycholinguistics.

M. M. Janeela Theresa and V. Joseph Raj, 2011. “Analogy making in

criminal law with neural network,” International Conference on Emerging

Trends in Electrical and Computer Technology, Nagercoil, 2011,

pp. 772–775. doi: 10.1109/ICETECT.2011.5760222.

L. Kaati, E. Omer, N. Prucha, and A. Shrestha, 2015. “Detecting Multipliers

of Jihadism on Twitter,” IEEE International Conference on Data

MiningWorkshop (ICDMW), Atlantic City, NJ, 2015, pp. 954–960. doi:

1109/ICDMW.2015.9.

Q. A. Memon and S. Mehboob, 2003. “Crime investigation and analysis

using neural nets,” 7th International Multi Topic Conference, Islamabad,

pp. 346–350. doi: 10.1109/INMIC.2003.1416748.

M. Nakib, R. T. Khan, M. S. Hasan, and J. Uddin, 2018. “Crime Scene

Prediction by Detecting Threatening Objects Using Convolutional Neural

Network,” Int. Conference on Computer, Communication, Chemical,

Material and Electronic Engineering (IC4ME2), Rajshahi, 2018,

pp. 1–4. doi: 10.1109/IC4ME2.2018.8465583.

D. Parekh, A. Amarasingam, L. Dawson, and D. Ruths, 2018. Studying

Jihadists on Social Media: A Critique of Data Collection Methodologies.

In: Perspectives on Terrorism, vol. 12(3).

R. R. Petersen. 2013. Criminal network investigation is all about hypertext.

SIGWEB Newsl. Autumn, Article 2 (September 2013), 7 pages.

doi: 10.1145/2528272.2528274.

M. A. Rashidan, Y. M. Mustafah, S. B. A. Hamid, N. A. Zainuddin, and

N. N. A. Aziz, 2014. “Detection of Different Classes Moving Object in

Public Surveillance Using Artificial Neural Network (ANN),” International

Conference on Computer and Communication Engineering, Kuala

Lumpur, 2014, pp. 240–242. doi: 10.1109/ICCCE.2014.75.

S. Sava¸s and N. Topaloˇglu, 2017. “Crime intelligence from social

media: A case study,” IEEE 14th International Scientific Conference

on Informatics, Poprad, 2017, pp. 313–317. doi: 10.1109/INFORMATICS.

8327266.

JJATT 2018 – John Jay & ARTIS Transnational Terrorism Database –

online availabe at http://doitapps.jjay.cuny.edu/jjatt/attributes.php.

F. Ozgul and Z. Erdem. 2012. Detecting Criminal Networks Using

Social Similarity. In Proceedings of the 2012 International Conference

on Advances in Social Networks Analysis and Mining (ASONAM

(ASONAM’12). IEEE Computer Society,Washington, DC, USA,

–585. doi: 10.1109/ASONAM.2012.98.

F. Ozgul, Z. Erdem, C. Bowerman, and J. Bondy (2010). Combined

Detection Model for Criminal Network Detection. In: Chen H., Chau

M., Li S., Urs S., Srinivasa S.,Wang G.A. (eds) Intelligence and Security

Informatics. PAISI 2010. Lecture Notes in Computer Science, vol 6122.

Springer, Berlin, Heidelberg.

F. Ozgul, M. Gok, Z. Erdem, and Y. Ozal (2012). Detecting criminal

networks: SNA models are compared to proprietary models. 156–158.

1109/ISI.2012.6284278.

A. Berzinji, F. S. Abdullah, and A. H. Kakei, “Analysis of Terrorist

Groups on Facebook,” 2013 European Intelligence and Security

Informatics Conference, Uppsala, 2013.

A. T. Chatfield, C. G. Reddick, and U. Brajawidagda, “Tweeting propaganda,

radicalization and recruitment: Islamic state supporters multisided

twitter networks,” in Proceedings of the 16th Annual International

Conference on Digital Government Research. ACM, 2015.

R. A. Bates, “Dancing with wolves: Today’s lone wolf terrorists,” The

Journal of Public and Professional Sociology, vol. 4, no. 1: p. 1, 2012.

D. Masciandaro, Global financial crime: terrorism, money laundering

and offshore centres. Taylor & Francis, 2017.

G. Cheng and X. Tong, “Fuzzy Clustering Multiple Kernel Support

Vector Machine,” 2018 International Conference on Wavelet Analysis

and Pattern Recognition (ICWAPR), Chengdu, 2018, pp. 7–12.

P. Perner, “How to Compare and Interpret Two Learnt Decision

Trees from the Same Domain?” 2013 27th International Conference

on Advanced Information Networking and Applications Workshops,

Barcelona, 2013, pp. 318–322.

L. Q. Yu and F. S. Rong, “Stock Market Forecasting Research Based on

Neural Network and Pattern Matching,” 2010 International Conference

on E-Business and E-Government, Guangzhou, 2010, pp. 1940–1943.

Valencia Local Police – Online http://www.carismand.eu/valencia-city

-council-local-police-plv-spain.html - http://forensor-project.eu/author

/josdie/.

R. Borum. Radicalization into Violent Extremism I: A Review of Social

Science Theories. Journal of Strategic Security. Vol. 4 Issue 4. (2011)

pp. 7–36.

A. P. Schmid (2013-03-27). “Radicalisation, De-Radicalisation,

Counter-Radicalisation: A Conceptual Discussion and Literature

Review”. The International Centre for Counter-Terrorism – The Hague

(ICCT).

TAKEDOWN – A EU H2020 Research project – Online available at

https://www.takedownproject.eu/.

Vincenzo Ruggiero, “Organized Crime and Terrorist Networks”,

London, Routledge, 1st Edition, 2019, pp. 220, doi: 10.4324/

S. Kavitha, S. Varuna, and R. Ramya. “A comparative analysis on

linear regression and support vector regression”. In Proceedings of

the 2016 Online International Conference on Green Engineering and

Technologies (IC-GET), Kuala Lumpur, Malaysia, 25–27 July 2016;

pp. 1–5.

L. Burita, “Information Analysis on Facebook,” 2019 Communication

and Information Technologies (KIT), Vysoke Tatry, Slovakia, 2019,

pp. 1–5. doi: 10.23919/KIT.2019.8883471.

J. Clement, Statista – November 2019. https://www.statista.com/statist

ics/264810/number-of-monthly-active-facebook-users-worldwide/.

A. Moltzau, Towards Data Science – July 2019. https://towardsdatasci

ence.com/artificial-intelligence-and-terrorism-in-social-media-cf166

adaf78e.

J. Hu, M. Liu, and J. Zhang, “A semantic model for academic social network

analysis,” 2014 IEEE/ACM International Conference on Advances

in Social Networks Analysis and Mining (ASONAM 2014), Beijing,

, pp. 310–313. doi: 10.1109/ASONAM.2014.6921602.

N. Akhtar, H. Javed, and G. Sengar, “Analysis of Facebook Social

Network,” 2013 5th International Conference and Computational Intelligence

and Communication Networks, Mathura, 2013, pp. 451–454. doi:

1109/CICN.2013.99.

A. Berzinji, F. S. Abdullah, and A. H. Kakei, “Analysis of

Terrorist Groups on Facebook,” 2013 European Intelligence and

Security Informatics Conference, Uppsala, 2013, pp. 221–221.

doi: 10.1109/EISIC.2013.53.

C. Aliprandi, et al. “CAPER: Crawling and analysing Facebook for

intelligence purposes,” 2014 IEEE/ACM International Conference on

Advances in Social Networks Analysis and Mining (ASONAM 2014),

Beijing, 2014, pp. 665–669. doi: 10.1109/ASONAM.2014.6921656.

M. Ketcham, T. Ganokratanaa, and S. Bansin, “The Forensic

Algorithm on Facebook Using Natural Language Processing,”

12th International Conference on Signal-Image Technology &

Internet-Based Systems (SITIS), Naples, 2016, pp. 624–627. doi:

1109/SITIS.2016.103.

CHAMPIONs – A European Union’s Internal Security Fund – Police

research project – Online available at https://www.championsproject.

eu/.

ARMOUR – A European Union’s Internal Security Fund – Police

research project – Online available at https://www.armourproject.eu/.

CARPER – A Seventh Framework Programme for Research and Technological

Development – Online available at http://www.fp7-caper.

eu/.

S.Wagstyl, G. Chazan, and T. Buck, ‘MerkelWins Fourth Term but Far-

Right Populists Make Gains’, Financial Times. Sep 25, 2017. Online

available at https://www.ft.com/content/12de72a0-a11c-11e7-9e4f-7f5

e6a7c98a2.

G. Delanty (2017). A divided nation in a divided Europe: Emerging

cleavages and the crisis of European integration. Brexit: Sociological

Responses, p.113.

A. Tundis, G. Bhatia, A. Jain, and M. Mühlhäuser, “Supporting the

Identification and the Assessment of Suspicious Users on Twitter Social

Media,” Proceeding of the IEEE 17th International Symposium on

Network Computing and Applications (NCA), Cambridge, MA, 2018,

pp. 1–10. doi: 10.1109/NCA.2018.8548321.

A. Tundis, A. Jain, G. Bhatia, and M. Muhlhauser, “Similarity Analysis

of Criminals on Social Networks: An Example on Twitter,”

Proceeding of the 28th International Conference on Computer Communication

and Networks (ICCCN), Valencia, Spain, 2019, pp. 1–9.

doi: 10.1109/ICCCN.2019.8847028.

A. Tundis and M. Mühlhäuser, “A multi-language approach towards the

identification of suspicious users on social networks,” Proceeding of the

International Carnahan Conference on Security Technology (ICCST),

Madrid, 2017, pp. 1–6. doi: 10.1109/CCST.2017.8167794.

A. Tundis and M. Mühlhäuser, “The role of Information and Communication

Technology (ICT) in modern criminal organizations.” Book

Chapter in: Organized Crime and Terrorist Networks, London, Routledge,

doi: 10.4324/9780429435102.

V. Jirovský, A. Pastorek, A. Tundis, and Max Mühlhäuser. “Cybercrime

and Organized Crime,” Proceeding of the International Conference on

Availability, Reliability and Security (ARES 2018), Hamburg, Germany,

August 27–30, 2018, doi: 10.1145/3230833.3233288.

A. Tundis, W. Mazurczyk, and M. Mühlhäuser. “A review of network

vulnerabilities scanning tools: types, capabilities and functioning.”

Proceeding of the International Conference on Availability, Reliability

and Security (ARES 2018), Hamburg, Germany, August 27–30, 2018,

doi: 10.1145/3230833.3233287.

A. Tundis, L. Böck, V. Stanilescu and M. Mühlhäuser. “Limits in

the data for detecting criminals on social media,” Proceeding of

the International Conference on Availability, Reliability and Security

(ARES 2019), Kent, Canterbury, UK, August 26–29, 2019. doi:

1145/3339252.3341483.

Published
2020-01-29
Section
ARES 2019 workshops