Pursuit on an Organized Crime Network
نویسندگان
چکیده
We model the hierarchal evolution of an organized criminal network via antagonistic recruitment and pursuit processes. Within the recruitment phase, a criminal kingpin enlists new members into the network, who in turn seek out other affiliates. New recruits are linked to established criminals according to a probability distribution that depends on the current network structure. At the same time, law enforcement agents attempt to dismantle the growing organization using ad-hoc pursuit strategies that initiate on the lower level nodes and that unfold as self-avoiding random walks. The global details of the organization are unknown to law enforcement, who must explore the hierarchy node by node. We halt the pursuit at a pre-set stopping time, encoding if and when an arrest should be made; the criminal network is assumed to be eradicated if the kingpin is arrested. We first analyze recruitment and study the large scale properties of the growing network; later we add pursuit and use numerical simulations to study the eradication probability in the case of three strategic stopping times, the time to first eradication and related costs. We find that eradication becomes increasingly costly as the network increases in size so the optimal way of arresting the kingpin is to intervene at the early stages of network formation. We discuss our results in the context of dark network disruption and their implications on possible law enforcement strategies.
منابع مشابه
Organized Crime in the United States: Trends and Issues for Congress
Organized crime threatens multiple facets of the United States, including the economy and national security. In fact, the Organized Crime Council was reconvened for the first time in 15 years to address this continued threat. Organized crime has taken on an increasingly transnational nature, and with more open borders and the expansion of the Internet, criminals endanger the United States not o...
متن کاملهمکاری های بین المللی اینترپل (با تاکید بر کنوانسیون بینالمللی مبارزه با قاچاق مواد مخدر و جنایات سازمان یافته فرامرزی)
Abstract: Interpol international cooperation (With emphasis on the International Convention on the fight against drug trafficking and transnational organized crime) Drug trafficking and international organized crime threat to the security of the international community and especially of humanity itself. In response to this issue is one of the most important measures to combat these crime...
متن کاملClandestine Partnerships?: The Link between Human Trafficking and Organized Crime in Metropolitan Atlanta
Since the enactment of the Trafficking Victims Protection Act of 2000, which directly criminalized human trafficking, research on human trafficking has significantly increased. While recent studies have analyzed trafficking legislation, characteristics of offenders and victims, and types of human trafficking rings, little data has been collected on human trafficking ties to organized crime. The...
متن کاملLearning, Predicting and Planning against Crime: Demonstration Based on Real Urban Crime Data (Demonstration)
Figure 1: DBN Crime in urban areas plagues every city in all countries. This demonstration will show a novel approach for learning and predicting crime patterns and planning against such crimes using real urban crime data. A notable characteristic of urban crime, distinct from organized terrorist attacks, is that most urban crimes are opportunistic in nature, i.e., criminals do not plan their a...
متن کاملInvestigative Data Mining and its Application in Counterterrorism
It is well recognized that advanced filtering and mining in information streams and intelligence bases are of key importance in investigative analysis for countering terrorism and organized crime. As opposed to traditional data mining aiming at extracting knowledge form data, mining for investigative analysis, called Investigative Data Mining (IDM), aims at discovering hidden instances of patte...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1510.08106 شماره
صفحات -
تاریخ انتشار 2015