Disrupting resilient criminal networks through data analysis: The case of Sicilian Mafia
Compared to other types of social networks, criminal networks present particularly hard challenges, due to their strong resilience to disruption, which poses severe hurdles to Law-Enforcement Agencies (LEAs). Herein, we borrow methods and tools from Social Network Analysis (SNA) to (i) unveil the st...
Gespeichert in:
Veröffentlicht in: | PloS one 2020-08, Vol.15 (8), p.e0236476-e0236476 |
---|---|
Hauptverfasser: | , , , , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | e0236476 |
---|---|
container_issue | 8 |
container_start_page | e0236476 |
container_title | PloS one |
container_volume | 15 |
creator | Cavallaro, Lucia Ficara, Annamaria De Meo, Pasquale Fiumara, Giacomo Catanese, Salvatore Bagdasar, Ovidiu Song, Wei Liotta, Antonio |
description | Compared to other types of social networks, criminal networks present particularly hard challenges, due to their strong resilience to disruption, which poses severe hurdles to Law-Enforcement Agencies (LEAs). Herein, we borrow methods and tools from Social Network Analysis (SNA) to (i) unveil the structure and organization of Sicilian Mafia gangs, based on two real-world datasets, and (ii) gain insights as to how to efficiently reduce the Largest Connected Component (LCC) of two networks derived from them. Mafia networks have peculiar features in terms of the links distribution and strength, which makes them very different from other social networks, and extremely robust to exogenous perturbations. Analysts also face difficulties in collecting reliable datasets that accurately describe the gangs' internal structure and their relationships with the external world, which is why earlier studies are largely qualitative, elusive and incomplete. An added value of our work is the generation of two real-world datasets, based on raw data extracted from juridical acts, relating to a Mafia organization that operated in Sicily during the first decade of 2000s. We created two different networks, capturing phone calls and physical meetings, respectively. Our analysis simulated different intervention procedures: (i) arresting one criminal at a time (sequential node removal); and (ii) police raids (node block removal). In both the sequential, and the node block removal intervention procedures, the Betweenness centrality was the most effective strategy in prioritizing the nodes to be removed. For instance, when targeting the top 5% nodes with the largest Betweenness centrality, our simulations suggest a reduction of up to 70% in the size of the LCC. We also identified that, due the peculiar type of interactions in criminal networks (namely, the distribution of the interactions' frequency), no significant differences exist between weighted and unweighted network analysis. Our work has significant practical applications for perturbing the operations of criminal and terrorist networks. |
doi_str_mv | 10.1371/journal.pone.0236476 |
format | Article |
fullrecord | <record><control><sourceid>gale_plos_</sourceid><recordid>TN_cdi_plos_journals_2430651826</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><galeid>A631637441</galeid><doaj_id>oai_doaj_org_article_54be878aff9f4dbb9d48f15fca82c8ce</doaj_id><sourcerecordid>A631637441</sourcerecordid><originalsourceid>FETCH-LOGICAL-c735t-dbb6124153cb6e24945f7bc25431cec1eb3cb5030ff89ae1951314d5f115f1ca3</originalsourceid><addsrcrecordid>eNqNk1uL1DAUx4so7kW_gWBAEH2Ysbm23QdhWW8DKwvuKr6F0zRpM3aaMUlX99ubcapsZR8khISc3_mfCzlZ9gTnS0wL_GrtRj9Av9y6QS9zQgUrxL3sEFeULATJ6f1b94PsKIR1nnNaCvEwO6Ck4IJX5DD7-sYGP26jHVrkdbC91UNEytuNTeJo0PGH898Cip13Y9uhBiIgSKabYMMJuuo0UhA0cgZdWpXcYUAfwVh4lD0w0Af9eDqPs8_v3l6dfVicX7xfnZ2eL1RBeVw0dS0wYZhTVQtNWMW4KWpFOKNYaYV1nQw8p7kxZQUaVxxTzBpuME5bAT3Onu51t70LcmpKkITRXHBcEpGI1Z5oHKzlNpUG_kY6sPL3g_OtBB-t6rXkrNZlUYIxlWEptaphpUmBFJRElUonrddTtLHe6EalZnnoZ6Jzy2A72bprWbCcVxVJAi8mAe--jzpEubFB6b6HQbtxn3dVlLTECX32D3p3dRPVQirADsaluGonKk8FxYIWjO20lndQaTV6Y1X6Qcam95nDy5lDYqL-GVsYQ5Cry0__z158mbPPb7Gdhj52wfVjtG4Ic5DtQeVdCF6bv03GudwNwJ9uyN0AyGkA6C9tCfcr</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2430651826</pqid></control><display><type>article</type><title>Disrupting resilient criminal networks through data analysis: The case of Sicilian Mafia</title><source>DOAJ Directory of Open Access Journals</source><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><source>PubMed Central</source><source>Free Full-Text Journals in Chemistry</source><source>Public Library of Science (PLoS)</source><creator>Cavallaro, Lucia ; Ficara, Annamaria ; De Meo, Pasquale ; Fiumara, Giacomo ; Catanese, Salvatore ; Bagdasar, Ovidiu ; Song, Wei ; Liotta, Antonio</creator><contributor>Peel, Leto</contributor><creatorcontrib>Cavallaro, Lucia ; Ficara, Annamaria ; De Meo, Pasquale ; Fiumara, Giacomo ; Catanese, Salvatore ; Bagdasar, Ovidiu ; Song, Wei ; Liotta, Antonio ; Peel, Leto</creatorcontrib><description>Compared to other types of social networks, criminal networks present particularly hard challenges, due to their strong resilience to disruption, which poses severe hurdles to Law-Enforcement Agencies (LEAs). Herein, we borrow methods and tools from Social Network Analysis (SNA) to (i) unveil the structure and organization of Sicilian Mafia gangs, based on two real-world datasets, and (ii) gain insights as to how to efficiently reduce the Largest Connected Component (LCC) of two networks derived from them. Mafia networks have peculiar features in terms of the links distribution and strength, which makes them very different from other social networks, and extremely robust to exogenous perturbations. Analysts also face difficulties in collecting reliable datasets that accurately describe the gangs' internal structure and their relationships with the external world, which is why earlier studies are largely qualitative, elusive and incomplete. An added value of our work is the generation of two real-world datasets, based on raw data extracted from juridical acts, relating to a Mafia organization that operated in Sicily during the first decade of 2000s. We created two different networks, capturing phone calls and physical meetings, respectively. Our analysis simulated different intervention procedures: (i) arresting one criminal at a time (sequential node removal); and (ii) police raids (node block removal). In both the sequential, and the node block removal intervention procedures, the Betweenness centrality was the most effective strategy in prioritizing the nodes to be removed. For instance, when targeting the top 5% nodes with the largest Betweenness centrality, our simulations suggest a reduction of up to 70% in the size of the LCC. We also identified that, due the peculiar type of interactions in criminal networks (namely, the distribution of the interactions' frequency), no significant differences exist between weighted and unweighted network analysis. Our work has significant practical applications for perturbing the operations of criminal and terrorist networks.</description><identifier>ISSN: 1932-6203</identifier><identifier>EISSN: 1932-6203</identifier><identifier>DOI: 10.1371/journal.pone.0236476</identifier><identifier>PMID: 32756592</identifier><language>eng</language><publisher>San Francisco: Public Library of Science</publisher><subject>Computer and Information Sciences ; Connectivity ; Control ; Crime ; Data analysis ; Data mining ; Datasets ; Disruption ; Gangs ; Human capital ; Law enforcement ; Mafia ; Methods ; Network analysis ; Nodes ; Organized crime ; People and Places ; Police ; Social capital ; Social interactions ; Social network analysis ; Social networks ; Social organization ; Social Sciences ; Sociological research ; Supervision ; Telephone calls</subject><ispartof>PloS one, 2020-08, Vol.15 (8), p.e0236476-e0236476</ispartof><rights>COPYRIGHT 2020 Public Library of Science</rights><rights>2020 Cavallaro et al. This is an open access article distributed under the terms of the Creative Commons Attribution License: http://creativecommons.org/licenses/by/4.0/ (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><rights>2020 Cavallaro et al 2020 Cavallaro et al</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c735t-dbb6124153cb6e24945f7bc25431cec1eb3cb5030ff89ae1951314d5f115f1ca3</citedby><cites>FETCH-LOGICAL-c735t-dbb6124153cb6e24945f7bc25431cec1eb3cb5030ff89ae1951314d5f115f1ca3</cites><orcidid>0000-0003-1528-7203 ; 0000-0002-2367-6084 ; 0000-0003-4193-9842</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://www.ncbi.nlm.nih.gov/pmc/articles/PMC7405992/pdf/$$EPDF$$P50$$Gpubmedcentral$$Hfree_for_read</linktopdf><linktohtml>$$Uhttps://www.ncbi.nlm.nih.gov/pmc/articles/PMC7405992/$$EHTML$$P50$$Gpubmedcentral$$Hfree_for_read</linktohtml><link.rule.ids>230,314,723,776,780,860,881,2096,2915,23847,27903,27904,53769,53771,79346,79347</link.rule.ids></links><search><contributor>Peel, Leto</contributor><creatorcontrib>Cavallaro, Lucia</creatorcontrib><creatorcontrib>Ficara, Annamaria</creatorcontrib><creatorcontrib>De Meo, Pasquale</creatorcontrib><creatorcontrib>Fiumara, Giacomo</creatorcontrib><creatorcontrib>Catanese, Salvatore</creatorcontrib><creatorcontrib>Bagdasar, Ovidiu</creatorcontrib><creatorcontrib>Song, Wei</creatorcontrib><creatorcontrib>Liotta, Antonio</creatorcontrib><title>Disrupting resilient criminal networks through data analysis: The case of Sicilian Mafia</title><title>PloS one</title><description>Compared to other types of social networks, criminal networks present particularly hard challenges, due to their strong resilience to disruption, which poses severe hurdles to Law-Enforcement Agencies (LEAs). Herein, we borrow methods and tools from Social Network Analysis (SNA) to (i) unveil the structure and organization of Sicilian Mafia gangs, based on two real-world datasets, and (ii) gain insights as to how to efficiently reduce the Largest Connected Component (LCC) of two networks derived from them. Mafia networks have peculiar features in terms of the links distribution and strength, which makes them very different from other social networks, and extremely robust to exogenous perturbations. Analysts also face difficulties in collecting reliable datasets that accurately describe the gangs' internal structure and their relationships with the external world, which is why earlier studies are largely qualitative, elusive and incomplete. An added value of our work is the generation of two real-world datasets, based on raw data extracted from juridical acts, relating to a Mafia organization that operated in Sicily during the first decade of 2000s. We created two different networks, capturing phone calls and physical meetings, respectively. Our analysis simulated different intervention procedures: (i) arresting one criminal at a time (sequential node removal); and (ii) police raids (node block removal). In both the sequential, and the node block removal intervention procedures, the Betweenness centrality was the most effective strategy in prioritizing the nodes to be removed. For instance, when targeting the top 5% nodes with the largest Betweenness centrality, our simulations suggest a reduction of up to 70% in the size of the LCC. We also identified that, due the peculiar type of interactions in criminal networks (namely, the distribution of the interactions' frequency), no significant differences exist between weighted and unweighted network analysis. Our work has significant practical applications for perturbing the operations of criminal and terrorist networks.</description><subject>Computer and Information Sciences</subject><subject>Connectivity</subject><subject>Control</subject><subject>Crime</subject><subject>Data analysis</subject><subject>Data mining</subject><subject>Datasets</subject><subject>Disruption</subject><subject>Gangs</subject><subject>Human capital</subject><subject>Law enforcement</subject><subject>Mafia</subject><subject>Methods</subject><subject>Network analysis</subject><subject>Nodes</subject><subject>Organized crime</subject><subject>People and Places</subject><subject>Police</subject><subject>Social capital</subject><subject>Social interactions</subject><subject>Social network analysis</subject><subject>Social networks</subject><subject>Social organization</subject><subject>Social Sciences</subject><subject>Sociological research</subject><subject>Supervision</subject><subject>Telephone calls</subject><issn>1932-6203</issn><issn>1932-6203</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><sourceid>BENPR</sourceid><sourceid>DOA</sourceid><recordid>eNqNk1uL1DAUx4so7kW_gWBAEH2Ysbm23QdhWW8DKwvuKr6F0zRpM3aaMUlX99ubcapsZR8khISc3_mfCzlZ9gTnS0wL_GrtRj9Av9y6QS9zQgUrxL3sEFeULATJ6f1b94PsKIR1nnNaCvEwO6Ck4IJX5DD7-sYGP26jHVrkdbC91UNEytuNTeJo0PGH898Cip13Y9uhBiIgSKabYMMJuuo0UhA0cgZdWpXcYUAfwVh4lD0w0Af9eDqPs8_v3l6dfVicX7xfnZ2eL1RBeVw0dS0wYZhTVQtNWMW4KWpFOKNYaYV1nQw8p7kxZQUaVxxTzBpuME5bAT3Onu51t70LcmpKkITRXHBcEpGI1Z5oHKzlNpUG_kY6sPL3g_OtBB-t6rXkrNZlUYIxlWEptaphpUmBFJRElUonrddTtLHe6EalZnnoZ6Jzy2A72bprWbCcVxVJAi8mAe--jzpEubFB6b6HQbtxn3dVlLTECX32D3p3dRPVQirADsaluGonKk8FxYIWjO20lndQaTV6Y1X6Qcam95nDy5lDYqL-GVsYQ5Cry0__z158mbPPb7Gdhj52wfVjtG4Ic5DtQeVdCF6bv03GudwNwJ9uyN0AyGkA6C9tCfcr</recordid><startdate>20200805</startdate><enddate>20200805</enddate><creator>Cavallaro, Lucia</creator><creator>Ficara, Annamaria</creator><creator>De Meo, Pasquale</creator><creator>Fiumara, Giacomo</creator><creator>Catanese, Salvatore</creator><creator>Bagdasar, Ovidiu</creator><creator>Song, Wei</creator><creator>Liotta, Antonio</creator><general>Public Library of Science</general><general>Public Library of Science (PLoS)</general><scope>AAYXX</scope><scope>CITATION</scope><scope>IOV</scope><scope>ISR</scope><scope>3V.</scope><scope>7QG</scope><scope>7QL</scope><scope>7QO</scope><scope>7RV</scope><scope>7SN</scope><scope>7SS</scope><scope>7T5</scope><scope>7TG</scope><scope>7TM</scope><scope>7U9</scope><scope>7X2</scope><scope>7X7</scope><scope>7XB</scope><scope>88E</scope><scope>8AO</scope><scope>8C1</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FH</scope><scope>8FI</scope><scope>8FJ</scope><scope>8FK</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AEUYN</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>ATCPS</scope><scope>AZQEC</scope><scope>BBNVY</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>BHPHI</scope><scope>C1K</scope><scope>CCPQU</scope><scope>D1I</scope><scope>DWQXO</scope><scope>FR3</scope><scope>FYUFA</scope><scope>GHDGH</scope><scope>GNUQQ</scope><scope>H94</scope><scope>HCIFZ</scope><scope>K9.</scope><scope>KB.</scope><scope>KB0</scope><scope>KL.</scope><scope>L6V</scope><scope>LK8</scope><scope>M0K</scope><scope>M0S</scope><scope>M1P</scope><scope>M7N</scope><scope>M7P</scope><scope>M7S</scope><scope>NAPCQ</scope><scope>P5Z</scope><scope>P62</scope><scope>P64</scope><scope>PATMY</scope><scope>PDBOC</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PTHSS</scope><scope>PYCSY</scope><scope>RC3</scope><scope>7X8</scope><scope>5PM</scope><scope>DOA</scope><orcidid>https://orcid.org/0000-0003-1528-7203</orcidid><orcidid>https://orcid.org/0000-0002-2367-6084</orcidid><orcidid>https://orcid.org/0000-0003-4193-9842</orcidid></search><sort><creationdate>20200805</creationdate><title>Disrupting resilient criminal networks through data analysis: The case of Sicilian Mafia</title><author>Cavallaro, Lucia ; Ficara, Annamaria ; De Meo, Pasquale ; Fiumara, Giacomo ; Catanese, Salvatore ; Bagdasar, Ovidiu ; Song, Wei ; Liotta, Antonio</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c735t-dbb6124153cb6e24945f7bc25431cec1eb3cb5030ff89ae1951314d5f115f1ca3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><topic>Computer and Information Sciences</topic><topic>Connectivity</topic><topic>Control</topic><topic>Crime</topic><topic>Data analysis</topic><topic>Data mining</topic><topic>Datasets</topic><topic>Disruption</topic><topic>Gangs</topic><topic>Human capital</topic><topic>Law enforcement</topic><topic>Mafia</topic><topic>Methods</topic><topic>Network analysis</topic><topic>Nodes</topic><topic>Organized crime</topic><topic>People and Places</topic><topic>Police</topic><topic>Social capital</topic><topic>Social interactions</topic><topic>Social network analysis</topic><topic>Social networks</topic><topic>Social organization</topic><topic>Social Sciences</topic><topic>Sociological research</topic><topic>Supervision</topic><topic>Telephone calls</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Cavallaro, Lucia</creatorcontrib><creatorcontrib>Ficara, Annamaria</creatorcontrib><creatorcontrib>De Meo, Pasquale</creatorcontrib><creatorcontrib>Fiumara, Giacomo</creatorcontrib><creatorcontrib>Catanese, Salvatore</creatorcontrib><creatorcontrib>Bagdasar, Ovidiu</creatorcontrib><creatorcontrib>Song, Wei</creatorcontrib><creatorcontrib>Liotta, Antonio</creatorcontrib><collection>CrossRef</collection><collection>Gale In Context: Opposing Viewpoints</collection><collection>Gale In Context: Science</collection><collection>ProQuest Central (Corporate)</collection><collection>Animal Behavior Abstracts</collection><collection>Bacteriology Abstracts (Microbiology B)</collection><collection>Biotechnology Research Abstracts</collection><collection>Nursing & Allied Health Database</collection><collection>Ecology Abstracts</collection><collection>Entomology Abstracts (Full archive)</collection><collection>Immunology Abstracts</collection><collection>Meteorological & Geoastrophysical Abstracts</collection><collection>Nucleic Acids Abstracts</collection><collection>Virology and AIDS Abstracts</collection><collection>Agricultural Science Collection</collection><collection>Health & Medical Collection</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Medical Database (Alumni Edition)</collection><collection>ProQuest Pharma Collection</collection><collection>Public Health Database</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Natural Science Collection</collection><collection>Hospital Premium Collection</collection><collection>Hospital Premium Collection (Alumni Edition)</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>Materials Science & Engineering Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest One Sustainability</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>Agricultural & Environmental Science Collection</collection><collection>ProQuest Central Essentials</collection><collection>Biological Science Collection</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>Natural Science Collection</collection><collection>Environmental Sciences and Pollution Management</collection><collection>ProQuest One Community College</collection><collection>ProQuest Materials Science Collection</collection><collection>ProQuest Central Korea</collection><collection>Engineering Research Database</collection><collection>Health Research Premium Collection</collection><collection>Health Research Premium Collection (Alumni)</collection><collection>ProQuest Central Student</collection><collection>AIDS and Cancer Research Abstracts</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Health & Medical Complete (Alumni)</collection><collection>Materials Science Database</collection><collection>Nursing & Allied Health Database (Alumni Edition)</collection><collection>Meteorological & Geoastrophysical Abstracts - Academic</collection><collection>ProQuest Engineering Collection</collection><collection>ProQuest Biological Science Collection</collection><collection>Agricultural Science Database</collection><collection>Health & Medical Collection (Alumni Edition)</collection><collection>Medical Database</collection><collection>Algology Mycology and Protozoology Abstracts (Microbiology C)</collection><collection>Biological Science Database</collection><collection>Engineering Database</collection><collection>Nursing & Allied Health Premium</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>Biotechnology and BioEngineering Abstracts</collection><collection>Environmental Science Database</collection><collection>Materials Science Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>Engineering Collection</collection><collection>Environmental Science Collection</collection><collection>Genetics Abstracts</collection><collection>MEDLINE - Academic</collection><collection>PubMed Central (Full Participant titles)</collection><collection>DOAJ Directory of Open Access Journals</collection><jtitle>PloS one</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Cavallaro, Lucia</au><au>Ficara, Annamaria</au><au>De Meo, Pasquale</au><au>Fiumara, Giacomo</au><au>Catanese, Salvatore</au><au>Bagdasar, Ovidiu</au><au>Song, Wei</au><au>Liotta, Antonio</au><au>Peel, Leto</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Disrupting resilient criminal networks through data analysis: The case of Sicilian Mafia</atitle><jtitle>PloS one</jtitle><date>2020-08-05</date><risdate>2020</risdate><volume>15</volume><issue>8</issue><spage>e0236476</spage><epage>e0236476</epage><pages>e0236476-e0236476</pages><issn>1932-6203</issn><eissn>1932-6203</eissn><abstract>Compared to other types of social networks, criminal networks present particularly hard challenges, due to their strong resilience to disruption, which poses severe hurdles to Law-Enforcement Agencies (LEAs). Herein, we borrow methods and tools from Social Network Analysis (SNA) to (i) unveil the structure and organization of Sicilian Mafia gangs, based on two real-world datasets, and (ii) gain insights as to how to efficiently reduce the Largest Connected Component (LCC) of two networks derived from them. Mafia networks have peculiar features in terms of the links distribution and strength, which makes them very different from other social networks, and extremely robust to exogenous perturbations. Analysts also face difficulties in collecting reliable datasets that accurately describe the gangs' internal structure and their relationships with the external world, which is why earlier studies are largely qualitative, elusive and incomplete. An added value of our work is the generation of two real-world datasets, based on raw data extracted from juridical acts, relating to a Mafia organization that operated in Sicily during the first decade of 2000s. We created two different networks, capturing phone calls and physical meetings, respectively. Our analysis simulated different intervention procedures: (i) arresting one criminal at a time (sequential node removal); and (ii) police raids (node block removal). In both the sequential, and the node block removal intervention procedures, the Betweenness centrality was the most effective strategy in prioritizing the nodes to be removed. For instance, when targeting the top 5% nodes with the largest Betweenness centrality, our simulations suggest a reduction of up to 70% in the size of the LCC. We also identified that, due the peculiar type of interactions in criminal networks (namely, the distribution of the interactions' frequency), no significant differences exist between weighted and unweighted network analysis. Our work has significant practical applications for perturbing the operations of criminal and terrorist networks.</abstract><cop>San Francisco</cop><pub>Public Library of Science</pub><pmid>32756592</pmid><doi>10.1371/journal.pone.0236476</doi><tpages>e0236476</tpages><orcidid>https://orcid.org/0000-0003-1528-7203</orcidid><orcidid>https://orcid.org/0000-0002-2367-6084</orcidid><orcidid>https://orcid.org/0000-0003-4193-9842</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1932-6203 |
ispartof | PloS one, 2020-08, Vol.15 (8), p.e0236476-e0236476 |
issn | 1932-6203 1932-6203 |
language | eng |
recordid | cdi_plos_journals_2430651826 |
source | DOAJ Directory of Open Access Journals; Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals; PubMed Central; Free Full-Text Journals in Chemistry; Public Library of Science (PLoS) |
subjects | Computer and Information Sciences Connectivity Control Crime Data analysis Data mining Datasets Disruption Gangs Human capital Law enforcement Mafia Methods Network analysis Nodes Organized crime People and Places Police Social capital Social interactions Social network analysis Social networks Social organization Social Sciences Sociological research Supervision Telephone calls |
title | Disrupting resilient criminal networks through data analysis: The case of Sicilian Mafia |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-28T06%3A20%3A53IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-gale_plos_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Disrupting%20resilient%20criminal%20networks%20through%20data%20analysis:%20The%20case%20of%20Sicilian%20Mafia&rft.jtitle=PloS%20one&rft.au=Cavallaro,%20Lucia&rft.date=2020-08-05&rft.volume=15&rft.issue=8&rft.spage=e0236476&rft.epage=e0236476&rft.pages=e0236476-e0236476&rft.issn=1932-6203&rft.eissn=1932-6203&rft_id=info:doi/10.1371/journal.pone.0236476&rft_dat=%3Cgale_plos_%3EA631637441%3C/gale_plos_%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2430651826&rft_id=info:pmid/32756592&rft_galeid=A631637441&rft_doaj_id=oai_doaj_org_article_54be878aff9f4dbb9d48f15fca82c8ce&rfr_iscdi=true |