Disrupting resilient criminal networks through data analysis: The case of Sicilian Mafia

Compared to other types of social networks, criminal networks present particularly hard challenges, due to their strong resilience to disruption, which poses severe hurdles to Law-Enforcement Agencies (LEAs). Herein, we borrow methods and tools from Social Network Analysis (SNA) to (i) unveil the st...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:PloS one 2020-08, Vol.15 (8), p.e0236476-e0236476
Hauptverfasser: Cavallaro, Lucia, Ficara, Annamaria, De Meo, Pasquale, Fiumara, Giacomo, Catanese, Salvatore, Bagdasar, Ovidiu, Song, Wei, Liotta, Antonio
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page e0236476
container_issue 8
container_start_page e0236476
container_title PloS one
container_volume 15
creator Cavallaro, Lucia
Ficara, Annamaria
De Meo, Pasquale
Fiumara, Giacomo
Catanese, Salvatore
Bagdasar, Ovidiu
Song, Wei
Liotta, Antonio
description Compared to other types of social networks, criminal networks present particularly hard challenges, due to their strong resilience to disruption, which poses severe hurdles to Law-Enforcement Agencies (LEAs). Herein, we borrow methods and tools from Social Network Analysis (SNA) to (i) unveil the structure and organization of Sicilian Mafia gangs, based on two real-world datasets, and (ii) gain insights as to how to efficiently reduce the Largest Connected Component (LCC) of two networks derived from them. Mafia networks have peculiar features in terms of the links distribution and strength, which makes them very different from other social networks, and extremely robust to exogenous perturbations. Analysts also face difficulties in collecting reliable datasets that accurately describe the gangs' internal structure and their relationships with the external world, which is why earlier studies are largely qualitative, elusive and incomplete. An added value of our work is the generation of two real-world datasets, based on raw data extracted from juridical acts, relating to a Mafia organization that operated in Sicily during the first decade of 2000s. We created two different networks, capturing phone calls and physical meetings, respectively. Our analysis simulated different intervention procedures: (i) arresting one criminal at a time (sequential node removal); and (ii) police raids (node block removal). In both the sequential, and the node block removal intervention procedures, the Betweenness centrality was the most effective strategy in prioritizing the nodes to be removed. For instance, when targeting the top 5% nodes with the largest Betweenness centrality, our simulations suggest a reduction of up to 70% in the size of the LCC. We also identified that, due the peculiar type of interactions in criminal networks (namely, the distribution of the interactions' frequency), no significant differences exist between weighted and unweighted network analysis. Our work has significant practical applications for perturbing the operations of criminal and terrorist networks.
doi_str_mv 10.1371/journal.pone.0236476
format Article
fullrecord <record><control><sourceid>gale_plos_</sourceid><recordid>TN_cdi_plos_journals_2430651826</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><galeid>A631637441</galeid><doaj_id>oai_doaj_org_article_54be878aff9f4dbb9d48f15fca82c8ce</doaj_id><sourcerecordid>A631637441</sourcerecordid><originalsourceid>FETCH-LOGICAL-c735t-dbb6124153cb6e24945f7bc25431cec1eb3cb5030ff89ae1951314d5f115f1ca3</originalsourceid><addsrcrecordid>eNqNk1uL1DAUx4so7kW_gWBAEH2Ysbm23QdhWW8DKwvuKr6F0zRpM3aaMUlX99ubcapsZR8khISc3_mfCzlZ9gTnS0wL_GrtRj9Av9y6QS9zQgUrxL3sEFeULATJ6f1b94PsKIR1nnNaCvEwO6Ck4IJX5DD7-sYGP26jHVrkdbC91UNEytuNTeJo0PGH898Cip13Y9uhBiIgSKabYMMJuuo0UhA0cgZdWpXcYUAfwVh4lD0w0Af9eDqPs8_v3l6dfVicX7xfnZ2eL1RBeVw0dS0wYZhTVQtNWMW4KWpFOKNYaYV1nQw8p7kxZQUaVxxTzBpuME5bAT3Onu51t70LcmpKkITRXHBcEpGI1Z5oHKzlNpUG_kY6sPL3g_OtBB-t6rXkrNZlUYIxlWEptaphpUmBFJRElUonrddTtLHe6EalZnnoZ6Jzy2A72bprWbCcVxVJAi8mAe--jzpEubFB6b6HQbtxn3dVlLTECX32D3p3dRPVQirADsaluGonKk8FxYIWjO20lndQaTV6Y1X6Qcam95nDy5lDYqL-GVsYQ5Cry0__z158mbPPb7Gdhj52wfVjtG4Ic5DtQeVdCF6bv03GudwNwJ9uyN0AyGkA6C9tCfcr</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2430651826</pqid></control><display><type>article</type><title>Disrupting resilient criminal networks through data analysis: The case of Sicilian Mafia</title><source>DOAJ Directory of Open Access Journals</source><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><source>PubMed Central</source><source>Free Full-Text Journals in Chemistry</source><source>Public Library of Science (PLoS)</source><creator>Cavallaro, Lucia ; Ficara, Annamaria ; De Meo, Pasquale ; Fiumara, Giacomo ; Catanese, Salvatore ; Bagdasar, Ovidiu ; Song, Wei ; Liotta, Antonio</creator><contributor>Peel, Leto</contributor><creatorcontrib>Cavallaro, Lucia ; Ficara, Annamaria ; De Meo, Pasquale ; Fiumara, Giacomo ; Catanese, Salvatore ; Bagdasar, Ovidiu ; Song, Wei ; Liotta, Antonio ; Peel, Leto</creatorcontrib><description>Compared to other types of social networks, criminal networks present particularly hard challenges, due to their strong resilience to disruption, which poses severe hurdles to Law-Enforcement Agencies (LEAs). Herein, we borrow methods and tools from Social Network Analysis (SNA) to (i) unveil the structure and organization of Sicilian Mafia gangs, based on two real-world datasets, and (ii) gain insights as to how to efficiently reduce the Largest Connected Component (LCC) of two networks derived from them. Mafia networks have peculiar features in terms of the links distribution and strength, which makes them very different from other social networks, and extremely robust to exogenous perturbations. Analysts also face difficulties in collecting reliable datasets that accurately describe the gangs' internal structure and their relationships with the external world, which is why earlier studies are largely qualitative, elusive and incomplete. An added value of our work is the generation of two real-world datasets, based on raw data extracted from juridical acts, relating to a Mafia organization that operated in Sicily during the first decade of 2000s. We created two different networks, capturing phone calls and physical meetings, respectively. Our analysis simulated different intervention procedures: (i) arresting one criminal at a time (sequential node removal); and (ii) police raids (node block removal). In both the sequential, and the node block removal intervention procedures, the Betweenness centrality was the most effective strategy in prioritizing the nodes to be removed. For instance, when targeting the top 5% nodes with the largest Betweenness centrality, our simulations suggest a reduction of up to 70% in the size of the LCC. We also identified that, due the peculiar type of interactions in criminal networks (namely, the distribution of the interactions' frequency), no significant differences exist between weighted and unweighted network analysis. Our work has significant practical applications for perturbing the operations of criminal and terrorist networks.</description><identifier>ISSN: 1932-6203</identifier><identifier>EISSN: 1932-6203</identifier><identifier>DOI: 10.1371/journal.pone.0236476</identifier><identifier>PMID: 32756592</identifier><language>eng</language><publisher>San Francisco: Public Library of Science</publisher><subject>Computer and Information Sciences ; Connectivity ; Control ; Crime ; Data analysis ; Data mining ; Datasets ; Disruption ; Gangs ; Human capital ; Law enforcement ; Mafia ; Methods ; Network analysis ; Nodes ; Organized crime ; People and Places ; Police ; Social capital ; Social interactions ; Social network analysis ; Social networks ; Social organization ; Social Sciences ; Sociological research ; Supervision ; Telephone calls</subject><ispartof>PloS one, 2020-08, Vol.15 (8), p.e0236476-e0236476</ispartof><rights>COPYRIGHT 2020 Public Library of Science</rights><rights>2020 Cavallaro et al. This is an open access article distributed under the terms of the Creative Commons Attribution License: http://creativecommons.org/licenses/by/4.0/ (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><rights>2020 Cavallaro et al 2020 Cavallaro et al</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c735t-dbb6124153cb6e24945f7bc25431cec1eb3cb5030ff89ae1951314d5f115f1ca3</citedby><cites>FETCH-LOGICAL-c735t-dbb6124153cb6e24945f7bc25431cec1eb3cb5030ff89ae1951314d5f115f1ca3</cites><orcidid>0000-0003-1528-7203 ; 0000-0002-2367-6084 ; 0000-0003-4193-9842</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://www.ncbi.nlm.nih.gov/pmc/articles/PMC7405992/pdf/$$EPDF$$P50$$Gpubmedcentral$$Hfree_for_read</linktopdf><linktohtml>$$Uhttps://www.ncbi.nlm.nih.gov/pmc/articles/PMC7405992/$$EHTML$$P50$$Gpubmedcentral$$Hfree_for_read</linktohtml><link.rule.ids>230,314,723,776,780,860,881,2096,2915,23847,27903,27904,53769,53771,79346,79347</link.rule.ids></links><search><contributor>Peel, Leto</contributor><creatorcontrib>Cavallaro, Lucia</creatorcontrib><creatorcontrib>Ficara, Annamaria</creatorcontrib><creatorcontrib>De Meo, Pasquale</creatorcontrib><creatorcontrib>Fiumara, Giacomo</creatorcontrib><creatorcontrib>Catanese, Salvatore</creatorcontrib><creatorcontrib>Bagdasar, Ovidiu</creatorcontrib><creatorcontrib>Song, Wei</creatorcontrib><creatorcontrib>Liotta, Antonio</creatorcontrib><title>Disrupting resilient criminal networks through data analysis: The case of Sicilian Mafia</title><title>PloS one</title><description>Compared to other types of social networks, criminal networks present particularly hard challenges, due to their strong resilience to disruption, which poses severe hurdles to Law-Enforcement Agencies (LEAs). Herein, we borrow methods and tools from Social Network Analysis (SNA) to (i) unveil the structure and organization of Sicilian Mafia gangs, based on two real-world datasets, and (ii) gain insights as to how to efficiently reduce the Largest Connected Component (LCC) of two networks derived from them. Mafia networks have peculiar features in terms of the links distribution and strength, which makes them very different from other social networks, and extremely robust to exogenous perturbations. Analysts also face difficulties in collecting reliable datasets that accurately describe the gangs' internal structure and their relationships with the external world, which is why earlier studies are largely qualitative, elusive and incomplete. An added value of our work is the generation of two real-world datasets, based on raw data extracted from juridical acts, relating to a Mafia organization that operated in Sicily during the first decade of 2000s. We created two different networks, capturing phone calls and physical meetings, respectively. Our analysis simulated different intervention procedures: (i) arresting one criminal at a time (sequential node removal); and (ii) police raids (node block removal). In both the sequential, and the node block removal intervention procedures, the Betweenness centrality was the most effective strategy in prioritizing the nodes to be removed. For instance, when targeting the top 5% nodes with the largest Betweenness centrality, our simulations suggest a reduction of up to 70% in the size of the LCC. We also identified that, due the peculiar type of interactions in criminal networks (namely, the distribution of the interactions' frequency), no significant differences exist between weighted and unweighted network analysis. Our work has significant practical applications for perturbing the operations of criminal and terrorist networks.</description><subject>Computer and Information Sciences</subject><subject>Connectivity</subject><subject>Control</subject><subject>Crime</subject><subject>Data analysis</subject><subject>Data mining</subject><subject>Datasets</subject><subject>Disruption</subject><subject>Gangs</subject><subject>Human capital</subject><subject>Law enforcement</subject><subject>Mafia</subject><subject>Methods</subject><subject>Network analysis</subject><subject>Nodes</subject><subject>Organized crime</subject><subject>People and Places</subject><subject>Police</subject><subject>Social capital</subject><subject>Social interactions</subject><subject>Social network analysis</subject><subject>Social networks</subject><subject>Social organization</subject><subject>Social Sciences</subject><subject>Sociological research</subject><subject>Supervision</subject><subject>Telephone calls</subject><issn>1932-6203</issn><issn>1932-6203</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><sourceid>BENPR</sourceid><sourceid>DOA</sourceid><recordid>eNqNk1uL1DAUx4so7kW_gWBAEH2Ysbm23QdhWW8DKwvuKr6F0zRpM3aaMUlX99ubcapsZR8khISc3_mfCzlZ9gTnS0wL_GrtRj9Av9y6QS9zQgUrxL3sEFeULATJ6f1b94PsKIR1nnNaCvEwO6Ck4IJX5DD7-sYGP26jHVrkdbC91UNEytuNTeJo0PGH898Cip13Y9uhBiIgSKabYMMJuuo0UhA0cgZdWpXcYUAfwVh4lD0w0Af9eDqPs8_v3l6dfVicX7xfnZ2eL1RBeVw0dS0wYZhTVQtNWMW4KWpFOKNYaYV1nQw8p7kxZQUaVxxTzBpuME5bAT3Onu51t70LcmpKkITRXHBcEpGI1Z5oHKzlNpUG_kY6sPL3g_OtBB-t6rXkrNZlUYIxlWEptaphpUmBFJRElUonrddTtLHe6EalZnnoZ6Jzy2A72bprWbCcVxVJAi8mAe--jzpEubFB6b6HQbtxn3dVlLTECX32D3p3dRPVQirADsaluGonKk8FxYIWjO20lndQaTV6Y1X6Qcam95nDy5lDYqL-GVsYQ5Cry0__z158mbPPb7Gdhj52wfVjtG4Ic5DtQeVdCF6bv03GudwNwJ9uyN0AyGkA6C9tCfcr</recordid><startdate>20200805</startdate><enddate>20200805</enddate><creator>Cavallaro, Lucia</creator><creator>Ficara, Annamaria</creator><creator>De Meo, Pasquale</creator><creator>Fiumara, Giacomo</creator><creator>Catanese, Salvatore</creator><creator>Bagdasar, Ovidiu</creator><creator>Song, Wei</creator><creator>Liotta, Antonio</creator><general>Public Library of Science</general><general>Public Library of Science (PLoS)</general><scope>AAYXX</scope><scope>CITATION</scope><scope>IOV</scope><scope>ISR</scope><scope>3V.</scope><scope>7QG</scope><scope>7QL</scope><scope>7QO</scope><scope>7RV</scope><scope>7SN</scope><scope>7SS</scope><scope>7T5</scope><scope>7TG</scope><scope>7TM</scope><scope>7U9</scope><scope>7X2</scope><scope>7X7</scope><scope>7XB</scope><scope>88E</scope><scope>8AO</scope><scope>8C1</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FH</scope><scope>8FI</scope><scope>8FJ</scope><scope>8FK</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AEUYN</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>ATCPS</scope><scope>AZQEC</scope><scope>BBNVY</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>BHPHI</scope><scope>C1K</scope><scope>CCPQU</scope><scope>D1I</scope><scope>DWQXO</scope><scope>FR3</scope><scope>FYUFA</scope><scope>GHDGH</scope><scope>GNUQQ</scope><scope>H94</scope><scope>HCIFZ</scope><scope>K9.</scope><scope>KB.</scope><scope>KB0</scope><scope>KL.</scope><scope>L6V</scope><scope>LK8</scope><scope>M0K</scope><scope>M0S</scope><scope>M1P</scope><scope>M7N</scope><scope>M7P</scope><scope>M7S</scope><scope>NAPCQ</scope><scope>P5Z</scope><scope>P62</scope><scope>P64</scope><scope>PATMY</scope><scope>PDBOC</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PTHSS</scope><scope>PYCSY</scope><scope>RC3</scope><scope>7X8</scope><scope>5PM</scope><scope>DOA</scope><orcidid>https://orcid.org/0000-0003-1528-7203</orcidid><orcidid>https://orcid.org/0000-0002-2367-6084</orcidid><orcidid>https://orcid.org/0000-0003-4193-9842</orcidid></search><sort><creationdate>20200805</creationdate><title>Disrupting resilient criminal networks through data analysis: The case of Sicilian Mafia</title><author>Cavallaro, Lucia ; Ficara, Annamaria ; De Meo, Pasquale ; Fiumara, Giacomo ; Catanese, Salvatore ; Bagdasar, Ovidiu ; Song, Wei ; Liotta, Antonio</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c735t-dbb6124153cb6e24945f7bc25431cec1eb3cb5030ff89ae1951314d5f115f1ca3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><topic>Computer and Information Sciences</topic><topic>Connectivity</topic><topic>Control</topic><topic>Crime</topic><topic>Data analysis</topic><topic>Data mining</topic><topic>Datasets</topic><topic>Disruption</topic><topic>Gangs</topic><topic>Human capital</topic><topic>Law enforcement</topic><topic>Mafia</topic><topic>Methods</topic><topic>Network analysis</topic><topic>Nodes</topic><topic>Organized crime</topic><topic>People and Places</topic><topic>Police</topic><topic>Social capital</topic><topic>Social interactions</topic><topic>Social network analysis</topic><topic>Social networks</topic><topic>Social organization</topic><topic>Social Sciences</topic><topic>Sociological research</topic><topic>Supervision</topic><topic>Telephone calls</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Cavallaro, Lucia</creatorcontrib><creatorcontrib>Ficara, Annamaria</creatorcontrib><creatorcontrib>De Meo, Pasquale</creatorcontrib><creatorcontrib>Fiumara, Giacomo</creatorcontrib><creatorcontrib>Catanese, Salvatore</creatorcontrib><creatorcontrib>Bagdasar, Ovidiu</creatorcontrib><creatorcontrib>Song, Wei</creatorcontrib><creatorcontrib>Liotta, Antonio</creatorcontrib><collection>CrossRef</collection><collection>Gale In Context: Opposing Viewpoints</collection><collection>Gale In Context: Science</collection><collection>ProQuest Central (Corporate)</collection><collection>Animal Behavior Abstracts</collection><collection>Bacteriology Abstracts (Microbiology B)</collection><collection>Biotechnology Research Abstracts</collection><collection>Nursing &amp; Allied Health Database</collection><collection>Ecology Abstracts</collection><collection>Entomology Abstracts (Full archive)</collection><collection>Immunology Abstracts</collection><collection>Meteorological &amp; Geoastrophysical Abstracts</collection><collection>Nucleic Acids Abstracts</collection><collection>Virology and AIDS Abstracts</collection><collection>Agricultural Science Collection</collection><collection>Health &amp; Medical Collection</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Medical Database (Alumni Edition)</collection><collection>ProQuest Pharma Collection</collection><collection>Public Health Database</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Natural Science Collection</collection><collection>Hospital Premium Collection</collection><collection>Hospital Premium Collection (Alumni Edition)</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>Materials Science &amp; Engineering Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest One Sustainability</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>Agricultural &amp; Environmental Science Collection</collection><collection>ProQuest Central Essentials</collection><collection>Biological Science Collection</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>Natural Science Collection</collection><collection>Environmental Sciences and Pollution Management</collection><collection>ProQuest One Community College</collection><collection>ProQuest Materials Science Collection</collection><collection>ProQuest Central Korea</collection><collection>Engineering Research Database</collection><collection>Health Research Premium Collection</collection><collection>Health Research Premium Collection (Alumni)</collection><collection>ProQuest Central Student</collection><collection>AIDS and Cancer Research Abstracts</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Health &amp; Medical Complete (Alumni)</collection><collection>Materials Science Database</collection><collection>Nursing &amp; Allied Health Database (Alumni Edition)</collection><collection>Meteorological &amp; Geoastrophysical Abstracts - Academic</collection><collection>ProQuest Engineering Collection</collection><collection>ProQuest Biological Science Collection</collection><collection>Agricultural Science Database</collection><collection>Health &amp; Medical Collection (Alumni Edition)</collection><collection>Medical Database</collection><collection>Algology Mycology and Protozoology Abstracts (Microbiology C)</collection><collection>Biological Science Database</collection><collection>Engineering Database</collection><collection>Nursing &amp; Allied Health Premium</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>Biotechnology and BioEngineering Abstracts</collection><collection>Environmental Science Database</collection><collection>Materials Science Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>Engineering Collection</collection><collection>Environmental Science Collection</collection><collection>Genetics Abstracts</collection><collection>MEDLINE - Academic</collection><collection>PubMed Central (Full Participant titles)</collection><collection>DOAJ Directory of Open Access Journals</collection><jtitle>PloS one</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Cavallaro, Lucia</au><au>Ficara, Annamaria</au><au>De Meo, Pasquale</au><au>Fiumara, Giacomo</au><au>Catanese, Salvatore</au><au>Bagdasar, Ovidiu</au><au>Song, Wei</au><au>Liotta, Antonio</au><au>Peel, Leto</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Disrupting resilient criminal networks through data analysis: The case of Sicilian Mafia</atitle><jtitle>PloS one</jtitle><date>2020-08-05</date><risdate>2020</risdate><volume>15</volume><issue>8</issue><spage>e0236476</spage><epage>e0236476</epage><pages>e0236476-e0236476</pages><issn>1932-6203</issn><eissn>1932-6203</eissn><abstract>Compared to other types of social networks, criminal networks present particularly hard challenges, due to their strong resilience to disruption, which poses severe hurdles to Law-Enforcement Agencies (LEAs). Herein, we borrow methods and tools from Social Network Analysis (SNA) to (i) unveil the structure and organization of Sicilian Mafia gangs, based on two real-world datasets, and (ii) gain insights as to how to efficiently reduce the Largest Connected Component (LCC) of two networks derived from them. Mafia networks have peculiar features in terms of the links distribution and strength, which makes them very different from other social networks, and extremely robust to exogenous perturbations. Analysts also face difficulties in collecting reliable datasets that accurately describe the gangs' internal structure and their relationships with the external world, which is why earlier studies are largely qualitative, elusive and incomplete. An added value of our work is the generation of two real-world datasets, based on raw data extracted from juridical acts, relating to a Mafia organization that operated in Sicily during the first decade of 2000s. We created two different networks, capturing phone calls and physical meetings, respectively. Our analysis simulated different intervention procedures: (i) arresting one criminal at a time (sequential node removal); and (ii) police raids (node block removal). In both the sequential, and the node block removal intervention procedures, the Betweenness centrality was the most effective strategy in prioritizing the nodes to be removed. For instance, when targeting the top 5% nodes with the largest Betweenness centrality, our simulations suggest a reduction of up to 70% in the size of the LCC. We also identified that, due the peculiar type of interactions in criminal networks (namely, the distribution of the interactions' frequency), no significant differences exist between weighted and unweighted network analysis. Our work has significant practical applications for perturbing the operations of criminal and terrorist networks.</abstract><cop>San Francisco</cop><pub>Public Library of Science</pub><pmid>32756592</pmid><doi>10.1371/journal.pone.0236476</doi><tpages>e0236476</tpages><orcidid>https://orcid.org/0000-0003-1528-7203</orcidid><orcidid>https://orcid.org/0000-0002-2367-6084</orcidid><orcidid>https://orcid.org/0000-0003-4193-9842</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1932-6203
ispartof PloS one, 2020-08, Vol.15 (8), p.e0236476-e0236476
issn 1932-6203
1932-6203
language eng
recordid cdi_plos_journals_2430651826
source DOAJ Directory of Open Access Journals; Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals; PubMed Central; Free Full-Text Journals in Chemistry; Public Library of Science (PLoS)
subjects Computer and Information Sciences
Connectivity
Control
Crime
Data analysis
Data mining
Datasets
Disruption
Gangs
Human capital
Law enforcement
Mafia
Methods
Network analysis
Nodes
Organized crime
People and Places
Police
Social capital
Social interactions
Social network analysis
Social networks
Social organization
Social Sciences
Sociological research
Supervision
Telephone calls
title Disrupting resilient criminal networks through data analysis: The case of Sicilian Mafia
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-28T06%3A20%3A53IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-gale_plos_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Disrupting%20resilient%20criminal%20networks%20through%20data%20analysis:%20The%20case%20of%20Sicilian%20Mafia&rft.jtitle=PloS%20one&rft.au=Cavallaro,%20Lucia&rft.date=2020-08-05&rft.volume=15&rft.issue=8&rft.spage=e0236476&rft.epage=e0236476&rft.pages=e0236476-e0236476&rft.issn=1932-6203&rft.eissn=1932-6203&rft_id=info:doi/10.1371/journal.pone.0236476&rft_dat=%3Cgale_plos_%3EA631637441%3C/gale_plos_%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2430651826&rft_id=info:pmid/32756592&rft_galeid=A631637441&rft_doaj_id=oai_doaj_org_article_54be878aff9f4dbb9d48f15fca82c8ce&rfr_iscdi=true