Conference PaperPDF Available

A Concept Discovery Approach for Fighting Human Trafficking and Forced Prostitution

Authors:

Abstract and Figures

Since the fall of the Iron curtain starting in 1989 in Hungary, millions of Central and Eastern European girls and women have been forced to work in the European sex industry (estimated 175,000 to 200,000 yearly. In this paper, we present our work with the Amsterdam-Amstelland (Netherlands) police to find suspects and victims of human trafficking and forced prostitution. 266,157 suspicious activity reports were filed by police officers between 2005 and 2009 that contain their observations made during a police patrol, motor vehicle inspection, etc. We used FCA to filter out interesting persons for further investigation and used the temporal variant of FCA to create a visual profile of these persons, their evolution over time and their social environment. We exposed multiple cases of forced prostitution where sufficient indications were available to obtain the permission from the Public Prosecutor to use special investigation techniques. This resulted in a confirmation of their involvement in human trafficking and forced prostitution resulting in actual arrestments being made.
Content may be subject to copyright.
A concept discovery approach for fighting human
trafficking and forced prostitution
Jonas Poelmans1, Paul Elzinga3, Guido Dedene1,4, Stijn Viaene1,2, Sergei
Kuznetsov5
1K.U.Leuven, Faculty of Business and Economics, Naamsestraat 69,
3000 Leuven, Belgium
2Vlerick Leuven Gent Management School, Vlamingenstraat 83,
3000 Leuven, Belgium
3Amsterdam-Amstelland Police, James Wattstraat 84,
1000 CG Amsterdam, The Netherlands
4Universiteit van Amsterdam Business School, Roetersstraat 11
1018 WB Amsterdam, The Netherlands
5State University Higher School of Economics (HSE), Moscow, Russia
{Jonas.Poelmans, Stijn.Viaene, Guido.Dedene}@econ.kuleuven.be
skuznetsov@hse.ru
Paul.Elzinga@amsterdam.politie.nl
Abstract. Since the fall of the Iron curtain starting in 1989 in Hungary, millions
of Central and Eastern European girls and women have been forced to work in
the European sex industry (estimated 175,000 to 200,000 yearly1). In this paper,
we present our work with the Amsterdam-Amstelland (Netherlands) police to
find suspects and victims of human trafficking and forced prostitution. 266,157
suspicious activity reports were filed by police officers between 2005 and 2009
that contain their observations made during a police patrol, motor vehicle
inspection, etc. We used FCA to filter out interesting persons for further
investigation and used the temporal variant of FCA to create a visual profile of
these persons, their evolution over time and their social environment. We
exposed multiple cases of forced prostitution where sufficient indications were
available to obtain the permission from the Public Prosecutor to use special
investigation techniques. This resulted in a confirmation of their involvement in
human trafficking and forced prostitution resulting in actual arrestments being
made.
1. Introduction
Irina, aged 18, responded to an advertisement in a Kiev, Ukraine newspaper for a
training course in Berlin in 1996. With a fake passport, she traveled to Berlin,
Germany where she was told that the school had closed. She was sent on to Brussels,
Belgium for a job. When she arrived she was told she needed to repay a debt of
1 Eerste rapportage Nationaal Rapporteur Mensenhandel
http://www.bnrm.nl/Images/Rapportage%201%20(Ned)_2002_tcm63-83113.pdf
US$10000 and would have to earn the money in prostitution. Her passport was
confiscated, and she was threatened, beated and raped. When she didn't earn enough
money, she was sold to a Belgian pimp who operated in Rue D'Aarschot in the
Brussels red light district. When she managed to escape through the assistance of
police, she was arrested because she had no legal documentation. A medical exam
verified the abuse she had suffered, such as cigarette burns all over her body (Hughes
et al. 2003).
The above story is a typical example of a woman of Eastern Europe who was
forced into the European sex industry. Rough estimates suggest that 700,000 to 2
million women and girls are trafficked across international borders every year
(O’Neill 1999, U.S. Department 2008). The majority of transnational victims are
trafficked into commercial sexual exploitation. Human trafficking is the fastest
growing criminal industry in the world, with the total annual revenue for trafficking in
persons estimated to be between $5 billion and $9 billion (United Nations 2004). The
council of Europe states that “people trafficking has reached epidemic proportions
over the past decade, with a global annual market of about $42.5 billion” (Equality
division 2006). The most popular destinations for trafficked women are countries
where prostitution is legal such as the Netherlands (Hughes 2001). According to
Shelley et al. (1999) most of these women are in conditions of slavery. Girls of Dutch
nationality who were forced to work in prostitution in Amsterdam typically fell prey
to a loverboy. The loverboy is a relatively new phenomenon (Bovenkerk et al. 2004)
in the Netherlands. A loverboy is a man, mostly with Moroccan, Antillean or Turkish
roots who makes a girl fall in love with him and then uses her emotional dependency
to force her to work as a prostitute.
In this paper we report on our Formal Concept Analysis (FCA)-based (Ganter et al.
1999) efforts for identifying unknown suspects and victims of human trafficking and
forced prostitution in the police region Amsterdam-Amstelland in the Netherlands.
Since the introduction of Intelligence Led Policing (Collier 2006, Viaene et al. 2009)
in 2005, a management paradigm for police organizations which aims at gathering
and using information to allow for pro-active identification of suspects, police officers
are required to write down everything suspicious they noticed during motor vehicle
inspections, police patrols, etc. These observational reports, 34,817 in 2005, 40,703 in
2006, 53,583 in 2007, 69,470 in 2008 and 67,584 in 2009, may contain indications
that can help reveal individuals who are involved in human trafficking, forced
prostitution, terrorist activities, etc. However, till date almost no analyses were
performed on these documents.
We first used concept lattices to visualize the observational reports and distill
interesting indicators and concepts that can be used for tracking down suspects. For
each person mentioned in these reports, a document vector was constructed
containing all relevant attributes or indicators that were found in the data. This
concept lattice in which all available information for each person was gathered,
revealed some cases where there were sufficient indications for starting an in-depth
investigation. We applied FCA and its temporal variant to zoom in on some real life
cases and suspects, resulting in actual arrestments being made and/or illegal
prostitution locations closed down.
In section 2 we give background information on human trafficking, forced
prostitution and the guidelines that were developed by the Attorney Generals of the
Netherlands to help detect trafficking and loverboy suspects. In section 3 we describe
the dataset. In section 4 we describe our analysis method to detect and profile
potential suspects. In section 5 we describe some real life cases where the suspects
were found with FCA. Finally, section 6 concludes the paper.
2. Human trafficking and forced prostitution
Victims of human trafficking rarely make an official statement to the police. The
human trafficking team of the Amsterdam-Amstelland police is installed to
proactively search police databases for any signals of human trafficking.
Unfortunately, this turns out to be a laborious task. The investigators have to
manually read and analyze the police reports, one by one, because only an estimated
15% of the information containing human trafficking indications has been labeled as
such by police officers. As soon as the investigators find sufficient indications against
a person, a document based on section 273f of the code of criminal law is composed
for the person under scrutiny. Based on this report, a request is sent to the Public
Prosecutor to start an in-depth investigation against the potential suspects. After
permission is received from the Public Prosecutor, the use of special investigation
techniques such as phone taps and observation teams is allowed.
The following list contains the types of indications mentioned in the guidelines
developed by the Attorney Generals of the Netherlands based on which police forces
can gather evidence of human trafficking and forced prostitution against potential
suspects. These guidelines define in which cases pro-active intervention by police
may be necessary. This information had not yet been used to actively search police
databases for suspicious activity reports containing human trafficking indicators.
1. Dependency on exploiter: Typically in human trafficking the housing, clothing and
transportation of the woman are arranged through the exploiter, the woman will
often have debts towards the exploiter and will be forced to earn the money back.
2. Deprivation of liberty: Often the victim is not allowed to have contact with the
outside world. She typically does not have her passport with her which is carried
by the pimps.
3. Being forced to work under bad circumstances: The victim has to work for many
hours, cannot freely dispose of the money she earns, etc.
4. Violation of bodily integrity of the victim: The victim is forced to work as a
prostitute through physical violence, threatening, etc.
5. Non-incidental pattern of abuse by suspect(s) can be observed.
3. Dataset
Our dataset consists of 266,157 suspicious activity police reports, 34,817 in 2005,
40,703 in 2006, 53,583 in 2007, 69,470 in 2008 and 67,584 in 2009. These police
reports are stored in the police databases as unstructured text documents and have the
following associated structured data fields: title of the incident, project code assigned
by the responsible officer, location of the incident and optionally a formally labeled
suspect, victim and/or other involved persons. The unstructured part of these
suspicious activity reports describes observations made by police officers during
motor vehicle inspections, during a police patrol, when a known person was seen at a
certain place, etc. These reports were extracted from the database and turned into html
documents that were indexed using the open source engine Lucene.
The thesaurus constructed for this research contains the terms and phrases used to
detect the presence or absence of indicators in these police reports. This thesaurus
consists of two levels: the individual search terms and the term cluster level which
was used to create the lattices in this paper. We used a semi-automated approach as
described in (Poelmans et al. 2010a). Search terms and term clusters were defined in
collaboration with experts of the anti-human trafficking team and gradually improved
by validating their effectiveness on subsets of the available police reports. Each of
these search terms were thoroughly analyzed for being sufficiently specific. The
quality of the term clusters was determined based on their completeness. The
validation of the quality of the thesaurus and the improvements were done by us and
in conjunction with members of the anti-human trafficking team. Concept structures
were created on multiple randomly selected subsets of the data. It was manually
verified if all relevant indicators were found in these reports and no indicators were
falsely attributed to these reports. For example, the term cluster “prostitute” in the end
contained more than 20 different terms such as “prostituee”, “dames van lichte
zeden”, “prosti”, “geisha”, etc. used by officers to describe a prostitute in their textual
reports. To create the formal contexts in this paper, the term clusters in the thesaurus
were used as attributes and the police reports as objects. A prototype of the FCA-
based toolset CORDIET (which is currently being developed under a collaboration
between KULeuven and Moscow Higher School of Economics) was used during the
analysis process (Poelmans et al. 2010d).
4. Method
Our investigation procedure consists of multiple iterations through the square of Fig.
1. For background information on FCA and its applications in KDD we refer the
reader to Poelmans et al. (2010c). The guidelines of section 2 contain a non-
limitative list of indications and the indications can be subdivided into 5 main
categories. If at least one of the thesaurus elements corresponding to these indications
is present for a person or a group of persons, we might be dealing with a case of
human trafficking or forced prostitution. From the 266,157 reports in our dataset, the
relevant reports which contain at least one indicator are selected. Then, the persons
mentioned in these reports are extracted and FCA lattices are created, showing all the
indications observed for each person. From these lattices containing persons, potential
suspects or victims can be distilled and they can be further analyzed in detail with
FCA and temporal concept lattices. If sufficient indications are available, a document
based on article 273f of the code of criminal law can be created and sent to the Public
Prosecutor with the request for using advanced intelligence gathering instruments
such as observation teams, phone taps, etc. If the suspects are indeed involved in
human trafficking and forced prostitution they can be taken into custody.
Fig. 1. Criminal intelligence process
Our method based on FCA consists of 4 main types of analysis that are performed:
Concept exploration of the forced prostitution problem of Amsterdam: In
(Poelmans et al. 2010a, Poelmans et al. 2010b) our FCA-based approach for
automatically detecting domestic violence in unstructured text police reports
is described in detail. We not only improved the domestic violence definition
but also found multiple niche cases, confusing situations, faulty case
labelings, etc. that were used to amongst others improve police training. Part
of the research reported on in this paper such as the construction of the
thesaurus, consisted of repeating the procedures described in our domestic
violence case study papers.
Identifying potential suspects: Concept lattices allow for the detection of
potentially interesting links between independent observations made by
different police officers. When grouping suspicious activity reports on a per
person basis, the available information about the individuals is displayed in
one intuitive and understandable picture that facilitates efficient decision
making on where to look. In particular persons lower in the lattice can be of
interest since they combine multiple early warning indicators.
Visual suspect profiling: Some FCA-based methods such as Temporal Concept
Analysis (Wolff 2005) were developed to visually represent and analyze data
with a temporal dimension. Temporal Concept lattices were used in (Elzinga
et al. 2010) to create visual profiles of potentially interesting terrorism
subjects. Scharfe et al. (2009) used a model of branching time in which there
are alternative plans for the future corresponding to any possible choice of a
person and used it as the basis of an ICT toolset for supporting autism
diagnosed teenagers. For creating the temporal profile of individual suspects,
we use traditional FCA lattices and the timestamps of the police reports on
which these lattices are based are used as object names. The nodes of the
concept lattice can then be ordered chronologically.
Social structure exploration: Concept lattices may help expose interesting
persons related to each other, criminal networks, the role of certain suspects
in these networks, etc. With police officers we discussed and compared
various FCA-based visualization methods of criminal networks. Individual
police reports mentioning network activity were used by us as objects and
the timestamps of these police reports together with each suspect name
mentioned in these reports as object names.
5. Analysis and results
Traditional data mining techniques often focus on automating the knowledge
discovery process as much as possible. Since the detection of actual suspects in large
amounts of unstructured text police reports is still a process in which the human
expert should play a central role, we did not want to replace him, but rather empower
him in his knowledge discovery task. We were looking for a semi-automated
approach and in this section we try to illustrate the main reasons why FCA was ideal
for this type of police work. With FCA at the core, we were able to offer police
officers an approach which they could use to interactively explore and gain insight
into the data to find cases of interest to them on which they could zoom in or out.
Section 5.1 shows a lattice diagram which was of significant interest to investigators
of the anti-human trafficking team. For the first time, the overload of observational
reports was transformed into a visual artifact that showed them a set of 1255 persons
potentially of interest to the police and the indicators observed for each of them. The
lattice diagram visually summarizes the data and makes it more easily accessible for
officers who want to efficiently explore it and extract unknown suspects. We chose to
first highlight the case of the Turkish human trafficking network in section 5.2. From
the lattice diagram in section 5.1, two potential suspects were distilled since they were
regularly spotted performing illegal activities. We found the name of a bar was
mentioned a couple of times and used this information to build the concept lattice of
section 5.2. This lattice diagram was of particular interest to police officers since FCA
quickly gave them a concise overview of the persons that were observed to be
involved around a suspicious location and the lattice structure helped them to identify
the most important suspects in this network. In particular the visualization of persons
in a lattice was helpful during their exploration. FCA's partial ordering gave them
clues on where to look first. The lower a person appears in the lattice, the more
indicators he has. Section 5.3 showcases how the FCA visualization was used to
combine temporal and social structure information in one easy to interpret picture.
Such profile lattices were of significant interest to police officers since they allow for
quick decision making on whether or not a person might be involved in illegal
activities. Moreover, the lattices may help infer the roles of the persons mentioned in
the network. Finally section 5.4 shows how an FCA lattice can give insight into the
evolution of a person over time, in this case of a loverboy. The remaining part of this
section describes cases of human trafficking and forced prostitution and two of them
were identified in the lattice in Fig. 2 and further investigated with FCA. Note that
real names were replaced by false names because of privacy reasons.
5.1 Detection of suspects of human trafficking and forced prostitution
Fig. 2. Human trafficking suspect detection lattice diagram
Multiple concept lattices were created for detecting human trafficking suspects in the
set of persons. Each of these concept lattices contained over 200 concepts and were
based on different combinations of attributes. Since the format of this paper does not
allow to visualize the entire lattices in a readable way, we chose to simplify one of
these lattices and zoomed in on its most important aspects. Fig.2. contains the lattice
diagram with 1255 Bulgarian, Hungarian and Romanian persons. The concept
containing some of the suspects of section 5.2 was found on the right and bottom part
of the lattice and has 10 persons in its extent. The concept containing the main suspect
of section 5.3 was found on the left and bottom part of the lattice and has 1 object in
its extent. The following 2 sections will be used to describe and profile each of these
suspects in detail.
5.2 Case 1: Turkish human trafficking network
By analyzing the concept lattice based on observational reports, we were able to
expose a criminal network operating in Amsterdam, involved in illegal and forced
prostitution. The concept lattice diagram in fig. 3 contains the 61 persons and
indicators found in the police reports mentioning activity around a bar in Amsterdam
that played a central role in the network's activities and was closed down in 2009.
Multiple suspects operating in this network were found and some of the observations
will be described in this section. The most important suspects are the persons with
indication legitimation problems, since they were carrying the id papers of the girls.
The police reports contained many indications of illegal and forced prostitution taking
place, activities that were run by the owners or acquaintances of the owners of the bar.
We found out the bar was used as a central hub, where mostly Turkish men met up
with Bulgarian girls who had been forced into prostitution and took them to another
location. We found at least two pimps who have multiple girls working for them.
Fig. 3. Concept lattice diagram of human trafficking network
Starting in 2007, the first observations were made that hinted at illegal and forced
prostitution being organized from within this bar. On 2 June 2008, victim H declared
to the police that she was forced to work as a prostitute in the bar and did not get any
money for that. She was never allowed to leave the house alone and the door of her
apartment was locked from the outside such that she couldn't leave. On 12 December
2008, suspect A came out of the bar with a girl, their statements to the police did not
match and moreover the girl was dressed in sexy clothing. Most likely the girl works
as a prostitute and the driver is her pimp. On 25 January 2009, police officers stopped
a car and behind the wheel was suspect B and next to him the victim E. We found
woman E is often sitting at the bar and also the car is regularly parked in front of the
bar. Suspect B gave the passport of victim E to the police and afterwards he placed it
back in his pocket. Moreover, suspect B was carrying a large amount of cash money,
1000 euros in his pocket. On 26 January 2009, police did a check-up on the guests in
the bar. One girl was new and told she only just arrived by train, she had no train
tickets with her and she did not know her living address. Suspect B was also there and
told the police he is a car trader so he travels a lot between Bulgaria and Netherlands.
An excuse typically used by criminals responsible for the logistics of a trafficking
network. Also victim E and two other girls, victims F and G were there. On 20
February 2009, police officers saw suspect A talking to the driver of a car with
Bulgarian license plate. Afterwards he forced a girl to follow him and when the police
asked about their relationship they told they had been friends for 3 months. The girl
did not have her id-papers with her and the police went to her living address. In the
house there were many mattresses and another girl. Both of them told they have no
job. Most likely the house serves as an illegal prostitution location for the criminal
gang.
Sufficient indications were found and on 17 June 2009, an observation team
observed the bar during the evening. Eastern European women were sitting at the bar
and mostly Turkish, Moroccan and Eastern European men at the tables. During the
evening, the team saw multiple girls that were taken out of the bar by a customer to a
hotel, house, etc. and brought back to the bar afterwards. On 15 July 2009 sufficient
evidence was gathered that illegal prostitution was organized from within this bar and
authorities closed down the bar.
5.3 Case 2: Bulgarian male suspect
In this section we describe a profile of a Bulgarian suspect who was also operating in
Amsterdam. The lattice diagram in Fig. 4 shows that on 3 October 2007, suspect A
was observed for the first time during a police patrol. An officer told the driver of a
BMW car with Bulgarian license plate to turn right instead of left, the driver however
ignored the instructions he received and quickly drove to the left with squeaking tires.
The officer went after and in the end stopped the car. There were 3 men and one
woman in the car. Suspect B was the driver and suspect A was sitting next to him. On
the backseat of the car were woman F and man K. They told the officer they only
arrived 3 days ago in the Netherlands and are a couple. Suspect A and suspect B were
taken to the police office; man K and woman F walked away and were followed by a
second officer. He saw that K was strongly holding the hand of F and forced her into
a home at the corner of a street in central Amsterdam. In the police office, suspect B
was not able to tell the address of the apartment he was going to rent. Suspect A was
carrying a large amount of cash money in his pocket.
Fig. 4. Profile lattice diagram of individual suspect and his network
On 30 June 2009, woman J went to the police to ask if they could supervise the
undersigning of a tenancy agreement of an apartment by man M who promised her
accommodation. She told suspect A was intimidating and trying to scare away man M
because suspect A wanted to rent the apartment for prostitution purposes. She was
very afraid of suspect A and the officer noted that she might have been forced in
prostitution by him. On 30 October 2007, the police did a routine inspection of 2
individuals who were waiting with two motorcycles in a street that had been plagued
by street robberies. This was the second observation of suspect A by the police and
his motorcycle was registered by the name of woman C who had been involved in
human trafficking activities as a victim. On 6 March 2009 the police received a tip
that a fugitive Colombian criminal might be living at a certain address owned by
professional criminal H. When they entered the apartment they found 2 men and 2
women of Bulgarian nationality. Man X and woman C declared to be on holiday and
would go back to Bulgaria although we found suspect A was driving around with a
scooter registered at C's name in 2007. Man Y declared he exports expensive cars to
Bulgaria and regularly drives back and forth between Netherlands, an excuse typically
used by suspects taking care of logistics of a human trafficking gang. Woman Z
declared to work in prostitution in Groningen. When the officers left the apartment
they found a motorcycle registered on the name of suspect A. The last observation
dates back to 17 April 2009 when the police saw suspect A call somebody while
standing in the entrance hall of prostitute R. He tells the police he has nothing to do
with prostitution and owns a restaurant in Bulgaria. After his phone call he gives the
cell phone to the prostitute.
To conclude, suspect A and B are most likely involved in human trafficking and
there were sufficient signals found to request the use of special investigation
techniques. Permission was granted, our suspicions were confirmed and both A and B
were arrested by the police in 2010. Moreover these lattices showed some other
people who are involved in the same gang and could be monitored.
5.4 Case 3: Loverboy suspect
In this section we describe a loverboy case which we exposed by gathering evidence
from multiple observational reports. This person was not found by analyzing the
lattice diagram in Fig. 2 but by investigating a lattice based on Antillean, Moroccan
and Turkish persons. Victim V is a girl of Dutch nationality who officially lived in the
Netherlands but fell prey to a loverboy of originally Antillean nationality. We found
multiple indications in filed suspicious activity reports that referred to elements of the
model in section 2. The lattice diagram of suspect A and victim V is displayed in Fig.
5.
On 27-04-2006, Suspect A and victim V were noticed for the first time on the
streets during a police patrol. They had a serious argument with each other and
suspect A took the cell phone with force out of V's hand. When the police intervened
they claimed nothing happened. In the police station she declared that she works
voluntarily in prostitution although her words were not convincing to the officer. On
15-08-2006 an Amsterdam citizen sent an email to the police about young Antillean
men who constantly surveillance some women in the red light district. Amongst other
suspect A brings food and drinks to the women who are not allowed to leave their
rooms. On 31-10-2006 during a police patrol, victim V was noticed while she got out
of a car and quickly ran inside. The driver of the car was suspect A. She told the
police later on that she was brought to and picked up every day at this apartment by
her boyfriend suspect A. The police noticed her dismayed and timid attitude and
asked again if she was forced to work in prostitution. In a non-convincing way she
responded that she did her job voluntarily. On 15-09-2006, suspect A had to stay in
jail for 6 hours because of illegal weapon possession. When the police asked about his
income he told he earned good money thanks to his girlfriend who works in
prostitution. On 2-11-2006, officers noticed the car of victim V was parked on the
road and two Negroid men were inside. The driver, suspect A got out of the car and
yelled to the girl he was picking up at her apartment, that she had to hurry up. The
whole scene looked very intimidating to the police and it turned out the girl was
victim V. Suspicious was that the car was registered on the name of V while V had no
driver license. On 28-03-2007, victim B came to the police office to ask if she was
allowed to work with a badly damaged id-document or if she had to wait for a new
one. She mentioned that suspect A was her ex-boyfriend and that she and victim V
were the victim of extortion but she did not dare to make an official statement to the
police. Afterwards, the police checked a home where they found 2 women: victim V
and B. Victim V had a big tattoo on her right shoulder and a smaller tattoo on her
upper arm. On 19-08-2007, suspect A was involved in a knifing incident in the red
light district between 3 men and one of these men got seriously injured. This man
wanted sex with victim V but suspect A did not allow this because of the man's
ethnicity, which caused the fight. On the camera surveillance videos, victim V was
observed to accompany suspect A all the time. On 16-10-2007, officers observed that
suspect A who walked over the streets said hi to all women who passed by.
Fig. 5. Profile diagram of loverboy suspect
6. Conclusions
Textual documents contain a lot of useful information that is rarely turned into
actionable knowledge by the organizations that own these data repositories. The
police of Amsterdam-Amstelland disposes of a large amount of such textual reports
that may contain early warning indicators that can help to proactively identify persons
involved in illegal activities. Since the observations of one suspect are typically made
by different officers who are not aware of each others work, spread over multiple
databases, etc. automated analysis techniques such as FCA can be of significant
importance for police forces who are interested in the proactive identification of
perpetrators. FCA is one of the few techniques that can be used to interactively
expose, investigate and refine the underlying concepts and relationships between them
in a large amount of data. In this paper we described our successful application of
FCA to find suspects of human trafficking and forced prostitution in the Amsterdam-
Amstelland police district. From 266,157 observational reports we distilled multiple
suspicious cases of which 3 have been described in this paper. For each of these
persons and networks we composed a document containing all the indicators and
evidence available and sent this to the Public Prosecutor. Permission to use special
investigation techniques was obtained by the anti-human trafficking team based on
these documents. For each case we exposed, phone-taps, observation teams, etc.
indeed confirmed the suspect’s involvement in human trafficking and forced
prostitution. We believe that in making the shift from reactive police work, where
action is only undertaken when a victim comes to talk directly to the police, to the
pro-active identification of suspect’s, FCA can play an important role.
Acknowledgements
The authors would like to thank the police of Amsterdam-Amstelland for granting
them the liberty to conduct and publish this research. In particular, we are most
grateful to Deputy Police Chief Reinder Doeleman and Police Chief Hans Schönfeld
for their continued support. Jonas Poelmans is aspirant of the Fonds Voor
Wetenschappelijk Onderzoek – Vlaanderen or Research Foundation – Flanders.
References
1. Bovenkerk, F., Van San, M., Boone, M., Van Solinge, T.B., Korf, D.J. (2004)
“Loverboys” of modern pooierschap in Amsterdam. Willem Pompe Instituut voor
Strafwetenschappen, Utrecht, December.
2. Collier, P.M. (2006) Policing and the intelligent application of knowledge. Public
money & management. Vol. 26, No. 2, pp. 109-116.
3. Elzinga, P., Poelmans, J., Viaene, S., Dedene, G., Morsing, S. (2010) Terrorist
threat assessment with Formal Concept Analysis. Proc. IEEE International Conf.
on Intelligence and Security Informatics. May 23-26, Vancouver, Canada. 77-82.
4. Equality Division, Directorate General of Human Rights of the Council of Europe
(2006) Action against trafficking in human beings: prevention, protection and
prosecution. Proceedings of the regional seminar, Bucharest, Romania, 4-5 April.
5. Ganter, B., Wille, R., Formal Concept Analysis: Mathematical Foundations.
Springer, Heidelberg, 1999.
6. Hughes, D.M. (2000) The “Natasha” Trade: The transnational shadow market of
trafficking in women. Journal of international affairs, Spring, 53, no. 2. The
trustees of Colombia University in the City of new York.
7. Hughes, D.M., Denisova, T. (2003) Trafficking in women from Ukraine U.S.
Department of Justice research report.
8. O’Neill, RA. (1999) International trafficking to the United States: a contemporary
manifestation of slavery and organized crime- and intelligence monograph.
Washington DC; Exceptional Intelligence Analyst Program.
9. Poelmans, J., Elzinga, P., Viaene, S., Dedene, G. (2010) Curbing domestic
violence: Instantiating C-K theory with Formal Concept Analysis and Emergent
Self Organizing Maps. Intelligent Systems in Accounting, Finance and
Management 17, 167-191. Wiley and Sons, Ltd. Doi 10.1002/isaf.319.
10.Poelmans, J., Elzinga, P., Viaene, S., Dedene, G. (2010) Formally Analyzing the
Concepts of Domestic Violence, Expert Systems with Applications 38, 3116-3130.
Elsevier Ltd. doi 10.1016/j.eswa. 2010.08.103 .
11.Poelmans, J., Elzinga, P., Viaene, S., Dedene, G. (2010), Formal Concept Analysis
in Knowledge Discovery: a Survey. LNCS, 6208, 139-153, 18th int. conf. on
conceptual structures (ICCS). 26 - 30 July, Kuching, Sarawak, Malaysia. Springer.
12.Poelmans, J., Elzinga, P., Viaene, S., Dedene, G. (2010). Concept Discovery
Innovations in Law Enforcement: a Perspective, IEEE Computational Intelligence
in Networks and Systems Workshop (INCos 2010), Thesalloniki, Greece.
13.Shelley, L. (1999) Human trafficking: defining the problem . Organized crime
watch-Russia, Vol. 1, No. 2, February.
14.Scharfe, H., Oehrstrom, P., Gyori, M. (2009): A Conceptual Analysis of Difficult
Situations – developing systems for teenagers with ASD. Suppl. Proc. Of the 17th
Int. Conf. On Conceptual Structures (ICCS), Moscow, Russia.
15.U.S. Department of State (2008) Trafficking in persons report.
http://www.state.gov/g/tip/rls/tiprpt/2008, retrieved on 26-12-2010.
16.United Nations, Economic and social council (2004) Economic causes of
trafficking in women in the Unece region. Regional Preparatory Meeting, 10-year
review of implementation of the Beijing Platform for Action, 14-15 December.
17.Viaene S., De Hertogh S., Lutin L., Maandag A., den Hengst S., Doeleman R.
(2009). Intelligence-led policing at the Amsterdam-Amstelland police department:
operationalized business intelligence with an enterprise ambition. Intelligent
systems in accounting, finance and management. 16 (4) : 279 -292.
18.Wolff, K.E., (2005) States, transitions and life tracks in Temporal Concept
Analysis. In: B. Ganter et al. (Eds.): Formal Concept Analysis, LNAI 3626,
Springer, Heidelberg, 127-148.
... Nadat een slachtoffer geïdentificeerd, benaderd of aangetrokken werd, begint de groomingsfase. Het is het moment dat de pleger beseft dat hij (of zij) misschien 'beet heeft', en daarbij vooral aftast en inschat welke gevoeligheden en/of achtergrond het meisje vatbaar maakt voor manipulatie (Poelmans et al., 2011;Verwijs et al., 2011). Daders hanteren een breed palet aan tactieken en passen hun manier van werken aan, aan de context en achtergrond van de (minderjarige) adolescent. ...
... Daarbij komen dan vooral de groepen van losse verbanden in zicht (Bekken et al., 2021;Child Focus, 2015;Cockbain, 2018;Cole & Fougère-Ricaud, 2021;Verwijs et al., 2011). Studies die inzoomen op de organisatieaard of samenwerkingsverbanden tonen dit bijvoorbeeld door middel van (eenvoudige) sociale netwerkanalyse aan (Brayley, 2011;Cockbain, 2018;Poelmans, 2011): "Most offenders and victims were embedded in networks of peer association (…) Contrary to stereotypes about highly organised sex gangs, the offender networks were not hierarchical or otherwise structurally sophisticated. There was little evidence of ringleaders or key broker figures. ...
Research
Full-text available
Based on criminal records of tried offenders known as romeo pimps (a.k.a. "loverboy", "tienerpooier") and interviews, a picture is drawn of the profile, background, modus operandi and judicial antecedents of these human traffickers that target juveniles in Flanders. The scientific report (written in Dutch) was recently released by the subsidising government.
... Bertaux et al. (2009) [91] Describe a method to identify ecological traits of species based on the analysis of their biological characteristics. Dufour-Lussier et al. (2010)[92]Identify ingredients which can be used to replace an ingredient in another recipe using FCA.Poelmans et al. ( , 2011Poelmans et al. ( , 2012 [93,94,95],Elzinga et al. (2010) [96] Use FCA to identify human trafficking and terrorism suspects from observational police reports. ...
... Bertaux et al. (2009) [91] Describe a method to identify ecological traits of species based on the analysis of their biological characteristics. Dufour-Lussier et al. (2010)[92]Identify ingredients which can be used to replace an ingredient in another recipe using FCA.Poelmans et al. ( , 2011Poelmans et al. ( , 2012 [93,94,95],Elzinga et al. (2010) [96] Use FCA to identify human trafficking and terrorism suspects from observational police reports. ...
Article
Formal concept analysis(FCA) is a mathematical theory based on lattice and order theory used for data analysis and knowledge representation. Over the past several years, many of its extensions have been proposed and applied in several domains including data mining, machine learning, knowledge management, semantic web, software development, chemistry ,biology, medicine, data analytics, biology and ontology engineering. This thesis reviews the state-of-the-art of theory of Formal Concept Analysis(FCA) and its various extensions that have been developed and well-studied in the past several years. We discuss their historical roots, reproduce the original definitions and derivations with illustrative examples. Further, we provide a literature review of it’s applications and various approaches adopted by researchers in the areas of dataanalysis, knowledge management with emphasis to data-learning and classification problems. We propose LearnFCA, a novel approach based on FuzzyFCA and probability theory for learning and classification problems. LearnFCA uses an enhanced version of FuzzyLattice which has been developed to store class labels and probability vectors and has the capability to be used for classifying instances with encoded and unlabelled features. We evaluate LearnFCA on encodings from three datasets - mnist, omniglot and cancer images with interesting results and varying degrees of success. Adviser: Dr Jitender Deogun
... Cuvelier and Aufaure (2011) also carry out a study unifying the FCA and Minimal implications base complex network theories. A socially-oriented work is presented by Poelmans et al. (2011), where a semi-automatic process to expose a network of criminal organizations and their members is proposed. Aufaure and Le Grand (2013) also explore the FCA applicability in SNA. ...
Article
Full-text available
Purpose Currently, social network (SN) analysis is focused on the discovery of activity and social relationship patterns. Usually, these relationships are not easily and completely observed, so, it is relevant to discover substructures and potential behavior patterns in SN. Recently the formal concept analysis (FCA) has been applied for this purpose. The FCA is a concept analysis theory which identifies concept structures within a data set. The representation of SN patterns through implication rules based on FCA enables to identify relevant substructures that cannot be easily identified. Our approach considers a minimum and irreducible set of implication rules (stem base) to represent the complete set of data (activity in the network). Applying it to a social network is of interest because it can represent all the relationships using a reduced form. Design/methodology/approach Our approach permits to analyze two-mode networks by transforming the access activities of social network into a formal context. From this context, it can be extracted to a minimal set of implications applying the NextClosure algorithm which is based on the closed sets theory that provides to extract a complete, minimal and non-redundant set of implications. Based on the minimal set, we analyzed the relationships between premises and their respective conclusions to find basic user behaviors. Findings The experiments pointed out that implications, represented as a complex network, enable the identification and visualization of minimal substructures, which could not be found into two-mode network representation. The results also indicated that relations among premises and conclusions represent navigation behavior of SN functionalities. Our approach enables to analyze the following behaviors: conservative, transitive, main functionalities and access time. The results also demonstrated that the relations between premises and conclusions represented the navigation behavior based on the functionalities of a SN. We applied our approach for a social network for relationship in order to explore the minimal access patterns of navigation. Originality/value We present a FCA-based approach to obtain the minimal set of implications capable of representing the minimum structure of the users' behavior in a social network. We define and analyze 3 types of rules that form the sets of implications. These types of rules define substructures of the network, the capacity of generation users' behaviors, transitive behavior and conservative capacity when temporal aspect is considered.
Research
Full-text available
Slachtoffers van tienerpooiers in Brussel. Een exploratief onderzoek naar het bestaan van de problematiek en de mogelijke aanpak ervan in Brussel. Child Focus - in opdracht van equal.brussels. Dit rapport kan gratis gedownload worden op de website www.childfocus.be en is ook beschikbaar in het Frans onder de titel: “Victimes de proxénètes d’adolescents à Bruxelles”
Preprint
Full-text available
Human trafficking is a compound social, economic, and human rights issue occurring in all regions of the world. Understanding and addressing such a complex crime requires effort from multiple domains and perspectives. As of this writing, no systematic review exists of the Operations Research and Analytics literature applied to the domain of human trafficking. The purpose of this work is to fill this gap through a systematic literature review. Studies matching our search criteria were found ranging from 2010 to March 2021. These studies were gathered and analyzed to help answer the following three research questions: (i) What aspects of human trafficking are being studied by Operations Research and Analytics researchers? (ii) What Operations Research and Analytics methods are being applied in the anti-human trafficking domain? and (iii) What are the existing research gaps associated with (i) and (ii)? By answering these questions, we illuminate the extent to which these topics have been addressed in the literature, as well as inform future research opportunities in applying analytical methods to advance the fight against human trafficking.
Article
Europe's system of open frontiers, commonly known as "Schengen", let people from different countries travel and cross the inner frontiers without problems. Different documents from these countries, not only European, can be found in road checkpoints and there is no international database to help Police forces to detect whether they are false or not. People who need a driver license to access to specific jobs, or a new identity because of legal problems, often contact forgers who provide false documents with different levels of authenticity. Governments and Police Forces should improve their methodologies, by ensuring that staff is increasingly better able to detect false or falsified documents through their examination, and follow patterns to detect and situate these forgers. In this work we propose a method, based in Formal Concept Analysis using negative attributes, that allows Police forces analysing false documents and provides a guide to enforce the detection of forgers.
Article
Purpose In recent years, the increasing complexity of the hyper-connected world demands new approaches for social network analysis. The main challenges are to find new computational methods that allow the representation, characterization, and analysis of these social networks. Nowadays, Formal Concept Analysis (FCA) is considered an alternative to identifying conceptual structures in a social network. In this FCA-based work, we show the potential of building computational models based on implications to represent and analyze two-mode networks. Design/methodology/approach We propose an approach to find three important substructures in social networks such as conservative access patterns, minimum behavior patterns, and canonical access patterns. Our approach considered as a case study a database containing the access logs of a cable Internet Service Provider. Findings The result allows us to uncover access patterns, conservative access patterns, and minimum access behavior patterns. Furthermore, through the use of implications sets we analyze the relationships between event type elements (websites) in two-mode networks. This paper discusses, in a generic form, the adopted procedures that can be extended to other social networks. Originality/value We proposed a new approach for the identification of conservative behavior in two-mode networks. We also proposed to analyze the proper implications needed to handle minimum behavior pattern in two-mode networks. The one-item conclusion implications are easy to understand and can be more relevant to anyone looking for one particular website access pattern. Finally, we proposed a method for a canonical behavior representation in two-mode networks using a canonical set of implications (steam base), which present a minimal set of implications without loss of information.
Article
Full-text available
Knowledge discovery is important for systems that have computational intelligence in helping them learn and adapt to changing environments. By representing, in a formal way, the context in which an intelligent system operates, it is possible to discover knowledge through an emerging data technology called formal concept analysis (FCA). This paper describes a tool called FcaBedrock that converts data into formal contexts for FCA. This paper describes how, through a process of guided automation, data preparation techniques such as attribute exclusion and value restriction allow data to be interpreted to meet the requirements of the analysis. Examples are given of how formal contexts can be created using FcaBedrock and then analysed for knowledge discovery, using real datasets. Creating formal contexts using FcaBedrock is shown to be straightforward and versatile. Large datasets are easily converted into a standard FCA format.
Article
Full-text available
Report on research as part of U.S. Ukraine Research Partnership, the International Center of the U.S. National Institute of Justice and the Ukrainian Academy of Legal Sciences
Article
Full-text available
The project, HANDS (Helping Autism-diagnosed teenagers Navigate and Develop Socially), studies how teenagers with ASD and with IQ within the normal range (IQ > 70) can handle what they see as difficult situations using mobile technology. HANDS is a project sponsored by the European Commission as part of the 7th Framework Programme. It is the basic hypothesis in HANDS that it is possible to improve quality of life for teenagers with ASD by providing a mobile ICT toolset supporting them in many daily situations. In this paper, it is argued that a careful conceptual analysis of the idea of "handling difficult situations" can be very useful as a basis for understanding the potential in a system supporting teenagers with ASD. It is also argued that such a conceptual analysis can be based on a combinations of i) psychological insights regarding teenagers with ASD, ii) so-called "usage narratives" describing difficult situations for teenagers with ASD, and iii) central ideas from temporal logic describing formally what it could mean to handle a difficult situation. Furthermore, it is argued that the conceptual analysis can be combined with ideas from so-called persuasive design (PD) in a very straightforward manner. It is finally shown that this conceptual analysis gives rise to a rather strong argument for certain specific system requirements regarding the future HANDS toolset.
Conference Paper
Full-text available
The National Police Service Agency of the Netherlands developed a model to classify (potential) jihadists in four sequential phases of radicalism. The goal of the model is to signal the potential jihadist as early as possible to prevent him or her to enter the next phase. This model has up till now, never been used to actively find new subjects. In this paper, we use Formal Concept Analysis to extract and visualize potential jihadists in the different phases of radicalism from a large set of reports describing police observations. We employ Temporal Concept Analysis to visualize how a possible jihadist radicalizes over time. The combination of these instruments allows for easy decision-making on where and when to act.
Article
Based on Formal Concept Analysis, we introduce Temporal Concept Analysis as a temporal conceptual granularity theory for movements of general objects in abstract or "real" space and time such that the notions of states, situations, transitions and life tracks of objects in conceptual time systems are defined mathematically. The life track lemma is a first approach to granularity reasoning. Applications of Temporal Concept Analysis in medicine and in chemical industry are demonstrated as well as recent developments of computer programs for graphical representations of temporal systems. Basic relations between Temporal Concept Analysis and other temporal theories, namely theoretical physics, mathematical system theory, automata theory, and temporal logic are discussed.
Chapter
A complex concept lattice can possibly be split up into simpler parts. Here the mathematical model must prove its worth by providing efficacious and versatile methods for the decomposition. Every such decomposition principle can be reversed to make a construction method. Therefore, some of the following subjects will be taken up again in the next chapter with this second focus.
Chapter
Maps between concept lattices that can be used for structure comparison are above all the complete homomorphisms. In Section 3.2 we have worked out the connection between compatible subcontexts and complete congruences, i.e., the kernels of complete homomorphisms. A further approach consists in coupling the lattice homomorphisms with context homomorphisms. In this connection, it seems reasonable to use pairs of maps, i.e., to map the objects and the attributes separately. Those pairs can be treated like maps. We do so without further ado and write, for instance,(α,β):(G,M,I)(H,N,J),(\alpha ,\beta ):(G,M,I) \to (H,N,J),if we mean a pair of maps α:GH,β:MN, \alpha :G \to H,\beta :M \to N, using the usual notations for maps by analogy. This does not present any problems, since in the case that GM=+HN G \cap M = + H \cap N we can replace such a pair of maps (α,β) by the map \alpha \cup \beta :G\dot \cup M \to H\dot \cup N
Article
In this paper we propose a human-centered process for knowledge discovery from unstructured text that makes use of Formal Concept Analysis and Emergent Self Organizing Maps. The knowledge discovery process is conceptualized and interpreted as successive iterations through the Concept-Knowledge (C-K) theory design square. To illustrate its effectiveness, we report on a real-life case study of using the process at the Amsterdam-Amstelland police in the Netherlands aimed at distilling concepts to identify domestic violence from the unstructured text in actual police reports. The case study allows us to show how the process was not only able to uncover the nature of a phenomenon such as domestic violence, but also enabled analysts to identify many types of anomalies in the practice of policing. We will illustrate how the insights obtained from this exercise resulted in major improvements in the management of domestic violence cases.
Article
Trafficking of women and children for the sex industry and for labor is prevalent in all regions of the United States. An estimated 45,000 to 50,000 women and children are trafficked annually to the United States, primarily by small crime rings and loosely connected criminal networks. The trafficked victims have traditionally come from Southeast Asia and Latin America; however, increasingly they are coming from the New Independent States and Central and Eastern Europe. Trafficking to the US is likely to increase given weak economies and few job opportunities in the countries of origin; low risk of prosecution and enormous profit potential for the traffickers; and improved international transportation infrastructures. Though it may be impossible to eradicate trafficking to the US, it is possible to diminish the problem significantly by targeted prevention and micro-credit strategies in the source countries; strengthening the penalties and laws against traffickers in this country; and enhancing assistance and protections for the victims.