Research and Innovation Initiatives

Research

CINA pursues a comprehensive set of programs and activities that are designed to equip practitioners, end users, decision makers, and U.S. policy makers in the homeland security enterprise with state-of-the-art knowledge, expertise, methods, tools, and technologies to help combat the growing threat of transnational crime.

While advances in information and communication technologies have benefited education, healthcare, and other crucial areas of society, transnational criminal operations have also taken advantage of technology to evolve, become more agile, and expand their scope. Today, transnational criminal networks can easily appear, disappear, and reorganize in response to operational opportunities and authority gaps.

The evolving CINA research portfolio comprises the following themes:

Criminal Network Analysis

Intended to equip HSE stakeholders with a thorough understanding and knowledge of criminal activity, its evolution, and convergence, ranging from gang activities to money laundering and human trafficking, and the tools to monitor and disrupt these activities.

Dynamic Patterns of Criminal Activity

Intended to provide HSE stakeholders with cutting-edge methods, tools and activities to predict future criminal activities, gang activities, and threats to the US, studying them at the geographical, social, and cyber dimensions.

Forensics

Intended to develop and deploy state-of-the-art forensic methods, tools, and technologies within the HSE community.

Criminal Investigative Processes

Intended to improve HSE end user investigative processes used to detect, pursue and solve transnational criminal activity.

Projects under the above four themes are also addressing issues related to the Future of Law Enforcement Investigations, adding a fifth dimension to our research portfolio.
Project TitleInvestigatorInstitutionProject Summary
A machine learning-based approach to analyzing and triaging encrypted data containers in law enforcement applicationsKim-Kwang Raymond ChooThe University of Texas at San AntonioSummary Download
Adaptive Graph-based Framework for Multi-Source Digital Forensic AnalysisYao MaRensselaer Polytechnic InstituteSummary Download
Adding STIX Support to the Volatility Memory Forensics FrameworkGolden G. Richard IIILouisiana State UniversitySummary Download
Agent-based Learning to Utilize Local Data for Activity RecognitionM. Hadi Amini, Naphtali Rishe, Shabnam RezapourFlorida International UniversitySummary Download
An Architectural Model for Web-Based Technologies to Enhance Text-Image Capabilities in Detecting Sex Trafficking CasesShyamal Das, Sambit BhattacharyaElizabeth City State University, Fayetteville State UniversitySummary Download
An Extensible Criminal Predictive Analytic Platform (CPAP) for Opioid Abuse Detection and PredictionDaniel O’Malley, Allen Harper, Richard BansleyLiberty University
Best Practices for Sharing Digital EvidenceFred Roberts, Dennis Egan, Midge Cozzens, Christie Nelson, Linda TartagliaRutgers University
Combating Dynamic and Networked Financial Crimes- Characterization, Monitoring, and Human-AI-Collaborative Visual AnalyticsDawei ZhouVirginia TechSummary Download
Cross-platforms Cybercrime Detection on Inter-connected Heterogeneous NetworksLiang Zhao, Andreas ZufleGeorge Mason University, Emory UniversitySummary Download
Data Science-integrated Experiential Digital Forensics Training based on Real-world Case Studies of Cybercrime ArtifactsIrfan Ahmed, Kostadin DamevskiVirginia Commonwealth UniversitySummary Download
Detecting Criminal Disruption of Supply Chains StudyCarlotta Domeniconi, Sean Luke, Fred Roberts, Andrew Crooks, Jim JonesGeorge Mason University, Rutgers UniversitySummary Download
Detecting and Disrupting Transnational Criminal Organizations: Analytics for Interdependent Smuggling and Money-Laundering NetworksBoleslaw Szymanski, Thomas C. Sharkey, William WallaceRensselaer Polytechnic Institute, Clemson University
Detection of Illicit Massage Businesses through Spatial and Socio-Demographic Data EnrichmentMaria Mayorga, Osman OzaltinNorth Carolina State UniversitySummary Download
Determinants of Spatio-Temporal Patterns of Cybercrimes across the United StatesPetar JevticArizona State UniversitySummary Download
Digital Forensic Investigations involving Cryptocurrency Wallets Installed on Mobile DevicesDiana Summers, Rachel Salter, Cesar Quezada, Jessica HydeUniversity of Alabama, Joint Electronic Crimes Task Force, HexordiaSummary Download
Digital Forensic Tools and Techniques for Investigating Control Logic Attacks in Industrial Control SystemsIrfan AhmedVirginia Commonwealth UniversitySummary Download
Digital Holographic Acquisition, Storage, Retrieval and Analysis of Three-Dimensional Fingermarks Developed with the Nanoscale Columnar-Thin-Film TechniqueAkhlesh Lakhtakia, Partha BanerjeePenn State University, University of DaytonSummary Download
Digital Media Sector Hashing for Evidence CorrelationJim JonesGeorge Mason University
Education and Workforce Training for Artificial Intelligence in Criminal Activity Recognition: Computing and Criminology PerspectivesM. Hadi AminiFlorida International UniversitySummary Download
Effects of Natural Disasters on Spatio-Temporal Patterns Of Crime Types in the United StatesPetar Jevtic, Melanie GallArizona State UniversitySummary Download
Evaluate Current NCFI Course Offerings and Develop Recommendations for Prerequisites and Post Curriculum EvaluationsAdam Goldstein, Joseph Williams
Champlain College
Summary Download
Exploring Graph Neural Networks for Attributed Multilayer Criminal Network AnalysisSuhang Wang, Vasant HonavarPenn State UniversitySummary Download
Geospatial Technology and Agent-based ModelingDavid Weisburd, Alese WooditchGeorge Mason University, Temple University
Graph Analytics and Visualization for Criminal Network IdentificationDirk Reiners, Carolina Cruz-NeiraUniversity of Central FloridaSummary Download
Human Trafficking HubsLouise Shelley, Jose Miguel Cruz, Jeremy Slack, Desmond Arias, Michael Smith, Rob TillyerGeorge Mason University, Florida International University, University of Texas El Paso, CUNY Baruch College, University of Texas at San Antonio, University of Texas San Antonio
Identity Sciences Interdisciplinary ResearchArun Ross, Xiaoming Liu, Anil JainMichigan State UniversitySummary Download
Illicit Gold from Peru and Colombia: Understanding the Trade, Routes, and U.S. LinkagesLouise Shelley, Dr. Camilo Pardo
George Mason University
Summary Download
Improving Human Trafficking Investigations: A Data-Driven ApproachMichael Smith, Rob Tillyer, Marie TillyerUniversity of Texas at San Antonio, University of Texas San Antonio
Innovative Spatiotemporal Pattern Detection: Examining Changes in Crime Hot Spots Across 6 U.S. CitiesMarie Tillyer, Arthur Acolin, Rebecca WalterUniversity of Texas at San Antonio, University of WashingtonSummary Download
Is there money laundering in cryptocurrency markets?Foteini Baldimtsi, Maurice Kugler, Jiasun LiGeorge Mason UniversitySummary Download
Joint Exploitation of Personal and Premises Surveillance VideoEd Delp, Patrick Flynn, Amy R. Reibman, David EbertPurdue University, University of Notre Dame
Location Data Analytics and Visualization for Criminal Network IdentificationDirk Reiners, Carolina Cruz-NeiraUniversity of Central FloridaSummary Download
Memory Forensics-Guided Execution Reconstruction for Android DevicesAisha Ali-GombeLouisiana State UniversitySummary Download
Network Interdiction Models to Improve Effectiveness of Coordinated Labor Trafficking Disruption EffortsKayse MaassNortheastern UniversitySummary Download
Open Source Intelligence in Online Stolen Data Markets: Assessment of Network Disruption StrategiesDavid Maimon, Marie Ouellet, Yubao WuGeorgia State University
Overcoming Reluctance and Increasing Intelligence Gathering from Victims of TraffickingAllison Redlich, Jodi QuasGeorge Mason University, University of California, IrvineSummary Download
PLC Forensic Toolset for Industrial Control SystemsIrfan AhmedVirginia Commonwealth UniversitySummary Download
Profiling hoax callers: Forensic analysis of voice recordingsRita Singh, Bhiksha RamakrishnanCarnegie Mellon University
Source Attribution of Fentanyl via Multivariate Metals AnalysisBrian EckenrodeGeorge Mason UniversitySummary Download
Supporting the investigation of criminal networks: Developing an effective law enforcement training program for network and group reportingLorraine Hope, Feni KontogianniUniversity of Portsmouth (UK), University of Winchester (UK)Summary Download
The Emergence and Diffusion of Illicit Virtual Goods across the International EcosystemYubao Wu, David Maimon, Ekaterina BotchkovarGeorgia State University, Northeastern UniversitySummary Download
The Next Battlefield: Illicit Markets Hosted on Encrypted Communication PlatformsDavid Maimon, Yubao Wu, Scot Thomas JacquesGeorgia State UniversitySummary Download
Time Series Analysis of Anonymized Communication ChannelsBob Simon, Eric OsterweilGeorge Mason UniversitySummary Download
Tracing Networks of Gangs using Data AnalyticsHuzefa Rangwala, Naren Ramakrishnan, Desmond AriasGeorge Mason University, Virginia Tech, CUNY Baruch College
Training on Intelligence and Evidence Gathering in Darknet EnvironmentsDavid MaimonGeorgia State UniversitySummary Download
Understanding and Disrupting the Formation of New Criminal Networks: The Case of Novel Illicit Drug Trafficking OperationsThomas C. Sharkey, Bryan MillerClemson UniversitySummary Download
Understanding the Economy and Social Organization of the Underground Market for Cybercrime as a ServiceThomas Holt, Olga SmirnovaMichigan State University, East Carolina UniversitySummary Download
Using Deep Learning to Extract and Analyze Dynamic Knowledge Graphs of Criminal Networks from Publicly Available TextCarlotta Domeniconi, Ph.D.George Mason UniversitySummary Download