• Skip to primary navigation
  • Skip to main content

CINA.

  • About
    • Mission
    • People
  • Research
    • Research
    • Projects
    • RFPs
  • Education
    • Resources
    • Internships
  • Publications
    • Newsletter Archive
    • Director’s Blog
  • News & Events
    • News
    • CINA Director’s Blog
    • Digital Archive
    • Events
    • Work with Us
  • Contact
  • Search Toggle
  • Skip to content

The Social Network Analysis and Hackers’ Networks

Jul 2020

  • Research Brief

ABSTRACT: The online market for stolen data creates unique networks via comments or other relations between various players. The available information serves as a valuable resource to apply social network (SNA) methods to assess offender networks. These methods focus not only on the players but on the connections between the players, and imply that the transfer of information in the market demonstrates key associations between actors. SNA methods allow for the identification of key players on a network and can be useful for law enforcement to develop targeted takedown strategies of important dark networks. Additionally, it may provide a limited predictive capacity to identify key-players before any arrests have been made.  Read more...

Authors

  • Olga Smirnova
Publication Download

Topics:

  • Social networks

Research Areas:

  • Criminal network analysis
  • Dynamic patterns of criminal activity
  • Network analytics

*The programs and services offered by George Mason University are open to all who seek them. George Mason does not discriminate on the basis of race, color, religion, ethnic national origin (including shared ancestry and/or ethnic characteristics), sex, disability, military status (including veteran status), sexual orientation, gender identity, gender expression, age, marital status, pregnancy status, genetic information, or any other characteristic protected by law. After an initial review of its policies and practices, the university affirms its commitment to meet all federal mandates as articulated in federal law, as well as recent executive orders and federal agency directives.

CINA Now

Events

All Events

Publications

The Key to Deobfuscation is Pattern of Life, not Overcoming Encryption

Published: Oct 4, 2025

The Organized Activities of Ransomware Groups: A Social network Approach

Published: Mar 14, 2025
All Publications

News

CINA Distinguished Speaker Series with Colton Seale: Interviewer Mindset

CINA  |   April 3, 2025  |   Posted In:
  • Digital Archive
  • Uncategorized

CINA  |   March 6, 2025  |   Posted In:
  • Uncategorized
All News

Science and Technology Directorate’s Office of University Programs
CINA at George Mason University Logo
Copyright © 2025 All Rights Reserved | CINA Is A Department of Homeland Security Center of Excellence led by George Mason University
  • Facebook
  • Twitter
  • Instagram
  • Linkedin
  • YouTube