We start with the formulation of useful local features of a node in the network, which then lead to the machine learning scheme. We feed a subset of known conspirators and non-conspirators as a training samples into the learning algorithm. We then use the algorithm to estimate the probability of being a conspirator for every other individual in the network.