Abstract
Over the past two decades an increasing number of researchers have applied social network analysis (SNA) to various ‘dark’ networks. This research suggests that SNA is capable of revealing significant insights into the dynamics of dark networks, particularly the identification of critical nodes, which can then be targeted by law enforcement and security agencies for disruption. However, there has so far been very little research into whether and how law enforcement agencies can actually leverage SNA in an operational environment and in particular the challenges agencies face when attempting to apply various network analysis techniques to criminal networks. This paper goes some way towards addressing these issues by drawing on qualitative interviews with criminal intelligence analysts from two Australian state law enforcement agencies. The primary contribution of this paper is to call attention to the organisational characteristics of law enforcement agencies which, we argue, can influence the capacity of criminal intelligence analysts to successfully apply SNA as much as the often citied ‘characteristics of criminal networks’.
Similar content being viewed by others
Notes
Some analytical tools like Analyst Notebook have over time been updated to include third generation mathematical computations making the distinction between second and third generation tools ‘somewhat fuzzy’ (Wiil 2013, p. 8).
Call charge records is data that is recorded by telecommunication equipment about communication transactions, such as phone calls, text messages (SMS), and image and video messaging (MMS). In Australia, such data can be requested from telecommunication providers with a warrant.
Optus is an Australian telecommunications provider. The phone number mentioned here is the number people call to hear their voice messages.
Intelligence Product Proposals are used by Victoria Police. New South Wales Police have a similar system called Intelligence Collection Plans.
The organisations involved are aware of a number of these challenges. For example, Victoria Police’s Blue Paper (2014), a strategic outline for the organisation over the coming decade, outlines a number of current deficiencies with their IT systems.
AUSTRAC (Australian Transaction Reports and Analysis Centre) is an Australian Government department tasked with anti-money laundering and counter-terrorism financing which includes its own specialist financial intelligence unit.
References
Arquilla J (2014) To build a network. PRism 4(1):22–33
Athey NC, Bouchard M (2013) The BALCO scandal: the social structure of a steroid distribution network. Glob Crime 14(2–3):216–237
Borgatti S, Everett M, Johnson JC (2013) Analyzing social networks. SAGE Publications, London
Borgatti SP (2006) Identifying sets of key players in a social network. Comput Math Organ Theory 12(1):21–34
Borgatti SP, Carley KM, Krackhardt D (2006) On the robustness of centrality measures under conditions of imperfect data. Soc Networks 28(2):124–136
Borgatti SP, Mehra A, Brass DJ, Labianca G (2009) Network analysis in the social sciences. Science 323:892–895
Bouchard M, Amirault J (2013) Advances in research on illicit networks. Glob Crime 14(2–3):119–122
Bright DA, Delaney JJ (2013) Evolution of a drug trafficking network: mapping changes in network structure and function across time. Glob Crime 14(2–3):238–260
Bright DA, Greenhill C, Levenkova N (2014) Dismantling criminal networks: can node attributes play a role? In: Morselli C (ed) Crime and networks. Routledge, New York
Bright DA, Greenhill C, Reynolds M, Ritter A, Morselli C (2015a) The use of actor-level attributes and centrality measures to identify key actors: a case study of an Australian drug trafficking network. J Contemp Crim Justice 31(3):262–278
Bright DA, Greenhill C, Ritter A, Morselli C (2015b) Networks within networks: using multiple link types to examine network structure and identify key actors in a drug trafficking operation. Glob Crime 16(3):1–19
Bright DA, Hughes CE, Chalmers J (2012) 'Illuminating dark networks: a social network analysis of an Australian drug trafficking syndicate', Crime. Law Soc Chang 57(2):151–176
Brodeur J-P, Dupont B (2006) Knowledge workers or "knowledge" workers? Polic Soc 16(1):7–26
Burcher M, Whelan C (2015) Social network analysis and small group ‘dark’ networks: an analysis of the London bombers and the problem of ‘fuzzy’ boundaries. Glob Crime 16(2):104–122
Carley KM (2006) Destabilization of covert networks. Computational Math Organisation Theory 12(1):51–66
Charette Y, Papachristos AV (2017) The network dynamics of co-offending careers. Social Networks. doi:10.1016/j.socnet.2016.12.005
Cockbain E, Brayley H, Laycock G (2011) Exploring internal child sex trafficking networks using social network analysis. Policing 5(2):144–157
Décary-Hétu D, Dupont B (2012) The social network of hackers. Glob Crime 13(3):160–175
Duijn PAC, Kashirin V, Sloot PMA (2014) The relative ineffectiveness of criminal network disruption. Scientific Reports 4:1–15
Duijn PAC, Klerks PPHM (2014) Social network analysis applied to criminal networks: recent developments in Dutch law enforcement. In: Masys AJ (ed) Networks and network analysis for Defence and security. Springer, Heidelberg, pp 121–159
Duval, RD, Christensen, K & Spahiu, A (2010), 'Bootstrapping a terrorist network', paper presented to Southern Illinois University Carbondale, <http://opensiuc.lib.siu.edu/cgi/viewcontent.cgi?article=1017&context=pnconfs_2010>.
Everton SF, Cunningham D (2012) Detecting significant changes in dark networks. Behav Sci Terror Polit Aggress 5(2):1–21
Framis AG-S, Regadera SF (2017) Static and dynamic approaches of a drug trafficking network. In: Leclerc B, Savona EU (eds) Crime prevention in the twenty-first century: insightful approaches for crime prevention initiatives. Springer International Publishing, Switzerland
Guest G, MacQueen KM, Namey EE (2014) Applied thematic analysis. Sage Publications, Thousand Oaks, California
Helfstein S, Wright D (2011) Covert or convenient? Evolution of terror attack networks. J Confl Resolut 55(5):785–813
Hutchins CE, Benham-Hutchins M (2010) Hiding in plain sight: criminal network analysis. Comput Math Organ Theory 16(1):89–111
Johnson, JA & Reitzal, JD (2011), Social network analysis in an operational environment: Defining the utility of a network approach for crime analysis using the Richmond City Police Department as a case study, Coginta, retrieved 8 August 2012, <http://www.dcaf.ch/Publications/Social-network-analysis-in-an-operational-environment-Defining-the-utility-of-a-network-approach-for-crime-analysis-using-the-Richmond-City-Police-Department-as-a-case-study>.
Karthika S, Bose S (2011) A comparative study of social networking approaches in identifying the covert nodes. Int J Web Serv Computing 2(3):65–78
Klerks P (1999) The network paradigm applied to criminal organisations: theoretical nitpicking or relevant doctrine for investigators? Recent developments in the Netherlands. Connect 24(3):53–65
Koschade S (2006) A social network analysis of Jemaah Islamiyah: the applications to counterterrorism and intelligence. Stud Confl Terror 29(6):559–575
Krebs V (2002) Mapping networks of terrorist cells. Connect 24(3):43–52
Laumann EO, Marsden PV, Prensky D (1992) Research methods in social network analysis. Transaction Publishers, New Brunswick, New Jersey
Malm A, Bichler G (2011) Networks of collaborating criminals: assessing the structural vulnerability of drug markets. J Res Crime Delinq 48(2):271–297
Malm A, Bichler G (2013) Using friends for money: the positional importance of money-launderers in organized crime. Trends Organ Crime 16(4):365–381
Maxfield MG, Babbie ER (2011) Research methods for criminal Justice and criminology. Wadswroth Cengage Learning, Belmont, CA
Medina RM (2014) Social network analysis: a case study of the Islamist terrorist network. Secur J 27(1):97–121
Morris JF, Deckro RF (2013) SNA data difficulties with dark networks. Behav Sci Terror Polit Aggress 5(2):70–93
Morselli C (2009) Hells Angels in springtime. Trends in Organised Crime 12(2):145–158
Morselli C (2010) Assessing vulnerable and strategic positions in a criminal network. J Contemp Crim Justice 26(4):382–392
Morselli C (ed) (2014) Crime and networks. Routledge, New York
Morselli C, Petit K (2007) Law-enforcement disruption of a drug importation network. Glob Crime 8(2):109–130
Morselli C, Roy J (2008) Brokerage qualifications in rigning operations. Criminology 46(1):71–98
Mullins S (2012a) Social network analysis and counter-terrorism: measures of centrality as an investigative tool. Behav Sci Terror Polit Aggress 5(2):115–136
Mullins S (2012b) Social network analysis and terrorism: an introduction to the special issue. Behav Sci Terror Polit Aggress:1–3
Rodriguez, JA (2005), The March 11th terrorist network: In its weakness lies its strength, CiteSeer, retrieved 7 August 2012, <http://www.ub.edu/epp/wp/11m.PDF>.
Sanders CB, Henderson S (2013) Police ‘empires’ and information technologies: uncovering material and organisational barriers to information sharing in Canadian police services. Polic Soc 23(2):243–260
Schwartz DM, Rouselle T (2009) Using social network analysis to target criminal networks. Trends Organ Crime 12(2):188–207
Sheptycki J (2004) Organizational pathologies in police intelligence systems: some contributions to the lexicon of intelligence-led policing. Eur J Criminol 1(3):307–332
Sparrow MK (1991) The application of network analysis to criminal intelligence: an assessment of the prospects. Soc Networks 13(3):251–274
van der Hulst RC (2009) Introduction to social network analysis (SNA) as an investigative tool. Trends Organ Crime 12(2):101–121
Victoria Police (2014), ' Victoria Police blue paper: A vision for Victoria Police 2025′, <http://www.police.vic.gov.au/content.asp?Document_ID=42063>.
Whelan C (2012) Networks and national security: dynamics, effectiveness and organisation. Ashgate, London
Wiil UK (2013) 'Issues for the next generation of criminal network investigation tools', paper presented to European intelligence and security informatics conference. Uppsala, Sweden
Xu J, Chen H (2005) Criminal network analysis and visualization. Commun ACM 48(6):100–107
Acknowledgements
The authors would like to sincerely thank Victoria Police and New South Wales Police Force for their involvement, and in particular, the analysts that gave up their time to be involved with this study. The authors would also like to thank the anonymous reviewers for their critical input on an earlier version of this article.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Funding
This study was not funded.
Ethical approval
All procedures performed in studies involving human participants were in accordance with the ethical standards of the institutional and/or national research committee and with the 1964 Helsinki declaration and its later amendments or comparable ethical standards.
Informed consent
Informed consent was obtained from all individual participants included in the study.
Conflict of interest
The authors – Morgan Burcher and Chad Whelan – declare that have no conflict of interest.
Rights and permissions
About this article
Cite this article
Burcher, M., Whelan, C. Social network analysis as a tool for criminal intelligence: understanding its potential from the perspectives of intelligence analysts. Trends Organ Crim 21, 278–294 (2018). https://doi.org/10.1007/s12117-017-9313-8
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12117-017-9313-8