Skip to main content

Advertisement

Log in

Understanding the Structure of a Large Heroin Distribution Network: A Quantitative Analysis of Qualitative Data

  • Original paper
  • Published:
Journal of Quantitative Criminology Aims and scope Submit manuscript

Abstract

An analysis is reported of 2,408 wiretap conversations gathered in the course of prosecuting a heroin dealing organization in New York City in the 1990s. The five-step analysis, which included a social network analysis of phone contacts, revealed a large, loosely structured group of 294 individuals, most of whom had very limited contacts with others in the group. The group’s active core comprised 38 individuals with extended contacts, little status differentiation and some task specialization. A smaller more tightly connected group of 22 individuals was somewhat independent of the remainder of the core and appeared to constitute a “communal business”. The existence was not confirmed of the large criminal conspiracy described by the prosecution that operated at all levels of trafficking and dealing, from wholesale distribution to street sales. Rather, it appeared that the 294 individuals comprised one segment of the heroin market in the city. However, the discrepancy could be due to the fact that the prosecution drew upon a wider set of information about the individuals concerned than provided by the wiretap data. The study supports recent analyses that see organized crimes, such as drug trafficking, as mostly the work of small groups of loosely linked entrepreneurs rather than large, highly structured criminal syndicates.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

Notes

  1. Their review omitted Fuentes (1998) and subsequent to their review two further studies have been published Browne et al. (2003) and Pearson and Hobbs (2003).

  2. Members of traditional criminal organizations might sometimes participate in deals, but again this would often be on a personal basis.

  3. An “enterprise” includes any individual, partnership, corporation, association, or other legal entity and any union or group of individuals formed to create and deliver products to customers (Marcus 1995).

  4. Infobase is a freeform collection of information (both text and graphics) with a comprehensive index. Text in an infobase may be searched, grouped by topic, linked, and edited.

  5. A total of 39 applications for wiretap orders were made during the case, but many of these were for extension orders or for pager devices. Three of the 21 phones tapped were mobile phones which were then in use.

  6. Though this case is closed and the case data are publicly available, IRB required keeping the identity of phones or individuals as anonymous. Nine conversations from three phones were non-usable and were eliminated from the analyses.

  7. The 39 wiretap applications made in the case account for a sizeable proportion of all wiretap authorizations in New York State during the period covered by the investigation; for example, in 1992, 117 such applications were authorized in New York State.

  8. These suppliers are found among the 208 individuals with only one contact. They were often contacted in hotels in other states such as New Jersey and Florida, but the content of the conversations showed they had connections with South America.

  9. Systematic random sampling procedure was used to select the 45 conversations of 45 dyads i.e. every 6th conversation of each dyad was used for analysis.

  10. To check whether this was an artifact of the selection of conversations, the entire database was searched for the word “sir”. Inspection of the 41 hits revealed that the word was most commonly used by higher status individuals when addressing each other.

  11. The taped calls were both outgoing and incoming and for the purposes of the network analysis (which was based on only a sample of all calls intercepted) the contacts were assumed to be directional, mutual and dichotomous (Wasserman and Faust 1994).

  12. The divisions into which cut-points divide a graph are called blocks.

  13. A few phone calls were made to Cali, in Colombia, and there was some evidence that women couriers were bringing in small quantities from Colombia. Some conversations related to travel to Greece and Europe to seek supplies. Some other places called from the tapped phones included Boston, Washington DC, Tampa, Miami, Jamaica, Mexico and Taiwan.

  14. Apart from measuring status differentials, the content of the wiretap conversations was not subjected to detailed analysis, but some useful information emerged from informal reading of the transcripts about the daily lives of those involved in the organization. For example, many members of the core group appeared to have legitimate jobs besides drug dealing. They participated in many ordinary activities, such as going to birthday parties, ball games and family celebrations and visiting friends and relatives in the hospitals. Informal reading of the content of the wiretap conversations also suggested that, at the wholesale level, ethnic and family ties provide the backcloth of trust for the drug-dealing transactions. This may be why violence was rarely mentioned and seems to have been rarely used. In fact, the transactions were conducted like those of any other cooperative businesses with the price and quality of drugs appearing to be the factors weighing most heavily in the deals.

  15. Sparsely-knit, fragmentary, loosely bounded networks make it possible to reach many people through short chains of “friends of friends” (Boissevain 1974).

References

  • Adler PA (1985) Wheeling and dealing: an ethnography of an upper-level drug dealing and smuggling community. Colombia University Press, New York

    Google Scholar 

  • Adler PA (1992) The “post” phase of deviant careers: Reintegrating drug traffickers. Deviant Behav 13:103–126

    Article  Google Scholar 

  • Albanese JS (2004) Organized crime in our times. Anderson Publishing, Cincinnati

    Google Scholar 

  • Barnes JA (1972) Social networks. Addison-Wesley, Reading, MA

    Google Scholar 

  • Berkowitz SD (1982) An introduction to structural analysis: the network approach to social research. Butterworths, Toronoto

    Google Scholar 

  • Boissevain J (1974) Friends of friends: networks, manipulators, and coalitions. Basil Blackwell, Oxford

    Google Scholar 

  • Bonacich P (1987) Power and centrality: a family of measures. Amer J Sociol 92:1170–1182

    Article  Google Scholar 

  • Bonacich P (2001) The evolution of exchange networks. J Social Struct 2(5). Retrieved October 20, 2005, from http://www.cmu.edu/joss/content/articles/volume2/Bonacich.html

  • Borgatti SP, Everett MG (1992) Notions of position in social network analysis. Soc Method 22:1–35

    Article  Google Scholar 

  • Borgatti SP, Everett MG (1999) Models of core/periphery structures. Soc Network 21:375–395

    Article  Google Scholar 

  • Borgatti SP, Foster P (2003) The network paradigm in organizational research: a review and typology. J Manag 29(6):991–1013

    Article  Google Scholar 

  • Borgatti SP, Everett MG, Freeman LC (2002) UCINET for Windows: software for social network analysis. Analytic Technologies, Harvard

    Google Scholar 

  • Breiger RL (2004) The analysis of social networks. In: Hardy M, Bryman A (eds) Handbook of data analysis. Sage, London, pp 505–526

    Google Scholar 

  • Brown R, Clarke RV (2004) Police intelligence and theft of vehicles for export: recent UK experience. In: Maxfield M, Clarke RV (eds) Understanding and preventing car theft. Criminal Justice Press, Monsey, NY, pp 1–5

    Google Scholar 

  • Browne D, Mason M, Murphy R (2003) Drug supply and trafficking: an overview. Howard J Crim Justice. 42(4):324–334

    Article  Google Scholar 

  • Burt RS (1976) Position in networks. Soc Forces 55:93–122

    Article  Google Scholar 

  • Burt R (1992) Structural holes: the social structure of competition. Harvard University Press, Cambridge, MA

    Google Scholar 

  • Clarke RV, Brown R (2003) International trafficking in stolen vehicles. In: Tonry M (ed) Crime and justice. A review of research 30. University of Chicago Press, Chicago

    Google Scholar 

  • Delaney PD, Denning DE, Kaye J, and McDonald AR (1993) Wiretap laws and procedures what happens when the U.S. government taps a line. Computer professionals for social responsibility. Retrieved October 20, 2005 from http://www.cpsr.org/prevsite/cpsr/privacy/wiretap/wiretap.procedure.html

  • DesRoches F (1999) Wholesale drug dealers, paper presented to panel on ‘The Structure and operation of illegal commodity markets’. Annual Meeting of the American Society of Criminology, Toronto

  • Dorn N, Murji K, South N (1992) Traffickers: Drug markets and law enforcement. Routledge, London

    Google Scholar 

  • Dorn N, Oette L, White S (1998) Drugs importation and the bifurcation of risk: capitalization, cut outs and organized crime. Brit J Criminol 38:537–560

    Article  Google Scholar 

  • Everett MG, Borgatti SP (1999) The centrality of groups and classes. J Math Sociol 23(3):181–201

    Article  Google Scholar 

  • Fijnaut C, Bovenkerk F, Bruinsma G, van de Bunt H (1998) Organized crime in the Netherlands. Kluwer Law International, The Hague, the Netherlands

    Google Scholar 

  • Finckenauer J (2000) Meeting the challenge of transnational crime. National Institute of Justice, Washington, DC

    Google Scholar 

  • Finckenauer JO, Waring EJ (1998) Russian mafia in America: immigration, culture, and crime. Northeastern University Press, Boston

    Google Scholar 

  • Freeman LC (1979) Centrality in social networks: conceptual clarification. Soci Network 1:215–239

    Article  Google Scholar 

  • Friedkin NE (1991) Theoretical foundation for centrality measures. Amer J Sociol 96:1478–1504

    Article  Google Scholar 

  • Fuentes RJ (1998) Life of a cell: managerial practice and strategy in Colombian cocaine distribution in the United States. Ph.D. Dissertation, City University of New York

  • Granovetter M (1983) The strength of weak ties: a network theory revisited. Soc Theory 1:201–233

    Article  Google Scholar 

  • Granovetter M (1985) Economic action and social structure: the problem of embeddedness. Amer J Sociol 91:481–510

    Article  Google Scholar 

  • Granovetter M (1995) The economic sociology of firms and entrepreneurs. In: Portes A (ed) The economic sociology of immigration: essays in networks, ethnicity and entrepreneurship. Russell Sage Foundation, New York, pp 128–165

    Google Scholar 

  • Guerette R, and Clarke RV (2005) Border enforcement, organized crime, and deaths of smuggled migrants on the United States-Mexico border. Euro J Crim Policy Res 11(2):159–174

    Article  Google Scholar 

  • Hobbs D (2001) The firm: organizational logic and criminal culture on a shifting terrain. Brit J Criminol 41(4):549–560

    Article  Google Scholar 

  • Ianni AF, Ianni RE (1990) Network analysis. In: Andrews, PP, Peterson MB (eds) Criminal intelligence analysis. Palmer Enterprises, Loomis, CA, pp 67–84

    Google Scholar 

  • Kilduff M, Tsai W (2003) Social networks and organizations. Sage, Beverly Hills, CA

    Google Scholar 

  • Kleemans E, van de Bunt H (1999) The social embeddedness of transnational criminal Organizations. Trans Org Crime 5(1):97–119

    Google Scholar 

  • Kleinknecht W (1996) The new ethnic mobs: the changing face of organized crime in America. Free Press, New York

    Google Scholar 

  • Klerks P (2001) The network paradigm applied to criminal organizations. Connections. 24(3):53–65

    Google Scholar 

  • Knoke D, Kuklinski JH (1981) Network analysis. Sage, Beverly Hills, CA

    Google Scholar 

  • Marcus P (1995) The prosecution and defense of criminal conspiracy cases. Matthew Bender, New York

    Google Scholar 

  • Markovsky B, Willer D, Patton T (1988) Power relations in exchange networks. Amer Sociol Rev 53:220–236

    Article  Google Scholar 

  • Markovsky B, Skvoretz J, Willer D, Lovaglia M, Erger J (1993) The seeds of weak power: an extension of network exchange theory. Amer Sociol Rev 58:197–209

    Article  Google Scholar 

  • Moore MH (1987) Organized crime as a business enterprise. In: Edelhertz H (ed) Major issues in organized crime. National Institute of Justice, Washington, DC, pp 51–63

    Google Scholar 

  • Moreno JL (1934) Who shall survive? Foundations of sociometry, group psychotherapy and sociodrama. Nervous and Mental Disease Publishing Company, Washington, DC

    Google Scholar 

  • Natarajan M (2000) Understanding the structure of a drug trafficking organization: a conversational analysis. In: Natarajan M, Hough M (eds) Illegal drug markets: from research to prevention policy. Criminal Justice Press, Monsey, NY, pp 273–298

    Google Scholar 

  • Natarajan M, Belanger M (1998) Varieties of upper-level drug dealing organizations: a typology of cases prosecuted in New York City. J Drug Issues 28(4):1005–1026

    Google Scholar 

  • Pearson G, Hobbs D (2001) Middle market drug distribution. Home Office, London

    Google Scholar 

  • Pearson G, Hobbs D (2003) King pin? A case study of a middle market drug broker. Howard J Crim Justice 42(4):335–347

    Article  Google Scholar 

  • Potter GW (1994) Criminal organizations: vice, racketeering, and politics in an American city. Waveland, Prospect Heights, IL

    Google Scholar 

  • Reuter P (2004) The political economy of drug smuggling. In: Vellinga M (ed) The political economy of the drug industry. University Press of Florida, Gainesville, pp 129–147

    Google Scholar 

  • Reuter P, Hagga J (1989) The organization of high-level drug markets: an exploratory study. RAND, Santa Monica

    Google Scholar 

  • Scott J (1991) Social network analysis: a handbook. Sage Publications, Newbury Park, CA

    Google Scholar 

  • Sparrow M (1991) The application of network analysis to criminal intelligence: an assessment of the prospects. Soc Networks 13:251–274

    Article  Google Scholar 

  • Van Marshall A (1997) The state of network organization: a survey in three frameworks. J Org Comput 7(2 & 3):83–151 (Retrieved on June 15, 2005. http://web.mit.edu/marshall/www/papers/NWOrg.pdf)

    Google Scholar 

  • Wasserman S, Faust K (1994) Social network analysis: methods and applications. Cambridge University Press, Cambridge, MA

    Google Scholar 

  • Watts D (1999) Networks, dynamics, and the small-world phenomenon. Amer J Sociol 13(2):493–527

    Article  Google Scholar 

  • Wellman B (1992) Which types of ties and networks give what kinds of social support? Adv Group Process 9:207–235

    Google Scholar 

  • Zabludoff S (1997) Colombian narcotics organizations as business enterprises. Trans Org Crime 3(2):20–49

    Google Scholar 

  • Zhang S and Chin K (2003) The declining significance of triad societies in transnational illegal activities. A structural deficiency perspective. Brit J Criminol 43(3):469–488

    Google Scholar 

  • Zhang S, Chin K (2004) Characteristics of chinese human smugglers. US Dept of Justice, National Institute of Justice, United States

    Google Scholar 

Download references

Acknowledgments

This research was primarily supported by a grant from the National Institute on Drug Abuse (1K21DA00242). Viewpoints in this paper do not necessarily represent the official positions of the U.S. Government, National Institute on Drug Abuse or John Jay College of Criminal Justice. Earlier versions of the paper were presented at a NIDA Drug Abuse Workshop, October 2004, Bethesda, MD and the 11th Environmental Criminology and Crime Analysis Seminar held at University of Cincinnati in June 2003. The author acknowledges the assistance of Ms. Haley Kobilinsky with coding and wishes to thank Prof. Ronald V. Clarke of Rutgers University and Dr. Bruce Johnson of National Development Research Institutes, Inc, New York City for their advice and support. She also thanks Zachary Weiss, Assistant District Attorney, White Plains NY, for facilitating this analysis of court data. Finally, the author wishes to acknowledge the insightful comments made by the anonymous reviewers.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mangai Natarajan.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Natarajan, M. Understanding the Structure of a Large Heroin Distribution Network: A Quantitative Analysis of Qualitative Data. J Quant Criminol 22, 171–192 (2006). https://doi.org/10.1007/s10940-006-9007-x

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10940-006-9007-x

Keywords

Navigation