Skip to main content

Social Network Analysis and Crime Intelligence

  • Chapter
  • First Online:
Social Network Analysis and Law Enforcement

Part of the book series: Crime Prevention and Security Management ((CPSM))

Abstract

The focus of this chapter is on whether or not intelligence analysts are actually applying social network analysis (SNA) in operational environments, and if they are, how are they using SNA? Using Klerks’ (1999, Connections 24(3), 53–65) three generations of network analysis development as a guide, the chapter determines whether analysts are using SNA or alternative network analysis methodologies. Attention then turns to how analysts are applying SNA, with a focus on the identification of key actors and network vulnerabilities, avenues of enquiry, link and attribute weights, and when during an investigation analysts apply SNA.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 139.00
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 129.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Interviewees from both Victoria Police and New South Wales Police Force use the terms ‘detective’ and ‘investigator’ interchangeably.

  2. 2.

    A k-core is ‘a subgraph in which every actor has degree k or more with the other actors in the subgraph. Hence in a 2-core every actor is connected to at least two other actors’ (Borgatti et al. 2013, p. 252). A k-core analysis is particularly useful for analysts who are looking at very large networks, but wish to focus on the core of the network. For example, once a k-core analysis has been conducted, the analyst can progressively remove actors who are one-core (who have a relationship with only one actor), two-core (who have a relationship with only two actors) and so on until they are left with just ‘the inner core of the network’ (Borgatti et al. 2013, p. 252).

  3. 3.

    Call charge records (also called non-content telecommunication) is data that is recorded by telecommunication equipment about communication transactions, such as phone calls, text messages (SMS), and image and video messaging (MMS). These records do not contain the content of the communication but other metadata, such as the date and time of the communication. In Australia, such data can be requested from telecommunication providers with a warrant. According to the Australian Federal Police, such records ‘provide important leads for agencies, including evidence of connections and relationships within larger associations over time, evidence of targets’ movements and habits, a snapshot of events immediately before and after a crime, evidence to exclude people from suspicion, and evidence needed to obtain warrants for the more intrusive investigative techniques such as interception or access to content. Disclosure of non-content telecommunications data is one of the most efficient and cost effective investigative tools available to law enforcement’ (AFP 2012).

  4. 4.

    The relationships between actors can also be shown as ‘directed’ and ‘undirected’ (Ball 2016). Undirected relationships are where they ‘logically must always be reciprocated’ (Borgatti et al. 2013, p. 12). Directed relationships can either be bi-directional (‘operate mutually’) or one-directional (as in one actor giving advice to another) (Ball 2016, p. 11; Borgatti and Foster 2003). In a link diagram with directed relationships, the lines connecting the actors will have arrowheads showing the direction of the relationships (or two arrowheads if the relationship is bi-directional). Of the numerous studies that have applied SNA to criminal networks, few have used directed relationships (Bichler et al. 2014; Skillicorn et al. 2014). There was also no mention made by the research participants regarding the use of directed relationships. For these reasons, they will not be examined in this study.

  5. 5.

    Ucinet, for example, is a publicly available network analysis software program that contains many more mathematical computations than Analyst Notebook (Borgatti et al. 2002). Analysts have difficulty accessing such tools for a number of reasons, including monetary constraints and security concerns.

  6. 6.

    For the purposes of this study an investigation is regarded as over when a brief of evidence is handed to public prosecutors. A brief of evidence is a collection of documents, including statements (from the police, victims and any witnesses), copies of any exhibits (such photos) and a transcript of an interview between the suspect and police that is handed over by the latter to prosecutors to use as potential evidence should they proceed to trial (NSW Government 2017).

References

  • AFP, Telecommunications data retention – an overview (Parliament of Australia, 2012). http://www.aph.gov.au/About_Parliament/Parliamentary_Departments/Parliamentary_Library/pubs/BN/2012-2013/DataRetention#_Toc338835111. Accessed 6 July 2017

  • S. Azad, A. Gupta, A quantitative assessment on 26/11 Mumbai attack using social network analysis. J. Terrorism Res. 2(2), 4–14 (2011)

    Google Scholar 

  • L. Ball, Automating social network analysis: a power tool for counter-terrorism. Secur. J. 29(2), 147–168 (2016)

    Google Scholar 

  • G. Berlusconi, Do all the pieces matter? Assessing the reliability of law enforcement data sources for the network analysis of wire taps. Global Crime 14(1), 61–81 (2013)

    Google Scholar 

  • G. Bichler, S. Lim, E. Larin, Tactical social network analysis: using affiliation networks to aid serial homicide investigation. Homicide Stud. 21(2), 133–158 (2016)

    Google Scholar 

  • G. Bichler, A. Malm, J. Enriquez, Magnetic facilities: identifying key juvenile convergence places with social network analysis. Crime Delinq. 60(7), 971–998 (2014)

    Google Scholar 

  • S. Borgatti, M. Everett, J.C. Johnson, Analyzing social networks (SAGE Publications, London, 2013)

    Google Scholar 

  • S.P. Borgatti, M.G. Everett, L.C. Freeman, Ucinet for Windows: software for social network analysis (2002). https://sites.google.com/site/ucinetsoftware/home. Accessed 26 September 2012

  • S.P. Borgatti, P.P. Foster, The network paradigm in organizational research: a review and typology. J. Manage. 29(6), 991–1013 (2003)

    Google Scholar 

  • M. Bouchard, J. Amirault, Advances in research on illicit networks. Global Crime 14(2–3), 119–122 (2013)

    Google Scholar 

  • M. Bouchard, R. Konaraski, Assessing the core membership of a youth gang from its co-offending network, in Crime and networks, ed. by C. Morselli, (Routledge, New York, 2014), pp. 81–93

    Google Scholar 

  • D.A. Bright, J.J. Delaney, Evolution of a drug trafficking network: mapping changes in network structure and function across time. Global Crime 14(2–3), 238–260 (2013)

    Google Scholar 

  • D.A. Bright, C. Greenhill, M. Reynolds, A. Ritter, C. Morselli, The use of actor-level attributes and centrality measures to identify key actors: a case study of an Australian drug trafficking network. J. Contemp. Crim. Justice 31(3), 262–278 (2015a)

    Google Scholar 

  • D.A. Bright, C. Greenhill, A. Ritter, C. Morselli, Networks within networks: using multiple link types to examine network structure and identify key actors in a drug trafficking operation. Global Crime 16(3), 1–19 (2015b)

    Google Scholar 

  • D.A. Bright, C.E. Hughes, J. Chalmers, Illuminating dark networks: a social network analysis of an Australian drug trafficking syndicate. Crime Law Soc. Chang. 57(2), 151–176 (2012)

    Google Scholar 

  • R. Burt, Structural holes: the social structure of competition (Harvard University Press, Cambridge, 1992)

    Google Scholar 

  • K.M. Carley, Destabilization of covert networks. Comput. Math. Org. Theor. 12(1), 51–66 (2006a)

    Google Scholar 

  • K.M. Carley, A dynamic network approach to the assessment of terrorist groups and the impact of alternative courses of action, Paper presented to Visualising Network Information, Neuilly-sur-Seine, France, 2006b

    Google Scholar 

  • K.M. Carley, M. Dombroski, M. Tsvetovat, J. Reminga, N. Kamneva, Destabilizing dynamic covert networks, Paper presented to Proceedings of the 8th International Command and Control Research and Technology Symposium, National Defense War College, Washington, DC, 2003

    Google Scholar 

  • D.L. Carter, Law enforcement intelligence: a guide for state, local, and tribal law enforcement agencies (2009), No. 24 July 2012. https://it.ojp.gov/documents/d/e050919201-IntelGuide_web.pdf. Accessed 21 August 2018

  • E. Cockbain, H. Brayley, G. Laycock, Exploring internal child sex trafficking networks using social network analysis. Policing 5(2), 144–157 (2011)

    Google Scholar 

  • N. Coles, It’s not what you know it’s who you know: analysing serious crime groups as social networks. Br. J. Criminol. 41(4), 580–594 (2001)

    Google Scholar 

  • D. Cunningham, S. Everton, G. Wilson, C. Padilla, D. Zimmerman, Brokers and key players in the internationalization of the FARC. Stud. Conflict Terrorism 36(6), 477–502 (2013)

    Google Scholar 

  • D. Décary-Hétu, B. Dupont, The social network of hackers. Global Crime 13(3), 160–175 (2012)

    Google Scholar 

  • P.A.C. Duijn, V. Kashirin, P.M.A. Sloot, The relative ineffectiveness of criminal network disruption. Sci. Rep. 4(4238), 1–15 (2014)

    Google Scholar 

  • P.A.C. Duijn, P.P.H.M. Klerks, Social network analysis applied to criminal networks: recent developments in Dutch law enforcement, in Networks and network analysis for defence and security, ed. by A. J. Masys, (Springer, Heidelberg, 2014), pp. 121–159

    Google Scholar 

  • B. Dupont, Security networks and counter-terrorism: a reflection on the limits of adversarial isomorphism, in Social networks, terrorism and counter-terrorism: radical and connected, ed. by M. Bouchard, (Routledge, London, 2015), pp. 155–174

    Google Scholar 

  • S.F. Everton, D. Cunningham, Detecting significant changes in dark networks. Behav. Sci. Terrorism Polit. Aggression 5(2), 1–21 (2012)

    Google Scholar 

  • M. Granovetter, The strength of weak ties. Am. J. Sociol. 78(6), 1360–1380 (1973)

    Google Scholar 

  • M. Granovetter, The strength of weak ties: a network theory revisited. Sociol. Theor. 1, 201–233 (1983)

    Google Scholar 

  • J.T. Hamill, R.F. Deckro, J.W. Chrissis, R.F. Mills, Analysis of layered social networks. Isophere Winter, 27–33 (2008)

    Google Scholar 

  • W.R. Harper, D.H. Harris, The application of link analysis to police intelligence. Hum. Factors 17(2), 157–164 (1975)

    Google Scholar 

  • S. Harris-Hogan, Anatomy of a terrorist cell: a study of the network uncovered in Sydney in 2005. Behav. Sci. Terrorism Polit. Aggression 5(2), 1–18 (2012)

    Google Scholar 

  • D.C. Hofmann, O. Gallupe, Leadership protection in drug-trafficking networks. Global Crime 16(2), 123–138 (2015)

    Google Scholar 

  • J.A. Johnson, J.D. Reitzal, Social network analysis in an operational environment: defining the utility of a network approach for crime analysis using the Richmond City Police Department as a case study (2011). http://www.coginta.org/en/document/policy_working_paper_series?page=3. Accessed 8 August 2012

  • M.R. Kebbell, D.A. Muller, K. Martin, Understanding and managing bias, in Dealing with uncertainties in policing serious crime, ed. by G. Bammer, (Australian National University E Press, Canberra, 2010)

    Google Scholar 

  • J. Kennedy, G. Weimann, The strength of weak terrorist ties. Terrorism Polit. Violence 23(2), 201–212 (2011)

    Google Scholar 

  • M. Kenney, The architecture of drug trafficking: network forms of organisation in the Colombian cocaine trade. Global Crime 8(3), 233–259 (2007)

    Google Scholar 

  • P. Klerks, The network paradigm applied to criminal organisations: theoretical nitpicking or relevant doctrine for investigators? Recent developments in the Netherlands. Connections 24(3), 53–65 (1999)

    Google Scholar 

  • S. Koschade, A social network analysis of Jemaah Islamiyah: the applications to counterterrorism and intelligence. Stud. Conflict Terrorism 29(6), 559–575 (2006)

    Google Scholar 

  • V. Krebs, Mapping networks of terrorist cells. Connections 24(3), 43–52 (2002)

    Google Scholar 

  • C. Leuprecht, A. Aulthouse, O. Walther, The puzzling resilience of transnational organized criminal networks. Police Pract. Res. 17(4), 376–387 (2016)

    Google Scholar 

  • LexisNexis, Social media use in law enforcement: crime prevention and investigative activities continue to drive usage. LexisNexis (2014). http://www.lexisnexis.com/risk/downloads/whitepaper/2014-social-media-use-in-law-enforcement.pdf. Accessed 9 January 2017

  • R. Mac Ginty, Social network analysis and counterinsurgency: a counterproductive strategy? Crit. Stud. Terrorism 3(2), 209–226 (2010)

    Google Scholar 

  • E.D. Mainas, The analysis of criminal and terrorist organisations as social network structures: a quasi-experimental study. Int. J. Police Sci. Manage. 14(3), 264–283 (2012)

    Google Scholar 

  • A. Malm, G. Bichler, Networks of collaborating criminals: assessing the structural vulnerability of drug markets. J. Res. Crime Delinq. 48(2), 271–297 (2011)

    Google Scholar 

  • C. McGrath, J. Blythe, D. Krackhardt, The effect of spatial arrangement on judgments and errors in interpreting graphs. Soc. Networks 19(3), 223–242 (1997)

    Google Scholar 

  • C. McGrath, D. Krackhardt, J. Blythe, Visualizing complexity in networks: seeing both the forest and the trees. Connections 25(1), 37–47 (2003)

    Google Scholar 

  • J.S. McIllwain, Organized crime: a social network approach. Crime Law Soc. Chang. 32(4), 301–323 (1999)

    Google Scholar 

  • R.M. Medina, Social network analysis: a case study of the Islamist terrorist network. Secur. J. 27(1), 97–121 (2014)

    Google Scholar 

  • C. Morselli, Assessing vulnerable and strategic positions in a criminal network. J. Contemp. Crim. Justice 26(4), 382–392 (2010)

    Google Scholar 

  • C. Morselli (ed.), Crime and networks (Routledge, New York, 2014)

    Google Scholar 

  • S. Mullins, A. Dolnik, An exploratory, dynamic application of social network analysis for modelling the development of Islamist terror cells in the West. Behav. Sci. Terrorism Polit. Aggression 2(1), 3–29 (2010)

    Google Scholar 

  • M. Natarajan, Understanding the structure of a large heroin distribution network: a quantitative analysis of qualitative data. J. Quant. Criminol. 22(2), 171–192 (2006)

    Google Scholar 

  • NSW Government, Reading a brief of evidence (NSW Government, 2017). http://www.lawaccess.nsw.gov.au/Pages/representing/driving_offences_and_crime/pleading_not_guilty/preparing_for_the_hearing/reading_a_brief_of_evidence.aspx. Accessed 31 July 2017

  • A.V. Papachristos, C. Wildeman, E. Roberto, Tragic, but not random: the social contagion of nonfatal gunshot injuries. Soc. Sci. Med. 125, 139–150 (2015)

    Google Scholar 

  • A. Perliger, A. Pedahzur, Social network analysis in the study of terrorism and political violence. Polit. Sci. Polit. 44(2), 45–50 (2011)

    Google Scholar 

  • J. Ratcliffe, Intelligence-led policing and the problems of turning rhetoric into practice. Polic. Soc. 12(1), 53–66 (2002)

    Google Scholar 

  • J. Ratcliffe, Intelligence-led policing (Routledge, New York, 2016)

    Google Scholar 

  • N. Roberts, S.F. Everton, Strategies for combating dark networks. J. Soc. Struct. 12(2), 1–32 (2011)

    Google Scholar 

  • D.K. Rossmo, Criminal investigative failures (CRC Press, New York, 2009)

    Google Scholar 

  • D.M. Schwartz, T. Rouselle, Using social network analysis to target criminal networks. Trends Org. Crime 12(2), 188–207 (2009)

    Google Scholar 

  • D.B. Skillicorn, Q. Zheng, C. Morselli, Modeling dynamic social networks using spectral embedding. Soc. Network Anal. Min. 4(1), 182 (2014)

    Google Scholar 

  • M.K. Sparrow, The application of network analysis to criminal intelligence: an assessment of the prospects. Soc. Networks 13(3), 251–274 (1991)

    Google Scholar 

  • M. Tsvetovat, K.M. Carley, Structural knowledge and success of anti-terrorist activity: the downside of structural equivalence (Carnegie Mellon University, 2005). http://repository.cmu.edu/isr/43. Accessed 21 May 2012

  • R. van der Hulst, Introduction to social network analysis (SNA) as an investigative tool. Trends Org. Crime 12(2), 101–121 (2009)

    Google Scholar 

  • B.G. Westlake, M. Bouchard, R. Frank, Finding the key players in online child exploitation networks. Policy Internet 3(2), 1–32 (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Morgan Burcher .

Rights and permissions

Reprints and permissions

Copyright information

© 2020 The Author(s)

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Burcher, M. (2020). Social Network Analysis and Crime Intelligence. In: Social Network Analysis and Law Enforcement. Crime Prevention and Security Management. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-030-47771-4_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-47771-4_3

  • Published:

  • Publisher Name: Palgrave Macmillan, Cham

  • Print ISBN: 978-3-030-47770-7

  • Online ISBN: 978-3-030-47771-4

  • eBook Packages: Law and CriminologyLaw and Criminology (R0)

Publish with us

Policies and ethics