Abstract
The focus of this chapter is on whether or not intelligence analysts are actually applying social network analysis (SNA) in operational environments, and if they are, how are they using SNA? Using Klerks’ (1999, Connections 24(3), 53–65) three generations of network analysis development as a guide, the chapter determines whether analysts are using SNA or alternative network analysis methodologies. Attention then turns to how analysts are applying SNA, with a focus on the identification of key actors and network vulnerabilities, avenues of enquiry, link and attribute weights, and when during an investigation analysts apply SNA.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Interviewees from both Victoria Police and New South Wales Police Force use the terms ‘detective’ and ‘investigator’ interchangeably.
- 2.
A k-core is ‘a subgraph in which every actor has degree k or more with the other actors in the subgraph. Hence in a 2-core every actor is connected to at least two other actors’ (Borgatti et al. 2013, p. 252). A k-core analysis is particularly useful for analysts who are looking at very large networks, but wish to focus on the core of the network. For example, once a k-core analysis has been conducted, the analyst can progressively remove actors who are one-core (who have a relationship with only one actor), two-core (who have a relationship with only two actors) and so on until they are left with just ‘the inner core of the network’ (Borgatti et al. 2013, p. 252).
- 3.
Call charge records (also called non-content telecommunication) is data that is recorded by telecommunication equipment about communication transactions, such as phone calls, text messages (SMS), and image and video messaging (MMS). These records do not contain the content of the communication but other metadata, such as the date and time of the communication. In Australia, such data can be requested from telecommunication providers with a warrant. According to the Australian Federal Police, such records ‘provide important leads for agencies, including evidence of connections and relationships within larger associations over time, evidence of targets’ movements and habits, a snapshot of events immediately before and after a crime, evidence to exclude people from suspicion, and evidence needed to obtain warrants for the more intrusive investigative techniques such as interception or access to content. Disclosure of non-content telecommunications data is one of the most efficient and cost effective investigative tools available to law enforcement’ (AFP 2012).
- 4.
The relationships between actors can also be shown as ‘directed’ and ‘undirected’ (Ball 2016). Undirected relationships are where they ‘logically must always be reciprocated’ (Borgatti et al. 2013, p. 12). Directed relationships can either be bi-directional (‘operate mutually’) or one-directional (as in one actor giving advice to another) (Ball 2016, p. 11; Borgatti and Foster 2003). In a link diagram with directed relationships, the lines connecting the actors will have arrowheads showing the direction of the relationships (or two arrowheads if the relationship is bi-directional). Of the numerous studies that have applied SNA to criminal networks, few have used directed relationships (Bichler et al. 2014; Skillicorn et al. 2014). There was also no mention made by the research participants regarding the use of directed relationships. For these reasons, they will not be examined in this study.
- 5.
Ucinet, for example, is a publicly available network analysis software program that contains many more mathematical computations than Analyst Notebook (Borgatti et al. 2002). Analysts have difficulty accessing such tools for a number of reasons, including monetary constraints and security concerns.
- 6.
For the purposes of this study an investigation is regarded as over when a brief of evidence is handed to public prosecutors. A brief of evidence is a collection of documents, including statements (from the police, victims and any witnesses), copies of any exhibits (such photos) and a transcript of an interview between the suspect and police that is handed over by the latter to prosecutors to use as potential evidence should they proceed to trial (NSW Government 2017).
References
AFP, Telecommunications data retention – an overview (Parliament of Australia, 2012). http://www.aph.gov.au/About_Parliament/Parliamentary_Departments/Parliamentary_Library/pubs/BN/2012-2013/DataRetention#_Toc338835111. Accessed 6 July 2017
S. Azad, A. Gupta, A quantitative assessment on 26/11 Mumbai attack using social network analysis. J. Terrorism Res. 2(2), 4–14 (2011)
L. Ball, Automating social network analysis: a power tool for counter-terrorism. Secur. J. 29(2), 147–168 (2016)
G. Berlusconi, Do all the pieces matter? Assessing the reliability of law enforcement data sources for the network analysis of wire taps. Global Crime 14(1), 61–81 (2013)
G. Bichler, S. Lim, E. Larin, Tactical social network analysis: using affiliation networks to aid serial homicide investigation. Homicide Stud. 21(2), 133–158 (2016)
G. Bichler, A. Malm, J. Enriquez, Magnetic facilities: identifying key juvenile convergence places with social network analysis. Crime Delinq. 60(7), 971–998 (2014)
S. Borgatti, M. Everett, J.C. Johnson, Analyzing social networks (SAGE Publications, London, 2013)
S.P. Borgatti, M.G. Everett, L.C. Freeman, Ucinet for Windows: software for social network analysis (2002). https://sites.google.com/site/ucinetsoftware/home. Accessed 26 September 2012
S.P. Borgatti, P.P. Foster, The network paradigm in organizational research: a review and typology. J. Manage. 29(6), 991–1013 (2003)
M. Bouchard, J. Amirault, Advances in research on illicit networks. Global Crime 14(2–3), 119–122 (2013)
M. Bouchard, R. Konaraski, Assessing the core membership of a youth gang from its co-offending network, in Crime and networks, ed. by C. Morselli, (Routledge, New York, 2014), pp. 81–93
D.A. Bright, J.J. Delaney, Evolution of a drug trafficking network: mapping changes in network structure and function across time. Global Crime 14(2–3), 238–260 (2013)
D.A. Bright, C. Greenhill, M. Reynolds, A. Ritter, C. Morselli, The use of actor-level attributes and centrality measures to identify key actors: a case study of an Australian drug trafficking network. J. Contemp. Crim. Justice 31(3), 262–278 (2015a)
D.A. Bright, C. Greenhill, A. Ritter, C. Morselli, Networks within networks: using multiple link types to examine network structure and identify key actors in a drug trafficking operation. Global Crime 16(3), 1–19 (2015b)
D.A. Bright, C.E. Hughes, J. Chalmers, Illuminating dark networks: a social network analysis of an Australian drug trafficking syndicate. Crime Law Soc. Chang. 57(2), 151–176 (2012)
R. Burt, Structural holes: the social structure of competition (Harvard University Press, Cambridge, 1992)
K.M. Carley, Destabilization of covert networks. Comput. Math. Org. Theor. 12(1), 51–66 (2006a)
K.M. Carley, A dynamic network approach to the assessment of terrorist groups and the impact of alternative courses of action, Paper presented to Visualising Network Information, Neuilly-sur-Seine, France, 2006b
K.M. Carley, M. Dombroski, M. Tsvetovat, J. Reminga, N. Kamneva, Destabilizing dynamic covert networks, Paper presented to Proceedings of the 8th International Command and Control Research and Technology Symposium, National Defense War College, Washington, DC, 2003
D.L. Carter, Law enforcement intelligence: a guide for state, local, and tribal law enforcement agencies (2009), No. 24 July 2012. https://it.ojp.gov/documents/d/e050919201-IntelGuide_web.pdf. Accessed 21 August 2018
E. Cockbain, H. Brayley, G. Laycock, Exploring internal child sex trafficking networks using social network analysis. Policing 5(2), 144–157 (2011)
N. Coles, It’s not what you know it’s who you know: analysing serious crime groups as social networks. Br. J. Criminol. 41(4), 580–594 (2001)
D. Cunningham, S. Everton, G. Wilson, C. Padilla, D. Zimmerman, Brokers and key players in the internationalization of the FARC. Stud. Conflict Terrorism 36(6), 477–502 (2013)
D. Décary-Hétu, B. Dupont, The social network of hackers. Global Crime 13(3), 160–175 (2012)
P.A.C. Duijn, V. Kashirin, P.M.A. Sloot, The relative ineffectiveness of criminal network disruption. Sci. Rep. 4(4238), 1–15 (2014)
P.A.C. Duijn, P.P.H.M. Klerks, Social network analysis applied to criminal networks: recent developments in Dutch law enforcement, in Networks and network analysis for defence and security, ed. by A. J. Masys, (Springer, Heidelberg, 2014), pp. 121–159
B. Dupont, Security networks and counter-terrorism: a reflection on the limits of adversarial isomorphism, in Social networks, terrorism and counter-terrorism: radical and connected, ed. by M. Bouchard, (Routledge, London, 2015), pp. 155–174
S.F. Everton, D. Cunningham, Detecting significant changes in dark networks. Behav. Sci. Terrorism Polit. Aggression 5(2), 1–21 (2012)
M. Granovetter, The strength of weak ties. Am. J. Sociol. 78(6), 1360–1380 (1973)
M. Granovetter, The strength of weak ties: a network theory revisited. Sociol. Theor. 1, 201–233 (1983)
J.T. Hamill, R.F. Deckro, J.W. Chrissis, R.F. Mills, Analysis of layered social networks. Isophere Winter, 27–33 (2008)
W.R. Harper, D.H. Harris, The application of link analysis to police intelligence. Hum. Factors 17(2), 157–164 (1975)
S. Harris-Hogan, Anatomy of a terrorist cell: a study of the network uncovered in Sydney in 2005. Behav. Sci. Terrorism Polit. Aggression 5(2), 1–18 (2012)
D.C. Hofmann, O. Gallupe, Leadership protection in drug-trafficking networks. Global Crime 16(2), 123–138 (2015)
J.A. Johnson, J.D. Reitzal, Social network analysis in an operational environment: defining the utility of a network approach for crime analysis using the Richmond City Police Department as a case study (2011). http://www.coginta.org/en/document/policy_working_paper_series?page=3. Accessed 8 August 2012
M.R. Kebbell, D.A. Muller, K. Martin, Understanding and managing bias, in Dealing with uncertainties in policing serious crime, ed. by G. Bammer, (Australian National University E Press, Canberra, 2010)
J. Kennedy, G. Weimann, The strength of weak terrorist ties. Terrorism Polit. Violence 23(2), 201–212 (2011)
M. Kenney, The architecture of drug trafficking: network forms of organisation in the Colombian cocaine trade. Global Crime 8(3), 233–259 (2007)
P. Klerks, The network paradigm applied to criminal organisations: theoretical nitpicking or relevant doctrine for investigators? Recent developments in the Netherlands. Connections 24(3), 53–65 (1999)
S. Koschade, A social network analysis of Jemaah Islamiyah: the applications to counterterrorism and intelligence. Stud. Conflict Terrorism 29(6), 559–575 (2006)
V. Krebs, Mapping networks of terrorist cells. Connections 24(3), 43–52 (2002)
C. Leuprecht, A. Aulthouse, O. Walther, The puzzling resilience of transnational organized criminal networks. Police Pract. Res. 17(4), 376–387 (2016)
LexisNexis, Social media use in law enforcement: crime prevention and investigative activities continue to drive usage. LexisNexis (2014). http://www.lexisnexis.com/risk/downloads/whitepaper/2014-social-media-use-in-law-enforcement.pdf. Accessed 9 January 2017
R. Mac Ginty, Social network analysis and counterinsurgency: a counterproductive strategy? Crit. Stud. Terrorism 3(2), 209–226 (2010)
E.D. Mainas, The analysis of criminal and terrorist organisations as social network structures: a quasi-experimental study. Int. J. Police Sci. Manage. 14(3), 264–283 (2012)
A. Malm, G. Bichler, Networks of collaborating criminals: assessing the structural vulnerability of drug markets. J. Res. Crime Delinq. 48(2), 271–297 (2011)
C. McGrath, J. Blythe, D. Krackhardt, The effect of spatial arrangement on judgments and errors in interpreting graphs. Soc. Networks 19(3), 223–242 (1997)
C. McGrath, D. Krackhardt, J. Blythe, Visualizing complexity in networks: seeing both the forest and the trees. Connections 25(1), 37–47 (2003)
J.S. McIllwain, Organized crime: a social network approach. Crime Law Soc. Chang. 32(4), 301–323 (1999)
R.M. Medina, Social network analysis: a case study of the Islamist terrorist network. Secur. J. 27(1), 97–121 (2014)
C. Morselli, Assessing vulnerable and strategic positions in a criminal network. J. Contemp. Crim. Justice 26(4), 382–392 (2010)
C. Morselli (ed.), Crime and networks (Routledge, New York, 2014)
S. Mullins, A. Dolnik, An exploratory, dynamic application of social network analysis for modelling the development of Islamist terror cells in the West. Behav. Sci. Terrorism Polit. Aggression 2(1), 3–29 (2010)
M. Natarajan, Understanding the structure of a large heroin distribution network: a quantitative analysis of qualitative data. J. Quant. Criminol. 22(2), 171–192 (2006)
NSW Government, Reading a brief of evidence (NSW Government, 2017). http://www.lawaccess.nsw.gov.au/Pages/representing/driving_offences_and_crime/pleading_not_guilty/preparing_for_the_hearing/reading_a_brief_of_evidence.aspx. Accessed 31 July 2017
A.V. Papachristos, C. Wildeman, E. Roberto, Tragic, but not random: the social contagion of nonfatal gunshot injuries. Soc. Sci. Med. 125, 139–150 (2015)
A. Perliger, A. Pedahzur, Social network analysis in the study of terrorism and political violence. Polit. Sci. Polit. 44(2), 45–50 (2011)
J. Ratcliffe, Intelligence-led policing and the problems of turning rhetoric into practice. Polic. Soc. 12(1), 53–66 (2002)
J. Ratcliffe, Intelligence-led policing (Routledge, New York, 2016)
N. Roberts, S.F. Everton, Strategies for combating dark networks. J. Soc. Struct. 12(2), 1–32 (2011)
D.K. Rossmo, Criminal investigative failures (CRC Press, New York, 2009)
D.M. Schwartz, T. Rouselle, Using social network analysis to target criminal networks. Trends Org. Crime 12(2), 188–207 (2009)
D.B. Skillicorn, Q. Zheng, C. Morselli, Modeling dynamic social networks using spectral embedding. Soc. Network Anal. Min. 4(1), 182 (2014)
M.K. Sparrow, The application of network analysis to criminal intelligence: an assessment of the prospects. Soc. Networks 13(3), 251–274 (1991)
M. Tsvetovat, K.M. Carley, Structural knowledge and success of anti-terrorist activity: the downside of structural equivalence (Carnegie Mellon University, 2005). http://repository.cmu.edu/isr/43. Accessed 21 May 2012
R. van der Hulst, Introduction to social network analysis (SNA) as an investigative tool. Trends Org. Crime 12(2), 101–121 (2009)
B.G. Westlake, M. Bouchard, R. Frank, Finding the key players in online child exploitation networks. Policy Internet 3(2), 1–32 (2011)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2020 The Author(s)
About this chapter
Cite this chapter
Burcher, M. (2020). Social Network Analysis and Crime Intelligence. In: Social Network Analysis and Law Enforcement. Crime Prevention and Security Management. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-030-47771-4_3
Download citation
DOI: https://doi.org/10.1007/978-3-030-47771-4_3
Published:
Publisher Name: Palgrave Macmillan, Cham
Print ISBN: 978-3-030-47770-7
Online ISBN: 978-3-030-47771-4
eBook Packages: Law and CriminologyLaw and Criminology (R0)