AUC Philosophica et Historica (Acta Universitatis Carolinae Philosophica et Historica) is a multidisciplinary academic journal focused on the humanities with more than 50 years of tradition.
The journal is indexed in CEEOL, DOAJ, and EBSCO.
AUC PHILOSOPHICA ET HISTORICA, Vol 2018 No 2 (2018), 115–135
Sinister connections: How to analyse organised crime with social network analysis?
Tomáš Diviák
DOI: https://doi.org/10.14712/24647055.2018.7
published online: 18. 04. 2018
abstract
Networks have recently become ubiquitous in many scientific fields. In criminology, social network analysis (SNA) provides a potent tool for analysis of organized crime. This paper introduces basic network terms and measures as well as advanced models and reviews their application in criminological research. The centrality measures – degree and betweenness – are introduced as means to describe relative importance of actors in the network. The centrality measures are useful also in determining strategically positioned actors within the network or providing efficient targets for disruption of criminal networks. The cohesion measures, namely density, centralization, and average geodesic distance are described and their relevance is related to the idea of efficiency-security trade-off. As the last of the basic measures, the attention is paid to subgroup identification algorithms such as cliques, k-plexes, and factions. Subgroups are essential in the discussion on the cell-structure in criminal networks. The following part of the paper is a brief overview of more sophisticated network models. Models allow for theory testing, distinguishing systematic processes from randomness, and simplification of complex network structures. Quadratic assignment procedure, blockmodels, exponential random graph models, and stochastic actor-oriented models are covered. Some important research examples include similarities in co-offending, core-periphery structures, closure and brokerage, and network evolution. Subsequently, the paper reflects the three biggest challenges for application of SNA to criminal settings – data availability, proper formulation of theories and adequate methods application. In conclusion, readers are referred to books and journals combining SNA and criminology as well as to software suitable to carry out SNA.
keywords: social network analysis; network models; criminal networks; covert networks; organized crime
references (72)
1. Athey, N. C., & Bouchard, M. (2013). The BALCO scandal: the social structure of a steroid distribution network. Global Crime, 14(2/3), 216–237. CrossRef
2. Batagelj, V., Doreian, P., & Ferligoj, A. (2011). Positions and Roles. In J. Scott & P. J. Carrington (Eds.), The SAGE Handbook of Social Network Analysis (pp. 434–447). SAGE.
3. Batagelj, V., & Mrvar, A. (1996). Pajek – Program for Large Network Analysis. Retrieved from http://vlado.fmf.uni-lj.si/pub/networks/pajek/
4. Bellotti, E. (2014). Qualitative Networks. London: Routledge.
5. Bichler, G., & Malm, A. (2015). Disrupting Criminal Networks. Boulder; London: Lynne Rienner Publishers.
6. Borgatti, S. (2005). Centrality and network flow. Social Networks, 27(1). Retrieved from https://works.bepress.com/steveborgatti/3/ CrossRef
7. Borgatti, S. P., & Everett, M. G. (1999). Models of core/periphery structures. Social Networks, 21(4), 375–395. CrossRef
8. Borgatti, S. P., Everett, M. G., & Freeman, L. C. (2002). UCINET 6 for Windows: Software for Social Network Analysis. Harvard: Analytic Technologies.
9. Borgatti, S. P., Everett, M. G., & Johnson, J. C. (2013). Analyzing Social Networks. SAGE publications.
10. Bright, D., Hughes, C., & Chalmers, J. (2012). Illuminating dark networks: a social network analysis of an Australian drug trafficking syndicate. Crime, Law & Social Change, 57(2), 151–176. CrossRef
11. Bright, D. A., Greenhill, C., Ritter, A., & Morselli, C. (2015). Networks within networks: using multiple link types to examine network structure and identify key actors in a drug trafficking operation. Global Crime, 16(3), 219–237. CrossRef
12. Bright, David A. (2015). Disrupting and Dismantling Dark Networks. In L. M. Gerdes (Ed.), Illuminating Dark Networks: The Study of Clandestine Groups and Organizations (pp. 39–52). Cambridge: Cambridge University Press. CrossRef
13. Bright, David A., Malm, A., Koskinen, J., & O'Connor, A. (2014). Criminal network dynamics: The formation and evolution of a drug trafficking network. Presented at the Illicit Networks Workshop, Adelaide.
14. Calderoni, F. (2012). The structure of drug trafficking mafias: the 'Ndrangheta and cocaine. Crime, Law & Social Change, 58(3), 321–349. CrossRef
15. Calderoni, F., Brunetto, D., & Piccardi, C. (2017). Communities in criminal networks: A case study. Social Networks, 48, 116–125. CrossRef
16. Campana, P., & Varese, F. (2013). Cooperation in criminal organizations: Kinship and violence as credible commitments. Rationality and Society, 25(3), 263–289. CrossRef
17. Campana, Paolo. (2016). Explaining criminal networks: Strategies and potential pitfalls. Methodological Innovations, 9, 2059799115622748. CrossRef
18. Carley, K. M., Lee, J.-S., & Krackhardt, D. (2002). Destabilizing Networks. Connections, 24(3), 79–92. Carrington, P. J. (2011). Crime and Social Network Analysis. In The SAGE Handbook of Social Network Analysis (Vol. 2011, pp. 236–255).
19. Coleman, J. (1990). Foundations of Social Theory. Cambridge, MA: Belnap Press.
20. Crossley, N., Edwards, G., Harries, E., & Stevenson, R. (2012). Covert social movement networks and the secrecy-efficiency trade off: The case of the UK suffragettes (1906–1914). Social Networks, 34(4), 634–644. CrossRef
21. Décary-Hétu, D., & Dupont, B. (2012). The social network of hackers. Global Crime, 13(3), 160–175. CrossRef
22. Diviák, T. (2017). Ekvivalence a blokové modelování v analýze sociálních sítí – praktický úvod. Naše Společnost, (forthcoming).
23. Diviák, T., Dijkstra, J. K., & Snijders, T. A. B. (2017). Structure, Multiplexity, and Centrality in a Corruption Network: The Czech Rath Affair. Trends in Organized Crime, (under review).
24. Domínguez, S., & Hollstein, B. (2014). Mixed Methods Social Networks Research. Cambridge: Cambridge University Press. CrossRef
25. Doreian, P., Batagelj, V., & Ferligoj, A. (2004). Generalized Blockmodeling. Cambridge ; New York: Cambridge University Press. CrossRef
26. Duijn, P. A. C., Kashirin, V., & Sloot, P. M. A. (2014). The Relative Ineffectiveness of Criminal Network Disruption. Scientific Reports, 4.
27. Everton, S. F. (2012). Disrupting Dark Networks. Cambridge: Cambridge University Press. CrossRef
28. Fortunato, S. (2010). Community detection in graphs. Physics Reports, 486(3–5), 75–174. CrossRef
29. Freeman, L. C. (1978). Centrality in social networks conceptual clarification. Social Networks, 1(3), 215–239. CrossRef
30. Gerdes, L. M. (2015). Illuminating Dark Networks: The Study of Clandestine Groups and Organizations. Cambridge: Cambridge University Press. CrossRef
31. Grund, T. U., & Densley, J. A. (2012). Ethnic heterogeneity in the activity and structure of a Black street gang. European Journal of Criminology, 9(4), 388–406. CrossRef
32. Grund, T. U., & Densley, J. A. (2014). Ethnic Homophily and Triad Closure: Mapping Internal Gang Structure Using Exponential Random Graph Models. Journal of Contemporary Criminal Justice, 1043986214553377.
33. Handcock, M. S., Hunter, D. R., Butts, C. T., Goodreau, S. M., & Morris, M. (2003). statnet: Software tools for the Statistical Modeling of Network Data. Retrieved from http://statnetproject.org
34. Hanneman, R., & Riddle, M. (2005). Introduction to Social Network Methods. Retrieved April 3, 2016, from http://faculty.ucr.edu/~hanneman/nettext/
35. Hedström, P. (2005). Dissecting the Social: On the Principles of Analytical Sociology (1st edition). Cambridge: Cambridge University Press. CrossRef
36. Hedström, P., & Bearman, P. (Eds.). (2011). The Oxford Handbook of Analytical Sociology (1 edition). Oxford; New York: Oxford University Press.
37. Helfstein, S., & Wright, D. (2011). Covert or Convenient? Evolution of Terror Attack Networks. Journal of Conflict Resolution. CrossRef
38. Hofmann, D. C., & Gallupe, O. (2015). Leadership protection in drug-trafficking networks. Global Crime, 16(2), 123–138. CrossRef
39. Hollstein, B. (2014). Mixed Methods for Social Networks Research: An Introduction. In S. Domínguez & B. Hollstein (Eds.), Mixed Methods Social Networks Research (pp. 3–35). Cambridge: Cambridge University Press. CrossRef
40. Krebs, V. (2002). Uncloaking Terrorist Networks. First Monday, 7(4). Retrieved from http://firstmonday.org/ojs/index.php/fm/article/view/941 CrossRef
41. Le, V. (2012). Organised Crime Typologies: Structure, Activities and Conditions. International Journal of Criminology and Sociology, 1(0), 121–131. CrossRef
42. Lorrain, F., & White, H. C. (1971). Structural equivalence of individuals in social networks. The Journal of Mathematical Sociology, 1(1), 49–80. CrossRef
43. Luke, D. A. (2015). A User's Guide to Network Analysis in R. New York: Springer International Publishing. Lusher, D., Koskinen, J., & Robins, G. (Eds.). (2013). Exponential random graph models for social networks: theory, methods, and applications. Cambridge: Cambridge University Press.
44. McGloin, J. M., & Kirk, D. S. (2010). An Overview of Social Network Analysis. Journal of Criminal Justice Education. CrossRef
45. McIlwain, J. S. (1999). Organized crime: A social network approach. Crime, Law & Social Change, 32, 301–323. CrossRef
46. Milward, H. B., & Raab, J. (2006). Dark Networks as Organizational Problems: Elements of a Theory. International Public Management Journal, 9(3), 333–360. CrossRef
47. Moreno, J. L. (1934). Who Shall Survive? Washington, D.C.: Nervous and Mental Disease Publishing Company.
48. Morselli, C. (2010). Assessing Vulnerable and Strategic Positions in a Criminal Network. Journal of Contemporary Criminal Justice, 26(4), 382–392. CrossRef
49. Morselli, C. (2009). Inside Criminal Networks (Vol. 8). New York, NY: Springer New York. Morselli, C. (2014a). Crime and Networks. New York: Routledge. CrossRef
50. Morselli, C. (2014b). Introduction. In Crime and Networks (pp. 1–9). Routledge.
51. Morselli, C. Giguère, C., & Petit, K. (2007). The efficiency/security trade-off in criminal networks. Social Networks, 29(1), 143–153. CrossRef
52. Morselli, C., & Roy, J. (2008). BROKERAGE QUALIFICATIONS IN RINGING OPERATIONS*. Criminology, 46(1), 71–98. CrossRef
53. Mrvar, A., de Nooy, W., & Batagelj, V. (2005). Exploratory Social Network Analysis with Pajek. Cambridge: Cambridge University Press.
54. Newman, M. (2010). Networks: An Introduction (1 edition). Oxford ; New York: Oxford University Press. Newman, M. E. J., & Park, J. (2003). Why social networks are different from other types of networks. Physical Review E, 68(3). CrossRef
55. Oliver, K., Crossley, N., Everett, M. G., Edwards, G., & Koskinen, J. (2014). Covert networks: structures, processes and types. The Mitchell Center for Social Network Analysis working paper. Retrieved from http://www.socialsciences.manchester.ac.uk/medialibrary/research/mitchell/covertnetworks/wp/working_paper1.pdf
56. Papachristos, A. V. (2014). The Network Structure of Crime.
57. Robins, G. (2009). Understanding individual behaviors within covert networks: the interplay of individual qualities, psychological predispositions, and network effects. Trends in Organized Crime, 12(2), 166–187. CrossRef
58. Robins, G. (2015). Doing Social Network Research. London: SAGE publications.
59. Robins, G., Pattison, P., Kalish, Y., & Lusher, D. (2007). An introduction to exponential random graph (p*) models for social networks. Social Networks, 29(2), 173–191. CrossRef
60. Sageman, M. (2004). Understanding Terror Networks (1St Edition edition). Philadelphia: University of Pennsylvania Press.
61. Smith, C. M., & Papachristos, A. V. (2016). Trust Thy Crooked Neighbor Multiplexity in Chicago Organized Crime Networks. American Sociological Review, 0003122416650149. CrossRef
62. Snijders, T. A. B. (2011, July 8). Statistical Models for Social Networks [review-article]. Retrieved December 10, 2016, from http://www.annualreviews.org/doi/abs/10.1146/annurev.soc.012809.102709
63. Snijders, T. A. B., van de Bunt, G. G., & Steglich, C. E. G. (2010). Introduction to stochastic actorbased models for network dynamics. Social Networks, 32(1), 44–60 CrossRef
64. Sparrow, M. K. (1991). The application of network analysis to criminal intelligence: An assessment of the prospects. Social Networks, 13(3), 251–274. CrossRef
65. Stevenson, R., & Crossley, N. (2014). Change in Covert Social Movement Networks: The "Inner Circle" of the Provisional Irish Republican Army. Social Movement Studies, 13(1), 70–91. CrossRef
66. van der Hulst, R. C. (2009). Introduction to Social Network Analysis (SNA) as an investigative tool. Trends in Organized Crime, 12(2), 101–121. CrossRef
67. van der Hulst, Renée C. (2011). Terrorist Networks: The Threat of Connectivity. In The SAGE Handbook of Social Network Analysis (pp. 256–270).
68. Varese, F. (2012). The Structure and the Content of Criminal Connections: The Russian Mafia in Italy. European Sociological Review, jcs067.
69. von Lampe, K. (2009). Human capital and social capital in criminal networks: introduction to the special issue on the 7th Blankensee Colloquium. Trends in Organized Crime, 12(2), 93–100. CrossRef
70. Wasserman, S., & Faust, K. (1994). Social Network Analysis: Methods and Applications (1 edition). Cambridge ; New York: Cambridge University Press. CrossRef
71. Wood, G. (2017). The structure and vulnerability of a drug trafficking collaboration network. Social Networks, 48, 1–9. CrossRef
72. Xu, J., & Chen, H. (2008). The topology of dark networks. Communications of the ACM, 51(10), 58. CrossRef
Sinister connections: How to analyse organised crime with social network analysis? is licensed under a Creative Commons Attribution 4.0 International License.