Social network analysis as a tool for criminal intelligence: understanding its potential from the perspectives of intelligence analysts
Over the past two decades an increasing number of researchers have applied social network analysis (SNA) to various ‘dark’ networks. This research suggests that SNA is capable of revealing significant insights into the dynamics of dark networks, particularly the identification of critical nodes, which can then be targeted by law enforcement and security agencies for disruption. However, there has so far been very little research into whether and how law enforcement agencies can actually leverage SNA in an operational environment and in particular the challenges agencies face when attempting to apply various network analysis techniques to criminal networks. This paper goes some way towards addressing these issues by drawing on qualitative interviews with criminal intelligence analysts from two Australian state law enforcement agencies. The primary contribution of this paper is to call attention to the organisational characteristics of law enforcement agencies which, we argue, can influence the capacity of criminal intelligence analysts to successfully apply SNA as much as the often citied ‘characteristics of criminal networks’.
KeywordsSocial network analysis Criminal networks Criminal network characteristics Dark networks Law enforcement Law enforcement organisational characteristics
The authors would like to sincerely thank Victoria Police and New South Wales Police Force for their involvement, and in particular, the analysts that gave up their time to be involved with this study. The authors would also like to thank the anonymous reviewers for their critical input on an earlier version of this article.
Compliance with ethical standards
This study was not funded.
All procedures performed in studies involving human participants were in accordance with the ethical standards of the institutional and/or national research committee and with the 1964 Helsinki declaration and its later amendments or comparable ethical standards.
Informed consent was obtained from all individual participants included in the study.
Conflict of interest
The authors – Morgan Burcher and Chad Whelan – declare that have no conflict of interest.
- Arquilla J (2014) To build a network. PRism 4(1):22–33Google Scholar
- Borgatti S, Everett M, Johnson JC (2013) Analyzing social networks. SAGE Publications, LondonGoogle Scholar
- Bright DA, Greenhill C, Levenkova N (2014) Dismantling criminal networks: can node attributes play a role? In: Morselli C (ed) Crime and networks. Routledge, New YorkGoogle Scholar
- Bright DA, Greenhill C, Ritter A, Morselli C (2015b) Networks within networks: using multiple link types to examine network structure and identify key actors in a drug trafficking operation. Glob Crime 16(3):1–19Google Scholar
- Bright DA, Hughes CE, Chalmers J (2012) 'Illuminating dark networks: a social network analysis of an Australian drug trafficking syndicate', Crime. Law Soc Chang 57(2):151–176Google Scholar
- Charette Y, Papachristos AV (2017) The network dynamics of co-offending careers. Social Networks. doi: 10.1016/j.socnet.2016.12.005
- Duijn PAC, Kashirin V, Sloot PMA (2014) The relative ineffectiveness of criminal network disruption. Scientific Reports 4:1–15Google Scholar
- Duval, RD, Christensen, K & Spahiu, A (2010), 'Bootstrapping a terrorist network', paper presented to Southern Illinois University Carbondale, <http://opensiuc.lib.siu.edu/cgi/viewcontent.cgi?article=1017&context=pnconfs_2010>.
- Everton SF, Cunningham D (2012) Detecting significant changes in dark networks. Behav Sci Terror Polit Aggress 5(2):1–21Google Scholar
- Framis AG-S, Regadera SF (2017) Static and dynamic approaches of a drug trafficking network. In: Leclerc B, Savona EU (eds) Crime prevention in the twenty-first century: insightful approaches for crime prevention initiatives. Springer International Publishing, SwitzerlandGoogle Scholar
- Guest G, MacQueen KM, Namey EE (2014) Applied thematic analysis. Sage Publications, Thousand Oaks, CaliforniaGoogle Scholar
- Johnson, JA & Reitzal, JD (2011), Social network analysis in an operational environment: Defining the utility of a network approach for crime analysis using the Richmond City Police Department as a case study, Coginta, retrieved 8 August 2012, <http://www.dcaf.ch/Publications/Social-network-analysis-in-an-operational-environment-Defining-the-utility-of-a-network-approach-for-crime-analysis-using-the-Richmond-City-Police-Department-as-a-case-study>.
- Klerks P (1999) The network paradigm applied to criminal organisations: theoretical nitpicking or relevant doctrine for investigators? Recent developments in the Netherlands. Connect 24(3):53–65Google Scholar
- Krebs V (2002) Mapping networks of terrorist cells. Connect 24(3):43–52Google Scholar
- Laumann EO, Marsden PV, Prensky D (1992) Research methods in social network analysis. Transaction Publishers, New Brunswick, New JerseyGoogle Scholar
- Maxfield MG, Babbie ER (2011) Research methods for criminal Justice and criminology. Wadswroth Cengage Learning, Belmont, CAGoogle Scholar
- Morselli C (ed) (2014) Crime and networks. Routledge, New YorkGoogle Scholar
- Mullins S (2012b) Social network analysis and terrorism: an introduction to the special issue. Behav Sci Terror Polit Aggress:1–3Google Scholar
- Rodriguez, JA (2005), The March 11th terrorist network: In its weakness lies its strength, CiteSeer, retrieved 7 August 2012, <http://www.ub.edu/epp/wp/11m.PDF>.
- Victoria Police (2014), ' Victoria Police blue paper: A vision for Victoria Police 2025′, <http://www.police.vic.gov.au/content.asp?Document_ID=42063>.
- Whelan C (2012) Networks and national security: dynamics, effectiveness and organisation. Ashgate, LondonGoogle Scholar
- Wiil UK (2013) 'Issues for the next generation of criminal network investigation tools', paper presented to European intelligence and security informatics conference. Uppsala, SwedenGoogle Scholar