Skip to main content

Network Analysis in Criminal Intelligence

  • Chapter
  • First Online:
Networks and Network Analysis for Defence and Security

Part of the book series: Lecture Notes in Social Networks ((LNSN))

Abstract

A set of approaches to network analysis are used in criminal intelligence to understand and act against serious crimes, criminal groups, and criminal markets. These approaches are based in link analysis and increasingly include techniques from social network analysis. Network analysis techniques in criminal intelligence are used to organise data and reveal patterns in the nature and extent of relationships between data points. They also provide effective visualizations of both qualitative and quantitative data which are valuable in presenting intelligence assessments. The link analysis methods used in criminal intelligence are a form of network analysis designed to discover and illustrate patterns in the connections between individuals, locations, organizations, objects and events. Social network analysis has a tighter focus, concentrating on the relationships between people. Some social network analysis measures have utility in producing targeting recommendations for intelligence collection and operational disruption.

Opinions expressed are those of the author and do not necessarily reflect those of the Royal Canadian Mounted Police or the Government of Canada

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Granovetter MS (1973) The strength of weak ties. Am J Sociol, 1360–1380

    Google Scholar 

  2. Morselli C (2005) Contacts, opportunities, and criminal enterprise. University of Toronto Press, Toronto

    Google Scholar 

  3. Johnson, Gregory A (1982) Organizational structure and scalar stress. In: Renfrew Colin, Rowlands Michael, Barbara A, Segraves-Whallon (eds) Theory and explanation in archaeology. Academic Press, New York, pp 389–421

    Google Scholar 

  4. Service ER (1971) Primitive social organization: an evolutionary perspective, 2nd edn. Random House, New York

    Google Scholar 

  5. de Champlain P (2004) Mobsters, gangsters and men of honour: cracking the mafia code. Harper Collins, Toronto

    Google Scholar 

  6. Venkatesh Sudhir (2008) Gang leader for a day: a Rogue sociologist takes to the streets. Penguin Press, New York

    Google Scholar 

  7. Earle T (2011) Chiefs, chieftancies, chiefdoms, and chiefly confederacies: power in the evolution of political systems. Soc Evol Hist 10(1):27–54

    Google Scholar 

  8. Felson M (2006) The ecosystem for organized crime. The European Institute for Crime Prevention and Control (HEUNI Paper No. 26) http://www.heuni.fi

  9. Brintrup A, Kito T, Lopez E, New S, Reed-Tsochas F (2011) The structure of the Toyota supply network: the emergence of resilience, CABDyN working paper

    Google Scholar 

  10. Sparrow MK (1991) Network vulnerabilities and strategic intelligence in law enforcement. Int J Intell CounterIntell 5(3):255–272

    Article  Google Scholar 

  11. Carley KM, Lee JS, Krackhardt D (2002) Destabilizing networks. Connections 24(3):79–92

    Google Scholar 

  12. Schwartz, Daniel M., and Tony Rouselle (2008) Using Social Network Analysis to Target Criminal Networks. Trends in Organized Crime, 188–207

    Google Scholar 

  13. Everton SF (2009) Network topography key players and terrorist networks. Connections, 12–19

    Google Scholar 

  14. Borgatti SP, Carley KM, Krackhardt D (ND) On the Robustness of Centrality Measures under Conditions of Imperfect Data, Dynamic Networks project, Carnegie Mellon University

    Google Scholar 

  15. Malm A, Bichler G (2011) Networks of collaborating criminals: assessing the structural vulnerability of drug markets. J Res Crime Delinq 48(2):271–297

    Article  Google Scholar 

  16. von Lampe K, Ole Johansen P (2004) Organized Crime and Trust: on the conceptualization and empirical relevance of trust in the context of criminal networks. Glob Crime 6(2):159–184

    Article  Google Scholar 

  17. Klerks P (2001) The network paradigm applied to criminal organizations: theoretical nitpicking or a relevant doctrine for investigators? recent developments in the Netherlands. Connections 24(3):53–65

    Google Scholar 

  18. von Clausewitz Carl (1968) On war. J.J. Graham trans. Penguin Books, UK

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Steven J. Strang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Strang, S.J. (2014). Network Analysis in Criminal Intelligence. In: Masys, A. (eds) Networks and Network Analysis for Defence and Security. Lecture Notes in Social Networks. Springer, Cham. https://doi.org/10.1007/978-3-319-04147-6_1

Download citation

Publish with us

Policies and ethics