Social network analysis as a tool for criminal intelligence: understanding its potential from the perspectives of intelligence analysts

被引:25
作者
Burcher, Morgan [1 ]
Whelan, Chad [1 ]
机构
[1] Deakin Univ, Sch Humanities & Social Sci, Geelong, Vic, Australia
关键词
Social network analysis; Criminal networks; Criminal network characteristics; Dark networks; Law enforcement; Law enforcement organisational characteristics; DARK NETWORKS; EVOLUTION; SNA;
D O I
10.1007/s12117-017-9313-8
中图分类号
DF [法律]; D9 [法律];
学科分类号
0301 ;
摘要
Over the past two decades an increasing number of researchers have applied social network analysis (SNA) to various 'dark' networks. This research suggests that SNA is capable of revealing significant insights into the dynamics of dark networks, particularly the identification of critical nodes, which can then be targeted by law enforcement and security agencies for disruption. However, there has so far been very little research into whether and how law enforcement agencies can actually leverage SNA in an operational environment and in particular the challenges agencies face when attempting to apply various network analysis techniques to criminal networks. This paper goes some way towards addressing these issues by drawing on qualitative interviews with criminal intelligence analysts from two Australian state law enforcement agencies. The primary contribution of this paper is to call attention to the organisational characteristics of law enforcement agencies which, we argue, can influence the capacity of criminal intelligence analysts to successfully apply SNA as much as the often citied 'characteristics of criminal networks'.
引用
收藏
页码:278 / 294
页数:17
相关论文
共 50 条
[21]  
Everton SF, 2012, BEHAV SCI TERROR POL, V5, P1
[22]  
Framis AG-S, 2017, CRIME PREVENTION 21
[23]  
Guest G., 2012, Applied thematic analysis, DOI [10.4135/9781483384436, DOI 10.4135/9781483384436]
[24]   Covert or Convenient? Evolution of Terror Attack Networks [J].
Helfstein, Scott ;
Wright, Dominick .
JOURNAL OF CONFLICT RESOLUTION, 2011, 55 (05) :785-813
[25]   Hiding in plain sight: criminal network analysis [J].
Hutchins, Christopher E. ;
Benham-Hutchins, Marge .
COMPUTATIONAL AND MATHEMATICAL ORGANIZATION THEORY, 2010, 16 (01) :89-111
[26]  
Johnson J., 2011, Social network analysis in an operational environment: Defining the utility of a network for crime analysis using the Richmond City Police Department as a case study
[27]  
Karthika S., 2011, INT J WEB SERV COMPU, V2, P65, DOI [10.5121/ijwsc.2011.2306, DOI 10.5121/IJWSC.2011.2306]
[28]  
Klerks P., 2001, Connections, V24, P53
[29]   A social network analysis of Jemaah Islamiyah: The applications to counterterrorism and intelligence [J].
Koschade, Stuart .
STUDIES IN CONFLICT & TERRORISM, 2006, 29 (06) :589-605
[30]   Using friends for money: the positional importance of money-launderers in organized crime [J].
Malm, Aili ;
Bichler, Gisela .
TRENDS IN ORGANIZED CRIME, 2013, 16 (04) :365-381