From data to disruption

Organized crime groups and law enforcement agencies are caught in complex system similar to a continuous game of cat-and-mouse, in which the latter frequently remains two or more steps behind. Law enforcement agencies are therefore seeking for more proactive strategies in targeting these criminal network structures more effectively. This starts with a better understanding of the way they operate and adapt over time. A key element to developing this understanding remained largely unexploited: big data and big data analytics. This provides novel insight into how criminal cooperations on a micro- and meso level are embedded in small-world criminal macro-networks and how this fosters its resillience against disruption. This paper discusses the opportunities and the limitations of this data-driven approach and its implications for both law enforcement practice and scientific research.

[1]  Peter M. A. Sloot,et al.  Towards understanding the behavior of physical systems using information theory , 2013 .

[2]  Paul Duijn,et al.  De brug tussen wetenschap en opsporingspraktijk , 2014 .

[3]  P. Duijn,et al.  Social Network Analysis Applied to Criminal Networks: Recent Developments in Dutch Law Enforcement , 2014 .

[4]  Richard Frank,et al.  Terrorist and extremist organizations’ use of the Internet for recruitment , 2015 .

[5]  Carlo Morselli,et al.  Inside Criminal Networks , 2008 .

[6]  D. M. Schwartz,et al.  Using social network analysis to target criminal networks , 2009 .

[7]  John H. Holland,et al.  Emergence. , 1997, Philosophica.

[8]  David Décary-Hétu,et al.  Policing the Hackers by Hacking Them: Studying Online Deviants in IRC Chat Rooms , 2014 .

[9]  Aili Malm,et al.  Comparing the ties that bind criminal networks: Is blood thicker than water? , 2010 .

[10]  Rick Quax,et al.  The diminishing role of hubs in dynamical processes on complex networks , 2011, Journal of The Royal Society Interface.

[11]  Peter M. A. Sloot,et al.  Inference of the Russian Drug Community from One of the Largest Social Networks in the Russian Federation , 2016 .

[12]  D. Cornish THE PROCEDURAL ANALYSIS OF OFFENDING AND ITS RELEVANCE FOR SITUATIONAL PREVENTION , 1994 .

[13]  Martin Bouchard,et al.  On the Resilience of Illegal Drug Markets , 2007 .

[14]  M. Natarajan Understanding the Structure of a Large Heroin Distribution Network: A Quantitative Analysis of Qualitative Data , 2006 .

[15]  Damián Zaitch,et al.  The social embeddedness of organized crime , 2014 .

[16]  Anthony Masys,et al.  Networks and network analysis for defence and security , 2013, 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2013).

[17]  W. Bernasco,et al.  Criminal groups and transnational illegal markets , 2004 .

[18]  Franca van der Laan,et al.  “Prison doesn’t stop them” Orchestrating criminal acts from behind bars , 2012 .

[19]  Carlo Morselli,et al.  The Efficiency/Security Trade-Off in Criminal Networks , 2007, Soc. Networks.

[20]  J. Raab,et al.  Dark Networks as Organizational Problems: Elements of a Theory 1 , 2006 .

[21]  Francesco Calderoni,et al.  Identifying Mafia Bosses from Meeting Attendance , 2014 .

[22]  Gisela Bichler,et al.  Disrupting Criminal Networks : Network Analysis in Crime Prevention , 2015 .

[23]  Cyrille Fijnaut,et al.  Organized Crime in the Netherlands , 1998 .

[24]  W. Ashby,et al.  Requisite Variety and Its Implications for the Control of Complex Systems , 1991 .

[25]  A. Graycar Intelligence-led policing , 2005 .

[26]  B. Erickson Secret Societies and Social Structure , 1981 .

[27]  Nicolas Christin,et al.  Measuring the Longitudinal Evolution of the Online Anonymous Marketplace Ecosystem , 2015, USENIX Security Symposium.

[28]  P. Klerks The Network Paradigm Applied to Criminal Organisations: Theoretical nitpicking or a relevant doctrine for investigators? Recent developments in the Netherlands , 2001 .

[29]  David Bright,et al.  Evolution of a drug trafficking network: Mapping changes in network structure and function across time , 2013 .

[30]  P. Duijn,et al.  The Relative Ineffectiveness of Criminal Network Disruption , 2014, Scientific Reports.

[32]  Ulrich Eggers,et al.  Emergence From Chaos To Order , 2016 .

[33]  Ben Shneiderman,et al.  Integrating Statistics and Visualization for Exploratory Power: From Long-Term Case Studies to Design Guidelines , 2009, IEEE Computer Graphics and Applications.

[34]  Carlo Morselli,et al.  Law-Enforcement Disruption of a Drug Importation Network , 2006 .

[35]  Martin Bouchard,et al.  Strategies to Disrupt Online Child Pornography Networks , 2011, 2011 European Intelligence and Security Informatics Conference.

[36]  David Décary-Hétu,et al.  The social network of hackers , 2012 .

[37]  Edward R. Kleemans,et al.  Criminal Careers in Organized Crime and Social Opportunity Structure , 2008 .

[38]  George Kampis,et al.  The importance of centralities in dark network value chains , 2013 .

[39]  R. Hulst Introduction to Social Network Analysis (SNA) as an investigative tool , 2009 .

[40]  Stelios Psarakis,et al.  The Use of Indices in Surveys , 2006 .

[41]  Malcolm K. Sparrow,et al.  The application of network analysis to criminal intelligence: An assessment of the prospects , 1991 .