Abstract
The United States is faced with an increasingly complex criminal enterprise. Advances in technology, communications, transport, and economies enable a highly adaptive criminal element to hide in plain site. These advances provide criminal organizations with the same global boundaries and opportunities as legitimate organizations.
As boundaries expand the data to be analyzed by law enforcement mounts at a geometrically astounding rate. In response, the nature of law enforcement intelligence analysis must evolve to cope with both the amount and complexity of the data. This requires new and adaptive methods of analysis.
Researchers have found that the principles of network analysis can be applied to the analysis of terrorist and criminal organizations. This paper examines the combination of measures historically employed by intelligence analysts and network analysis software and methodologies to quantitatively and qualitatively examine criminal organizations.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.Abbreviations
- SNA:
-
Social Network Analysis;
- DNA:
-
Dynamic Network Analysis;
- CASOS:
-
Center for Computational Analysis of Social and Organizational Systems;
- HIDTASIS:
-
High intensity drug trafficking area strategic information system;
- LEA:
-
Law enforcement agency
References
Boissevain J (1974) Friends of friends: networks, manipulators and coalitions. Blackwell & Mott, Bristol
Carley K, Reminga J (2004) ORA: organization risk analyzer (Technical Report No. CMU-ISRI-04-106). Carnegie Mellon University, School of Computer Science, Pittsburgh
Carley KM, Diesner J, Reminga J, Tsvetovat M (2007) Toward an interoperable dynamic network analysis toolkit. Decis Support Syst 43(4):1324–1347
Coles N (2001) It’s not what you know it’s who you know that counts. Analyzing serious crime groups as social networks. Br J Criminol 41(4):580
Diesner J, Carley K (2004) AutoMap 1.2—Extract, analyze, represent, and compare mental models from texts. (No. CMU-ISRI-04-100). Carnegie Mellon University, School of Computer Science, Institute for Software Research International, Pittsburg
Diesner J, Carley K (2005) Revealing social structure from text: meta-matrix text analysis as a novel method for network text analysis. In: Narayanan VK, Armstrong DJ (eds) Causal semantic networking for information systems and technology research: approaches, advances, and illustrations. Idea Group, Harrisburg, pp 81–108
Diesner J, Carley K (2008) Conditional random fields for entity extraction and ontological text coding. Comput Math Organ Theory 14:248–262
Innes M, Fielding N, Cope N (2005) “The appliance of science”? The theory and practice of crime intelligence analysis. Br J Criminol 45(1):39–57
Klerks P (2001) The network paradigm applied to criminal organizations: theoretical, nitpicking, or a relevant doctrine for investigators? Recent developments from the Netherlands. Connections 24(3):53–65
McGloin J (2005) Street gangs and interventions: innovative problem solving with network analysis. Department of Justice, Office of Community Oriented Policing Services, Washington
Ozgul F, Bondy J, Aksoy H (2007) Mining for offender group detection and story of a police operation. Paper presented at the Proceedings of the sixth Australasian conference on data mining and analytics - Vol 70. From http://portal.acm.org/citation.cfm?id=1378245.1378270#
Ressler S (2006) Social network analysis as an approach to combat terrorism: past, present, and future research. Homel Secur Aff 2(2):1–10
Stewart TA (2001) Six degrees of Mohamed Atta. Business 2.0 2(10):63
Williams P (2001) Transnational criminal networks. In: Arquilla J, Ronfeldt D (eds) Networks and netwars: the future of terror, crime, and militancy. Rand, Santa Monica, pp 61–97
Xu J, Chen H (2005) Criminal network analysis and visualization. Commun ACM 48(6):100
Xu JJ, Hsinchun C (2005) CrimeNet explorer: a framework for criminal network knowledge discovery. ACM Trans Inf Syst 23(2):201
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Hutchins, C.E., Benham-Hutchins, M. Hiding in plain sight: criminal network analysis. Comput Math Organ Theory 16, 89–111 (2010). https://doi.org/10.1007/s10588-009-9060-8
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10588-009-9060-8