Skip to main content

Advertisement

Log in

A mixed methods social network analysis of a cross-border drug network: the Fernando Sanchez organization (FSO)

  • Published:
Trends in Organized Crime Aims and scope Submit manuscript

Abstract

This study is a mixed methods case study of the Fernando Sanchez Organization (FSO) better known as the Tijuana Cartel in the 2008–2010 period, aimed at better understanding internal structures and the roles of individuals in crossborder polydrug networks under pressures from rivals and state leadership targeting. In addition to historical archival data to build a qualitative case study, it uses arrest warrant data (an emergency wiretap application and a Racketeering Influenced Corrupt Organizations Act or RICO indictment) from the FSO drug network investigation in order to visualize the structure of the cross border network and to explore research questions regarding the relationship between actor centrality/network topography metrics and variables of interest including organizational role, age, gender, number of prior arrests, location of criminal activity, and location of residence using social network analysis (SNA). Findings included: narcotics distributors, drug couriers, and enforcers for the network all had higher centrality in the network, age was only slightly negatively correlated with eigenvector centrality, gender had no bearing on centrality, the number of prior arrests also had no bearing on degree or betweenness centrality, but did positively correlate with eigenvector centrality. Findings also demonstrated faction subgroup analysis had considerable overlap with both law-enforcement-reported-address and location of criminal activity (coded as actor attributes). This finding suggests it may be possible to predict the location of criminal activity and residence through faction analysis in other binational trafficking networks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

Notes

  1. The Pacer system is the publicly available, Electronic Federal Court Record Database system.

  2. The Racketeer Influenced and Corrupt Organizations Act of1970 (RICO)

    In order to fully understand 1) how organized crime and criminal groups, such as the FSO, are investigated, charged, and ultimately dismantled, in the U.S., and 2) how the data and methodology were utilized in the current study: it is important to discuss the legislation that allows for these types of takedowns—The Racketeer Influenced and Corrupt Organizations Act of 1970. Created by Congress for the purpose of combating organized crime, the Racketeer Influenced and Corrupt Organizations Act of 1970 is included in Title IX of the Organized Crime Control Act of 1970 (U.S.C. 18 §§ 1961–1968). The RICO statute is considered to be the single-most impactful piece of legislation passed against organized crime activity (Abadinsky 2017; Roth 2017). Originally designed to dismantle New York’s infamous La Cosa Nostra, “our thing” crime group, RICO legislation has also been used to civilly and criminally prosecute legitimate businesses engaging in conspiracies such as labor unions, tobacco companies, anti-abortion protests, and police officers engaging in police misconduct (Phillips et al. 2015).

    For an individual to be convicted under the federal RICO statute, evidence must be collected that illustrates (beyond a reasonable doubt) that the defendant engaged in at least two acts of racketeering activity performed as part of an ongoing criminal enterprise. The following is a summary of the four unlawful acts mentioned in Section 1962 of the RICO statute: 1) a person receiving any income directly or indirectly derived from a pattern of racketeering activity or through the collecting an unlawful debt; 2) directly or indirectly participating in or maintaining an interest in, or control of, an enterprise that engages in, or whose activities affect, interstate and/or foreign commerce; 3) being employed by or associated with such an enterprise through direct or indirect conduct or participation in a pattern of racketeering activity or the collection of an unlawful debt; and 4) conspiring to violate the first three unlawful actions mentioned above (Organized Crime Control Act 1970).

    Section 1961 (3) defines a person as “any individual or entity capable of holding a legal or beneficial interest in property.” In Section 1961 (4), the statute defines an enterprise as “any individual, partnership, corporation, association, or other legal entity, and any union or group of individuals associated in fact although not a legal entity” (Organized Crime Control Act 1970). The vague and seemingly all-inclusive language used allows for the government to apply this statute to individuals involved with criminal “enterprises” that range from drug trafficking organizations to energy companies such as Enron (Diesner & Carley, 2005).

    Racketeering activities are discussed in Section 1961 (1), some of which include an act or threat involving murder; kidnapping; gambling; arson; robbery; bribery; extortion; interstate transport of stolen property; dealing in obscene matter; manufacture, importation, receiving, concealment, buying, selling, or otherwise dealing in controlled substances or listed chemicals; counterfeiting; embezzlement; obstruction of criminal investigations and law enforcement; tampering with or retaliating against a witness, victim, or informant; forgery; and peonage, slavery, or the trafficking of persons. For a pattern of racketeering activity to be established, Section 1961 (7) “requires at least two overt acts of racketeering activity, one of which occurred after the effective date of this chapter, and the last of which occurred within ten years (excluding any period of imprisonment) after the commission of a prior act of racketeering activity” (Organized Crime Control Act 1970).

    To highlight the relevance of this act in regard to the current study and methodology used, it is important to note that the (AFO/FSO) was considered a criminal “enterprise” with numerous co-conspirators who engaged in, or conspired to, further the goals of the enterprise through at least two overt acts. More importantly for the purpose of this study is the fact that overt acts are not restricted to plans of illegal activity that are carried-out. For instance, if a wiretap transcript includes a conversation between co-conspirators detailing plans to commit a future criminal act that never develops into an actual criminal act, this is still an “overt act” despite the fact that the act never occurred. The tying of criminal actors to each other and the criminal enterprise makes the prospect of SNA data from RICO indictments tantalizing.

  3. An adjacency matrix is a common way to enter data in social network analysis. In a one mode network it consists of all actors in rows and columns with ties entered as a 1 and no tie entered as a 0.

  4. Bichler et al. (2017) argue these metrics are required of all SNA studies regardless of research questions if research is to be replicable.

  5. The authors are grateful to Dr. David Shirk for confirming our suspicions on this point.

References

  • Abadinsky H (2017) Organized Crime (eleventh). Cengage Learning, Boston

    Google Scholar 

  • Associated Press. (2014, June 24). Mexico: Cartel Leader Is Arrested. The New York Times. Retrieved from https://www.nytimes.com/2014/06/25/world/americas/mexico-cartel-leader-is-arrested.html

  • Baker WE, Faulkner RR (1993) The social organization of conspiracy: Illegal networks in the heavy electrical equipment industry. Am Sociol Rev. 837–860

    Article  Google Scholar 

  • Berlusconi G (2013) Do all the pieces matter? Assessing the reliability of law enforcement data sources for the network analysis of wire taps. Global Crime 14(1):61–81

    Article  Google Scholar 

  • Bertram E, Blachman M, Sharpe K, Andreas P (1996) Drug war politics: the price of denial. University of California Press, Berkeley and Los Angeles

    Google Scholar 

  • Bichler G, Malm A, Cooper T (2017) Drug supply networks: a systematic review of the organizational structure of illicit drug trade. Crime Sci 6(1):2

    Article  Google Scholar 

  • Blancornelas, J. (2002). El Cártel : Los Arellano Félix, La Mafia Más Poderosa En La Historia de América Latina (Vol. 1. ed). México: Plaza y Janés

  • Bonacich P (1972) Factoring and weighting approaches to status scores and clique identification. J Math Sociol 2(1):113–120

    Article  Google Scholar 

  • Bonacich P (2007) Some unique properties of eigenvector centrality. Soc Networks 29(4):555–564

    Article  Google Scholar 

  • Borgatti, S. P., Everett, M. G., & Freeman, L. C. (2002). Ucinet for windows: software for social network analysis

  • Borgatti SP, Mehra A, Brass DJ, Labianca G (2009) Network analysis in the social sciences. Science 323(5916):892–895

    Article  Google Scholar 

  • Bright DA, Hughes CE, Chalmers J (2012) Illuminating dark networks: a social network analysis of an Australian drug trafficking syndicate. Crime Law Soc Chang 57(2):151–176

    Article  Google Scholar 

  • Bright DA, Greenhill C, Levenkova N (2014) Dismantling criminal networks: can node attributes play a role. In: Morselli C (ed) Crime and networks. Routledge, New York, pp 148–162

    Google Scholar 

  • Bright DA, Greenhill C, Reynolds M, Ritter A, Morselli C (2015) The use of actor-level attributes and centrality measures to identify key actors: a case study of an Australian drug trafficking network. J Contemp Crim Justice 31(3):262–278

    Article  Google Scholar 

  • Calderón G, Robles G, Díaz-Cayeros A, Magaloni B (2015) The beheading of criminal organizations and the dynamics of violence in Mexico. J Confl Resolut 59(8):1455–1485

    Article  Google Scholar 

  • Calderón, L., Rodríguez Ferreira, O., & Shirk, D. (2018). Drug violence in: data and analysis through 2017. San Diego: Justice in Mexico Project. Retrieved from https://justiceinmexico.org/wp-content/uploads/2018/04/180411_DrugViolenceinMexico-12mb.pdf

  • Calderoni F (2012) The structure of drug trafficking mafias: the ‘Ndrangheta and cocaine. Crime Law Soc Chang 58(3):321–349

    Article  Google Scholar 

  • Calderoni F (2014) Social network analysis of organized criminal groups. In Encyclopedia of criminology and criminal justice. Springer, New York

    Google Scholar 

  • Caldwell, R. (2007, July 1). Cartel secrets - Top-level insider reveals the cartel’s most guarded info. San Diego Union Tribune. Retrieved from http://ww.uniontrib.com/uniontrib/20070701/news_lz1e1cartel.html

  • Campana P, Varese F (2012) Listening to the wire: criteria and techniques for the quantitative analysis of phone intercepts. Trends Organ Crim 15(1):13–30

    Article  Google Scholar 

  • Castillo-Garcia, G. (2010, April 18). La Jornada: Consignan a El Muletas y 12 cómplices. La Jornadae, p. 6

  • Cunningham D, Everton S, Murphy P (2016) Understanding dark networks: a strategic framework for the use of social network analysis. Rowman & Littlefield, Lanham

    Google Scholar 

  • De Amorim SG, Barthélemy J-P, Ribeiro CC (1992) Clustering and clique partitioning: simulated annealing and tabu search approaches. J Classif 9(1):17–41

    Article  Google Scholar 

  • DEA. (2008). DEA History 2003–2008 (p. 44). Justice, Department of. Retrieved from http://www.justice.gov/dea/pubs/history/2003-2008.pdf

  • Dickenson M (2014) The impact of leadership removal on Mexican drug trafficking organizations. J Quant Criminol 30(4):651–676

    Article  Google Scholar 

  • Diesner J, Frantz TL, Carley KM (2005) Communication networks from the Enron email corpus “It's always about the people. Enron is no different”. Computational & Mathematical Organization Theory 11(3):201–228

    Article  Google Scholar 

  • Dorn N, Oette L, White S (1998) Drugs importation and the bifurcation of risk capitalization, cut outs and organized crime. Br J Criminol 38(4):537–560

    Article  Google Scholar 

  • Dresser, D. (2012, May). Presented at the Annual Sister Sally Furay Lecture, University of San Diego. Retrieved from https://www.sandiego.edu/news/detail.php?_focus=56767

  • Dudley, S. (2011, May). Bin Laden, the Drug War and the Kingpin Strategy. Think Tank. Insight Crime. Retrieved from http://insightcrime.org/insight-latest-news/item/847-insight-bin-laden-the-drug-war-and-thekingpin-strategy. Accessed 17 Feb 2012

  • Duijn, P. A., & Klerks, P. P. (2014). Social network analysis applied to criminal networks: recent developments in Dutch law enforcement. In Networks and network analysis for defence and security (pp. 121–159). Cham Switzerland: Springer

    Google Scholar 

  • Duran-Martinez A (2018) The politics of drug violence: criminals, cops and politicians in Colombia and Mexico. Oxford University Press, New York

    Google Scholar 

  • Escalante Gonzalbo, F. (2011, March 1). Homicidios 2008-2009: La muerte tiene permiso. Nexos. Retrieved from http://www.nexos.com.mx/?P=leerarticulo&Article=1943189

  • Everton SF (2012) Disrupting dark networks. Cambridge University Press, New York

    Book  Google Scholar 

  • Farley JD (2003) Breaking Al Qaeda cells: a mathematical analysis of counterterrorism operations (a guide for risk assessment and decision making). Stud Confl Terror 26(6):399–411

    Article  Google Scholar 

  • Felbab-Brown, V. (2010, September). Stemming the Violence in Mexico, but Breaking the Cartels. Retrieved April 12, 2015, from http://www.brookings.edu/research/articles/2010/09/mexico-violence-felbabbrown

  • Felbab-Brown, V. (2011). Calderón’s caldron: lessons from Mexico’s Battle against organized crime and drug trafficking in Tijuana, Ciudad Juárez, and Michoacán. Brookings institution. Retrieved from http://www.brookings.edu/~/media/research/files/papers/2011/9/calderon-felbab-brown/09_calderon_felbab_brown.pdf

  • Freeman LC (1978) Centrality in social networks conceptual clarification. Soc Networks 1(3):215–239

    Article  Google Scholar 

  • Gambetta D (1996) The Sicilian mafia: the business of private protection. Harvard University Press, Cambridge

    Google Scholar 

  • Gjelten, T. (2012, September 12). Software, Not Just Bullets, Puts Military At Odds. Retrieved January 7, 2016, from http://www.npr.org/2012/09/12/160967040/software-not-just-bullets-puts-military-at-odds

  • Granovetter M (1983) The strength of weak ties: a network theory revisited. Sociol Theory 1:201–233

    Article  Google Scholar 

  • Grillo, I. (2011). El Narco: inside Mexico’s criminal insurgency. Bloomsbury Publishing USA

  • Guerrero Gutierrez, E. (2011, June). At the root of the violence. (C. Roberts, trans.), Washington Office for Latin American Affairs. Retrieved from http://www.wola.org/sites/default/files/downloadable/Drug%20Policy/2011/September/E_Guerrero_-_Root_of_Violence_-_WOLA_9-9-11.pdf

  • Heinle, K., Rodriguez, F., & Shirk, D. A. (2017). Drug violence in Mexico: data and analysis through 2016. University of San Diego: Justice in Mexico Project. Retrieved from https://justiceinmexico.org/wp-content/uploads/2017/03/2017_DrugViolenceinMexico.pdf

  • Indictment: United States vs. Armando Villareal Heredia et al. (2010, July 23). United States District Court Southern District of California

  • Jones NP (2013) The unintended consequences of kingpin strategies: kidnap rates and the Arellano-Félix organization. Trends in Organized Crime 16(2):156–176

    Article  Google Scholar 

  • Jones NP (2016) Mexico’s illicit drug networks and the state reaction. Georgetown University Press, United States of America

    Google Scholar 

  • Jordan J (2014) Attacking the leader, missing the mark: why terrorist groups survive decapitation strikes. Int Secur 38(4):7–38

    Article  Google Scholar 

  • Kenney M (2007a) The architecture of drug trafficking: network forms of organisation in the Colombian cocaine trade. Global Crime 8(3):233–259

    Article  Google Scholar 

  • Kenney M (2007b) From Pablo to Osama: trafficking and terrorist networks, government bureaucracies, and competitive adaptation. Pennsylvania State University Press, University Park

    Google Scholar 

  • Kenney M, Coulthart S (2015) The methodological challenges of extracting dark networks: minimizing false positives through ethnography. In: Gerdes L (ed) Illuminating Dark Networks: The Study of Clandestine Groups and Organizations, vol 39. Cambridge University Press, New York, p 52

    Chapter  Google Scholar 

  • Kleemans, E. R., & Van de Bunt, H. G. (1999). The social embeddedness of organized crime

  • Kleiman M (2011) Surgical strikes in the drug wars: smarter policies for both sides of the border. Foreign Aff 90:89

    Google Scholar 

  • Kleiman MAR (2012) Targeting drug-trafficking violence in Mexico: an orthogonal approach. In: Zedillo E, Wheeler H (eds) Rethinking the “War on Drugs” Through the US-Mexico Prism. Yale Center for the Study of globalization Retrieved from http://www.ycsg.yale.edu/center/forms/targeting-drug-trafficking125-136.pdf

    Google Scholar 

  • Krebs VE (2002) Mapping networks of terrorist cells. Connections 24(3):43–52

    Google Scholar 

  • La Rosa, L., & Shirk, D. A. (2018). The New Generation: Mexico’s Emerging Organized Crime Threat (policy brief). San Diego, California: Justice in Mexico. Retrieved from https://justiceinmexico.org/wp-content/uploads/2018/03/180319-Policy_Brief-CJNG.pdf

  • Liptak, A. (2007, May 22). Web Sites Listing Informants Concern Justice Dept. The New York Times. Retrieved from https://www.nytimes.com/2007/05/22/washington/22plea.html

  • Logan, S., & Sullivan, J. P. (2010, April 7). The Gulf-Zeta Split and the Praetorian Revolt. ISN Security Watch. Retrieved from http://www.isn.ethz.ch/isn/Current-Affairs/Security-Watch/Detail/?lng=en&id=114551

  • Malm A, Bichler G (2011) Networks of collaborating criminal: assessing the structural vulnerability of drug markets. J Res Crime Delinq 48:271–297

    Article  Google Scholar 

  • Marosi, R. (2010, April 14). Reputed drug cartel leader “Muletas” and another suspected gangster are arrested in Baja California. Los Angeles Times Retrieved from http://latimesblogs.latimes.com/laplaza/2010/02/mexico-cartel-leaders-arrested-baja-california-la-paz-muletas-raydel-lopez-uriarte-manuel-simentel.html

  • McGloin JM (2005) Policy and intervention considerations of a network analysis of street gangs. Criminology & Public Policy 4(3):607–635

  • Morselli, C. (2009a). Inside criminal networks. (F. Bovenkerk, Ed.). New York: Springer Science+Business Media, LLC 2009

  • Morselli C (2009b) Hells Angels in springtime. Trends Organ Crim 12:145–158

    Article  Google Scholar 

  • Morselli C, Roy J (2008) Brokerage qualifications in ringing operations. Criminology 46(28):71–98

    Article  Google Scholar 

  • Morselli C, Giguère C, Petit K (2007) The efficiency/security trade-off in criminal networks. Soc Networks 29(1):143–153

    Article  Google Scholar 

  • Natarajan M (2000) Understanding the structure of a drug trafficking organization: a conversational analysis. Crime Prevention Studies 11:273–298

    Google Scholar 

  • Natarajan M (2006) Understanding the structure of a large heroin distribution network: a quantitative analysis of qualitative data. J Quant Criminol 22(2):171–192

    Article  Google Scholar 

  • Natarajan M, Zanella M, Yu C (2015) Classifying the variety of drug trafficking organizations. J Drug Issues 45(4):409–430

    Article  Google Scholar 

  • National Law Enforcement Officers Museum. (2016). Witness to History: Operation Shadow Game. Retrieved from https://www.youtube.com/watch?time_continue=7&v=gwH6eeOwC4k

  • Noel, A. (2016, December 10). Suicide Journalism on the Crazy-Mean Streets of Tijuana. The Daily Beast. Retrieved from http://www.thedailybeast.com/articles/2016/12/10/suicide-journalism-on-the-crazy-mean-streets-of-tijuana.html

  • Oliver, K., Crossley, N., Edwards, G., Koskinen, J., Everett, M., & Broccatelli, C. (2014). Covert networks: structures, processes and types. Mitchell Centre Working Paper

  • Organized Crime Control Act, Pub. L. No. 91–452, 84 Stat. 922 (1970)

  • Phillips BJ (2015) How does leadership decapitation affect violence? The case of drug trafficking organizations in Mexico. J Polit 77(2):324–336

    Article  Google Scholar 

  • Phillips E, Sullivan C, Damato S, Rodriguez A (2015) Racketeer influenced and corrupt organizations. Am Crim L Rev 52(4)

  • Price BC (2012) Targeting top terrorists: how leadership decapitation contributes to counterterrorism. Int Secur 36(4):9–46. https://doi.org/10.2307/41428119

    Article  Google Scholar 

  • Raab J, Milward HB (2003) Dark networks as problems. J Public Adm Res Theory 13(4):413–439

    Article  Google Scholar 

  • Racketeer Influenced and Corrupt Organizations Act, 18 U.S.C. §§ 1961-1968 (1970)

  • Rempel, W. C. (2011). At the Devil's Table: The Untold Story of the Insider Who Brought Down the Cali Cartel. Random House Incorporated.

  • Reuter P (2009) Systemic violence in drug markets. Crime Law Soc Chang 52(3):275–284

    Article  Google Scholar 

  • Robins, G. (2009). Understanding individual behaviors within covert networks: the interplay of individual qualities, psychological predispositions, and network effects. Trends Organ Crim, 12, 166–187

    Article  Google Scholar 

  • Roth M (2017) Global organized crime: a 21st century approach, Second edn. Routledge, New York

    Book  Google Scholar 

  • Sabet, D. (2011). Confrontation, collusion and tolerance: the relationship between law enforcement and organized crime in Tijuana. Mexican Law Review, 2(2)

  • Sabet D (2012) Police reform in Mexico: informal politics and the challenge of institutional change. Stanford University Press, Stanford

    Google Scholar 

  • Sageman M (2004) Understanding terror networks. University of Pennsylvania Press, Philadelphia

    Book  Google Scholar 

  • Salcedo-Albaran, E., & Garay Salamanca, L. J. (2014). Structure of a Transnational Criminal Network: “Los Zetas” and the Smuggling of Hydrocarbons (working paper no. 12). Vortex. Retrieved from http://www.scivortex.org/12TCNsMexUsV2.pdf

  • Scott J (2000) Social Network Analysis : a Handbook (second). SAGE Publications, Thousand Oaks

    Google Scholar 

  • Shirk, D. (2010, January 17). Drug Violence in Mexico: Data and Analysis from 2001-2009. Retrieved from http://justiceinmexico.files.wordpress.com/2010/04/drug_violence.pdf

  • Sparrow M (1991) The application of network analysis to criminal intelligence: an assessment of the prospects. Soc Networks 13(3):251–274

    Article  Google Scholar 

  • Top Lieutenant in Fernando Sanchez Arellano Cartel Sentenced. (2013, December 16). Retrieved August 8, 2017, from https://www.fbi.gov/sandiego/press-releases/2013/top-lieutenant-in-fernando-sanchez-arellano-cartel-sentenced

  • UCINET 6 for windows help contents. (n.d.). Retrieved February 21, 2017, from http://www.analytictech.com/ucinet/help/webhelp.html

  • Valdez Cárdenas, J. (2017). The taken: true stories of the Sinaloa drug war. (E. Meade, Trans.). Norman: University of Oklahoma Press

  • Van de Bunt, H., Siegel, D., & Zaitch, D. (2014). The social embeddedness of organized crime

  • Varese F (2013) The structure and the content of criminal connections: the Russian mafia in Italy. Eur Sociol Rev 29(5):899–909

    Article  Google Scholar 

  • Von Lampe K (2009) Human capital and social capital in criminal networks: introduction to the special issue on the 7th Blankensee colloquium. Trends Organ Crim 12(2):93–100

    Article  Google Scholar 

  • Wainwright T (2016) Narconomics: how to run a drug cartel. PublicAffairs, New York

    Google Scholar 

  • Wasserman S, Faust K (1994) Social network analysis : methods and applications. Cambridge University Press, New York

    Book  Google Scholar 

  • Westley, B. (2011, November 6). Access to Plea Agreements | Reporters Committee for Freedom of the Press. Retrieved July 14, 2017, from https://www.rcfp.org/secret-justice-access-plea-agreements/access-plea-agreements

  • Wood G (2017) The structure and vulnerability of a drug trafficking collaboration network. Soc Networks 48:1–9

    Article  Google Scholar 

  • Woody, C. (2017a, January 19). The rise and fall of Joaquín “El Chapo” Guzmán, the world’s most ambitious drug lord. Retrieved February 17, 2017, from http://www.businessinsider.com/the-history-of-el-chapo-guzman-sinaloa-cartel-chief-drug-lord-2017-1

  • Woody, C. (2017b, March 7). Mexico’s criminal and political worlds are shifting, and 2017 is off to the most violent start on record. Retrieved March 9, 2017, from http://www.businessinsider.com/mexico-political-government-cartel-changes-with-increasing-violence-2017-3

  • Xu J, Chen H (2005) Criminal network analysis and visualization. Commun ACM 48(6):100–107

    Article  Google Scholar 

  • Xu J, Chen H (2009) Untangling criminal networks: a case study. Intelligence and Security Informatics 2665:232–248

    Article  Google Scholar 

Download references

Funding

This study did not receive any outside funding and all PACER searches were conducted by the lead author at his expense.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nathan P. Jones.

Ethics declarations

Conflict of interest

Author A declares that he/she has no conflict of interest. Author B declares he/she has no conflict of interest. Author C declares that he/she has no conflict of interest. Author D declares that he/she has no conflict of interest.

Ethical approval

This does not contain any studies with human participants or animals performed by any of the authors.

Informed consent

Not Applicable.

Appendix

Appendix

Table 4 Network coding rules

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Jones, N.P., Dittmann, W.L., Wu, J. et al. A mixed methods social network analysis of a cross-border drug network: the Fernando Sanchez organization (FSO). Trends Organ Crim 23, 154–182 (2020). https://doi.org/10.1007/s12117-018-9352-9

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12117-018-9352-9

Keywords

Navigation