Skip to main content

Extortion Rackets: An Event-Oriented Model of Interventions

  • Chapter
  • First Online:
Social Dimensions of Organised Crime

Part of the book series: Computational Social Sciences ((CSS))

Abstract

The aim of this chapter is to document the event-oriented version of the NetLogo model of normative agents in extortion racket systems (ERSs). It presents a simulation model in which agents represent Mafiosi, their victims, the police, the public (mainly in their role as consumers) and a court which—besides extorting and forming Mafia families, denouncing or satisfying Mafia requests, observing, arresting and convicting criminals, compensating victims from confiscated Mafia assets—send each other norm invocation messages to mutually modify their action propensities. Each agent of each type has a repertoire of norms whose salience it calculates from its memory before deciding to take action; besides agents also calculate the utility of the actions available in the current situation. The current version of the model is event oriented such that each simulation run tells a story of the rise and possible fall of a Mafia regime in a virtual region. The results of a large number of runs are analysed to find out under which parameter constellations governing the normative behaviour of the software agents the model replicates the macro observations in a number of provinces in Southern Italy which are derived from a database of more than 600 actual cases in Sicily and Calabria extracted from police and judicial documents generated during the prosecution of these cases. Thus it is possible to show that certain parameterisations of the model generate extortion databases similar to the empirical database although the richness of information generated by the model is much greater than what can be documented empirically. Finally the simulation model is applied to analysing strategies and their effect on the behaviour of the agents and the system as a whole.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    The model can be downloaded from http://ccl.northwestern.edu/netlogo/models/community/EONOERS.

  2. 2.

    The standard duration of a run is 2 years, which—for 100 shops, 50 extorters, 10 police and 800 customers, some 2000 extortion attempts and 37,000 exchanged invocation messages—takes a standard PC with eight processors about 2 min on an average in batch mode (a single run takes 20–30 min). Three times as many agents of each type with about 5000 extortion attempts and about 100,000 messages exchanged means about 30 min per run. The delays mentioned in Table 8.2 are not calibrated against any empirical data as even the Sicily and Calabria database (see Chap. 6) does not contain sufficient details for such a calibration . The simulated time units can only have a rough correspondence to real-time units.

  3. 3.

    Runs with different numbers of agents per type—e.g. three times as many as mentioned in footnote 16—generate results which are very similar to the ones reported here, but consume disproportionate computing time.

  4. 4.

    That the province of Trapani is different from the other provinces was already clear from the findings in Chap. 9.

References

  • Di Trapani, P., & Vaccaro, A. (2014). Addiopizzo. La rivoluzione dei consumi contro la mafia. Cagliari: Arkadia.

    Google Scholar 

  • Di Trapani, P., & Vaccaro, A. (2016). Addiopizzo: Leveraging consumers responsible purchase to fight mafia. Madrid: McGraw-Hill Interamericana de España.

    Google Scholar 

  • Edmonds, B., & Moss, S. (2005). From KISS to KIDS—An ‘anti-simplistic’ modelling approach. In P. Davidsson, B. Logan, & K. Takadama (Eds.), Multi-agent and multi-agent-based simulation: Joint Workshop MABS 2004 (S. 130–144). Berlin: Springer.

    Google Scholar 

  • Frazzica, G., Punzo, V., La Spina, A., Militello, V., Scaglione, A., & Troitzsch, K. G. (2015). Sicily and calabria extortion database. (GESIS, Hrsg.) Von Datorium: http://dx.doi.org/10.7802/1116 abgerufen.

  • Nardin, L. G., Andrighetto, G., Conte, R., Székely, Á., Anzola, D., Elsenbroich, C., et al. (2016). Simulating the dynamics of extortion racket systems: A sicilian Mafia case study. Autonomous Agents and Multi-Agent Systems

    Google Scholar 

  • Sheppard, C., & Railsback, S. (2014, August 28). NetLogo time extension. Retrieved February 18, 2016, from https://github.com/colinsheppard/time.

  • Tisue, S., & Wilensky, U. (2004). NetLogo: Design and implementation of a multi-agent modeling environment. Agent2004 Conference. Chicago

    Google Scholar 

  • Troitzsch, K. G. (2015a). Extortion racket systems as targets for agent-based simulation models. Comparing competing simulation models and Emprical data. Advances in Complex Systems, 18, 1550014.

    Article  Google Scholar 

  • Troitzsch, K. G. (2015b). Distribution effects of extortion racket systems. In F. M. Amblard (Ed.), Advances in artificial economics (pp. 181–193). Berlin: Springer.

    Google Scholar 

  • Troitzsch, K. G. (2016). Using empirical data for designing, calibrating and validating simulation models.

    Google Scholar 

  • Troitzsch, K. G. (2016). Can agent-based simulation models replicate organised crime? Trends in Organised Crime

    Google Scholar 

  • Vaccaro, A., & Palazzo, G. (2015). Values against violence: Institutional change in societies dominated by organized crime. Academy of Managemtn Journal, 58(4), 1075–1101.

    Article  Google Scholar 

  • Ziliak, S. T., & McCloskey, D. N. (2007). The cult of statistical significance. How the standard error costs us jobs, justice and lives. Ann Arbor: University of Michigan Press.

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Klaus G. Troitzsch .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Troitzsch, K.G. (2016). Extortion Rackets: An Event-Oriented Model of Interventions. In: Elsenbroich, C., Anzola, D., Gilbert, N. (eds) Social Dimensions of Organised Crime. Computational Social Sciences. Springer, Cham. https://doi.org/10.1007/978-3-319-45169-5_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-45169-5_8

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-45167-1

  • Online ISBN: 978-3-319-45169-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics