Advertisement

Using Social Network Analysis to Design Crime Prevention Strategies: A Case Study of Methamphetamine Manufacture and Trafficking

  • David A. BrightEmail author
Chapter

Abstract

Most previous research using social network analysis (SNA) to study criminal networks has focused on describing network structure and on identifying key actors in networks. Results of such research usually have implications for law enforcement interventions designed to dismantle and disrupt criminal networks after they are formed. Relatively little attention has been paid to the potential for SNA to aid in the development of crime prevention strategies against organized crimes such as drug trafficking. In this chapter, a case study of a methamphetamine manufacture and trafficking group is presented. The network is analyzed using social network analysis and crime script analysis with the aim of generating a series of crime prevention strategies. Crime prevention strategies are suggested across two broad levels: (1) the crime commission process including the activities and resources required to commit the particular crime; and (2) the criminal network that supports and carries out the activities in the crime commission process.

Keywords

Social network analysis Crime script analysis Crime prevention Organized crime 

References

  1. Ayling, J. (2011). Pre-emptive strike: How Australia is tackling outlaw motorcycle gangs. American Journal of Criminal Justice, 36(3), 250–264.CrossRefGoogle Scholar
  2. Ayling, J., & Broadhurst, R. (2012). The suppression of organised crime: New approaches and problems (Best practice in policing and security, pp. 37–55). London: Palgrave Macmillan.Google Scholar
  3. Baker, W. E., & Faulkner, R. R. (1993). The Social Organization of Conspiracy: Illegal Networks in the Heavy Electrical Equipment Industry. American Sociological Review, 58(6), 837–860.CrossRefGoogle Scholar
  4. Brandes, U., & Wagner, D. (2004). Visone—Analysis and visualisation of social networks. In M. Junger & P. Mutzel (Eds.), Graph drawing software (pp. 321–340). Berlin: Springer-Verlag.CrossRefGoogle Scholar
  5. Bright, D. A., & Delaney, J. J. (2013). Evolution of a drug trafficking network: Mapping changes in network structure and function across time. Global Crime.Google Scholar
  6. Bright, D. A., Greenhill, C., & Levenkova, N. (2014). Dismantling criminal networks: Can node attributes play a role. In C. Morselli (Ed.), Crime and networks. New York, NY: Routledge.Google Scholar
  7. Bright, D. A., Hughes, C. E., & Chalmers, J. (2012). Illuminating dark networks: A social network analysis of an Australian drug trafficking syndicate. Crime, Law, and Social Change.Google Scholar
  8. Burt, R. S. (1992). Structural holes. Cambridge, MA: Harvard University Press.Google Scholar
  9. Burt, R. S., Jannotta, J. E., & Mahoney, J. T. (1998). Personality correlates of structural holes. Social Networks, 20(1), 63–87. doi: 10.1016/S0378-8733(97)00005-1. http://dx.doi.org.CrossRefGoogle Scholar
  10. Calderoni, F. (2012). The structure of drug trafficking mafias: The ‘Ndrangheta and cocaine. Crime, Law and Social Change, 58(3), 321–349.CrossRefGoogle Scholar
  11. Calderoni, F. (2014). Identifying Mafia Bosses from Meeting Attendance Networks and Network Analysis for Defence and Security (pp. 27–48): Springer.Google Scholar
  12. Carley, K. M., Dombroski, D., Tsvetovat, M., Reminga, J., & Kamneva, N. (2003). Destabilizing dynamic covert networks. Paper presented at the 8th International Command and Control Research and Technology Symposium., National Defence War College, Washington, DC.Google Scholar
  13. Chiu, Y., Leclerc, B., & Townsley, M. (2011). Crime script analysis of drug manufacturing in clandestine laboratories. British Journal of Criminology, 51, 355–374.CrossRefGoogle Scholar
  14. Cornish, D. B. (1994). The procedural analysis of offending and its relevance for situational prevention. In R. V. Clarke (Ed.), Crime prevention studies (pp. 151–196). Monsey, NY: Criminal Justice Press.Google Scholar
  15. Cornish, D. B., & Clarke, R. V. (2002). Analyzing organised crimes. In A. R. Piquero & S. G. Tibbetts (Eds.), Rational choice and criminal behavior: Recent research and future challenges (pp. 41–62). New York, NY: Routledge.Google Scholar
  16. Cornish, D. B., & Clarke, R. V. (2003). Opportunities, precipitators and criminal decisions: A reply to Wortley’s critique of situational crime prevention. In M. J. Smith & D. B. Cornish (Eds.), Theory for practice in situational crime prevention (Crime Prevention Studies no. 16, pp. 41–96). Monsey, NY: Criminal Justice Press.Google Scholar
  17. Cullen, F. T., Jonson, C. L., & Nagin, D. S. (2011). Prisons do not reduce recidivism the high cost of ignoring science. The Prison Journal, 91(3 suppl), 48S–65S.CrossRefGoogle Scholar
  18. Ekblom, P. (2003). Organised crime and the conjunction of criminal opportunity framework. In A. Edwards & P. Gill (Eds.), Transnational organised crime (pp. 28–41). London: Routledge.Google Scholar
  19. Everton, S. F. (2012). Disrupting dark networks. New York, NY: Cambridge University Press.CrossRefGoogle Scholar
  20. Felson, M. (2006). The Ecosystem for Organized Crime. HEUNI Paper No 26. HEUNI. Helsinki.Google Scholar
  21. Gambetta, D. (2009). Codes of the underworld: How criminals communicate. Princeton: Princeton University Press.Google Scholar
  22. Gong, W., Ritter, A., Bright, D., & Doran, C. (2012). How profitable is methamphetamine dealing in Australia? Drug and alcohol dependence, 122(3), 208–212.CrossRefGoogle Scholar
  23. Hancock, G., & Laycock, G. (2010). Organised crime and crime scripts: Prospects for disruption. In K. Bullock, R. V. Clarke, & N. Tilley (Eds.), Situational Prevention of Organised Crime (pp. 172–192). Cullompton, Devon: Willan Publishing.Google Scholar
  24. Huther, J., & Shah, A. (2000). Anti-corruption policies and programs: A framework for evaluation (Vol. 2501): World Bank Publications, Washington, DC.Google Scholar
  25. Krebs, V. E. (2002). Mapping networks of terrorist cells. Connections, 24(3), 43–52.Google Scholar
  26. Levi, M., & Maguire, M. (2004). Reducing and preventing organised crime: An evidence-based critique. Crime, Law and Social Change, 41, 397–469.CrossRefGoogle Scholar
  27. Mancuso, M. (2013). Not all madams have a central role: Analysis of a Nigerian sex trafficking network. Trends in Organized Crime.Google Scholar
  28. Matei, L., & Matei, A. (2009). Corruption in the public organizations. Towards a model of cost-benefit analysis for the anticorruption strategies. Transylvanian Review of Administrative Sciences, 27, 145–171.Google Scholar
  29. Mazerolle, L., Soole, D. W., & Rombouts, S. (2006). Street-level drug law enforcement: A meta-analytical review⋆. Journal of Experimental Criminology, 2(4), 409–435.CrossRefGoogle Scholar
  30. McKetin, R., Sutherland, R., Bright, D. A., & Norberg, M. M. (2011). A systematic review of methamphetamine precursor regulations. Addiction, 106(11), 1911–1924.CrossRefGoogle Scholar
  31. Morselli, C. (2005). Contacts, opportunities, and criminal enterprise. Toronto, ON: University of Toronto Press.Google Scholar
  32. Morselli, C. (2009a). Hells Angels in springtime. Trends in Organized Crime, 12, 145–158.CrossRefGoogle Scholar
  33. Morselli, C. (2009b). Inside criminal networks. New York, NY: Springer.CrossRefGoogle Scholar
  34. Morselli, C. (2010). Assessing vulnerable and strategic positions in a criminal network. Journal of Contemporary Criminal Justice, 26, 382–392.CrossRefGoogle Scholar
  35. Morselli, C., & Roy, J. (2008). Brokerage qualifications in ringing operations. Criminology, 46(1), 28.CrossRefGoogle Scholar
  36. Natarajan, M. (2000). Understanding the structure of a drug trafficking organisation: A conversational analysis. In M. Natarajan & M. Hough (Eds.), Illegal Drug Markets: From Research to Prevention Policy. Monsey, NY: Criminal Justice Press.Google Scholar
  37. Papachristos, A. V., & Smith, C. M. (2013). The embedded and multiplex nature of Al Capone. In C. Morselli (Ed.), Crime and networks. New York, NY: Routledge.Google Scholar
  38. Ransley, J., Mazerolle, L., Manning, M., McGuffog, I., Drew, J. M., & Webster, J. (2012). Reducing the methamphetamine problem in Australia: Evaluating innovative partnerships between police, pharmacies and other third parties. Canberra, Australia: NDLERF Monographs.Google Scholar
  39. Ritter, A., Bright, D. A., & Gong, W. (2012). Evaluating drug law enforcement interventions directed towards methamphetamine in Australia. Canberra: National Drug Law Enforcement Research Fund.Google Scholar
  40. Schwartz, D. M., & Rouselle, D. A. (2009). Using social network analysis to target criminal networks. Trends in Organised Crime, 12, 188–207.CrossRefGoogle Scholar
  41. Sexton, R. L., Carlson, R. G., Leukefeld, C. G., & Booth, B. M. (2006). Patterns of illicit methamphetamine production (“cooking”) and associated risks in the rural south: An ethnographic exploration. Journal of Drug Issues, 36(4), 853–876.CrossRefGoogle Scholar
  42. Sutton, A., Cherney, A., & White, R. (2013). Crime prevention: Principles, perspectives and practices. Cambridge: Cambridge University Press.Google Scholar
  43. Williams, P. (2001). Transnational Criminal Networks. In D. F. R. John Arquilla (Ed.), Networks and netwars: The future of terror, crime, and militancy. Santa Monica, CA: RAND.Google Scholar
  44. Xu, J., & Chen, H. (2009). Untangling criminal networks: A Case Study Intelligence and Security Informatics (pp. 958–958).Google Scholar

Copyright information

© Springer International Publishing Switzerland 2017

Authors and Affiliations

  1. 1.Faculty of Arts and Social SciencesSchool of Social Sciences, University of New South WalesSydneyAustralia

Personalised recommendations