Skip to main content

Script Analysis for Security Professionals: Past, Present and Future

  • 163 Accesses

Abstract

This chapter discusses script analysis and positions the approach as a useful tool to help security practitioners design and upgrade preventive and protective controls. In addition to providing some documented examples of how the approach has been applied in practice, it highlights some recent advances in script analysis and some suggested areas for improvement.

This is a preview of subscription content, access via your institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • DOI: 10.1007/978-3-030-91735-7_25
  • Chapter length: 20 pages
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
eBook
USD   269.00
Price excludes VAT (USA)
  • ISBN: 978-3-030-91735-7
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Hardcover Book
USD   349.99
Price excludes VAT (USA)

References

  • Abelson, R. P. (1981). Psychological status of the script concept. American Psychologist, 36(7), 715–729.

    CrossRef  Google Scholar 

  • Andreatta, D., & Favarin, S. (2020). Features of transnational illicit waste trafficking and crime prevention strategies to tackle it. Global Crime, 21(2), 130–153.

    CrossRef  Google Scholar 

  • Apena Rogers, F.O. (2019). The crime-commission process of sexual offences on London trains (SOLT): offending in plain sight, not just at night. PhD thesis. Middlesex University.

    Google Scholar 

  • Ashby, M. (2016). Using crime science for understanding and preventing theft of metal from the British railway network. PhD thesis. University College London.

    Google Scholar 

  • Baratto, G. (2020). Situational crime prevention measures in the illegal online trade of medicines. In The illegal trade of medicines on social media (pp. 37–54). Springer, Cham.

    CrossRef  Google Scholar 

  • Basamanowicz, J., & Bouchard, M. (2011). Overcoming the warez paradox: online piracy groups and situational crime prevention. Policy & Internet, 3(2), 1–25.

    CrossRef  Google Scholar 

  • Borrion, H. (2013). Quality assurance in crime scripting. Crime Science, 2(6), 1–12.

    Google Scholar 

  • Borrion, H., Dehghanniri, H., and Li, Y. (2017). Comparative analysis of crime scripts: one CCTV footage—twenty-one scripts. In Proceedings of the 2017 European Intelligence and Security Informatics Conference (pp. 115–122). Piscataway, NJ: IEEE.

    Google Scholar 

  • Bright, D.A., & Delaney, J.J. (2013). Evolution of a drug trafficking network: mapping changes in network structure and function across time. Global Crime, 14(2–3), 238–260.

    CrossRef  Google Scholar 

  • Chainey, S., & Guererro, N. (2019). Developing crime analysis in Mexico: case studies of cargo robbery on highways, illegal weapons trafficking, robbery of convenience stores and poppy cultivation. Technical note. https://discovery.ucl.ac.uk/id/eprint/10067263/. Accessed 27 December 2020.

  • Chiu, Y-N., Leclerc, B., & Townsley, M. (2011). Crime script analysis of drug manufacturing in clandestine laboratories. British Journal of Criminology, 51, 355–374.

    CrossRef  Google Scholar 

  • Chopin, J., Beauregard, E., Bitzer, S., & Reale, K. (2019). Rapists’ behaviors to avoid police detection. Journal of Criminal Justice, 61, 81–89.

    CrossRef  Google Scholar 

  • Cornish, D.B. (1994). The procedural analysis of offending and its relevance for situational prevention. In R.V. Clarke (Ed.), Crime Prevention Studies Volume 3 (pp. 151–196). Monsey, New York: Criminal Justice Press.

    Google Scholar 

  • Dehghanniri, H., & Borrion, H. (2019). Crime scripting: a systematic review. European Journal of Criminology. https://doi.org/10.1177/1477370819850943.

  • De Vries, M.S. (2012). Converted firearms: a transnational problem with local harm. European journal on criminal policy and research, 18(2), 205–216.

    CrossRef  Google Scholar 

  • Dimkov, T., van Cleeff, A., Pieters, W., & Hartel, P. (2010). Two methodologies for physical penetration testing using social engineering. In Proceedings of the 26th annual computer security applications conference. NY: Association for Computing Machinery, 399–408.

    Google Scholar 

  • Ekblom, P., & Gill, M. (2016). Rewriting the script: cross-disciplinary exploration and conceptual consolidation of the procedural analysis of crime. European Journal on Criminal Policy and Research, 22(2), 319–339.

    CrossRef  Google Scholar 

  • Gill, M. (2016). Preface. In H. Haelterman, Crime script analysis: preventing crimes against business (p. vii). London: Palgrave Macmillan.

    Google Scholar 

  • Gilmour, N. (2014). Understanding money laundering—a crime script approach. The European Review of Organised Crime, 1(2), 35–56.

    Google Scholar 

  • Haelterman, H. (2011). Re-thinking the cost of supply chain security. Crime, Law and Social Change, 56(4), 289–405.

    Google Scholar 

  • Haelterman, H. (2016). Crime script analysis: preventing crimes against business. London: Palgrave Macmillan.

    CrossRef  Google Scholar 

  • Hancock, G., & Laycock, G. (2010). Organised crime and crime scripts: prospects for disruption. In K. Bullock, R.V. Clarke, & N. Tilley (Eds.), Situational prevention of organised crimes (pp. 172–192). Devon: Willan Publishing.

    Google Scholar 

  • Hardy, J., Bell, P., & Allan, D. (2020). A crime script analysis of the Madoff Investment Scheme. Crime Prevention and Community Safety, 22(1), 68–97.

    CrossRef  Google Scholar 

  • Holt, T.J., & Lee, J.R. (2020). A crime script analysis of counterfeit identity document procurement online. Deviant Behavior. https://doi.org/10.1080/01639625.2020.1825915.

  • Hutchings, A. (2018). Leaving on a jet plane: the trade in fraudulently obtained airline tickets. Crime, Law and Social Change, 70(4), 461–487.

    CrossRef  Google Scholar 

  • Hutchings, A., & Pastrana, S. (2019). Understanding eWhoring. In 2019 IEEE European Symposium on Security and Privacy (EuroS&P) (pp. 201–214). IEEE.

    Google Scholar 

  • Jordanoska, A., & Lord, N. (2020). Scripting the mechanics of the benchmark manipulation corporate scandals: the ‘guardian’ paradox. European Journal of Criminology, 17(1), 9–30.

    CrossRef  Google Scholar 

  • Junger, M., Wang, V., & Schlömer, M. (2020). Fraud against businesses both online and offline: crime scripts, business characteristics, efforts, and benefits. Crime Science. https://doi.org/10.1186/s40163-020-00119-4.

  • Keatley, D.A., Mcgurk, S., & Allely, C.S. (2020). Understanding school shootings with crime script analysis. Deviant Behavior, 41(9), 1084–1096.

    CrossRef  Google Scholar 

  • Kennedy, J.P., Haberman, C.P., & Wilson, J.M. (2018). Occupational pharmaceutical counterfeiting schemes: a crime scripts analysis. Victims & Offenders, 13(2), 196–214.

    CrossRef  Google Scholar 

  • Lasky, N., Jacques, S. & Fisher, B.S. (2015). Glossing over shoplifting: how thieves act normal. Deviant Behavior, 36:4, 293–309.

    Google Scholar 

  • Lavorgna, A. (2013). Transit crimes in the Internet age: how new online criminal opportunities affect the organization of offline transit crimes. PhD thesis. University of Trento.

    Google Scholar 

  • Lavorgna, A. (2015). The online trade in counterfeit pharmaceuticals: new criminal opportunities, trends and challenges. European Journal of Criminology, 12(2), 226–241.

    CrossRef  Google Scholar 

  • Leclerc, B. (2014a). New developments in script analysis for situational crime prevention. Moving beyond offender scripts. In B. Leclerc & R. Wortley (Eds.), Cognition and crime. Offender decision making and script analyses (pp. 221–236). New York: Routledge.

    Google Scholar 

  • Leclerc, B. (2014b). Script analysis for crime controllers: extending the reach of situational crime prevention. In S. Canepelle & F. Calderoni (Eds.), Organized crime, corruption and crime prevention (pp. 13–20). Switzerland: Springer International Publishing.

    CrossRef  Google Scholar 

  • Leclerc, B., & Reynald, D. (2017). When scripts and guardianship unite: a script model to facilitate intervention of capable guardians in public settings. Security Journal, 30(3), 793–806.

    CrossRef  Google Scholar 

  • Leclerc, B., & Wortley, R. (2014). The reasoning criminal. Twenty-five years on. In B. Leclerc & R. Wortley (Eds.), Cognition and crime. Offender decision making and script analyses (pp. 1–11). New York: Routledge.

    Google Scholar 

  • Lemieux, A. M., & Bruschi, N. (2019). The production of jaguar paste in Suriname: a product-based crime script. Crime Science, 8(1), 6.

    CrossRef  Google Scholar 

  • Leppänen, A., Toiviainen, T., & Kankaanranta, T. (2020). From a vulnerability search to a criminal case: script analysis of an SQL injection attack. International Journal of Cyber Criminology, 14(1), 63–80.

    Google Scholar 

  • Leukfeldt, E. R. (2014). Cybercrime and social ties. Trends in Organized Crime, 17(4), 231–249.

    Google Scholar 

  • Li, Y.S., & Qi, M.L. (2019). An approach for understanding offender modus operandi to detect serial robbery crimes. Journal of Computational Science, https://doi.org/10.1016/j.jocs.2019.101024.

  • Lord, N., Spencer, J., Bellotti, E., & Benson, K. (2017). A script analysis of the distribution of counterfeit alcohol across two European jurisdictions. Trends in Organized Crime, 20, 252–272.

    CrossRef  Google Scholar 

  • Luong, H.T. (2019). Modus operandi of cross-border drug trafficking in Vietnam. In Transnational drug trafficking across the Vietnam-Laos border (pp. 95–122). Palgrave Macmillan, Cham.

    Google Scholar 

  • Masys, A.J. (2016). Disrupting terrorist and criminal networks: crime script analysis through DODAF applications. In A.J. Masys (Ed.), Exploring the security landscape: non-traditional security challenges (pp. 231–247). Switzerland: Springer International Publishing.

    CrossRef  Google Scholar 

  • Meyer, S. (2012). Reducing harm from explosive attacks against railways. Security Journal, 25(4), 309–325.

    CrossRef  Google Scholar 

  • Morselli, C., & Roy, J. (2008). Brokerage qualifications in ringing operations. Criminology, 46(1), 71–98.

    CrossRef  Google Scholar 

  • Osborne, J. R., & Capellan, J. A. (2017). Examining active shooter events through the rational choice perspective and crime script analysis. Security Journal, 30(3), 880–902.

    CrossRef  Google Scholar 

  • Peters, B.C. (2020). Nigerian piracy: articulating business models using crime script analysis. International Journal of Law, Crime and Justice. https://doi.org/10.1016/j.ijlcj.2020.100410.

  • Samonas, S. (2013). Insider fraud and routine activity theory. http://eprints.lse.ac.uk/50344/1/Samonas_Insider_fraud_routine_2013.pdf. Accessed 20 December 2020.

  • Schank, R.C. (1989). An early work in cognitive science. Current Contents, 38, 14.

    Google Scholar 

  • Schank, R.C. & Abelson, R.P. (1977). Scripts, plans, goals and understanding. An inquiry into human knowledge structures. New Jersey: Lawrence Erlbaum Associates.

    Google Scholar 

  • Sosnowski, M.C., Weis, J.S., & Petrossian, G.A. (2020). Using crime script analysis to understand the illegal harvesting of live corals: case studies from Indonesia and Fiji. Journal of Contemporary Criminal Justice. https://doi.org/10.1177/1043986220910295.

  • Staring, R., Bisschop, L., Roks, R., Brein, E., & van de Bunt, H. (2019). Drug crime in the port of Rotterdam. https://repub.eur.nl/pub/127247/Drug-crime-in-the-port-of-Rotterdam-lowres.pdf. Accessed 27 December 2020.

  • Stickle, B., Hicks, M., Stickle, A., & Hutchinson, Z. (2020). Porch pirates: examining unattended package theft through crime script analysis. Criminal Justice Studies, 33(2), 79–95.

    CrossRef  Google Scholar 

  • Tompson, L., & Chainey, S. (2011). Profiling illegal waste activity: using crime scripts as a data collection and analytical strategy. European Journal on Criminal Policy and Research, 17(3), 179–201.

    CrossRef  Google Scholar 

  • Tremblay, P., Talon, B., & Hurley, D. (2001). Body switching and related adaptations in the resale of stolen vehicles. Script elaborations and aggregate crime learning curves. British Journal of Criminology, 41(4), 561–579.

    CrossRef  Google Scholar 

  • Warren, S., Oxburgh, G., Briggs, P., & Wall, D. (2017). How might crime-scripts be used to support the understanding and policing of cloud crime?. In T. Tryfonas (Ed.), Human Aspects of Information Security, Privacy and Trust (pp. 539–556). Springer, Cham.

    Google Scholar 

  • Weekers, D.P. (2020). ‘Conservation’ criminology: understanding and preventing illegal fishing in the Great Barrier Reef Marine Park. PhD thesis. University of Queensland.

    Google Scholar 

  • Weirich, C.A. (2019). Situational crime prevention of antiquities trafficking: a crime script analysis. PhD thesis. University of Glasgow.

    Google Scholar 

  • Williams, A., Corner, E., & Taylor, H. (2020). Vehicular ramming attacks: assessing the effectiveness of situational crime prevention using crime script analysis. Terrorism and Political Violence. https://doi.org/10.1080/09546553.2020.1810025.

  • Willison, R. (2005). Considering the offender: addressing the procedural stages of computer crime in an organisational context. Working Paper No. 09-2005. Copenhagen: Copenhagen Business School.

    Google Scholar 

  • Willison, R., & Siponen, M. (2009). Overcoming the insider: reducing employee computer crime through situational crime prevention. Communications of the ACM, 52(9), 133–137.

    CrossRef  Google Scholar 

  • Zanella, M. (2014). Script analysis of corruption in public procurement. In B. Leclerc & R. Wortley (Eds.), Cognition and crime. Offender decision making and script analysis (pp. 164–185). London and New York: Routledge.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Harald Haelterman .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and Permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Verify currency and authenticity via CrossMark

Cite this chapter

Haelterman, H. (2022). Script Analysis for Security Professionals: Past, Present and Future. In: Gill, M. (eds) The Handbook of Security. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-030-91735-7_25

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-91735-7_25

  • Published:

  • Publisher Name: Palgrave Macmillan, Cham

  • Print ISBN: 978-3-030-91734-0

  • Online ISBN: 978-3-030-91735-7

  • eBook Packages: Law and CriminologyLaw and Criminology (R0)