IDEAS home Printed from https://ideas.repec.org/a/gam/jmathe/v10y2022i16p2929-d888073.html
   My bibliography  Save this article

Covert Network Construction, Disruption, and Resilience: A Survey

Author

Listed:
  • Annamaria Ficara

    (Department of Mathematical and Computer Science, Physical Sciences and Earth Sciences, University of Messina, 98166 Messina, Italy)

  • Francesco Curreri

    (Department of Mathematical and Computer Science, Physical Sciences and Earth Sciences, University of Messina, 98166 Messina, Italy
    Department of Mathematics and Informatics, University of Palermo, 90123 Palermo, Italy)

  • Giacomo Fiumara

    (Department of Mathematical and Computer Science, Physical Sciences and Earth Sciences, University of Messina, 98166 Messina, Italy)

  • Pasquale De Meo

    (Department of Ancient and Modern Civilizations, University of Messina, 98168 Messina, Italy)

  • Antonio Liotta

    (Faculty of Computer Science, Free University of Bozen-Bolzano, 39100 Bolzano, Italy)

Abstract

Covert networks refer to criminal organizations that operate outside the boundaries of the law; they can be mainly classified as terrorist networks and criminal networks. We consider how Social Network Analysis (SNA) is used to analyze such networks in order to attain a greater knowledge of criminal behavior. In fact, SNA allows examining the network structure and functioning by computing relevant metrics and parameters to identify roles, positions, features, and other network functioning that are not otherwise easily discovered at first glance. This is why Law Enforcement Agencies (LEAs) are showing growing interest in SNA, which is also used to identify weak spots and disrupt criminal groups. This paper provides a literature review and a classification of methods and real-case applications of disruption techniques. It considers covert network adaptability to such dismantling attempts, herein referred to as resilience. Critical problems of SNA in criminal studies are discussed, including data collection techniques and the inevitable incompleteness and biases of real-world datasets, with the aim of promoting a new research stream for both dismantling techniques and data collection issues.

Suggested Citation

  • Annamaria Ficara & Francesco Curreri & Giacomo Fiumara & Pasquale De Meo & Antonio Liotta, 2022. "Covert Network Construction, Disruption, and Resilience: A Survey," Mathematics, MDPI, vol. 10(16), pages 1-43, August.
  • Handle: RePEc:gam:jmathe:v:10:y:2022:i:16:p:2929-:d:888073
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/2227-7390/10/16/2929/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/2227-7390/10/16/2929/
    Download Restriction: no
    ---><---

    References listed on IDEAS

    as
    1. Nicola Daniele Coniglio & Giuseppe Celi & Cosimo Scagliusi, 2010. "Organized Crime, Migration and Human Capital Formation: Evidence from the South of Italy," SERIES 0028, Dipartimento di Economia e Finanza - Università degli Studi di Bari "Aldo Moro", revised Mar 2010.
    2. Scott Duxbury & Dana L Haynie, 2020. "The responsiveness of criminal networks to intentional attacks: Disrupting darknet drug trade," PLOS ONE, Public Library of Science, vol. 15(9), pages 1-13, September.
    3. Carlo Morselli & Katia Petit, 2007. "Law-Enforcement Disruption of a Drug Importation Network," Global Crime, Taylor & Francis Journals, vol. 8(2), pages 109-130, May.
    4. Morgan Burcher & Chad Whelan, 2015. "Social network analysis and small group ‘dark’ networks: an analysis of the London bombers and the problem of ‘fuzzy’ boundaries," Global Crime, Taylor & Francis Journals, vol. 16(2), pages 104-122, April.
    5. Timothy C Haas & Sam M Ferreira, 2016. "Combating Rhino Horn Trafficking: The Need to Disrupt Criminal Networks," PLOS ONE, Public Library of Science, vol. 11(11), pages 1-26, November.
    6. Chien-Chieh Huang & Derek Laing & Ping Wang, 2004. "Crime And Poverty: A Search-Theoretic Approach," International Economic Review, Department of Economics, University of Pennsylvania and Osaka University Institute of Social and Economic Research Association, vol. 45(3), pages 909-938, August.
    7. David Bright & Catherine Greenhill & Thomas Britz & Alison Ritter & Carlo Morselli, 2017. "Criminal network vulnerabilities and adaptations," Global Crime, Taylor & Francis Journals, vol. 18(4), pages 424-441, October.
    8. Alexander Gutfraind, 2010. "Optimizing Topological Cascade Resilience Based on the Structure of Terrorist Networks," PLOS ONE, Public Library of Science, vol. 5(11), pages 1-7, November.
    9. Villani, Salvatore & Mosca, Michele & Castiello, Mauro, 2019. "A virtuous combination of structural and skill analysis to defeat organized crime," Socio-Economic Planning Sciences, Elsevier, vol. 65(C), pages 51-65.
    10. Martin Bouchard, 2007. "On the Resilience of Illegal Drug Markets," Global Crime, Taylor & Francis Journals, vol. 8(4), pages 325-344, November.
    11. Aili Malm & Gisela Bichler & Rebecca Nash, 2011. "Co-offending between criminal enterprise groups," Global Crime, Taylor & Francis Journals, vol. 12(2), pages 112-128, May.
    12. H. Naci Mocan & Stephen C. Billups & Jody Overland, 2005. "A Dynamic Model of Differential Human Capital and Criminal Activity," Economica, London School of Economics and Political Science, vol. 72(288), pages 655-681, November.
    13. Hao Li & Tian Wang & Xinxin Xu & Bo Jiang & Jianliang Wei & Jiale Wang, 2020. "Modeling Software Systems as Complex Networks: Analysis and Their Applications," Mathematical Problems in Engineering, Hindawi, vol. 2020, pages 1-7, April.
    14. Giovanni Mastrobuoni & Eleonora Patacchini, 2010. "Understanding Organized Crime Networks: Evidence Based on Federal Bureau of Narcotics Secret Files on American Mafia," Carlo Alberto Notebooks 152, Collegio Carlo Alberto.
    15. Flaviano Morone & Hernán A. Makse, 2015. "Correction: Corrigendum: Influence maximization in complex networks through optimal percolation," Nature, Nature, vol. 527(7579), pages 544-544, November.
    16. Christopher E. Hutchins & Marge Benham-Hutchins, 2010. "Hiding in plain sight: criminal network analysis," Computational and Mathematical Organization Theory, Springer, vol. 16(1), pages 89-111, March.
    17. Toine Spapens, 2011. "Interaction between criminal groups and law enforcement: the case of ecstasy in the Netherlands," Global Crime, Taylor & Francis Journals, vol. 12(1), pages 19-40, February.
    18. Brown, Ryan & Velásquez, Andrea, 2017. "The effect of violent crime on the human capital accumulation of young adults," Journal of Development Economics, Elsevier, vol. 127(C), pages 1-12.
    19. Paolo Campana & Federico Varese, 2013. "Cooperation in criminal organizations: Kinship and violence as credible commitments," Rationality and Society, , vol. 25(3), pages 263-289, August.
    20. Flaviano Morone & Hernán A. Makse, 2015. "Influence maximization in complex networks through optimal percolation," Nature, Nature, vol. 524(7563), pages 65-68, August.
    21. Martin Bouchard & Frédéric Ouellet, 2011. "Is small beautiful? The link between risks and size in illegal drug markets," Global Crime, Taylor & Francis Journals, vol. 12(1), pages 70-86, February.
    22. Giulia Berlusconi, 2022. "Come at the king, you best not miss: criminal network adaptation after law enforcement targeting of key players," Global Crime, Taylor & Francis Journals, vol. 23(1), pages 44-64, January.
    23. Nicholas C. Athey & Martin Bouchard, 2013. "The BALCO scandal: the social structure of a steroid distribution network," Global Crime, Taylor & Francis Journals, vol. 14(2-3), pages 216-237, May.
    24. Leo Katz, 1953. "A new status index derived from sociometric analysis," Psychometrika, Springer;The Psychometric Society, vol. 18(1), pages 39-43, March.
    25. Eiselt, H.A., 2018. "Destabilization of terrorist networks," Chaos, Solitons & Fractals, Elsevier, vol. 108(C), pages 111-118.
    26. Giulia Berlusconi, 2013. "Do all the pieces matter? Assessing the reliability of law enforcement data sources for the network analysis of wire taps," Global Crime, Taylor & Francis Journals, vol. 14(1), pages 61-81, February.
    27. René M. Bakker & Jörg Raab & H. Brinton Milward, 2012. "A preliminary theory of dark network resilience," Journal of Policy Analysis and Management, John Wiley & Sons, Ltd., vol. 31(1), pages 33-62, December.
    28. Lucia Cavallaro & Annamaria Ficara & Pasquale De Meo & Giacomo Fiumara & Salvatore Catanese & Ovidiu Bagdasar & Wei Song & Antonio Liotta, 2020. "Disrupting resilient criminal networks through data analysis: The case of Sicilian Mafia," PLOS ONE, Public Library of Science, vol. 15(8), pages 1-22, August.
    29. Stephen P. Borgatti, 2006. "Identifying sets of key players in a social network," Computational and Mathematical Organization Theory, Springer, vol. 12(1), pages 21-34, April.
    30. Fan, Changjun & Liu, Zhong & Lu, Xin & Xiu, Baoxin & Chen, Qing, 2017. "An efficient link prediction index for complex military organization," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 469(C), pages 572-587.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Manzi, Deborah & Calderoni, Francesco, 2024. "The resilience of drug trafficking organizations: Simulating the impact of police arresting key roles," Journal of Criminal Justice, Elsevier, vol. 91(C).
    2. Lucia Cavallaro & Annamaria Ficara & Pasquale De Meo & Giacomo Fiumara & Salvatore Catanese & Ovidiu Bagdasar & Wei Song & Antonio Liotta, 2020. "Disrupting resilient criminal networks through data analysis: The case of Sicilian Mafia," PLOS ONE, Public Library of Science, vol. 15(8), pages 1-22, August.
    3. Li Zeng & Changjun Fan & Chao Chen, 2023. "Leveraging Minimum Nodes for Optimum Key Player Identification in Complex Networks: A Deep Reinforcement Learning Strategy with Structured Reward Shaping," Mathematics, MDPI, vol. 11(17), pages 1-13, August.
    4. Édgar Solano González (Editor) & Manuela Losada Chavarro (Editor) & María Alejandra Osorio Alvis (Editor), 2022. "Investigación y judicialización de violaciones graves al derecho internacional humanitario. Tomo VI," Books, Universidad Externado de Colombia, Facultad de Derecho, number 1366, October.
    5. Smith, Thomas Bryan, 2021. "Gang crackdowns and offender centrality in a countywide co-offending network: A networked evaluation of Operation Triple Beam," Journal of Criminal Justice, Elsevier, vol. 73(C).
    6. Wandelt, Sebastian & Sun, Xiaoqian & Zhang, Anming, 2023. "Towards analyzing the robustness of the Integrated Global Transportation Network Abstraction (IGTNA)," Transportation Research Part A: Policy and Practice, Elsevier, vol. 178(C).
    7. Xie, Zheng & Lv, Yiqin & Song, Yiping & Wang, Qi, 2024. "Data labeling through the centralities of co-reference networks improves the classification accuracy of scientific papers," Journal of Informetrics, Elsevier, vol. 18(2).
    8. Annamaria Ficara & Giacomo Fiumara & Salvatore Catanese & Pasquale De Meo & Xiaoyang Liu, 2022. "The Whole Is Greater than the Sum of the Parts: A Multilayer Approach on Criminal Networks," Future Internet, MDPI, vol. 14(5), pages 1-21, April.
    9. Liu, Xiaodong & Patacchini, Eleonora & Zenou, Yves & Lee, Lung-Fei, 2011. "Criminal Networks: Who is the Key Player?," Research Papers in Economics 2011:7, Stockholm University, Department of Economics.
    10. Xinyu Huang & Dongming Chen & Dongqi Wang & Tao Ren, 2020. "MINE: Identifying Top- k Vital Nodes in Complex Networks via Maximum Influential Neighbors Expansion," Mathematics, MDPI, vol. 8(9), pages 1-25, August.
    11. Fink, Christian G. & Fullin, Kelly & Gutierrez, Guillermo & Omodt, Nathan & Zinnecker, Sydney & Sprint, Gina & McCulloch, Sean, 2023. "A centrality measure for quantifying spread on weighted, directed networks," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 626(C).
    12. Wu, Tao & Xian, Xingping & Zhong, Linfeng & Xiong, Xi & Stanley, H. Eugene, 2018. "Power iteration ranking via hybrid diffusion for vital nodes identification," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 506(C), pages 802-815.
    13. Michel Grabisch & Agnieszka Rusinowska, 2015. "Lattices in Social Networks with Influence," International Game Theory Review (IGTR), World Scientific Publishing Co. Pte. Ltd., vol. 17(01), pages 1-18.
    14. Fan, Dongming & Sun, Bo & Dui, Hongyan & Zhong, Jilong & Wang, Ziyao & Ren, Yi & Wang, Zili, 2022. "A modified connectivity link addition strategy to improve the resilience of multiplex networks against attacks," Reliability Engineering and System Safety, Elsevier, vol. 221(C).
    15. Wang, Jingjing & Xu, Shuqi & Mariani, Manuel S. & Lü, Linyuan, 2021. "The local structure of citation networks uncovers expert-selected milestone papers," Journal of Informetrics, Elsevier, vol. 15(4).
    16. Gangwal, Utkarsh & Singh, Mayank & Pandey, Pradumn Kumar & Kamboj, Deepak & Chatterjee, Samrat & Bhatia, Udit, 2022. "Identifying early-warning indicators of onset of sudden collapse in networked infrastructure systems against sequential disruptions," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 591(C).
    17. Lindquist, Matthew J. & Zenou, Yves, 2019. "Crime and Networks: 10 Policy Lessons," IZA Discussion Papers 12534, Institute of Labor Economics (IZA).
    18. Wang, Zhixiao & Zhao, Ya & Xi, Jingke & Du, Changjiang, 2016. "Fast ranking influential nodes in complex networks using a k-shell iteration factor," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 461(C), pages 171-181.
    19. repec:hal:pseose:halshs-00977005 is not listed on IDEAS
    20. Yin, Haofei & Zhang, Aobo & Zeng, An, 2023. "Identifying hidden target nodes for spreading in complex networks," Chaos, Solitons & Fractals, Elsevier, vol. 168(C).
    21. Qi, Mingze & Tan, Suoyi & Chen, Peng & Duan, Xiaojun & Lu, Xin, 2023. "Efficient network intervention with sampling information," Chaos, Solitons & Fractals, Elsevier, vol. 166(C).

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jmathe:v:10:y:2022:i:16:p:2929-:d:888073. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.