Networks of Accomplices

Author(s):  
Robert J. Antony

Like other types of criminal organizations, bandits also depended on “outside” help to survive. Chapter 9 explores criminal networks. Although Elizabeth Perry and others have argued that bandits were deeply embedded in the structures of local communities, the author contends that the situation was much more complicated and nuanced. Bandit connections to local communities often were through intermediaries or networks of accomplices that included kinsmen and strangers. Bandits and brotherhoods, indeed, were intrinsic components of the local social fabric; they relied on a vast covert network of spies, fences, yamen underlings, soldiers, commoners, and local gentry for support. Bandits also were part of a vast underground culture of violence and vice that rejected the dominant Confucian values upheld by officials and so-called respectable society.

2017 ◽  
Vol 45 (3) ◽  
pp. 37
Author(s):  
Emily M. Alford

This book presents the reader with both facts and conclusions drawn from three case studies. Authors Ralph Espach, Daniel Haering, Javier Meléndez Quiñonez, and Miguel Castillo Giron focus on the lack of security along Guatemala’s borders and the serious narcotics trafficking, execution-style mass murders, and other severe public security issues that have developed as a result. This research looks closely at the effects of criminal organizations and illicit trafficking within the three particular border municipalities of Guatemala—Sayaxché, Gualán, and Malacatán. The three areas are compared demographically and economically, and through which a deeper analysis is developed on creating better border control through the behaviors of the local communities themselves.


PLoS ONE ◽  
2021 ◽  
Vol 16 (8) ◽  
pp. e0255067
Author(s):  
Annamaria Ficara ◽  
Lucia Cavallaro ◽  
Francesco Curreri ◽  
Giacomo Fiumara ◽  
Pasquale De Meo ◽  
...  

Data collected in criminal investigations may suffer from issues like: (i) incompleteness, due to the covert nature of criminal organizations; (ii) incorrectness, caused by either unintentional data collection errors or intentional deception by criminals; (iii) inconsistency, when the same information is collected into law enforcement databases multiple times, or in different formats. In this paper we analyze nine real criminal networks of different nature (i.e., Mafia networks, criminal street gangs and terrorist organizations) in order to quantify the impact of incomplete data, and to determine which network type is most affected by it. The networks are firstly pruned using two specific methods: (i) random edge removal, simulating the scenario in which the Law Enforcement Agencies fail to intercept some calls, or to spot sporadic meetings among suspects; (ii) node removal, modeling the situation in which some suspects cannot be intercepted or investigated. Finally we compute spectral distances (i.e., Adjacency, Laplacian and normalized Laplacian Spectral Distances) and matrix distances (i.e., Root Euclidean Distance) between the complete and pruned networks, which we compare using statistical analysis. Our investigation identifies two main features: first, the overall understanding of the criminal networks remains high even with incomplete data on criminal interactions (i.e., when 10% of edges are removed); second, removing even a small fraction of suspects not investigated (i.e., 2% of nodes are removed) may lead to significant misinterpretation of the overall network.


Author(s):  
Barbara Jane Holland

Organized crime groups are involved in all kinds of transnational crimes. Lawbreakers can victimize people in other countries through international scams and cyber theft of financial information. Moreover, much of the harm from transnational crimes stems from activities of formal criminal organizations or criminal networks that connect individuals and organizations who undertake specific criminal acts together. According to the United Nations, annual proceeds from transnationally organized crime activities amount to more than $870 billion dollars with drug trafficking producing the largest individual segment of that total amount. One of the most difficult forms of transnational crime to combat is cybercrime. This article will review transnational cybercrime and it's technology.


Author(s):  
Annette Idler

Borderlands are like a magnifying glass on some of the world’s most entrenched security challenges. In unstable regions, border areas attract violent non-state groups, ranging from rebels and paramilitaries to criminal organizations, who exploit central government neglect. These groups compete for territorial control, cooperate in illicit cross-border activities, and provide a substitute for the governance functions usually associated with the state. Drawing on extensive fieldwork with more than six hundred interviews in and on the shared borderlands of Colombia, Ecuador, and Venezuela—where conflict is rife and crime thriving—this book provides exclusive firsthand insights into these war-torn spaces. It reveals how dynamic interactions among violent non-state groups produce a complex security landscape with ramifications for order and governance both locally and beyond. These interactions create not only physical violence but also less visible forms of insecurity. When groups fight each other, community members are exposed to violence but can follow the rules imposed by the opposing actors. Unstable short-term arrangements among violent non-state groups fuel mistrust and uncertainty among communities, eroding their social fabric. Where violent non-state groups engage in relatively stable long-term arrangements, “shadow citizenship” arises: a mutually reinforcing relationship between violent non-state groups that provide public goods and services, and communities that consent to their illicit authority. Contrary to state-centric views that consider borderlands uniformly violent spaces, the transnational borderland lens adopted in the book demonstrates how the geography and political economy of these borderlands intensify these multifaceted security impacts.


Author(s):  
Chris M. Smith ◽  
Andrew V. Papachristos

Social network analysis identifies and explains criminal behavior and criminal groups as an outcome of social relationships that are structured beyond the characteristics of individuals engaged in crime. This chapter takes stock of research using social network analysis to study criminal organizations and groups of criminals, considers the innovations in measuring criminal groups, discusses the limitations of criminal network data, and classifies theoretical orientations used in the field. The chapter discusses the implications of criminal networks research on policy and intervention efforts. The chapter concludes with a proposal for future directions to advance inquiry into criminal networks.


2021 ◽  

The contributors to Cocaine analyze the contemporary production, transit, and consumption of cocaine throughout the Americas and the illicit economy's entanglement with local communities. Based on in-depth interviews and archival research, these essays examine how government agents, acting both within and outside the law, and criminal actors seek to manage the flow of illicit drugs to both maintain order and earn profits. Whether discussing the moral economy of coca cultivation in Bolivia, criminal organizations and drug traffickers in Mexico, or the routes cocaine takes as it travels into and through Guatemala, the contributors demonstrate how entire ways of life are built around cocaine commodification. They consider how the authority of state actors is coupled with the self-regulating practices of drug producers, traffickers, and dealers, complicating notions of governance and of the relationships between economic and moral economies. The collection also outlines a more progressive drug policy that acknowledges the important role drugs play in the lives of those at the urban and rural margins. Contributors. Enrique Desmond Arias, Lilian Bobea, Philippe Bourgois, Anthony W. Fontes, Robert Gay, Paul Gootenberg, Romain Le Cour Grandmaison, Thomas Grisaffi, Laurie Kain Hart, Annette Idler, George Karandinos, Fernando Montero, Dennis Rodgers, Taniele Rui, Cyrus Veeser, Autumn Zellers-León


2020 ◽  
Vol 8 (2) ◽  
pp. 77-90
Author(s):  
Alexandra Zbuchea

World Heritage Sites are justifiably considered as valuable cultural and economic resources of a place. Previous research was dedicated to identifying the impact of world heritage sites on local development, as well as their ability to interact with local communities and to attract tourists. The present analysis describes the social fabric around the World Heritage Sites, aiming to understand better how these sites connect with various actors for identifying lines of sustainable management for these heritage sites. The study pinpoints that social interactions are very important in this context and that there is a shift towards two-way relationships between heritage and local communities, public administration, resident businesses, and tourists as well. Heritage site management should consider increasingly more its social value, the local social fabric, communities’ ideals, and subjective well-being, locals’ and tourists’ stories, the voices, characteristics, and interests of multiple stakeholders.


1998 ◽  
Vol 43 (1) ◽  
pp. 16-18
Author(s):  
Kathryn C. Oleson ◽  
Robert M. Arkin
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document