Abstract
An analysis is reported of 2,408 wiretap conversations gathered in the course of prosecuting a heroin dealing organization in New York City in the 1990s. The five-step analysis, which included a social network analysis of phone contacts, revealed a large, loosely structured group of 294 individuals, most of whom had very limited contacts with others in the group. The group’s active core comprised 38 individuals with extended contacts, little status differentiation and some task specialization. A smaller more tightly connected group of 22 individuals was somewhat independent of the remainder of the core and appeared to constitute a “communal business”. The existence was not confirmed of the large criminal conspiracy described by the prosecution that operated at all levels of trafficking and dealing, from wholesale distribution to street sales. Rather, it appeared that the 294 individuals comprised one segment of the heroin market in the city. However, the discrepancy could be due to the fact that the prosecution drew upon a wider set of information about the individuals concerned than provided by the wiretap data. The study supports recent analyses that see organized crimes, such as drug trafficking, as mostly the work of small groups of loosely linked entrepreneurs rather than large, highly structured criminal syndicates.
Similar content being viewed by others
Notes
Members of traditional criminal organizations might sometimes participate in deals, but again this would often be on a personal basis.
An “enterprise” includes any individual, partnership, corporation, association, or other legal entity and any union or group of individuals formed to create and deliver products to customers (Marcus 1995).
Infobase is a freeform collection of information (both text and graphics) with a comprehensive index. Text in an infobase may be searched, grouped by topic, linked, and edited.
A total of 39 applications for wiretap orders were made during the case, but many of these were for extension orders or for pager devices. Three of the 21 phones tapped were mobile phones which were then in use.
Though this case is closed and the case data are publicly available, IRB required keeping the identity of phones or individuals as anonymous. Nine conversations from three phones were non-usable and were eliminated from the analyses.
The 39 wiretap applications made in the case account for a sizeable proportion of all wiretap authorizations in New York State during the period covered by the investigation; for example, in 1992, 117 such applications were authorized in New York State.
These suppliers are found among the 208 individuals with only one contact. They were often contacted in hotels in other states such as New Jersey and Florida, but the content of the conversations showed they had connections with South America.
Systematic random sampling procedure was used to select the 45 conversations of 45 dyads i.e. every 6th conversation of each dyad was used for analysis.
To check whether this was an artifact of the selection of conversations, the entire database was searched for the word “sir”. Inspection of the 41 hits revealed that the word was most commonly used by higher status individuals when addressing each other.
The taped calls were both outgoing and incoming and for the purposes of the network analysis (which was based on only a sample of all calls intercepted) the contacts were assumed to be directional, mutual and dichotomous (Wasserman and Faust 1994).
The divisions into which cut-points divide a graph are called blocks.
A few phone calls were made to Cali, in Colombia, and there was some evidence that women couriers were bringing in small quantities from Colombia. Some conversations related to travel to Greece and Europe to seek supplies. Some other places called from the tapped phones included Boston, Washington DC, Tampa, Miami, Jamaica, Mexico and Taiwan.
Apart from measuring status differentials, the content of the wiretap conversations was not subjected to detailed analysis, but some useful information emerged from informal reading of the transcripts about the daily lives of those involved in the organization. For example, many members of the core group appeared to have legitimate jobs besides drug dealing. They participated in many ordinary activities, such as going to birthday parties, ball games and family celebrations and visiting friends and relatives in the hospitals. Informal reading of the content of the wiretap conversations also suggested that, at the wholesale level, ethnic and family ties provide the backcloth of trust for the drug-dealing transactions. This may be why violence was rarely mentioned and seems to have been rarely used. In fact, the transactions were conducted like those of any other cooperative businesses with the price and quality of drugs appearing to be the factors weighing most heavily in the deals.
Sparsely-knit, fragmentary, loosely bounded networks make it possible to reach many people through short chains of “friends of friends” (Boissevain 1974).
References
Adler PA (1985) Wheeling and dealing: an ethnography of an upper-level drug dealing and smuggling community. Colombia University Press, New York
Adler PA (1992) The “post” phase of deviant careers: Reintegrating drug traffickers. Deviant Behav 13:103–126
Albanese JS (2004) Organized crime in our times. Anderson Publishing, Cincinnati
Barnes JA (1972) Social networks. Addison-Wesley, Reading, MA
Berkowitz SD (1982) An introduction to structural analysis: the network approach to social research. Butterworths, Toronoto
Boissevain J (1974) Friends of friends: networks, manipulators, and coalitions. Basil Blackwell, Oxford
Bonacich P (1987) Power and centrality: a family of measures. Amer J Sociol 92:1170–1182
Bonacich P (2001) The evolution of exchange networks. J Social Struct 2(5). Retrieved October 20, 2005, from http://www.cmu.edu/joss/content/articles/volume2/Bonacich.html
Borgatti SP, Everett MG (1992) Notions of position in social network analysis. Soc Method 22:1–35
Borgatti SP, Everett MG (1999) Models of core/periphery structures. Soc Network 21:375–395
Borgatti SP, Foster P (2003) The network paradigm in organizational research: a review and typology. J Manag 29(6):991–1013
Borgatti SP, Everett MG, Freeman LC (2002) UCINET for Windows: software for social network analysis. Analytic Technologies, Harvard
Breiger RL (2004) The analysis of social networks. In: Hardy M, Bryman A (eds) Handbook of data analysis. Sage, London, pp 505–526
Brown R, Clarke RV (2004) Police intelligence and theft of vehicles for export: recent UK experience. In: Maxfield M, Clarke RV (eds) Understanding and preventing car theft. Criminal Justice Press, Monsey, NY, pp 1–5
Browne D, Mason M, Murphy R (2003) Drug supply and trafficking: an overview. Howard J Crim Justice. 42(4):324–334
Burt RS (1976) Position in networks. Soc Forces 55:93–122
Burt R (1992) Structural holes: the social structure of competition. Harvard University Press, Cambridge, MA
Clarke RV, Brown R (2003) International trafficking in stolen vehicles. In: Tonry M (ed) Crime and justice. A review of research 30. University of Chicago Press, Chicago
Delaney PD, Denning DE, Kaye J, and McDonald AR (1993) Wiretap laws and procedures what happens when the U.S. government taps a line. Computer professionals for social responsibility. Retrieved October 20, 2005 from http://www.cpsr.org/prevsite/cpsr/privacy/wiretap/wiretap.procedure.html
DesRoches F (1999) Wholesale drug dealers, paper presented to panel on ‘The Structure and operation of illegal commodity markets’. Annual Meeting of the American Society of Criminology, Toronto
Dorn N, Murji K, South N (1992) Traffickers: Drug markets and law enforcement. Routledge, London
Dorn N, Oette L, White S (1998) Drugs importation and the bifurcation of risk: capitalization, cut outs and organized crime. Brit J Criminol 38:537–560
Everett MG, Borgatti SP (1999) The centrality of groups and classes. J Math Sociol 23(3):181–201
Fijnaut C, Bovenkerk F, Bruinsma G, van de Bunt H (1998) Organized crime in the Netherlands. Kluwer Law International, The Hague, the Netherlands
Finckenauer J (2000) Meeting the challenge of transnational crime. National Institute of Justice, Washington, DC
Finckenauer JO, Waring EJ (1998) Russian mafia in America: immigration, culture, and crime. Northeastern University Press, Boston
Freeman LC (1979) Centrality in social networks: conceptual clarification. Soci Network 1:215–239
Friedkin NE (1991) Theoretical foundation for centrality measures. Amer J Sociol 96:1478–1504
Fuentes RJ (1998) Life of a cell: managerial practice and strategy in Colombian cocaine distribution in the United States. Ph.D. Dissertation, City University of New York
Granovetter M (1983) The strength of weak ties: a network theory revisited. Soc Theory 1:201–233
Granovetter M (1985) Economic action and social structure: the problem of embeddedness. Amer J Sociol 91:481–510
Granovetter M (1995) The economic sociology of firms and entrepreneurs. In: Portes A (ed) The economic sociology of immigration: essays in networks, ethnicity and entrepreneurship. Russell Sage Foundation, New York, pp 128–165
Guerette R, and Clarke RV (2005) Border enforcement, organized crime, and deaths of smuggled migrants on the United States-Mexico border. Euro J Crim Policy Res 11(2):159–174
Hobbs D (2001) The firm: organizational logic and criminal culture on a shifting terrain. Brit J Criminol 41(4):549–560
Ianni AF, Ianni RE (1990) Network analysis. In: Andrews, PP, Peterson MB (eds) Criminal intelligence analysis. Palmer Enterprises, Loomis, CA, pp 67–84
Kilduff M, Tsai W (2003) Social networks and organizations. Sage, Beverly Hills, CA
Kleemans E, van de Bunt H (1999) The social embeddedness of transnational criminal Organizations. Trans Org Crime 5(1):97–119
Kleinknecht W (1996) The new ethnic mobs: the changing face of organized crime in America. Free Press, New York
Klerks P (2001) The network paradigm applied to criminal organizations. Connections. 24(3):53–65
Knoke D, Kuklinski JH (1981) Network analysis. Sage, Beverly Hills, CA
Marcus P (1995) The prosecution and defense of criminal conspiracy cases. Matthew Bender, New York
Markovsky B, Willer D, Patton T (1988) Power relations in exchange networks. Amer Sociol Rev 53:220–236
Markovsky B, Skvoretz J, Willer D, Lovaglia M, Erger J (1993) The seeds of weak power: an extension of network exchange theory. Amer Sociol Rev 58:197–209
Moore MH (1987) Organized crime as a business enterprise. In: Edelhertz H (ed) Major issues in organized crime. National Institute of Justice, Washington, DC, pp 51–63
Moreno JL (1934) Who shall survive? Foundations of sociometry, group psychotherapy and sociodrama. Nervous and Mental Disease Publishing Company, Washington, DC
Natarajan M (2000) Understanding the structure of a drug trafficking organization: a conversational analysis. In: Natarajan M, Hough M (eds) Illegal drug markets: from research to prevention policy. Criminal Justice Press, Monsey, NY, pp 273–298
Natarajan M, Belanger M (1998) Varieties of upper-level drug dealing organizations: a typology of cases prosecuted in New York City. J Drug Issues 28(4):1005–1026
Pearson G, Hobbs D (2001) Middle market drug distribution. Home Office, London
Pearson G, Hobbs D (2003) King pin? A case study of a middle market drug broker. Howard J Crim Justice 42(4):335–347
Potter GW (1994) Criminal organizations: vice, racketeering, and politics in an American city. Waveland, Prospect Heights, IL
Reuter P (2004) The political economy of drug smuggling. In: Vellinga M (ed) The political economy of the drug industry. University Press of Florida, Gainesville, pp 129–147
Reuter P, Hagga J (1989) The organization of high-level drug markets: an exploratory study. RAND, Santa Monica
Scott J (1991) Social network analysis: a handbook. Sage Publications, Newbury Park, CA
Sparrow M (1991) The application of network analysis to criminal intelligence: an assessment of the prospects. Soc Networks 13:251–274
Van Marshall A (1997) The state of network organization: a survey in three frameworks. J Org Comput 7(2 & 3):83–151 (Retrieved on June 15, 2005. http://web.mit.edu/marshall/www/papers/NWOrg.pdf)
Wasserman S, Faust K (1994) Social network analysis: methods and applications. Cambridge University Press, Cambridge, MA
Watts D (1999) Networks, dynamics, and the small-world phenomenon. Amer J Sociol 13(2):493–527
Wellman B (1992) Which types of ties and networks give what kinds of social support? Adv Group Process 9:207–235
Zabludoff S (1997) Colombian narcotics organizations as business enterprises. Trans Org Crime 3(2):20–49
Zhang S and Chin K (2003) The declining significance of triad societies in transnational illegal activities. A structural deficiency perspective. Brit J Criminol 43(3):469–488
Zhang S, Chin K (2004) Characteristics of chinese human smugglers. US Dept of Justice, National Institute of Justice, United States
Acknowledgments
This research was primarily supported by a grant from the National Institute on Drug Abuse (1K21DA00242). Viewpoints in this paper do not necessarily represent the official positions of the U.S. Government, National Institute on Drug Abuse or John Jay College of Criminal Justice. Earlier versions of the paper were presented at a NIDA Drug Abuse Workshop, October 2004, Bethesda, MD and the 11th Environmental Criminology and Crime Analysis Seminar held at University of Cincinnati in June 2003. The author acknowledges the assistance of Ms. Haley Kobilinsky with coding and wishes to thank Prof. Ronald V. Clarke of Rutgers University and Dr. Bruce Johnson of National Development Research Institutes, Inc, New York City for their advice and support. She also thanks Zachary Weiss, Assistant District Attorney, White Plains NY, for facilitating this analysis of court data. Finally, the author wishes to acknowledge the insightful comments made by the anonymous reviewers.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Natarajan, M. Understanding the Structure of a Large Heroin Distribution Network: A Quantitative Analysis of Qualitative Data. J Quant Criminol 22, 171–192 (2006). https://doi.org/10.1007/s10940-006-9007-x
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10940-006-9007-x