Trends in Security Information
The HSD Trendmonitor is designed to provide access to relevant content on various subjects in the safety and security domain, to identify relevant developments and to connect knowledge and organisations. The safety and security domain encompasses a vast number of subjects. Four relevant taxonomies (type of threat or opportunity, victim, source of threat and domain of application) have been constructed in order to visualize all of these subjects. The taxonomies and related category descriptions have been carefully composed according to other taxonomies, European and international standards and our own expertise.
In order to identify safety and security related trends, relevant reports and HSD news articles are continuously scanned, analysed and classified by hand according to the four taxonomies. This results in a wide array of observations, which we call ‘Trend Snippets’. Multiple Trend Snippets combined can provide insights into safety and security trends. The size of the circles shows the relative weight of the topic, the filters can be used to further select the most relevant content for you. If you have an addition, question or remark, drop us a line at info@securitydelta.nl.
visible on larger screens only
Please expand your browser window.
Or enjoy this interactive application on your desktop or laptop.
Social Network Analysis (SNA) within a legal system
specifically in money laundering, and gang cases.
Two pressing issues will be addressed: firstly, how social network analysis can take its place within a legal system and, secondly, how it can contribute to proving links and connections beyond any reasonable doubt, turning them from investigative evidence into judicial proof. By having SNA techniques implemented in a judicial context, there is an opportunity to save time, as the analysis of patterns could be partially automated, therefore facilitating the work of prosecution. Saving time would consequentially reduce the cost required to facilitate the investigation, prosecution, and trial as it would make the whole system more efficient. To benefit from these advantages, however, the current lack of knowledge in the legal profession regarding this area must be overcome through education, allowing practitioners to understand both positive elements and potential pitfalls.
. . .
SNA in its simplest form, link analysis,20 has been already deployed as an aid in investigations and trials, specifically in money laundering,21 and gang cases.22 In the US, COPLINK software, for example,23 acts as a database system where different entities can be connected through the results of text analysis. COPLINK provides link analysis that is currently admitted in trials.24 It is a softer version of SNA, mainly employed as a visualisation tool. What is still missing, however, is a more elaborate version of SNA that provides measurable evidence for the involvement of each individual or the standard set by the criminal conduct.
Furthermore, judicial documents are one of the various resources for identifying and building social networks. Campana and Varese (2012),25 among others, agree that the access to these kinds of documents allows researchers to gather data from wiretaps and investigations with a certain degree of validity and reliability as long as there is: a) no self-censorship within the group that is investigated; b) there is widespread group coverage with c) a large sample of conversations. Once SNA is applied to the same legal documents employed by legal operators, it would help achieve a better understanding of the group dynamics that are investigated. On the other hand, there are methodological problems concerning the limits of the network26 and the problem of missing information in covert networks,27 which translate into unclear or imprecise dynamics within the group,28 since the investigation could have focused on just one part of the whole network29 or set a threshold that is too high or too low for measuring the involvement of the single individual into the illicit group.