The problem of transnational criminal organization poses some unique challenges to the law enforcement community. The scale of these organizations' activities and personnel creates exponentially more work for law enforcement than relatively isolated or contained criminal acts by individuals or small groups. Random and personal crimes committed by individuals can usually be handled by the police at the local level, as investigations are limited to the known crime (or crimes) that have been committed and reported. In these cases, the identification and arrest of the perpetrator of the crime is possible through the investigation of the evidence of the specific crime case. This is not the case with large criminal organizations. The scale of criminal activities committed by transnational criminal enterprises dwarfs those committed by individual “local” criminals. Organized criminal enterprises implement a pattern of large-scale criminal activity on a daily basis that involves the participation of many individuals. Transnational criminal organizations are a bit like the mythological nine-headed Hydra: when one of its heads was cut off, it quickly grew back. Therefore, to impact organizations as a whole, law enforcement must target their leadership and coordinate their arrests. To achieve this, law enforcement must work meticulously to identify the full scope of the criminal enterprise's operations and map its organization, identifying key personnel and collaborators. Not only that, but during the course of this intelligence gathering, law enforcement must also gather credible evidence that will help lead to a conviction in court. One of the main analytical techniques that can be used against transnational criminal organization is networking ... middle of paper ... and attempts to form theories and predictions that can subsequently be proven or disproven through the investigation and collection of data. trial. Useful investigative information that may emerge from this analysis could include identifying the roles of individuals within the organization, mapping the structure and individual groups/cells of the criminal enterprise, as well as identifying supply chains, of Tactical Techniques and Procedures (TTP)/ modus operandi (MO and Indicators and Warnings (I&W). Works CitedJiminez, David, (2010). Week 2 Added MaterialPrecision Computing Intelligence. CrimeLink - Association Matrix. Retrieved from http://www .pciusa.us/CL_AssocMatrix.aspxXu, Jennifer and Hsinchun Chen. Crime Network Analysis and Visualization: A Data Mining Perspective Retrieved from http://ai.eller.arizona.edu/COPLINK/publications/crimenet/Xu_CACM.doc.
tags