RAND_MR1382
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
network a capacity to operate with confidence that disloyalty or defection are<br />
unlikely. 15<br />
If network cores exhibit strong collective identities, cohesion does not necessarily<br />
enhance—and can actually reduce—the capacity to obtain information and “mobilize<br />
resources from the environment.” Indeed,<br />
recent trends in network analysis posit an inverse relationship, in general, between the density/intensity of the<br />
coupling of network ties on the one hand and their openness to the outside environment on the other. 16<br />
This explains the attraction of a two-tier structure in which the weaknesses of the core in<br />
carrying out the functions of information acquisition are more than offset by the<br />
periphery.<br />
Network Peripheries<br />
This zone features less dense patterns of interaction and looser relationships than the<br />
core. Yet, these characteristics play a critical role in networks, exhibiting and exploiting<br />
“the strength of weak ties.” 17 In effect, the periphery allows the network to operate at a<br />
far greater distance—both geographically and socially—than would otherwise be the<br />
case, facilitating more-extensive operations, more-diverse activities, and the capacity to<br />
carry out effective intelligence collection. 18 The Cali cartel, for example, was generally<br />
thought of as a highly centralized and structured organization. In fact, it was a<br />
networked structure with a set of key figures at the core and a periphery that included<br />
not only those directly involved in the processing and transportation of cocaine, but<br />
also taxi drivers and street vendors who were an invaluable source of information at the<br />
grass-roots level.<br />
For criminal networks, this capacity is critical, because it allows them to anticipate and<br />
thereby to neutralize many law enforcement initiatives. Indeed, sensitivity to both<br />
threats and opportunities is vital to the continued functioning of criminal networks,<br />
making them highly adaptable. In this sense, criminal networks resemble agile<br />
corporations: The ability to obtain advance warning is complemented by a capacity for<br />
rapid reconfiguration of internal structures and operational activities. Because they<br />
have limited fixed assets, networks not only have limited exposure to risks but also<br />
adapt in ways that further reduce this exposure and exploit the paths of least resistance.<br />
Criminal Networks As Defensive Structures<br />
If criminal networks usually have early warning mechanisms that provide the first line<br />
of defense against law enforcement, there are also additional defensive mechanisms that<br />
can be integrated very effectively into their network structures. As I have noted<br />
elsewhere:<br />
Two-tiered networks … with both core and periphery have formidable internal defense mechanisms. While it is