Hostname: page-component-cd9895bd7-8ctnn Total loading time: 0 Render date: 2024-12-27T07:25:01.538Z Has data issue: false hasContentIssue false

Network analysis in peace and state building: revealing power elites

Published online by Cambridge University Press:  09 April 2024

Issa Luna-Pla*
Affiliation:
Institute of Latin American Studies, Columbia University, New York, NY, USA Institute of Legal Research, National Autonomous University of Mexico, Mexico City, Mexico

Abstract

This paper examines the potential role of network analysis in understanding the powerful elites that pose a significant threat to peace and state-building within post-conflict contexts. This paper makes a threefold contribution. First, it identifies a caveat in the scholarship surrounding international interventions, shedding light on shortcomings in their design and implementation strategies, and elucidating the influence these elites wield in the political and economic realms. Next, it delineates the essentials of the network analysis approach, addressing the information and data requirements and limitations inherent in its application in conflict environments. Finally, the paper provides valuable insights gleaned from the international operation in Guatemala known as the International Commission for Impunity in Guatemala, which specifically targeted illicit networks. The argument asserts that network analysis functions as a dual-purpose tool—serving as both a descriptive instrument to reveal, identify, and address the root causes of conflict and a predictive tool to enhance peace agreement implementation and improve decision-making. Simultaneously, it underscores the challenge of data analysis and translating network interventions into tangible real-life consequences for long-lasting results.

Type
Research Article
Creative Commons
Creative Common License - CCCreative Common License - BY
This is an Open Access article, distributed under the terms of the Creative Commons Attribution licence (http://creativecommons.org/licenses/by/4.0), which permits unrestricted re-use, distribution and reproduction, provided the original article is properly cited.
Copyright
© The Author(s), 2024. Published by Cambridge University Press

Policy Significance Statement

This paper highlights the potential of network analysis in helping to identify, forecast, and address conflict, which enhances peace agreement implementation and improves the evaluation of peacebuilding activities. The study underscores the importance of data-driven approaches in fostering stability and peace, drawing insights from network findings in the International Commission for Impunity in Guatemala case. The insights of this paper can be useful for decision-making processes in diplomatic missions and operations, for the United Nations, the Security Council panel of experts, and for monitoring nonprofit organizations and contributing to the metrics for conflict prevention early warning systems.

1. Introduction

Domestic and transnational criminal networks and influential organizations are usually the underlying root cause of conflict, and pose a significant threat to peace, the rule of law, human rights protection, and government institutions’ stability (UN, 2005; Andersen, Reference Andersen and Dziedzic2016). Dominant factions within conflicts often further their objectives through corruption and, on occasion, violence (MacLachlan, Reference MacLachlan2017). These groups operate on specific interests upheld by networks of individuals who exploit the prevailing context. Sometimes, this self-serving exploitation results in a vicious cycle that intensifies the conflict. This dynamic is particularly heightened in societies enduring prolonged civil wars, where the prevailing norms and regulations have emerged amidst the ongoing conflict itself (Collier and Hoeffler, Reference Collier and Hoeffler2004; Andersen, Reference Andersen and Dziedzic2016; Schwartz, Reference Schwartz2020). Legal and illegal activities intertwine within these intricate networks in such environments, involving entities that gradually amass control and power over time. Power structures exert significant influence over the trajectory of peacebuilding and state-building processes during and after conflicts. In this study, we refer to these structures as the influential elites capable of shaping peace outcomes, regardless of their engagement in criminal or illicit activities and their association with the public or private sector, be it formal or informal. In order to explore elite dynamics, it is critical to use information and data analytics, particularly network analysis, as a powerful tool for uncovering relationships and anticipating outcomes. The network analysis approach offers valuable insights that can guide efforts to prevent and combat crime and corruption through the definition, measurement, modeling, and control of various analytics (Sparrow, Reference Sparrow1991; Framis, Reference Framis and Morselli2014; Carrington, Reference Carrington, Scott and Carrington2016; Luna-Pla and Nicolás-Carlock, Reference Luna-Pla and Nicolás-Carlock2020). It can be applied to situations where power structures resort to violence to maintain political and territorial control, redirect public funds for electoral campaigns, manipulate the judiciary, and facilitate illicit activities such as money laundering and tax evasion. Under such circumstances, where access to reliable evidence-based information may be compromised or masked, the significance of network analysis and the application of statistical models becomes paramount. The paper makes a threefold contribution to peace and state-building scholarship and practice. Firstly, it underscores the shortcomings in the existing peace and state-building literature, emphasizing the imperative to gain a more nuanced understanding of the role played by influential elites in conflicts or post-conflict environments. Secondly, it explores the network analysis approach’s essentials, addressing the information and data requirements and limitations inherent in its application in such environments. Thirdly, the paper provides valuable insights drawn from an international operation led by the International Commission for Impunity in Guatemala (CICIG), which was uniquely designed to target illicit networks through the judicial prosecution of crimes and corruption between the years 2007 and 2019, while simultaneously aiming for state-building objectives (Waxenecker, Reference Waxenecker2019; Hallock, Reference Hallock and Pozsgai-Alvarez2021; Zamudio-González, Reference Zamudio-González and Pozsgai-Alvarez2021; Trejo and Nieto-Matiz, Reference Trejo and Nieto-Matiz2022). Approaching the practical realm, this case’s insights show the potential of initiating discussions on translating network interventions into tangible applications in areas such as judicial prosecution, prevention, and the restructuring of economic incentives. <return>

2. Promoting peace and state-building by targeting influential elites with data

The field of peace and state-building scholarship is increasingly recognizing a challenge in understanding influential groups and powerful networks, particularly at the intersections of criminals, governments, and security forces. Concurrently, the practical domains of diplomacy and policymaking —where conventional elements such as information, transparency, and, more recently, big data and statistics are utilized in the design and orchestration of peace operations- are calling for sophistication of tools. This shift involves the integration of analytical methods and multidisciplinary expertise. It is within this momentum, the rising demand for innovative responses, and the necessity for assessment tools for international intervention outcomes that network analysis becomes feasible to showcase its potential. This is particularly true when complemented by other methods that leverage qualitative valuable insights in tandem.

2.1. Background on the use of information and data

International institutions have a well-documented history of utilizing information transparency strategies to shape informed security policies, thereby fostering peace and aiding state-building efforts. When used properly in certain contexts, transparency can mitigate tensions, resolve crises, and empower peacekeepers in achieving their objectives (Lindley, Reference Lindley2007). During cooperation and bargaining operations or missions, these institutions have employed information strategies, turning to a variety of mechanisms to both acquire and capitalize on state-level and global information. These mechanisms include but are not limited to exchanging insights at conferences, working groups, and summits, leading informational campaigns, and sharing intelligence among the conflicted sides.

Big data has revolutionized the approach to information usage in the sphere of international conflict resolution, aiding societies in comprehending and prepping for humanitarian crises and conflicts (Letouzé et al., Reference Letouzé, Meier and Vinck2013; Meier, Reference Meier2015). The vast array of information, including voice recordings, videos, and data from commercial satellites and sensor networks, allows international institutions and decision-makers working towards peace objectives to custom-fit decisions and responses (Letouzé et al., Reference Letouzé, Meier and Vinck2013; Pencheva et al., Reference Pencheva, Esteve and Mikhaylov2018; Wählisch, Reference Wählisch2020). Moreover, advancements in digital media technologies, artificial intelligence, and machine learning tools also have played a critical role in understanding conflicts, facilitating communication with affected populations, and the advancement of sustainable development goals (Hassani et al., Reference Hassani, Huang, MacFeely and Entezarian2021). Natural language processing, in particular, has proved to be a potent tool for conflict mediators and peacebuilders. It empowers them to engage in real-time, large-scale dialogues with the public, interact digitally in various languages, filter misinformation, and monitor political stability trajectories, thereby enabling early warning systems (Donnay, Reference Donnay2017; Hassani et al., Reference Hassani, Huang, MacFeely and Entezarian2021; Alavi et al., Reference Alavi, Wählisch, Irwin and Konya2022).

Data analytics represents a new frontier for peace and state-building operations, aiming to infuse data with the precision that aids in identifying relationships that perpetuate conflict and in implementing predictive measures for conflict prevention and peace resolution enhancement. These analytical tools, previously applied in fields like crime and conflict forecasting, intelligence activities, and fraud detection (Sparrow, Reference Sparrow1991; O’Brien, Reference O’Brien2010; Perry et al., Reference Perry2013; Baesens and Veronique Van Vlasselaer, Reference Baesens and Veronique Van Vlasselaer2015), can serve as accessible resources for international institutions, broadening their impact and efficacy in targeting criminal networks and achieving realistic results.

2.2. The need for analytical tools to understand conflict

When countries underpass violent conflicts, wars, and internal political and security turmoil, the peace processes and the reconstruction of governmental institutions are afflicted by the elites’ abuse of power in control of territories and of political power. Corruption, as a generalization of licit or illicit activities, has been extensively researched as a contributing factor to the deterioration of state institutions and political unrest (Le Billion, Reference Le Billion2005), with significant implications such as fueling conflict and violence (Shleifer and Vishny, Reference Shleifer and Vishny1993), undermining electoral systems, eroding the rule of law institutions and culture, and colluding with security and enforcement forces (UN, 2005; MacLachlan, Reference MacLachlan2017; WB, 2020). Such environments severely impact economic development; they create an uneven playing field that strengthens powerful elites, erodes trust in public institutions, and diminishes social cohesion. Because powerful elites operate unchecked and often serve as gatekeepers, tackling corruption networks in criminal environments often uncovers the root causes of conflicts and provides means to identify, target, and address these complex illicit dynamics, such as the collusion between powerful criminal actors and state institutions and individuals in opaque financial systems (Trejo and Nieto-Matiz, Reference Trejo and Nieto-Matiz2022).

However, it has often been claimed that international efforts fail to acknowledge the interests of entrenched political and powerful actors who benefit from a weakened state during or after conflict, and even donors who prioritize strengthening the criminal justice system may overlook the intricate social dynamics that underpin corruption (Gavigan, Reference Gavigan, Cockayne and Lupel2011; Heathershaw, Reference Heathershaw and de Guevara2012; Simon, Reference Simon2023). Contemporary critiques of peace and state-building operations have highlighted the lack of analytical tools available to understand the origins of conflict and political unrest, as well as the dynamics of criminal and illicit networks (Holt and Bouch, Reference Holt and Bouch2009; Cockayne and Lupel, Reference Cockayne, Lupel, Cockayne and Lupel2011), which can have ambiguous consequences for the sustainable transformation of political, economic, and post-war societies (Berdal and Davies, Reference Berdal, Davies, Berdal and Zaum2013).

Assessing and predicting conflict and political stability for peace prevention is a growing theme in international public policy and the global debate of conflict forecasting (O’Brien, Reference O’Brien2010; Gnanguenon, Reference Gnanguenon2021; Rød et al., Reference Rød, Gåsste and Hegre2023). The existing work claims that an analytical approach is crucial for predicting civil war occurrences and events that can exacerbate or mitigate political crises and the configuration of factors driving instability. It aims to identify patterns in the complex interactions among players, which is essential knowledge for achieving peacekeeping objectives (Lustick et al., Reference Lustick, Miodownik and Eidelson2004; O’Brien, Reference O’Brien2010; Ward et al., Reference Ward, Greenhill and Bakke2010; Donnay, Reference Donnay2017) and for the design of sustainable peace mandates (Wählisch, Reference Wählisch2020). While the analysis of social interactions has been integrated into various empirical methods and conflict modeling networks, including agent-based models, natural experiments, and diverse analytical instruments for explicating and predicting conflict (Collier and Hoeffler, Reference Collier and Hoeffler2004; Lustick et al., Reference Lustick, Miodownik and Eidelson2004), the application of network analysis focused on elite groups is yet to be utilized as a parameter in early warning systems for quantitatively predicting conflict. Such systems traditionally rely on predictive maps and rankings (O’Brien, Reference O’Brien2010; Rød et al., Reference Rød, Gåsste and Hegre2023). The need for frontier research to look at underlying power structures has also been highlighted, particularly in hybrid international missions (Gavigan, Reference Gavigan, Cockayne and Lupel2011; Hallock, Reference Hallock and Pozsgai-Alvarez2021; Zamudio-González, Reference Zamudio-González and Pozsgai-Alvarez2021), such as Guatemala’s CICIG. Hence, it is crucial to analyze the influence of international interventions on elites and powerful networks in conflict zones, providing findings and insights for the design and implementation of mission agreements.

2.3. Advancing peace and state-building with network analysis

Contemporary state-building international operations vary from country to country and from conflict type but often include judicial reforms, commitments to strengthening political structures, assistance in prosecution and law enforcement and anti-corruption strategies, seeking long-lasting stability and peace (Spector, Reference Spector2011; Cheng and Zaum, Reference Cheng, Zaum, Cheng and Zaum2012) and decrease of criminality in the host state (Holt and Bouch, Reference Holt and Bouch2009, Trejo and Nieto-Matiz, Reference Trejo and Nieto-Matiz2022). An international intervention aimed at dismantling illicit networks becomes warranted when years of conflict have eroded state institutions, resulting in resource scarcity, tax collection deficiencies, deep-seated involvement of organized crime syndicates in governance, and participation of violent gangs, groups, or cartels in illicit activities. These factors collectively undermine public confidence in government, and compromise the authority and legitimacy of the state (Brands, Reference Brands2010; Spector, Reference Spector2011; Zamudio-González, Reference Zamudio-González and Pozsgai-Alvarez2021; Trejo and Nieto-Matiz, Reference Trejo and Nieto-Matiz2022). To address these sophisticated operations, network analysis can be used to evaluate potential outcomes based on the anticipated transformation and crisis management of the environment from one riddled with crime and violence to a more secure and non-criminal landscape (Masys, Reference Masys and Masys2014).

The use of data analyzed with computing seeks to add precision and breadth to the possibilities of definition, measurement, and quantitative control from the understanding of the systemic phenomenon in social problems, crime, and corruption (Framis, Reference Framis and Morselli2014; Barabási, Reference Barabási2016; Luna-Pla and Nicolás-Carlock, Reference Luna-Pla and Nicolás-Carlock2020). Several studies have used this approach to detect and understand terrorist networks according to each network structure and function (Morselli et al., Reference Morselli, Giguère and Petit2007; Leuprecht and Hall, Reference Leuprecht, Hall and Masys2014; Campedelli et al., Reference Campedelli, Cruickshank and Carley2019). When used in criminology and intelligence (Strang, Reference Strang and Masys2014; Cunningham et al., Reference Cunningham, Everton and Murphy2016; Tayebi and Glässer, Reference Tayebi and Glässer2016; Burcher and Whelan, Reference Burcher and Whelan2018), this approach illustrates links and graph criminal relationships between people, which contributes to formulating research hypotheses and policing effectively (Sparrow, Reference Sparrow1991; Carrington, Reference Carrington, Scott and Carrington2016; Tayebi and Glässer, Reference Tayebi and Glässer2016; Burcher and Whelan, Reference Burcher and Whelan2018). The approach offers detailed insights into the intricate workings of criminal and corrupt activities while also addressing critical criminological questions, such as linking activity to individuals when the relevant information is available (Felson et al., Reference Felson2006). Recently, this methodology has effectively unveiled interconnections among criminal acts within a community of offenders. Establishing links between crimes like corruption, drug-related offenses, and street-level criminality, substantiates the frequent association of corruption with other criminal activities (Heiler et al., Reference Heiler, Pham, Korbel, Wachs and Thurner2023; Bright et al., Reference Bright, Lerner, Putra Sadewo and Whelan2024).

The quantitative analysis of networks in cases of past or ongoing conflicts has the potential to generate metrics to identify and measure the structure, levels of the organization, dynamics of the network, roles within it, concentration, self-organization, and links of what is being analyzed (Barabási, Reference Barabási2016; Marin and Wellman, Reference Marin, Wellman, Scott and Carrington2016). However, the formulation of metrics, understanding of power distribution dynamics, and devising progress indicators within international collaborative endeavors must align with the values and principles outlined in intervention agreements. Strategic and operational guidance remains crucial in this pursuit (Gavigan, Reference Gavigan, Cockayne and Lupel2011; Heathershaw, Reference Heathershaw and de Guevara2012).

3. Data requirements and network analysis in conflict and violent contexts

This section describes the essential principles of network analysis while introducing the constraints and objectives inherent to this analytical tool. It addresses the limitations of the analysis, the intended objectives, and the intricate challenges surrounding information and data collection, particularly within conflict zones, encompassing both formal and informal relationships. The objectives of employing network analysis are intricately linked to the chosen analytical strategy, data prerequisites, and the hurdles and constraints concerning data and information gathering, refinement, and maintenance. These factors significantly impact the translation of theoretical insights into practical, real-world solutions, and policy strategies. Therefore, a comprehensive grasp of the intended goals becomes imperative in devising an effective network analysis approach and managing the complexities associated with data interpretation and findings.

3.1. Fundamentals of network analysis in addressing social issues

Network analysis is essentially a structured method that employs principles from statistical physics and computer science to model and interpret diverse relationships within various datasets. These quantitative tools serve to describe, quantify, predict, model, map, and reproduce specific environments, sometimes reflecting real-life relationships and activities. Initially utilized to explore natural and physical phenomena, this approach has recently expanded its scope to encompass social issues and humanities, driven by advancements in computing sciences, knowledge sharing, and cross-disciplinary problem-solving (Ball, Reference Ball2003; Caldarelli et al., Reference Caldarelli, Wolf and Moreno2018; Gershenson et al., Reference Gershenson, Siegenfeld and Bar-Yam2020).

Phenomena like violent conflict, corruption, and crime often stem from socio-political and economic systems that can be conceptualized as networks comprising individuals, institutions, organizations, and activities, as demonstrated in network analysis (Morselli et al., Reference Morselli, Giguère and Petit2007; DellaPosta, Reference DellaPosta2017; Ribeiro et al., Reference Ribeiro, Alves, Martins, Lenzi and Perc2018). Understanding the interrelations within these environments is complex due to their temporal evolution and the inability to explain behavior solely by isolated components (Ball, Reference Ball2003; De Domenico et al., Reference De Domenico, Brockmann, Camargo, Gershenson, Goldsmith, Jeschonnek, Kay, Nichele, Nicolás, Schmickl, Stella, Brandoff, Martínez Salinas and Sayama2019). Network analysis serves as a key tool to comprehend such behavior, representing players as nodes and their relationships as edges. For instance, in a social network, an edge might signify a friendship, a familial tie, or another form of social interaction (Scott, Reference Scott2017). Nodes can also represent diverse relationships within a bipartite network, such as an individual connected to a business organization as a stakeholder, and that business linked to a government institution through a contract (Wachs et al., Reference Wachs, Fazekas and Kertész2020; Nicolás-Carlock and Luna-Pla, Reference Nicolás-Carlock and Luna-Pla2023). These interconnections among nodes can take various forms and quantities, from the formation or absence of triads to networks consolidating into a single large component, as exemplified in Figure 1.

Figure 1. Examples of configuration in a network.

Network analysis extends beyond merely linking nodes and creating graphical representations of interconnected actors, entities, or activities within conflict-laden environments. It harnesses a spectrum of tools to evaluate the network’s density, indicating the overall linkage among nodes, and its robustness against interventions and disruptions (Barabási, Reference Barabási2016), as it possesses the capability to reorganize itself (Duijn et al., Reference Duijn, Kashirin and Sloot2014; D’Orsogna and Perc, Reference D’Orsogna and Perc2015). The dynamics within networks, whether human or inanimate entities, and their nonlinear structural evolution under specific conditions render the system highly unpredictable, and challenging to control (Bar-Yam et al., Reference Bar-Yam, McKay and Christian1998).

Metrics examining the structure and dynamics of corruption and criminal networks have provided insights into various forms, including hierarchical or familial networks, organized crime, diverse illicit markets (Morselli et al., Reference Morselli, Giguère and Petit2007; Framis, Reference Framis and Morselli2014; DellaPosta, Reference DellaPosta2017), and even conspiracies and favoritism (Nicolás-Carlok and Luna-Pla, Reference Nicolás-Carlok and Luna-Pla2021; Falcón-Cortés et al., Reference Falcón-Cortés, Aldana and Larralde2022). The structure and dynamics of these networks evolve in response to changes and regulations within their environment, shaped by a multitude of factors and cohesive actors (Barabási, Reference Barabási2016; Carrington, Reference Carrington, Scott and Carrington2016; Campedelli et al., Reference Campedelli, Cruickshank and Carley2019; Luna-Pla and Nicolás-Carlock, Reference Luna-Pla and Nicolás-Carlock2020). The goal of network analysis is to grasp the properties of these systems, the collaborative behavior of interconnected components, and the implications of behavior on a macro scale. This understanding is crucial to prevent misinterpretation of the causes of phenomena (Bar-Yam et al., Reference Bar-Yam, McKay and Christian1998; Gershenson et al., Reference Gershenson, Siegenfeld and Bar-Yam2020), significantly impacting strategies developed to intervene in these networks, whether in a controlled laboratory setting or real-life intelligence operations.

In a network analytical model, signs of network destabilization may manifest as a decline in the network’s information flow rate, reduced operational efficiency, or a significant slowdown in decision-making processes (Duijn et al., Reference Duijn, Kashirin and Sloot2014). Similarly, disrupting a network involves identifying and eliminating specific nodes or edges that, upon removal, result in the least cohesive network, effectively sabotaging it or isolating certain nodes (Tayebi and Glässer, Reference Tayebi and Glässer2016). For example, findings from studies on criminal interventions suggest that imprisoning high-profile criminals and targeting specific nodes and edges can profoundly influence the network’s reorganization (D’Orsogna and Perc, Reference D’Orsogna and Perc2015; da Cunha and Gonçalves, Reference da Cunha and Gonçalves2018), potentially bolstering illicit activities and escalating violence when disrupting clusters (Contreras Velasco, Reference Contreras Velasco2023).

It’s important to note that networks often display substantial resilience against targeted disruption strategies, sometimes transforming into even more robust and resilient configurations following perturbations (Framis, Reference Framis and Morselli2014; D’Orsogna and Perc, Reference D’Orsogna and Perc2015). Consequently, evidence indicates that interventions are more likely to succeed when executed during the initial stages of network growth before it has had the chance to organize or reorganize for maximum resilience (Duijn et al., Reference Duijn, Kashirin and Sloot2014).

Over an extended period, criminologists have utilized analytics to study network behavior, guiding decision-making, targeting specific nodes, predicting future occurrences, and aiding in prevention—particularly advantageous in law enforcement (Sparrow, Reference Sparrow1991; Carrington, Reference Carrington, Scott and Carrington2016). Previous analyses have revealed that network intervention extends beyond punitive actions, encompassing the disassembly or disruption of the network while simultaneously addressing underlying economic root causes, preventing recurrence, and altering the environmental conditions contributing to its formation. This process might involve rehabilitating individual behavioral patterns or building capacities and economic conditions to counteract systemic illicit practices (D’Orsogna and Perc, Reference D’Orsogna and Perc2015; da Cunha and Gonçalves, Reference da Cunha and Gonçalves2018; Prieto-Curiel et al., Reference Prieto-Curiel, Campedelli and Hope2023). Furthermore, a deep understanding of complex financial and social motivations can facilitate severing ties between corrupt entities and the ultimate beneficiaries of such illicit agreements (Costa et al., Reference Costa, Baez-Camargo, Kassa and Lugolobi2021; Diepenmaat, Reference Diepenmaat, Granados and Nicolás-Carlok2021). Such insights could significantly enhance conflict forecasting and assessment endeavors.

3.2. Optimal data types for relational analysis

Finding data conducive to the development of network analysis in criminal and conflict contexts hinges on aligning goals, aims, or hypotheses. For instance, this quest could involve a forensic investigation targeting specific individuals, deciphering relationships between distinct groups, or uncovering connections linking criminal activities and governmental bodies. Whether aiming to understand historical events or current undertakings, the data essential for analysis seldom resides within a single accessible source, encompassing all necessary elements for drawing conclusions.

As a result, crafting datasets typically involves amalgamating information from diverse sources to create comprehensive sets for descriptive and predictive network analysis (Baesens and Veronique Van Vlasselaer, Reference Baesens and Veronique Van Vlasselaer2015). This process contends with the unstructured nature of the data, which refers to vast amounts of information lacking predefined patterns, thereby posing challenges in search and analysis. Unstructured data stems from various sources and file formats, including social media, documents, communication transcripts, and technical reports. The task of constructing datasets from unstructured data poses several hurdles, primarily the need for specialized tools to standardize and organize it.

Amidst the realm of unstructured data, significant insights can be derived from publicly available sources like news stories, technical reports from institutions or non-profit organizations (O’Brien, Reference O’Brien2010), and investigative journalism revealing corruption scandals (Ribeiro et al., Reference Ribeiro, Alves, Martins, Lenzi and Perc2018; Luna-Pla and Nicolás-Carlock, Reference Luna-Pla and Nicolás-Carlock2020). Additionally, governmental sources like judicial case files, evidence, and open data platforms offer pertinent information, including historical crime records from security and police authorities (Perry et al., Reference Perry2013), unveiling the complexities within elite networks linked to illicit activity.

Economic data is also crucial to understanding incentives and reorganizing dynamics within networks in a larger financial context. Tracking individuals’ economic wealth and using transactional data (when available) becomes immensely valuable. This includes information related to consumer practices, such as the illicit enrichment of elites. Such data allows for clustering and weighting relationships within the network, enabling analysis of variables like recency, frequency, and monetary amounts. It plays a vital role in identifying and gathering evidence for cases involving money laundering, fraud, and embezzlement, all of which contribute to conflicts, violence, and organized crime through systemic corruption (Baesens and Veronique Van Vlasselaer, Reference Baesens and Veronique Van Vlasselaer2015).

Economic data is closely linked to contractual information, which encompasses contracts, bank account records, memberships or subscriptions, and business bylaws (some of which are publicly available depending on the jurisdiction). This data forms the basis for identifying various variables, including relationships between buyers and suppliers, instances of illicit enrichment and embezzlement, connections between governments and networks engaged in illicit activities or power control, individuals occupying multiple roles within these networks, instances of tax avoidance, and company misuse (Baesens and Veronique Van Vlasselaer, Reference Baesens and Veronique Van Vlasselaer2015; Luna-Pla and Nicolás-Carlock, Reference Luna-Pla and Nicolás-Carlock2020; Wachs et al., Reference Wachs, Fazekas and Kertész2020).

Another category of data, frequently utilized in intelligence strategies and discoverable through investigative efforts, pertains to communications found in social networks, phone records, and emails. When these communications are part of private registries, they remain confidential to the public, accessible only by law enforcement authorities during investigation processes. However, they might also surface in disclosed records, such as trials or through information requests to governments. While economic and communication information is typically confidential to journalists or nongovernmental organizations, ethical investigations conducted by government authorities can uncover crucial links between individuals, their roles, and their influence on decision-making processes within various operations.

3.3. Limitations in analytical approaches for powerful networks

Learning from criminal network studies, it is possible to identify certain considerations that can bias network analysis results and pose substantial challenges for both scientists and technicians, whether they’re implementing these methods within or outside governmental spheres. For anyone researching powerful networks and performing network analysis for practical purposes presents a challenge owing to the inherent unpredictability of situations and behaviors. Consequently, even the most advanced models encounter difficulty in forecasting changes in levels of political violence and the emergence of new security outbreaks in regions historically known for peace (Tayebi and Glässer, Reference Tayebi and Glässer2016; Rød et al., Reference Rød, Gåsste and Hegre2023).

From a network perspective, research has to take into account that illicit activities mutate over time as players adapt and learn from mistakes (Sparrow, Reference Sparrow1991; Grabosky and Duffield, Reference Grabosky and Duffield2001; Simonofski et al., Reference Simonofski, Tombal, De Terwangne, Willem, Frenay and Janssen2022), networks’ composition and dynamics evolve, individuals and agencies exhibit volatility or camouflage, and self-organization and emergent behavior within the network make it a complex phenomenon. Moreover, in conflict-ridden and criminally violent contexts, networks arise from the interconnectedness of illicit events, activities, individuals, and groups, which gradually develop patterns over time (von Lampe et al., Reference von Lampe and van Duyne2006; McGloin and Kirk, Reference McGloin, Kirk, Piquero and Weisburd2010), and because of the links with public or private organizations to conceal their activities, maintain control over the territory, and protect their core members (Gambetta, Reference Gambetta1993; Morselli et al., Reference Morselli, Giguère and Petit2007).

In addition, it is worth recognizing that information related to criminal activities is often obscured by the involved actors (Zamudio-González, Reference Zamudio-González and Pozsgai-Alvarez2021). Information in judicial cases can be incomplete or may leave loose ends (Sparrow, Reference Sparrow1991; Jones et al., Reference Jones, Dittmann, Wu and Reese2020), and it is biased by the investigative focus (Jones et al., Reference Jones, Dittmann, Wu and Reese2020). The accuracy of information is also affected by limitations such as the inability to include complete results from interrogations, informants, wiretapping, and financial investigations. Due diligence issues can arise in fraud detection procedures (Baesens and Veronique Van Vlasselaer, Reference Baesens and Veronique Van Vlasselaer2015; Pencheva et al., Reference Pencheva, Esteve and Mikhaylov2018; Tombal and Simonofski, Reference Tombal and Simonofski2021), as well as in investigations conducted by criminal prosecutors, that can distort the real facts. Moreover, corruption activities are often underrepresented in data due to logical and procedural challenges, as in most countries, corruption is harder to prove than a criminal offense. Likewise, security and conflict-related information often remain classified and challenging for non-governmental entities to access in numerous countries (Gnanguenon, Reference Gnanguenon2021). Additionally, certain actions go undocumented when they are arbitrary and lack accountability.

Conflict-affected governments are typically weak, plagued by high levels of corruption within the judiciary and police forces, and have constrained budgets, limited credibility among citizens, and unclear mandates. These contextual factors contribute to a lack of reliable data and accurate information for peacebuilding institutions engaged in analytics (Letouzé et al., Reference Letouzé, Meier and Vinck2013). Furthermore, the available information often overlaps or contradicts itself, and there are political barriers to information transparency (Lindley, Reference Lindley2007). Government agencies in conflict-affected states may also produce disconnected and mismatched information, further complicating the analysis process (Lindley, Reference Lindley2007).

As an empirical study, understanding criminal network behavior commonly suffers from selection bias, lacking data on undetected or unresolved criminal cases, thereby failing to capture the complete spectrum of network dynamics or covert operations (Morselli et al., Reference Morselli, Giguère and Petit2007; Heiler et al., Reference Heiler, Pham, Korbel, Wachs and Thurner2023). Indeed, the analysis’s breadth is constrained by available data, offering only partial glimpses or fragmented depictions that fail to encapsulate the entirety of the conflict landscape. Hence, employing these tools necessitates complementing them with traditional policy and contextual analysis methods, alongside invaluable insights from individuals possessing firsthand experience and on-ground knowledge of the situation.

In uncontrolled environments requiring intervention through peace and state-building policies, the verifiability of information becomes crucial. Analytical tools must effectively discern signals from the noise of information (Strang, Reference Strang and Masys2014), particularly as data often stems from informal sources, whistleblowers, informants, or witnesses. Nonetheless, it’s vital to contextualize these outcomes within each specific case, as their applicability might be constrained by contextual elements.

3.4. Ethics, misuse, and privacy concerns in network analysis

In conflict or post-conflict scenarios, ethical considerations and privacy concerns become critical when handling unstructured data related to social issues and political instability, especially for conflict prevention purposes. Curating data demands adherence to regulatory standards, ensuring compliance with transparency and information access regulations.

On the one hand, guaranteeing data quality involves verifying its availability, reliability, usability, and relevance for network analysis (Cai and Zhu, Reference Cai and Zhu2015). Neglecting this process can pose the risk of producing biased narratives, leading to inaccurate outcomes (Carrington, Reference Carrington, Scott and Carrington2016) and misguided decision-making misaligned with unverified data. On the other, the confidentiality of data is covered by country legislation on data protection and privacy, besides the human rights international law protection. This poses restrictions from the process of collection of data, to management and publishing, that apply to journalist groups, non-governmental organizations, and scholars who rely on publicly accessible information. Alternatively, researchers can use relational data obtained from public sources, such as career resumes, criminal records, and social media interactions, which can also reveal significant familial and friendship connections (Perry et al., Reference Perry2013; Scott, Reference Scott2017).

In some instances, anonymization might be essential when publicly disclosing data to protect individuals’ privacy or uphold confidentiality in legal matters. This ensures the implementation of privacy-by-design practices to secure data. Beyond privacy concerns, using criminal records and data requires a profound comprehension of individuals’ legal statuses. Upholding the presumption of innocence for individuals, whether they are undergoing a judicial trial or not, demands considering the circumstances outlined in the original information source to prevent violating rights to reputation and honor.

Maintaining ethical standards in data science tools is crucial, necessitating the mitigation of risks related to data publication and reuse (Cai and Zhu, Reference Cai and Zhu2015; Hosseini et al., Reference Hosseini, Wieczorek and Gordijn2022). For instance, when governments or powerful entities utilize analytical tools and AI, there’s a risk of leveraging their authority to control data repositories. This can lead to witch hunts, prosecution of individuals or judges, or exertion of impunity and political control. Conversely, in ideal governmental practices, intelligence and law enforcement thoroughly investigate network activities with available data, as demonstrated in studies on criminal gangs (Morselli et al., Reference Morselli, Giguère and Petit2007; Papacristos and Smith, Reference Papacristos, Smith and Morselli2014; DellaPosta, Reference DellaPosta2017). However, these analytical tools could be misused by illicit networks or conflicting groups, underscoring the necessity for datasets designed with a “do no harm” principle. Providing data context and specifying the intended usage goals becomes imperative in preventing potential misuse (Letouzé et al., Reference Letouzé, Meier and Vinck2013; Pencheva et al., Reference Pencheva, Esteve and Mikhaylov2018; Wählisch, Reference Wählisch2020; Simonofski et al., Reference Simonofski, Tombal, De Terwangne, Willem, Frenay and Janssen2022).

4. The case of Guatemala’s CICIG international operation

The establishment of the International Commission against Impunity in Guatemala (CICIG) is intrinsically tied to Guatemala’s tumultuous history of over 40 years of internal armed conflict. The aftermath of this complex conflict witnessed numerous efforts to restore peace and disarm groups. However, it also left behind a legacy of predatory military elites with a deep-rooted culture of corruption and a history of exerting control through force (Brands, Reference Brands2010; Waxenecker, Reference Waxenecker2019). These elites were entwined with economic and political networks that eroded and applied influence over state institutions, fostering an environment ripe with a wide range of illicit activities (Hudson and Taylor, Reference Hudson and Taylor2010; Gavigan, Reference Gavigan, Cockayne and Lupel2011; Spector, Reference Spector2011). Furthermore, illegal security groups and clandestine organizations posed significant threats to human rights through their criminal activities and ability to act with impunity. They undermined the state’s capacity to ensure citizen safety, protect human rights, and deliver justice to people (UN, 2006).

The case of Guatemala poses a significant contribution to highlighting the potential of network analysis in conflict. It’s a unique scenario where the mandate of the operation specifically aimed to combat corruption and impunity by targeting illicit networks, all while striving for state-building goals. The international mission adopted a strategy involving legal reforms, the replacement of judges, prosecutors, and law enforcement officials with individuals unaffiliated with these illicit networks, and the prosecution of influential figures—politicians, business leaders, political operatives, and gang heads—associated with these networks to dismantle them. However, despite the precision of the mandate’s approach, the effectiveness of the tools and strategies employed, as well as the assessment of results, were highly contested due to the resurgence of powerful networks reclaiming control within governmental structures. Moreover, following the closure of the International Commission Against Impunity in Guatemala (CICIG), the examination of networks and contextual findings has revealed insights into the interrelationships among elites, their functions within these networks, and the difficulties encountered in executing prosecution strategies in the absence of network analysis tools. These insights underscore the importance of a data-driven approach in international operations and prompt further discussion on additional challenges emerging after the application of analytical tools in conflict environments.

4.1. CICIG’s mandate and efforts targeting illicit elites

In 2003, the State of Guatemala sought assistance from the United Nations, leading to the establishment of the International Commission against Impunity (CICIG) through an Agreement between the United Nations and the State of Guatemala. This agreement was subsequently approved by Guatemala’s Congress of the Republic, and the CICIG commenced its operations in 2007 (UN, 2006). At that time, organized crime and cartels had gained effective control over six out of the country’s twenty-two states and wielded significant power in three others. Violence was rampant, with murder rates escalating by over 120 percent from 1999 to 2006, marking the highest murder rate in the region spanning from Mexico to Colombia (Brands, Reference Brands2010, Cruz, Reference Cruz2022). These factors were compounded by insufficient tax revenue, escalating levels of extreme poverty, and growing inequality among the population.

In Guatemala, the peace agreements of 1996 recognized the imperative of rebuilding institutions and ensuring citizen participation. Consequently, the CICIG agreement aimed to strengthen and support the institutions of the Guatemalan state responsible for investigating and prosecuting crimes allegedly committed in connection with the activities of illegal security forces and clandestine security organizations. The CICIG’s objectives encompassed identifying the structures, activities, operational methods, and sources of financing of these organizations. It also aimed to facilitate their dismantling and prosecute individuals involved in their activities (UN, 2006).

CICIG had certain powers to carry out its mandate, which included requesting statements, documents, and cooperation from any government official or entity; to investigate any person, official, or private entity, and presenting criminal charges to Guatemala’s Public Prosecutor and joining criminal proceedings as a private prosecutor; to report to the relevant administrative authorities the names of civil servants who committed administrative offenses and to participate as a third party in resulting disciplinary proceedings; and finally, recommend public policies and legal and institutional reforms to congress (UN, 2006). Among several other instruments to strengthen CICIG, the government created a special police unit from the National Civilian Police to support the investigations of the Public Prosecutor and created legal obligations for inter-institutional collaboration among financial and oversight agencies by providing information and evidence. In addition, the government of Guatemala committed itself to undertake adequate measures to ensure the protection and security of CICIG officials, the victims, witnesses, and any other person who cooperated with CICIG (UN, 2006).

From the beginning, CICIG was not intended to be a truth commission or the sort to investigate the perpetrators of human rights violations committed during the years of conflict. Its modern mandate was carefully tailored to address the current infiltration of government institutions by clandestine criminal organizations and the operation of illegal security forces (Hudson and Taylor, Reference Hudson and Taylor2010). Drawing upon criminal insights, CICIG identified the CIACS (later called RPAI) as the root cause of impunity and created a criminal strategy to uncover the networks. It focused on the heads of the criminal gangs and the high-ranked public servants and military forces involved, finding illicit electoral financial structures, administrative corruption, customs fraud, smuggling, narcotraffic, money laundering, and judicial corruption. Within its dismantling approach, CICIG also targeted politicians and businessmen who created shell companies to massively divert public funds through procurement contracts and to hide public money (CICIG, 2019). However, its intelligence capabilities were constrained, and analytical tools, such as network analysis, were underutilized.

4.2. Guatemala’s illicit networks: gaining insights with network analysis

This case study offers an opportunity for conducting a historic network analysis due to the abundance of judicialized cases during the tenure of the CICIG. These cases provided detailed information about the individuals’ modus operandi and interrelations. A pivotal factor contributing to the substantial judicialization of criminal offenses was the work of the independent prosecutor of the CICIG, which facilitated evidence collection, categorization of criminal activities, and the pursuit of victim reparation in courts (Zamudio-González, Reference Zamudio-González and Pozsgai-Alvarez2021). In terms of network analysis, the CICIG provided relational data and activity reports from these cases. Physical evidence in corruption cases was obtained through contracts, negotiable instruments, bank transfer reports, and communications acquired through judicial orders, among other sources, to unveil falsifications or simulations of operations (CICIG, 2019).

Waxenecker’s (Reference Waxenecker2019) comprehensive network analysis, augmented by contextual insights, entailed building a dataset that interlinked individuals, businesses, and institutions. This dataset depicted a complex network of social connections and legal proceedings leading to convictions spanning from 2011 to 2015. This network was built upon eight key cases: 1) The Line; 2) Impunity Law Firm; 3) Former Deputy Gudy Rivera; 4) The Coperacha; 5) Co-option of the State; 6) TCQ; 7) Land Information Registry: a payment box; and 8) Case of Subordination of the Legislative Power to the Executive (Waxenecker, Reference Waxenecker2019). The dataset included over 300 individuals, government agencies, public officials, and business associations related to each case.

The primary finding of the network analysis modeling revealed that individuals and institutions involved in the eight cases formed a cohesive and interconnected large component within a bipartite network. The aim was to identify connections and weights within the network, highlighting individuals with high levels of connectivity to others. This network model represents the relational dynamics of power particularly during the electoral campaign and the exercise of government power by the “Patriotic Party”. The analysis of criminal investigations within this network identified key central nodes referred to as “core powers”, including former President Otto Pérez Molina, former Vice President Roxana Baldetti, and former Secretary of the President Juan Carlos Monzón. The network analysis utilized degree and intermediation indicators to explain the concentration of power. Notably, the ministers of government, defense, communications, energy, mines, and the Social Security Institute played pivotal roles in the connectivity of network components, particularly in the Coperacha case, which involved exchanges of gifts between public servants and the President (Waxenecker, Reference Waxenecker2019).

According to the case contextual investigation, the central powers (former president, ministers, individuals involved in criminal activities, and military personnel) acted through the political party “Partido Patriota” to appoint high-ranking public officials. This allowed for the diversion of public funds to enrich an elite group and establish enduring effective clusters that maintained control over procurement markets, regardless of changes in political leadership (CICIG, 2019; Waxenecker, Reference Waxenecker2019).

The second significant discovery pertains to the distribution of illicit activities within the network. By observing individuals and their actions, the analysis revealed that criminal gangs and covert military units were utilized to expand the network’s scope. These entities engaged in extrajudicial executions, human trafficking, drug trade, illicit trafficking of goods and people, and extortion (CICIG, 2019). Further research indicates that the network exploited judicial channels by leveraging judges to grant immunity to its members, while judicial candidates secured positions through favoritism, privilege, and undue influence (CICIG, 2019, Escobar, Reference Escobar and Rotberg2019; Waxenecker, Reference Waxenecker2019).

Thirdly, the analysis exposed an extensive web of businesses contracted by the government and the central power. These enterprises acted as intermediaries in specific sectors like construction, security, and port control. Key figures within these businesses were implicated in crimes such as fraud, bribery, illegal wealth accumulation, and the perpetuation of undue influence. Their economic and political clout, coupled with their close ties to the central power, allowed them to exploit mechanisms for illicit enrichment and operate with impunity (Waxenecker, Reference Waxenecker2019).

Finally, the analysis illuminated the pivotal roles and influence of military actors throughout the network’s operations. Both inside and outside formal institutional frameworks, these individuals wield substantial power within the network’s vertical and compartmentalized structure. They maintained interconnectedness with a political system heavily influenced and infiltrated by criminal and drug trafficking networks. The network exhibited a central position in political-strategic coordination and demonstrated cohesive operations within an organized framework (Waxenecker, Reference Waxenecker2019).

While Waxenecker’s network analysis is confined to national networks due to the cases data used, it’s crucial to note that Guatemala’s criminal networks primarily operated transnationally, exhibiting intricate structures across diversified illicit markets. These networks maintained connections with international drug trafficking organizations like the Zetas and Sinaloa Mexican Cartels, engaging in a spectrum of illicit activities. With substantial financial resources, they directly funded political parties, presidential campaigns, and congressional endeavors (Brands, Reference Brands2010; Gavigan, Reference Gavigan, Cockayne and Lupel2011; Waxenecker, Reference Waxenecker2019). Another influential group known as the ’poderes ocultos’ or hidden powers comprised individuals leveraging their positions and connections across public and private sectors (Mattiache and Pappier, Reference Mattiache and Pappier2022). Moreover, street gangs like the Maras, extending their reach into other Central American countries, were involved in extortion, robbery, small-scale drug trafficking, homicides, and abductions (Brands, Reference Brands2010; Cruz, Reference Cruz2022).

4.3. Discussing CICIG’s impact in dismantling illicit networks

In 2019, Guatemala’s decision not to renew the United Nations agreement marked the conclusion of CICIG, terminating its operations shortly after launching an investigation into economic crimes implicating President Jimmy Morales’ family, alongside military officials and politicians tied to past war crimes (WOLA, 2022). Subsequently, influential figures linked to existing illicit networks exposed by CICIG assumed control of the government and the Attorney General’s office. Their actions targeted journalists, civil society leaders, judges, and public servants involved in prosecuting individuals within these networks. This upheaval forced judges and former prosecutors to flee, while others faced unjust imprisonment on fabricated charges (IACHR, 2021; Mattiache and Pappier, Reference Mattiache and Pappier2022; WOLA, 2022). Paradoxically, key figures from these networks were absolved of charges.

The anti-corruption accords in Guatemala represented a pivotal moment in the nation’s history of international agreements. Nevertheless, CICIG’s approach, while occasionally effective in judicial proceedings (Call and Hallock, Reference Call and Hallock2020), primarily relied on criminal prosecutions and legal reforms to dismantle illicit networks. This strategy exposed the power structures within Guatemala, shedding light on the dynamics between the military, public sectors, courts, congress, political parties, and organized crime (Beltrán, Reference Beltrán, Rosen and Kassab2020; Call, Reference Call and Pozsgai-Alvarez2021). Collaborating with the attorney general’s office, CICIG achieved an impressive 85 percent efficiency in charging and convicting over 400 individuals and entities (CICIG, 2019; WOLA, 2022).

However, while this punitive strategy might have weakened the networks’ economic and political influence for some time, the lack of robust analytical tools made it challenging to gauge its long-term impact and the imbalances generated within these intricately interconnected networks. Attempting to prosecute the numerous defendants from the networks overwhelmed the judicial system and penitentiary institutions, leading to case dismissals and burdening judges (Zamora Palma, Reference Zamora Palma2023). Consequently, crucial aspects like enhancing judicial independence, building institutional capacities, enforcing economic sanctions, and recovering illicit assets might have been sidelined. Moreover, the abrupt termination of the agreement and the expulsion of trained officers hindered the transfer of critical knowledge, as CICIG was designed for state-building rather than permanent intervention (Simon, Reference Simon2023).

The initial UN-Guatemala agreement establishing CICIG recommended preventive measures against the resurgence of illicit networks. Employing network analysis could have been instrumental in pinpointing specific syndicates and tailoring measures based on individual roles and influences within these networks. This involved leveraging insights from network analysis to explore alternative strategies, like encapsulating groups rather than relying solely on a kingpin strategy (Contreras Velasco, Reference Contreras Velasco2023), identifying ways to weaken the network’s workforce (Prieto-Curiel et al., Reference Prieto-Curiel, Campedelli and Hope2023), and supplementing punitive measures with social and formal economic reintegration of individuals (da Cunha and Gonçalves, Reference da Cunha and Gonçalves2018). Furthermore, proactive strategies could have been developed to shift CICIG’s functions to other institutions after its mandate expired, promoting accountability and enhancing analytical capabilities within Guatemala’s anti-corruption alliances. This approach could have anticipated conflicts and effectively disrupted the structure and activities of corrupt networks, thereby controlling the impact of their potential resurgence.

Ultimately, the lessons learned from this case underscore the potential value of employing network analytics in international missions combating illicit networks and implementing state-building strategies, both pre- and post-intervention.

5. Final remarks and further research

International peace and state-building operations face the imperative need for innovative strategies to bolster their effectiveness. Specifically, a meticulous reevaluation becomes essential when these operations involve objectives encompassing both the dismantling of networks and the reconstruction of state institutions, all the while empowering media and civil society (Gavigan, Reference Gavigan, Cockayne and Lupel2011; Salazar, Reference Salazar2019; Simon, Reference Simon2023).

Conventional definitions often fall short in capturing the intricate dynamics present in conflict zones (Philip, Reference Philip, Cheng and Zaum2012; Andersen, Reference Andersen and Dziedzic2016), thereby impeding the efficacy of interventions, agreements, and overall operations. In response to this challenge, this article advocates for operational mandates that embrace a complexity framework, providing a nuanced understanding of the multifaceted nature inherent in targeting networks. Aligning such frameworks with analytical tools is crucial for projecting outcome-oriented goals more effectively.

A pertinent example is illustrated in the case of CICIG, where a lack of a data-driven approach even before intervention significantly influences the targeted strategy. This deficiency not only impacts the identification of effective punishment interventions but also hampers the monitoring of progress and forecasting of success probabilities. Moreover, it impedes the anticipation of potential obstacles and unintended consequences, such as the resurgence of illicit powers. Therefore, it is imperative to analyze the evolving behavioral patterns and structural features within these networks. This analytical approach is vital for implementing effective preventive measures (Perry et al., Reference Perry2013), developing assessment metrics, and making informed, data-driven decisions to control and guide interventions. By adopting this comprehensive approach, international peace and state-building operations can enhance their capacity to navigate complex environments and achieve more successful and sustainable outcomes.

While network analysis offers considerable insights, relying solely on it can be misleading and prone to policy and prediction errors (Ward et al., Reference Ward, Greenhill and Bakke2010). International interventions, wielding substantial political influence, often perpetuate power imbalances and reinforce both legal and illegal networks entrenched in historical conflicts or existing business ties. In certain scenarios, these interventions may even worsen crises and heighten the probability of conflict escalation (Lindley, Reference Lindley2007). This article stresses the crucial role of analytics in assessing risks within each descriptive framework, notwithstanding its limitations. This approach ensures that insights gleaned are translated into practical implications with direct relevance to real-life situations. Successful application necessitates a collaborative, multidisciplinary approach involving diverse stakeholders—government officials, civil society organizations, media, journalists, and international partners—to craft nuanced responses to the multifaceted challenges within conflict zones. The emphasis lies in steering clear of unrealistic or purely theoretical outcomes (Perry et al., Reference Perry2013; Gnanguenon, Reference Gnanguenon2021).

Acknowledging the complexities surrounding governments’ adoption of analytics, particularly in conflict and post-conflict nations where understanding of powerful illicit networks is often scant, this article recognizes the obstacles. These countries are frequently governed and manipulated by such networks, hindering institutional and judicial improvements (Andersen, Reference Andersen and Dziedzic2016). Overcoming these hurdles necessitates significant organizational transformation, including the development of technical infrastructure, investment in analytics tools and robust data management systems for big data, and the establishment of specialized data scientist units within intelligence agencies (Pencheva et al., Reference Pencheva, Esteve and Mikhaylov2018). Additionally, challenges arise from differing levels of technological adoption, ethical concerns regarding tolerated practices, privacy concerns, and objections to certain governmental behaviors (Pencheva et al., Reference Pencheva, Esteve and Mikhaylov2018).

Future research should delve into how a tailored approach can enhance the precision and relevance of interventions, sidestepping potential pitfalls linked to overly abstract or idealistic outcomes. Moreover, while network analysis is powerful, its limitations are evident in conflicts like Guatemala’s, where external groups may fuel violence beyond the scope of predictive tools. To counter this, raising regional and continental alerts through collaborative frameworks becomes imperative (Gnanguenon, Reference Gnanguenon2021). It’s crucial to supplement descriptive and predictive analysis with other methods for detecting conflict, violence, and corruption—a multi-method approach for crisis forecasting (O’Brien, Reference O’Brien2010). Furthering scientific research that bridges the gap between predictive tool findings and policymakers’ decision-making processes is pivotal (Masys, Reference Masys and Masys2014; Gnanguenon, Reference Gnanguenon2021).

Data availability statement

Data availability is not applicable to this article as no new data were created or analyzed in this study.

Acknowledgments

The author extends heartfelt gratitude to Jan Michele Simone, José R. Nicolás Carlock, and Harald Waxenecker for their invaluable contributions and insightful discussions over the past years, which have served as a source of inspiration for this article. She is also grateful to the paper’s evaluators, whose contributions significantly enhanced the manuscript.

Author contribution

Writing—original draft: I.L.P.

Funding statement

This research received no specific grant from any funding agency, commercial, or not-for-profit sectors.

Competing interest

The author declares none.

Ethical standard

The research meets all ethical guidelines, including adherence to the legal requirements of the study country.

References

Alavi, DM, Wählisch, M, Irwin, C and Konya, A (2022) Using artificial intelligence for peacebuilding. Journal of Peacebuilding & Development 17(2), 239243.CrossRefGoogle Scholar
Andersen, E (2016) Mandates. In Dziedzic, M (ed.), Combating Criminalized Power Structures. A Toolkit, United States of America: Rowman and Littlefield. pp. 4557.Google Scholar
Baesens, B and Veronique Van Vlasselaer, WV (2015) Fraud Analytics Using Descriptive, Predictive, and Social Network Techniques: A Guide to Data Science for Fraud Detection, United States of America: Wiley.CrossRefGoogle Scholar
Ball, P (2003) The physical modelling of human social systems. Complexus 1(4), 190206.CrossRefGoogle Scholar
Barabási, AL (2016) Network Science, United Kingdom: Cambridge University Press.Google Scholar
Bar-Yam, Y, McKay, SR and Christian, W (1998) Dynamics of complex systems (studies in nonlinearity). Computers in Physics 12(4), 335336.CrossRefGoogle Scholar
Beltrán, A (2020) Guatemala a capture state. In Rosen, JD and Kassab, HS (eds.), Corruption in the Americas, United States of America: Lexington Books, pp. 5984.Google Scholar
Berdal, M and Davies, H (2013) The United Nations and international statebuilding after the cold war. In Berdal, M and Zaum, D (eds.), Political Economy and Statebuilding, USA and Canada: Routledge, pp. 111139.CrossRefGoogle Scholar
Brands, H (2010) Crime, Violence, and the Crisis in Guatemala: A Case Study in the Erosion of the State. Technical report, Strategic Studies Institute.Google Scholar
Bright, D, Lerner, J, Putra Sadewo, GR and Whelan, C (2024) Offence versatility among co-offenders: A dynamic network analysis. Social Networks 78, 111.CrossRefGoogle Scholar
Burcher, M and Whelan, C (2018) Social network analysis as a tool for criminal intelligence: Understanding its potential from the perspectives of intelligence analysts. Trends in Organized Crime 21(3), 278294.CrossRefGoogle Scholar
Cai, L and Zhu, Y (2015) The challenges of data quality and data quality assessment in the big data era. Data Science Journal, 14: 2, pp. 110.CrossRefGoogle Scholar
Caldarelli, G, Wolf, S and Moreno, Y (2018) Physics of humans, physics for society. Nature Physics 14(9), 870870.CrossRefGoogle Scholar
Call, CT (2021) Ten key lessons from the OAS mission in support of the fight against corruption and impunity in Honduras. In Pozsgai-Alvarez, J (ed.), The Politics of Anti-Corruption Agencies in Latin America, United States of America: Routledge, pp. 218234.CrossRefGoogle Scholar
Call, CT and Hallock, J (2020) Too much success? The legacy and lessons of the international commission against impunity in Guatemala. In CLALS Working Paper Series 24, United States of America: Center for Latin American and Latino Studies, American University.Google Scholar
Campedelli, GM, Cruickshank, I and Carley, KM (2019) A complex networks approach to find latent clusters of terrorist groups. Applied Network Science 4(1), 59.CrossRefGoogle Scholar
Carrington, PJ (2016) Crime and social networks analysis. In Scott, J and Carrington, PJ (eds.), The SAGE Handbook of Social Network Analysis, Great Britain: SAGE Publications Inc, pp. 236255.Google Scholar
Cheng, CS and Zaum, D (2012) Selling the peace? Corruption and post-conflict peacebuilding. In Cheng, CS and Zaum, D (eds.), Corruption and Post-Conflict Peacebuilding. Selling the Peace?, USA and Canada: Routledge.Google Scholar
CICIG (2019) Informe de cierre. el legado de justicia en guatemala. Technical report, Comision Internacional para la Impunidad en Guatemala.Google Scholar
Cockayne, J and Lupel, A (2011) Introduction: Rethinking the relationship between peace operations and organized crime. In Cockayne, J and Lupel, A (eds.), Peace Operations and Organized Crime. Enemies or Allies?, USA and Canada: Routledge, pp. 119.CrossRefGoogle Scholar
Collier, P and Hoeffler, A (2004) Greed and grievance in civil war. Oxford Economic Papers 56(4), 563595.CrossRefGoogle Scholar
Contreras Velasco, O (2023) Unintended consequences of state action: How the kingpin strategy transformed the structure of violence in Mexico’s organized crime. Trends in Organized Crime, https://doi.org/10.1007/s12117-023-09498-x.Google Scholar
Costa, J, Baez-Camargo, C, Kassa, S and Lugolobi, R (2021) The role of informal networks in promoting illegal wildlife trade: A qualitative analysis from Uganda. Trends in Organized Crime, 26, 397419.CrossRefGoogle Scholar
Cruz, JM (2022) Fighting gangs to dismantle democracy: How anti-crime policies have contributed to the authoritarian drift in Central America. The Brown Journal of World Affairs XXIX(I) 4557.Google Scholar
Cunningham, D, Everton, S and Murphy, P (2016) Understanding Dark Networks. A Strategic Framework for the Use of Social Network Analysis, United States of America: Rowman and Littlefield.Google Scholar
D’Orsogna, MR and Perc, M (2015) Statistical physics of crime: A review. Physics of Life Reviews 12, 121.CrossRefGoogle ScholarPubMed
da Cunha, BR and Gonçalves, S (2018) Topology, robustness, and structural controllability of the Brazilian federal police criminal intelligence network. Applied Network Science 3(1), 36.CrossRefGoogle ScholarPubMed
De Domenico, M, Brockmann, D, Camargo, C, Gershenson, C, Goldsmith, D, Jeschonnek, S, Kay, L, Nichele, S, Nicolás, J, Schmickl, T, Stella, M, Brandoff, J, Martínez Salinas, A.J, Sayama, H (2019) Complexity explained. Technical report.Google Scholar
DellaPosta, D (2017) Network closure and integration in the mid-20th century American mafia. Social Networks 51, 148157.CrossRefGoogle Scholar
Diepenmaat, F (2021) (The fight against) Money laundering: It’s all about networks. In Granados, OM and Nicolás-Carlok, JR (eds.), Corruption Networks. Concepts and Applications, Switzerland: Springer,pp. 115130.CrossRefGoogle Scholar
Donnay, K (2017) Big data for monitoring political instability. International Development Policy 8(1), https://doi.org/10.4000/poldev.2468.Google Scholar
Duijn, PAC, Kashirin, V and Sloot, PMA (2014) The relative ineffectiveness of criminal network disruption. Scientific Reports 4(1), 4238.CrossRefGoogle ScholarPubMed
Escobar, C (2019) How organized crime controls Guatemalan’s judiciary. In Rotberg, RI (ed.), Corruption in Latin America. How Politicians and Corporations Steal from Citizens, Switzerland: Springer, pp. 235264.CrossRefGoogle Scholar
Falcón-Cortés, A, Aldana, A and Larralde, H (2022) Practices of public procurement and the risk of corrupt behavior before and after the government transition in México. EPJ Data Science 11(1), 19.CrossRefGoogle Scholar
Felson, M, et al. (2006) The ecosystem for organized crime: Heuni 25th anniversary lecture, 7th Inkeri Anttila lecture Helsinki, Finland; lecture given: October 5, 2006.Google Scholar
Framis, AG-S (2014) Illegal networks or crime organizations. Structure, power, and facilitators in cocaine trafficking structures. In Morselli, C (ed.), Crime and Networks, United States: Routledge, pp. 131147.Google Scholar
Gambetta, D (1993) The Sicilian Mafia, Cambridge, MA: Harvard University Press.Google Scholar
Gavigan, P (2011) Organized crime, illicit power structures and threatened peace process: The case of Guatemala. In Cockayne, J and Lupel, A (eds.), Peace Operations and Organized Crime. Enemies or Allies?, USA and Canada: Routledge, pp. 99114.Google Scholar
Gershenson, C, Siegenfeld, AF and Bar-Yam, Y (2020) An introduction to complex systems science and its applications. Complexity 2020, 6105872.Google Scholar
Gnanguenon, A (2021) Pivoting to African conflict prevention? an analysis of continental and regional early warning systems. Brief 3, European Union Institute for Security Studies.Google Scholar
Grabosky, P and Duffield, G (2001) Red flags of fraud. Woden: Australian Institute of Criminology 200, 16.Google Scholar
Hallock, JT (2021) Unprecedented success and entrenched opposition. The complicated legacy of the international commission against impunity in Guatemala. In Pozsgai-Alvarez, J (ed.), The Politics of Anti-Corruption Agencies in Latin America, Chapter 10, United States of America: Routledge, pp. 179200.CrossRefGoogle Scholar
Hassani, H, Huang, X, MacFeely, S and Entezarian, MR (2021) Big data and the United Nations sustainable development goals (UN SDGs) at a glance. Big Data and Cognitive Computing; 5(3):28.CrossRefGoogle Scholar
Heathershaw, J (2012) Conclusions. Neither build nor formed - The transformation of post-conflict states under international intervention. In de Guevara, BB (ed), Statebuilding and State-Formation. The Political Sociology of Intervention, USA and Canada: Routledge, pp. 246259.Google Scholar
Heiler, G, Pham, T, Korbel, J, Wachs, J and Thurner, S (2023) A large-scale empirical investigation of specialization in criminal career. Scientific Reports 13(1), 17160.CrossRefGoogle ScholarPubMed
Holt, VK and Bouch, AJ (2009) Framing the issue: Un responses to corruption and criminal networks in post-conflict settings. International Peacekeeping 16(1), 2032.CrossRefGoogle Scholar
Hosseini, M, Wieczorek, M and Gordijn, B (2022) Ethical issues in social science research employing big data. Science and Engineering Ethics 28(3), 29.CrossRefGoogle ScholarPubMed
Hudson, A and Taylor, AW (2010) The international commission against impunity in Guatemala. Journal of International Criminal Justice 8(1), 5374.CrossRefGoogle Scholar
IACHR (2021) Annual Report 2021. Chapter Iv.B. Guatemala. Technical report. Inter American Commission on Human Rights.Google Scholar
Jones, NP, Dittmann, WL, Wu, J and Reese, T (2020) A mixed methods social network analysis of a cross-border drug network: The Fernando Sanchez Organization (FSO). Trends in Organized Crime 23(2), 154182.CrossRefGoogle Scholar
Le Billion, P (2005) Global Corruption Report 2005. Special Focus Corruption in Construction and Post-Conflict Reconstruction. Technical report, Transparency International.Google Scholar
Letouzé, E, Meier, P and Vinck, P (2013) Big data for conflict prevention: New oil and old fires. In New Technology and the Prevention of Violence and Conflict, New York: International Peace Institute, pp. 427.Google Scholar
Leuprecht, C and Hall, K (2014) Why terror networks are dissimilar: How structure relates to function. In Masys, AJ (ed.), Networks and Network Analysis for Defense and Security, Switzerland: Springer, pp. 83120.CrossRefGoogle Scholar
Lindley, D (2007) Promoting Peace with Information, United States of America: Princeton University Press.CrossRefGoogle Scholar
Luna-Pla, I and Nicolás-Carlock, J (2020) Corruption and complexity: A scientific framework for the analysis of corruption networks. Applied Network Science 5(1), 13.CrossRefGoogle Scholar
Lustick, IS, Miodownik, D and Eidelson, RJ (2004) Secessionism in multicultural states: Does sharing power prevent or encourage it? The American Political Science Review 98(2), 209229.CrossRefGoogle Scholar
MacLachlan, K (2017) The Fifth Column. Understanding the Relationship between Corruption and Conflict. Technical report, Transparency International. Available at: https://ti-defence.org/publications/the-fifth-column/. Accessed on March 2024.Google Scholar
Marin, A and Wellman, B (2016) Social network analysis: An introduction. In Scott, J and Carrington, PJ (eds.), The SAGE Handbook of Social Network Analysis, Great Britain: SAGE Publications Inc, pp. 1125.Google Scholar
Masys, AJ (2014) Dealing with complexity: Thinking about networks and the comprehensive approach. In Masys, AJ (ed.), Networks and Network Analysis for Defense and Security, Switzerland: Springer, pp. 281287.CrossRefGoogle Scholar
Mattiache, T and Pappier, J (2022) In Guatemala, a Fresh Crackdown on Prosecutors. Technical report, Human Rights Watch.Google Scholar
McGloin, JM and Kirk, DS (2010) Social network analysis. In Piquero, AR and Weisburd, D (eds.), Handbook of Quantitative Criminology, United States of America: Springer, pp. 209224.CrossRefGoogle Scholar
Meier, P (2015) Digital Humanitarians. How Big Data is Changing the Face of Humanitarian Response, USA and Canada: Routledge.CrossRefGoogle Scholar
Morselli, C, Giguère, C and Petit, K (2007) The efficiency/security trade-off in criminal networks. Social Networks 29(1), 143153.CrossRefGoogle Scholar
Nicolás-Carlock, JR and Luna-Pla, I (2023) Organized crime behavior of shell-company networks in procurement: prevention insights for policy and reform. Trends in Organized Crime, https://doi.org/10.1007/s12117-023-09499-w.CrossRefGoogle Scholar
Nicolás-Carlok, JR and Luna-Pla, I (2021) Conspiracy of corporate networks in corruption scandals. Frontiers in Physics 9:667471. doi: 10.3389/fphy.2021.667471.CrossRefGoogle Scholar
O’Brien, SP (2010) Crisis early warning and decision support: Contemporary approaches and thoughts on future research. International Studies Review 12(1), 87104.CrossRefGoogle Scholar
Papacristos, AV and Smith, CM (2014). The embedded and multiplex nature of Al Capone. In Morselli, C., editor, Crime and Networks, United States: Routledge, pages 97115.Google Scholar
Pencheva, I, Esteve, M and Mikhaylov, SJ (2018) Big data and AI – A transformational shift for government: So, what next for research? Public Policy and Administration 35(1), 2444.CrossRefGoogle Scholar
Perry, WL, et al. (2013) Predictive Policing. The Role of Crime Forecasting in Law Enforcement Operations, United States:Rand Corporation.CrossRefGoogle Scholar
Philip, M (2012) Conceptualising corruption in peacebuilding contexts. In Cheng, CS and Zaum, D (eds.), Corruption and Post-Conflict Peacebuilding. Selling the Peace? Chapter 2, Routledge, USA and Canada, pp. 2945.Google Scholar
Prieto-Curiel, R, Campedelli, GM and Hope, A (2023) Reducing cartel recruitment is the only way to lower violence in Mexico. Science 381(6664), 13121316.CrossRefGoogle ScholarPubMed
Ribeiro, HV, Alves, LGA, Martins, AF, Lenzi, EK and Perc, M (2018) The dynamical structure of political corruption networks. Journal of Complex Networks 6(6), 9891003.CrossRefGoogle Scholar
Rød, EG, Gåsste, T and Hegre, H (2023) A review and comparison of conflict early warning systems. International Journal of Forecasting, vol. 40(1), pages 96112.CrossRefGoogle Scholar
Salazar, K (2019) Understanding odebrecht: Lessons for combating corruption in the Americas. Public hearing, House Committee of Foreign Affairs.Google Scholar
Schwartz, RA (2020) Civil war, institutional change, and the criminalization of the state: Evidence from Guatemala. Studies in Comparative International Development 55, 381401.CrossRefGoogle Scholar
Scott, J (2017) Social Network Analysis, 4th Edn., London: SAGE Publications Ltd.CrossRefGoogle Scholar
Shleifer, A and Vishny, RW (1993) Corruption*. The Quarterly Journal of Economics 108(3), 599617.CrossRefGoogle Scholar
Simon, J-M (2023) La corrupción en el sector de la justicia penal: Perspectivas Para una reforma institucional en américa Latina. Derecho Penal y Criminología 44(117), 95147.CrossRefGoogle Scholar
Simonofski, A, Tombal, T, De Terwangne, C, Willem, P, Frenay, B and Janssen, M (2022) Balancing fraud analytics with legal requirements: Governance practices and trade-offs in public administrations. Data & Policy 4, e14.CrossRefGoogle Scholar
Sparrow, MK (1991) The application of network analysis to criminal intelligence: An assessment of the prospects. Social Networks 13(3), 251274.CrossRefGoogle Scholar
Spector, BI (2011) Negotiating Peace and Confronting Corruption. Challenges for Postconflict Societies, United States: United States Institute of Peace.Google Scholar
Strang, SJ (2014) Network analysis in criminal intelligence. In Masys, AJ (ed.), Networks and Network Analysis for Defense and Security, Switzerland: Springer, pp. 126.Google Scholar
Tayebi, MA and Glässer, U (2016) Social Network Analysis in Predictive Policing, Switzerland: Springer.CrossRefGoogle Scholar
Tombal, T and Simonofski, A (2021) Artificial Intelligence and Big Data in Fraud Analytics: Identifying the Main Data Protection Challenges for Public Administrations, Belgium: Université de Namur.Google Scholar
Trejo, G and Nieto-Matiz, C (2022) Containing large-scale criminal violence through internationalized prosecution: How the collaboration between the CICIG and Guatemala’s law enforcement contributed to a sustained reduction in the murder rate. Comparative Political Studies 56(9), 13281364.CrossRefGoogle Scholar
UN (2005) Corruption: Threats and trends in the twenty-first century. Working paper A.CONF203/6, United Nations.Google Scholar
UN (2006) Agreement between the United Nations and the Sate of Guatemala on the Establishment of an International Commission against Impunity in Guatemala ("CICIG"). Technical report, United Nations.Google Scholar
von Lampe, K, et al. (2006) Organised crime is… Findings from a cross-national review of literature. In van Duyne, PC, et al. (ed.), The Organization of Crime for Profit, Netherlands: Wolf Legal Publishers, pp. 1741.Google Scholar
Wachs, J, Fazekas, M and Kertész, J (2020) Corruption risk in contracting markets: A network science perspective. International Journal of Data Science and Analytics, 12, 4560.CrossRefGoogle Scholar
Wählisch, M (2020) Big data, new technologies, and sustainable peace: Challenges and opportunities for the UN. Journal of Peacebuilding & Development 15(1), 122126.CrossRefGoogle Scholar
Ward, MD, Greenhill, BD and Bakke, KM (2010) The perils of policy by p-value: Predicting civil conflicts. Journal of Peace Research 47(4), 363375.CrossRefGoogle Scholar
Waxenecker, H (2019) Impunidad y redes ilcitas: Un análisis de su evolución en guatemala. Technical report, Fundación Mirna Mack, Comisión Internacional para la Impunidad en Guatemala, Heinrich Böll Stiftung.Google Scholar
WB (2020) Enhancing Government Effectiveness and Transparency. The Fight against Corruption. Global report. Technical report, World Bank.Google Scholar
WOLA (2022) Guatemala Downward Spiral. Report 6 October, Washington Office on Latin America.Google Scholar
Zamora Palma, RF (2023) Estudio de Caso: Reformas jurídicas al Sistema de Justicia Penal Guatemalteco Promovidas Por la Comisión Internacional Contra la Impunidad en Guatemala Y Su Aporte en el Combate de la Impunidad. PhD thesis, Instituto de Investigaciones Juridicas, Universidad Nacional Autónoma de México.Google Scholar
Zamudio-González, L (2021) The role of the United Nations and the organization of the American states in delegation of governance agreements. In Pozsgai-Alvarez, J (ed.), The Politics of Anti-Corruption Agencies in Latin America, United States of America: Routledge, pp. 235250.CrossRefGoogle Scholar
Figure 0

Figure 1. Examples of configuration in a network.

Submit a response

Comments

No Comments have been published for this article.