Science & Space

Decoding Gang Activity on TikTok: A Guide for Analysts and Policymakers

2026-05-03 22:27:11

Introduction

In a recent study published in Crime, Media, Culture: An International Journal, sociologist John Leverso from the University of Cincinnati and his team examined how gang members use TikTok to broadcast their culture. Their findings offer law enforcement and policymakers a unique opportunity to derive actionable intelligence from user-generated content. This guide translates that research into a practical, step-by-step process for analyzing gang activity on TikTok—turning raw video clips into strategic insights.

Decoding Gang Activity on TikTok: A Guide for Analysts and Policymakers
Source: phys.org

What You Need

Before you begin, gather the following resources and permissions:

Step-by-Step Process

Step 1: Define Your Research Scope

Start by narrowing the focus. Which gangs, regions, or time periods are you investigating? Leverso's team concentrated on content that explicitly references gang affiliation, such as #GangTok or #Drill hashtags. Write a clear research question—e.g., “How do members of the XYZ gang brand themselves on TikTok?” or “What criminal signals appear in local TikTok posts?” This prevents data overload.

Step 2: Identify and Collect Relevant Accounts

Use hashtag searches to locate initial accounts. Look for recurring usernames that include gang symbols, numbers (e.g., 13 for Sureños, 18 for 18th Street), or regional area codes. Manually review 20–30 profiles to confirm authenticity (check bio references to known gang names, friends lists, and cross‑platform links). Then leverage the monitoring tool to automatically follow updates from these accounts. Store each profile with a unique identifier.

Step 3: Catalog Content Attributes

For every video, record the following in your database:

Use a standardized coding sheet to ensure consistency. Leverso’s team categorized content into themes: territorial claims, recruitment, threats, and celebration of violence.

Step 4: Analyze Symbols and Language

Now decipher the meanings. Cross‑reference hand signs with known gang dictionaries (many police departments publish these). Slang evolves fast, so complement your knowledge with community forums or ethnographic interviews (if ethical and safe). Pay attention to coded references—e.g., “slide” often means a drive‑by shooting, “opp” means rival. Create a glossary that updates regularly.

Step 5: Cross‑Reference with Offline Data

Compare your TikTok findings with official incident reports, arrest records, or field interviews. Do the online identities match known offenders? Do videos geolocate to recent crime hotspots? This step validates your analysis and helps distinguish performative bravado from real‑world activity. For example, a video claiming territory that aligns with a recent shooting increases the likelihood of authenticity.

Step 6: Identify Emerging Trends

Look beyond individual posts. Aggregate data to spot shifts—e.g., a new hand sign spreading across multiple cities, or a surge in weapon displays before a holiday weekend. Leverso’s study suggests that TikTok culture can accelerate the diffusion of gang trends, so early detection is vital. Use time‑series charts to visualize frequency changes.

Step 7: Formulate Policy Recommendations

Translate insights into action. For law enforcement: enhanced situational awareness, targeted patrols, or community outreach to individuals who appear at risk. For policymakers: funding for youth programs that counter the glamorization of gang life, or digital literacy campaigns. Always ground recommendations in solid evidence—avoid overreaction. Leverso emphasizes that not all content signals imminent crime; some is simply posturing.

Tips for Success

By following these steps, you can transform the chaotic stream of TikTok videos into a structured intelligence resource—one that respects privacy while informing smarter, more proportionate responses to gang activity.

Explore

RIMap-RISC: Pioneering the Systematic Modeling of MicroRNA-Messenger RNA Interactions Canonical Under Attack: Key Questions About the April 30 Service Outage 6 Key Kubernetes v1.36 Updates for Controller Health and Observability GameStop’s Audacious eBay Bid: A David vs. Goliath Strategy? Mastering Daemon Management on Amazon ECS: A Q&A Guide