International Journal on Criminology Volume 3, Number 2, Fall 2015 | Page 125

Criminal–Terrorist Convergence Mapping and discerning the function and relationship of various actors in illicit networks requires all-source intelligence—including human intelligence (HUMINT), communications intelligence (COMINT), measures and signals intelligence (MASINT), geospatial intelligence (GEOINT), criminal intelligence (CRIMINT), etc. Identity Intelligence (i2) A specific tool that has the potential to bridge the intelligence gaps faced with threat convergence and hybrid criminal–terrorist threats is “Identity Intelligence (i2).” i2 exploits digital space to gain an understanding of an opposing force (OPFOR), in this case, gangs/criminals, insurgents, and terrorists. Digital media include cell phones and social media (internet communications technology—ICT). i2 is a subset of geospatial intelligence that supports investigation and intelligence by providing context and meaning which helps link actors and suggests both trends and potentials, and capabilities and intentions. It can help answer who, what, where, when, why, and sometimes how. It synthesizes the traditional INTs and adds content analysis, social network analysis, link analysis and other emerging cyber exploitation tools. Understanding social networking sites (SNS) that are used by criminals, gangs, and anarchists for internal communications, recruitment, and information operations (intimidation, shaping turf, and environment) is a key component of i2. 34 Each individual post at a SNS is a unique transaction with a potential signature that can provide indicators and context (This is part of the Transaction Analysis Cycle—Figure 1—developed by Sullivan.). 35 Figure 1: Transaction analysis cycle Source: John P. Sullivan, “Terrorism early warning and co-production of counterterrorism intelligence,” paper presented to Canadian Association for Security and Intelligence Studies (CASIS), 20th Anniversary International Conference, Montreal, Quebec, Canada, October 21, 2005; available at https://www.academia. edu/927364/Terrorism_early_warning_ and_co-production_of_counterterrorism_intelligence 120