International Journal on Criminology Volume 3, Number 2, Fall 2015 | Page 125
Criminal–Terrorist Convergence
Mapping and discerning the function and relationship of various actors in illicit
networks requires all-source intelligence—including human intelligence (HUMINT),
communications intelligence (COMINT), measures and signals intelligence
(MASINT), geospatial intelligence (GEOINT), criminal intelligence (CRIMINT), etc.
Identity Intelligence (i2)
A
specific tool that has the potential to bridge the intelligence gaps faced with threat
convergence and hybrid criminal–terrorist threats is “Identity Intelligence
(i2).” i2 exploits digital space to gain an understanding of an opposing force
(OPFOR), in this case, gangs/criminals, insurgents, and terrorists. Digital media
include cell phones and social media (internet communications technology—ICT).
i2 is a subset of geospatial intelligence that supports investigation and intelligence
by providing context and meaning which helps link actors and suggests both trends
and potentials, and capabilities and intentions. It can help answer who, what, where,
when, why, and sometimes how. It synthesizes the traditional INTs and adds content
analysis, social network analysis, link analysis and other emerging cyber exploitation
tools. Understanding social networking sites (SNS) that are used by criminals, gangs,
and anarchists for internal communications, recruitment, and information operations
(intimidation, shaping turf, and environment) is a key component of i2. 34 Each
individual post at a SNS is a unique transaction with a potential signature that can
provide indicators and context (This is part of the Transaction Analysis Cycle—Figure
1—developed by Sullivan.). 35
Figure 1: Transaction analysis cycle
Source: John P. Sullivan, “Terrorism early
warning and co-production of counterterrorism
intelligence,” paper presented
to Canadian Association for Security
and Intelligence Studies (CASIS), 20th
Anniversary International Conference,
Montreal, Quebec, Canada, October 21,
2005; available at https://www.academia.
edu/927364/Terrorism_early_warning_
and_co-production_of_counterterrorism_intelligence
120