International Journal on Criminology Volume 3, Number 2, Fall 2015 | Page 126
International Journal on Criminology
Unconventional media can also form part of i2 for hybrid threats. This
includes graffiti (i.e., narcomensajes and narcopintas) and tattoos. These new media are
essentially messaging about who the actors are and what they intend to do (or have
done). Tattoos show affiliations, allegiance, fealty, position/role in hierarchy, and past
actions. Deception is also a component of i2, as deception (including “burner phones,”
antiforensic software, GPS jammers, etc.) is frequently employed by criminal and
terrorist actors to mask their activities.
The goal of i2 can be summarized as AC 2 E: Attribution (who is it/who did it);
Connections (nodes, position); Context (what does it mean in relationship to everything
else?); Exploitation (what can we do with it?).
Conclusion
Contemporary security threats involve the convergence of criminal and terrorist
actors. Gangs, cartels, mafias, insurgents, and corrupt government officials
collude and interact within an illicit space of flows. 36 These convergent threats
pose security challenges at a variety of levels from gang-infested neighborhoods (failed
communities or no-go zones) spanning a few blocks through entire contested zones
(such as favelas in Brazil parts of Chihuahua, Tamaulipas, Guerrero, and Michoacán and
San Pedro Sula in Honduras). These groups provide unique challenges (violence and
insecurity) individually and complex challenges when they come together in alliances
or in transactional operations. Corruption and violence form part of this landscape and
need to be mapped.
Developing an intelligence capacity to understand these hybrid networks
requires interaction among police, intelligence (and security services), and the military
and civil government. It also requires interaction with a range of nongovernmental actors
that provide medical, social, and humanitarian services. Intelligence approaches like
distributed meta-analysis “co-production of intelligence” and the transaction analysis
cycle along with expanded use of i2 are potential tools for improving intelligence to
address the convergence of criminal and terrorist threats.
Notes
1
Gary I. Wilson and John P. Sullivan, “On Gangs, Crime, and Terrorism,” Defense and the National
Interest, February 28, 2007, http://www.academia.edu/1606348/On_Gangs_Crime_and_Terrorism.
2
Nils Gilman, Jesse Goldhhammer, and Steven Weber, eds., Deviant Globalization: Black Market Economy
in the 21st Century (New York: Bloomsbury Academic, 2011).
3
Michael Miklaucic, and Jacqueline Brewer, eds., Convergence: Illicit Networks and National Security in
the Age of Globalization (Washington, DC: National Defense University Press, 2013).
4
Martin van Creveld, The Transformation of War (New York: The Free Press, 1991).
5
William S. Lind, Keith Nightingale, John F. Schmitt, Joseph W. Sutton and Gary I. Wilson, “The Changing
Face of War: Into the Fourth Generation,” Marine Corps Gazette 73 (10) (October 1989): 22-26.
6
Joseph S. Nye, “The Future of Force,” Project Syndicate, February 5, 2015, http://www.project-syndicate.org/
commentary/modern-warfare-defense-planning-by-joseph-s—nye-2015-02#Hj6VzOU92S60czVJ.99.
121