International Journal on Criminology Volume 4, Number 2, Winter 2016 | Page 14
International Journal on Criminology
investigative units they worked with. They were helped by the management decision
that, for operational security reasons, the operational reporting of each investigative
unit—whether the undercover unit or those handling confidential informants—was
compartmented from one another. As a follow-on decision, at the working level,
only the civilian analyst[s] involved in an investigation was authorized to see the
reporting from all CIs and UCs involved in that case.
-----It therefore fell to analysts to collate the information, analyze it,
identify gaps that needed filling, and set requirements for both the UC and
CI programs.
-----This empowerment of the analysts helped make them full partners with
the investigators; in the CI review noted earlier, the analyst and investigator
answered as a team. The integration of operations and analysis became
complete.
Cyber Intelligence Arrives
One of the first programs introduced into the re-engineered Intelligence
Division was its cyber unit. Started from scratch in late 2002, there was little
experience or know-how to begin with, but, a little at a time, new talent was added
and in-house expertise accumulated. The Division had learned quickly that the
Internet was fast becoming important for three reasons:
-----First, al-Qaeda and its affiliates were beginning tocommunicate their
ideology via the Internet as well as via CD’s and videos and thus the Internet
was rapidly becoming a source of radicalization.
-----Second, the Intelligence Division early recognized the Internet was
increasingly being used by already radicalized individuals around the world
to communicate with one another, forming “virtual” jihadi clusters, including
with persons in the New York City area, without ever meeting one another.
-----Third, the Internet had become a threatening source of information on
bomb-making material and techniques, explosive devices of all kinds, and
even how to communicate securely.
All of this underscored Commissioner Kelly’s 2003 media statement “that the
internet had replaced Afghanistan as a training ground for terrorism”. His comment
was prescient.
The cyber unit quickly established a unique tradecraft on where to look, what
to watch for, how to interpret what it was learning, and the roadmap of appropriate
follow-up. The Intelligence Division also had the advantage of deep language
13