The use of crypto-currencies in funding violent jihad

2016 ◽  
Vol 19 (4) ◽  
pp. 407-425 ◽  
Author(s):  
Angela S.M. Irwin ◽  
George Milad

Purpose The purpose of this paper is to look at current discourse on the topic of crypto-currencies, more specifically Bitcoins, and their application to funding acts of terror. The paper clearly establishes the risks posed by this new payment technology and value transfer system to assist in the process of funding, planning and implementing acts of terror. Design/methodology/approach Publications, blogs and sites published and administered by terrorists groups and their supporters are examined to determine their interest in leveraging emerging payment and value transfer systems to facilitate the funding, planning and implementation of terror attacks. Press releases and other publications are also examined to determine whether crypto-currencies have been used by these groups in fund raising, fund transfer or recent terror attacks. Findings Although it is difficult to find concrete evidence of largescale use of Bitcoins and other crypto-currencies by terrorist groups and their supporters, there is strong evidence to suggest that they have been linked to a number of terror attacks in Europe and Indonesia. Supporters of Islamic State of Iraq and Syria (ISIS), jihadists and terrorist organisations are actively looking to and promoting the use of new and emerging technologies, such as Bitcoin, to mitigate some of the risks associated with traditional fund transfer methods. Some websites associated with terrorist organisations have started to collect donations in Bitcoins. Many Bitcoin ATMs and Bitcoin exchanges are located in countries that have seen significant numbers of foreign fighters join ISIS in the Middle East and are also positioned in countries that have seen increased risk of terror attack. These present a significant risk because they allow for the seamless, anonymous transfer of funds to and from terrorist groups and their supporters. The paper highlights the need for further in-depth research into reliable ways to circumvent the current difficulties experienced in differentiating illicit transactions from legitimate ones and establishing reliable means of attribution. Originality/value Using a document published by ISIS, which provides would-be jihadists detailed instructions on how they can get to Syria or Iraq without being detected, a set of models were created showing how this could be achieved using Bitcoins alone. From this scenario, red flag indicators and suspicious behaviour models have been created to determine whether they can be identified during detailed analysis of the Bitcoin blockchain which will be conducted in later stages of research.

Subject ISG infiltration of refugee flows. Significance Refugee arrivals in Europe in 2016, large if not at 2015 levels, will put yet more pressure on the EU, which is already struggling to address economic crises, political polarisation and inter-state divisions on how to address security crises in Ukraine and the Middle East. Suspicions have grown that among the refugees are operatives of the Islamic State group (ISG). Impacts ISG's foreign fighters in Iraq and Syria will seek to expand their relationships with existing extremist networks in Europe. Speculation over ISG's presence within refugee flows will continue, especially as far-right parties continue to perform well in elections. The EU-Turkey deal may slow refugee flows, but the existing numbers of refugees will continue to attract suspicion from authorities.


2016 ◽  
Vol 23 (3) ◽  
pp. 542-558
Author(s):  
Balasubramaniyan Viswanathan

Purpose The purpose of this paper is to study the counterfeit currency network in India. This research is an endeavour to bring out various layers which act as source, collection and distribution points in a counterfeit currency network in India. This paper also deals with the fake currency network and its linkages to terrorism. Design/methodology/approach Methodology adopted is a descriptive one which conducts a content analysis on materials derived from secondary sources supported by information from primary source data acquired through the Right to Information Act. Findings This paper argues that the existing measure of calculating the incidence of counterfeit notes per million is understated by the relevant stakeholders in India. This measure changes drastically when other factors such as high denomination notes and police seizures are taken into account, which has not been attempted, though it is duly acknowledged by the stakeholders. This paper has attempted to map the locations in India which act as ingress, distribution and circulation points based on evidentiary data derived from the seizure records. This paper also highlights the fact that criminal gang-operated networks of fake currency are compartmentalised, while the networks operated by terror groups are de-compartmentalised. Practical implications In the process, this paper attempts to enlighten stakeholders like law enforcement agencies, banking regulators and counter terrorism community on the penetration levels of the fake Indian currency note (FICN) networks in India and the need to target these important nodes or points or layers to break up the FICN network. This also highlights fund-raising mechanisms of terror groups, where FICN acts as the main funding resource for groups like the Indian Mujahideen for carrying out low-cost terror attacks. Originality/value The key findings of this research lie in its originality of presentation of facts in a systematic fashion.


Subject Impact of the ambitions of Khalifa Haftar. Significance Field Marshal Khalifa Haftar has been trying to expand his control, changing the balance of power in Libya and marking a decisive setback for UN-led reunification efforts. The UN has brought Libyans back to the negotiating table to amend the Tripoli-based Government of National Accord (GNA), which has failed to gain the endorsement of the eastern parliament and has been steadily losing legitimacy. Impacts Fighting between Haftar and his opponents would endanger the gains in oil exports. Terrorist groups, such as Islamic State, would benefit from the security vacuum. Haftar would struggle to consolidate power, even if he managed to declare a military government.


2016 ◽  
Vol 18 (5) ◽  
pp. 418-430 ◽  
Author(s):  
Haykel Ben Mahfoudh

As the phenomenon of foreign fighters is taking new dimensions by the rise of autonomous terrorist groups, mainly the group calling itself ‘Islamic state’ (also known as Daesh or isil), most of these individuals are perceived as a serious security threat to the peace and justice in the world. Such security perception made current efforts to deal effectively with this complex problem confined within the existing counter-terrorism fora including the United Nations (un). The u.n. framework of Mercenaries does not seem the right venue for an effective accountability framework. Beyond the conceptual debate – whether Foreign Fighters is a new form of mercenarism – the regulatory framework offer various venues for the protection of human rights. Instead of constructing an accountability mechanism from scratch, this paper calls for the application of the dual obligation to protect and respect, which focuses on victims rights, regardless the nature, the type of the author of the crime.


2020 ◽  
Vol 16 (4) ◽  
pp. 337-342
Author(s):  
Allison Marmel ◽  
Nikki Bozinoff

Purpose The prevalence of substance use disorders among incarcerated individuals in Canada is substantially higher than in the general population. Many incarcerated individuals with opioid use disorder remain untreated due to inadequate access to opioid agonist therapy (OAT). A considerable proportion of overdose-related deaths in the province of Ontario are individuals who have recently been released from prison. The purpose of this paper is to highlight that discontinuation of OAT as a disciplinary measure remains an active concern within prisons in Canada and places individuals with opioid use disorder at increased risk of relapse and resultant overdose death. Design/methodology/approach This case report describes an incarcerated client with opioid use disorder who was initially stable on OAT, but was forcibly tapered off OAT as a disciplinary measure and subsequently relapsed to illicit opioid use while in custody. Findings This case calls attention to concerns regarding treatment of opioid use disorder during incarceration, as forcible detoxification from OAT as a disciplinary measure is a highly dangerous practice. The authors discuss concerns regarding diversion and ways in which prison-based OAT programs can be improved to increase their safety and acceptability among correctional staff. Ongoing advocacy is required on the part of health-care workers and policymakers to ensure that individuals are able to appropriately access this life-saving therapy while incarcerated. Originality/value To the best of the authors’ knowledge, this is the first case report to describe forcible tapering of OAT as a disciplinary measure during incarceration. Despite existing evidence emphasizing the significant risk of overdose associated with detoxification from opioids, this case highlights the need for further research into the causes and prevalence of this practice.


Significance Zamili's remarks appear to signal Iraqi government concerns that the US-led international air campaign against the group is not going well. The effectiveness of airstrikes has been constrained by poor intelligence and strict rules of engagement; efforts to support local ground forces are at a standstill; and Iraqi offensive operations have virtually ground to a halt. Impacts Russia's strong intervention into Syria will not break the stalemate in either the fight against ISG or the Syrian civil war. The huge costs of a protracted campaign against ISG will further weaken Iraq's medium-term fiscal outlook. ISG's survival will limit Syrian Kurdish ambitions to establish a contiguous territory across northern Syria. It will also contain Syrian rebel forces, ensuring that the stalemate in the Syrian civil war continues. Continued flow of foreign fighters to Iraq and Syria will ensure international terrorism threat persist over the long term.


2019 ◽  
Vol 11 (1) ◽  
pp. 59-66
Author(s):  
Judith Corcoba ◽  
Raigam Jafet Martinez Portilla

Purpose Jihadist terrorism is one of the most important current global issues. Terrorism is an instrument of fear and fear an instrument of news. The purpose of this paper is to understand the difference in propaganda between the most powerful terrorist groups and the association with the Islamic State group (ISIS). Design/methodology/approach This cross-sectional study has been carried out on the usage of propagandistic material. For the analyses, two different groups have been created, propaganda emitted from the Islamic State group and propaganda from the other main terrorist groups (Boko Haram, Taliban, Al-Qaeda). Findings It has been proved that there are significant differences between the Islamic State propaganda and the other main groups. Originality/value This study has been conducted in order to provide a comparison of the propaganda content of the main jihadist groups.


Significance Russia suspended all direct flights to the country after Islamic State group (ISG)'s Sinai affiliate downed a Russian A321 Metrojet civilian aircraft departing from Egypt's Sharm el-Sheikh airport on October 31, 2015. Further incidents followed in 2016, including the hijacking of an EgyptAir flight from Alexandria to Cairo in March, and the crash of an EgyptAir flight from Paris to Cairo in May. These developments have focused international attention on the ability of the authorities to ensure aviation safety, and on the intention of locally-based terrorist groups to target the sector. Impacts Egypt's forthcoming report on the Metrojet's black boxes may be ineffective in assuaging concerns about how an explosive device got onboard. Until the flight bans are lifted, prospects for a revival of Egypt's tourism industry are dim. Attacks in Sharm el-Sheikh, Brussels and Istanbul show ISG's interest in taking advantage of airport vulnerabilities. Egypt will make slow progress in reducing the threat from ISG-Sinai.


Subject Emergence of new terrorist groups. Significance As Egypt prepares for presidential elections in the first half of 2018, two additional militant groups add to an already-complex militant landscape, with rising security risks. Although Jund al-Islam’s re-emergence in the Sinai Peninsula could complicate military operations targeting the Islamic State affiliate, Wilayat Sinai, it is the new group known as Ansar al-Islam that poses the more significant threat. Impacts Ansar al-Islam’s presence in the Western Desert threatens a wide area stretching to the outskirts of Cairo and the Nile Valley. Rising salafi-jihadist groups could disrupt the upcoming presidential elections. Violence in the Sinai may spike as the Islamic State affiliate is presented with an al-Qaida-aligned rival. The Egyptian mainland, in particular the Western Desert, could become a key battleground for the new jihadists.


Significance IS will likely look to further expand the scope of its operations in major urban centres, using low-cost attacks with high publicity returns. Impacts Ineffective implementation of security reforms will make it easier for IS to target state institutions. The upcoming elections, UN-planned conference and return of foreign missions may give IS incentive to plan more attacks. Both administrations’ failure to secure the south will allow IS to create alliances with local terrorist groups.


Sign in / Sign up

Export Citation Format

Share Document