Author:
Teichmann Fabian Maximilian
Abstract
Purpose
The purpose of this paper is to illustrate how intelligent terrorist financiers avoid detection when acquiring and subsequently transferring financial assets to finance terrorism. Particular emphasis is placed on cryptocurrency.
Design/methodology/approach
A qualitative content analysis of 30 semi-standardised expert interviews with both criminals and prevention experts led to the identification of means for the circumvention of current combat the financing of terrorism (CFT) measures with a focus on cryptocurrency.
Findings
The findings illustrate, for the benefit of law enforcement agencies, investigators, regulating authorities and legislators, the specific low-risk methods that terrorist financiers use to generate and transfer assets. These findings help to develop more effective prevention methods.
Research limitations/implications
Qualitative findings from the analysis of semi-standardised interviews are limited to the 30 interviewees’ perspectives.
Practical implications
Identification of gaps in existing CFT mechanisms provides compliance officers, law enforcement agencies and legislators with valuable insights into how criminals operate.
Originality/value
The existing literature focuses on organisations that combat terrorist financing and the improvement of CFT measures. This article outlines how terrorist financiers avoid detection. Both preventative and criminal perspectives are considered.
Reference97 articles.
1. Terrorism and the world economy;European Economic Review,2008
2. Tentacles of terror: Al Qaeda’s southeast Asian network;Contemporary Southeast Asia,2002
3. From finances to transnational mobility: searching for the global Jihadists' Achilles Heel’ 2;Terrorism and Political Violence,2006
4. Defining international terrorism: a pragmatic approach;Terrorism and Political Violence,1998
5. Virtuelle währungen aus finanzmarkt- und zivilrechtlicher sicht [in German],2015
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献