Fundraising
Terrorist Use of Virtual Currencies
September 18, 2023This paper explores the risk that virtual currencies (VCs) may become involved in the financing of terrorism at a significant scale. VCs and asso- ciated technologies hold great promise for low cost, high speed, verified transactions that can unite coun- terparties around the world. For this reason they could appear appealing to terrorist groups (as ...
Terrorism Financing with Virtual Currencies – Can Regulatory Technology Solutions Combat this?
September 18, 2023This article considers the terrorism financing risk associated with the growth of Financial Technology (FinTech) innovations and in particular, focuses on virtual currency (VC) products and services. The ease with which cross-border payments by virtual currencies are facilitated, the anonymity surrounding their usage and their potential to be converted into the fiat financial system, make ...
Cyberspace, Terrorism and International Law
September 18, 2023Governments have long worried about terrorists using the Internet to launch cyberattacks, spread propaganda, recruit and radicalise individuals and raise funds. However, the Islamic State’s exploitation of social media has caused a crisis and generated questions about international law’s role in addressing terrorism in cyberspace. This article analyzes international law in connection with potential terrorist ...
Isis and the Internet
September 18, 2023Documentary: Isis and The Internet premieres Friday April 1st at 10pm ET on MSNBC. ...
Terrorist Migration to the Dark Web
September 18, 2023The terms Deep Web, Deep Net, Invisible Web, or Dark Web refer to the content on the World Wide Web that is not indexed by standard search engines. The deepest layers of the Deep Web, a segment known as the Dark Web, contain content that has been intentionally concealed including illegal and anti-social information. The ...
The Use of Social Media by Terrorist Fundraisers and Financiers
September 18, 2023Financiers and fundraisers for al-Qaida and Islamic State (ISIS) are active users of popular social media platforms, such as Facebook, Twitter, YouTube and Instagram, in some cases even after being placed on a United Nations or US government sanctions list. Terrorist financiers and fundraisers have utilized social media to attract and direct funding to procure ...
Terrorist Use of Internet: Possible Suggestions to Prevent the Usage for Terrorist Purposes
September 18, 2023As new developments occur everyday in technology, terrorists are easily adjusting themselves to this change. In this new age of terrorism, terrorism is transnational, institutionalized, technologically advanced, and global. In this respect, today’s terrorist organizations are using the Internet for different purposes. The Internet has become the new and main source of communication in terms ...
Daesh and the Terrorist Threat: from the Middle East to Europe
September 18, 2023It is an undeniable fact that the issue of terrorism, both as a theoretical area of analysis and as a practical phenomenon, has grown exponentially in significance over the past few decades. Indeed, terrorism has for some time stopped being a term solely discussed in academic settings and in strategic documents, but has recently been ...
ISIS in Cyberspace: Findings from Social Media Research
September 18, 2023The Syrian conflict led to a resurrection of ISIS in terms of recruitment, financing, propaganda, and enlisting itself as an actor in the Middle East. ISIS’s ability to use both social media and other traditional methods of recruitment requires countries like Turkey to adopt multi-faceted approaches in order to be more effective. Cyberspace, and particularly ...
A Systematic Examination of Terrorist Use of the Internet
September 18, 2023The design of the Internet has made it an especially useful tool to terrorist groups. Using the Internet, terrorist groups have been especially successful in recruiting new members and exciting them into action. Previous works have provided comprehensive accounts of ways that terrorists use the Internet. This article expands on the understanding of this phenomenon ...