How has terrorism financing changed since 9/11?
A Review of New Technologies Facilitating Terrorism Financing
📅 September 12, 2024
📅 September 12, 2024
The financial provisions enacted after the September 11th, 2001, terrorist attacks—particularly those contained in the USA PATRIOT Act and global standards for combating terrorism financing set by the Financial Action Task Force (FATF)—have succeeded in addressing some obvious vulnerabilities in our financial system. However, new technologies and digital assets are transforming the way illicit actors move money, conduct fundraising campaigns, and transact in the global financial system, and terrorist groups and their facilitators are increasingly taking notice.
That’s why it’s critical for financial institutions to be aware of the modern and ever-evolving technologies that allow terrorist groups to move funds and access the financial system.
In addition to tried-and-true methods, such as hawalas, which allow terrorist organizations to transact outside the formal financial system, financial innovations such as digital assets, social media and messaging platforms, and those virtual asset service providers (VASPs) that exercise lax AML/CFT controls are enabling terrorist groups to fund their operations.
The FATF in 2023 assessed that virtual assets pose increasing terrorist financing risks, although most terrorist financing still takes place using fiat currency. Contrary to popular belief, many cryptocurrencies are very traceable and the blockchains along which they travel are transparent and immutable. FATF identified the Travel Rule is a key AML/CFT measure that helps VASPs to prevent terrorists, money launderers, and other criminals from accessing wire transfers to move their digital assets and detect such misuse when it occurs. The rule helps intermediary and beneficiary VASPs and financial institutions to identify and report suspicious transactions and freeze funds and prevent transactions with sanctioned persons or entities.
Technological advances such as crowdfunding platforms, social media, and digital assets are providing terrorist organizations with innovative ways to raise money for their operations. The FATF in October noted in its report on the use of crowdfunding by terrorist organizations and individuals to raise money for their operations that the use of new technologies, and the perceived anonymity afforded by some crowdfunding platforms can make them attractive as relatively quick and simple means to obtain donations from around the world.
[Learn more about terrorist use of crowdfunding in our Expert Insight Report.]
Digital assets with “privacy features” are also enabling terrorist fundraising, helping obscure the involvement of terrorist groups in transactions, according to FATF. For example, various sources have highlighted that ISIS-linked websites have been soliciting funds in Monero – a digital asset that uses a blockchain with privacy-enhancing technologies.
The Southern Poverty Law Center in 2021 reported that white supremacist Greg Johnson regularly solicited donations in digital tokens, such as Bitcoin, Ethereum, Litecoin, privacy coin Monero, Bitcoin Cash, Tether, Cardano, and others.
Terrorist groups soliciting donations of virtual assets are also increasingly turning to stablecoins, according to the U.S. Treasury 2024 National Terrorist Financing Risk Assessment. Stablecoins are virtual assets that are designed to maintain a stable value relative to a national currency or other reference assets and are less volatile than other virtual assets, making them attractive to terrorist groups.
In a post-9/11 world, the onus is on financial institutions to ensure they understand their customer base and correctly identify who is using their bank and gaining access to the financial system. The 9/11 hijackers did not trigger any red flags when they used the U.S. financial system to receive and move funds, because their transactions were unremarkable and they used bank accounts in their own names to fund the operation. After the attacks, the responsibility increased on financial institutions to identify their customers and enhance their customer identification programs, according to Juan Zarate, former U.S. Treasury official, Deputy National Security Advisor for Combating Terrorism under President George W. Bush, and author of Treasury’s War: The Unleashing of a New Era of Financial Warfare.
However, new technologies are making gathering customer identification information difficult. Deep fakes and believable counterfeits are being increasingly used by malign actors to open accounts and conduct transactions. For example, FinCEN in April 2024 warned that counterfeit U.S. passport cards are being used for identity theft and fraud schemes at financial institutions, which could make them attractive for terrorist actors.
With compliance requirements rapidly expanding and methodologies that allow terrorist groups to obtain and move assets becoming more technologically complex, financial institutions may surrender to an instinct to derisk, or simply terminate or restrict business with VASPs and other entities in the digital asset arena out of regulatory concerns as well as worries about inadvertently allowing terrorist actors to access the financial system.
The private sector feels like they’re whipsawed, Zarate says. “Businesses are challenged if they’re derisking too bluntly and challenged if they do take a risk and a problem arises,” Zarate says.
However, regardless of regulatory pressure or posture, financial institutions must understand their risk exposure and know with whom they are transacting. There are international standards about what is expected from financial institutions, according to Zarate, that put the onus on banks, MSBs, and VASPs to use their data better, to use analytics in a better way, and to be more efficient and effective at managing risk.
When transacting with VASPs, financial institutions can and should research the exchange’s ownership and control structure, its know your customer and customer due diligence controls, and its transaction history to ensure that it has not facilitated transfers from wallets linked to terrorist organizations, and other high-risk transactions in which the VASP may have engaged. Adverse media reports can also provide insights into the VASP’s possible connections to terrorism financing.
In the end, Zarate says, you’re not going to be perfect. The important questions are:
Financial crime occurs. Is your financial institution using its resources most effectively to reduce the risk?
This site uses cookies. By continuing to browse the site, you are agreeing to our use of cookies.
Accept settingsHide notification onlySettingsWe may request cookies to be set on your device. We use cookies to let us know when you visit our websites, how you interact with us, to enrich your user experience, and to customize your relationship with our website.
Click on the different category headings to find out more. You can also change some of your preferences. Note that blocking some types of cookies may impact your experience on our websites and the services we are able to offer.
These cookies are strictly necessary to provide you with services available through our website and to use some of its features.
Because these cookies are strictly necessary to deliver the website, refusing them will have impact how our site functions. You always can block or delete cookies by changing your browser settings and force blocking all cookies on this website. But this will always prompt you to accept/refuse cookies when revisiting our site.
We fully respect if you want to refuse cookies but to avoid asking you again and again kindly allow us to store a cookie for that. You are free to opt out any time or opt in for other cookies to get a better experience. If you refuse cookies we will remove all set cookies in our domain.
We provide you with a list of stored cookies on your computer in our domain so you can check what we stored. Due to security reasons we are not able to show or modify cookies from other domains. You can check these in your browser security settings.
These cookies collect information that is used either in aggregate form to help us understand how our website is being used or how effective our marketing campaigns are, or to help us customize our website and application for you in order to enhance your experience.
If you do not want that we track your visit to our site you can disable tracking in your browser here:
We also use different external services like Google Webfonts, Google Maps, and external Video providers. Since these providers may collect personal data like your IP address we allow you to block them here. Please be aware that this might heavily reduce the functionality and appearance of our site. Changes will take effect once you reload the page.
Google Webfont Settings:
Google Map Settings:
Google reCaptcha Settings:
Vimeo and Youtube video embeds:
You can read about our cookies and privacy settings in detail on our Privacy Policy Page.
Privacy Policy