Dancing in the dark: terrorist financing via the dark web

Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

2 Citations (Scopus)

Abstract

Understanding the ways in which terrorist organisations manage their assets is critical to depleting those organisations of their funds and, ultimately, disrupting their activities. Terrorists continue to adapt to evolving technologies and communication platforms in the deployment of more obscure terrorist financing techniques. With little regulation, low barriers to entry, and numerous opportunities, the dark web appeals to terrorists seeking to securely receive large amounts of money from supporters beyond law enforcement oversight. The dark web offers a high degree of anonymity that is fortified through the use of decentralised cryptocurrencies. While cryptocurrencies are used also for legal purposes, their pseudonymity and their lack of independent regulation have made them an attractive vehicle for terrorists. This has created a jackpot for terrorist financing and, simultaneously, exposed a legal blind spot for regulators. The key objective of this paper is to shed light on the prevalent use of the dark web by terrorist organisations in furtherance of terrorist financing activities.
Original languageEnglish
Title of host publicationFinancial crime and the law
Subtitle of host publicationidentifying and mitigating risks
EditorsDoron Goldbarsht, Louis de Koker
Place of PublicationCham, Switzerland
PublisherSpringer, Springer Nature
Pages167–190
Number of pages24
ISBN (Electronic)9783031595431
ISBN (Print)9783031595424
Publication statusPublished - 2024

Publication series

NameIus Gentium: Comparative Perspectives on Law and Justice (IUSGENT)
PublisherSpringer
Volume155
ISSN (Print)1534-6781
ISSN (Electronic)2214-9902

Keywords

  • Cryptocurrencies
  • Dark web
  • Social media
  • Terrorist financing
  • Terrorist organisations

Fingerprint

Dive into the research topics of 'Dancing in the dark: terrorist financing via the dark web'. Together they form a unique fingerprint.

Cite this