TRUTH BE TOLD

TRUTH BE TOLD
WORLD NEWS EVERY DAY

Tuesday, November 27, 2012

TERROR FINANCING AND FINANCIAL COUNTERTERRORISM "Money means a thousand things in a thousand different minds" (H.G. Wells)

TERROR FINANCING AND FINANCIAL COUNTERTERRORISM
"Money means a thousand things in a thousand different minds" (H.G. Wells)
    It's called financial intelligence (FININT), and there have traditionally been two tactics: (1) "follow the money" and use what you find to hunt down or track terrorists; and (2) "dry up the money" in hopes that you can slow down, disrupt, or dismantle terrorist networks.  The two tactics are not mutually exclusive, but involve different strategic objectives.  Pursuit of these objectives pivot around changes in legislation and law, and frequent changes in statutory authorizations are to be expected in this volatile and active area of commerce regulation.  Some laws are strong, but most are weak.  Controls on international money laundering, for example, may be quite strong while regulations are very weak on the worldwide illegal illicit goods trade, like knockoff designer items, sunglasses, and pirated movies.  Each case of terrorist financing presents its own unique problems.  Terrorist financing isn't like an organized crime pattern where the intent is to monopolize a whole industry or two.  Instead, the behavior is more like transnational crime, picking away at every little loophole, lackadaisical law, and money-making opportunity on a country-by-country basis.  Terrorist financing is best described by Madinger (2006), who calls it diabolically clever or fiendishly complex
    All things considered, the growing nexus between terrorism and crime may actually be a positive development.  Investigation of terrorist behavior on its own is extraordinarily difficult, particularly in the precursor or indicator stages.  It is easier and far less complicated to investigate criminal activity.  Jacobson & Levitt (2010) point out that while many countries refuse to admit they have a terrorist problem (like the Tri-border area of Argentina, Paraguay, and Brazil), they are more than happy to cooperate with U.N. and U.S. authorities on aggressive crime enforcement.  It is easier to prosecute terrorists for criminal activity than crimes of terrorism, and this has the added benefit of sullying their reputation as "freedom fighters" or righteous dissidents.  In the Tri-border area, and elsewhere, it's easy to make a million dollars by smuggling a suitcase full of drugs, but you've got to find a way to travel across borders with it.
    More insidious is the tendency for international terrorist groups to use the economies of developed nations (like the U.S.) for their financing.  Like how many immigrants see the U.S., terrorists see freewheeling, capitalist, market economies as affording all sorts of opportunities to make money.  This was the subject of a lengthy Congressional Research Service report (O'Neil 2007) which analyzed, among other things, whether terrorist fundraising within the U.S. was primarily for starting up "new" terrorist campaigns or maintaining the longevity of "old" terrorist campaigns.  The results are surprising -- since it turns out (from interview data) that there have been fewer terrorist attacks against the U.S. by terrorist groups who raise funds here simply because they don't want to "bite the hand that feeds them."  This presents an immediate problem for domestic counterterrorism officials because what if a funding source was to get dried up, would the terrorist group then consider attacking us?  The answer, according to interviews with captured terrorists, is yes.  It's ironic that allowing some terrorist financing to operate actually protects a country from terrorism.
    The "follow the money" tactic is standard law enforcement practice designed to produce hard evidence which will stand up in court.  The goal is to prove significant steps were taken toward an ongoing plot.  Mounds of evidence are usually collected.  Data mining is the latest incarnation of this tactic as well as detection of any "sleeper" cells or other leads to follow.  Also, and very important to remember, the money-following tactic works best when it is more important to exploit a source than eliminate a source.  The best use of this tactic is for purposes of setting up a warning system or going after bigger fish.  However, a lot of agencies simply go after the "low hanging fruit" or easy-to-convict cases.  You can usually tell if you've got a piece of low-hanging fruit when the mysterious sources of their legal defense fund disappear.  By contrast, the "big fish" defendants will have a dream team of well-paid lawyers at their disposal.  
    The "dry up" tactic has two very important sub-strategies: to disrupt and/or to dismantle.  Disruption is the kind of thing which is attempted by designating certain individuals or organizations as being associated with terrorism.  Such labeling or "naming and shaming" really only produces a harassing, temporary stopgap which will slow them down a little or raise the cost of doing business.  Fortunately, U.S. law is strong in this area.  For example, the Secretary of State gets to designate groups as FTOs (Foreign Terrorist Organizations) and the President gets to designate individuals under Executive Order 13224.  Dismantling is a slightly different sub-strategy which involves an attempt to put a financial network out of business.  This is often very difficult, if not impossible, to achieve.  Terrorist networks are unusually good at finding a "workaround," but sometimes "following the workaround" is just as valuable as "following the money."  About the best that can hoped for here is decreased lethality of future attacks given some resource depletion (although even that may backfire).  It goes without saying that U.S. authorities almost always try to dismantle any network involving weapons of mass destruction.  
    A third tactic, which Buckley & Meese (2004) like to call a "judicious enforcement" strategy goes by a few other names, such as "go straight to jail" or the well-known (in criminal justice) "overcharging" strategy.  It involves prosecutorial overcharging with the intended purpose of performing "perp walks" for the media and putting as many people in prison for as long as possible using every possible law on the books.  Such prosecutions usually involve predicate crimes, conspiracies, inchoate offenses, and material support offenses.  This seems to be a good socio-legal solution, and in many places, is a variant of the low-hanging fruit strategy, but one which reinforces the perception that everything surrounding terrorist financing is probably illegal anyway.  It has the benefit of giving a lot of agencies good practice at getting their interagency cooperation game together, but is also subject to the many already-known disadvantages of an "overcharging" philosophy.  To cite just a few well-known unintended side effects or consequences from the criminal justice literature, there is: e.g.; noble cause corruption; overzealous prosecution; politics intruding upon policy; cases tried in the media; displacement effects; etc.
    Finally, crime makes up a significant part of the the global economy.  How much is anyone's guess, but Reuter & Truman (2004) conservatively estimate that about 5% of the world economy has criminal origins, and Gardner (2007) notes that terrorist financing is different from regular criminal activity in the following five (5) ways:
  • terrorist financing tends to flow more from legitimate sources
  • terrorist financing often involves noneconomic motives
  • terrorist financing frequently involves lesser amounts of money
  • terrorist financing is more geographically dispersed
  • terrorist financing requires more resources to combat it
THE TERRORIST PAYROLL
    It is a mistake to assume that terrorist groups stash large sums of money in secret bank accounts.  To go after such bank accounts would amount to a wild-goose chase and reflect a terrible misunderstanding of how terrorist groups are financed.  They do, however, keep large amounts of cash on hand (usually close to central command and a trusted lieutenant who is often designated as General Treasurer).  They move cash in person (via couriers in small cash increments) and are discreet about how they spend it.  Commanders and lieutenants try to set an example by only carrying two weeks worth of money on them at any given time.  The best analysis of how a terrorist group raises money comes from a group of RAND researchers (Bahney et. al. 2010) who had access to the 2006 capture of financial records for al-Qaeda in Iraq.  A portion of their analysis is presented below:
An Analysis of  Terrorist Group Financing
   Al-Qaeda in Iraq was a franchise operation of al-Qaeda central, so it received a small amount of seed money to get started, but by 2006 was profitable enough as pictured at left for yearly revenue. The largest category (2.3mil) came from selling high-value stolen goods such as construction equipment, followed by revenue sharing from sectors or other franchises (925K), stolen car sales and other merchandise (546K) and "spoils" (473K) which was essentially blackmail money or "looting" from apostates, and then finally donations from charitable sympathizers (233K).

   Major expenses included monthly payments to members, their parents and dependents, and families of imprisoned or deceased members. On average, this amounted to $60 a month. In addition, medical as well as life insurance was provided. A typical attack would include costs for munitions, material, and safe houses, and run about $3000 per attack. Smaller amounts would go toward mail and media costs as well as bribery of local officials.         
    The most striking thing about the above analysis is how undercompensated members are for being a terrorist.  The average pay is anywhere from 50% to 75% less than what an average citizen can make.  However, most people don't join terrorist groups for financial reward.  What is remarkable about terrorist compensation are two things: one, the degree to which family members and dependants are cared for (in some cases, even medical service coverage extended to them); and two, the egalitarian nature of job classification, since captured payroll records never indicated any scheme of pay differential by rank, seniority, or skill.  What terrorist groups are good at is moving money around (back and forth between sectors, franchises, and central command), and carrying out a multitude of operations on the cheap.  They seem to have deliberately chosen a financial strategy which allows them to carry out nearly a hundred attacks per month.  And, they seem to be smart enough to conduct donation and blackmail drives in places where they are not carrying out active attacks. 
    In regards to carrying out terrorism "on the cheap," consider that the Hamburg cell of al-Qaeda spent less than $500,000 to plan and execute the Sept. 11 attacks, and even managed to wire back about $26,000 in surplus funds by coming in under budget.  Subsequent al-Qaeda attacks have cost much less.  Terrorist groups copying the al-Qaeda model try to master "cheap terrorism" via lost-cost, self-funded operations.  Jihadists have been caught shopping at drugstores for bomb ingredients which cost no more that fifteen dollars.  The group responsible for the 2004 attacks in Madrid only needed $80,000 to finance their plot (but was in possession of $2.3 million worth of hashish at the time of their attempted arrest-suicide).  The group responsible for the 2005 London bombings carried it off with only $15,000 (and that included airfare to Pakistan and back).  The group in London raised so much money selling drugs and stolen credit cards that one of the bombers was able to leave behind an estate worth $240,000 after blowing up a subway train (and yes, authorities allowed his family to keep the estate).
    Records indicate that the most money any General Treasurer has sent to al-Qaeda central (or some other franschise) at any given time was about $250,000.  Where they keep the rest of the money is up to the Treasurer's discretion, and there are some indications that they use a network of "deputy treasurers" to keep things dispersed in a kind of "stash house" system.  Terrorists rarely keep money in the bank, and in fact, they are more likely to borrow money from a bank than save there.   They are very skilled at using criminal systems to raise money, and they can collect thousands of dollars in a few weeks.  Some are trained to lead ascetic lives, often keeping their day jobs (which terrorist payrolls account for by cutting a members pay if they have an outside job) and appearing to depend on their families for visible support.  They deliberately try to keep things inexpensive, following a simple formula for homemade explosives stuffed into backpacks, shoes, suitcases, or car trunks.  They are inventive at fundraising, always attempting to outflank the laws.  No crime, from common burglary to white collar fraud, is beyond their repertoire.  Terrorists will be as cheap as they have to be, but quick to jump on the chance at any really big "score."
    SOURCES OF TERRORIST FINANCING
    As Koh (2006) points out, terrorists always seem to have need for a ready supply of cash, and they usually finance their activities in one of three ways: criminal activities, donations, and legitimate businesses.  Crime is traditionally the biggest fundraiser for terrorists, especially narcotics crime.  In Columbia, as much as 90% of terrorist activity is funded from drug trafficking.  Despite having reservations about it, al-Qaeda has also been known to use drug trafficking to finance itself, as are many other Islamic groups in Central Asia, the Balkans, Kashmir, the Caucasus, India, Western China, and Southeast Asia.  Drug trafficking is also commonly used by warlords to finance battles and wars.  Narcoterrorism and terrorist financing go hand-in-hand.  Afghanistan is a country of great concern because it accounts for over 70% of the world opium supply.  It is also important to remember that corruption usually follows in the wake of these kinds of criminal activities.  Kochan (2005), for example, tries to tie together the phenomena of terrorist financing and government corruption.  The two most common crimes are as follows:
  •  Kidnapping for ransom is a lucrative source of terrorist financing, in fact, extremely lucrative for some groups like Abu Sayyaf (Filipino pirates) and the ETA (Basque Homeland and Liberty).  The average take from kidnapping a foreign scientist is about one million dollars, and there's no way to count all the money terrorists get from insurance companies and multinational corporations every year.
  • Tobacco smuggling is often a source of income for terrorists if import/export duties can be evaded, and groups like Hezbollah as well as the IRA have long been involved in this as well as a number of other Islamic groups, and while tobacco might be the number one commodity at present, it could just as well be another commodity next because terrorists, you see, don't believe in buying and selling things via the usual, legitimate outlets.    
    In the eyes of many terrorists, the most prestigious method is credit card fraud.  They seem to take delight in having a capability where computer networks are hacked into and identities are stolen.  Fortunately, not all that many terrorists are smart enough to do this, but the elephant in the room is the threat posed by Russian, Chinese, or German hackers doing their dirty work for them, which, in all fairness, many refuse to do, but for slim reasons having to do with hacker ethics.  Credit card theft can be carried out with or without the use of computers.
    Donations generally account for about half, or 50%, of the money supply that terrorists need.  No one knows for sure, but Islamic groups are believed to have greater recourse to donations.  The Muslim masses around the world make regular donations (zakat, pronounced like sockit) as part of their charitable obligations (2.5% of one's wealth per year), and much of this has been "hijacked" by terrorist groups, at least since the start of the Afghani mujahideen back in the 1980s.  The Taliban in conjunction with al-Qaeda central have always claimed they were the new global Caliph, and accordingly, at least 20% of any profits from their franchise operations should be remitted to AQ-Central in the form of gold, silver, and jewelry.  Interestingly, Islamic banks and sharia finance also usually apply zakat to every transaction they handle, which means that every Islamic bank is, by design, part of the funding of terrorism.  Islamic banking also destroys records after a short time.  Zakat transactions are almost completely untraceable.  Thousands of charitable organizations exist.  Most Islamic charities are nothing more than a "front" for terrorists, and there have been numerous instances of deceptive, so-called "intercharity organizations."  Usually, the most virulent ones either get designated or become the ongoing target of investigations.  Emerson (2006) provides a list of "the seven" which have achieved some degree of notoriety:
  • The Holy Land Foundation for Relief and Development
  • The Global Relief Foundation
  • The Benevolence International Foundation
  • Islamic African Relief Agency
  • The International Relief Association
  • The International Relief Organization
  • Mercy International             
The Case of Blessed Relief Foundation
     Please understand that one could get sued for saying this, but it is nonetheless important to talk about the case of Sheikh Khalid bin Mahfouz, who was personal banker to the Saudi royal family and head of the National Commercial Bank of Saudi Arabia until he sold it to the Saudi government. He currently lives in a swanky pad in London with an Irish passport and multiple U.S. business connections, including the likes of Thomas Kean, chairman of the 9/11 Commission.  Sheikh Mahfouz's lawyers say that like any business executive, he could not have monitored everything, but it was known that prior to 9/11, his bank was wiring money to a charity set up in his name, the Muwafaq (or "Blessed Relief") Foundation, which in turn transferred millions of dollars to Osama bin Laden.  The U.S. government knew about it, and in October 2001, tried to put a stop to it by calling (not formally designating) "Blessed Relief" an al-Qaeda front that receives funding from wealthy Saudi businessmen.  To this day, the charity hasn't been stopped, and in fact, has more branch offices than before, all suspected of being al-Qaeda headquarters for the production of fake documents as well as the primary source of funding for all those Wahhabi mosques which are popping up all over the U.S.
     Why isn't this network dismantled?  The answer is that Shiekh Mahfouz is not only one of the richest men on the planet (even by Saudi standards) but he's well connected with American government officials.  In the summer of 2007, Cambridge Univ. Press took the unusual step of recalling a book about him, entitled Alms For Jihad: Charity And Terrorism In The Islamic World
, because it portrayed him negatively.  There is another book that mentions him, called House Of Saud, House Of Bush, and it is tolerated by the Saudis because it portrays President Bush more negatively than the Saudis.
    Legitimate businesses are a versatile tool for terrorists.  The model is, of course, Osama bin Laden, and he had a number of firms scattered worldwide.  Many of those were shut down and sold shortly after 9/11, leaving bin Laden's power resting primarily in his ability to persuade others to invest in him and al-Qaeda.  However, there still remains a murky, shadowy underworld of former, unidentified business partners, associates, and intermediaries who used to work for bin Laden.  For example, besides construction, the bin Laden empire (parts managed by Osama) included extensive real estate holdings in Europe, a big chunk of the Scandinavian forestry industry, a worldwide fishing boat enterprise, and most scary of all, parts of the hospital industry, especially those parts which handle radioactive material.  This would mean that it's fairly easy for al-Qaeda to get material for a dirty bomb.  Even scarier is the threat of bioterrorism.  The bin Laden empire pretty much had a monopoly (70%) on the gum arabic food additive.  Gum arabic comes primarily from the Sudan, and is not only added to many foods, it is practically in every soft drink and on the coating of almost all candy and pills.  It is believed OBL had a number of other businesses, too, but his accountant defected to the Saudi royal family, and little information sharing has occurred on this because the Saudis prefer to think of it as an internal problem of their own.  The Middle East Intelligence Bulletin occasionally runs articles on the amazing extent of the bin Laden empire.  Legitimate businesses typically used by terrorist groups include construction companies, honey shops, tanneries, banks, agricultural commodities growers and brokers, trade businesses, bakeries, restaurants, and bookstores.
LEGISLATION ON TERRORIST FINANCING
    There are nine (9) specific laws which mainly apply, but it should be understood that legislation prior to 2001 was not specifically aimed at terrorist financing.  Instead, it was aimed at money laundering, which was first addressed in 1970.  Money laundering, simply defined, is the process by which "dirty" money (derived from illegal activity) is disguised as "clean" money (legitimate).  The difference between money laundering and terrorist financing is that the latter isn't always from "dirty" sources.  Terrorist financing may involve legally-derived funds.  A good tool for understanding the evolution of law is FinCEN's BSATimeLine (elaborated upon somewhat later), but perhaps more important are the set of indicators that immediately follow and are standard canon or doctrine in financial counterterrorism:
Indicators of Suspicious Financial Activity
1: Account transactions that are inconsistent with past deposits or withdrawals
2: Transactions involving a high volume of incoming or outgoing wire transfers with no logical or apparent purpose that come from, go to, or transit locations of concern (for example, sanctioned countries, noncooperative nations, and sympathizer nations)
3: Unexplainable clearing or negotiation of third-party checks and their deposits in foreign bank accounts
4: Breaking transactions larger than $10,000 into smaller amounts by making multiple deposits or withdrawals or by buying cashier’s checks, money orders, or other monetary instruments to evade reporting requirements
5: Corporate layering (that is, transfers between bank accounts of related entities or charities for no apparent reason)
6: Wire transfers by charitable organizations to companies located in countries known to be bank or tax havens
7: Charitable bank deposits that lack signs of fund-raising activity (for example, lack of small checks or typical donations)
8: Use of multiple accounts to collect funds that are transferred to the same foreign beneficiaries
9: Transactions without logical economic purpose (that is, no link between the activity of the organization and other parties involved in the transaction)
10: Overlapping corporate officers, bank signatories, or other identifiable similarities associated with the same addresses, references, and financial activities
11: Cash-debiting schemes in which deposits in the United States correlate directly with ATM cash withdrawals in countries of concern; reverse transactions of this nature are also suspicious
12: Issuance of checks, money orders, or other financial instruments, often numbered sequentially, to the same or similarly named person or business
    A Timeline of Financial Counterterrorism Legislation
    (1) Bank Secrecy Act (BSA) -- the 1970 foundation of all antimoney laundering law which is actually a set of specific provisions part of the larger Currency and Foreign Transaction Reporting Act (CFTRA).  BSA focuses on record-keeping requirements which enable authorities to trace money trails.  CFTRA contains the criminal and civil penalties for violating the BSA's record-keeping requirements.  The IRS obtains much of its investigatory power under the BSA.  CFTRA also requires financial institutions to file reports (CTRs or Currency Transaction Reports) when transactions exceed $10,000 and another kind of report (SARs or Suspicious Activity Reports) when the transaction is at least $5,000 and there is reason to suspect the transaction.  The SecTreas (Secretary of the Treasury) has the authority to change these amounts at will.
    (2) International Emergency Economic Powers Act (IEEPA) -- a 1977 law which gives the President broad emergency powers to deal with any national emergency which has its source, in whole or part, outside the U.S., and substantially affects the economy of the U.S.   Specific powers mentioned in the act include the ability to freeze assets, prohibit transactions and/or payments, and prohibit any import/export of currency.   However, the language of IEEPA is sufficiently broad to cover non-economic transactions.  John Lindh was convicted of trading with the enemy under this law, and Mohammed Salah was named a specially designated terrorist under it, making it illegal for anyone, even a grocer, to sell him a loaf of bread. 
    (3) Money Laundering Control Act -- this is the 1986 law which is said to have first "criminalized" money laundering by finally coming up with a workable definition ("known to be derived from unlawful activity in order to further or conceal such activity").  It scoped out three types of money laundering: (a) domestic; (b) international; and (c) attempted, such as what might be uncovered in a sting operation.  If the amount involved exceeded $10,000, the government at trial would not need to prove the second part of the definition (that the defendant meant to conceal...), only the first part of the definition (that the defendant knew the money or property was procured via illegal activity).
    (4) Annunzio-Wylie Anti-Money Laundering Act -- this 1992 law increased the penalties on financial institutions for not filing CTRs and SARs.  The SecTreas was given the power to put a bank or credit union into conservatorship, the Office of the Comptroller of the Currency (OCC) was given the power to revoke bank charters, and the FDIC was given the power to terminate insurance.  This Act was also introduced federal penalties for running a money transmittal business without a license (but licensing regulations varied widely by state).
    (5) Money Laundering Suppression Act (MLSA) -- a 1994 set of exemptions which relieved about a third of all banks from CTR reporting requirements because the government didn't have enough regulators to analyze everything.  A set of new agencies were setup to analyze SARs (the FIU model, which stands for Financial Intelligence Units, which have no investigatory powers of their own, and became a widely circulated model worldwide).  In addition, this act clarified the BSA's applicability to tribal gaming establishments (some who thought they were exempt like the ones in Nevada), adding stricter ID procedures for those who open credit accounts and/or use club cards (full casino compliance with SAR reporting would not take place until 2003).  
    (6) Money Laundering and Financial Crimes Strategy Act ("1998 Strategy Act") -- a 1998 law calling for the designation of certain areas as places where money laundering and related financial crimes are extensive or present a substantial risk.  Such areas are called HIFCAs (High Intensity Money Laundering and Related Financial Crime Areas) and in such areas, there is intensive joint investigative task force activity as well as a strong asset forfeiture component.  Some typical HIFCAs are the Northern District of Illinois (Chicago), the Northern District of California (San Francisco), Los Angeles, New York/New Jersey, and San Juan/Puerto Rico.  HIFCAs work closely with closely with the High Intensity Drug Trafficking Areas (HIDTA) and Organized Crime Drug Enforcement Task Forces (OCDETF).
    (7) Title III of the USA PATRIOT Act -- many changes were made in 2001, but the seven most significant ones are as follows.  Title III of this Act made material support for terrorism a predicate offense for money laundering.  The Act allows the SecTreas to order financial institutions to take "special measures" when terrorist financing is suspected regarding record analysis by institution or region.  The Act prohibits offshore banking utilizing "shell" or correspondence accounts where the alleged bank has no presence in their supposed home country.  The Act restricts the "innocent owner" defense under the rules of evidence for national security purposes.  The Act expands forfeiture power of accounts held in foreign banks under certain procedures where an interbank account handles a substitution of funds.  The Act requires all financial institutions to implement anti-money laundering training programs, and to check the IDs of those who open accounts with a government-provided list of known terrorists.  The Act officially makes FinCEN a part of the Treasury Dept. (which had been kind of quasi-governmental like NIPC in the cybercrime realm).
    (8) Suppression of the Financing of Terrorism Convention Implementation Act -- a 2002 law which made it a criminal offense to collect or provide funds to support terrorist activities, or to conceal such fund-raising efforts, regardless of where the offense is committed or citizenship status.  This legislation can be seen as ratifying a piece of 1999 international treaty law known as the U.N. International Convention for the Suppression of the Financing of Terrorism [pdf] which attempted to establish some uniformity, each nation to enforce similar domestic laws and penalties.
    (9) Intelligence Reform and Terrorism Prevention Act (IRTPA) -- a 2004 appropriations measure which throws about $40 million at two things: computer network upgrades for FinCEN; and training programs to enhance data analysis; both aimed toward secure yet effective cross-sharing of BSA-related investigations with law enforcement both downstream and upstream.  The Act also makes Patriot Act changes a permanent part of BSA, requires yearly progress reports to Congress by the SecTreas, and forces a federal examiner who leaves the government to wait a year before working for a financial institution they examined.
THE CHALLENGES
    Despite numerous laws and vast resources brought to bear on the problem, efforts to cripple a terrorist money supply are often hampered by many challenges.  One of those challenges is the diversity of financial resources at the disposal of terrorists.  The terrorist group, al Qaeda, for example, is typical in having at least four main funding sources: (1) the inheritances and investments of Osama bin Laden; (2) funding from Arab supporters; (3) contributions through Islamic charities; and (4) criminal activity.  Regarding #1, back in the early 1990s, bin Laden's wealth was estimated at about $300 million, and today it is estimated at about $30 million, so most of the inherited money was spent on forming al-Qaeda.  Regarding #2, intelligence officials estimate that al Qaeda receives about $16 million a year from wealthy supporters, about a dozen of them, mostly wealthy Gulf citizens and Saudi bankers and businessmen.  Even though U.S. intelligence has been able to pinpoint this, the Saudi government has been unwilling to cooperate in any investigations.  Regarding #3, Islamic charities are the main source, providing untold billions of dollars every year.  In fact, just one transaction alone (a 2002 transaction from Benevolence International Foundation to a Swiss Bank Account) involved $1.5 billion.  Most Arab governments are unwilling to cooperate with anything involving this zakat, or the making of charitable contributions, which they feel is a Muslim religious duty.   Regarding #4, crimes such as smuggling, counterfeiting, and the narcotics trade make up untold millions of dollars every year.  Terrorist groups regularly use extortion to blackmail not only legitimate people, such as bankers and businessmen, but also drug cartels.  For example, the terrorist group Hamas has been successful skimming money from South American drug lords.  In the Philippines, the Abu Sayyaf Group was successful at levying monthly "revolutionary taxes" from locals.  In Northern Ireland, terrorist racketeering is quite common.  Gunaratna (2002) argues that groups like al-Qaeda has a distaste for drug money, while other groups do not. 
    In the Middle East, the Gulf Cooperation Council (Bahrain, Kuwait, Oman, Qatar, Saudi Arabia, and UAE) once agreed to be bound by the Financial Action Task Force (FATF) recommendations, but little action has been taken, and the group has moved toward common market objectives now.  Some countries flatly deny that their charity organizations are involved in contributions to terrorist organizations.  Further, many countries do not abide by any U.S. list of designated terrorist organizations, with some preferring to use UN-designated lists, and others using their own self-made lists.  This problem of multiple lists creates information sharing blockages, particularly among banks.  The Wolfsberg group, a coalition of some of the world's leading banks, has called for greater cooperation.  Islamic banking (a highly controversial practice) is regulated by numerous advisory and regulatory organs, such as Shari'i Supervisory Boards, the Islamic Financial Services Board (IFSB), and the Accounting and Auditing Organization for Islamic Institutions (AAOIFI).  In a nutshell, Islamic banking uses legal tricks and word games (such as the "time value of money" as opposed to "interest on borrowed money") to make profit (even though Shari'i law prohibits usury and interest), and then there is the time-honored Saudi tactic of using holding companies to manage property loans (assisted by American law firms like Shearman & Sterling who specialize in shari'i-compatible mortgage instruments involved in the many Saudi holding companies which own tons of mini-malls across America).     
    In Europe, one of the main agencies involved in terrorist finance tracking is SWIFT (Society for Worldwide Interbank Financial Telecommunication).  Following 9/11 and up until around 2009, this Belgium-based agency shared large amounts of its data to counterterrorism authorities.  Privacy concerns in the EU have scaled that back some, but SWIFT data still provides the best way to monitor possible large-scale terrorist financing (along with CHIPS -- Clearing House Interbank Payments System -- which likewise monitors large-scale transactions in the U.S.).  Intelligence agencies as well as cabinet agencies can access these databanks, although since 2010, the EU has put in place certain privacy protections, similar to the ones which limit information sharing about passenger name records (PNRs) -- the information that passengers give to travel agencies and airlines to book flights.  Both the use of bank records and flight records have resulted in some notable successes at stopping the international spread of terrorism. 
    In Africa, Central Asia, and the Caucasus, the problems are somewhat different due to an extreme lack of financial oversight and the frequent political turmoil in the region.  In particular places where state rule has failed, like Somalia, the economy runs almost entirely upon the famous Hawala system (see Wikipedia Entry on Hawala).  This system exists throughout the world for many purposes, but primarily as one of the major means immigrants to the West send money home.  In the U.S., hawala is regulated as a money services business (MSB), but in the rest of the world, it is rare to find it regulated.  Even when banks and normal channels are blocked or monitored, terrorists often resort to old-fashioned methods, such as cross-border, personal travel with loads of cash or other assets.  Border security is not as it should be in many places, thus enabling this, and most nations do not have the same customs limits regarding the amount of cash which can be carried in or out. 
    Terrorists are goldbugs.  They have long ago figured out that putting money in bank accounts, particularly in America or Western Europe, is NOT a good idea, especially if you want to make sure it's available when you want it.  Therefore, a distinct terrorist preference has evolved for untraceable stores of wealth.  DeYoung & Farah (2002) report that even before 9/11, al-Qaeda was trading a lot of cash (fiat currency) for gold, diamonds, tanzanite, and saphires.  Gold and silver are hallmarks of a barter economy, and conversion of worrisome paper currency (which might collapse or lose value) into precious metal commodities is a wise thing to do, especially in difficult and troubled times.  Precious metals and gemstones have long funded guerrilla warfare for decades, but besides traditional gold and silver, here are some other commodities that are appearing as wealth preservation strategies for terrorist groups:
diamonds rubies coltan emeralds bauxite
Diamonds, particularly blood or conflict diamonds, fuel insurgencies, spark revolutions, and pay for terrorism, especially in places like Angola and Sierra Leone. Estimated global trade: $9 billion Rubies, especially the "pigeon blood" ones from Burma (Myanmar) are frequently what military juntas and terrorists use to raise profits. Estimated global trade: $300 million Coltan, short for columbite-tantalite, is a metallic ore used for making cell phones and mined in the war-ravaged Kivu region of Congo which fuels much bribery and warfare. Estimated global trade: $180 million Emeralds, especially Columbian ones, are the favorite of drug lords, organized crime groups, and death squads. Estimated global trade: $140 million Bauxite is used to make the aluminum that goes into everything, and Guinea is the world's primary supplier which military juntas use to enrich themselves and evade sanctions. Estimated global trade: $130 million  
A CASE STUDY IN TERRORIST FINANCING
    Abad Elfgeeh, a 51-year old, ice cream store owner in Brooklyn, originally from Yemen, was arrested by authorities in January 2003 following a broad terrorism investigation that began in December 2001.  In February 2006, he was sentenced to 6months to 15 years in federal prison and fined $1.25 million for illegally funneling nearly $22 million overseas from a period between 1995 and 2003.  The route the money took was by way of a JPMorgan Chase bank account to countries all over the world, including Pakistan, Thailand, and Yemen.  One of the recipients, a Yemeni sheikh who boasted of al Qaeda ties, was also caught up with by authorities, extradited, and sentenced to 75 years in prison.  What is significant about this "typical" terrorist financing case is that the sender received less punishment than the receiver.
    At trial, Elfgeeh acknowledged the credibility of a secretly tape-recorded conversation between him and the sheikh where it was clearly apparent they knew they were funding Hamas and al Qaeda.  However, the methods by which the wiretapped conversation was obtained became suspect at trial.  The judge gave Elfgeeh a lesser sentence because the government could not make a strong enough case for conspiring to finance terrorism, and the only offense to stick was the lesser offense of running an illegal money-transmitting business (which normally carries a 19 year minimum).  In his defense, Elfgeeh said he "intended to get a license, but never got around to it."  Via a number of other good legal strategies, his defense was successful at portraying him as a confused person who didn't understand things, and the possible victim of ethnic profiling.  This portrayal, as well as the following rule of evidence, helped him avoid a longer sentence. The rule of evidence is that prosecutors cannot raise the topic of terrorism at trial unless the defense does first in cases where they do not have sufficient evidence to charge somebody with a terrorism-related crime.  Once the wiretap evidence was thrown out, prosecutors were prohibited from even mentioning Hamas or al Qaeda.  It is like that in many terrorism trials. For example, in the 2005 trial of Sami Al-Arian, the court found that thousands of hours of secretly recorded tapes were the equivalent of outrageous government conduct.  In the Elfgeeh case, authorities wanted to also charge Elfgeeh's brother, Ahmed, since telephone intercepts between Ahmed and the sheikh clearly implicated the two in terrorist plots, possibly even the 9/11 plot.  However, as with many cases involving wiretaps, intercepts, and other examples of "outrageous" government conduct -- admittedly a more common trial defense in pre-Patriot Act days -- sufficiency of evidence was not strong enough, and Ahmed was never charged.
    What judges seem to want proof of in terrorist financing cases is ironclad evidence that some specific money (preferably in marked bills) was transferred illegally (without innocent intent) for specific use in funding terrorism (blowing something up).  It may be noted that the collection of evidence at both ends is quite difficult in itself (i.e., money is commingled at both ends), but authorities have concentrated on the middle -- the process of transfer.  Transferring or converting money is, after all, the essence of the crime.  The uncovering of money laundering trails has always been a complex and painstaking task, but what makes it difficult for authorities is that criminals often do everything in their power to make things look like the transfer involves charitable or familial issues. 
    For example, Elfgeeh's ice cream store was a hawala outlet.  Hawala is an informal money-remittance service that operates faster and cheaper than companies like Western Union.  It serves the Muslim world mainly.  It is not feasible to shut down the whole hawala system since families back in home countries would starve.  Yet, terrorist groups such as al-Qaeda have used hawala to transfer funds.  And, it's a lot safer than simple cash-smuggling in today's age of stricter border security.  Currently in the U.S., there are approximately 20,000 hawala outlets in the form of convenience stores, restaurants, and ice cream shops, mostly located in tight-knit ethnic neighborhoods in big cities where everyone speaks Urdu, Arabic, or Hindu.  It's an "informal" system which means that no records are kept -- all that exists are maybe some scribbles of a named recipient, some code words, and the amount.  Here's how it works in detail:
How Hawala Works
     Hawala is Arabic for "trust" or "exchange." It has been around for hundreds of years as a remnant of the trade routes used by Silk Road merchants. Similar systems include the South Asian "hundi," the South American "black market peso," the Thai phoe kuan (message houses), and a Chinese informal banking system known as fei ch'ien (flying money). The way it works in the Arab world is often private, with hawala dealers calling, faxing, or emailing other dealers on behalf of customers. Some hawala dealers elect to be designated a hawaladar. This kind of designation is not recognized by most American banks, but is at many overseas banks, especially at the Bank of Dubai.  It lets the banking officials know that sometimes "extra" money is going to be mixed in with traditional store revenues. After accepting a customer's order, the hawaladar contacts a colleague -- often a friend or family member -- in the destination country.  These contacts promise to deliver an equal amount of cash to the named recipient within 24 hours, usually for a small fee.  These contacts and the hawaladar then settle up with one another weeks later, frequently with a complex mix of wire transfers, over invoicing, and/or trade schemes involving commodities, jewelry, or gemstones. Money and valuables are then either kept on hand or "laundered" as business profits.     
    The hawala system persists despite many not-so-infrequent scandals.  In 1995, for example, Turkey discovered that doctors and hospitals had set up a payoff scheme using hawala to extort money out of patients awaiting kidney transplants and other surgeries.  In 2000, hawala was found to be involved in an extensive bribery scandal in India where the bribes were used to payoff politicians in support of both immigration papers to the U.S. and funding for militants in Kashmir.  The world's largest bank, Citigroup, has repeatedly been involved in money-laundering scandals involving hawala or hawala-like systems.  Likewise, the Riggs bank (now part of PNC Bank) has been involved, ironic since it was the Washington DC bank which presidents and dictators used for years for their personal accounts.  The 9/11 Commission Report said that the bulk of the funds used to finance the 9/11 attacks were not sent through the hawala system, but rather by inter-bank wire transfer via the SunTrust Bank in Florida.
HAWALA AND AL-BARAKAT
    Several of the captives held in extrajudicial detention in Guantanamo Bay detainment camps are held because they worked for hawalas.  In fact, since 9/11, there has been a moderately effective crackdown on hawala, as well as a few high-profile cases of authorities chastising U.S. banks.  However, there is a second system, often referred to as a modern form of hawala, called Al-Barakat (see Wikipedia Entry on Al-Barakat).  Al-Barakat originates from Somalia, and as if that stateless country were trying to prove something, Al-Barakat (which means "The Blessed" in Arabic) is the closest thing to a formal economy there.  In fact, Al--Barakat is the largest employer in Somalia.  Since 9/11, it has spread to about 40 other countries, including the U.S., especially in Minneapolis, where about half of America's Somali immigrants live.  Al-Barakat differs from Hawala in that the former operates more out in the open, instead of behind ice cream shops.  The offices of brokers tend to look more like telephone shops, which makes sense, since Al-Barakat is a leading phone and Internet provider for much of the Arab world.  Al-Barakat operates more like an "Arab Western Union" where fees (a 2% surcharge) are collected at the point of origin, regular bank wire transfers are involved (usually Bank of America and a Dubai clearinghouse), and officials at Al-Barakat offices attempt to find or notify the intended recipient.
    Clearly, Al-Barakat records and information would make for interesting intelligence, but like hawala, there is no cooperation with authorities and records are shortly destroyed.  Essentially, the system gets by via using the names of "brokers" as "straw" originators and recipients.  The true identities of senders and receivers are secret.  Both American and international authorities have been investigating Al-Barakat for years, and the best that they can do seems to be "black listing" some of the banks involved and the name of Al-Barakat Bank itself.  Four major investigations have taken place since 2003, but none of them have resulting in any convictions.  Blacklisting does, however, result in a "freeze" on assets.  Freezing of assets can be done via international law, or as is more effective, under U.S. Law, per the 2002 National Money Laundering Strategy (NMLS).  NMLS allows disparate agencies of the federal government (primarily Treasury, Justice, and State) to overcome any jurisdictional roadblocks in order to locate and freeze the assets of terrorists, wherever they may be located. 
    NMLS freezes terrorist-related assets on a global scale. The U.S. government has frozen over $35 million in terrorist-related assets since 9/11, and the international community has frozen an additional $78 million. Freezing by itself accomplishes little more than monitoring, but subsequently (and usually), it leads to dismantling.  In terms of enforcing a "freeze," Treasury usually deploys Customs attachés and representatives from Treasury's Office of Foreign Assets Control (OFAC) to facilitate law enforcement cooperation with host countries.  Often, in the wake of a freeze, a host country's legal system is used to press charges and/or make arrests.  However, the U.S. is fortunate in that there is widespread agreement over the mechanism of the "freeze."  Currently, 165 countries allow for such blocking orders and/or the confiscation of property.  Even if a frozen violator is not charged with anything, the action tends to "shake them up" a bit and results in better regulation.
POST-9/11 TRENDS IN TERRORIST FINANCING
    Emerson (2006) has documented the explosion of nontraditional methods since 9/11, and the bottom line is that terrorists have gotten less better at raising vast amounts of sums quickly, but have become much better at moving small amounts of funds around quickly.  Charities are less relied upon than before 9/11, and the following activities constitute the newer trends:
  • Organized shoplifting -- and return of merchandise back to stores for refund, then wiring money to the Middle East.  Apparently, terrorist sympathizers have organized retail theft rings targeting merchandise such as health and beauty aids and colognes and perfumes.  One such ring (the Ghali organization) was caught in Texas during 2004 doing just this, with the unusual thing being that this Palestinian group was cooperating with the African American gang group known as the Crips.  Another group in Arizona was caught during 2005 running a fencing operation involving infant formula stolen from warehouses.  Also in 2005, groups in North Carolina and Georgia were caught in a shoplifting retail scam involving over-the-counter medicines. 
  • Mosque bookkeeping -- the SAAR Network has, of course, been well known for awhile, SAAR named after Suleiman Abdel Aziz al-Raghi, a wealthy Saudi patron of the Northern Virginia enterprise, and was raided in 2002 during Operation Green Quest (see Customs Overview of OGQ or archives of Site Institute), but what is new is the extent to which mosques around the US are using the same bookkeeping firms that have been used by organized crime groups, white collar crime groups, and/or corporations that have been sanctioned or fined.  Likewise, law firms in the US which have experience in handling "high profile cases" are regularly retained by mosques.
  • Drug trafficking -- there has been a linear increase in the ideological statements issued by Islamic terrorist groups, who normally disdain involvement with drugs in any way, toward justifying drug operations as part of Jihad.  In a classic statement of narco-terrorism, one Afghani drug lord in particular, Baz Mohammed, was quoted as saying that not only did the sale of heroin help out the cause of Jihad, but the drug helped kill Americans too. 
    There's more, much more.  For instance, there's Sharia banking in the U.S. and Canada.  About 17 different banks exist in North America (and more are created every year) to provide Sharia-compliant mortgages, insurance, taxi licensing and investment funds to help serve a region's fast-growing Muslim population.  The origin of Islamic banking has its roots in the 1920s, but did not start until the late 1970s due to the inspiration from two founders of terrorist groups: Abul Ala Maududi of the Jamaat-e-Islami in Pakistan and Hassan al-Banna of the Muslim Brotherhood in Egypt.  Sharia banks are most advanced in the country of Pakistan.  They claim don't charge interest, but they do.  With regard to "regions of fast-growning Muslim populations," take the city of Philadelphia, for example, where Muslim musician multi-millionare Kenny Gamble is buying up huge swaths of property and not only relying upon Sharia banks, but getting state and federal money (from the Mayor and Governor) to finance his urban renewal operation to build a large muslim enclave in the city.  Kenny Gamble (better known in Muslim circles as Brother Luqman Abdul Haqq) is best known for hit songs like "Me and Mrs. Jones" and "I'm Gonna Make You Love Me."  His closest friend is H. Rap Brown (better known in Muslim circles as Jamil Al Amin) who is currently serving a life sentence for killing a police officer.  H. Rap Brown had to be transferred to a supermax facility in 2007 on suspicion that he, with his high-profile connections to the outside world, was involved in directed Black Muslim terrorist activities from within prison.  The two men were both unindicted co-conspirators in the 1993 World Trade Center bombing.
  • Counterfeiting -- any commodity can be counterfeited, and one of the most interesting groups in this regard is Jammat ul-Fuqra, the suspected-of-terrorism Black Muslim group which, among other things, runs a training camp over in Dover, Tennessee.  They have been exposed repeatedly by folks such as Atlas Shrugs, SATP, and the Northeast Intelligence Network.  In 2007, their New York base of operations was finally busted by the FBI for raising $7 million in a counterfeit clothing scam, generic brake pads, and pirated CDs.  Al-Fuqra has been around a long time.  Back in the 1980s, they were involved with hotel and nightclub bombings.  Interpol says they send their money straight to al-Qaeda, but American authorities say they use it primarily to radicalize black American prisoners.  A closer look at this group might be warranted.
A Close-Up Look at ul-Fuqra
     Jamaat ul-Fuqra (JF) or "community of the impoverished" was originally formed in 1980 by a Pakistani cleric, Sheikh Mubarak Ali Gilani, on his first visit to the US. where he became convinced that Islam needed to "purify" itself from Western influence through violence. Gilani was the one Daniel Pearl was attempting to meet before he disappeared in Karachi. JF is loosely structured with certain elements working openly through social service organisations to recruit members, raise money, organise activities and carry out propaganda. Most members ('Jamaats') live on JF premises ('communes') that not-so-loosely resemble terrorist training camps which house from 100 to 300 people. Secrecy is the hallmark of the Jamaats and they are well versed in the use of aliases. Armed members guard their compounds and do not allow outside visitors. A large segment of JF members have been convicted of criminal acts, including murder and fraud.  Their early history (1980-1990) involved some unsolved assassination cases, and their recent history is more along the lines of fraud.  For example, in 1993, the state of Colorado tried to go after JF members who were told to find work in the community and file bogus workers compensation claims. They actively recruit black Americans from prison, and operate under various pseudonyms such as Muslims of America or Quaranic Open University. They are headquartered in Hancock, NY which has a mosque, school house, grocery store and a firing range. Their training camps are suspiciously close to U.S. critical infrastructures. For example, their Hancock, NY site is adjacent to a reservoir which provides drinking water to five NYC boroughs.  Other sites are in Dover, TN; Marion, AL; Augusta, GA; Talihina, OK; York County, SC; Roanoke, VA; Tulane County, CA; and rural Washington State, Colorado, Michigan, and Illinois.
THE FUTURE OF TERRORIST FINANCING
    It seems that terrorist financing is like a hydra with 200 heads.  You cut one off, and it grows two more.  Regulation is a burdensome effort, involving reams and reams of paperwork which ultimately cannot be kept up with.  Freezing of assets, which sometimes leads to regulation, but more often leads to international law enforcement, seems to be a deterrent "that works," for now.  In the meantime, terrorists are busy finding new ways to finance their activities.  Among them are the following:
  • Matricular consular -- these are ID cards issued to (illegal) immigrants as a way of allowing them to open accounts at over 100 mainstream banks.  They often substitute for passports.  Forgeries are common. As long as false identity is a commonplace practice, terrorist financing will persist.
  • Prepaid debit cards -- these are ATM cards issued by Wal-Marts, department or convenience stores. They can even be purchased over the Internet, and are called stored value cards.  They are rapidly becoming a means of terrorist financing.
  • PayPal -- this is the Internet's main way of making online purchases or donations, MoneyBookers being another.  You do not need a credit card to use these services, and they represent a growing and largely unregulated financial services industry  
  • Mobile phones -- It hasn't caught on in the U.S. yet, but in many parts of the world, like the Philippines and Ireland, a person can deposit money into a phone account and a text message is sent to the recipient, who can then withdraw the money (using a secret code) from any telephone company office.
  • Wi-Fi -- mobile or wireless Internet technology allows some of the best encryption around.  Businesses use VPN, for example, to avoid surveillance, and savvy terrorists do too.
  • International partnerships -- when companies like Wells Fargo and Western Union establish agreements with stores like McDonalds and 7-Elevens (two of the fastest growing stores in the world), these wire services will have more worldwide coverage, and the nature of the partnership agreement may pose challenges for regulators and investigators.
INTERNET RESOURCES
A Dissertation on Islamic Banking
Answers.Com Entry on Freezing of Terrorist Assets
Atlas Shrugs Cases of Post-9/11 Terror Financing
CFR Task Force Report 40B: 2004 Update on Global Campaign against Terrorist Financing
DHS Article on Terrorist Financing
Financial Action Task Force Report on Types of Terrorist Money Laundering (pdf)
Financial Action Task Force website
Financial Crimes Enforcement Network (FinCEN)
Interpol Page on Hawala Remittance System
Pictoral Diagram of How Hawala Works
TerroristFinancing.com
The Terror Finance Blog
What is a HIFCA?
Wikipedia Entry on Hawala
Wikipedia Entry on Islamic Banking
Wikipedia Entry on Terrorist Financing
Year 2000 Report on STR Analysis/FIU Units in Foreign Nations (pdf)

Year 2006 State Dept. Report on Foreign Nation Money Laundering Initiatives
PRINTED RESOURCES
Adams, J. (1986). The financing of terror: The PLO, IRA, Red Brigades, and M-19. NY: Simon & Schuster.
Addicott, J. (2008). Terrorism law: Materials, cases, comments, 5e. Tucson, AZ: Lawyers & Judges Pub. Co.
American Foreign Policy Council. (2005). Confronting Terrorism Financing. Lanham, MD: Univ. Press of America.
Bahney, B., Shatz, H., Ganier, C., McPherson, R. & Sude, B. (2010). An economic analysis of the financial records of al-Qa'ida in Iraq. Santa Monica, CA: RAND.
Blunden, B. (2001). The money launderers: How They Do It, and How to Catch Them. Chalford, UK: Mgt Books.
Buckley, P. & Meese, M. (2004). "The financial front in the global war on terrorism." Pp. 51-61 in R. Howard & R. Sawyer (eds.) Defeating terrorism. NY: McGraw Hill.
Burr, J. & Collins, R. (2006). Alms for Jihad: Charity and Terrorism in the Islamic World. NY: Cambridge Univ. Press.
Cassara, J. (2006). Hide and seek: Intelligence, law enforcement, and the stalled war on terrorist finance. Dulles, VA: Potomac Books.
Commonwealth Secretariat. (2007). Combating money laundering and terrorist financing. London: CS.
DeYoung, K. & Farah, D. (June 18, 2001). "Al Qaeda shifts assets to gold: Funds put in untraceable commodities." Washington Post, A01.
Ehrenfeld, R. (2005). Funding evil: How terrorism is financed and how to stop it. Los Angeles: Bonus Books.
Erlande, M. (Ed.) (2006) Terrorist financing. NY: Nova Science Publishers.
Emerson, S. (2006). Jihad incorporated: A guide to militant Islam in the US. NY: Prometheus Books.
Farah, D. (2004). Blood from stones: The secret financial network of terror. NY: Random.
Gardner, K. (2009). "Terrorism defanged." Pp. 157-186 in D. Cortright & G. Lopez (eds.) Uniting against terror. Cambridge, MA: MIT Press.
Gunaratna, R. (2002). Inside al qaeda: Global network of terror. NY: Columbia Univ. Press.
Jacobson, M. & Levitt, M. (2010). "Tracking narco-terrorist networks: The money trail." Fletcher Forum on World Affairs 34 (1: Winter): 117-24.
Kochan, N. (2005). The washing machine. NY: Thomson Texere.
Koh, Jae-myong. (2006). Suppressing terrorist financing and money laundering. NY: Springer. $129
Lilley, P. (2000). Dirty dealing: The untold truth about global money laundering. London: Kogan Page.
Madinger, J. (2006). Money laundering. Boca Raton, FL: CRC Press.
Naylor, R. (2002). Wages of crime: Black markets, illegal finance, and the underworld economy. Ithaca, NY: Cornell Univ. Press.
O'Neil, S. (2007). "Terrorist precursor crimes: Issues and options for Congress." CRS Report RL34014 (May 24).
Pratt, R. (2005). How to combat money laundering & terrorist financing. NY: CBP Ltd.
Reuter, P. & Truman, E. (2004). Chasing dirty money. Washington DC: Inst. Inter. Economics.
Richard, A. (2006). Fighting terrorist financing: Transatlantic cooperation. London: JHU-SAIS. 
Savla, S. (2001). Money laundering and financial intermediaries. Hague: Kluwer Law International.
Serrano, M. (2004). "The political economy of terrorism," in J. Boulden & T. Weiss (eds.) Terrorism and the UN before and after 9/11. Bloomington: Indiana Univ. Press.
Winer, J. & Roule, T. (2002). "Fighting terrorist finance." Survival 44(3): 87-104.
Last updated: Sept. 09, 2012
Not an official webpage of APSU, copyright restrictions apply, see Megalinks in Criminal Justice
O'Connor, T.  (2012). "Terror Financing." MegaLinks in Criminal Justice. Retrieved from http://www.drtomoconnor.com/3440/3440lect03asecure.htm.

No comments:

Post a Comment