<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Insight Monitor]]></title><description><![CDATA[Global security, terrorism, espionage and illicit financing -- news and analysis you won't find anywhere else! ]]></description><link>https://newsletter.insightthreatintel.com</link><image><url>https://substackcdn.com/image/fetch/$s_!I_1w!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4649d7af-94ce-49ea-8c58-368ec26cd423_900x900.png</url><title>Insight Monitor</title><link>https://newsletter.insightthreatintel.com</link></image><generator>Substack</generator><lastBuildDate>Mon, 20 Apr 2026 13:06:14 GMT</lastBuildDate><atom:link href="https://newsletter.insightthreatintel.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Jessica Davis]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[jmd@insightthreatintel.com]]></webMaster><itunes:owner><itunes:email><![CDATA[jmd@insightthreatintel.com]]></itunes:email><itunes:name><![CDATA[Jessica Davis, PhD]]></itunes:name></itunes:owner><itunes:author><![CDATA[Jessica Davis, PhD]]></itunes:author><googleplay:owner><![CDATA[jmd@insightthreatintel.com]]></googleplay:owner><googleplay:email><![CDATA[jmd@insightthreatintel.com]]></googleplay:email><googleplay:author><![CDATA[Jessica Davis, PhD]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Iran's financial tradecraft on the blockchain]]></title><description><![CDATA[How Iran uses a hybrid threat finance system to fund its proxies and sanctions evasion activities.]]></description><link>https://newsletter.insightthreatintel.com/p/irans-financial-tradecraft-on-the</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/irans-financial-tradecraft-on-the</guid><dc:creator><![CDATA[Jessica Davis, PhD]]></dc:creator><pubDate>Tue, 14 Apr 2026 13:01:16 GMT</pubDate><enclosure url="https://images.unsplash.com/photo-1640833906651-6bd1af7aeea3?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxjcnlwdG98ZW58MHx8fHwxNzc1NzYzNzE2fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Hello Insight Monitor subscribers, and welcome to another edition of our series examining how Iran uses cryptocurrency for sanctions evasion and terrorist financing. Today, we&#8217;re looking at the financial tradecraft that Iran uses to hide its money on the blockchain, all in the context of shifting economic and financial pathways for the Iranian regime. Get caught up and have a read! </em></p><p>In part 1 of this series, we explained the context of the Iran sanctions and how Iran began widespread cryptocurrency use in 2018, largely as a response to those sanctions. We highlighted Iran&#8217;s role in mining Bitcoin, which creates liquidity for the regime while also leveraging its oil surplus.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://images.unsplash.com/photo-1640833906651-6bd1af7aeea3?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxjcnlwdG98ZW58MHx8fHwxNzc1NzYzNzE2fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://images.unsplash.com/photo-1640833906651-6bd1af7aeea3?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxjcnlwdG98ZW58MHx8fHwxNzc1NzYzNzE2fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1640833906651-6bd1af7aeea3?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxjcnlwdG98ZW58MHx8fHwxNzc1NzYzNzE2fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1640833906651-6bd1af7aeea3?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxjcnlwdG98ZW58MHx8fHwxNzc1NzYzNzE2fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1640833906651-6bd1af7aeea3?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxjcnlwdG98ZW58MHx8fHwxNzc1NzYzNzE2fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1456w" sizes="100vw"><img src="https://images.unsplash.com/photo-1640833906651-6bd1af7aeea3?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxjcnlwdG98ZW58MHx8fHwxNzc1NzYzNzE2fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" width="273" height="181.63888888888889" data-attrs="{&quot;src&quot;:&quot;https://images.unsplash.com/photo-1640833906651-6bd1af7aeea3?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxjcnlwdG98ZW58MHx8fHwxNzc1NzYzNzE2fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:4024,&quot;width&quot;:6048,&quot;resizeWidth&quot;:273,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;a pile of bitcoins sitting on top of a pile of gravel&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="a pile of bitcoins sitting on top of a pile of gravel" title="a pile of bitcoins sitting on top of a pile of gravel" srcset="https://images.unsplash.com/photo-1640833906651-6bd1af7aeea3?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxjcnlwdG98ZW58MHx8fHwxNzc1NzYzNzE2fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1640833906651-6bd1af7aeea3?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxjcnlwdG98ZW58MHx8fHwxNzc1NzYzNzE2fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1640833906651-6bd1af7aeea3?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxjcnlwdG98ZW58MHx8fHwxNzc1NzYzNzE2fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1640833906651-6bd1af7aeea3?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxjcnlwdG98ZW58MHx8fHwxNzc1NzYzNzE2fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/@traxer">Traxer</a> on <a href="https://unsplash.com">Unsplash</a></figcaption></figure></div><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;f261a5a5-bdf0-444a-9f5e-fa0a8d4c5b55&quot;,&quot;caption&quot;:&quot;This article marks the start of an eight-part series examining how Iran has increasingly relied on cryptocurrency to circumvent international sanctions. These developments unfold against a volatile backdrop: Iran&#8217;s 2025 confrontation with Israel, the ongoing activity of its regional proxy network, and protests driven by corruption, economic hardship (ex&#8230;&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;The Axis of Illicit Finance: Iran&#8217;s Crypto Strategy Explained&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:33479672,&quot;name&quot;:&quot;Jessica Davis, PhD&quot;,&quot;bio&quot;:&quot;Jessica Davis is President of Insight Threat Intelligence and is the author of Women in Modern Terrorism: From Liberations Wars to Global Terrorism and the Islamic State (2017), and Illicit Money: Financing Terrorism in the 21st Century (2021).&quot;,&quot;photo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!ICh7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe312ae7c-114b-4e4f-9ce1-8bf50ddb7a27_2344x2049.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2026-01-06T14:00:45.585Z&quot;,&quot;cover_image&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/87b19738-1968-494d-aa46-98d0020cd199_845x486.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/the-axis-of-illicit-finance-irans&quot;,&quot;section_name&quot;:&quot;Financiers&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:183357175,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:14,&quot;comment_count&quot;:0,&quot;publication_id&quot;:329102,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!I_1w!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4649d7af-94ce-49ea-8c58-368ec26cd423_900x900.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>In part 2 of the series, we explored how Iran uses cryptocurrency to finance the Houthis (Ansarallah). We illuminated the various companies, exchanges, and individuals involved in Iran-Yemen crypto threat finance, highlighting the many jurisdictions this network spans.</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;a91808d5-a54f-4c8f-a832-2a8376124610&quot;,&quot;caption&quot;:&quot;In part 1 of this series, we examined how Iran has increasingly turned to cryptocurrency as a core tool in its sanctions-evasion toolkit, using digital assets to bypass conventional financial controls and support its broader regional network of allied armed groups, including Hezbollah, Hamas, and Ansarallah (the Houthis).&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;From Tehran to Sana&#8217;a: Cryptocurrency and Sanctions Evasion in the Axis of Illicit Finance&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:33479672,&quot;name&quot;:&quot;Jessica Davis, PhD&quot;,&quot;bio&quot;:&quot;Jessica Davis is President of Insight Threat Intelligence and is the author of Women in Modern Terrorism: From Liberations Wars to Global Terrorism and the Islamic State (2017), and Illicit Money: Financing Terrorism in the 21st Century (2021).&quot;,&quot;photo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!ICh7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe312ae7c-114b-4e4f-9ce1-8bf50ddb7a27_2344x2049.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2026-02-24T14:02:37.624Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!0BCO!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ec115eb-33b1-4e33-8147-a3b6ffc1f04e_626x682.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/from-tehran-to-sanaa-cryptocurrency&quot;,&quot;section_name&quot;:&quot;Group Profiles &quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:186790350,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:3,&quot;comment_count&quot;:0,&quot;publication_id&quot;:329102,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!I_1w!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4649d7af-94ce-49ea-8c58-368ec26cd423_900x900.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>Today, we&#8217;re exploring Iran&#8217;s use of financial tradecraft and how the regime integrates that with cryptocurrency to hide the source and destination of funds. As the economic impacts of the Iran-Israel-US war become apparent, it is clear that Iran&#8217;s economy has been <a href="https://www.reuters.com/world/middle-east/irans-shattered-economy-means-any-success-war-may-be-fleeting-2026-04-08/">badly damaged</a>. Further, the war has caused a significant break in relations with other Gulf countries, notably the UAE, where Iran enjoyed relatively good freedom of movement, and made extensive use of the money service business sector to move money through MSBs, hawalas, and into the semi-formal system. With the UAE&#8217;s <a href="https://www.msn.com/en-xl/money/economy/uae-squeezes-iranian-economic-lifeline-in-retaliation-for-attacks/ar-AA2087yX">crackdown on Iranians</a> (and their money service businesses), this part of Iran&#8217;s threat finance ecosystem is under significant strain, likely leading to an even greater move towards cryptocurrency.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Insight Monitor is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>Indeed, Iran stated that its tolls in the Strait of Hormuz would be paid at least in part in cryptocurrency. <a href="https://gizmodo.com/iran-demands-bitcoin-and-crypto-for-strait-of-hormuz-toll-payments-2000744120">Reports suggest</a> that Iran is accepting either Bitcoin or USDT; each has their own advantages and disadvantages. In practice, Bitcoin is a likely good option for Iran because the regime has extensive experience with it. However, Bitcoin also fluctuates in price, making it difficult to price assets (or services, such as tolls) in it. On the other hand, USDT is more stable (pegged to the US dollar) but is centrally controlled and can be frozen. </p><p>Tracing these transactions, as well as Iran&#8217;s other crypto transactions, is possible. Cryptocurrency alone does not guarantee anonymity. For Iranian actors and their proxies like Hamas, Hizballaha and the Houthis, successfully evading sanctions requires sophisticated financial tradecraft to conceal the source, destination, and purpose of funds. These actors blend blockchain-based tools with traditional illicit finance techniques, exploiting weaknesses in global regulatory regimes.<sup>[i]</sup></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://insightthreatintelligence.thinkific.com/bundles/tf-analysis" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!f7rH!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 424w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 848w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 1272w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!f7rH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png" width="1066" height="507" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:507,&quot;width&quot;:1066,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:698946,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:&quot;&quot;,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://insightthreatintelligence.thinkific.com/bundles/tf-analysis&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!f7rH!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 424w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 848w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 1272w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"></figcaption></figure></div><div><hr></div><p><em>Our terrorist financing analysis course caters to researchers, intelligence, law enforcement, and compliance professionals to help them learn about terrorist financing, and analyze suspicious patterns and activities more effectively. Sign up today!</em></p><div><hr></div><p>Key elements of this tradecraft include:</p><ul><li><p><strong>Mixers and privacy tools</strong>: After a major asset seizure, Hamas began routinely using crypto mixers&#8212;services that blend cryptocurrency to obscure transactions.<sup>[ii]</sup> A cryptocurrency mixer is a service that obscures the origins and destinations of digital assets by pooling together multiple users&#8217; coins and redistributing them in a way that breaks the transaction trail. Some common mixers include Tornado Cash (for Ethereum) and Wasabi wallet (specific to Bitcoin). They&#8217;ve also increasingly engaged with privacy coins like Monero, which are designed to resist tracing efforts.</p></li><li><p><strong>Cross-chain protocols and book transfers</strong>: These techniques move value across different blockchains or within exchanges, often via internal (off-chain) transfers, making transactions difficult to trace on public ledgers. Some common cross-chain protocols include THORChain, which allows swapping assets directly across different blockchains, and the Ren Protocol, which facilitates the transfer of Bitcoin, Zcash, and other assets into Ethereum. (Also called &#8220;cross-chain swaps&#8221;.)</p></li><li><p><strong>Use of shell and front companies</strong>: Entities labelled as &#8220;general trading companies&#8221; facilitate or camouflage transactions, especially in trade-based money laundering (TBML) schemes. These companies act as intermediaries or conduits for moving value tied to illicit networks.</p></li><li><p><strong>Jurisdictional arbitrage:</strong> High-risk exchanges in Russia, China, T&#252;rkiye, and other permissive jurisdictions are regularly used for obfuscation, especially those with tiered KYC policies allowing significant transfers without identification.</p></li><li><p><strong>OTC brokers:</strong> These brokers, often regionally based, facilitate the off-ramping of cryptocurrency into state-issued currency. They operate outside formal exchange infrastructure, creating additional layers of opacity.<sup> [iii]</sup></p></li></ul><p>Iran uses significant financial tradecraft to hide much of its activity on the blockchain. Newer tools, such as Russia&#8217;s Ruble-backed stablecoin A7A5 might increasingly play a role in these obfuscation techniques, although for the time being, there is no evidence to suggest that Iran has had to adopt newer (and sometimes riskier) techniques; the current tools that it uses appear sufficient to allow it to move money internationally and provide funds to its intended recipients, including terrorist groups. </p><p>In collecting tolls from the Strait of Hormuz, Iran is likely to use these (and possibly other) tools to hide the funds and protect them from freezing and seizure. Practically speaking, given the sophistication of Iran&#8217;s cryptocurrency operations, Iran has almost complete freedom of movement in this space, and working with other partners like Russia, will likely remain largely immune from efforts to disrupt their crypto operations. </p><p>Finally, US and Israeli strikes against Iranian regime members have killed a significant tranche of Iranian leadership. These were primarily older, more traditional regime members. The segment of the regime pushing cryptocurrency adoption has likely been empowered by these strikes, and will further push the Iranian regime into cryptocurrency adoption for threat (and regime) financing. </p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/p/irans-financial-tradecraft-on-the?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/p/irans-financial-tradecraft-on-the?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p><em>This research is part of my post-doctoral work funded by the University of Calgary&#8217;s Faculty of Law.</em></p><div><hr></div><p><sup>[i]</sup> Saiz, &#8220;Sanctions in the Virtual Asset Industry: SIFMANet Roundtable Report,&#8221; 3.</p><p><sup>[ii]</sup> Julia Shapero, &#8220;Hamas Money Laundering Worries Spark Proposed New U.S. Crypto Rule,&#8221; Text, <em>The Hill</em> (blog), October 19, 2023, https://thehill.com/business/4265344-hamas-money-laundering-worries-spark-new-u-s-crypto-rule/.</p><p><sup>[iii]</sup> Application for a warrant to seize property subject to forfeiture (US District Court for the District of Columbia March 27, 2025).</p><div><hr></div><p><em>&#169; 2026 Insight Threat Intelligence Ltd. All Rights Reserved.<br><br>This newsletter and its contents are protected by Canadian copyright law. Except as otherwise provided for under Canadian copyright law, this newsletter and its contents may not be copied, published, distributed, downloaded or otherwise stored in a retrieval system, transmitted or converted, in any form or by any means, electronic or otherwise, without the prior written permission of the copyright owner.</em></p>]]></content:encoded></item><item><title><![CDATA[Global Terrorism Financing Report ]]></title><description><![CDATA[March 2026]]></description><link>https://newsletter.insightthreatintel.com/p/global-terrorism-financing-report-2e2</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/global-terrorism-financing-report-2e2</guid><dc:creator><![CDATA[Emelia Connolly]]></dc:creator><pubDate>Thu, 09 Apr 2026 13:01:10 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!DzAB!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8f315e8e-5c9c-4e18-bfdd-1503a020d4d0_936x506.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p style="text-align: justify;"><em>Welcome back, Insight Monitor subscribers!</em></p><p style="text-align: justify;"><em>In this month&#8217;s report, we explore compelling stories from Canada, Europe, and the Middle East in the complex world of terrorism financing. Our coverage includes unregistered digital finance companies, the funding and growth of ISIL cells, and Hizballah&#8217;s evolving stockpiles and revenue streams.</em></p><p style="text-align: justify;"><em>Dive in, share your thoughts with a colleague, and be sure to check out our long-read recommendations for deeper insights!</em></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!DzAB!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8f315e8e-5c9c-4e18-bfdd-1503a020d4d0_936x506.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!DzAB!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8f315e8e-5c9c-4e18-bfdd-1503a020d4d0_936x506.png 424w, https://substackcdn.com/image/fetch/$s_!DzAB!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8f315e8e-5c9c-4e18-bfdd-1503a020d4d0_936x506.png 848w, https://substackcdn.com/image/fetch/$s_!DzAB!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8f315e8e-5c9c-4e18-bfdd-1503a020d4d0_936x506.png 1272w, https://substackcdn.com/image/fetch/$s_!DzAB!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8f315e8e-5c9c-4e18-bfdd-1503a020d4d0_936x506.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!DzAB!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8f315e8e-5c9c-4e18-bfdd-1503a020d4d0_936x506.png" width="936" height="506" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8f315e8e-5c9c-4e18-bfdd-1503a020d4d0_936x506.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:506,&quot;width&quot;:936,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:188638,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://newsletter.insightthreatintel.com/i/193609400?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8f315e8e-5c9c-4e18-bfdd-1503a020d4d0_936x506.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!DzAB!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8f315e8e-5c9c-4e18-bfdd-1503a020d4d0_936x506.png 424w, https://substackcdn.com/image/fetch/$s_!DzAB!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8f315e8e-5c9c-4e18-bfdd-1503a020d4d0_936x506.png 848w, https://substackcdn.com/image/fetch/$s_!DzAB!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8f315e8e-5c9c-4e18-bfdd-1503a020d4d0_936x506.png 1272w, https://substackcdn.com/image/fetch/$s_!DzAB!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8f315e8e-5c9c-4e18-bfdd-1503a020d4d0_936x506.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Insight Monitor is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://insightthreatintelligence.thinkific.com/bundles/tf-analysis" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!f7rH!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 424w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 848w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 1272w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!f7rH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png" width="1066" height="507" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:507,&quot;width&quot;:1066,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:698946,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://insightthreatintelligence.thinkific.com/bundles/tf-analysis&quot;,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!f7rH!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 424w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 848w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 1272w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><p>Our terrorist financing analysis course caters to researchers, intelligence, law enforcement, and compliance professionals to help them learn about terrorist financing and analyze suspicious patterns and activities more effectively. Sign up today!</p><div><hr></div><h3></h3>
      <p>
          <a href="https://newsletter.insightthreatintel.com/p/global-terrorism-financing-report-2e2">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Following the Money]]></title><description><![CDATA[Recap of Insight Monitor for March 2026]]></description><link>https://newsletter.insightthreatintel.com/p/following-the-money-b56</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/following-the-money-b56</guid><dc:creator><![CDATA[Lisa Niemzyk]]></dc:creator><pubDate>Tue, 07 Apr 2026 13:03:24 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!wRJl!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe73de2cb-ab0b-45e9-8e44-130382136f84_1024x1024.heic" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Hello, <strong>Insight Monitor</strong> subscribers! </em></p><p><em>While the world of terrorist financing and emerging threats kept moving fast this month, we had a bit of a quieter month here taking some time to wrap up some fiscal year-end projects. We will be back in full force next month. Be sure to subscribe so you don&#8217;t miss out!</em></p><p>Before we dive in&#8230;</p><p>CASIS recently announced its 2026 essay contest. You can get all the details <a href="https://www.casis-acers.ca/essay-prize#papers">here</a>.</p><p>The <em>Secure Line</em> podcast, was back this month with two new episodes. Highlights include discussion on <a href="https://www.youtube.com/watch?v=U1p_PzlDdWk">recent policy and intelligence developments</a>, and why <a href="https://www.youtube.com/watch?v=htxwCL2r51A">protecting research and innovation</a> has become a core national security priority. Catch up on the latest episodes <a href="https://www.youtube.com/@SecureLineCASIS">here</a>.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Insight Monitor is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!wRJl!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe73de2cb-ab0b-45e9-8e44-130382136f84_1024x1024.heic" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!wRJl!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe73de2cb-ab0b-45e9-8e44-130382136f84_1024x1024.heic 424w, https://substackcdn.com/image/fetch/$s_!wRJl!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe73de2cb-ab0b-45e9-8e44-130382136f84_1024x1024.heic 848w, https://substackcdn.com/image/fetch/$s_!wRJl!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe73de2cb-ab0b-45e9-8e44-130382136f84_1024x1024.heic 1272w, https://substackcdn.com/image/fetch/$s_!wRJl!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe73de2cb-ab0b-45e9-8e44-130382136f84_1024x1024.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!wRJl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe73de2cb-ab0b-45e9-8e44-130382136f84_1024x1024.heic" width="514" height="514" data-attrs="{&quot;src&quot;:&quot;https://substackcdn.com/image/fetch/$s_!wRJl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe73de2cb-ab0b-45e9-8e44-130382136f84_1024x1024.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:514,&quot;width&quot;:514,&quot;resizeWidth&quot;:514,&quot;bytes&quot;:195723,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!wRJl!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe73de2cb-ab0b-45e9-8e44-130382136f84_1024x1024.heic 424w, https://substackcdn.com/image/fetch/$s_!wRJl!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe73de2cb-ab0b-45e9-8e44-130382136f84_1024x1024.heic 848w, https://substackcdn.com/image/fetch/$s_!wRJl!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe73de2cb-ab0b-45e9-8e44-130382136f84_1024x1024.heic 1272w, https://substackcdn.com/image/fetch/$s_!wRJl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe73de2cb-ab0b-45e9-8e44-130382136f84_1024x1024.heic 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>As always, we published our latest <strong>Global Terrorist Financing Report,</strong> highlighting major developments from the past month.</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;3de2b87d-e028-419c-aecb-733e58eaa50c&quot;,&quot;caption&quot;:&quot;Hello, Insight Monitor subscribers, welcome back to another global terrorist financing roundup.&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Global Terrorism Financing Report &quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:313776655,&quot;name&quot;:&quot;Emelia Connolly&quot;,&quot;bio&quot;:null,&quot;photo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!9E-n!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9783d60b-0c55-4a2b-9ccd-a05d4ca26b39_828x828.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2026-03-10T13:01:53.015Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!zo7V!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F862ba6df-7d32-4be6-ba43-e0aec2a8f6f7_1429x804.jpeg&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/global-terrorism-financing-report-85f&quot;,&quot;section_name&quot;:&quot;News&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:190465232,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:6,&quot;comment_count&quot;:0,&quot;publication_id&quot;:329102,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!I_1w!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4649d7af-94ce-49ea-8c58-368ec26cd423_900x900.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div><hr></div><h4><strong>Terrorist Financing Analysis</strong></h4><p>Become an expert on how terrorist groups move, store, and exploit funds. This bundle gives you access to the terrorist financing analysis course, plus a customizable analytic tool, relevant case studies, and other practical resources you need to detect, analyze, and disrupt illicit financing networks.</p><p>Join our community, tackle real-world exercises, and gain skills you won&#8217;t find anywhere else. <a href="https://insightthreatintelligence.thinkific.com/courses/terroristfinancing">Enroll now</a> and take your expertise to the next level!</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!QECs!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe38e54bb-4e7f-40b6-8429-46f7ee2c7562_629x318.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!QECs!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe38e54bb-4e7f-40b6-8429-46f7ee2c7562_629x318.jpeg 424w, https://substackcdn.com/image/fetch/$s_!QECs!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe38e54bb-4e7f-40b6-8429-46f7ee2c7562_629x318.jpeg 848w, https://substackcdn.com/image/fetch/$s_!QECs!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe38e54bb-4e7f-40b6-8429-46f7ee2c7562_629x318.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!QECs!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe38e54bb-4e7f-40b6-8429-46f7ee2c7562_629x318.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!QECs!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe38e54bb-4e7f-40b6-8429-46f7ee2c7562_629x318.jpeg" width="629" height="318" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e38e54bb-4e7f-40b6-8429-46f7ee2c7562_629x318.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:318,&quot;width&quot;:629,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!QECs!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe38e54bb-4e7f-40b6-8429-46f7ee2c7562_629x318.jpeg 424w, https://substackcdn.com/image/fetch/$s_!QECs!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe38e54bb-4e7f-40b6-8429-46f7ee2c7562_629x318.jpeg 848w, https://substackcdn.com/image/fetch/$s_!QECs!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe38e54bb-4e7f-40b6-8429-46f7ee2c7562_629x318.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!QECs!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe38e54bb-4e7f-40b6-8429-46f7ee2c7562_629x318.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h3>Articles </h3><p>This month we did a deep dive into terrorist financial tradecraft, highlighting new data on how attacks are funded and the methods groups use to move and obscure money. We also released a commentary on Canadian terrorism trends, examining riding changes, shifting motivations, and the growing involvement of youth.</p><p>Stay informed with our latest analyses &#8212; explore our newest articles below:</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;81b70ce4-6149-4be3-9212-52fdc9189041&quot;,&quot;caption&quot;:&quot;Hello Insight Monitor subscribers, and welcome to another edition of our series on trends in terrorist financing, using a unique longitudinal dataset. This series goes beyond headline cases and anecdotes, offering data-driven insights and analysis you won&#8217;t find anywhere else. In this issue, I focus on how terrorists obscure the sources, destinations, and uses of funds&#8212;and what this reveals about terrorist financial adaptation.&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Obscuring the Money Behind the Bombs: New Data on Terrorist Financial Tradecraft&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:33479672,&quot;name&quot;:&quot;Jessica Davis, PhD&quot;,&quot;bio&quot;:&quot;Jessica Davis is President of Insight Threat Intelligence and is the author of Women in Modern Terrorism: From Liberations Wars to Global Terrorism and the Islamic State (2017), and Illicit Money: Financing Terrorism in the 21st Century (2021).&quot;,&quot;photo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!ICh7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe312ae7c-114b-4e4f-9ce1-8bf50ddb7a27_2344x2049.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2026-03-03T14:03:28.362Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!t2RV!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21118c2c-ea5a-46c8-9fbd-40ae731b5546_1047x596.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/obscuring-the-money-behind-the-bombs&quot;,&quot;section_name&quot;:&quot;Financiers&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:153040222,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:3,&quot;comment_count&quot;:0,&quot;publication_id&quot;:329102,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!I_1w!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4649d7af-94ce-49ea-8c58-368ec26cd423_900x900.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;9477701f-5b59-435d-8b47-436363afd6a3&quot;,&quot;caption&quot;:&quot;Hello, Insight Monitor subscribers! Terrorism charges are up. Motivations are shifting. And the official threat level? Still stuck at medium. Canada&#8217;s terrorism landscape is changing in ways that aren&#8217;t always reflected in public threat assessments. From QAnon-inspired attacks to the quiet rise of ideologically motivated extremism, the picture is more complex than a single label suggests. And it&#8217;s only getting more complex with the war in Iran and the mobilization of Iran&#8217;s proxies, supporters, and surrogates. This week, I&#8217;m digging into the numbers, the trends, and the questions. Have a read to learn more about terrorism in Canada:&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;New Patterns in Canadian Terrorism: Charges Are Up, Motivations Are Shifting&#8212;and More Youth Are Involved&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:33479672,&quot;name&quot;:&quot;Jessica Davis, PhD&quot;,&quot;bio&quot;:&quot;Jessica Davis is President of Insight Threat Intelligence and is the author of Women in Modern Terrorism: From Liberations Wars to Global Terrorism and the Islamic State (2017), and Illicit Money: Financing Terrorism in the 21st Century (2021).&quot;,&quot;photo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!ICh7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe312ae7c-114b-4e4f-9ce1-8bf50ddb7a27_2344x2049.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2026-03-17T13:35:01.412Z&quot;,&quot;cover_image&quot;:&quot;https://images.unsplash.com/photo-1626366555540-0800ffb42452?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw4fHxjYW5hZGlhbiUyMHNlY3VyaXR5JTIwaW50ZWxsaWdlbmNlJTIwc2VydmljZXxlbnwwfHx8fDE3Njk3MjE2NTZ8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/new-patterns-in-canadian-terrorism&quot;,&quot;section_name&quot;:&quot;Attack profiles&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:186236498,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:3,&quot;comment_count&quot;:0,&quot;publication_id&quot;:329102,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!I_1w!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4649d7af-94ce-49ea-8c58-368ec26cd423_900x900.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/p/following-the-money-b56?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/p/following-the-money-b56?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p><br>That&#8217;s a wrap for March! See you next month with more analysis and updates. Be sure to subscribe so you don&#8217;t miss out! This is news and analysis you won&#8217;t find anywhere else. </p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/subscribe?"><span>Subscribe now</span></a></p><p><em>&#169; 2026 Insight Threat Intelligence Ltd. All Rights Reserved.<br><br>This newsletter and its contents are protected by Canadian copyright law. Except as otherwise provided for under Canadian copyright law, this newsletter and its contents may not be copied, published, distributed, downloaded or otherwise stored in a retrieval system, transmitted or converted, in any form or by any means, electronic or otherwise, without the prior written permission of the copyright owner.</em></p>]]></content:encoded></item><item><title><![CDATA[Five Years of Following the Money 💸]]></title><description><![CDATA[Celebrating 5 years of newsletter writing]]></description><link>https://newsletter.insightthreatintel.com/p/five-years-of-following-the-money</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/five-years-of-following-the-money</guid><dc:creator><![CDATA[Jessica Davis, PhD]]></dc:creator><pubDate>Wed, 01 Apr 2026 13:03:33 GMT</pubDate><enclosure url="https://images.unsplash.com/photo-1622758383952-87faa4a55044?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzMXx8d29vZCUyMHBlbnxlbnwwfHx8fDE3NzQ3MTc0MTl8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Hello, Insight Monitor subscribers! This month marks the five-year anniversary of my newsletter here on Substack. Join me for a little reflection, and stay until the end for a nice surprise&#8230;.</em></p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://images.unsplash.com/photo-1622758383952-87faa4a55044?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzMXx8d29vZCUyMHBlbnxlbnwwfHx8fDE3NzQ3MTc0MTl8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://images.unsplash.com/photo-1622758383952-87faa4a55044?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzMXx8d29vZCUyMHBlbnxlbnwwfHx8fDE3NzQ3MTc0MTl8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1622758383952-87faa4a55044?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzMXx8d29vZCUyMHBlbnxlbnwwfHx8fDE3NzQ3MTc0MTl8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1622758383952-87faa4a55044?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzMXx8d29vZCUyMHBlbnxlbnwwfHx8fDE3NzQ3MTc0MTl8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1622758383952-87faa4a55044?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzMXx8d29vZCUyMHBlbnxlbnwwfHx8fDE3NzQ3MTc0MTl8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1456w" sizes="100vw"><img src="https://images.unsplash.com/photo-1622758383952-87faa4a55044?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzMXx8d29vZCUyMHBlbnxlbnwwfHx8fDE3NzQ3MTc0MTl8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" width="360" height="202.5" data-attrs="{&quot;src&quot;:&quot;https://images.unsplash.com/photo-1622758383952-87faa4a55044?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzMXx8d29vZCUyMHBlbnxlbnwwfHx8fDE3NzQ3MTc0MTl8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:2268,&quot;width&quot;:4032,&quot;resizeWidth&quot;:360,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;white and brown wooden pencil&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="white and brown wooden pencil" title="white and brown wooden pencil" srcset="https://images.unsplash.com/photo-1622758383952-87faa4a55044?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzMXx8d29vZCUyMHBlbnxlbnwwfHx8fDE3NzQ3MTc0MTl8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1622758383952-87faa4a55044?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzMXx8d29vZCUyMHBlbnxlbnwwfHx8fDE3NzQ3MTc0MTl8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1622758383952-87faa4a55044?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzMXx8d29vZCUyMHBlbnxlbnwwfHx8fDE3NzQ3MTc0MTl8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1622758383952-87faa4a55044?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzMXx8d29vZCUyMHBlbnxlbnwwfHx8fDE3NzQ3MTc0MTl8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/@artnok">Nicolas Picard</a> on <a href="https://unsplash.com">Unsplash</a></figcaption></figure></div><p>It&#8217;s been quite the journey. What started with a few hardcore illicit finance nerds has grown to a community of over 8,000, with new subscribers every day. I&#8217;m always excited when someone else agrees to receive the newsletter or follows me on this platform, because I think we&#8217;re collectively one step closer to illicit finance being taken more seriously. And as regular readers of this newsletter know, countering the illicit finance threat is something I take very seriously.</p><p>This newsletter started as something I wanted to do to capture my thinking on illicit finance and security, share insights through something more enduring than the odd thread on Twitter (I refuse to use the new name because I think it&#8217;s dumb), and promote the courses and other activities that I do as part of Insight Threat Intelligence. It&#8217;s grown well beyond that and has actually become a revenue line for the business; it&#8217;s also become a source of some expenses, because I usually have at least one researcher working on the Global Terrorist Financing Report (our monthly roundup of terrorist financing news), as well as research for other newsletters. </p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Insight Monitor is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>When I first started out, I migrated old content from a blog I was running to help populate the back catalogue &#8211; a lot of that is still available on the site if you go way, way back. As with most Substackers, I started publishing free articles, but quickly added a paywall because, frankly, those news roundups are an annoying amount of work. Artificial intelligence has helped a bit, but we still need to check every story, verify details, and make sure it&#8217;s accurately represented, and I have yet to find an AI tool that does that to my satisfaction. All that to say: this newsletter remains labour-intensive, and I&#8217;m happy about that. The writing is the work.</p><p>Somewhere along the way, I started trying to write twice per week. That turned out to be too much &#8212; for both my readers and me. So now we focus on one article per week, and sometimes add a second if things are particularly newsy. I&#8217;m increasingly trying to take things slowly: reading, writing, and publishing with intention. In our information ecosystem, I think we can all use a bit of a break, and a focus on more signal, less noise. </p><p>Growth on this platform hasn&#8217;t been exponential for me. I feel like I&#8217;ve earned every one of my followers or subscribers; while Substack touts a network effect, I have yet to really experience it, and I haven&#8217;t had any posts go truly viral as I have elsewhere. But there&#8217;s something more organic and sustainable about this &#8211; I feel like every person is here because they want to be, not because they feel like they should be, or because the algorithm told them to be.</p><p>I think one of the things that I like the most about writing a regular newsletter is that it keeps the writing muscles sharp, even during long periods where I&#8217;m mostly researching, travelling, or giving talks, like right now, when over the period of three months I&#8217;m scheduled to be in three different countries and eight cities, some twice. It forces me to write, for better or for worse. Yes, this is pressure, but I also give myself grace, and if I really need to miss some weeks, that&#8217;s okay.</p><p>In recent years, I&#8217;ve experimented with publishing series. I&#8217;m not sure that these really work, but I like them because they give me a way to break up longer pieces of analysis and share them with readers, without overwhelming people with details, links, or forty-page documents. Feel free to let me know what you think about these series in the comments, by email, or however we communicate.</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;1d6a928a-6bc4-496b-ac31-ae243a95fcb0&quot;,&quot;caption&quot;:&quot;In part 1 of this series, we examined how Iran has increasingly turned to cryptocurrency as a core tool in its sanctions-evasion toolkit, using digital assets to bypass conventional financial controls and support its broader regional network of allied armed groups, including Hezbollah, Hamas, and Ansarallah (the Houthis).&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;From Tehran to Sana&#8217;a: Cryptocurrency and Sanctions Evasion in the Axis of Illicit Finance&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:33479672,&quot;name&quot;:&quot;Jessica Davis, PhD&quot;,&quot;bio&quot;:&quot;Jessica Davis is President of Insight Threat Intelligence and is the author of Women in Modern Terrorism: From Liberations Wars to Global Terrorism and the Islamic State (2017), and Illicit Money: Financing Terrorism in the 21st Century (2021).&quot;,&quot;photo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!ICh7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe312ae7c-114b-4e4f-9ce1-8bf50ddb7a27_2344x2049.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2026-02-24T14:02:37.624Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!0BCO!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ec115eb-33b1-4e33-8147-a3b6ffc1f04e_626x682.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/from-tehran-to-sanaa-cryptocurrency&quot;,&quot;section_name&quot;:&quot;Group Profiles &quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:186790350,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:3,&quot;comment_count&quot;:0,&quot;publication_id&quot;:329102,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!I_1w!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4649d7af-94ce-49ea-8c58-368ec26cd423_900x900.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>This platform itself isn&#8217;t without flaws. There are <a href="https://newsletter.insightthreatintel.com/p/nazis-on-substack?utm_source=publication-search">way too many Nazis</a> on the platform, although I&#8217;d argue this is true of most social platforms these days. Substack also takes a pretty big cut of my profits, particularly compared to other platforms. Finally, Substack has started a Polymarket integration, which I think is criminal. (Note: it is not technically criminal now, but I&#8217;m willing to bet (haha) that it will become criminal within ten years when we see the full effects of the gaming and gambling epidemic. Maybe sooner, although policy change takes time.) This is all driven, of course, by Substack&#8217;s need to become profitable. It has no <a href="https://open.substack.com/pub/speterdavis/p/substack-is-at-the-gambling-stage?utm_campaign=post-expanded-share&amp;utm_medium=post%20viewer">alternative viable path to profitability</a>. Which, in my view, raises questions about the platform&#8217;s long-term viability.</p><p>To that end, I&#8217;ve migrated my content to a blog hosted on my website, which you can access at <a href="http://www.insightthreatintel.com/">www.insightthreatintel.com</a>. It has both a free and a paid section, and one of my wonderful team members maintains it, keeping it up to date with the latest news and analysis, pretty much at the same time as we release articles on Substack. This also gives some readers the chance to subscribe without supporting the Substack platform, which is an absolutely valid choice.</p><p>That&#8217;s not to say I&#8217;ll be disappearing from here anytime soon, but it is to say that I&#8217;m making plans (and maintaining newsletter lists!) so that if Substack disappears, I can still keep doing this work. Because that&#8217;s what matters, not the way it lands in your inbox.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/p/five-years-of-following-the-money?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/p/five-years-of-following-the-money?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p></p><p>That&#8217;s enough reflection for one day. On to the good stuff. To celebrate my five years on this platform, I&#8217;m offering a huge discount for new subscribers: 50% off an annual membership. This is a rare sale (we almost never have them), and this is by far the largest discount I&#8217;ve ever given. It&#8217;ll be available for the full month of April, so if you want to take advantage, be sure to lock it in before the end of the month. And you know the drill: like, share, and subscribe to help us grow our community!</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/5year&quot;,&quot;text&quot;:&quot;50% OFF!&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/5year"><span>50% OFF!</span></a></p><p></p><div><hr></div><p><em>&#169; 2026 Insight Threat Intelligence Ltd. All Rights Reserved.<br><br>This newsletter and its contents are protected by Canadian copyright law. Except as otherwise provided for under Canadian copyright law, this newsletter and its contents may not be copied, published, distributed, downloaded or otherwise stored in a retrieval system, transmitted or converted, in any form or by any means, electronic or otherwise, without the prior written permission of the copyright owner.</em></p>]]></content:encoded></item><item><title><![CDATA[Illicit Money is out in Paperback! ]]></title><description><![CDATA[Hello, Insight Monitor subscribers!]]></description><link>https://newsletter.insightthreatintel.com/p/illicit-money-is-out-in-paperback</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/illicit-money-is-out-in-paperback</guid><dc:creator><![CDATA[Jessica Davis, PhD]]></dc:creator><pubDate>Mon, 30 Mar 2026 07:03:54 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!aSMC!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F678765bc-de7d-4af1-8b44-7b9c3d46030d_1494x856.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Hello, Insight Monitor subscribers! I wanted to flag that my second book, <strong>Illicit Money: Financing Terrorism in the 21st Century</strong>, is now out in paperback format. You can purchase it through the publisher <a href="https://www.rienner.com/title/Illicit_Money_Financing_Terrorism_in_the_Twenty_First_Century">here</a>.</em></p><p>We&#8217;ll be back with regular newsletters in April &#8212; we&#8217;re on a short hiatus as I wrap up some significant fiscal year-end projects, deliver some technical assistance, and generally just try to get caught up on life. </p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Insight Monitor is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://www.rienner.com/title/Illicit_Money_Financing_Terrorism_in_the_Twenty_First_Century" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!aSMC!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F678765bc-de7d-4af1-8b44-7b9c3d46030d_1494x856.png 424w, https://substackcdn.com/image/fetch/$s_!aSMC!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F678765bc-de7d-4af1-8b44-7b9c3d46030d_1494x856.png 848w, https://substackcdn.com/image/fetch/$s_!aSMC!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F678765bc-de7d-4af1-8b44-7b9c3d46030d_1494x856.png 1272w, https://substackcdn.com/image/fetch/$s_!aSMC!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F678765bc-de7d-4af1-8b44-7b9c3d46030d_1494x856.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!aSMC!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F678765bc-de7d-4af1-8b44-7b9c3d46030d_1494x856.png" width="1456" height="834" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/678765bc-de7d-4af1-8b44-7b9c3d46030d_1494x856.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:834,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1398214,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://www.rienner.com/title/Illicit_Money_Financing_Terrorism_in_the_Twenty_First_Century&quot;,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://newsletter.insightthreatintel.com/i/191894215?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F678765bc-de7d-4af1-8b44-7b9c3d46030d_1494x856.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!aSMC!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F678765bc-de7d-4af1-8b44-7b9c3d46030d_1494x856.png 424w, https://substackcdn.com/image/fetch/$s_!aSMC!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F678765bc-de7d-4af1-8b44-7b9c3d46030d_1494x856.png 848w, https://substackcdn.com/image/fetch/$s_!aSMC!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F678765bc-de7d-4af1-8b44-7b9c3d46030d_1494x856.png 1272w, https://substackcdn.com/image/fetch/$s_!aSMC!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F678765bc-de7d-4af1-8b44-7b9c3d46030d_1494x856.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>If you want something a little bit more hands-on, we also have a course based on the book, which you can access here: </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://insightthreatintelligence.thinkific.com/bundles/tf-analysis" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!f7rH!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 424w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 848w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 1272w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!f7rH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png" width="1066" height="507" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:507,&quot;width&quot;:1066,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:698946,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://insightthreatintelligence.thinkific.com/bundles/tf-analysis&quot;,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!f7rH!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 424w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 848w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 1272w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><p><em>Our terrorist financing analysis course caters to researchers, intelligence, law enforcement, and compliance professionals to help them learn about terrorist financing, and analyze suspicious patterns and activities more effectively. Sign up today!</em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/p/illicit-money-is-out-in-paperback?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/p/illicit-money-is-out-in-paperback?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p></p><p><em>&#169; 2026 Insight Threat Intelligence Ltd. All Rights Reserved.<br><br>This newsletter and its contents are protected by Canadian copyright law. Except as otherwise provided for under Canadian copyright law, this newsletter and its contents may not be copied, published, distributed, downloaded or otherwise stored in a retrieval system, transmitted or converted, in any form or by any means, electronic or otherwise, without the prior written permission of the copyright owner.</em></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Insight Monitor is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Announcing the 2026 CASIS Essay Contest]]></title><description><![CDATA[Call for Papers: 2026 CASIS Essay Contest]]></description><link>https://newsletter.insightthreatintel.com/p/announcing-the-2026-casis-essay-contest</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/announcing-the-2026-casis-essay-contest</guid><pubDate>Mon, 23 Mar 2026 13:03:30 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!gv-B!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc56bbdd2-48dc-4e46-a5ea-62c79c6fe6a7_2592x1256.heic" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h3>Call for Papers: 2026 CASIS Essay Contest</h3><p>CASIS is pleased to announce the 2026 essay contest. Essays must address some dimension of intelligence, security, or law enforcement issues in any time period and in any country. Submissions can be from any Humanities or Social Sciences discipline, inter-disciplinary programmes, or law school. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://www.casis-acers.ca/essay-prize#papers" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!gv-B!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc56bbdd2-48dc-4e46-a5ea-62c79c6fe6a7_2592x1256.heic 424w, https://substackcdn.com/image/fetch/$s_!gv-B!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc56bbdd2-48dc-4e46-a5ea-62c79c6fe6a7_2592x1256.heic 848w, https://substackcdn.com/image/fetch/$s_!gv-B!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc56bbdd2-48dc-4e46-a5ea-62c79c6fe6a7_2592x1256.heic 1272w, https://substackcdn.com/image/fetch/$s_!gv-B!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc56bbdd2-48dc-4e46-a5ea-62c79c6fe6a7_2592x1256.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!gv-B!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc56bbdd2-48dc-4e46-a5ea-62c79c6fe6a7_2592x1256.heic" width="1456" height="706" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c56bbdd2-48dc-4e46-a5ea-62c79c6fe6a7_2592x1256.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:706,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:234742,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:&quot;https://www.casis-acers.ca/essay-prize#papers&quot;,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://newsletter.insightthreatintel.com/i/191773885?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc56bbdd2-48dc-4e46-a5ea-62c79c6fe6a7_2592x1256.heic&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!gv-B!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc56bbdd2-48dc-4e46-a5ea-62c79c6fe6a7_2592x1256.heic 424w, https://substackcdn.com/image/fetch/$s_!gv-B!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc56bbdd2-48dc-4e46-a5ea-62c79c6fe6a7_2592x1256.heic 848w, https://substackcdn.com/image/fetch/$s_!gv-B!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc56bbdd2-48dc-4e46-a5ea-62c79c6fe6a7_2592x1256.heic 1272w, https://substackcdn.com/image/fetch/$s_!gv-B!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc56bbdd2-48dc-4e46-a5ea-62c79c6fe6a7_2592x1256.heic 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Insight Monitor is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>For a full description of eligibility and requirements, see the official call for papers <a href="https://www.casis-acers.ca/essay-prize#papers">here.</a> </p><p>The winners of the essay contest will receive cash prizes ($2500 for the graduate winner and $1000 for the undergraduate winner), and will also be invited to present their papers at the annual CASIS Symposium in Ottawa. </p><p>Please share with friends and colleagues! </p><p><em>&#169; 2026 Insight Threat Intelligence Ltd. All Rights Reserved.<br><br>This newsletter and its contents are protected by Canadian copyright law. Except as otherwise provided for under Canadian copyright law, this newsletter and its contents may not be copied, published, distributed, downloaded or otherwise stored in a retrieval system, transmitted or converted, in any form or by any means, electronic or otherwise, without the prior written permission of the copyright owner.</em></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Insight Monitor is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[New Patterns in Canadian Terrorism: Charges Are Up, Motivations Are Shifting—and More Youth Are Involved]]></title><description><![CDATA[Hello, Insight Monitor subscribers!]]></description><link>https://newsletter.insightthreatintel.com/p/new-patterns-in-canadian-terrorism</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/new-patterns-in-canadian-terrorism</guid><dc:creator><![CDATA[Jessica Davis, PhD]]></dc:creator><pubDate>Tue, 17 Mar 2026 13:35:01 GMT</pubDate><enclosure url="https://images.unsplash.com/photo-1626366555540-0800ffb42452?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw4fHxjYW5hZGlhbiUyMHNlY3VyaXR5JTIwaW50ZWxsaWdlbmNlJTIwc2VydmljZXxlbnwwfHx8fDE3Njk3MjE2NTZ8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Hello, Insight Monitor subscribers! Terrorism charges are up. Motivations are shifting. And the official threat level? Still stuck at medium. Canada&#8217;s terrorism landscape is changing in ways that aren&#8217;t always reflected in public threat assessments. From QAnon-inspired attacks to the quiet rise of ideologically motivated extremism, the picture is more complex than a single label suggests. And it&#8217;s only getting more complex with the war in Iran and the mobilization of Iran&#8217;s proxies, supporters, and surrogates. This week, I&#8217;m digging into the numbers, the trends, and the questions. Have a read to learn more about terrorism in Canada:</em> </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://images.unsplash.com/photo-1626366555540-0800ffb42452?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw4fHxjYW5hZGlhbiUyMHNlY3VyaXR5JTIwaW50ZWxsaWdlbmNlJTIwc2VydmljZXxlbnwwfHx8fDE3Njk3MjE2NTZ8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://images.unsplash.com/photo-1626366555540-0800ffb42452?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw4fHxjYW5hZGlhbiUyMHNlY3VyaXR5JTIwaW50ZWxsaWdlbmNlJTIwc2VydmljZXxlbnwwfHx8fDE3Njk3MjE2NTZ8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1626366555540-0800ffb42452?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw4fHxjYW5hZGlhbiUyMHNlY3VyaXR5JTIwaW50ZWxsaWdlbmNlJTIwc2VydmljZXxlbnwwfHx8fDE3Njk3MjE2NTZ8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1626366555540-0800ffb42452?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw4fHxjYW5hZGlhbiUyMHNlY3VyaXR5JTIwaW50ZWxsaWdlbmNlJTIwc2VydmljZXxlbnwwfHx8fDE3Njk3MjE2NTZ8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1626366555540-0800ffb42452?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw4fHxjYW5hZGlhbiUyMHNlY3VyaXR5JTIwaW50ZWxsaWdlbmNlJTIwc2VydmljZXxlbnwwfHx8fDE3Njk3MjE2NTZ8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1456w" sizes="100vw"><img src="https://images.unsplash.com/photo-1626366555540-0800ffb42452?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw4fHxjYW5hZGlhbiUyMHNlY3VyaXR5JTIwaW50ZWxsaWdlbmNlJTIwc2VydmljZXxlbnwwfHx8fDE3Njk3MjE2NTZ8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" width="176" height="263.867269984917" data-attrs="{&quot;src&quot;:&quot;https://images.unsplash.com/photo-1626366555540-0800ffb42452?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw4fHxjYW5hZGlhbiUyMHNlY3VyaXR5JTIwaW50ZWxsaWdlbmNlJTIwc2VydmljZXxlbnwwfHx8fDE3Njk3MjE2NTZ8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:7952,&quot;width&quot;:5304,&quot;resizeWidth&quot;:176,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;flag of us a on pole&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="flag of us a on pole" title="flag of us a on pole" srcset="https://images.unsplash.com/photo-1626366555540-0800ffb42452?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw4fHxjYW5hZGlhbiUyMHNlY3VyaXR5JTIwaW50ZWxsaWdlbmNlJTIwc2VydmljZXxlbnwwfHx8fDE3Njk3MjE2NTZ8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1626366555540-0800ffb42452?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw4fHxjYW5hZGlhbiUyMHNlY3VyaXR5JTIwaW50ZWxsaWdlbmNlJTIwc2VydmljZXxlbnwwfHx8fDE3Njk3MjE2NTZ8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1626366555540-0800ffb42452?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw4fHxjYW5hZGlhbiUyMHNlY3VyaXR5JTIwaW50ZWxsaWdlbmNlJTIwc2VydmljZXxlbnwwfHx8fDE3Njk3MjE2NTZ8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1626366555540-0800ffb42452?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw4fHxjYW5hZGlhbiUyMHNlY3VyaXR5JTIwaW50ZWxsaWdlbmNlJTIwc2VydmljZXxlbnwwfHx8fDE3Njk3MjE2NTZ8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/@hermez777">Hermes Rivera</a> on <a href="https://unsplash.com">Unsplash</a></figcaption></figure></div><p>Last year, I reviewed terrorism metrics in Canada and found some surprising trends, namely that we have more terrorism incidents in Canada than ever before. This includes terrorism peace bonds, charges, and attacks, and the numbers have been climbing. Peace bonds are being used more often as a preventative tool, though there&#8217;s debate about how effective they really are.</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;fe2374b0-c578-44cb-bb3a-f72aad0ae670&quot;,&quot;caption&quot;:&quot;The terrorist attack in New Orleans this year has reignited the discussion about terrorism in the US, and, by extension, Canada. Some media outlets have talked about the return of ISIL (they never went away), while some experts have talked about the&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Terror on the Rise: What the increase in terrorism charges in Canada can tell us about the threat&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:33479672,&quot;name&quot;:&quot;Jessica Davis, PhD&quot;,&quot;bio&quot;:&quot;Jessica Davis is President of Insight Threat Intelligence and is the author of Women in Modern Terrorism: From Liberations Wars to Global Terrorism and the Islamic State (2017), and Illicit Money: Financing Terrorism in the 21st Century (2021).&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e312ae7c-114b-4e4f-9ce1-8bf50ddb7a27_2344x2049.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100},{&quot;id&quot;:2410581,&quot;name&quot;:&quot;Brett Williams&quot;,&quot;bio&quot;:&quot;Librarian. Skeptic. Geek.&quot;,&quot;photo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1102bdc4-37a8-49b2-a1b6-69f7d3df8ba6_2946x2104.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2025-01-08T13:27:55.415Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fceb5244d-2b96-443e-9b83-0bb1917cece6_1024x768.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/terror-on-the-rise-what-the-increase&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:154292004,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:9,&quot;comment_count&quot;:0,&quot;publication_id&quot;:329102,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!I_1w!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4649d7af-94ce-49ea-8c58-368ec26cd423_900x900.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>Historically, most charges have targeted religiously motivated actors&#8212;those inspired by groups like ISIL or al-Qaeda. But in recent years, there&#8217;s been a noticeable shift: more and more cases involve ideologically motivated individuals. What&#8217;s interesting is that while religiously motivated actors are charged more often, most actual attacks in Canada have been carried out by ideologically motivated ones. That suggests authorities may be better equipped to detect and stop religiously motivated plots, possibly because of long-standing international intelligence partnerships and entrenched ideas of what counts as &#8220;terrorism.&#8221;</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Insight Monitor is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>That article generated a lot of interest and some controversy. Stewart Bell covered it in his <a href="https://globalnews.ca/news/10967280/csis-keeps-terror-threat-level-medium/">Global News article on terrorism in Canada</a>. The Integrated Threat Assessment Center also had some thoughts on the data and analysis, which they declined to share with me directly, but that I got to read all about in an access to information request. It was actually sweet how much time they spent on this little blog.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a> Keep reading to learn what it all  means for measuring terrorist activity in Canada: </p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/p/new-patterns-in-canadian-terrorism?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/p/new-patterns-in-canadian-terrorism?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p>
      <p>
          <a href="https://newsletter.insightthreatintel.com/p/new-patterns-in-canadian-terrorism">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Global Terrorism Financing Report ]]></title><description><![CDATA[February 2026]]></description><link>https://newsletter.insightthreatintel.com/p/global-terrorism-financing-report-85f</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/global-terrorism-financing-report-85f</guid><dc:creator><![CDATA[Emelia Connolly]]></dc:creator><pubDate>Tue, 10 Mar 2026 13:01:53 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!zo7V!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F862ba6df-7d32-4be6-ba43-e0aec2a8f6f7_1429x804.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Hello, Insight Monitor subscribers, welcome back to another global terrorist financing roundup.  </em></p><p><em>In February 2026, news of terrorism financing struck almost every region of the world. From North America and Western Europe to the Middle East and Africa! We cover illicit financing through NGOs, terrorist organizations&#8217; gold reserves, and money-filled briefcases headed to Hizballah. So, have a read, share with a colleague, and don&#8217;t miss out on our long-read recommendations!</em></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Insight Monitor is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!zo7V!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F862ba6df-7d32-4be6-ba43-e0aec2a8f6f7_1429x804.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!zo7V!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F862ba6df-7d32-4be6-ba43-e0aec2a8f6f7_1429x804.jpeg 424w, https://substackcdn.com/image/fetch/$s_!zo7V!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F862ba6df-7d32-4be6-ba43-e0aec2a8f6f7_1429x804.jpeg 848w, https://substackcdn.com/image/fetch/$s_!zo7V!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F862ba6df-7d32-4be6-ba43-e0aec2a8f6f7_1429x804.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!zo7V!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F862ba6df-7d32-4be6-ba43-e0aec2a8f6f7_1429x804.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!zo7V!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F862ba6df-7d32-4be6-ba43-e0aec2a8f6f7_1429x804.jpeg" width="1429" height="804" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/862ba6df-7d32-4be6-ba43-e0aec2a8f6f7_1429x804.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:804,&quot;width&quot;:1429,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;A map of the world\n\nAI-generated content may be incorrect.&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="A map of the world

AI-generated content may be incorrect." title="A map of the world

AI-generated content may be incorrect." srcset="https://substackcdn.com/image/fetch/$s_!zo7V!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F862ba6df-7d32-4be6-ba43-e0aec2a8f6f7_1429x804.jpeg 424w, https://substackcdn.com/image/fetch/$s_!zo7V!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F862ba6df-7d32-4be6-ba43-e0aec2a8f6f7_1429x804.jpeg 848w, https://substackcdn.com/image/fetch/$s_!zo7V!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F862ba6df-7d32-4be6-ba43-e0aec2a8f6f7_1429x804.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!zo7V!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F862ba6df-7d32-4be6-ba43-e0aec2a8f6f7_1429x804.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h4><strong>Financial Intelligence Fundamentals</strong></h4><p><em>Do you want to learn more about financial intelligence and how to use it in research, investigations, and analysis? Our financial intelligence fundamentals course is for you! This course is perfect for people new to financial intelligence and seasoned professionals. <a href="https://insightthreatintelligence.thinkific.com/courses/introFININT">Enroll today</a></em></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://insightthreatintelligence.thinkific.com/courses/introFININT" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!8tvZ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png 424w, https://substackcdn.com/image/fetch/$s_!8tvZ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png 848w, https://substackcdn.com/image/fetch/$s_!8tvZ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png 1272w, https://substackcdn.com/image/fetch/$s_!8tvZ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!8tvZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png" width="905" height="496" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:496,&quot;width&quot;:905,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:731766,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://insightthreatintelligence.thinkific.com/courses/introFININT&quot;,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!8tvZ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png 424w, https://substackcdn.com/image/fetch/$s_!8tvZ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png 848w, https://substackcdn.com/image/fetch/$s_!8tvZ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png 1272w, https://substackcdn.com/image/fetch/$s_!8tvZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div>
      <p>
          <a href="https://newsletter.insightthreatintel.com/p/global-terrorism-financing-report-85f">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Following the Money]]></title><description><![CDATA[Recap of Insight Monitor for February 2026]]></description><link>https://newsletter.insightthreatintel.com/p/following-the-money-7af</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/following-the-money-7af</guid><dc:creator><![CDATA[Lisa Niemzyk]]></dc:creator><pubDate>Thu, 05 Mar 2026 14:01:17 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!wRJl!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe73de2cb-ab0b-45e9-8e44-130382136f84_1024x1024.heic" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Hello, <strong>Insight Monitor</strong> subscribers! </em></p><p><em>It has been another packed month, full of research and analysis on terrorist financing and emerging threats. Be sure to subscribe so you don&#8217;t miss out!</em></p><p>In case you missed it&#8230;</p><p>Jessica is leading a new research project with the SOC ACE Research Programme: <em>Criminal Hands, State Ends: State-Sponsored Assassination Using Organized Crime.</em> The project examines how governments exploit organized crime networks for targeted killings. Check out the full project <a href="https://www.socace-research.org.uk/projects/criminal-assassination">here</a>.</p><p>Meanwhile, Leah, Steph, and Jess have been busy on the <em>Secure Line</em> podcast, releasing four new episodes, covering everything from global policy and organized crime to domestic threats and security trends. They had a talk about PM Carney&#8217;s <a href="https://youtu.be/tqPqlSymc48?si=k4o4G5NekKfHUGTL">Davos speech</a>, how organized crime is increasingly being used as a <a href="https://youtu.be/l0UyQVa8MV8?si=6g_-Nb2Q09o1_zn_">tool of state power</a>, <a href="https://youtu.be/SXTg0ZPOBPY?si=xE2TnorVonUL1_Du">grievance-fuelled violence</a> (with Emily Corner, in light of the mass shooting at Tumbler Ridge), and reporting on national security issues with <a href="https://youtu.be/V3WGmZqiNdQ?si=V0Erqlf9sA9xq5GJ">Chris Nardi</a> from the National Post. Catch up on the latest episodes <a href="https://www.youtube.com/@SecureLineCASIS">here</a>.</p><p>Lastly, Jessica was quoted in a <a href="https://globalnews.ca/news/11708242/liberal-mp-dhaliwal-denounces-carney-official-downplaying-india-interference/">Global News article</a>, offering her perspective on ongoing foreign interference in Canada. </p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Insight Monitor is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!wRJl!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe73de2cb-ab0b-45e9-8e44-130382136f84_1024x1024.heic" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!wRJl!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe73de2cb-ab0b-45e9-8e44-130382136f84_1024x1024.heic 424w, https://substackcdn.com/image/fetch/$s_!wRJl!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe73de2cb-ab0b-45e9-8e44-130382136f84_1024x1024.heic 848w, https://substackcdn.com/image/fetch/$s_!wRJl!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe73de2cb-ab0b-45e9-8e44-130382136f84_1024x1024.heic 1272w, https://substackcdn.com/image/fetch/$s_!wRJl!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe73de2cb-ab0b-45e9-8e44-130382136f84_1024x1024.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!wRJl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe73de2cb-ab0b-45e9-8e44-130382136f84_1024x1024.heic" width="514" height="514" data-attrs="{&quot;src&quot;:&quot;https://substackcdn.com/image/fetch/$s_!wRJl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe73de2cb-ab0b-45e9-8e44-130382136f84_1024x1024.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:514,&quot;width&quot;:514,&quot;resizeWidth&quot;:514,&quot;bytes&quot;:195723,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!wRJl!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe73de2cb-ab0b-45e9-8e44-130382136f84_1024x1024.heic 424w, https://substackcdn.com/image/fetch/$s_!wRJl!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe73de2cb-ab0b-45e9-8e44-130382136f84_1024x1024.heic 848w, https://substackcdn.com/image/fetch/$s_!wRJl!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe73de2cb-ab0b-45e9-8e44-130382136f84_1024x1024.heic 1272w, https://substackcdn.com/image/fetch/$s_!wRJl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe73de2cb-ab0b-45e9-8e44-130382136f84_1024x1024.heic 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>As always, we published our latest <strong>Global Terrorist Financing Report,</strong> highlighting major developments from the past month.</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;903f68a4-330a-4afc-b239-4ff875c70fb8&quot;,&quot;caption&quot;:&quot;Welcome back, Insight Monitor subscribers!&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Global Terrorism Financing Report&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:313776655,&quot;name&quot;:&quot;Emelia Connolly&quot;,&quot;bio&quot;:null,&quot;photo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!9E-n!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9783d60b-0c55-4a2b-9ccd-a05d4ca26b39_828x828.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2026-02-12T14:01:18.042Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!jIyV!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F361258c8-bd68-4955-8cb8-63499d5a770f_2000x1125.jpeg&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/global-terrorism-financing-report-047&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:186532683,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:4,&quot;comment_count&quot;:0,&quot;publication_id&quot;:329102,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!I_1w!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4649d7af-94ce-49ea-8c58-368ec26cd423_900x900.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div><hr></div><h4><strong>Illicit Finance Investigations</strong></h4><p><em>The Illicit Finance investigations bundle includes access to both Financial Intelligence Fundamentals and Financial Intelligence Sources and is your one-stop shop to learn how to conduct an illicit finance investigation.</em></p><p><em>Whether your goal is to work as a financial intelligence analyst, an investigator, or in a related field, this bundle ensures you&#8217;re equipped with the skills needed to succeed.</em></p><p><em><a href="https://insightthreatintelligence.thinkific.com/bundles/illicit-finance-investigations">Enroll now</a> and take your expertise to the next level!</em></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!PtN3!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd9919aaf-d521-4cb8-8ca4-f9eac32b5ec8_1260x594.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!PtN3!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd9919aaf-d521-4cb8-8ca4-f9eac32b5ec8_1260x594.jpeg 424w, https://substackcdn.com/image/fetch/$s_!PtN3!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd9919aaf-d521-4cb8-8ca4-f9eac32b5ec8_1260x594.jpeg 848w, https://substackcdn.com/image/fetch/$s_!PtN3!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd9919aaf-d521-4cb8-8ca4-f9eac32b5ec8_1260x594.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!PtN3!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd9919aaf-d521-4cb8-8ca4-f9eac32b5ec8_1260x594.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!PtN3!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd9919aaf-d521-4cb8-8ca4-f9eac32b5ec8_1260x594.jpeg" width="1260" height="594" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d9919aaf-d521-4cb8-8ca4-f9eac32b5ec8_1260x594.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:594,&quot;width&quot;:1260,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:137915,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://newsletter.insightthreatintel.com/i/188400510?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd9919aaf-d521-4cb8-8ca4-f9eac32b5ec8_1260x594.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!PtN3!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd9919aaf-d521-4cb8-8ca4-f9eac32b5ec8_1260x594.jpeg 424w, https://substackcdn.com/image/fetch/$s_!PtN3!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd9919aaf-d521-4cb8-8ca4-f9eac32b5ec8_1260x594.jpeg 848w, https://substackcdn.com/image/fetch/$s_!PtN3!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd9919aaf-d521-4cb8-8ca4-f9eac32b5ec8_1260x594.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!PtN3!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd9919aaf-d521-4cb8-8ca4-f9eac32b5ec8_1260x594.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h3>Articles </h3><p>February was packed with insight. We started the month with our analysis of the <em>2025 Bondi Beach terrorist attack</em>, breaking down how it was financed and what it reveals about disrupting future attacks. Next, we shared a commentary outlining Jessica&#8217;s recommended priorities for Canada&#8217;s future financial crimes agency to tackle emerging threats and protect Canadians. We also unpacked the 37th UN Monitoring Team Report, showing how ISIL, Al-Qaeda, and associated groups continue to sustain themselves through both traditional and innovative financing methods. Finally, in the second article of our <em>Axis of Illicit Finance</em> Series, we examined how Iran moves funds to the Houthis using cryptocurrency, spotlighting the networks that underpin this capability.</p><p>Stay informed with our latest analyses &#8212; explore our newest articles below:</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;89c79b58-eb4c-43e6-9405-ae66125a0bb3&quot;,&quot;caption&quot;:&quot;The antisemitic terrorist attack at Bondi Beach on 14 December 2025 was an unspeakable tragedy that killed 15 people and injured 40, and that investigators believe was motivated at least in part by ISIL. While it&#8217;s still early days and information is relatively sparse, it&#8217;s important to understand how the alleged attackers mobilized to violence, and how they financed the attack. Certainly,&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;The Cost of Terror: Financing Behind the Bondi Beach Attack&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:33479672,&quot;name&quot;:&quot;Jessica Davis, PhD&quot;,&quot;bio&quot;:&quot;Jessica Davis is President of Insight Threat Intelligence and is the author of Women in Modern Terrorism: From Liberations Wars to Global Terrorism and the Islamic State (2017), and Illicit Money: Financing Terrorism in the 21st Century (2021).&quot;,&quot;photo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!ICh7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe312ae7c-114b-4e4f-9ce1-8bf50ddb7a27_2344x2049.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2026-02-05T14:02:57.520Z&quot;,&quot;cover_image&quot;:&quot;https://images.unsplash.com/photo-1551955682-78a3c53ab544?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxMXx8Ym9uZGl8ZW58MHx8fHwxNzY5NDU5NTgzfDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/attack-financing-bondi-beach-2025&quot;,&quot;section_name&quot;:&quot;Attack profiles&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:185884183,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:4,&quot;comment_count&quot;:0,&quot;publication_id&quot;:329102,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!I_1w!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4649d7af-94ce-49ea-8c58-368ec26cd423_900x900.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;793b34d3-50a2-40c8-a57f-7fdb637f14ff&quot;,&quot;caption&quot;:&quot;This op-ed was published two weeks ago in the Globe and Mail.&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;A proposal: a strategic mandate for Canada's financial crimes agency&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:33479672,&quot;name&quot;:&quot;Jessica Davis, PhD&quot;,&quot;bio&quot;:&quot;Jessica Davis is President of Insight Threat Intelligence and is the author of Women in Modern Terrorism: From Liberations Wars to Global Terrorism and the Islamic State (2017), and Illicit Money: Financing Terrorism in the 21st Century (2021).&quot;,&quot;photo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!ICh7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe312ae7c-114b-4e4f-9ce1-8bf50ddb7a27_2344x2049.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2026-02-10T14:02:51.901Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!HH5B!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd451c279-820b-46d9-9bf1-5937adf93d4e_1490x1810.heic&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/a-proposal-a-strategic-mandate-for&quot;,&quot;section_name&quot;:&quot;Commentary&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:185877694,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:3,&quot;comment_count&quot;:0,&quot;publication_id&quot;:329102,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!I_1w!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4649d7af-94ce-49ea-8c58-368ec26cd423_900x900.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;458f3bf2-26eb-4528-9d46-226db7579422&quot;,&quot;caption&quot;:&quot;Last week, the United Nations Monitoring Team released its 37th report on ISIL, Al-Qaeda, and associated groups. As I often do, I have reviewed it with a particular focus on terrorist financing and what it reveals about how these groups are sustaining themselves. What follows is a brief synopsis of the key financial dynamics that stood out in the report&#8230;&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Innovation at the Margins, but Continuity at the Core: How ISIL and AQ Are Adapting&#8212;and Enduring&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:33479672,&quot;name&quot;:&quot;Jessica Davis, PhD&quot;,&quot;bio&quot;:&quot;Jessica Davis is President of Insight Threat Intelligence and is the author of Women in Modern Terrorism: From Liberations Wars to Global Terrorism and the Islamic State (2017), and Illicit Money: Financing Terrorism in the 21st Century (2021).&quot;,&quot;photo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!ICh7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe312ae7c-114b-4e4f-9ce1-8bf50ddb7a27_2344x2049.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2026-02-17T14:02:47.973Z&quot;,&quot;cover_image&quot;:&quot;https://images.unsplash.com/photo-1727221167365-d365e63e7ebc?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzfHx1bml0ZWQlMjBuYXRpb25zfGVufDB8fHx8MTc3MTE4MTk5NHww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/innovation-at-the-margins-but-continuity&quot;,&quot;section_name&quot;:&quot;News&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:188059236,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:2,&quot;comment_count&quot;:0,&quot;publication_id&quot;:329102,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!I_1w!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4649d7af-94ce-49ea-8c58-368ec26cd423_900x900.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;f23000a7-a0db-457a-b970-c67903301e06&quot;,&quot;caption&quot;:&quot;In part 1 of this series, we examined how Iran has increasingly turned to cryptocurrency as a core tool in its sanctions-evasion toolkit, using digital assets to bypass conventional financial controls and support its broader regional network of allied armed groups, including Hezbollah, Hamas, and Ansarallah (the Houthis).&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;From Tehran to Sana&#8217;a: Cryptocurrency and Sanctions Evasion in the Axis of Illicit Finance&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:33479672,&quot;name&quot;:&quot;Jessica Davis, PhD&quot;,&quot;bio&quot;:&quot;Jessica Davis is President of Insight Threat Intelligence and is the author of Women in Modern Terrorism: From Liberations Wars to Global Terrorism and the Islamic State (2017), and Illicit Money: Financing Terrorism in the 21st Century (2021).&quot;,&quot;photo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!ICh7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe312ae7c-114b-4e4f-9ce1-8bf50ddb7a27_2344x2049.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2026-02-24T14:02:37.624Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!0BCO!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ec115eb-33b1-4e33-8147-a3b6ffc1f04e_626x682.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/from-tehran-to-sanaa-cryptocurrency&quot;,&quot;section_name&quot;:&quot;Group Profiles &quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:186790350,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:2,&quot;comment_count&quot;:0,&quot;publication_id&quot;:329102,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!I_1w!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4649d7af-94ce-49ea-8c58-368ec26cd423_900x900.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/p/following-the-money-7af?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/p/following-the-money-7af?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p><br>That&#8217;s a wrap for February! See you in March with more analysis and updates. Be sure to subscribe so you don&#8217;t miss out! This is news and analysis you won&#8217;t find anywhere else. </p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/subscribe?"><span>Subscribe now</span></a></p><p><em>&#169; 2026 Insight Threat Intelligence Ltd. All Rights Reserved.<br><br>This newsletter and its contents are protected by Canadian copyright law. Except as otherwise provided for under Canadian copyright law, this newsletter and its contents may not be copied, published, distributed, downloaded or otherwise stored in a retrieval system, transmitted or converted, in any form or by any means, electronic or otherwise, without the prior written permission of the copyright owner.</em></p>]]></content:encoded></item><item><title><![CDATA[Obscuring the Money Behind the Bombs: New Data on Terrorist Financial Tradecraft]]></title><description><![CDATA[How terrorists are hiding the source, destination, and use of funds -- and what to do about it]]></description><link>https://newsletter.insightthreatintel.com/p/obscuring-the-money-behind-the-bombs</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/obscuring-the-money-behind-the-bombs</guid><dc:creator><![CDATA[Jessica Davis, PhD]]></dc:creator><pubDate>Tue, 03 Mar 2026 14:03:28 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!t2RV!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21118c2c-ea5a-46c8-9fbd-40ae731b5546_1047x596.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Hello <strong>Insight Monitor</strong> subscribers, and welcome to another edition of our series on trends in terrorist financing, using a unique longitudinal dataset. This series goes beyond headline cases and anecdotes, offering data-driven insights and analysis you won&#8217;t find anywhere else. In this issue, I focus on how terrorists obscure the sources, destinations, and uses of funds&#8212;and what this reveals about terrorist financial adaptation.</em></p><p>Terrorist financing is often discussed in terms of <em>how money is raised</em>, but far less attention is paid to what happens next: how that money is deliberately hidden. In this context, obscuring refers to the financial tradecraft terrorists use to hide the source, destination, or ultimate use of funds&#8212;a set of practices designed to frustrate detection, complicate attribution, and sever the visible link between money and violence. Drawing on my existing dataset, this newsletter examines how terrorist groups and individuals disguise terrorist funds. Understanding these techniques is essential for a more operational understanding of how these networks and actors survive under sustained financial pressure.</p><p>To get caught up on the series so far (and learn more about the data, have a read: </p><ol><li><p><a href="https://newsletter.insightthreatintel.com/p/trends-in-terrorist-financing-2020?r=jxl2w&amp;utm_campaign=post&amp;utm_medium=web&amp;triedRedirect=true">Trends in Terrorist Financing 2020-2025</a></p></li><li><p><a href="https://newsletter.insightthreatintel.com/p/beyond-anecdotes-terrorist-financing">Beyond Anecdotes: Terrorist Financing Has Moved to Crypto</a></p></li></ol><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Insight Monitor is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>Over the past six years, terrorists have demonstrably increased their use of financial tradecraft to obscure the source, destination, and use of funds. Importantly, the patterns observed in open cases and enforcement actions almost certainly represent a lower bound of actual tradecraft in use: the most sophisticated methods are, by definition, the least likely to be detected, investigated, or publicly documented.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!rwix!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c9838f3-ac2a-4d6e-bc24-8599a04adc61_993x576.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!rwix!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c9838f3-ac2a-4d6e-bc24-8599a04adc61_993x576.png 424w, https://substackcdn.com/image/fetch/$s_!rwix!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c9838f3-ac2a-4d6e-bc24-8599a04adc61_993x576.png 848w, https://substackcdn.com/image/fetch/$s_!rwix!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c9838f3-ac2a-4d6e-bc24-8599a04adc61_993x576.png 1272w, https://substackcdn.com/image/fetch/$s_!rwix!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c9838f3-ac2a-4d6e-bc24-8599a04adc61_993x576.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!rwix!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c9838f3-ac2a-4d6e-bc24-8599a04adc61_993x576.png" width="993" height="576" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1c9838f3-ac2a-4d6e-bc24-8599a04adc61_993x576.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:576,&quot;width&quot;:993,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:59153,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://newsletter.insightthreatintel.com/i/153040222?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c9838f3-ac2a-4d6e-bc24-8599a04adc61_993x576.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!rwix!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c9838f3-ac2a-4d6e-bc24-8599a04adc61_993x576.png 424w, https://substackcdn.com/image/fetch/$s_!rwix!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c9838f3-ac2a-4d6e-bc24-8599a04adc61_993x576.png 848w, https://substackcdn.com/image/fetch/$s_!rwix!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c9838f3-ac2a-4d6e-bc24-8599a04adc61_993x576.png 1272w, https://substackcdn.com/image/fetch/$s_!rwix!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c9838f3-ac2a-4d6e-bc24-8599a04adc61_993x576.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Over time, terrorist financing has become more complex, though it still generally lacks the sophistication typically observed in large-scale money laundering or other forms of illicit finance. This growing complexity is not driven by a single innovation, but by the layering of methods that, when combined, increase network opacity. These methods include continued reliance on cash, the use of facilitators and enablers, the deployment of third parties and proxies, and the selective adoption of money-laundering techniques. Keep reading to learn more: </p>
      <p>
          <a href="https://newsletter.insightthreatintel.com/p/obscuring-the-money-behind-the-bombs">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[From Tehran to Sana’a: Cryptocurrency and Sanctions Evasion in the Axis of Illicit Finance]]></title><description><![CDATA[Ansarallah (the Houthis) and cryptocurrency-enabled terrorist financing]]></description><link>https://newsletter.insightthreatintel.com/p/from-tehran-to-sanaa-cryptocurrency</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/from-tehran-to-sanaa-cryptocurrency</guid><dc:creator><![CDATA[Jessica Davis, PhD]]></dc:creator><pubDate>Tue, 24 Feb 2026 14:02:37 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!0BCO!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ec115eb-33b1-4e33-8147-a3b6ffc1f04e_626x682.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>In part 1 of this series,<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a> we examined how Iran has increasingly turned to cryptocurrency as a core tool in its sanctions-evasion toolkit, using digital assets to bypass conventional financial controls and support its broader regional network of allied armed groups, including Hezbollah, Hamas, and Ansarallah (the Houthis).</em> <em>In today&#8217;s edition of the series, we&#8217;re looking at how Iran moves money to the Houthis using cryptocurrency, and the networks that underpin this capability. Have a read to learn more about this threat network, what it means for global instability, and how to counter it. </em></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Insight Monitor is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h4>Part 1: </h4><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;6b648439-eb08-48ad-90b5-a587f64e5319&quot;,&quot;caption&quot;:&quot;This article marks the start of an eight-part series examining how Iran has increasingly relied on cryptocurrency to circumvent international sanctions. These developments unfold against a volatile backdrop: Iran&#8217;s 2025 confrontation with Israel, the ongoing activity of its regional proxy network, and protests driven by corruption, economic hardship (ex&#8230;&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;The Axis of Illicit Finance: Iran&#8217;s Crypto Strategy Explained&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:33479672,&quot;name&quot;:&quot;Jessica Davis, PhD&quot;,&quot;bio&quot;:&quot;Jessica Davis is President of Insight Threat Intelligence and is the author of Women in Modern Terrorism: From Liberations Wars to Global Terrorism and the Islamic State (2017), and Illicit Money: Financing Terrorism in the 21st Century (2021).&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e312ae7c-114b-4e4f-9ce1-8bf50ddb7a27_2344x2049.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2026-01-06T14:00:45.585Z&quot;,&quot;cover_image&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/87b19738-1968-494d-aa46-98d0020cd199_845x486.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/the-axis-of-illicit-finance-irans&quot;,&quot;section_name&quot;:&quot;Financiers&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:183357175,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:8,&quot;comment_count&quot;:0,&quot;publication_id&quot;:329102,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!I_1w!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4649d7af-94ce-49ea-8c58-368ec26cd423_900x900.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>The first installment of this eight-part series outlined how one of the world&#8217;s most heavily sanctioned states has evolved its financial infrastructure &#8212; integrating traditional networks with crypto rails &#8212; to sustain its economy and underwrite proxy activities across the Middle East. Against a backdrop of geopolitical conflict and tightening sanctions, Iran&#8217;s adoption of cryptocurrency is not just about evading sanctions but about embedding itself in an emerging &#8220;axis of illicit finance&#8221; that links it with other sanctioned states and actors, making crypto increasingly central to its ability to fund and project influence through its affiliates. In recent years, Iran&#8217;s proxy networks have conducted on-chain activity of over $2 billion; this activity is <a href="https://www.chainalysis.com/blog/2026-crypto-crime-report-introduction/">based on confirmed wallets identified in sanctions designations</a>, and likely represents a low estimate of Iran&#8217;s true use of cryptocurrency for terrorist financing.</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;37bb6dd4-9a5e-4707-9564-84177048320e&quot;,&quot;caption&quot;:&quot;The Houthis began a military campaign in October 2023 in solidarity with Hamas by launching missile and drone strikes that targeted an Israeli tourist resort. Their campaign escalated with additional missile strikes throughout the region and claiming the downing of a&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;The Houthis&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:85208154,&quot;name&quot;:&quot;Elena Martynova&quot;,&quot;bio&quot;:&quot;Researching terrorism &quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e88b531d-b106-4c92-8177-62a8a864bde5_2316x2316.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2024-01-25T14:01:26.911Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2bc199a-093f-4978-87f7-4d63e7fe4136_1500x1000.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/the-houthis&quot;,&quot;section_name&quot;:&quot;Group Profiles &quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:141021522,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:3,&quot;comment_count&quot;:0,&quot;publication_id&quot;:329102,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!I_1w!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4649d7af-94ce-49ea-8c58-368ec26cd423_900x900.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><h3>Yemen, the Houthis, and the Axis of Resistance</h3><p>Over the last two years, the Houthis have become even more important to Iran amid <a href="https://sanaacenter.org/publications/analysis/26051">geopolitical losses</a>. At the same time, cryptocurrency has become increasingly important for Iran, with the IRGC&#8217;s share of Iran&#8217;s cryptocurrency ecosystem <a href="https://www.chainalysis.com/blog/iranian-crypto-activity-geopolitical-tensions-2026/">rising to 50</a>% in the last quarter of 2025. For instance, several reports indicate that <a href="https://www.coindesk.com/policy/2026/01/02/iran-accepts-cryptocurrency-as-payment-for-advanced-weapons">Iran accepts crypto payments</a> for military equipment purchases, even if those payments are not necessarily processed directly through websites. Ultimately, sanctions targeting both Iran and the Houthis, and Iran&#8217;s development of crypto rails for payments to its proxies (among other uses), likely complement other, more traditional payment methods like hawala, cash couriers, and even bank transfers.</p><p>Like the other axis members, Iran funds the Yemen branch of its axis of resistance (Ansarallah / The Houthis) in various ways, primarily by diverting profits from illicit oil sales through cryptocurrency transactions. The crypto component of Iran&#8217;s hybrid threat-financing network that funds the Houthis is illustrated below. Some of the basic details are as follows:  </p><ul><li><p>According to the US OFAC, the IRGC-QF cooperates with Iran-based<sup> </sup><a href="https://home.treasury.gov/news/press-releases/jy0221">Ansarallah financial official Sa&#8217;id al-Jamal</a>; OFAC has identified <a href="https://home.treasury.gov/news/press-releases/jy2757">five cryptocurrency wallets</a> associated with him. Al-Jamal also operates exchange companies in Sana&#8217;a, Yemen, specifically Janat al Anhar General Trading LLC (formerly Abu Sumbol General Trading LLC). These businesses <a href="https://home.treasury.gov/news/press-releases/sb0367">facilitate payment for Iranian oil</a>. </p></li><li><p>Funds transfers are also facilitated for him through a variety of money exchanges located in the United Arab Emirates (UAE), including <a href="https://home.treasury.gov/news/press-releases/jy0221">Adoon General Trading FZE</a>. Al-Jamal reportedly generates revenue through the illicit sale of Iranian petroleum to customers in East Asia using a network of shipping firms in Malaysia. (Malaysia acts as an intermediary for some Iranian oil, with Iranian oil re-labelled as originating from Malaysia and sold to other countries, <a href="https://www.reuters.com/markets/commodities/chinas-march-iranian-oil-imports-surge-us-sanctions-fears-2025-04-10/">including China</a>).<sup> </sup></p></li><li><p>These oil transactions often appear in Iran&#8217;s shadow banking network and refer to <a href="https://finintegrity.org/out-of-the-shadows/">&#8220;Malaysian blend&#8221;</a> oil. Some of these transactions have been small-denomination inflows through <a href="https://www.trmlabs.com/resources/blog/new-drones-old-tactics-how-iran-uses-crypto-to-fund-conflict-and-evade-sanctions">informal exchanges</a>.</p></li></ul><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!0BCO!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ec115eb-33b1-4e33-8147-a3b6ffc1f04e_626x682.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!0BCO!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ec115eb-33b1-4e33-8147-a3b6ffc1f04e_626x682.png 424w, https://substackcdn.com/image/fetch/$s_!0BCO!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ec115eb-33b1-4e33-8147-a3b6ffc1f04e_626x682.png 848w, https://substackcdn.com/image/fetch/$s_!0BCO!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ec115eb-33b1-4e33-8147-a3b6ffc1f04e_626x682.png 1272w, https://substackcdn.com/image/fetch/$s_!0BCO!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ec115eb-33b1-4e33-8147-a3b6ffc1f04e_626x682.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!0BCO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ec115eb-33b1-4e33-8147-a3b6ffc1f04e_626x682.png" width="626" height="682" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9ec115eb-33b1-4e33-8147-a3b6ffc1f04e_626x682.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:682,&quot;width&quot;:626,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:130798,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://newsletter.insightthreatintel.com/i/186790350?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ec115eb-33b1-4e33-8147-a3b6ffc1f04e_626x682.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!0BCO!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ec115eb-33b1-4e33-8147-a3b6ffc1f04e_626x682.png 424w, https://substackcdn.com/image/fetch/$s_!0BCO!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ec115eb-33b1-4e33-8147-a3b6ffc1f04e_626x682.png 848w, https://substackcdn.com/image/fetch/$s_!0BCO!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ec115eb-33b1-4e33-8147-a3b6ffc1f04e_626x682.png 1272w, https://substackcdn.com/image/fetch/$s_!0BCO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ec115eb-33b1-4e33-8147-a3b6ffc1f04e_626x682.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>These transactions are not limited to the Middle East and are linked to the broader illicit finance network<sup> </sup>through Russia, specifically the Russian cryptocurrency exchange <a href="https://www.trmlabs.com/resources/blog/the-takedown-of-garantex-a-notorious-crypto-exchanges-role-in-illicit-finance">Garantex</a>, which is <a href="https://www.icij.org/news/2025/09/cryptocurrency-exchange-garantex-lives-on-despite-sanctions-new-report-unveils/">reportedly still active</a> despite sanctions and domain seizure. In April 2025, the US further identified eight wallets associated with Sa&#8217;id Al-Jamal and indicated that, in addition to facilitating illicit petroleum sales, he is also involved in weapons procurement from Russia and facilitating the sale of stolen <a href="https://home.treasury.gov/news/press-releases/sb0068">Ukrainian grain</a>. These addresses included six private wallets and two deposit addresses at mainstream services. According to Chainalysis, these addresses have moved nearly <a href="https://www.chainalysis.com/blog/ofac-sanctions-houthi-network-crypto-money-laundering-russia-april-2025/">$1 billion in illicit funds</a>. As part of this activity, the Houthis used deposit addresses at Garantex. In early 2026, allegations surfaced about the role of Binance in Iran&#8217;s illicit finance network, including for sending money to the Houthis. These allegations suggest that Binance has facilitated over $1.7 billion for Iran / IRGC / Axis of Resistance.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-2" href="#footnote-2" target="_self">2</a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/p/from-tehran-to-sanaa-cryptocurrency?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/p/from-tehran-to-sanaa-cryptocurrency?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p><strong>Financial Intelligence Sources</strong></p><p><em>Do you want to identify and exploit new sources of financial intelligence? Our evergreen course is your guide to finding, analyzing, and contextualizing open source financial intelligence. This step-by-step guide to FININT sources will greatly expand your intelligence knowledge and skills. This course is perfect for people new to financial intelligence and seasoned professionals. <a href="https://insightthreatintelligence.thinkific.com/courses/FININTSources">Enroll today</a></em></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://insightthreatintelligence.thinkific.com/courses/FININTSources" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Vv2Y!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e2d12f5-a284-4cb1-95cf-04742c85d0af_1144x400.png 424w, https://substackcdn.com/image/fetch/$s_!Vv2Y!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e2d12f5-a284-4cb1-95cf-04742c85d0af_1144x400.png 848w, https://substackcdn.com/image/fetch/$s_!Vv2Y!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e2d12f5-a284-4cb1-95cf-04742c85d0af_1144x400.png 1272w, https://substackcdn.com/image/fetch/$s_!Vv2Y!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e2d12f5-a284-4cb1-95cf-04742c85d0af_1144x400.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Vv2Y!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e2d12f5-a284-4cb1-95cf-04742c85d0af_1144x400.png" width="1144" height="400" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8e2d12f5-a284-4cb1-95cf-04742c85d0af_1144x400.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:400,&quot;width&quot;:1144,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:357457,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://insightthreatintelligence.thinkific.com/courses/FININTSources&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://newsletter.insightthreatintel.com/i/153040222?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e2d12f5-a284-4cb1-95cf-04742c85d0af_1144x400.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!Vv2Y!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e2d12f5-a284-4cb1-95cf-04742c85d0af_1144x400.png 424w, https://substackcdn.com/image/fetch/$s_!Vv2Y!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e2d12f5-a284-4cb1-95cf-04742c85d0af_1144x400.png 848w, https://substackcdn.com/image/fetch/$s_!Vv2Y!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e2d12f5-a284-4cb1-95cf-04742c85d0af_1144x400.png 1272w, https://substackcdn.com/image/fetch/$s_!Vv2Y!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e2d12f5-a284-4cb1-95cf-04742c85d0af_1144x400.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2>An International Network</h2><p>Anyone versed in counter-terrorist financing will also not find it surprising that this terrorist financing network has connections in T&#252;rkiye. According to OFAC, T&#252;rkiye-based Hassan Jafari has also worked with Sa&#8217;id al-Jamal to launder money on behalf of al-Jamal&#8217;s network and has arranged payments worth millions of dollars in support of <a href="https://home.treasury.gov/news/press-releases/sb0068">shipments for the Houthis</a>. Jafari has also worked with brothers Hushang and Sohrab Gahirat on the Houthis&#8217; commercial initiatives in Russia, including arms procurement and <a href="https://home.treasury.gov/news/press-releases/sb0068">grain shipments</a>.</p><p>Part of this network also extends into Syria. For instance, Alireza Derakshan and Arash Estaki Alivand coordinated more than $100 million in oil sales for the Iranian government through cryptocurrency and used a network of front companies across multiple jurisdictions. <a href="https://home.treasury.gov/news/press-releases/sb0248">Alivand worked as a financial facilitator</a> and oil broker for Syria-based Al Qatirji Company, while Derakhshan used UAE-based Minato Commercial Brokers as a front company to make a payment to Al Qatirji Company.</p><p>In Yemen, a network of money service businesses connects and facilitates cryptocurrency payments, as well as traditional financial transfers and likely cash-out services: </p><ul><li><p>Houthi finance official, Abdullah al-Jamal, has used a network of money service businesses, trade facilitators, and cryptocurrency addresses to move funds. </p></li><li><p>He has used the Sana&#8217;a-based money service business Mohammed Ali Al Thawr Exchange, and he also controls the Davos Exchange and Remittances company. </p></li><li><p>Other exchanges, specifically<sup> </sup>Khaled Al Hazmi and Brother Company General Partnership, have also transferred funds to <a href="https://home.treasury.gov/news/press-releases/jy2757.">Davos Exchange</a> as part of this illicit activity.</p></li></ul><p>This cryptocurrency network does not operate in isolation. Instead, it plugs directly into a wider ecosystem of exchange houses, front companies, and long-standing smuggling routes tied to the Houthis&#8217; weapons-procurement apparatus. Together, these crypto nodes form a parallel financial architecture&#8212;one that functions as a secondary payment system &#8212;designed to move value, settle transactions, and sustain illicit activity while insulating the network from sanctions and traditional financial controls. While parts of this network are visible through on-chain analysis, additional off-chain activity (including cash and hawala transactions) likely further obfuscates the network's full extent.</p><p>Iran and the Houthis&#8217; hybrid threat finance system is likely growing in complexity and sophistication, and is facilitated by access to greater pools of illicit cryptocurrency funds provided by Chinese money laundering networks. Furthermore, Ansarallah has used privacy-enhancing tools such as <a href="https://www.trmlabs.com/resources/blog/new-drones-old-tactics-how-iran-uses-crypto-to-fund-conflict-and-evade-sanctions">mixers and cross-chain protocols</a>, demonstrating financial tradecraft capabilities.</p><p>Ansarallah&#8217;s use of cryptocurrency for financing, facilitated by a small number of identified individuals, reflects a broader and potentially more complex network linked to Iran. These facilitators operate through companies, hawalas, and exchanges in T&#252;rkiye, Russia, Yemen, Syria, Lebanon, and the UAE, thereby enabling the group to access financial infrastructure beyond Yemen&#8217;s borders. While current evidence highlights these specific connections, it remains unclear whether this network represents the entirety of Ansarallah&#8217;s crypto-financing apparatus or merely the visible edge of a much larger system. The opacity of these networks, combined with Iran&#8217;s established role in supporting proxy groups through both traditional and emerging financial channels, suggests that the full scale and sophistication of Ansarallah&#8217;s digital financing strategy might still be underappreciated. </p><p>Following Iran&#8217;s significant military setbacks in the first half of 2025, <a href="https://sanaacenter.org/the-yemen-review/april-june-2025/25031">Iran needs Ansarallah more than ever</a>, and faces significant sunk costs in terms of existing investment in the group. As a result, Iran is likely to continue, and could increase, support for the group, and some of the tens or <a href="https://doi.org/10.1080/1057610X.2021.1954353">hundreds of millions of dollars a year that Iran provides to the group</a><sup> </sup>might increasingly move through cryptocurrency.</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;d71fce51-1012-4099-9ea5-8a10b11ce2cb&quot;,&quot;caption&quot;:&quot;Since October 2023, the Houthis have intensified their military operations in solidarity with Hamas, launching missile and drone attacks that have destabilized the region and disrupted global shipping in the Red Sea. Their personnel strength has further expanded to encompass&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Sanctioned but Sustained: Why the Houthis&#8217; Finances Endure Global Pressure&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:85208154,&quot;name&quot;:&quot;Elena Martynova&quot;,&quot;bio&quot;:&quot;Researching terrorism &quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e88b531d-b106-4c92-8177-62a8a864bde5_2316x2316.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2025-07-17T13:02:12.976Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!DbUL!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1ce816cd-716d-475f-b975-135412b63737_936x624.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/sanctioned-but-sustained-why-the&quot;,&quot;section_name&quot;:&quot;Group Profiles &quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:167732270,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:6,&quot;comment_count&quot;:0,&quot;publication_id&quot;:329102,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!I_1w!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4649d7af-94ce-49ea-8c58-368ec26cd423_900x900.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/p/from-tehran-to-sanaa-cryptocurrency?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thanks for reading Insight Monitor! This post is public so feel free to share it.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/p/from-tehran-to-sanaa-cryptocurrency?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/p/from-tehran-to-sanaa-cryptocurrency?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div><p><em>&#169; 2026 Insight Threat Intelligence Ltd. All Rights Reserved.<br><br>This newsletter and its contents are protected by Canadian copyright law. Except as otherwise provided for under Canadian copyright law, this newsletter and its contents may not be copied, published, distributed, downloaded or otherwise stored in a retrieval system, transmitted or converted, in any form or by any means, electronic or otherwise, without the prior written permission of the copyright owner.</em></p><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-1" href="#footnote-anchor-1" class="footnote-number" contenteditable="false" target="_self">1</a><div class="footnote-content"><p>This research is part of my post-doctoral work funded by the University of Calgary&#8217;s Faculty of Law.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-2" href="#footnote-anchor-2" class="footnote-number" contenteditable="false" target="_self">2</a><div class="footnote-content"><p>I remain somewhat skeptical of these numbers; many wallets are used for different purposes (and sometimes serve as cash-out services or hawalas), so counting all transactions as part of a terrorist financing network might not be accurate. It&#8217;s worth having a solid understanding of a methodology before fully embracing these estimates. </p></div></div>]]></content:encoded></item><item><title><![CDATA[Innovation at the Margins, but Continuity at the Core: How ISIL and AQ Are Adapting—and Enduring]]></title><description><![CDATA[Reviewing the 37th UN Monitoring Team report]]></description><link>https://newsletter.insightthreatintel.com/p/innovation-at-the-margins-but-continuity</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/innovation-at-the-margins-but-continuity</guid><dc:creator><![CDATA[Jessica Davis, PhD]]></dc:creator><pubDate>Tue, 17 Feb 2026 14:02:47 GMT</pubDate><enclosure url="https://images.unsplash.com/photo-1727221167365-d365e63e7ebc?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzfHx1bml0ZWQlMjBuYXRpb25zfGVufDB8fHx8MTc3MTE4MTk5NHww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Last week, the United Nations Monitoring Team released its 37th report on ISIL, Al-Qaeda, and associated groups.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a> As I often do, I have reviewed it with a particular focus on terrorist financing and what it reveals about how these groups are sustaining themselves. What follows is a brief synopsis of the key financial dynamics that stood out in the report. Some of our prior analysis is linked below: </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://images.unsplash.com/photo-1727221167365-d365e63e7ebc?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzfHx1bml0ZWQlMjBuYXRpb25zfGVufDB8fHx8MTc3MTE4MTk5NHww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://images.unsplash.com/photo-1727221167365-d365e63e7ebc?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzfHx1bml0ZWQlMjBuYXRpb25zfGVufDB8fHx8MTc3MTE4MTk5NHww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1727221167365-d365e63e7ebc?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzfHx1bml0ZWQlMjBuYXRpb25zfGVufDB8fHx8MTc3MTE4MTk5NHww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1727221167365-d365e63e7ebc?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzfHx1bml0ZWQlMjBuYXRpb25zfGVufDB8fHx8MTc3MTE4MTk5NHww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1727221167365-d365e63e7ebc?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzfHx1bml0ZWQlMjBuYXRpb25zfGVufDB8fHx8MTc3MTE4MTk5NHww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1456w" sizes="100vw"><img src="https://images.unsplash.com/photo-1727221167365-d365e63e7ebc?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzfHx1bml0ZWQlMjBuYXRpb25zfGVufDB8fHx8MTc3MTE4MTk5NHww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" width="362" height="241.33333333333334" data-attrs="{&quot;src&quot;:&quot;https://images.unsplash.com/photo-1727221167365-d365e63e7ebc?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzfHx1bml0ZWQlMjBuYXRpb25zfGVufDB8fHx8MTc3MTE4MTk5NHww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:4672,&quot;width&quot;:7008,&quot;resizeWidth&quot;:362,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;A very tall building sitting next to a body of water&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="A very tall building sitting next to a body of water" title="A very tall building sitting next to a body of water" srcset="https://images.unsplash.com/photo-1727221167365-d365e63e7ebc?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzfHx1bml0ZWQlMjBuYXRpb25zfGVufDB8fHx8MTc3MTE4MTk5NHww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1727221167365-d365e63e7ebc?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzfHx1bml0ZWQlMjBuYXRpb25zfGVufDB8fHx8MTc3MTE4MTk5NHww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1727221167365-d365e63e7ebc?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzfHx1bml0ZWQlMjBuYXRpb25zfGVufDB8fHx8MTc3MTE4MTk5NHww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1727221167365-d365e63e7ebc?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzfHx1bml0ZWQlMjBuYXRpb25zfGVufDB8fHx8MTc3MTE4MTk5NHww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/@nhuenerfuerst">Nils Huenerfuerst</a> on <a href="https://unsplash.com">Unsplash</a></figcaption></figure></div><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;ed99f1e9-d3a8-422a-9471-cb98581dbf3e&quot;,&quot;caption&quot;:&quot;Last week, the United nations Monitoring Team produced its thirty-third report on ISIL and Al Qaeda. I usually do a quick review of these reports on Twitter, but have decided to move my analysis over to Insight Monitor to better preserve and formalize it. This analysis pulls out the main finance pieces as reported by member states, outlines what&#8217;s new, &#8230;&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;The state of terrorist financing, as seen by the United Nations&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:33479672,&quot;name&quot;:&quot;Jessica Davis, PhD&quot;,&quot;bio&quot;:&quot;Jessica Davis is President of Insight Threat Intelligence and is the author of Women in Modern Terrorism: From Liberations Wars to Global Terrorism and the Islamic State (2017), and Illicit Money: Financing Terrorism in the 21st Century (2021).&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e312ae7c-114b-4e4f-9ce1-8bf50ddb7a27_2344x2049.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2024-02-06T14:00:18.875Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!fzjw!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7846263e-b43d-4227-9a12-96a180188773_771x739.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/analysis-the-state-of-terrorist-financing&quot;,&quot;section_name&quot;:&quot;Group Profiles &quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:141409271,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:7,&quot;comment_count&quot;:0,&quot;publication_id&quot;:329102,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!I_1w!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4649d7af-94ce-49ea-8c58-368ec26cd423_900x900.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;f7aa4f3b-ac91-468e-9919-42b03cea91ab&quot;,&quot;caption&quot;:&quot;At the beginning of February, the UN Monitoring Team released its Thirty-Fifth report on ISIL and Al-Qaeda, outlining operational activities and trends as reported by Member States. This analysis summarizes the key threats related to terrorism financing, counter-terrorism successes, and some financing evolutions within these organizations, as detailed in the report.&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Evolving Threats: Key Financing Takeaways from the UN&#8217;s Latest ISIL and Al-Qaeda Report&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:85208154,&quot;name&quot;:&quot;Elena Martynova&quot;,&quot;bio&quot;:&quot;Researching terrorism &quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e88b531d-b106-4c92-8177-62a8a864bde5_2316x2316.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2025-03-06T08:01:23.057Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!UA5K!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4a55a893-382a-42c4-b11e-068d549dd49a_1024x1024.webp&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/evolving-threats-key-financing-takeaways&quot;,&quot;section_name&quot;:&quot;News&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:158423842,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:1,&quot;comment_count&quot;:0,&quot;publication_id&quot;:329102,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!I_1w!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4649d7af-94ce-49ea-8c58-368ec26cd423_900x900.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;93fb3cb2-8500-4ec2-9a68-1161bfb21fd7&quot;,&quot;caption&quot;:&quot;Hello, Insight Monitor subscribers, and welcome to another week of news and analysis you won&#8217;t find anywhere else. Last week, the latest UN Monitoring Team report was released. And while we&#8217;re certainly not first to do a summary and highlight key points, we did take our time to go through it, find all the terrorist financing-related content, and pull ou&#8230;&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Hawala in the Cloud, Cash Under the Mattress: ISIL&#8217;s Evolving Finances&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:33479672,&quot;name&quot;:&quot;Jessica Davis, PhD&quot;,&quot;bio&quot;:&quot;Jessica Davis is President of Insight Threat Intelligence and is the author of Women in Modern Terrorism: From Liberations Wars to Global Terrorism and the Islamic State (2017), and Illicit Money: Financing Terrorism in the 21st Century (2021).&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e312ae7c-114b-4e4f-9ce1-8bf50ddb7a27_2344x2049.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100},{&quot;id&quot;:85208154,&quot;name&quot;:&quot;Elena Martynova&quot;,&quot;bio&quot;:&quot;Researching terrorism &quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e88b531d-b106-4c92-8177-62a8a864bde5_2316x2316.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2025-08-11T13:02:53.648Z&quot;,&quot;cover_image&quot;:&quot;https://images.unsplash.com/photo-1727221167365-d365e63e7ebc?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHx1bml0ZWQlMjBuYXRpb25zfGVufDB8fHx8MTc1NDg0NTkwMHww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/hawala-in-the-cloud-cash-under-the&quot;,&quot;section_name&quot;:&quot;Commentary&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:170617622,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:7,&quot;comment_count&quot;:0,&quot;publication_id&quot;:329102,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!I_1w!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4649d7af-94ce-49ea-8c58-368ec26cd423_900x900.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>One of the most notable developments in AQ/ISIL terrorist financing concerns the Allied Democratic Forces (ADF), which is reportedly using satellite internet to facilitate cryptocurrency conversions into state-issued currency, including through mobile money applications. This demonstrates not only the increasing accessibility of crypto for terrorist actors but also a significant operational adaptation to access crypto even in remote areas. The technical and logistical barriers are being overcome, and groups are increasingly integrating digital assets into local financial ecosystems.</p><p>At the same time, while cryptocurrency adaptation is increasing, it does not displace more traditional revenue streams. Across theatres, local taxation and extortion networks remain central to sustaining operations, alongside criminal activity such as smuggling and illicit trade. The report reinforces a familiar pattern: innovation at the margins, but continuity at the core. For most groups, territorial control, coercive taxation, and embedded criminal economies continue to underpin their financing strategies.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Insight Monitor is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h3><strong>JNIM</strong></h3><p>According to the UN, <a href="https://newsletter.insightthreatintel.com/p/gold-guns-and-cattle-jnims-30-billion?utm_source=publication-search">JNIM</a> profited from a single large ransom payment and used that to increase its capabilities. Here at Insight Monitor, we wrote about that large ransom payment, noting that &#8220;the money will certainly allow JNIM more operational freedom of movement in the coming months, and likely incentivize them to gain more territory and solidify control and influence in the region.&#8221; JNIM engages in both low-level (and low-cost) local kidnappings, as well as higher cost (and higher reward) international kidnapping for ransom. </p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;f3896081-93ca-4d48-a02b-13c867b15518&quot;,&quot;caption&quot;:&quot;JNIM (Al-Qaeda affiliate Jama&#8217;at Nusrat al-Islam wal-Muslimin) has been on the march in Africa, expanding its areas of operations across Burkina Faso, Mali, and Niger, and most recently into Nigeria. The group has encroached on Mali&#8217;s capital, Bamako, and created a fuel blockade over the last two months that has seriously threatened the capital.&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;JNIM's $50 million windfall&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:33479672,&quot;name&quot;:&quot;Jessica Davis, PhD&quot;,&quot;bio&quot;:&quot;Jessica Davis is President of Insight Threat Intelligence and is the author of Women in Modern Terrorism: From Liberations Wars to Global Terrorism and the Islamic State (2017), and Illicit Money: Financing Terrorism in the 21st Century (2021).&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e312ae7c-114b-4e4f-9ce1-8bf50ddb7a27_2344x2049.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2025-11-04T11:35:29.725Z&quot;,&quot;cover_image&quot;:&quot;https://images.unsplash.com/photo-1619149808494-d9a0a7eba166?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxtb25leSUyMHRlcnJvcmlzbSUyMHVhZXxlbnwwfHx8fDE3NjIxODQ2MTh8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/jnims-50-million-windfall&quot;,&quot;section_name&quot;:&quot;Group Profiles &quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:177894948,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:6,&quot;comment_count&quot;:0,&quot;publication_id&quot;:329102,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!I_1w!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4649d7af-94ce-49ea-8c58-368ec26cd423_900x900.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>JNIM is assessed by the UN to be the wealthiest Al-Qaeda affiliate after Al-Shabaab, having significantly expanded its revenue base through territorial control. The group raises funds by taxing and regulating gold mining and other commercial activities, imposing road tolls and transportation fees, and engaging in smuggling and livestock rustling. It also collects zakat (charitable donations), with rates varying by location; in areas where local communities resist or are perceived as uncooperative, zakat can be increased to extortionate levels. This diversified and locally calibrated approach to revenue generation has strengthened JNIM&#8217;s financial resilience.</p><h3>Lakurawa</h3><p>The UN also mentioned (I believe for the first time) Lakurawa, a group within the Islamic State Greater Sahel,<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-2" href="#footnote-2" target="_self">2</a> and described their financing as primarily illegal tax collection and cattle rustling. You can read more about Lakurawa in this <a href="https://thesoufancenter.org/intelbrief-2026-february-6/">Soufan Center</a> intel brief. </p><h4><strong>Terrorist Financing Analysis</strong></h4><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://insightthreatintelligence.thinkific.com/bundles/tf-analysis" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!f7rH!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 424w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 848w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 1272w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!f7rH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png" width="1066" height="507" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:507,&quot;width&quot;:1066,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:698946,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://insightthreatintelligence.thinkific.com/bundles/tf-analysis&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!f7rH!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 424w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 848w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 1272w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>Our terrorist financing analysis course caters to researchers, intelligence, law enforcement, and compliance professionals, helping them learn about terrorist financing and analyze suspicious patterns to disrupt terrorist activities more effectively. <a href="https://insightthreatintelligence.thinkific.com/bundles/tf-analysis">Sign up </a>today to grow your counter-terrorism expertise.</em> </p><div><hr></div><h4><strong>ADF</strong></h4><p>The Monitoring team also reported an increase in ADF's use of cryptocurrency for financing. They also noted that the ADF now has greater satellite connectivity, enabling the group to convert cryptocurrency into usable funds via mobile money applications and wallets. This capability allows them, even when deep in the bush and in areas outside of conventional cell coverage, to access and covert cryptocurrency to state-issued currency. To read more about ADF financing: </p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;00f0ce86-1803-47dc-b52d-8041f1b60ef4&quot;,&quot;caption&quot;:&quot;The Allied Democratic Forces (ADF) is the most active and violent armed group in the Democratic Republic of the Congo (DRC). Since 2013, the organization has conducted dozens of attacks, killing over 6,000 civilians and causing the displacement of over&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;ISIL-Affiliated Allied Democratic Forces&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:85208154,&quot;name&quot;:&quot;Elena Martynova&quot;,&quot;bio&quot;:&quot;Researching terrorism &quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e88b531d-b106-4c92-8177-62a8a864bde5_2316x2316.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2023-04-06T13:01:46.606Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!bsu5!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbe8bc100-7f81-408b-bfc9-a7a0ee3d6582_1920x1500.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/isil-affiliated-allied-democratic&quot;,&quot;section_name&quot;:&quot;Group Profiles &quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:112927316,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:7,&quot;comment_count&quot;:3,&quot;publication_id&quot;:329102,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!I_1w!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4649d7af-94ce-49ea-8c58-368ec26cd423_900x900.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/p/innovation-at-the-margins-but-continuity?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/p/innovation-at-the-margins-but-continuity?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><h3>ISIL</h3><p>The UN monitoring team assesses that the revenue collection capability of <strong>ISIL in Somalia</strong> has been significantly degraded. While the group continues to generate revenue through its business interests, it can no longer collect revenue in key locations such as Bosasso, Qandala, and Ba&#8217;ad, where security conditions have tightened. The securitization of these areas has disrupted their taxation and extortion activities, constraining their ability to operate as they once did. That said, ISIL-Somalia has been able to draw on <a href="https://newsletter.insightthreatintel.com/p/financing-terrorism-throughout-africa?utm_source=publication-search">residual funds</a>, which have helped sustain the group despite these setbacks.</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;31efd22d-4045-4da0-a349-73d9ff2e3368&quot;,&quot;caption&quot;:&quot;Last week, the US captured ISIL-Somalia&#8217;s finance chief Abdiweli Mohamed Yusuf, along with two others. This capture is highly significant: any kinetic action against high-ranking finance officials helps to disrupt, degrade, and ultimately dismantle financial ecosystems that support terrorist violence.&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;ISIL Finance Chief Captured in Somalia&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:33479672,&quot;name&quot;:&quot;Jessica Davis, PhD&quot;,&quot;bio&quot;:&quot;Jessica Davis is President of Insight Threat Intelligence and is the author of Women in Modern Terrorism: From Liberations Wars to Global Terrorism and the Islamic State (2017), and Illicit Money: Financing Terrorism in the 21st Century (2021).&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e312ae7c-114b-4e4f-9ce1-8bf50ddb7a27_2344x2049.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2025-08-05T13:03:10.604Z&quot;,&quot;cover_image&quot;:&quot;https://images.unsplash.com/photo-1554672723-60f4d5d5074f?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwyMXx8bW9uZXl8ZW58MHx8fHwxNzU0MDYyNDE2fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/isil-finance-chief-captured-in-somalia&quot;,&quot;section_name&quot;:&quot;Financiers&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:169934803,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:8,&quot;comment_count&quot;:0,&quot;publication_id&quot;:329102,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!I_1w!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4649d7af-94ce-49ea-8c58-368ec26cd423_900x900.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p><strong>ISIL-K</strong> has sought to exploit geopolitical flashpoints, including the war in Gaza, to drive fundraising and mobilize support. By framing distant conflicts as part of a broader narrative of global grievance, the group attempts to tap into issues that resonate with potential donors and sympathizers. This reflects a broader adaptation strategy: rather than relying solely on local revenue generation, ISIL-K leverages international events to expand its financial reach and reinforce its relevance within the global jihadist movement.</p><p>At the same time, counterterrorism efforts have disrupted elements of ISIL&#8217;s broader financial architecture. In <strong>Iraq</strong>, authorities dismantled a finance network with connections stretching to C&#244;te d&#8217;Ivoire, Madagascar, and Togo. The geographic spread of this network underscores the transnational character of ISIL&#8217;s facilitation structures and its reliance on dispersed nodes to move and store funds. Disruptions in one theatre, therefore, have ripple effects across regions, illustrating both the network's scope and its potential vulnerability to coordinated action.</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;ab063c8a-bcf6-498a-96fc-db9fd10145ee&quot;,&quot;caption&quot;:&quot;This week, the Combating Terrorism Center (CTC) published my report, &#8220;The Financial Future of the Islamic State,&#8221; which sheds light on this persistent threat's evolving economic strategies. The report delves into how the Islamic State (IS) is adapting its financial operations amidst ongoing global efforts to curb its influence.&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;The Financial Future of the Islamic State&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:33479672,&quot;name&quot;:&quot;Jessica Davis, PhD&quot;,&quot;bio&quot;:&quot;Jessica Davis is President of Insight Threat Intelligence and is the author of Women in Modern Terrorism: From Liberations Wars to Global Terrorism and the Islamic State (2017), and Illicit Money: Financing Terrorism in the 21st Century (2021).&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e312ae7c-114b-4e4f-9ce1-8bf50ddb7a27_2344x2049.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2024-08-15T13:00:26.341Z&quot;,&quot;cover_image&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2990c976-b735-453b-b68d-408ea91d2d16_1899x628.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/the-financial-future-of-the-is&quot;,&quot;section_name&quot;:&quot;Group Profiles &quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:147701825,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:0,&quot;comment_count&quot;:0,&quot;publication_id&quot;:329102,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!I_1w!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4649d7af-94ce-49ea-8c58-368ec26cd423_900x900.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>ISIL-K has also faced setbacks in the digital financial space. The group reportedly lost access to approximately $100,000 in Monero after several individuals were arrested, preventing it from retrieving funds held in associated wallets. In response, it altered its Monero quick response code distributed through its propaganda arm Voice of Khorasan and introduced a new Bitcoin address. This episode highlights both the risks and adaptability associated with cryptocurrency use: while digital assets offer speed and global reach, they also expose groups to technical and operational vulnerabilities when key facilitators are detained.</p><h3>Al Shabaab</h3><p>The report also notes developments concerning <strong>Al-Shabaab</strong> and its relationship with Al-Qaeda in the Arabian Peninsula (AQAP). While financial support from Al-Shabaab to AQAP may have declined, cooperation between the two groups continues. This suggests that even when financial flows fluctuate, operational or strategic ties endure, including those associated with weapons trafficking networks. In the Somali context, this underscores a broader pattern in which terrorist groups adapt to financial pressure but maintain networks that allow them to remain resilient.</p><p>To read more about Al Shabaab financing: </p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;fb52bc5e-08b3-415d-bbe5-46d39b68d235&quot;,&quot;caption&quot;:&quot;Over the last few months, we examined how Al-Shabaab raises funds, how it spends money, the methods it uses to move and store resources, how the group manages its finances, and most recently, how Al-Shabaab conceals the origins and movement of its funds. This is part of our work mapping how terrorist groups finance their activity, and we use our t&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Tracking Terrorist Financing: A Series on Al-Shabaab&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:85208154,&quot;name&quot;:&quot;Elena Martynova&quot;,&quot;bio&quot;:&quot;Researching terrorism &quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e88b531d-b106-4c92-8177-62a8a864bde5_2316x2316.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2025-07-09T13:01:53.689Z&quot;,&quot;cover_image&quot;:&quot;https://images.unsplash.com/reserve/LJIZlzHgQ7WPSh5KVTCB_Typewriter.jpg?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxuZXdzbGV0dGVyfGVufDB8fHx8MTc1MTk5MzYzNXww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/tracking-terrorist-financing-a-series&quot;,&quot;section_name&quot;:&quot;Group Profiles &quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:167383216,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:5,&quot;comment_count&quot;:0,&quot;publication_id&quot;:329102,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!I_1w!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4649d7af-94ce-49ea-8c58-368ec26cd423_900x900.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><h3>Libya</h3><p>In Libya, security services have dismantled at least four cells involved in terrorist financing, migrant and fighter smuggling, and media operations, with links extending to Europe, Iraq, Syria, the Sahel, and East Africa. One of these cells played a logistical role, facilitating operations through smuggling networks and money laundering. The use of smuggling routes and financial crime as enabling mechanisms reflects a pragmatic blending of ideological objectives with criminal enterprise; when one node is disrupted, others can absorb the shock.</p><h3>AQAP &amp; the Houthis</h3><p>At the same time, the threat from Al-Qaeda in the Arabian Peninsula (AQAP) is reportedly growing, driven in part by improved funding streams. AQAP, for instance, has profited from Al Shabaab piracy by receiving a share of payments made by vessels in exchange for transiting through high-risk waters. The group also uses Telegram to solicit funds and connect supporters to financial intermediaries. (This is a form of informal crowdfunding that allows them to access international support networks.) Increased access to resources appears to have strengthened the group&#8217;s operational tempo and capacity, underscoring the persistent relationship between financing and capability. Where funding improves, groups can move beyond subsistence-level activity and reconstitute networks, invest in recruitment, and plan more ambitious operations. This pattern reflects a familiar dynamic: financial resilience often precedes operational resurgence.</p><p>Further complicating the picture, the Houthis reportedly provided AQAP with financial support for a successful attack. This illustrates the fluidity of relationships in conflict environments, where tactical or transactional arrangements can override ideological divides. </p><h2>Conclusions</h2><p>The through line in this report is not dramatic innovation; it is consistency and slow adaptation to counter-terrorist financing measures. Groups are experimenting at the edges, whether through cryptocurrency, satellite internet access, or opportunistic alliances, but their core revenue models remain intact. Taxation, extortion, smuggling, and embedded criminal economies continue to sustain most organizations. Disrupting a wallet address or arresting a facilitator matters, but it rarely dismantles the underlying system. These networks are adaptive by design; when pressure is applied in one area, activity shifts to another.</p><p>Countering this ecosystem is becoming increasingly difficult amid geopolitical fragmentation and strategic distraction. Cooperation on sanctions enforcement, financial intelligence sharing, and capacity-building is more difficult to sustain when alliances are divided and disrupted and multilateral institutions are strained. Terrorist groups, by contrast, exploit these seams: weak governance, contested territories, and inconsistent enforcement all make terrorist groups stronger. As states turn inward or prioritize great-power competition, the space for illicit finance expands. The difficulty of coordinated disruption, combined with enduring funding streams, leaves all of us less safe than we might otherwise be.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Insight Monitor is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><p><em>&#169; 2026 Insight Threat Intelligence Ltd. All Rights Reserved.<br><br>This newsletter and its contents are protected by Canadian copyright law. Except as otherwise provided for under Canadian copyright law, this newsletter and its contents may not be copied, published, distributed, downloaded or otherwise stored in a retrieval system, transmitted or converted, in any form or by any means, electronic or otherwise, without the prior written permission of the copyright owner.</em></p><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-1" href="#footnote-anchor-1" class="footnote-number" contenteditable="false" target="_self">1</a><div class="footnote-content"><p>United Nations Security Council, <em>Thirty-Seventh Report of the Analytical Support and Sanctions Monitoring Team Submitted Pursuant to Resolution 2734 (2024) Concerning ISIL (Da&#8217;esh), Al-Qaida and Associated Individuals and Entities</em>.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-2" href="#footnote-anchor-2" class="footnote-number" contenteditable="false" target="_self">2</a><div class="footnote-content"><p>Our profile of ISGS&#8217;s financing is available through our case studies library: https://insightthreatintelligence.thinkific.com/courses/take/terrorist-financing-case-studies-library/texts/47282318-how-to-access-the-case-studies</p></div></div>]]></content:encoded></item><item><title><![CDATA[Global Terrorism Financing Report]]></title><description><![CDATA[January 2026]]></description><link>https://newsletter.insightthreatintel.com/p/global-terrorism-financing-report-047</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/global-terrorism-financing-report-047</guid><dc:creator><![CDATA[Emelia Connolly]]></dc:creator><pubDate>Thu, 12 Feb 2026 14:01:18 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!jIyV!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F361258c8-bd68-4955-8cb8-63499d5a770f_2000x1125.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Welcome back, Insight Monitor subscribers!</em></p><p><em>This month&#8217;s Global Terrorism Financing Report uncovers networks spanning Gaza to California&#8212;from fake charities funnelling millions to Hamas, Houthi oil smuggling, Hizballah&#8217;s laundering via Canadian auto dealers, Spanish crypto transfers, Russian plots in Lithuania, to Australian lone actors.</em></p><p>Stay a while, have a read, and share with a colleague, and don&#8217;t miss out on our long-read recommendations!</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Insight Monitor is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!jIyV!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F361258c8-bd68-4955-8cb8-63499d5a770f_2000x1125.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!jIyV!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F361258c8-bd68-4955-8cb8-63499d5a770f_2000x1125.jpeg 424w, https://substackcdn.com/image/fetch/$s_!jIyV!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F361258c8-bd68-4955-8cb8-63499d5a770f_2000x1125.jpeg 848w, https://substackcdn.com/image/fetch/$s_!jIyV!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F361258c8-bd68-4955-8cb8-63499d5a770f_2000x1125.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!jIyV!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F361258c8-bd68-4955-8cb8-63499d5a770f_2000x1125.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!jIyV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F361258c8-bd68-4955-8cb8-63499d5a770f_2000x1125.jpeg" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/361258c8-bd68-4955-8cb8-63499d5a770f_2000x1125.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:315388,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://newsletter.insightthreatintel.com/i/186532683?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F361258c8-bd68-4955-8cb8-63499d5a770f_2000x1125.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!jIyV!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F361258c8-bd68-4955-8cb8-63499d5a770f_2000x1125.jpeg 424w, https://substackcdn.com/image/fetch/$s_!jIyV!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F361258c8-bd68-4955-8cb8-63499d5a770f_2000x1125.jpeg 848w, https://substackcdn.com/image/fetch/$s_!jIyV!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F361258c8-bd68-4955-8cb8-63499d5a770f_2000x1125.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!jIyV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F361258c8-bd68-4955-8cb8-63499d5a770f_2000x1125.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h4><strong>Terrorist Financing Analysis</strong></h4><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://insightthreatintelligence.thinkific.com/bundles/tf-analysis" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!f7rH!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 424w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 848w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 1272w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!f7rH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png" width="1066" height="507" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:507,&quot;width&quot;:1066,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:698946,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://insightthreatintelligence.thinkific.com/bundles/tf-analysis&quot;,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!f7rH!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 424w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 848w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 1272w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>Our terrorist financing analysis course caters to researchers, intelligence, law enforcement, and compliance professionals, helping them learn about terrorist financing and analyze suspicious patterns to disrupt terrorist activities more effectively. <a href="https://insightthreatintelligence.thinkific.com/bundles/tf-analysis">Sign up </a>today to grow your counter-terrorism expertise.</em> </p>
      <p>
          <a href="https://newsletter.insightthreatintel.com/p/global-terrorism-financing-report-047">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[A proposal: a strategic mandate for Canada's financial crimes agency]]></title><description><![CDATA[Published in the Globe and Mail]]></description><link>https://newsletter.insightthreatintel.com/p/a-proposal-a-strategic-mandate-for</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/a-proposal-a-strategic-mandate-for</guid><dc:creator><![CDATA[Jessica Davis, PhD]]></dc:creator><pubDate>Tue, 10 Feb 2026 14:02:51 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!HH5B!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd451c279-820b-46d9-9bf1-5937adf93d4e_1490x1810.heic" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>This op-ed was published <a href="https://www.theglobeandmail.com/opinion/article-canadian-financial-crimes-agency/">two weeks ago in the Globe and Mail</a></em>. </p><p><em>Jessica Davis is the president of Insight Threat Intelligence and the author of </em>Illicit Money: Financing Terrorism in the Twenty-First Century<em>. She was consulted by the government of Canada on the development of a new financial crimes agency.</em></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Insight Monitor is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://www.theglobeandmail.com/opinion/article-canadian-financial-crimes-agency/" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!HH5B!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd451c279-820b-46d9-9bf1-5937adf93d4e_1490x1810.heic 424w, https://substackcdn.com/image/fetch/$s_!HH5B!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd451c279-820b-46d9-9bf1-5937adf93d4e_1490x1810.heic 848w, https://substackcdn.com/image/fetch/$s_!HH5B!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd451c279-820b-46d9-9bf1-5937adf93d4e_1490x1810.heic 1272w, https://substackcdn.com/image/fetch/$s_!HH5B!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd451c279-820b-46d9-9bf1-5937adf93d4e_1490x1810.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!HH5B!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd451c279-820b-46d9-9bf1-5937adf93d4e_1490x1810.heic" width="1456" height="1769" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d451c279-820b-46d9-9bf1-5937adf93d4e_1490x1810.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1769,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:197272,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:&quot;https://www.theglobeandmail.com/opinion/article-canadian-financial-crimes-agency/&quot;,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://newsletter.insightthreatintel.com/i/185877694?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd451c279-820b-46d9-9bf1-5937adf93d4e_1490x1810.heic&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!HH5B!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd451c279-820b-46d9-9bf1-5937adf93d4e_1490x1810.heic 424w, https://substackcdn.com/image/fetch/$s_!HH5B!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd451c279-820b-46d9-9bf1-5937adf93d4e_1490x1810.heic 848w, https://substackcdn.com/image/fetch/$s_!HH5B!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd451c279-820b-46d9-9bf1-5937adf93d4e_1490x1810.heic 1272w, https://substackcdn.com/image/fetch/$s_!HH5B!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd451c279-820b-46d9-9bf1-5937adf93d4e_1490x1810.heic 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>In Budget 2025, the Carney government promised to create a Canadian <a href="https://budget.canada.ca/2025/report-rapport/pdf/budget-2025.pdf">Financial Crimes Agency</a>, introducing legislation by the spring of 2026, to address a growing range of financial threats facing Canadians.</p><p>This is not the first time Canadians have heard this promise: a financial crimes agency was promised in the <a href="https://liberal.ca/our-platform/canada-financial-crimes-agency/">Liberal election platform</a> of 2021 and has been in various stages of policy development since that time. Yet Canadians have heard very little about the promised agency, except for Finance Minister Fran&#231;ois-Philippe Champagne&#8217;s promise in the fall of 2025 that it would <a href="https://www.canada.ca/en/department-finance/news/2025/10/minister-champagne-takes-aim-at-financial-scams-and-abuse-announces-anti-fraud-strategy-and-new-financial-crimes-agency.html">tackle sophisticated financial crimes</a>.</p><p>As Canadians face unprecedented levels of sophisticated fraud, ransomware attacks, and geopolitical uncertainty, it&#8217;s time for the government to set an ambitious and clear mandate to protect Canadians and our financial sector.</p><p>Canada is slowly coming to terms with the fact that its once most-valued partner is increasingly unreliable. This is true in the world of trade as much as it is true in the world of security and intelligence.</p><p>The United States has long been an important law-enforcement partner, conducting joint investigations with Canadian police and often taking the lead on terrorist financing or money-laundering investigations. Today, and for the foreseeable future, Canada must prepare to go it alone on critical issues, as the U.S. has recently proven that it can only be relied upon to serve its own immediate and mercurial interests.</p><p>In this context of geopolitical uncertainty, Canada must protect the financial sector and Canadians against a smorgasbord of threats. Top of mind for most Canadians is fraud: many know someone who has been directly targeted by <a href="https://www.theglobeandmail.com/business/article-ontario-serious-fraud-office-increasingly-sophisticated-scams/">sophisticated fraud</a>. These frauds are often perpetrated from abroad, sometimes by people who themselves are victims of human trafficking networks. Money from these schemes is moved swiftly offshore, and often through cryptocurrency. Another threat, ransomware, targets critical infrastructure and services, holding mission-critical data hostage until a ransom is paid. When payments are made to restore services, those payments embolden and strengthen criminals.</p><p>While fraud and ransomware are well-known threats to Canadians, the threat from those seeking to avoid sanctions is quietly stalking our financial system. Historically, enforcement of Canadian sanctions has been <a href="https://www.theglobeandmail.com/business/commentary/article-canada-civil-enforcement-economic-sanctions-russia-ukraine/">spotty at best</a>. In the cryptocurrency era, sanctions evasion through Canada has been supercharged. According to <a href="https://www.trmlabs.com/reports-and-whitepapers/crypto-regulation-and-illicit-finance-in-canada">one report</a>, the Canadian cryptocurrency sector ranks in the top 10 worldwide in terms of exposure to sanctioned entities. This places Canada on the same list as countries such as <a href="https://www.trmlabs.com/reports-and-whitepapers/2024-crypto-adoption-and-illicit-exposure-report">North Korea, Russia, and Iran</a>. Canada needs to take immediate action, or we risk becoming a haven for sanctions evasion.</p><p>Finally, Canada also needs to address the growing issue of professional money laundering networks. These networks of professionals (accountants, lawyers, and business owners) exist to launder the proceeds of a variety of crimes, including drug trafficking and fentanyl production. These professionals create separation between the main crime and the ultimate beneficiary of the money, making it harder to hold criminals accountable. Addressing this issue requires specialized, skilled, and dedicated financial crime professionals.</p><p>The financial sector is a bright beacon in Canada&#8217;s economy. Canada must get smart, innovative, and efficient at combating financial crimes targeting and exploiting the sector.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/p/a-proposal-a-strategic-mandate-for?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/p/a-proposal-a-strategic-mandate-for?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p></p><p>The future Canadian Financial Crimes Agency will face tremendous challenges from the threat environment and from structural issues in this country. In addition to the threats outlined above, the agency will have to spend considerable resources to avoid conflict with other departments, the RCMP, and other police forces. It will also need to engage in horizontal co-ordination across the 13 federal departments and agencies responsible for Canada&#8217;s anti-money laundering regime, as well as with provinces and territories.</p><p>While avoiding conflict and ensuring co-ordination will be important, the future agency will also need serious teeth. It will need considerable powers to collect intelligence and evidence, analyze that information, investigate crimes, and, ideally, to compel, prohibit, sanction, and disclose information as required. The agency will also require a clear reporting and review structure, with actionable objectives and performance metrics.</p><p>A new agency will be expensive, but it will also be a tremendous opportunity for Canada to develop its considerable existing financial investigative capabilities into a world-class agency to fight serious and transnational financial crimes and protect our important financial sector and Canadians.</p><p>A future Financial Crimes Agency needs a focused mandate to address the most pressing threats and robust authorities to carry out this mission.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/p/a-proposal-a-strategic-mandate-for?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/p/a-proposal-a-strategic-mandate-for?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Insight Monitor is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p><em>&#169; 2026 Insight Threat Intelligence Ltd. All Rights Reserved.<br><br>This newsletter and its contents are protected by Canadian copyright law. Except as otherwise provided for under Canadian copyright law, this newsletter and its contents may not be copied, published, distributed, downloaded or otherwise stored in a retrieval system, transmitted or converted, in any form or by any means, electronic or otherwise, without the prior written permission of the copyright owner.</em></p>]]></content:encoded></item><item><title><![CDATA[The Cost of Terror: Financing Behind the Bondi Beach Attack]]></title><description><![CDATA[The antisemitic terrorist attack at Bondi Beach on 14 December 2025 was an unspeakable tragedy that killed 15 people and injured 40, and that investigators believe was motivated at least in part by ISIL. While it&#8217;s still early days and information is relatively sparse, it&#8217;s important to understand how the alleged attackers mobilized to violence, and how they financed the attack. Certainly,]]></description><link>https://newsletter.insightthreatintel.com/p/attack-financing-bondi-beach-2025</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/attack-financing-bondi-beach-2025</guid><dc:creator><![CDATA[Jessica Davis, PhD]]></dc:creator><pubDate>Thu, 05 Feb 2026 14:02:57 GMT</pubDate><enclosure url="https://images.unsplash.com/photo-1551955682-78a3c53ab544?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxMXx8Ym9uZGl8ZW58MHx8fHwxNzY5NDU5NTgzfDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>The <a href="https://www.pm.gov.au/media/press-conference-parliament-house-canberra-23-dec-2025">antisemitic</a> terrorist attack at Bondi Beach on 14 December 2025 was an unspeakable tragedy that killed 15 people and injured 40, and that investigators believe was motivated at least in part by <a href="https://www.abc.net.au/news/2025-12-22/nsw-sydney-bondi-terror-attack-naveed-akram-court-police-facts/106170286">ISIL</a>. While it&#8217;s still early days and information is relatively sparse, it&#8217;s important to understand how the alleged attackers mobilized to violence, and how they financed the attack. Certainly, <a href="https://www.afp.gov.au/news-centre/media-statement/afp-commissioner-krissy-barrett-op-arques-media-conference-statement-20">Operation Arques</a> and the upcoming inquiry will provide some of this insight, but this could take months or years; it&#8217;s important that practitioners in Australia and other countries understand the costs involved in perpetrating this type of attack, how it was financed, and how financial intelligence might have been useful in disrupting it.</p><p>To do that, this Insight Monitor will examine the attack&#8217;s elements, estimate the financing, identify areas for detection (and, if possible, disruption), and compare it with other similar attacks in recent history. Subscribe to read more: </p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Insight Monitor is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>
      <p>
          <a href="https://newsletter.insightthreatintel.com/p/attack-financing-bondi-beach-2025">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Following the Money]]></title><description><![CDATA[Recap of Insight Monitor for January 2026]]></description><link>https://newsletter.insightthreatintel.com/p/following-the-money-d2e</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/following-the-money-d2e</guid><dc:creator><![CDATA[Lisa Niemzyk]]></dc:creator><pubDate>Tue, 03 Feb 2026 14:03:18 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!wRJl!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe73de2cb-ab0b-45e9-8e44-130382136f84_1024x1024.heic" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Hello, <strong>Insight Monitor</strong> subscribers! It has been a busy month here at ITI. We kicked off the year with the introduction of a new dataset on terrorist financing, setting the foundation for deeper analysis of how illicit finance is evolving. Later this week, we will have our analysis of how the 2025 Bondi Beach terrorist attack was financed, and what that means for detecting and disrupting terrorist activity. Be sure to subscribe so you don&#8217;t miss out! </em></p><p>But before we dive in&#8230; Jessica has been busy in the background this month:</p><ul><li><p>She shared her insights in <a href="https://globalnews.ca/news/11641296/toronto-car-dealer-money-laundering-hezbollah/">this Global News article</a> involving a Toronto auto exporter who has been accused of laundering money for Hezbollah. </p><p></p></li><li><p>She provided expert commentary in a <a href="https://www.moneylaunderingbulletin.com/terroristfinancing/harder-than-ever--terrorist-finance-detection-in-alternative-remittance-160851.htm">Money Laundering Bulletin article </a>on how Hawala networks and crypto-enabled transfers are exploited by terrorist groups.</p><p></p></li><li><p>She was the guest speaker in the <em><a href="https://verafin.com/resource/terrorist-financing-detection-tools-tactics-and-real-world-solutions/">Terrorist Financing Detection: Tools, Tactics and Real-World Solutions</a></em><strong><a href="https://verafin.com/resource/terrorist-financing-detection-tools-tactics-and-real-world-solutions/"> </a></strong><a href="https://verafin.com/resource/terrorist-financing-detection-tools-tactics-and-real-world-solutions/">webinar</a> hosted by Nasdaq Verafin. </p></li></ul><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Insight Monitor is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!wRJl!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe73de2cb-ab0b-45e9-8e44-130382136f84_1024x1024.heic" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!wRJl!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe73de2cb-ab0b-45e9-8e44-130382136f84_1024x1024.heic 424w, https://substackcdn.com/image/fetch/$s_!wRJl!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe73de2cb-ab0b-45e9-8e44-130382136f84_1024x1024.heic 848w, https://substackcdn.com/image/fetch/$s_!wRJl!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe73de2cb-ab0b-45e9-8e44-130382136f84_1024x1024.heic 1272w, https://substackcdn.com/image/fetch/$s_!wRJl!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe73de2cb-ab0b-45e9-8e44-130382136f84_1024x1024.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!wRJl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe73de2cb-ab0b-45e9-8e44-130382136f84_1024x1024.heic" width="514" height="514" data-attrs="{&quot;src&quot;:&quot;https://substackcdn.com/image/fetch/$s_!wRJl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe73de2cb-ab0b-45e9-8e44-130382136f84_1024x1024.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:514,&quot;width&quot;:514,&quot;resizeWidth&quot;:514,&quot;bytes&quot;:195723,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!wRJl!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe73de2cb-ab0b-45e9-8e44-130382136f84_1024x1024.heic 424w, https://substackcdn.com/image/fetch/$s_!wRJl!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe73de2cb-ab0b-45e9-8e44-130382136f84_1024x1024.heic 848w, https://substackcdn.com/image/fetch/$s_!wRJl!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe73de2cb-ab0b-45e9-8e44-130382136f84_1024x1024.heic 1272w, https://substackcdn.com/image/fetch/$s_!wRJl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe73de2cb-ab0b-45e9-8e44-130382136f84_1024x1024.heic 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>As always, we published our latest <strong>Global Terrorist Financing Report,</strong> highlighting major developments from the past month.</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;de592369-a2f5-487b-bd68-23ddde51775c&quot;,&quot;caption&quot;:&quot;Happy New Year, Insight Monitor Subscribers! This month, we cover key developments in terrorism financing with stories from Canada, the US, the UK, South America, Africa, India, Pakistan, and more! In December 2025, there was a surge in law enforcement crackdowns across North America and Europe, alongside new sanctions and emerging digital financing methods. Explore how global efforts are evolving to disrupt the financial networks behind terrorism below:&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Global Terrorism Financing Report &quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:313776655,&quot;name&quot;:&quot;Emelia Connolly&quot;,&quot;bio&quot;:null,&quot;photo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!9E-n!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9783d60b-0c55-4a2b-9ccd-a05d4ca26b39_828x828.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2026-01-15T14:01:07.793Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!aPlz!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F30d44883-37d5-44cd-91c4-cf9e211cece8_1639x826.jpeg&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/global-terrorism-financing-report-57c&quot;,&quot;section_name&quot;:&quot;News&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:183393321,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:5,&quot;comment_count&quot;:0,&quot;publication_id&quot;:329102,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!I_1w!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4649d7af-94ce-49ea-8c58-368ec26cd423_900x900.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div><hr></div><h4><strong>Financial Intelligence Sources</strong></h4><p><em>Ready to go beyond the basics of financial intelligence? Our Financial Intelligence Sources course dives deeper, exploring open and closed sources, leaked data, and more. Perfect for researchers, compliance and intelligence professionals, and anyone in a FININT or OSINT role.</em></p><p><em>Join our community, tackle real-world exercises, and gain skills you won&#8217;t find anywhere else. <a href="https://insightthreatintelligence.thinkific.com/courses/FININTSources">Enroll now</a> and take your expertise to the next level!</em></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!XObl!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1a78cc4-2d9c-4beb-92f7-6e7e68d7a117_500x297.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!XObl!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1a78cc4-2d9c-4beb-92f7-6e7e68d7a117_500x297.png 424w, https://substackcdn.com/image/fetch/$s_!XObl!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1a78cc4-2d9c-4beb-92f7-6e7e68d7a117_500x297.png 848w, https://substackcdn.com/image/fetch/$s_!XObl!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1a78cc4-2d9c-4beb-92f7-6e7e68d7a117_500x297.png 1272w, https://substackcdn.com/image/fetch/$s_!XObl!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1a78cc4-2d9c-4beb-92f7-6e7e68d7a117_500x297.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!XObl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1a78cc4-2d9c-4beb-92f7-6e7e68d7a117_500x297.png" width="500" height="297" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d1a78cc4-2d9c-4beb-92f7-6e7e68d7a117_500x297.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:297,&quot;width&quot;:500,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:191906,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://newsletter.insightthreatintel.com/i/186254311?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1a78cc4-2d9c-4beb-92f7-6e7e68d7a117_500x297.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!XObl!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1a78cc4-2d9c-4beb-92f7-6e7e68d7a117_500x297.png 424w, https://substackcdn.com/image/fetch/$s_!XObl!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1a78cc4-2d9c-4beb-92f7-6e7e68d7a117_500x297.png 848w, https://substackcdn.com/image/fetch/$s_!XObl!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1a78cc4-2d9c-4beb-92f7-6e7e68d7a117_500x297.png 1272w, https://substackcdn.com/image/fetch/$s_!XObl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1a78cc4-2d9c-4beb-92f7-6e7e68d7a117_500x297.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h3>Articles </h3><p>This month, we kicked off an 8-part series exploring how Iran uses cryptocurrency to evade sanctions and operate within a broader illicit financial network. We also introduced our <em>Trends in Terrorist Financing 2020-2025 </em>dataset, built from six years of research, which highlights key patterns in how terrorist financing operates. Finally, we examined how digital assets are increasingly used alongside traditional financial systems, the rise of crypto-hawala networks, and the regulatory and intelligence challenges this creates.</p><p>Stay informed with our latest analyses &#8212; explore our newest articles below:</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;2f184a51-af8b-4f2b-99a5-7c391bc93bb0&quot;,&quot;caption&quot;:&quot;This article marks the start of an eight-part series examining how Iran has increasingly relied on cryptocurrency to circumvent international sanctions. These developments unfold against a volatile backdrop: Iran&#8217;s 2025 confrontation with Israel, the ongoing activity of its regional proxy network, and protests driven by corruption, economic hardship (ex&#8230;&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;The Axis of Illicit Finance: Iran&#8217;s Crypto Strategy Explained&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:33479672,&quot;name&quot;:&quot;Jessica Davis, PhD&quot;,&quot;bio&quot;:&quot;Jessica Davis is President of Insight Threat Intelligence and is the author of Women in Modern Terrorism: From Liberations Wars to Global Terrorism and the Islamic State (2017), and Illicit Money: Financing Terrorism in the 21st Century (2021).&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e312ae7c-114b-4e4f-9ce1-8bf50ddb7a27_2344x2049.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2026-01-06T14:00:45.585Z&quot;,&quot;cover_image&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/87b19738-1968-494d-aa46-98d0020cd199_845x486.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/the-axis-of-illicit-finance-irans&quot;,&quot;section_name&quot;:&quot;Financiers&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:183357175,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:7,&quot;comment_count&quot;:0,&quot;publication_id&quot;:329102,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!I_1w!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4649d7af-94ce-49ea-8c58-368ec26cd423_900x900.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;c4581f1d-9868-4cb6-94e5-47ca5e1f850f&quot;,&quot;caption&quot;:&quot;Hello Insight Monitor subscribers! After six years of building, cleaning, and analyzing, I&#8217;m finally ready to share a new dataset that changes the conversation on terrorist financing. This isn&#8217;t just another trends piece. It&#8217;s evidence-driven, assumption-busting research that brings clarity to what&#8217;s actually happening in terrorist finance today. The go&#8230;&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Trends in Terrorist Financing 2020-2025&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:33479672,&quot;name&quot;:&quot;Jessica Davis, PhD&quot;,&quot;bio&quot;:&quot;Jessica Davis is President of Insight Threat Intelligence and is the author of Women in Modern Terrorism: From Liberations Wars to Global Terrorism and the Islamic State (2017), and Illicit Money: Financing Terrorism in the 21st Century (2021).&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e312ae7c-114b-4e4f-9ce1-8bf50ddb7a27_2344x2049.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2026-01-20T14:03:14.363Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!i-Sp!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6bac2d4e-8c1e-47ef-9190-9114500a5a1a_881x479.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/trends-in-terrorist-financing-2020&quot;,&quot;section_name&quot;:&quot;Primers&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:184698854,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:2,&quot;comment_count&quot;:0,&quot;publication_id&quot;:329102,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!I_1w!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4649d7af-94ce-49ea-8c58-368ec26cd423_900x900.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;451732c4-dac6-41d7-9cd5-2515b7daf0dc&quot;,&quot;caption&quot;:&quot;This week, we&#8217;re taking a close look at how terrorists move money. Drawing on our Trends in Terrorist Financing 2020-2025 dataset, we can now say with authority that it wasn&#8217;t just a blip: terrorist financing mostly happens through cryptocurrency now. Have a read to learn about the data behind this bold statement, and what it means for the future of countering the financing of terrorism.&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Beyond Anecdotes: Terrorist Financing Has Moved to Crypto&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:33479672,&quot;name&quot;:&quot;Jessica Davis, PhD&quot;,&quot;bio&quot;:&quot;Jessica Davis is President of Insight Threat Intelligence and is the author of Women in Modern Terrorism: From Liberations Wars to Global Terrorism and the Islamic State (2017), and Illicit Money: Financing Terrorism in the 21st Century (2021).&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e312ae7c-114b-4e4f-9ce1-8bf50ddb7a27_2344x2049.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2026-01-27T14:02:42.231Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!XVkD!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F836c8f86-8059-4837-af36-51b1711467da_548x471.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/beyond-anecdotes-terrorist-financing&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:185090479,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:4,&quot;comment_count&quot;:0,&quot;publication_id&quot;:329102,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!I_1w!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4649d7af-94ce-49ea-8c58-368ec26cd423_900x900.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/p/following-the-money-d2e?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/p/following-the-money-d2e?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p><br>That&#8217;s a wrap for January! See you in February with more analysis and updates. Be sure to subscribe so you don&#8217;t miss out! This is news and analysis you won&#8217;t find anywhere else. </p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/subscribe?"><span>Subscribe now</span></a></p><p><em>&#169; 2026 Insight Threat Intelligence Ltd. All Rights Reserved.<br><br>This newsletter and its contents are protected by Canadian copyright law. Except as otherwise provided for under Canadian copyright law, this newsletter and its contents may not be copied, published, distributed, downloaded or otherwise stored in a retrieval system, transmitted or converted, in any form or by any means, electronic or otherwise, without the prior written permission of the copyright owner.</em></p>]]></content:encoded></item><item><title><![CDATA[Beyond Anecdotes: Terrorist Financing Has Moved to Crypto]]></title><description><![CDATA[Six years of data on terrorist financing proves it]]></description><link>https://newsletter.insightthreatintel.com/p/beyond-anecdotes-terrorist-financing</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/beyond-anecdotes-terrorist-financing</guid><dc:creator><![CDATA[Jessica Davis, PhD]]></dc:creator><pubDate>Tue, 27 Jan 2026 14:02:42 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!XVkD!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F836c8f86-8059-4837-af36-51b1711467da_548x471.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>This week, we&#8217;re taking a close look at how terrorists move money. Drawing on our <a href="https://open.substack.com/pub/insightintel/p/trends-in-terrorist-financing-2020?r=jxl2w&amp;utm_campaign=post&amp;utm_medium=web&amp;showWelcomeOnShare=true">Trends in Terrorist Financing 2020-2025 dataset</a>, we can now say with authority that it wasn&#8217;t just a blip: terrorist financing mostly happens through cryptocurrency now. Have a read to learn about the data behind this bold statement, and what it means for the future of countering the financing of terrorism. </em></p><h3>The Data</h3><p>This research grew out of frustration with claims about &#8220;new&#8221; or &#8220;increasing&#8221; terrorist-financing trends that are made without evidence. To address this, the project built its own empirical foundation by systematically collecting and coding real-world cases of terrorist financing over the past eight years. Each case captures reported financial activity used to support terrorism and is analyzed using a six-part framework that examines how funds are raised, used, moved, stored, managed, and concealed. The approach emphasizes observable activity.</p><p>The data are drawn exclusively from open sources, including media reporting, court documents, and government publications, and are subjected to a multi-stage validation process to ensure consistency and accuracy. The resulting dataset contains more than 21,000 data points across 1,150 cases, coded across 19 variables such as country, group, financing methods, and sources. While collection began in 2018, analysis relies on cases from 2020 onward, when data quality became sufficiently robust. Together, this methodology provides a rare evidence-based foundation for assessing terrorist-financing trends and testing claims about how those activities evolve over time.</p><p>Learn more <a href="https://open.substack.com/pub/insightintel/p/trends-in-terrorist-financing-2020?r=jxl2w&amp;utm_campaign=post&amp;utm_medium=web&amp;showWelcomeOnShare=true">here</a>.</p><h3>When Terrorists Used Banks</h3><p>When <em>Illicit Money</em> was published in 2021, banks remained the primary channel through which terrorists moved money internationally, despite more than two decades of sustained counter-terrorist financing efforts. This persistence reflects a core challenge in CTF: terrorist financing is extraordinarily difficult to detect within the formal financial system. Large organizations such as Hamas and Hizballah have relied on complex front-company networks to obscure illicit activity, while small cells and lone actors typically move modest sums that attract little scrutiny.</p><p>In practice, many terrorist transactions closely resemble ordinary remittances or everyday financial activity, making them hard to distinguish from legitimate flows. The amounts involved are frequently below mandatory reporting thresholds, which vary by jurisdiction but are easily circumvented in the context of terrorist financing. Detection becomes even more challenging when terrorist networks benefit from a trusted insider within a financial institution or affiliated business, further blurring the line between licit and illicit activity.</p><h3>Crypto Enters the Chat</h3><p>Around 2022, a noticeable shift emerged in terrorist financing patterns, with cryptocurrency appearing with increasing frequency across cases. This change intersects with nearly every aspect of my investigative, research, and policy work, reflecting how digital assets have moved from the margins to the mainstream of terrorist money movement. Today, cryptocurrency is present in roughly 8&#8211;12 percent of documented cases and has become the most visible method for moving funds, in part because it dominates in volume and is easier to observe, trace, and publicly report on than many traditional methods like hawala.</p><p>Keep reading to find out how we know this, and what it means for the future of counterterrorist financing: </p><h4><strong>Financial Intelligence Fundamentals</strong></h4><p><em>Do you want to learn more about financial intelligence and how to use it in research, investigations, and analysis? Our financial intelligence fundamentals course is for you! This course is perfect for people new to financial intelligence and seasoned professionals. <a href="https://insightthreatintelligence.thinkific.com/courses/introFININT">Enroll today</a></em></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://insightthreatintelligence.thinkific.com/courses/introFININT" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!8tvZ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png 424w, https://substackcdn.com/image/fetch/$s_!8tvZ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png 848w, https://substackcdn.com/image/fetch/$s_!8tvZ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png 1272w, https://substackcdn.com/image/fetch/$s_!8tvZ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!8tvZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png" width="905" height="496" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:496,&quot;width&quot;:905,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:731766,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://insightthreatintelligence.thinkific.com/courses/introFININT&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!8tvZ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png 424w, https://substackcdn.com/image/fetch/$s_!8tvZ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png 848w, https://substackcdn.com/image/fetch/$s_!8tvZ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png 1272w, https://substackcdn.com/image/fetch/$s_!8tvZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div>
      <p>
          <a href="https://newsletter.insightthreatintel.com/p/beyond-anecdotes-terrorist-financing">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Trends in Terrorist Financing 2020-2025]]></title><description><![CDATA[Introducing the Terrorism Financing Dataset]]></description><link>https://newsletter.insightthreatintel.com/p/trends-in-terrorist-financing-2020</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/trends-in-terrorist-financing-2020</guid><dc:creator><![CDATA[Jessica Davis, PhD]]></dc:creator><pubDate>Tue, 20 Jan 2026 14:03:14 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!i-Sp!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6bac2d4e-8c1e-47ef-9190-9114500a5a1a_881x479.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Hello Insight Monitor subscribers! After six years of building, cleaning, and analyzing, I&#8217;m finally ready to share a new dataset that changes the conversation on terrorist financing. This isn&#8217;t just another trends piece. It&#8217;s evidence-driven, assumption-busting research that brings clarity to what&#8217;s actually happening in terrorist finance today. The goal? Cut through speculation with solid data. Provoke debate. Challenge what we think we know. Check it out, share it widely, and if you haven&#8217;t already&#8212;subscribe to stay ahead of the curve. This is just the beginning.</em></p><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/p/trends-in-terrorist-financing-2020?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thanks for reading Insight Monitor! This post is public so feel free to share it.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/p/trends-in-terrorist-financing-2020?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/p/trends-in-terrorist-financing-2020?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div><h2>Understanding Trends in Terrorist Financing</h2><p>This research is driven by a grievance. It irks me endlessly when trends are presented in academic research or media commentary as &#8220;new&#8221; or &#8220;increasing&#8221; without any evidence to support these assertions.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!i-Sp!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6bac2d4e-8c1e-47ef-9190-9114500a5a1a_881x479.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!i-Sp!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6bac2d4e-8c1e-47ef-9190-9114500a5a1a_881x479.png 424w, https://substackcdn.com/image/fetch/$s_!i-Sp!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6bac2d4e-8c1e-47ef-9190-9114500a5a1a_881x479.png 848w, https://substackcdn.com/image/fetch/$s_!i-Sp!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6bac2d4e-8c1e-47ef-9190-9114500a5a1a_881x479.png 1272w, https://substackcdn.com/image/fetch/$s_!i-Sp!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6bac2d4e-8c1e-47ef-9190-9114500a5a1a_881x479.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!i-Sp!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6bac2d4e-8c1e-47ef-9190-9114500a5a1a_881x479.png" width="881" height="479" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6bac2d4e-8c1e-47ef-9190-9114500a5a1a_881x479.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:479,&quot;width&quot;:881,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:120524,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://newsletter.insightthreatintel.com/i/184698854?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6bac2d4e-8c1e-47ef-9190-9114500a5a1a_881x479.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!i-Sp!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6bac2d4e-8c1e-47ef-9190-9114500a5a1a_881x479.png 424w, https://substackcdn.com/image/fetch/$s_!i-Sp!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6bac2d4e-8c1e-47ef-9190-9114500a5a1a_881x479.png 848w, https://substackcdn.com/image/fetch/$s_!i-Sp!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6bac2d4e-8c1e-47ef-9190-9114500a5a1a_881x479.png 1272w, https://substackcdn.com/image/fetch/$s_!i-Sp!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6bac2d4e-8c1e-47ef-9190-9114500a5a1a_881x479.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>So I decided to put my money where my mouth is and create the evidence I would need to make statements like that. Eight years ago, I started collecting &#8220;cases&#8221; of terrorist financing. These are incidents of individuals or groups engaging in terrorist financing activity from around the world. Readers of the <a href="https://newsletter.insightthreatintel.com/p/global-terrorism-financing-report-57c">Global Terrorism Financing Report </a>will find this framing familiar: we use this case approach to populate that report.</p><p>In our data, a case of terrorist financing is any reported incident of terrorist activity financing &#8211; that is, any financial activity that was used to support terrorist activity. This activity is further broken down into six mechanisms: how terrorists raise, use, move, store, manage, and obscure the source, destination, and use of those funds. Again, this will feel familiar to many readers, because it&#8217;s the typology I developed in <em><a href="https://www.rienner.com/title/Illicit_Money_Financing_Terrorism_in_the_Twenty_First_Century">Illicit Money</a></em>. We further capture information on the methods used within each of these mechanisms, from things like cash couriers to hawalas to cryptocurrency and much more.</p><p>Our definition of terrorism is equally important to understand. We use a definition I developed for both <em>Women in Modern Terrorism</em> and <em>Illicit Money</em>, which draws heavily on the Canadian Criminal Code definition of terrorism. For us, it&#8217;s less about the ideology or group and more about the activity. In short, we&#8217;re looking for cases of violence (planned or disrupted) with a religious, ideological, or political motivation, intended to influence or intimidate a population (this can be as few as one person, such as a politician, or as many as an entire country).</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/p/trends-in-terrorist-financing-2020?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/p/trends-in-terrorist-financing-2020?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><h4><strong>Terrorist Financing Analysis</strong></h4><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://insightthreatintelligence.thinkific.com/bundles/tf-analysis" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!f7rH!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 424w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 848w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 1272w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!f7rH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png" width="1066" height="507" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:507,&quot;width&quot;:1066,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:698946,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://insightthreatintelligence.thinkific.com/bundles/tf-analysis&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!f7rH!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 424w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 848w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 1272w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>Our terrorist financing analysis course caters to researchers, intelligence, law enforcement, and compliance professionals, helping them learn about terrorist financing and analyze suspicious patterns to disrupt terrorist activities more effectively. <a href="https://insightthreatintelligence.thinkific.com/bundles/tf-analysis">Sign up </a>today to grow your counter-terrorism expertise.</em> </p><h2>Data Collection</h2><p>We find these cases in open sources: in things like media reports, when our friends at CourtWatch report on indictments, from government reports, etc. We don&#8217;t use covert methods to collect this data, but we will include information released publicly that might have used covert methods.</p><p>We use a robust method to validate the data. First, a researcher finds all the relevant cases and writes them up for the Global Terrorism Financing Report. I then review the draft report and make any required deletions (for things that don&#8217;t fit our criteria). A second analyst then inputs these cases into the database, where I review them again. Finally, I do a tertiary review when I pull the data and conduct analysis.</p><p>Ultimately, this has yielded over 21,000 data points across 1150 records and 19 fields. These fields include coding for group, country, a text description of the case, the methods and mechanisms used, and of course sources. While there is data from 2018 onward, we only use the data from 2020 and onward because it&#8217;s more reliable. (It&#8217;s when I hired staff).</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!CI35!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F316d2bb6-e488-415a-aa41-9ef974a65c9b_896x469.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!CI35!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F316d2bb6-e488-415a-aa41-9ef974a65c9b_896x469.png 424w, https://substackcdn.com/image/fetch/$s_!CI35!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F316d2bb6-e488-415a-aa41-9ef974a65c9b_896x469.png 848w, https://substackcdn.com/image/fetch/$s_!CI35!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F316d2bb6-e488-415a-aa41-9ef974a65c9b_896x469.png 1272w, https://substackcdn.com/image/fetch/$s_!CI35!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F316d2bb6-e488-415a-aa41-9ef974a65c9b_896x469.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!CI35!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F316d2bb6-e488-415a-aa41-9ef974a65c9b_896x469.png" width="896" height="469" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/316d2bb6-e488-415a-aa41-9ef974a65c9b_896x469.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:469,&quot;width&quot;:896,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:68046,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://newsletter.insightthreatintel.com/i/184698854?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F316d2bb6-e488-415a-aa41-9ef974a65c9b_896x469.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!CI35!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F316d2bb6-e488-415a-aa41-9ef974a65c9b_896x469.png 424w, https://substackcdn.com/image/fetch/$s_!CI35!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F316d2bb6-e488-415a-aa41-9ef974a65c9b_896x469.png 848w, https://substackcdn.com/image/fetch/$s_!CI35!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F316d2bb6-e488-415a-aa41-9ef974a65c9b_896x469.png 1272w, https://substackcdn.com/image/fetch/$s_!CI35!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F316d2bb6-e488-415a-aa41-9ef974a65c9b_896x469.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2>What We&#8217;ve Found</h2><p>On average, we capture about 190 cases per year, although 2021 and 2022 had the lowest amounts of data. This might be due to a lack of terrorist financing, a lack of disruption/detection of terrorist financing, or other factors. In my experience, data blips like this generally result from a combination of factors.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!NotN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e9032b9-d146-4135-993b-88f228f14e2a_419x375.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!NotN!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e9032b9-d146-4135-993b-88f228f14e2a_419x375.png 424w, https://substackcdn.com/image/fetch/$s_!NotN!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e9032b9-d146-4135-993b-88f228f14e2a_419x375.png 848w, https://substackcdn.com/image/fetch/$s_!NotN!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e9032b9-d146-4135-993b-88f228f14e2a_419x375.png 1272w, https://substackcdn.com/image/fetch/$s_!NotN!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e9032b9-d146-4135-993b-88f228f14e2a_419x375.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!NotN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e9032b9-d146-4135-993b-88f228f14e2a_419x375.png" width="419" height="375" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4e9032b9-d146-4135-993b-88f228f14e2a_419x375.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:375,&quot;width&quot;:419,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:24911,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://newsletter.insightthreatintel.com/i/184698854?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e9032b9-d146-4135-993b-88f228f14e2a_419x375.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!NotN!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e9032b9-d146-4135-993b-88f228f14e2a_419x375.png 424w, https://substackcdn.com/image/fetch/$s_!NotN!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e9032b9-d146-4135-993b-88f228f14e2a_419x375.png 848w, https://substackcdn.com/image/fetch/$s_!NotN!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e9032b9-d146-4135-993b-88f228f14e2a_419x375.png 1272w, https://substackcdn.com/image/fetch/$s_!NotN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e9032b9-d146-4135-993b-88f228f14e2a_419x375.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Each year, we usually see the most reporting on how terrorists raise money. However, we also see lots of information on how they&#8217;re hiding that money. Less often reported is information on how terrorists are managing and storing funds. These mechanisms are likely harder to detect and less sexy to report on. However, they&#8217;re still critical for understanding (and more importantly, disrupting!) terrorist financing.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!iEOy!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F43d4d597-5b4c-43b6-b5f2-03cb32aca429_806x478.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!iEOy!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F43d4d597-5b4c-43b6-b5f2-03cb32aca429_806x478.png 424w, https://substackcdn.com/image/fetch/$s_!iEOy!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F43d4d597-5b4c-43b6-b5f2-03cb32aca429_806x478.png 848w, https://substackcdn.com/image/fetch/$s_!iEOy!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F43d4d597-5b4c-43b6-b5f2-03cb32aca429_806x478.png 1272w, https://substackcdn.com/image/fetch/$s_!iEOy!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F43d4d597-5b4c-43b6-b5f2-03cb32aca429_806x478.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!iEOy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F43d4d597-5b4c-43b6-b5f2-03cb32aca429_806x478.png" width="806" height="478" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/43d4d597-5b4c-43b6-b5f2-03cb32aca429_806x478.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:478,&quot;width&quot;:806,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:52007,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://newsletter.insightthreatintel.com/i/184698854?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F43d4d597-5b4c-43b6-b5f2-03cb32aca429_806x478.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!iEOy!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F43d4d597-5b4c-43b6-b5f2-03cb32aca429_806x478.png 424w, https://substackcdn.com/image/fetch/$s_!iEOy!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F43d4d597-5b4c-43b6-b5f2-03cb32aca429_806x478.png 848w, https://substackcdn.com/image/fetch/$s_!iEOy!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F43d4d597-5b4c-43b6-b5f2-03cb32aca429_806x478.png 1272w, https://substackcdn.com/image/fetch/$s_!iEOy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F43d4d597-5b4c-43b6-b5f2-03cb32aca429_806x478.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3>The Limitations</h3><p>There are plenty of limitations with this dataset (like all datasets). Firstly, as mentioned previously, there is no covert collection. This means we are certainly missing some trends and methods in the world of terrorist financing. Secondly, there are limitations to the data we can capture. Some of this is due to language, but it&#8217;s mostly due to time limitations. As this project is entirely funded by my company, Insight Threat Intelligence, I can&#8217;t assign unlimited resources to data collection. </p><div class="pullquote"><p>Reader support for Insight Monitor goes directly to supporting this project, so thank you to all our paid subscribers who have made this possible!</p></div><p>Thirdly, the data is limited to observable and reported data. We don&#8217;t have visibility (through this data collection method, anyway) of harder-to-identify terrorist financing methods. For instance, I think that the use of hawala is likely underreported in this data. Other methods and mechanisms are also likely underreported. Fourthly, there is likely a lag in the data in terms of when we see trends emerge. Disruptions, arrests, prosections, and even investigative journalism all takes time. This time creates a lag between when a terrorist financing method or mechanism occurs, and when it gets reported publicly. So while this is the only dataset like this in the world, it does have a time lag. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!73jl!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F64f383c8-716c-47bf-9d9c-23183c2374b9_861x495.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!73jl!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F64f383c8-716c-47bf-9d9c-23183c2374b9_861x495.png 424w, https://substackcdn.com/image/fetch/$s_!73jl!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F64f383c8-716c-47bf-9d9c-23183c2374b9_861x495.png 848w, https://substackcdn.com/image/fetch/$s_!73jl!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F64f383c8-716c-47bf-9d9c-23183c2374b9_861x495.png 1272w, https://substackcdn.com/image/fetch/$s_!73jl!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F64f383c8-716c-47bf-9d9c-23183c2374b9_861x495.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!73jl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F64f383c8-716c-47bf-9d9c-23183c2374b9_861x495.png" width="861" height="495" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/64f383c8-716c-47bf-9d9c-23183c2374b9_861x495.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:495,&quot;width&quot;:861,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:95736,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://newsletter.insightthreatintel.com/i/184698854?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F64f383c8-716c-47bf-9d9c-23183c2374b9_861x495.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!73jl!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F64f383c8-716c-47bf-9d9c-23183c2374b9_861x495.png 424w, https://substackcdn.com/image/fetch/$s_!73jl!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F64f383c8-716c-47bf-9d9c-23183c2374b9_861x495.png 848w, https://substackcdn.com/image/fetch/$s_!73jl!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F64f383c8-716c-47bf-9d9c-23183c2374b9_861x495.png 1272w, https://substackcdn.com/image/fetch/$s_!73jl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F64f383c8-716c-47bf-9d9c-23183c2374b9_861x495.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>And finally, definitions matter. While I have confidence in the definitions that we use, a broader definition of terrorism would capture more information. A narrow definition might yield more nuanced results. Part of the way we correct for this is through the use of filters and the ability to exclude entire classes of cases, like the recently listed criminal organizations. (While I think these do meet the legal threshold for listing as terrorist entities in Canada, I fundamentally think they operate differently from terrorist groups; as such, they should be analyzed separately.)</p><p>These limitations might seem daunting, but for me, it&#8217;s really about properly contextualizing our findings. We keep these limitations in mind as we write, so we never get out ahead of our skiis in our analysis. </p><h3>Next Steps</h3><p>If you stuck with me this long, that means you&#8217;re very likely a huge data nerd. Thank you! This series is right up your alley. There&#8217;s lots more to report on, so stay tuned for the next edition of the series on Trends in Terrorist Financing. You will see separate newsletters outlining how terrorists raise, use, move, store, manage, and obscure their funds, as well as a summary newsletter on key findings. We will likely publish this series once a month, so you&#8217;re in for a bit of a slow burn. Also, this series will only be available to paying subscribers, since they&#8217;re the ones supporting this database development. So if you want to read it, you know what to do! </p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Insight Monitor is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/p/trends-in-terrorist-financing-2020?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/p/trends-in-terrorist-financing-2020?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p></p><p><em>&#169; 2026 Insight Threat Intelligence Ltd. All Rights Reserved.<br><br>This newsletter and its contents are protected by Canadian copyright law. Except as otherwise provided for under Canadian copyright law, this newsletter and its contents may not be copied, published, distributed, downloaded or otherwise stored in a retrieval system, transmitted or converted, in any form or by any means, electronic or otherwise, without the prior written permission of the copyright owner.</em></p>]]></content:encoded></item><item><title><![CDATA[Global Terrorism Financing Report ]]></title><description><![CDATA[December 2025]]></description><link>https://newsletter.insightthreatintel.com/p/global-terrorism-financing-report-57c</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/global-terrorism-financing-report-57c</guid><dc:creator><![CDATA[Emelia Connolly]]></dc:creator><pubDate>Thu, 15 Jan 2026 14:01:07 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!aPlz!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F30d44883-37d5-44cd-91c4-cf9e211cece8_1639x826.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Happy New Year, Insight Monitor Subscribers! This month, we cover key developments in terrorism financing with stories from Canada, the US, the UK, South America, Africa, India, Pakistan, and more! In December 2025, there was a surge in law enforcement crackdowns across North America and Europe, alongside new sanctions and emerging digital financing methods. Explore how global efforts are evolving to disrupt the financial networks behind terrorism below: </em></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!aPlz!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F30d44883-37d5-44cd-91c4-cf9e211cece8_1639x826.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!aPlz!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F30d44883-37d5-44cd-91c4-cf9e211cece8_1639x826.jpeg 424w, https://substackcdn.com/image/fetch/$s_!aPlz!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F30d44883-37d5-44cd-91c4-cf9e211cece8_1639x826.jpeg 848w, https://substackcdn.com/image/fetch/$s_!aPlz!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F30d44883-37d5-44cd-91c4-cf9e211cece8_1639x826.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!aPlz!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F30d44883-37d5-44cd-91c4-cf9e211cece8_1639x826.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!aPlz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F30d44883-37d5-44cd-91c4-cf9e211cece8_1639x826.jpeg" width="1639" height="826" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/30d44883-37d5-44cd-91c4-cf9e211cece8_1639x826.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:826,&quot;width&quot;:1639,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:133292,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://newsletter.insightthreatintel.com/i/183393321?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffb76abb2-c832-4b8a-9f26-23aa84458de5_2000x1125.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!aPlz!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F30d44883-37d5-44cd-91c4-cf9e211cece8_1639x826.jpeg 424w, https://substackcdn.com/image/fetch/$s_!aPlz!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F30d44883-37d5-44cd-91c4-cf9e211cece8_1639x826.jpeg 848w, https://substackcdn.com/image/fetch/$s_!aPlz!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F30d44883-37d5-44cd-91c4-cf9e211cece8_1639x826.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!aPlz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F30d44883-37d5-44cd-91c4-cf9e211cece8_1639x826.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h4><strong>Financial Intelligence Sources</strong></h4><p><em>Do you want to identify and exploit new sources of financial intelligence? Our evergreen course is your guide to finding, analyzing, and contextualizing open source financial intelligence. This step-by-step guide to FININT sources will greatly expand your intelligence knowledge and skills. This course is perfect for people new to financial intelligence and seasoned professionals. <a href="https://insightthreatintelligence.thinkific.com/courses/FININTSources">Enroll today</a></em></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://insightthreatintelligence.thinkific.com/courses/FININTSources" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Vv2Y!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e2d12f5-a284-4cb1-95cf-04742c85d0af_1144x400.png 424w, https://substackcdn.com/image/fetch/$s_!Vv2Y!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e2d12f5-a284-4cb1-95cf-04742c85d0af_1144x400.png 848w, https://substackcdn.com/image/fetch/$s_!Vv2Y!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e2d12f5-a284-4cb1-95cf-04742c85d0af_1144x400.png 1272w, https://substackcdn.com/image/fetch/$s_!Vv2Y!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e2d12f5-a284-4cb1-95cf-04742c85d0af_1144x400.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Vv2Y!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e2d12f5-a284-4cb1-95cf-04742c85d0af_1144x400.png" width="1144" height="400" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8e2d12f5-a284-4cb1-95cf-04742c85d0af_1144x400.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:400,&quot;width&quot;:1144,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:357457,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://insightthreatintelligence.thinkific.com/courses/FININTSources&quot;,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://newsletter.insightthreatintel.com/i/153040222?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e2d12f5-a284-4cb1-95cf-04742c85d0af_1144x400.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Vv2Y!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e2d12f5-a284-4cb1-95cf-04742c85d0af_1144x400.png 424w, https://substackcdn.com/image/fetch/$s_!Vv2Y!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e2d12f5-a284-4cb1-95cf-04742c85d0af_1144x400.png 848w, https://substackcdn.com/image/fetch/$s_!Vv2Y!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e2d12f5-a284-4cb1-95cf-04742c85d0af_1144x400.png 1272w, https://substackcdn.com/image/fetch/$s_!Vv2Y!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e2d12f5-a284-4cb1-95cf-04742c85d0af_1144x400.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h3>North America</h3>
      <p>
          <a href="https://newsletter.insightthreatintel.com/p/global-terrorism-financing-report-57c">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Following the Money]]></title><description><![CDATA[Recap of Insight Monitor for December 2025]]></description><link>https://newsletter.insightthreatintel.com/p/following-the-money-821</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/following-the-money-821</guid><dc:creator><![CDATA[Lisa Niemzyk]]></dc:creator><pubDate>Tue, 13 Jan 2026 14:00:53 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!wRJl!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe73de2cb-ab0b-45e9-8e44-130382136f84_1024x1024.heic" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Hello, <strong>Insight Monitor</strong> subscribers! We hope everyone had a relaxing holiday. December was a bit of quieter month for us here at ITI as we took some time to recharge. In this week&#8217;s Follow the Money, you&#8217;ll find: </em></p><ol><li><p>A not-to-miss webinar on terrorist financing</p></li><li><p>An update on recent media interviews</p></li><li><p>Exciting news about the paperback edition of <em>Illicit Money: Financing Terrorism in the 21st Century</em></p></li><li><p>A link to the latest Global Terrorist Financing Report </p></li><li><p>News about our terrorist financing analysis course</p></li><li><p>Two new Secure Line podcast episodes! </p></li></ol><p>Read for more: </p><h2>Terrorist Financing Webinar</h2><p>In partnership with Nasdaq Verafin, Jessica will be sharing her knowledge and expertise on terrorist financing trends and issues on a panel. You can register for &#8220;Terrorist Financing Detection: Tools, Tactics, and Real-World Solutions&#8221; <a href="https://verafin.com/event/terrorist-financing-detection-tools-tactics-and-real-world-solutions/">here</a>. The webinar is on 21 January at 12:30 pm EST. Don&#8217;t miss out! </p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://verafin.com/event/terrorist-financing-detection-tools-tactics-and-real-world-solutions/&quot;,&quot;text&quot;:&quot;Register&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://verafin.com/event/terrorist-financing-detection-tools-tactics-and-real-world-solutions/"><span>Register</span></a></p><h2>In the Media</h2><p>Jessica gave a media interview for the Financial Times on Binance&#8217;s compliance woes. You can read her comments <a href="https://www.ft.com/content/5d8af345-d593-47b1-85ae-758ee60e9a89?accessToken=zwAAAZukVS_mkc9divNF1ZNHsdOFrnWO5g6aiQ.MEYCIQCeuqEKw91lT0qJlQO11qPAeB0gtY47YxTVZZYCGsZCugIhAJ7FGk3xFVCDEZIWvMRKhvTFSLeQiMS4omvHfqhuZLB9&amp;segmentId=e95a9ae7-622c-6235-5f87-51e412b47e97&amp;shareType=enterprise&amp;shareId=aae196ce-dfd9-4ad8-bdcb-17212ded3169">here.</a> Her thoughts on the issue of noncompliance on crypto exchanges can be summarized succinctly with this quote: &#8220;&#8230;part of the problem with the fines is that we&#8217;re just talking about so much money being made on these platforms that even a billion-dollar fine becomes fairly meaningless.&#8221;</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Insight Monitor is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!wRJl!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe73de2cb-ab0b-45e9-8e44-130382136f84_1024x1024.heic" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!wRJl!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe73de2cb-ab0b-45e9-8e44-130382136f84_1024x1024.heic 424w, https://substackcdn.com/image/fetch/$s_!wRJl!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe73de2cb-ab0b-45e9-8e44-130382136f84_1024x1024.heic 848w, https://substackcdn.com/image/fetch/$s_!wRJl!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe73de2cb-ab0b-45e9-8e44-130382136f84_1024x1024.heic 1272w, https://substackcdn.com/image/fetch/$s_!wRJl!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe73de2cb-ab0b-45e9-8e44-130382136f84_1024x1024.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!wRJl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe73de2cb-ab0b-45e9-8e44-130382136f84_1024x1024.heic" width="514" height="514" data-attrs="{&quot;src&quot;:&quot;https://substackcdn.com/image/fetch/$s_!wRJl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe73de2cb-ab0b-45e9-8e44-130382136f84_1024x1024.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:514,&quot;width&quot;:514,&quot;resizeWidth&quot;:514,&quot;bytes&quot;:195723,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!wRJl!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe73de2cb-ab0b-45e9-8e44-130382136f84_1024x1024.heic 424w, https://substackcdn.com/image/fetch/$s_!wRJl!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe73de2cb-ab0b-45e9-8e44-130382136f84_1024x1024.heic 848w, https://substackcdn.com/image/fetch/$s_!wRJl!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe73de2cb-ab0b-45e9-8e44-130382136f84_1024x1024.heic 1272w, https://substackcdn.com/image/fetch/$s_!wRJl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe73de2cb-ab0b-45e9-8e44-130382136f84_1024x1024.heic 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>As always, we published our latest <strong>Global Terrorist Financing Report,</strong> highlighting major developments from the past month.</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;44785cd7-9012-4b50-acf0-e4baaf4d2ce1&quot;,&quot;caption&quot;:&quot;Hello Insight Monitor subscribers! We&#8217;re excited to bring you the latest Global Terrorism Financing Report! This month, we explore key terrorism financing prosecutions in the US, neo-Nazis in Australia attempting to legitimize their financial operations through political party registrations, and ISIL affiliates procuring drone components. We&#8217;re keeping a close watch on these developments so you don&#8217;t have to. Be sure to check out our long-read recommendations for deeper insights. This is our last newsletter of 2025, so stay tuned for more news and analysis in early January. Happy holidays!&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Global Terrorism Financing Report &quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:313776655,&quot;name&quot;:&quot;Emelia Connolly&quot;,&quot;bio&quot;:null,&quot;photo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!9E-n!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9783d60b-0c55-4a2b-9ccd-a05d4ca26b39_828x828.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2025-12-09T14:02:19.553Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!zo-K!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdf8c58c2-9a60-4a86-8bfa-6afaf2067f30_3274x1707.jpeg&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/global-terrorism-financing-report-aeb&quot;,&quot;section_name&quot;:&quot;News&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:180768826,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:2,&quot;comment_count&quot;:0,&quot;publication_id&quot;:329102,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!I_1w!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4649d7af-94ce-49ea-8c58-368ec26cd423_900x900.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><h2>Illicit Money Update</h2><p>Good news! Jessica&#8217;s publisher for <em><a href="https://www.rienner.com/title/Illicit_Money_Financing_Terrorism_in_the_Twenty_First_Century">Illicit Money</a></em> also recently announced that the book is going to be published in paperback format. We know some of you have been put off by the price (especially outside of North America), so hopefully this version will be a bit more affordable. We&#8217;ll be sure to share details when it&#8217;s released. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://www.rienner.com/title/Illicit_Money_Financing_Terrorism_in_the_Twenty_First_Century" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!0awT!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa3c7db3c-80f6-4c71-8a72-64a7946535dd_1800x2700.heic 424w, https://substackcdn.com/image/fetch/$s_!0awT!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa3c7db3c-80f6-4c71-8a72-64a7946535dd_1800x2700.heic 848w, https://substackcdn.com/image/fetch/$s_!0awT!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa3c7db3c-80f6-4c71-8a72-64a7946535dd_1800x2700.heic 1272w, https://substackcdn.com/image/fetch/$s_!0awT!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa3c7db3c-80f6-4c71-8a72-64a7946535dd_1800x2700.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!0awT!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa3c7db3c-80f6-4c71-8a72-64a7946535dd_1800x2700.heic" width="270" height="405" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a3c7db3c-80f6-4c71-8a72-64a7946535dd_1800x2700.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:2184,&quot;width&quot;:1456,&quot;resizeWidth&quot;:270,&quot;bytes&quot;:74086,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:&quot;https://www.rienner.com/title/Illicit_Money_Financing_Terrorism_in_the_Twenty_First_Century&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://newsletter.insightthreatintel.com/i/184051844?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa3c7db3c-80f6-4c71-8a72-64a7946535dd_1800x2700.heic&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!0awT!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa3c7db3c-80f6-4c71-8a72-64a7946535dd_1800x2700.heic 424w, https://substackcdn.com/image/fetch/$s_!0awT!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa3c7db3c-80f6-4c71-8a72-64a7946535dd_1800x2700.heic 848w, https://substackcdn.com/image/fetch/$s_!0awT!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa3c7db3c-80f6-4c71-8a72-64a7946535dd_1800x2700.heic 1272w, https://substackcdn.com/image/fetch/$s_!0awT!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa3c7db3c-80f6-4c71-8a72-64a7946535dd_1800x2700.heic 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2><strong>Terrorist Financing Analysis </strong></h2><p>Become an expert on how terrorist groups move, store, and exploit funds. This bundle gives you access to the terrorist financing analysis course, plus a customizable analytic tool, relevant case studies, and other practical resources you need to detect, analyze, and disrupt illicit financing networks.</p><p>Join our community, tackle real-world exercises, and gain skills you won&#8217;t find anywhere else. <a href="https://insightthreatintelligence.thinkific.com/courses/FININTSources">Enroll now</a> and take your expertise to the next level!</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!QECs!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe38e54bb-4e7f-40b6-8429-46f7ee2c7562_629x318.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!QECs!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe38e54bb-4e7f-40b6-8429-46f7ee2c7562_629x318.jpeg 424w, https://substackcdn.com/image/fetch/$s_!QECs!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe38e54bb-4e7f-40b6-8429-46f7ee2c7562_629x318.jpeg 848w, https://substackcdn.com/image/fetch/$s_!QECs!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe38e54bb-4e7f-40b6-8429-46f7ee2c7562_629x318.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!QECs!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe38e54bb-4e7f-40b6-8429-46f7ee2c7562_629x318.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!QECs!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe38e54bb-4e7f-40b6-8429-46f7ee2c7562_629x318.jpeg" width="629" height="318" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e38e54bb-4e7f-40b6-8429-46f7ee2c7562_629x318.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:318,&quot;width&quot;:629,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:30595,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://newsletter.insightthreatintel.com/i/178084950?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe38e54bb-4e7f-40b6-8429-46f7ee2c7562_629x318.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!QECs!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe38e54bb-4e7f-40b6-8429-46f7ee2c7562_629x318.jpeg 424w, https://substackcdn.com/image/fetch/$s_!QECs!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe38e54bb-4e7f-40b6-8429-46f7ee2c7562_629x318.jpeg 848w, https://substackcdn.com/image/fetch/$s_!QECs!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe38e54bb-4e7f-40b6-8429-46f7ee2c7562_629x318.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!QECs!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe38e54bb-4e7f-40b6-8429-46f7ee2c7562_629x318.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/p/following-the-money-821?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/p/following-the-money-821?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><h2><br>Secure Line Podcast</h2><p>Secure Line podcast also released two new episodes in December. The first was with the Economist&#8217;s Defence Editor<a href="https://www.youtube.com/watch?v=mjjMnG4V8jk"> Shashank Joshi </a>where Jessica, Leah and Stephanie talk about the year that was (2025) and the year ahead (2026). The second was the <a href="https://www.youtube.com/watch?v=Rl0qPZ_wiOY">Festivus episode</a>, where the Secure Line hosts share their grievances from the year and what they&#8217;re looking forward to for 2026. This is a rare video episode, complete with Christmas sweaters! </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://www.youtube.com/watch?v=Rl0qPZ_wiOY" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!aicM!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c5ee587-eedd-4cb2-aaaf-2dc0bc236fc3_1126x616.heic 424w, https://substackcdn.com/image/fetch/$s_!aicM!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c5ee587-eedd-4cb2-aaaf-2dc0bc236fc3_1126x616.heic 848w, https://substackcdn.com/image/fetch/$s_!aicM!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c5ee587-eedd-4cb2-aaaf-2dc0bc236fc3_1126x616.heic 1272w, https://substackcdn.com/image/fetch/$s_!aicM!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c5ee587-eedd-4cb2-aaaf-2dc0bc236fc3_1126x616.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!aicM!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c5ee587-eedd-4cb2-aaaf-2dc0bc236fc3_1126x616.heic" width="1126" height="616" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0c5ee587-eedd-4cb2-aaaf-2dc0bc236fc3_1126x616.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:616,&quot;width&quot;:1126,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:96788,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:&quot;https://www.youtube.com/watch?v=Rl0qPZ_wiOY&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://newsletter.insightthreatintel.com/i/184051844?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c5ee587-eedd-4cb2-aaaf-2dc0bc236fc3_1126x616.heic&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!aicM!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c5ee587-eedd-4cb2-aaaf-2dc0bc236fc3_1126x616.heic 424w, https://substackcdn.com/image/fetch/$s_!aicM!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c5ee587-eedd-4cb2-aaaf-2dc0bc236fc3_1126x616.heic 848w, https://substackcdn.com/image/fetch/$s_!aicM!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c5ee587-eedd-4cb2-aaaf-2dc0bc236fc3_1126x616.heic 1272w, https://substackcdn.com/image/fetch/$s_!aicM!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c5ee587-eedd-4cb2-aaaf-2dc0bc236fc3_1126x616.heic 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>There&#8217;s lots more to come from Insight Monitor, Secure Line, and Insight Threat Intelligence for 2026, so be sure to subscribe and stay up to date! </p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/subscribe?"><span>Subscribe now</span></a></p><p><em>&#169; 2026 Insight Threat Intelligence Ltd. All Rights Reserved.<br><br>This newsletter and its contents are protected by Canadian copyright law. Except as otherwise provided for under Canadian copyright law, this newsletter and its contents may not be copied, published, distributed, downloaded or otherwise stored in a retrieval system, transmitted or converted, in any form or by any means, electronic or otherwise, without the prior written permission of the copyright owner.</em></p>]]></content:encoded></item></channel></rss>