<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Insight Monitor]]></title><description><![CDATA[Global security, terrorism, espionage and illicit financing -- news and analysis you won't find anywhere else! ]]></description><link>https://newsletter.insightthreatintel.com</link><image><url>https://substackcdn.com/image/fetch/$s_!I_1w!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4649d7af-94ce-49ea-8c58-368ec26cd423_900x900.png</url><title>Insight Monitor</title><link>https://newsletter.insightthreatintel.com</link></image><generator>Substack</generator><lastBuildDate>Mon, 11 May 2026 01:49:42 GMT</lastBuildDate><atom:link href="https://newsletter.insightthreatintel.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Jessica Davis]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[jmd@insightthreatintel.com]]></webMaster><itunes:owner><itunes:email><![CDATA[jmd@insightthreatintel.com]]></itunes:email><itunes:name><![CDATA[Jessica Davis, PhD]]></itunes:name></itunes:owner><itunes:author><![CDATA[Jessica Davis, PhD]]></itunes:author><googleplay:owner><![CDATA[jmd@insightthreatintel.com]]></googleplay:owner><googleplay:email><![CDATA[jmd@insightthreatintel.com]]></googleplay:email><googleplay:author><![CDATA[Jessica Davis, PhD]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Global Terrorism Financing Report ]]></title><description><![CDATA[April 2026]]></description><link>https://newsletter.insightthreatintel.com/p/global-terrorism-financing-report-f75</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/global-terrorism-financing-report-f75</guid><dc:creator><![CDATA[Emelia Connolly]]></dc:creator><pubDate>Thu, 07 May 2026 13:02:12 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!zuM2!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F543dea13-6291-4016-ae64-028280b398bd_1720x968.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p style="text-align: justify;">Welcome back, Insight Monitor subscribers!</p><p><em>This month, we highlight a surge in global terrorism-financing actions: U.S. sanctions on Iran-linked networks, crypto cases in Indonesia and Iran, Hamas-linked fundraising in Europe and North America, and cartel-linked money laundering through casinos and hawala. We also feature long reads on Hizballah&#8217;s finances and the human rights impacts of asset-freezing regimes.</em></p><p style="text-align: justify;"><em>Dive in, share with a colleague, and explore our long-read picks for deeper analysis.</em></p><p></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!zuM2!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F543dea13-6291-4016-ae64-028280b398bd_1720x968.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!zuM2!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F543dea13-6291-4016-ae64-028280b398bd_1720x968.jpeg 424w, https://substackcdn.com/image/fetch/$s_!zuM2!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F543dea13-6291-4016-ae64-028280b398bd_1720x968.jpeg 848w, https://substackcdn.com/image/fetch/$s_!zuM2!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F543dea13-6291-4016-ae64-028280b398bd_1720x968.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!zuM2!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F543dea13-6291-4016-ae64-028280b398bd_1720x968.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!zuM2!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F543dea13-6291-4016-ae64-028280b398bd_1720x968.jpeg" width="1720" height="968" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/543dea13-6291-4016-ae64-028280b398bd_1720x968.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:968,&quot;width&quot;:1720,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:111998,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://newsletter.insightthreatintel.com/i/196649846?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F306e8b1c-6241-46f0-a014-17dafd168f1b_2000x1125.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!zuM2!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F543dea13-6291-4016-ae64-028280b398bd_1720x968.jpeg 424w, https://substackcdn.com/image/fetch/$s_!zuM2!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F543dea13-6291-4016-ae64-028280b398bd_1720x968.jpeg 848w, https://substackcdn.com/image/fetch/$s_!zuM2!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F543dea13-6291-4016-ae64-028280b398bd_1720x968.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!zuM2!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F543dea13-6291-4016-ae64-028280b398bd_1720x968.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Insight Monitor is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>
      <p>
          <a href="https://newsletter.insightthreatintel.com/p/global-terrorism-financing-report-f75">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Iranian funding of Hamas through Cryptocurrency]]></title><description><![CDATA[Part 3 of our axis of illicit finance series]]></description><link>https://newsletter.insightthreatintel.com/p/iranian-funding-of-hamas-through</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/iranian-funding-of-hamas-through</guid><dc:creator><![CDATA[Jessica Davis, PhD]]></dc:creator><pubDate>Tue, 28 Apr 2026 13:02:13 GMT</pubDate><enclosure url="https://images.unsplash.com/photo-1525260268417-e73c4edc9d74?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxM3x8aXJhbnxlbnwwfHx8fDE3NzU3NjEyMDh8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Hello, Insight Monitor subscribers, and welcome to part 3 of our series on Iran&#8217;s use of cryptocurrency to finance its sanctions evasion activity and the axis of illicit finance. </em></p><p>In part 1 of this series, we explained the Iran sanctions context and how Iran began widespread use of cryptocurrency in 2018, largely as a response to those sanctions. We highlighted Iran&#8217;s role in mining Bitcoin, which creates liquidity for the regime while also leveraging its oil surplus.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Insight Monitor is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://images.unsplash.com/photo-1525260268417-e73c4edc9d74?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxM3x8aXJhbnxlbnwwfHx8fDE3NzU3NjEyMDh8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://images.unsplash.com/photo-1525260268417-e73c4edc9d74?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxM3x8aXJhbnxlbnwwfHx8fDE3NzU3NjEyMDh8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1525260268417-e73c4edc9d74?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxM3x8aXJhbnxlbnwwfHx8fDE3NzU3NjEyMDh8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1525260268417-e73c4edc9d74?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxM3x8aXJhbnxlbnwwfHx8fDE3NzU3NjEyMDh8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1525260268417-e73c4edc9d74?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxM3x8aXJhbnxlbnwwfHx8fDE3NzU3NjEyMDh8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1456w" sizes="100vw"><img src="https://images.unsplash.com/photo-1525260268417-e73c4edc9d74?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxM3x8aXJhbnxlbnwwfHx8fDE3NzU3NjEyMDh8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" width="348" height="261" data-attrs="{&quot;src&quot;:&quot;https://images.unsplash.com/photo-1525260268417-e73c4edc9d74?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxM3x8aXJhbnxlbnwwfHx8fDE3NzU3NjEyMDh8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:3024,&quot;width&quot;:4032,&quot;resizeWidth&quot;:348,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Shanghair Oriental Pearl Tower, China&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Shanghair Oriental Pearl Tower, China" title="Shanghair Oriental Pearl Tower, China" srcset="https://images.unsplash.com/photo-1525260268417-e73c4edc9d74?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxM3x8aXJhbnxlbnwwfHx8fDE3NzU3NjEyMDh8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1525260268417-e73c4edc9d74?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxM3x8aXJhbnxlbnwwfHx8fDE3NzU3NjEyMDh8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1525260268417-e73c4edc9d74?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxM3x8aXJhbnxlbnwwfHx8fDE3NzU3NjEyMDh8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1525260268417-e73c4edc9d74?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxM3x8aXJhbnxlbnwwfHx8fDE3NzU3NjEyMDh8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/@armantaherian">Arman Taherian</a> on <a href="https://unsplash.com">Unsplash</a></figcaption></figure></div><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;830a4185-d518-449f-859e-355e2ffdc8f4&quot;,&quot;caption&quot;:&quot;This article marks the start of an eight-part series examining how Iran has increasingly relied on cryptocurrency to circumvent international sanctions. These developments unfold against a volatile backdrop: Iran&#8217;s 2025 confrontation with Israel, the ongoing activity of its regional proxy network, and protests driven by corruption, economic hardship (ex&#8230;&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;The Axis of Illicit Finance: Iran&#8217;s Crypto Strategy Explained&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:33479672,&quot;name&quot;:&quot;Jessica Davis, PhD&quot;,&quot;bio&quot;:&quot;Jessica Davis is President of Insight Threat Intelligence and is the author of Women in Modern Terrorism: From Liberations Wars to Global Terrorism and the Islamic State (2017), and Illicit Money: Financing Terrorism in the 21st Century (2021).&quot;,&quot;photo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!ICh7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe312ae7c-114b-4e4f-9ce1-8bf50ddb7a27_2344x2049.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2026-01-06T14:00:45.585Z&quot;,&quot;cover_image&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/87b19738-1968-494d-aa46-98d0020cd199_845x486.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/the-axis-of-illicit-finance-irans&quot;,&quot;section_name&quot;:&quot;Financiers&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:183357175,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:14,&quot;comment_count&quot;:0,&quot;publication_id&quot;:329102,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!I_1w!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4649d7af-94ce-49ea-8c58-368ec26cd423_900x900.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>In part 2 of the series, we explored how Iran uses cryptocurrency to finance the Houthis (Ansarallah). We illuminated the various companies, exchanges, and individuals involved in Iran-Yemen crypto threat finance, highlighting the many jurisdictions this network spans.</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;c8139c7d-df03-45e1-9edc-f145715be2e8&quot;,&quot;caption&quot;:&quot;In part 1 of this series, we examined how Iran has increasingly turned to cryptocurrency as a core tool in its sanctions-evasion toolkit, using digital assets to bypass conventional financial controls and support its broader regional network of allied armed groups, including Hezbollah, Hamas, and Ansarallah (the Houthis).&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;From Tehran to Sana&#8217;a: Cryptocurrency and Sanctions Evasion in the Axis of Illicit Finance&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:33479672,&quot;name&quot;:&quot;Jessica Davis, PhD&quot;,&quot;bio&quot;:&quot;Jessica Davis is President of Insight Threat Intelligence and is the author of Women in Modern Terrorism: From Liberations Wars to Global Terrorism and the Islamic State (2017), and Illicit Money: Financing Terrorism in the 21st Century (2021).&quot;,&quot;photo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!ICh7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe312ae7c-114b-4e4f-9ce1-8bf50ddb7a27_2344x2049.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2026-02-24T14:02:37.624Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!0BCO!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ec115eb-33b1-4e33-8147-a3b6ffc1f04e_626x682.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/from-tehran-to-sanaa-cryptocurrency&quot;,&quot;section_name&quot;:&quot;Group Profiles &quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:186790350,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:3,&quot;comment_count&quot;:0,&quot;publication_id&quot;:329102,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!I_1w!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4649d7af-94ce-49ea-8c58-368ec26cd423_900x900.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>&#171;in part 3 of the series&#8230;&#187;</p><p>Today, we&#8217;re looking at the role of Iran&#8217;s illicit crypto finance network in financing Hamas. Hamas is part of Iran&#8217;s Axis of Resistance and has been funded by the regime to the tune of $100 million per year. While much of this is provided to Hamas through cash couriers, hawala transfers, and trade-based financing mechanisms, some of it is provided through cryptocurrency transactions.</p><p>Hamas&#8217;s relationship with cryptocurrency is an interesting one. The group was an early adopter of cryptocurrency, soliciting donations on its public website almost a decade ago. Hamas has used cryptocurrencies such as Bitcoin and stablecoins to store and transfer funds, and has <a href="https://www.reuters.com/world/middle-east/hamas-cash-to-crypto-global-finance-maze-israels-sights-2023-10-16/">raised hundreds of thousands (if not millions) by soliciting cryptocurrency donations</a> from its members and supporters worldwide.<sup> </sup>To conceal the origin and final destination of cryptocurrency transactions, the Qassam Brigades&#8217; website <a href="https://www.counterextremism.com/threat/hamas/report">offered instructions in multiple languages on creating Bitcoin wallets and making untraceable donations to Hamas.</a><sup> </sup>To further enhance anonymity, Hamas also <a href="https://www.counterextremism.com/threat/hamas/report">generated unique transaction links for individual Bitcoin wallets on its website</a>, avoiding cryptocurrency exchanges that are more susceptible to tracking by authorities.</p><p>Hamas has not had complete freedom to operate in the cryptocurrency market. In June 2021, <a href="https://www.reuters.com/world/middle-east/hamas-cash-to-crypto-global-finance-maze-israels-sights-2023-10-16/">Israel&#8217;s National Bureau for Counter-Terrorist Financing (NBCTF) seized multiple cryptocurrency wallets linked to a Hamas fundraising campaign</a>, some associated with the Qassam Brigade.<sup> </sup><a href="https://content.govdelivery.com/accounts/USTREAS/bulletins/3766304">One of these wallets belonged to Buy Cash Money and Money Transfer Company</a>, a Gaza-based business providing money transfer and virtual currency exchange services. <a href="https://content.govdelivery.com/accounts/USTREAS/bulletins/3766304">Buy Cash facilitated fund transfers for not only Hamas but also affiliates of other terrorist groups</a>, such as Al Qaeda and ISIS.<sup> </sup>However, this was not the end of Hamas&#8217;s use of cryptocurrency. While Iran has a number of different means to move money to Hamas, the IRGC has also used cryptocurrency to fund the group.</p><p>In April 2023, Israel&#8217;s NBCTF <a href="https://home.treasury.gov/news/press-releases/jy2036">seized 189 cryptocurrency accounts that were associated with three Palestinian currency exchanges, including Gaza and T&#252;rkiye-based exchange Al-Markaziya Li-Siarafa</a>, which Israel designated for its support for Hamas.<sup> </sup>This exchange, previously known by a different name (Al-Mutahadun for Exchange), is <a href="https://home.treasury.gov/news/press-releases/jy2036">alleged to be directly involved in facilitating tens of millions of dollars from the IRGC-QF to Hamas and Palestinian Islamic Jihad (PIJ)</a>.<sup> </sup> <a href="https://home.treasury.gov/news/press-releases/jy2036">Al-Markaziya is owned by Zuhair Shamlakh, a Gaza-based money changer.</a><sup>  </sup>He is <a href="https://www.wsj.com/world/middle-east/hamas-needed-a-new-way-to-get-money-from-iran-it-turned-to-crypto-739619aa?st=16a0bppwsg9wakk.">alleged to have used a network of exchanges that sent digital tokens to operators abroad</a> to settle hawala balances, as well as to wallets controlled by Hamas-affiliated money exchanges.<sup> </sup><a href="https://www.wsj.com/world/middle-east/hamas-needed-a-new-way-to-get-money-from-iran-it-turned-to-crypto-739619aa?st=16a0bppwsg9wakk.">Around 2020, this method of transfer became a central part of Hamas&#8217;s operational financial activity.</a></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!kjv7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F300c764b-7773-43de-bce9-36d6ef084373_462x623.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!kjv7!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F300c764b-7773-43de-bce9-36d6ef084373_462x623.png 424w, https://substackcdn.com/image/fetch/$s_!kjv7!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F300c764b-7773-43de-bce9-36d6ef084373_462x623.png 848w, https://substackcdn.com/image/fetch/$s_!kjv7!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F300c764b-7773-43de-bce9-36d6ef084373_462x623.png 1272w, https://substackcdn.com/image/fetch/$s_!kjv7!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F300c764b-7773-43de-bce9-36d6ef084373_462x623.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!kjv7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F300c764b-7773-43de-bce9-36d6ef084373_462x623.png" width="462" height="623" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/300c764b-7773-43de-bce9-36d6ef084373_462x623.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:623,&quot;width&quot;:462,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!kjv7!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F300c764b-7773-43de-bce9-36d6ef084373_462x623.png 424w, https://substackcdn.com/image/fetch/$s_!kjv7!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F300c764b-7773-43de-bce9-36d6ef084373_462x623.png 848w, https://substackcdn.com/image/fetch/$s_!kjv7!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F300c764b-7773-43de-bce9-36d6ef084373_462x623.png 1272w, https://substackcdn.com/image/fetch/$s_!kjv7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F300c764b-7773-43de-bce9-36d6ef084373_462x623.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Another known Hamas financing network is the Herzallah network. This network is centered on the Gaza-based Herzallah Exchange and General Trading Company LLC, which has worked with Hamas to facilitate transactions through cryptocurrencies and has laundered funds for Hamas and PIJ. The <a href="https://home.treasury.gov/news/press-releases/jy2036">exchange is owned by Muhammad Fallah Kamil Hirzallah, Na&#8217;im Kamil Raghib Hirzallah, and Salah Kamil Raghib Hirzallah</a>.<sup> </sup>While there are no publicly identified transactions from Iran moving through this exchange, this remains a possible avenue for Iranian crypto funding of Hamas.</p><h4><strong>Financial Intelligence Fundamentals</strong></h4><p><em>Do you want to learn more about financial intelligence and how to use it in research, investigations, and analysis? Our financial intelligence fundamentals course is for you! This course is perfect for people new to financial intelligence and seasoned professionals. <a href="https://insightthreatintelligence.thinkific.com/courses/introFININT">Enroll today</a></em></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://insightthreatintelligence.thinkific.com/courses/introFININT" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!8tvZ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png 424w, https://substackcdn.com/image/fetch/$s_!8tvZ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png 848w, https://substackcdn.com/image/fetch/$s_!8tvZ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png 1272w, https://substackcdn.com/image/fetch/$s_!8tvZ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!8tvZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png" width="905" height="496" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:496,&quot;width&quot;:905,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:731766,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:&quot;&quot;,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://insightthreatintelligence.thinkific.com/courses/introFININT&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!8tvZ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png 424w, https://substackcdn.com/image/fetch/$s_!8tvZ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png 848w, https://substackcdn.com/image/fetch/$s_!8tvZ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png 1272w, https://substackcdn.com/image/fetch/$s_!8tvZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><p>The attribution of wallets and the transactions moving through them is complicated. In some cases, wallets are wholly attributed to the IRGC even when they are used by multiple entities. In one case, the NBCTF designated two hot wallets used by the IRGC. Even though other (non-IRGC) funds likely moved through those wallets, the entire set of wallets was designated by Israeli authorities. When this type of action is reported by the media, it can lead to exaggerated estimates of terrorist financing, as the nuances of wallet control and use are sometimes lost, and all funds that have flowed through those wallets are incorrectly &#8220;attributed&#8221; to the IRGC. In reality, these wallets often represent informal exchanges, over-the-counter brokers, or hawalas, meaning that they serve a diverse set of clients, not just Hamas or other terrorist groups. As such, describing all the transactions flowing through the wallets as &#8220;terror finance&#8221; is misleading.</p><p>While there is evidence of direct cryptocurrency transactions between Iran-linked wallets, facilitators, and Hamas, transactions appear to have largely passed through informal exchanges or hawaladars providing cash-out services, making the scale of this activity difficult to quantify.  <a href="https://insightthreatintelligence.thinkific.com/courses/hamasfinancingreport">Historically, Iran&#8217;s support to Hamas has primarily moved through cash couriers into Gaza</a>, as well as other types of transactions to deposit funds into the group&#8217;s wider financial networks abroad.</p><p>However, with recent disruptions to traditional supply routes, Iran could increasingly turn to cryptocurrency to facilitate transfers. The change in regime brought about by the Iran-US-Israel war has removed <a href="https://www.wsj.com/world/middle-east/iran-radical-regime-change-a42d96ea?st=9H3DgV&amp;reflink=desktopwebshare_permalink">significant layers of older regime members</a>; the newer, younger leaders are likely to more fully embrace cryptocurrency as a means of transferring funds to its proxies, including Hamas. At the same time, Israel&#8217;s focused targeting of financial facilitators in Gaza has likely constrained the effectiveness of any such efforts, leaving the future role of cryptocurrency in Hamas&#8217;s financing both fluid and uncertain.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/p/iranian-funding-of-hamas-through?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/p/iranian-funding-of-hamas-through?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p><em>This research is part of my post-doctoral work funded by the University of Calgary&#8217;s Faculty of Law.</em></p><div><hr></div><p><em>&#169; 2026 Insight Threat Intelligence Ltd. All Rights Reserved.<br><br>This newsletter and its contents are protected by Canadian copyright law. Except as otherwise provided for under Canadian copyright law, this newsletter and its contents may not be copied, published, distributed, downloaded or otherwise stored in a retrieval system, transmitted or converted, in any form or by any means, electronic or otherwise, without the prior written permission of the copyright owner.</em></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Insight Monitor is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[A7A5: A breakout sanctions evasion capability]]></title><description><![CDATA[Russian sanctions evasion, illicit political finance, and more]]></description><link>https://newsletter.insightthreatintel.com/p/a7a5-a-breakout-sanctions-evasion</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/a7a5-a-breakout-sanctions-evasion</guid><dc:creator><![CDATA[Jessica Davis, PhD]]></dc:creator><pubDate>Tue, 21 Apr 2026 13:01:13 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!JMhq!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5d7265d1-11c1-4ed0-95b9-fb6f5798c163.heic" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>In 2015, Europe&#8217;s poorest nation woke up to a nasty surprise. <a href="https://www.bbc.com/news/magazine-33166383">One billion dollars had vanished from three of Moldova&#8217;s leading banks</a>, plunging the country into deep crisis.<sup> </sup>The money had moved out of the banks <a href="https://www.bbc.com/news/magazine-33166383">through a series of transactions to UK and Hong Kong-registered companies</a> that held bank accounts in Latvia; those companies, in turn, were owned&#8230;</p>
      <p>
          <a href="https://newsletter.insightthreatintel.com/p/a7a5-a-breakout-sanctions-evasion">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Iran's financial tradecraft on the blockchain]]></title><description><![CDATA[How Iran uses a hybrid threat finance system to fund its proxies and sanctions evasion activities.]]></description><link>https://newsletter.insightthreatintel.com/p/irans-financial-tradecraft-on-the</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/irans-financial-tradecraft-on-the</guid><dc:creator><![CDATA[Jessica Davis, PhD]]></dc:creator><pubDate>Tue, 14 Apr 2026 13:01:16 GMT</pubDate><enclosure url="https://images.unsplash.com/photo-1640833906651-6bd1af7aeea3?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxjcnlwdG98ZW58MHx8fHwxNzc1NzYzNzE2fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Hello Insight Monitor subscribers, and welcome to another edition of our series examining how Iran uses cryptocurrency for sanctions evasion and terrorist financing. Today, we&#8217;re looking at the financial tradecraft that Iran uses to hide its money on the blockchain, all in the context of shifting economic and financial pathways for the Iranian regime. Get caught up and have a read! </em></p><p>In part 1 of this series, we explained the context of the Iran sanctions and how Iran began widespread cryptocurrency use in 2018, largely as a response to those sanctions. We highlighted Iran&#8217;s role in mining Bitcoin, which creates liquidity for the regime while also leveraging its oil surplus.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://images.unsplash.com/photo-1640833906651-6bd1af7aeea3?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxjcnlwdG98ZW58MHx8fHwxNzc1NzYzNzE2fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://images.unsplash.com/photo-1640833906651-6bd1af7aeea3?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxjcnlwdG98ZW58MHx8fHwxNzc1NzYzNzE2fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1640833906651-6bd1af7aeea3?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxjcnlwdG98ZW58MHx8fHwxNzc1NzYzNzE2fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1640833906651-6bd1af7aeea3?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxjcnlwdG98ZW58MHx8fHwxNzc1NzYzNzE2fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1640833906651-6bd1af7aeea3?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxjcnlwdG98ZW58MHx8fHwxNzc1NzYzNzE2fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1456w" sizes="100vw"><img src="https://images.unsplash.com/photo-1640833906651-6bd1af7aeea3?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxjcnlwdG98ZW58MHx8fHwxNzc1NzYzNzE2fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" width="273" height="181.63888888888889" data-attrs="{&quot;src&quot;:&quot;https://images.unsplash.com/photo-1640833906651-6bd1af7aeea3?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxjcnlwdG98ZW58MHx8fHwxNzc1NzYzNzE2fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:4024,&quot;width&quot;:6048,&quot;resizeWidth&quot;:273,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;a pile of bitcoins sitting on top of a pile of gravel&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="a pile of bitcoins sitting on top of a pile of gravel" title="a pile of bitcoins sitting on top of a pile of gravel" srcset="https://images.unsplash.com/photo-1640833906651-6bd1af7aeea3?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxjcnlwdG98ZW58MHx8fHwxNzc1NzYzNzE2fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1640833906651-6bd1af7aeea3?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxjcnlwdG98ZW58MHx8fHwxNzc1NzYzNzE2fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1640833906651-6bd1af7aeea3?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxjcnlwdG98ZW58MHx8fHwxNzc1NzYzNzE2fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1640833906651-6bd1af7aeea3?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxjcnlwdG98ZW58MHx8fHwxNzc1NzYzNzE2fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/@traxer">Traxer</a> on <a href="https://unsplash.com">Unsplash</a></figcaption></figure></div><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;f261a5a5-bdf0-444a-9f5e-fa0a8d4c5b55&quot;,&quot;caption&quot;:&quot;This article marks the start of an eight-part series examining how Iran has increasingly relied on cryptocurrency to circumvent international sanctions. These developments unfold against a volatile backdrop: Iran&#8217;s 2025 confrontation with Israel, the ongoing activity of its regional proxy network, and protests driven by corruption, economic hardship (ex&#8230;&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;The Axis of Illicit Finance: Iran&#8217;s Crypto Strategy Explained&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:33479672,&quot;name&quot;:&quot;Jessica Davis, PhD&quot;,&quot;bio&quot;:&quot;Jessica Davis is President of Insight Threat Intelligence and is the author of Women in Modern Terrorism: From Liberations Wars to Global Terrorism and the Islamic State (2017), and Illicit Money: Financing Terrorism in the 21st Century (2021).&quot;,&quot;photo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!ICh7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe312ae7c-114b-4e4f-9ce1-8bf50ddb7a27_2344x2049.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2026-01-06T14:00:45.585Z&quot;,&quot;cover_image&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/87b19738-1968-494d-aa46-98d0020cd199_845x486.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/the-axis-of-illicit-finance-irans&quot;,&quot;section_name&quot;:&quot;Financiers&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:183357175,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:14,&quot;comment_count&quot;:0,&quot;publication_id&quot;:329102,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!I_1w!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4649d7af-94ce-49ea-8c58-368ec26cd423_900x900.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>In part 2 of the series, we explored how Iran uses cryptocurrency to finance the Houthis (Ansarallah). We illuminated the various companies, exchanges, and individuals involved in Iran-Yemen crypto threat finance, highlighting the many jurisdictions this network spans.</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;a91808d5-a54f-4c8f-a832-2a8376124610&quot;,&quot;caption&quot;:&quot;In part 1 of this series, we examined how Iran has increasingly turned to cryptocurrency as a core tool in its sanctions-evasion toolkit, using digital assets to bypass conventional financial controls and support its broader regional network of allied armed groups, including Hezbollah, Hamas, and Ansarallah (the Houthis).&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;From Tehran to Sana&#8217;a: Cryptocurrency and Sanctions Evasion in the Axis of Illicit Finance&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:33479672,&quot;name&quot;:&quot;Jessica Davis, PhD&quot;,&quot;bio&quot;:&quot;Jessica Davis is President of Insight Threat Intelligence and is the author of Women in Modern Terrorism: From Liberations Wars to Global Terrorism and the Islamic State (2017), and Illicit Money: Financing Terrorism in the 21st Century (2021).&quot;,&quot;photo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!ICh7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe312ae7c-114b-4e4f-9ce1-8bf50ddb7a27_2344x2049.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2026-02-24T14:02:37.624Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!0BCO!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ec115eb-33b1-4e33-8147-a3b6ffc1f04e_626x682.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/from-tehran-to-sanaa-cryptocurrency&quot;,&quot;section_name&quot;:&quot;Group Profiles &quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:186790350,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:3,&quot;comment_count&quot;:0,&quot;publication_id&quot;:329102,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!I_1w!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4649d7af-94ce-49ea-8c58-368ec26cd423_900x900.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>Today, we&#8217;re exploring Iran&#8217;s use of financial tradecraft and how the regime integrates that with cryptocurrency to hide the source and destination of funds. As the economic impacts of the Iran-Israel-US war become apparent, it is clear that Iran&#8217;s economy has been <a href="https://www.reuters.com/world/middle-east/irans-shattered-economy-means-any-success-war-may-be-fleeting-2026-04-08/">badly damaged</a>. Further, the war has caused a significant break in relations with other Gulf countries, notably the UAE, where Iran enjoyed relatively good freedom of movement, and made extensive use of the money service business sector to move money through MSBs, hawalas, and into the semi-formal system. With the UAE&#8217;s <a href="https://www.msn.com/en-xl/money/economy/uae-squeezes-iranian-economic-lifeline-in-retaliation-for-attacks/ar-AA2087yX">crackdown on Iranians</a> (and their money service businesses), this part of Iran&#8217;s threat finance ecosystem is under significant strain, likely leading to an even greater move towards cryptocurrency.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Insight Monitor is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>Indeed, Iran stated that its tolls in the Strait of Hormuz would be paid at least in part in cryptocurrency. <a href="https://gizmodo.com/iran-demands-bitcoin-and-crypto-for-strait-of-hormuz-toll-payments-2000744120">Reports suggest</a> that Iran is accepting either Bitcoin or USDT; each has their own advantages and disadvantages. In practice, Bitcoin is a likely good option for Iran because the regime has extensive experience with it. However, Bitcoin also fluctuates in price, making it difficult to price assets (or services, such as tolls) in it. On the other hand, USDT is more stable (pegged to the US dollar) but is centrally controlled and can be frozen. </p><p>Tracing these transactions, as well as Iran&#8217;s other crypto transactions, is possible. Cryptocurrency alone does not guarantee anonymity. For Iranian actors and their proxies like Hamas, Hizballaha and the Houthis, successfully evading sanctions requires sophisticated financial tradecraft to conceal the source, destination, and purpose of funds. These actors blend blockchain-based tools with traditional illicit finance techniques, exploiting weaknesses in global regulatory regimes.<sup>[i]</sup></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://insightthreatintelligence.thinkific.com/bundles/tf-analysis" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!f7rH!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 424w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 848w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 1272w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!f7rH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png" width="1066" height="507" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:507,&quot;width&quot;:1066,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:698946,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:&quot;&quot;,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://insightthreatintelligence.thinkific.com/bundles/tf-analysis&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!f7rH!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 424w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 848w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 1272w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"></figcaption></figure></div><div><hr></div><p><em>Our terrorist financing analysis course caters to researchers, intelligence, law enforcement, and compliance professionals to help them learn about terrorist financing, and analyze suspicious patterns and activities more effectively. Sign up today!</em></p><div><hr></div><p>Key elements of this tradecraft include:</p><ul><li><p><strong>Mixers and privacy tools</strong>: After a major asset seizure, Hamas began routinely using crypto mixers&#8212;services that blend cryptocurrency to obscure transactions.<sup>[ii]</sup> A cryptocurrency mixer is a service that obscures the origins and destinations of digital assets by pooling together multiple users&#8217; coins and redistributing them in a way that breaks the transaction trail. Some common mixers include Tornado Cash (for Ethereum) and Wasabi wallet (specific to Bitcoin). They&#8217;ve also increasingly engaged with privacy coins like Monero, which are designed to resist tracing efforts.</p></li><li><p><strong>Cross-chain protocols and book transfers</strong>: These techniques move value across different blockchains or within exchanges, often via internal (off-chain) transfers, making transactions difficult to trace on public ledgers. Some common cross-chain protocols include THORChain, which allows swapping assets directly across different blockchains, and the Ren Protocol, which facilitates the transfer of Bitcoin, Zcash, and other assets into Ethereum. (Also called &#8220;cross-chain swaps&#8221;.)</p></li><li><p><strong>Use of shell and front companies</strong>: Entities labelled as &#8220;general trading companies&#8221; facilitate or camouflage transactions, especially in trade-based money laundering (TBML) schemes. These companies act as intermediaries or conduits for moving value tied to illicit networks.</p></li><li><p><strong>Jurisdictional arbitrage:</strong> High-risk exchanges in Russia, China, T&#252;rkiye, and other permissive jurisdictions are regularly used for obfuscation, especially those with tiered KYC policies allowing significant transfers without identification.</p></li><li><p><strong>OTC brokers:</strong> These brokers, often regionally based, facilitate the off-ramping of cryptocurrency into state-issued currency. They operate outside formal exchange infrastructure, creating additional layers of opacity.<sup> [iii]</sup></p></li></ul><p>Iran uses significant financial tradecraft to hide much of its activity on the blockchain. Newer tools, such as Russia&#8217;s Ruble-backed stablecoin A7A5 might increasingly play a role in these obfuscation techniques, although for the time being, there is no evidence to suggest that Iran has had to adopt newer (and sometimes riskier) techniques; the current tools that it uses appear sufficient to allow it to move money internationally and provide funds to its intended recipients, including terrorist groups. </p><p>In collecting tolls from the Strait of Hormuz, Iran is likely to use these (and possibly other) tools to hide the funds and protect them from freezing and seizure. Practically speaking, given the sophistication of Iran&#8217;s cryptocurrency operations, Iran has almost complete freedom of movement in this space, and working with other partners like Russia, will likely remain largely immune from efforts to disrupt their crypto operations. </p><p>Finally, US and Israeli strikes against Iranian regime members have killed a significant tranche of Iranian leadership. These were primarily older, more traditional regime members. The segment of the regime pushing cryptocurrency adoption has likely been empowered by these strikes, and will further push the Iranian regime into cryptocurrency adoption for threat (and regime) financing. </p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/p/irans-financial-tradecraft-on-the?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/p/irans-financial-tradecraft-on-the?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p><em>This research is part of my post-doctoral work funded by the University of Calgary&#8217;s Faculty of Law.</em></p><div><hr></div><p><sup>[i]</sup> Saiz, &#8220;Sanctions in the Virtual Asset Industry: SIFMANet Roundtable Report,&#8221; 3.</p><p><sup>[ii]</sup> Julia Shapero, &#8220;Hamas Money Laundering Worries Spark Proposed New U.S. Crypto Rule,&#8221; Text, <em>The Hill</em> (blog), October 19, 2023, https://thehill.com/business/4265344-hamas-money-laundering-worries-spark-new-u-s-crypto-rule/.</p><p><sup>[iii]</sup> Application for a warrant to seize property subject to forfeiture (US District Court for the District of Columbia March 27, 2025).</p><div><hr></div><p><em>&#169; 2026 Insight Threat Intelligence Ltd. All Rights Reserved.<br><br>This newsletter and its contents are protected by Canadian copyright law. Except as otherwise provided for under Canadian copyright law, this newsletter and its contents may not be copied, published, distributed, downloaded or otherwise stored in a retrieval system, transmitted or converted, in any form or by any means, electronic or otherwise, without the prior written permission of the copyright owner.</em></p>]]></content:encoded></item><item><title><![CDATA[Global Terrorism Financing Report ]]></title><description><![CDATA[March 2026]]></description><link>https://newsletter.insightthreatintel.com/p/global-terrorism-financing-report-2e2</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/global-terrorism-financing-report-2e2</guid><dc:creator><![CDATA[Emelia Connolly]]></dc:creator><pubDate>Thu, 09 Apr 2026 13:01:10 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!DzAB!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8f315e8e-5c9c-4e18-bfdd-1503a020d4d0_936x506.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p style="text-align: justify;"><em>Welcome back, Insight Monitor subscribers!</em></p><p style="text-align: justify;"><em>In this month&#8217;s report, we explore compelling stories from Canada, Europe, and the Middle East in the complex world of terrorism financing. Our coverage includes unregistered digital finance companies, the funding and growth of ISIL cells, and Hizballah&#8217;s evolving stockpiles and revenue streams.</em></p><p style="text-align: justify;"><em>Dive in, share your thoughts with a colleague, and be sure to check out our long-read recommendations for deeper insights!</em></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!DzAB!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8f315e8e-5c9c-4e18-bfdd-1503a020d4d0_936x506.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!DzAB!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8f315e8e-5c9c-4e18-bfdd-1503a020d4d0_936x506.png 424w, https://substackcdn.com/image/fetch/$s_!DzAB!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8f315e8e-5c9c-4e18-bfdd-1503a020d4d0_936x506.png 848w, https://substackcdn.com/image/fetch/$s_!DzAB!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8f315e8e-5c9c-4e18-bfdd-1503a020d4d0_936x506.png 1272w, https://substackcdn.com/image/fetch/$s_!DzAB!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8f315e8e-5c9c-4e18-bfdd-1503a020d4d0_936x506.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!DzAB!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8f315e8e-5c9c-4e18-bfdd-1503a020d4d0_936x506.png" width="936" height="506" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8f315e8e-5c9c-4e18-bfdd-1503a020d4d0_936x506.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:506,&quot;width&quot;:936,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:188638,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://newsletter.insightthreatintel.com/i/193609400?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8f315e8e-5c9c-4e18-bfdd-1503a020d4d0_936x506.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!DzAB!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8f315e8e-5c9c-4e18-bfdd-1503a020d4d0_936x506.png 424w, https://substackcdn.com/image/fetch/$s_!DzAB!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8f315e8e-5c9c-4e18-bfdd-1503a020d4d0_936x506.png 848w, https://substackcdn.com/image/fetch/$s_!DzAB!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8f315e8e-5c9c-4e18-bfdd-1503a020d4d0_936x506.png 1272w, https://substackcdn.com/image/fetch/$s_!DzAB!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8f315e8e-5c9c-4e18-bfdd-1503a020d4d0_936x506.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Insight Monitor is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://insightthreatintelligence.thinkific.com/bundles/tf-analysis" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!f7rH!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 424w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 848w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 1272w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!f7rH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png" width="1066" height="507" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:507,&quot;width&quot;:1066,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:698946,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://insightthreatintelligence.thinkific.com/bundles/tf-analysis&quot;,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!f7rH!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 424w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 848w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 1272w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><p>Our terrorist financing analysis course caters to researchers, intelligence, law enforcement, and compliance professionals to help them learn about terrorist financing and analyze suspicious patterns and activities more effectively. Sign up today!</p><div><hr></div><h3></h3>
      <p>
          <a href="https://newsletter.insightthreatintel.com/p/global-terrorism-financing-report-2e2">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Following the Money]]></title><description><![CDATA[Recap of Insight Monitor for March 2026]]></description><link>https://newsletter.insightthreatintel.com/p/following-the-money-b56</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/following-the-money-b56</guid><dc:creator><![CDATA[Lisa Niemzyk]]></dc:creator><pubDate>Tue, 07 Apr 2026 13:03:24 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!wRJl!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe73de2cb-ab0b-45e9-8e44-130382136f84_1024x1024.heic" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Hello, <strong>Insight Monitor</strong> subscribers! </em></p><p><em>While the world of terrorist financing and emerging threats kept moving fast this month, we had a bit of a quieter month here taking some time to wrap up some fiscal year-end projects. We will be back in full force next month. Be sure to subscribe so you don&#8217;t miss out!</em></p><p>Before we dive in&#8230;</p><p>CASIS recently announced its 2026 essay contest. You can get all the details <a href="https://www.casis-acers.ca/essay-prize#papers">here</a>.</p><p>The <em>Secure Line</em> podcast, was back this month with two new episodes. Highlights include discussion on <a href="https://www.youtube.com/watch?v=U1p_PzlDdWk">recent policy and intelligence developments</a>, and why <a href="https://www.youtube.com/watch?v=htxwCL2r51A">protecting research and innovation</a> has become a core national security priority. Catch up on the latest episodes <a href="https://www.youtube.com/@SecureLineCASIS">here</a>.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Insight Monitor is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!wRJl!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe73de2cb-ab0b-45e9-8e44-130382136f84_1024x1024.heic" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!wRJl!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe73de2cb-ab0b-45e9-8e44-130382136f84_1024x1024.heic 424w, https://substackcdn.com/image/fetch/$s_!wRJl!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe73de2cb-ab0b-45e9-8e44-130382136f84_1024x1024.heic 848w, https://substackcdn.com/image/fetch/$s_!wRJl!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe73de2cb-ab0b-45e9-8e44-130382136f84_1024x1024.heic 1272w, https://substackcdn.com/image/fetch/$s_!wRJl!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe73de2cb-ab0b-45e9-8e44-130382136f84_1024x1024.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!wRJl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe73de2cb-ab0b-45e9-8e44-130382136f84_1024x1024.heic" width="514" height="514" data-attrs="{&quot;src&quot;:&quot;https://substackcdn.com/image/fetch/$s_!wRJl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe73de2cb-ab0b-45e9-8e44-130382136f84_1024x1024.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:514,&quot;width&quot;:514,&quot;resizeWidth&quot;:514,&quot;bytes&quot;:195723,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!wRJl!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe73de2cb-ab0b-45e9-8e44-130382136f84_1024x1024.heic 424w, https://substackcdn.com/image/fetch/$s_!wRJl!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe73de2cb-ab0b-45e9-8e44-130382136f84_1024x1024.heic 848w, https://substackcdn.com/image/fetch/$s_!wRJl!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe73de2cb-ab0b-45e9-8e44-130382136f84_1024x1024.heic 1272w, https://substackcdn.com/image/fetch/$s_!wRJl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe73de2cb-ab0b-45e9-8e44-130382136f84_1024x1024.heic 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>As always, we published our latest <strong>Global Terrorist Financing Report,</strong> highlighting major developments from the past month.</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;3de2b87d-e028-419c-aecb-733e58eaa50c&quot;,&quot;caption&quot;:&quot;Hello, Insight Monitor subscribers, welcome back to another global terrorist financing roundup.&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Global Terrorism Financing Report &quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:313776655,&quot;name&quot;:&quot;Emelia Connolly&quot;,&quot;bio&quot;:null,&quot;photo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!9E-n!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9783d60b-0c55-4a2b-9ccd-a05d4ca26b39_828x828.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2026-03-10T13:01:53.015Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!zo7V!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F862ba6df-7d32-4be6-ba43-e0aec2a8f6f7_1429x804.jpeg&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/global-terrorism-financing-report-85f&quot;,&quot;section_name&quot;:&quot;News&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:190465232,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:6,&quot;comment_count&quot;:0,&quot;publication_id&quot;:329102,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!I_1w!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4649d7af-94ce-49ea-8c58-368ec26cd423_900x900.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div><hr></div><h4><strong>Terrorist Financing Analysis</strong></h4><p>Become an expert on how terrorist groups move, store, and exploit funds. This bundle gives you access to the terrorist financing analysis course, plus a customizable analytic tool, relevant case studies, and other practical resources you need to detect, analyze, and disrupt illicit financing networks.</p><p>Join our community, tackle real-world exercises, and gain skills you won&#8217;t find anywhere else. <a href="https://insightthreatintelligence.thinkific.com/courses/terroristfinancing">Enroll now</a> and take your expertise to the next level!</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!QECs!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe38e54bb-4e7f-40b6-8429-46f7ee2c7562_629x318.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!QECs!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe38e54bb-4e7f-40b6-8429-46f7ee2c7562_629x318.jpeg 424w, https://substackcdn.com/image/fetch/$s_!QECs!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe38e54bb-4e7f-40b6-8429-46f7ee2c7562_629x318.jpeg 848w, https://substackcdn.com/image/fetch/$s_!QECs!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe38e54bb-4e7f-40b6-8429-46f7ee2c7562_629x318.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!QECs!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe38e54bb-4e7f-40b6-8429-46f7ee2c7562_629x318.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!QECs!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe38e54bb-4e7f-40b6-8429-46f7ee2c7562_629x318.jpeg" width="629" height="318" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e38e54bb-4e7f-40b6-8429-46f7ee2c7562_629x318.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:318,&quot;width&quot;:629,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!QECs!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe38e54bb-4e7f-40b6-8429-46f7ee2c7562_629x318.jpeg 424w, https://substackcdn.com/image/fetch/$s_!QECs!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe38e54bb-4e7f-40b6-8429-46f7ee2c7562_629x318.jpeg 848w, https://substackcdn.com/image/fetch/$s_!QECs!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe38e54bb-4e7f-40b6-8429-46f7ee2c7562_629x318.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!QECs!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe38e54bb-4e7f-40b6-8429-46f7ee2c7562_629x318.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h3>Articles </h3><p>This month we did a deep dive into terrorist financial tradecraft, highlighting new data on how attacks are funded and the methods groups use to move and obscure money. We also released a commentary on Canadian terrorism trends, examining riding changes, shifting motivations, and the growing involvement of youth.</p><p>Stay informed with our latest analyses &#8212; explore our newest articles below:</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;81b70ce4-6149-4be3-9212-52fdc9189041&quot;,&quot;caption&quot;:&quot;Hello Insight Monitor subscribers, and welcome to another edition of our series on trends in terrorist financing, using a unique longitudinal dataset. This series goes beyond headline cases and anecdotes, offering data-driven insights and analysis you won&#8217;t find anywhere else. In this issue, I focus on how terrorists obscure the sources, destinations, and uses of funds&#8212;and what this reveals about terrorist financial adaptation.&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Obscuring the Money Behind the Bombs: New Data on Terrorist Financial Tradecraft&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:33479672,&quot;name&quot;:&quot;Jessica Davis, PhD&quot;,&quot;bio&quot;:&quot;Jessica Davis is President of Insight Threat Intelligence and is the author of Women in Modern Terrorism: From Liberations Wars to Global Terrorism and the Islamic State (2017), and Illicit Money: Financing Terrorism in the 21st Century (2021).&quot;,&quot;photo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!ICh7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe312ae7c-114b-4e4f-9ce1-8bf50ddb7a27_2344x2049.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2026-03-03T14:03:28.362Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!t2RV!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21118c2c-ea5a-46c8-9fbd-40ae731b5546_1047x596.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/obscuring-the-money-behind-the-bombs&quot;,&quot;section_name&quot;:&quot;Financiers&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:153040222,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:3,&quot;comment_count&quot;:0,&quot;publication_id&quot;:329102,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!I_1w!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4649d7af-94ce-49ea-8c58-368ec26cd423_900x900.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;9477701f-5b59-435d-8b47-436363afd6a3&quot;,&quot;caption&quot;:&quot;Hello, Insight Monitor subscribers! Terrorism charges are up. Motivations are shifting. And the official threat level? Still stuck at medium. Canada&#8217;s terrorism landscape is changing in ways that aren&#8217;t always reflected in public threat assessments. From QAnon-inspired attacks to the quiet rise of ideologically motivated extremism, the picture is more complex than a single label suggests. And it&#8217;s only getting more complex with the war in Iran and the mobilization of Iran&#8217;s proxies, supporters, and surrogates. This week, I&#8217;m digging into the numbers, the trends, and the questions. Have a read to learn more about terrorism in Canada:&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;New Patterns in Canadian Terrorism: Charges Are Up, Motivations Are Shifting&#8212;and More Youth Are Involved&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:33479672,&quot;name&quot;:&quot;Jessica Davis, PhD&quot;,&quot;bio&quot;:&quot;Jessica Davis is President of Insight Threat Intelligence and is the author of Women in Modern Terrorism: From Liberations Wars to Global Terrorism and the Islamic State (2017), and Illicit Money: Financing Terrorism in the 21st Century (2021).&quot;,&quot;photo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!ICh7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe312ae7c-114b-4e4f-9ce1-8bf50ddb7a27_2344x2049.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2026-03-17T13:35:01.412Z&quot;,&quot;cover_image&quot;:&quot;https://images.unsplash.com/photo-1626366555540-0800ffb42452?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw4fHxjYW5hZGlhbiUyMHNlY3VyaXR5JTIwaW50ZWxsaWdlbmNlJTIwc2VydmljZXxlbnwwfHx8fDE3Njk3MjE2NTZ8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/new-patterns-in-canadian-terrorism&quot;,&quot;section_name&quot;:&quot;Attack profiles&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:186236498,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:3,&quot;comment_count&quot;:0,&quot;publication_id&quot;:329102,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!I_1w!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4649d7af-94ce-49ea-8c58-368ec26cd423_900x900.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/p/following-the-money-b56?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/p/following-the-money-b56?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p><br>That&#8217;s a wrap for March! See you next month with more analysis and updates. Be sure to subscribe so you don&#8217;t miss out! This is news and analysis you won&#8217;t find anywhere else. </p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/subscribe?"><span>Subscribe now</span></a></p><p><em>&#169; 2026 Insight Threat Intelligence Ltd. All Rights Reserved.<br><br>This newsletter and its contents are protected by Canadian copyright law. Except as otherwise provided for under Canadian copyright law, this newsletter and its contents may not be copied, published, distributed, downloaded or otherwise stored in a retrieval system, transmitted or converted, in any form or by any means, electronic or otherwise, without the prior written permission of the copyright owner.</em></p>]]></content:encoded></item><item><title><![CDATA[Five Years of Following the Money 💸]]></title><description><![CDATA[Celebrating 5 years of newsletter writing]]></description><link>https://newsletter.insightthreatintel.com/p/five-years-of-following-the-money</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/five-years-of-following-the-money</guid><dc:creator><![CDATA[Jessica Davis, PhD]]></dc:creator><pubDate>Wed, 01 Apr 2026 13:03:33 GMT</pubDate><enclosure url="https://images.unsplash.com/photo-1622758383952-87faa4a55044?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzMXx8d29vZCUyMHBlbnxlbnwwfHx8fDE3NzQ3MTc0MTl8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Hello, Insight Monitor subscribers! This month marks the five-year anniversary of my newsletter here on Substack. Join me for a little reflection, and stay until the end for a nice surprise&#8230;.</em></p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://images.unsplash.com/photo-1622758383952-87faa4a55044?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzMXx8d29vZCUyMHBlbnxlbnwwfHx8fDE3NzQ3MTc0MTl8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://images.unsplash.com/photo-1622758383952-87faa4a55044?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzMXx8d29vZCUyMHBlbnxlbnwwfHx8fDE3NzQ3MTc0MTl8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1622758383952-87faa4a55044?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzMXx8d29vZCUyMHBlbnxlbnwwfHx8fDE3NzQ3MTc0MTl8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1622758383952-87faa4a55044?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzMXx8d29vZCUyMHBlbnxlbnwwfHx8fDE3NzQ3MTc0MTl8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1622758383952-87faa4a55044?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzMXx8d29vZCUyMHBlbnxlbnwwfHx8fDE3NzQ3MTc0MTl8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1456w" sizes="100vw"><img src="https://images.unsplash.com/photo-1622758383952-87faa4a55044?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzMXx8d29vZCUyMHBlbnxlbnwwfHx8fDE3NzQ3MTc0MTl8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" width="360" height="202.5" data-attrs="{&quot;src&quot;:&quot;https://images.unsplash.com/photo-1622758383952-87faa4a55044?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzMXx8d29vZCUyMHBlbnxlbnwwfHx8fDE3NzQ3MTc0MTl8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:2268,&quot;width&quot;:4032,&quot;resizeWidth&quot;:360,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;white and brown wooden pencil&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="white and brown wooden pencil" title="white and brown wooden pencil" srcset="https://images.unsplash.com/photo-1622758383952-87faa4a55044?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzMXx8d29vZCUyMHBlbnxlbnwwfHx8fDE3NzQ3MTc0MTl8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1622758383952-87faa4a55044?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzMXx8d29vZCUyMHBlbnxlbnwwfHx8fDE3NzQ3MTc0MTl8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1622758383952-87faa4a55044?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzMXx8d29vZCUyMHBlbnxlbnwwfHx8fDE3NzQ3MTc0MTl8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1622758383952-87faa4a55044?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzMXx8d29vZCUyMHBlbnxlbnwwfHx8fDE3NzQ3MTc0MTl8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/@artnok">Nicolas Picard</a> on <a href="https://unsplash.com">Unsplash</a></figcaption></figure></div><p>It&#8217;s been quite the journey. What started with a few hardcore illicit finance nerds has grown to a community of over 8,000, with new subscribers every day. I&#8217;m always excited when someone else agrees to receive the newsletter or follows me on this platform, because I think we&#8217;re collectively one step closer to illicit finance being taken more seriously. And as regular readers of this newsletter know, countering the illicit finance threat is something I take very seriously.</p><p>This newsletter started as something I wanted to do to capture my thinking on illicit finance and security, share insights through something more enduring than the odd thread on Twitter (I refuse to use the new name because I think it&#8217;s dumb), and promote the courses and other activities that I do as part of Insight Threat Intelligence. It&#8217;s grown well beyond that and has actually become a revenue line for the business; it&#8217;s also become a source of some expenses, because I usually have at least one researcher working on the Global Terrorist Financing Report (our monthly roundup of terrorist financing news), as well as research for other newsletters. </p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Insight Monitor is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>When I first started out, I migrated old content from a blog I was running to help populate the back catalogue &#8211; a lot of that is still available on the site if you go way, way back. As with most Substackers, I started publishing free articles, but quickly added a paywall because, frankly, those news roundups are an annoying amount of work. Artificial intelligence has helped a bit, but we still need to check every story, verify details, and make sure it&#8217;s accurately represented, and I have yet to find an AI tool that does that to my satisfaction. All that to say: this newsletter remains labour-intensive, and I&#8217;m happy about that. The writing is the work.</p><p>Somewhere along the way, I started trying to write twice per week. That turned out to be too much &#8212; for both my readers and me. So now we focus on one article per week, and sometimes add a second if things are particularly newsy. I&#8217;m increasingly trying to take things slowly: reading, writing, and publishing with intention. In our information ecosystem, I think we can all use a bit of a break, and a focus on more signal, less noise. </p><p>Growth on this platform hasn&#8217;t been exponential for me. I feel like I&#8217;ve earned every one of my followers or subscribers; while Substack touts a network effect, I have yet to really experience it, and I haven&#8217;t had any posts go truly viral as I have elsewhere. But there&#8217;s something more organic and sustainable about this &#8211; I feel like every person is here because they want to be, not because they feel like they should be, or because the algorithm told them to be.</p><p>I think one of the things that I like the most about writing a regular newsletter is that it keeps the writing muscles sharp, even during long periods where I&#8217;m mostly researching, travelling, or giving talks, like right now, when over the period of three months I&#8217;m scheduled to be in three different countries and eight cities, some twice. It forces me to write, for better or for worse. Yes, this is pressure, but I also give myself grace, and if I really need to miss some weeks, that&#8217;s okay.</p><p>In recent years, I&#8217;ve experimented with publishing series. I&#8217;m not sure that these really work, but I like them because they give me a way to break up longer pieces of analysis and share them with readers, without overwhelming people with details, links, or forty-page documents. Feel free to let me know what you think about these series in the comments, by email, or however we communicate.</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;1d6a928a-6bc4-496b-ac31-ae243a95fcb0&quot;,&quot;caption&quot;:&quot;In part 1 of this series, we examined how Iran has increasingly turned to cryptocurrency as a core tool in its sanctions-evasion toolkit, using digital assets to bypass conventional financial controls and support its broader regional network of allied armed groups, including Hezbollah, Hamas, and Ansarallah (the Houthis).&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;From Tehran to Sana&#8217;a: Cryptocurrency and Sanctions Evasion in the Axis of Illicit Finance&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:33479672,&quot;name&quot;:&quot;Jessica Davis, PhD&quot;,&quot;bio&quot;:&quot;Jessica Davis is President of Insight Threat Intelligence and is the author of Women in Modern Terrorism: From Liberations Wars to Global Terrorism and the Islamic State (2017), and Illicit Money: Financing Terrorism in the 21st Century (2021).&quot;,&quot;photo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!ICh7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe312ae7c-114b-4e4f-9ce1-8bf50ddb7a27_2344x2049.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2026-02-24T14:02:37.624Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!0BCO!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ec115eb-33b1-4e33-8147-a3b6ffc1f04e_626x682.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/from-tehran-to-sanaa-cryptocurrency&quot;,&quot;section_name&quot;:&quot;Group Profiles &quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:186790350,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:3,&quot;comment_count&quot;:0,&quot;publication_id&quot;:329102,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!I_1w!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4649d7af-94ce-49ea-8c58-368ec26cd423_900x900.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>This platform itself isn&#8217;t without flaws. There are <a href="https://newsletter.insightthreatintel.com/p/nazis-on-substack?utm_source=publication-search">way too many Nazis</a> on the platform, although I&#8217;d argue this is true of most social platforms these days. Substack also takes a pretty big cut of my profits, particularly compared to other platforms. Finally, Substack has started a Polymarket integration, which I think is criminal. (Note: it is not technically criminal now, but I&#8217;m willing to bet (haha) that it will become criminal within ten years when we see the full effects of the gaming and gambling epidemic. Maybe sooner, although policy change takes time.) This is all driven, of course, by Substack&#8217;s need to become profitable. It has no <a href="https://open.substack.com/pub/speterdavis/p/substack-is-at-the-gambling-stage?utm_campaign=post-expanded-share&amp;utm_medium=post%20viewer">alternative viable path to profitability</a>. Which, in my view, raises questions about the platform&#8217;s long-term viability.</p><p>To that end, I&#8217;ve migrated my content to a blog hosted on my website, which you can access at <a href="http://www.insightthreatintel.com/">www.insightthreatintel.com</a>. It has both a free and a paid section, and one of my wonderful team members maintains it, keeping it up to date with the latest news and analysis, pretty much at the same time as we release articles on Substack. This also gives some readers the chance to subscribe without supporting the Substack platform, which is an absolutely valid choice.</p><p>That&#8217;s not to say I&#8217;ll be disappearing from here anytime soon, but it is to say that I&#8217;m making plans (and maintaining newsletter lists!) so that if Substack disappears, I can still keep doing this work. Because that&#8217;s what matters, not the way it lands in your inbox.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/p/five-years-of-following-the-money?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/p/five-years-of-following-the-money?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p></p><p>That&#8217;s enough reflection for one day. On to the good stuff. To celebrate my five years on this platform, I&#8217;m offering a huge discount for new subscribers: 50% off an annual membership. This is a rare sale (we almost never have them), and this is by far the largest discount I&#8217;ve ever given. It&#8217;ll be available for the full month of April, so if you want to take advantage, be sure to lock it in before the end of the month. And you know the drill: like, share, and subscribe to help us grow our community!</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/5year&quot;,&quot;text&quot;:&quot;50% OFF!&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/5year"><span>50% OFF!</span></a></p><p></p><div><hr></div><p><em>&#169; 2026 Insight Threat Intelligence Ltd. All Rights Reserved.<br><br>This newsletter and its contents are protected by Canadian copyright law. Except as otherwise provided for under Canadian copyright law, this newsletter and its contents may not be copied, published, distributed, downloaded or otherwise stored in a retrieval system, transmitted or converted, in any form or by any means, electronic or otherwise, without the prior written permission of the copyright owner.</em></p>]]></content:encoded></item><item><title><![CDATA[Illicit Money is out in Paperback! ]]></title><description><![CDATA[Hello, Insight Monitor subscribers!]]></description><link>https://newsletter.insightthreatintel.com/p/illicit-money-is-out-in-paperback</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/illicit-money-is-out-in-paperback</guid><dc:creator><![CDATA[Jessica Davis, PhD]]></dc:creator><pubDate>Mon, 30 Mar 2026 07:03:54 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!aSMC!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F678765bc-de7d-4af1-8b44-7b9c3d46030d_1494x856.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Hello, Insight Monitor subscribers! I wanted to flag that my second book, <strong>Illicit Money: Financing Terrorism in the 21st Century</strong>, is now out in paperback format. You can purchase it through the publisher <a href="https://www.rienner.com/title/Illicit_Money_Financing_Terrorism_in_the_Twenty_First_Century">here</a>.</em></p><p>We&#8217;ll be back with regular newsletters in April &#8212; we&#8217;re on a short hiatus as I wrap up some significant fiscal year-end projects, deliver some technical assistance, and generally just try to get caught up on life. </p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Insight Monitor is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://www.rienner.com/title/Illicit_Money_Financing_Terrorism_in_the_Twenty_First_Century" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!aSMC!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F678765bc-de7d-4af1-8b44-7b9c3d46030d_1494x856.png 424w, https://substackcdn.com/image/fetch/$s_!aSMC!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F678765bc-de7d-4af1-8b44-7b9c3d46030d_1494x856.png 848w, https://substackcdn.com/image/fetch/$s_!aSMC!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F678765bc-de7d-4af1-8b44-7b9c3d46030d_1494x856.png 1272w, https://substackcdn.com/image/fetch/$s_!aSMC!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F678765bc-de7d-4af1-8b44-7b9c3d46030d_1494x856.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!aSMC!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F678765bc-de7d-4af1-8b44-7b9c3d46030d_1494x856.png" width="1456" height="834" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/678765bc-de7d-4af1-8b44-7b9c3d46030d_1494x856.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:834,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1398214,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://www.rienner.com/title/Illicit_Money_Financing_Terrorism_in_the_Twenty_First_Century&quot;,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://newsletter.insightthreatintel.com/i/191894215?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F678765bc-de7d-4af1-8b44-7b9c3d46030d_1494x856.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!aSMC!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F678765bc-de7d-4af1-8b44-7b9c3d46030d_1494x856.png 424w, https://substackcdn.com/image/fetch/$s_!aSMC!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F678765bc-de7d-4af1-8b44-7b9c3d46030d_1494x856.png 848w, https://substackcdn.com/image/fetch/$s_!aSMC!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F678765bc-de7d-4af1-8b44-7b9c3d46030d_1494x856.png 1272w, https://substackcdn.com/image/fetch/$s_!aSMC!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F678765bc-de7d-4af1-8b44-7b9c3d46030d_1494x856.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>If you want something a little bit more hands-on, we also have a course based on the book, which you can access here: </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://insightthreatintelligence.thinkific.com/bundles/tf-analysis" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!f7rH!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 424w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 848w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 1272w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!f7rH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png" width="1066" height="507" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:507,&quot;width&quot;:1066,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:698946,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://insightthreatintelligence.thinkific.com/bundles/tf-analysis&quot;,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!f7rH!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 424w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 848w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 1272w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><p><em>Our terrorist financing analysis course caters to researchers, intelligence, law enforcement, and compliance professionals to help them learn about terrorist financing, and analyze suspicious patterns and activities more effectively. Sign up today!</em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/p/illicit-money-is-out-in-paperback?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/p/illicit-money-is-out-in-paperback?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p></p><p><em>&#169; 2026 Insight Threat Intelligence Ltd. All Rights Reserved.<br><br>This newsletter and its contents are protected by Canadian copyright law. Except as otherwise provided for under Canadian copyright law, this newsletter and its contents may not be copied, published, distributed, downloaded or otherwise stored in a retrieval system, transmitted or converted, in any form or by any means, electronic or otherwise, without the prior written permission of the copyright owner.</em></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Insight Monitor is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Announcing the 2026 CASIS Essay Contest]]></title><description><![CDATA[Call for Papers: 2026 CASIS Essay Contest]]></description><link>https://newsletter.insightthreatintel.com/p/announcing-the-2026-casis-essay-contest</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/announcing-the-2026-casis-essay-contest</guid><pubDate>Mon, 23 Mar 2026 13:03:30 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!gv-B!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc56bbdd2-48dc-4e46-a5ea-62c79c6fe6a7_2592x1256.heic" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h3>Call for Papers: 2026 CASIS Essay Contest</h3><p>CASIS is pleased to announce the 2026 essay contest. Essays must address some dimension of intelligence, security, or law enforcement issues in any time period and in any country. Submissions can be from any Humanities or Social Sciences discipline, inter-disciplinary programmes, or law school. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://www.casis-acers.ca/essay-prize#papers" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!gv-B!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc56bbdd2-48dc-4e46-a5ea-62c79c6fe6a7_2592x1256.heic 424w, https://substackcdn.com/image/fetch/$s_!gv-B!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc56bbdd2-48dc-4e46-a5ea-62c79c6fe6a7_2592x1256.heic 848w, https://substackcdn.com/image/fetch/$s_!gv-B!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc56bbdd2-48dc-4e46-a5ea-62c79c6fe6a7_2592x1256.heic 1272w, https://substackcdn.com/image/fetch/$s_!gv-B!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc56bbdd2-48dc-4e46-a5ea-62c79c6fe6a7_2592x1256.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!gv-B!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc56bbdd2-48dc-4e46-a5ea-62c79c6fe6a7_2592x1256.heic" width="1456" height="706" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c56bbdd2-48dc-4e46-a5ea-62c79c6fe6a7_2592x1256.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:706,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:234742,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:&quot;https://www.casis-acers.ca/essay-prize#papers&quot;,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://newsletter.insightthreatintel.com/i/191773885?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc56bbdd2-48dc-4e46-a5ea-62c79c6fe6a7_2592x1256.heic&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!gv-B!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc56bbdd2-48dc-4e46-a5ea-62c79c6fe6a7_2592x1256.heic 424w, https://substackcdn.com/image/fetch/$s_!gv-B!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc56bbdd2-48dc-4e46-a5ea-62c79c6fe6a7_2592x1256.heic 848w, https://substackcdn.com/image/fetch/$s_!gv-B!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc56bbdd2-48dc-4e46-a5ea-62c79c6fe6a7_2592x1256.heic 1272w, https://substackcdn.com/image/fetch/$s_!gv-B!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc56bbdd2-48dc-4e46-a5ea-62c79c6fe6a7_2592x1256.heic 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Insight Monitor is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>For a full description of eligibility and requirements, see the official call for papers <a href="https://www.casis-acers.ca/essay-prize#papers">here.</a> </p><p>The winners of the essay contest will receive cash prizes ($2500 for the graduate winner and $1000 for the undergraduate winner), and will also be invited to present their papers at the annual CASIS Symposium in Ottawa. </p><p>Please share with friends and colleagues! </p><p><em>&#169; 2026 Insight Threat Intelligence Ltd. All Rights Reserved.<br><br>This newsletter and its contents are protected by Canadian copyright law. Except as otherwise provided for under Canadian copyright law, this newsletter and its contents may not be copied, published, distributed, downloaded or otherwise stored in a retrieval system, transmitted or converted, in any form or by any means, electronic or otherwise, without the prior written permission of the copyright owner.</em></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Insight Monitor is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[New Patterns in Canadian Terrorism: Charges Are Up, Motivations Are Shifting—and More Youth Are Involved]]></title><description><![CDATA[Hello, Insight Monitor subscribers!]]></description><link>https://newsletter.insightthreatintel.com/p/new-patterns-in-canadian-terrorism</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/new-patterns-in-canadian-terrorism</guid><dc:creator><![CDATA[Jessica Davis, PhD]]></dc:creator><pubDate>Tue, 17 Mar 2026 13:35:01 GMT</pubDate><enclosure url="https://images.unsplash.com/photo-1626366555540-0800ffb42452?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw4fHxjYW5hZGlhbiUyMHNlY3VyaXR5JTIwaW50ZWxsaWdlbmNlJTIwc2VydmljZXxlbnwwfHx8fDE3Njk3MjE2NTZ8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Hello, Insight Monitor subscribers! Terrorism charges are up. Motivations are shifting. And the official threat level? Still stuck at medium. Canada&#8217;s terrorism landscape is changing in ways that aren&#8217;t always reflected in public threat assessments. From QAnon-inspired attacks to the quiet rise of ideologically motivated extremism, the picture is more complex than a single label suggests. And it&#8217;s only getting more complex with the war in Iran and the mobilization of Iran&#8217;s proxies, supporters, and surrogates. This week, I&#8217;m digging into the numbers, the trends, and the questions. Have a read to learn more about terrorism in Canada:</em> </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://images.unsplash.com/photo-1626366555540-0800ffb42452?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw4fHxjYW5hZGlhbiUyMHNlY3VyaXR5JTIwaW50ZWxsaWdlbmNlJTIwc2VydmljZXxlbnwwfHx8fDE3Njk3MjE2NTZ8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://images.unsplash.com/photo-1626366555540-0800ffb42452?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw4fHxjYW5hZGlhbiUyMHNlY3VyaXR5JTIwaW50ZWxsaWdlbmNlJTIwc2VydmljZXxlbnwwfHx8fDE3Njk3MjE2NTZ8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1626366555540-0800ffb42452?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw4fHxjYW5hZGlhbiUyMHNlY3VyaXR5JTIwaW50ZWxsaWdlbmNlJTIwc2VydmljZXxlbnwwfHx8fDE3Njk3MjE2NTZ8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1626366555540-0800ffb42452?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw4fHxjYW5hZGlhbiUyMHNlY3VyaXR5JTIwaW50ZWxsaWdlbmNlJTIwc2VydmljZXxlbnwwfHx8fDE3Njk3MjE2NTZ8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1626366555540-0800ffb42452?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw4fHxjYW5hZGlhbiUyMHNlY3VyaXR5JTIwaW50ZWxsaWdlbmNlJTIwc2VydmljZXxlbnwwfHx8fDE3Njk3MjE2NTZ8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1456w" sizes="100vw"><img src="https://images.unsplash.com/photo-1626366555540-0800ffb42452?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw4fHxjYW5hZGlhbiUyMHNlY3VyaXR5JTIwaW50ZWxsaWdlbmNlJTIwc2VydmljZXxlbnwwfHx8fDE3Njk3MjE2NTZ8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" width="176" height="263.867269984917" data-attrs="{&quot;src&quot;:&quot;https://images.unsplash.com/photo-1626366555540-0800ffb42452?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw4fHxjYW5hZGlhbiUyMHNlY3VyaXR5JTIwaW50ZWxsaWdlbmNlJTIwc2VydmljZXxlbnwwfHx8fDE3Njk3MjE2NTZ8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:7952,&quot;width&quot;:5304,&quot;resizeWidth&quot;:176,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;flag of us a on pole&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="flag of us a on pole" title="flag of us a on pole" srcset="https://images.unsplash.com/photo-1626366555540-0800ffb42452?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw4fHxjYW5hZGlhbiUyMHNlY3VyaXR5JTIwaW50ZWxsaWdlbmNlJTIwc2VydmljZXxlbnwwfHx8fDE3Njk3MjE2NTZ8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1626366555540-0800ffb42452?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw4fHxjYW5hZGlhbiUyMHNlY3VyaXR5JTIwaW50ZWxsaWdlbmNlJTIwc2VydmljZXxlbnwwfHx8fDE3Njk3MjE2NTZ8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1626366555540-0800ffb42452?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw4fHxjYW5hZGlhbiUyMHNlY3VyaXR5JTIwaW50ZWxsaWdlbmNlJTIwc2VydmljZXxlbnwwfHx8fDE3Njk3MjE2NTZ8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1626366555540-0800ffb42452?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw4fHxjYW5hZGlhbiUyMHNlY3VyaXR5JTIwaW50ZWxsaWdlbmNlJTIwc2VydmljZXxlbnwwfHx8fDE3Njk3MjE2NTZ8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/@hermez777">Hermes Rivera</a> on <a href="https://unsplash.com">Unsplash</a></figcaption></figure></div><p>Last year, I reviewed terrorism metrics in Canada and found some surprising trends, namely that we have more terrorism incidents in Canada than ever before. This includes terrorism peace bonds, charges, and attacks, and the numbers have been climbing. Peace bonds are being used more often as a preventative tool, though there&#8217;s debate about how effective they really are.</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;fe2374b0-c578-44cb-bb3a-f72aad0ae670&quot;,&quot;caption&quot;:&quot;The terrorist attack in New Orleans this year has reignited the discussion about terrorism in the US, and, by extension, Canada. Some media outlets have talked about the return of ISIL (they never went away), while some experts have talked about the&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Terror on the Rise: What the increase in terrorism charges in Canada can tell us about the threat&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:33479672,&quot;name&quot;:&quot;Jessica Davis, PhD&quot;,&quot;bio&quot;:&quot;Jessica Davis is President of Insight Threat Intelligence and is the author of Women in Modern Terrorism: From Liberations Wars to Global Terrorism and the Islamic State (2017), and Illicit Money: Financing Terrorism in the 21st Century (2021).&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e312ae7c-114b-4e4f-9ce1-8bf50ddb7a27_2344x2049.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100},{&quot;id&quot;:2410581,&quot;name&quot;:&quot;Brett Williams&quot;,&quot;bio&quot;:&quot;Librarian. Skeptic. Geek.&quot;,&quot;photo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1102bdc4-37a8-49b2-a1b6-69f7d3df8ba6_2946x2104.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2025-01-08T13:27:55.415Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fceb5244d-2b96-443e-9b83-0bb1917cece6_1024x768.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/terror-on-the-rise-what-the-increase&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:154292004,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:9,&quot;comment_count&quot;:0,&quot;publication_id&quot;:329102,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!I_1w!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4649d7af-94ce-49ea-8c58-368ec26cd423_900x900.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>Historically, most charges have targeted religiously motivated actors&#8212;those inspired by groups like ISIL or al-Qaeda. But in recent years, there&#8217;s been a noticeable shift: more and more cases involve ideologically motivated individuals. What&#8217;s interesting is that while religiously motivated actors are charged more often, most actual attacks in Canada have been carried out by ideologically motivated ones. That suggests authorities may be better equipped to detect and stop religiously motivated plots, possibly because of long-standing international intelligence partnerships and entrenched ideas of what counts as &#8220;terrorism.&#8221;</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Insight Monitor is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>That article generated a lot of interest and some controversy. Stewart Bell covered it in his <a href="https://globalnews.ca/news/10967280/csis-keeps-terror-threat-level-medium/">Global News article on terrorism in Canada</a>. The Integrated Threat Assessment Center also had some thoughts on the data and analysis, which they declined to share with me directly, but that I got to read all about in an access to information request. It was actually sweet how much time they spent on this little blog.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a> Keep reading to learn what it all  means for measuring terrorist activity in Canada: </p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/p/new-patterns-in-canadian-terrorism?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/p/new-patterns-in-canadian-terrorism?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p>
      <p>
          <a href="https://newsletter.insightthreatintel.com/p/new-patterns-in-canadian-terrorism">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Global Terrorism Financing Report ]]></title><description><![CDATA[February 2026]]></description><link>https://newsletter.insightthreatintel.com/p/global-terrorism-financing-report-85f</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/global-terrorism-financing-report-85f</guid><dc:creator><![CDATA[Emelia Connolly]]></dc:creator><pubDate>Tue, 10 Mar 2026 13:01:53 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!zo7V!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F862ba6df-7d32-4be6-ba43-e0aec2a8f6f7_1429x804.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Hello, Insight Monitor subscribers, welcome back to another global terrorist financing roundup.  </em></p><p><em>In February 2026, news of terrorism financing struck almost every region of the world. From North America and Western Europe to the Middle East and Africa! We cover illicit financing through NGOs, terrorist organizations&#8217; gold reserves, and money-filled briefcases headed to Hizballah. So, have a read, share with a colleague, and don&#8217;t miss out on our long-read recommendations!</em></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Insight Monitor is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!zo7V!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F862ba6df-7d32-4be6-ba43-e0aec2a8f6f7_1429x804.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!zo7V!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F862ba6df-7d32-4be6-ba43-e0aec2a8f6f7_1429x804.jpeg 424w, https://substackcdn.com/image/fetch/$s_!zo7V!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F862ba6df-7d32-4be6-ba43-e0aec2a8f6f7_1429x804.jpeg 848w, https://substackcdn.com/image/fetch/$s_!zo7V!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F862ba6df-7d32-4be6-ba43-e0aec2a8f6f7_1429x804.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!zo7V!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F862ba6df-7d32-4be6-ba43-e0aec2a8f6f7_1429x804.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!zo7V!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F862ba6df-7d32-4be6-ba43-e0aec2a8f6f7_1429x804.jpeg" width="1429" height="804" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/862ba6df-7d32-4be6-ba43-e0aec2a8f6f7_1429x804.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:804,&quot;width&quot;:1429,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;A map of the world\n\nAI-generated content may be incorrect.&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="A map of the world

AI-generated content may be incorrect." title="A map of the world

AI-generated content may be incorrect." srcset="https://substackcdn.com/image/fetch/$s_!zo7V!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F862ba6df-7d32-4be6-ba43-e0aec2a8f6f7_1429x804.jpeg 424w, https://substackcdn.com/image/fetch/$s_!zo7V!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F862ba6df-7d32-4be6-ba43-e0aec2a8f6f7_1429x804.jpeg 848w, https://substackcdn.com/image/fetch/$s_!zo7V!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F862ba6df-7d32-4be6-ba43-e0aec2a8f6f7_1429x804.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!zo7V!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F862ba6df-7d32-4be6-ba43-e0aec2a8f6f7_1429x804.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h4><strong>Financial Intelligence Fundamentals</strong></h4><p><em>Do you want to learn more about financial intelligence and how to use it in research, investigations, and analysis? Our financial intelligence fundamentals course is for you! This course is perfect for people new to financial intelligence and seasoned professionals. <a href="https://insightthreatintelligence.thinkific.com/courses/introFININT">Enroll today</a></em></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://insightthreatintelligence.thinkific.com/courses/introFININT" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!8tvZ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png 424w, https://substackcdn.com/image/fetch/$s_!8tvZ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png 848w, https://substackcdn.com/image/fetch/$s_!8tvZ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png 1272w, https://substackcdn.com/image/fetch/$s_!8tvZ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!8tvZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png" width="905" height="496" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:496,&quot;width&quot;:905,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:731766,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://insightthreatintelligence.thinkific.com/courses/introFININT&quot;,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!8tvZ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png 424w, https://substackcdn.com/image/fetch/$s_!8tvZ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png 848w, https://substackcdn.com/image/fetch/$s_!8tvZ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png 1272w, https://substackcdn.com/image/fetch/$s_!8tvZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div>
      <p>
          <a href="https://newsletter.insightthreatintel.com/p/global-terrorism-financing-report-85f">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Following the Money]]></title><description><![CDATA[Recap of Insight Monitor for February 2026]]></description><link>https://newsletter.insightthreatintel.com/p/following-the-money-7af</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/following-the-money-7af</guid><dc:creator><![CDATA[Lisa Niemzyk]]></dc:creator><pubDate>Thu, 05 Mar 2026 14:01:17 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!wRJl!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe73de2cb-ab0b-45e9-8e44-130382136f84_1024x1024.heic" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Hello, <strong>Insight Monitor</strong> subscribers! </em></p><p><em>It has been another packed month, full of research and analysis on terrorist financing and emerging threats. Be sure to subscribe so you don&#8217;t miss out!</em></p><p>In case you missed it&#8230;</p><p>Jessica is leading a new research project with the SOC ACE Research Programme: <em>Criminal Hands, State Ends: State-Sponsored Assassination Using Organized Crime.</em> The project examines how governments exploit organized crime networks for targeted killings. Check out the full project <a href="https://www.socace-research.org.uk/projects/criminal-assassination">here</a>.</p><p>Meanwhile, Leah, Steph, and Jess have been busy on the <em>Secure Line</em> podcast, releasing four new episodes, covering everything from global policy and organized crime to domestic threats and security trends. They had a talk about PM Carney&#8217;s <a href="https://youtu.be/tqPqlSymc48?si=k4o4G5NekKfHUGTL">Davos speech</a>, how organized crime is increasingly being used as a <a href="https://youtu.be/l0UyQVa8MV8?si=6g_-Nb2Q09o1_zn_">tool of state power</a>, <a href="https://youtu.be/SXTg0ZPOBPY?si=xE2TnorVonUL1_Du">grievance-fuelled violence</a> (with Emily Corner, in light of the mass shooting at Tumbler Ridge), and reporting on national security issues with <a href="https://youtu.be/V3WGmZqiNdQ?si=V0Erqlf9sA9xq5GJ">Chris Nardi</a> from the National Post. Catch up on the latest episodes <a href="https://www.youtube.com/@SecureLineCASIS">here</a>.</p><p>Lastly, Jessica was quoted in a <a href="https://globalnews.ca/news/11708242/liberal-mp-dhaliwal-denounces-carney-official-downplaying-india-interference/">Global News article</a>, offering her perspective on ongoing foreign interference in Canada. </p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Insight Monitor is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!wRJl!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe73de2cb-ab0b-45e9-8e44-130382136f84_1024x1024.heic" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!wRJl!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe73de2cb-ab0b-45e9-8e44-130382136f84_1024x1024.heic 424w, https://substackcdn.com/image/fetch/$s_!wRJl!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe73de2cb-ab0b-45e9-8e44-130382136f84_1024x1024.heic 848w, https://substackcdn.com/image/fetch/$s_!wRJl!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe73de2cb-ab0b-45e9-8e44-130382136f84_1024x1024.heic 1272w, https://substackcdn.com/image/fetch/$s_!wRJl!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe73de2cb-ab0b-45e9-8e44-130382136f84_1024x1024.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!wRJl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe73de2cb-ab0b-45e9-8e44-130382136f84_1024x1024.heic" width="514" height="514" data-attrs="{&quot;src&quot;:&quot;https://substackcdn.com/image/fetch/$s_!wRJl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe73de2cb-ab0b-45e9-8e44-130382136f84_1024x1024.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:514,&quot;width&quot;:514,&quot;resizeWidth&quot;:514,&quot;bytes&quot;:195723,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!wRJl!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe73de2cb-ab0b-45e9-8e44-130382136f84_1024x1024.heic 424w, https://substackcdn.com/image/fetch/$s_!wRJl!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe73de2cb-ab0b-45e9-8e44-130382136f84_1024x1024.heic 848w, https://substackcdn.com/image/fetch/$s_!wRJl!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe73de2cb-ab0b-45e9-8e44-130382136f84_1024x1024.heic 1272w, https://substackcdn.com/image/fetch/$s_!wRJl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe73de2cb-ab0b-45e9-8e44-130382136f84_1024x1024.heic 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>As always, we published our latest <strong>Global Terrorist Financing Report,</strong> highlighting major developments from the past month.</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;903f68a4-330a-4afc-b239-4ff875c70fb8&quot;,&quot;caption&quot;:&quot;Welcome back, Insight Monitor subscribers!&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Global Terrorism Financing Report&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:313776655,&quot;name&quot;:&quot;Emelia Connolly&quot;,&quot;bio&quot;:null,&quot;photo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!9E-n!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9783d60b-0c55-4a2b-9ccd-a05d4ca26b39_828x828.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2026-02-12T14:01:18.042Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!jIyV!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F361258c8-bd68-4955-8cb8-63499d5a770f_2000x1125.jpeg&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/global-terrorism-financing-report-047&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:186532683,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:4,&quot;comment_count&quot;:0,&quot;publication_id&quot;:329102,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!I_1w!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4649d7af-94ce-49ea-8c58-368ec26cd423_900x900.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div><hr></div><h4><strong>Illicit Finance Investigations</strong></h4><p><em>The Illicit Finance investigations bundle includes access to both Financial Intelligence Fundamentals and Financial Intelligence Sources and is your one-stop shop to learn how to conduct an illicit finance investigation.</em></p><p><em>Whether your goal is to work as a financial intelligence analyst, an investigator, or in a related field, this bundle ensures you&#8217;re equipped with the skills needed to succeed.</em></p><p><em><a href="https://insightthreatintelligence.thinkific.com/bundles/illicit-finance-investigations">Enroll now</a> and take your expertise to the next level!</em></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!PtN3!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd9919aaf-d521-4cb8-8ca4-f9eac32b5ec8_1260x594.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!PtN3!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd9919aaf-d521-4cb8-8ca4-f9eac32b5ec8_1260x594.jpeg 424w, https://substackcdn.com/image/fetch/$s_!PtN3!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd9919aaf-d521-4cb8-8ca4-f9eac32b5ec8_1260x594.jpeg 848w, https://substackcdn.com/image/fetch/$s_!PtN3!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd9919aaf-d521-4cb8-8ca4-f9eac32b5ec8_1260x594.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!PtN3!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd9919aaf-d521-4cb8-8ca4-f9eac32b5ec8_1260x594.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!PtN3!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd9919aaf-d521-4cb8-8ca4-f9eac32b5ec8_1260x594.jpeg" width="1260" height="594" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d9919aaf-d521-4cb8-8ca4-f9eac32b5ec8_1260x594.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:594,&quot;width&quot;:1260,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:137915,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://newsletter.insightthreatintel.com/i/188400510?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd9919aaf-d521-4cb8-8ca4-f9eac32b5ec8_1260x594.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!PtN3!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd9919aaf-d521-4cb8-8ca4-f9eac32b5ec8_1260x594.jpeg 424w, https://substackcdn.com/image/fetch/$s_!PtN3!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd9919aaf-d521-4cb8-8ca4-f9eac32b5ec8_1260x594.jpeg 848w, https://substackcdn.com/image/fetch/$s_!PtN3!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd9919aaf-d521-4cb8-8ca4-f9eac32b5ec8_1260x594.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!PtN3!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd9919aaf-d521-4cb8-8ca4-f9eac32b5ec8_1260x594.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h3>Articles </h3><p>February was packed with insight. We started the month with our analysis of the <em>2025 Bondi Beach terrorist attack</em>, breaking down how it was financed and what it reveals about disrupting future attacks. Next, we shared a commentary outlining Jessica&#8217;s recommended priorities for Canada&#8217;s future financial crimes agency to tackle emerging threats and protect Canadians. We also unpacked the 37th UN Monitoring Team Report, showing how ISIL, Al-Qaeda, and associated groups continue to sustain themselves through both traditional and innovative financing methods. Finally, in the second article of our <em>Axis of Illicit Finance</em> Series, we examined how Iran moves funds to the Houthis using cryptocurrency, spotlighting the networks that underpin this capability.</p><p>Stay informed with our latest analyses &#8212; explore our newest articles below:</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;89c79b58-eb4c-43e6-9405-ae66125a0bb3&quot;,&quot;caption&quot;:&quot;The antisemitic terrorist attack at Bondi Beach on 14 December 2025 was an unspeakable tragedy that killed 15 people and injured 40, and that investigators believe was motivated at least in part by ISIL. While it&#8217;s still early days and information is relatively sparse, it&#8217;s important to understand how the alleged attackers mobilized to violence, and how they financed the attack. Certainly,&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;The Cost of Terror: Financing Behind the Bondi Beach Attack&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:33479672,&quot;name&quot;:&quot;Jessica Davis, PhD&quot;,&quot;bio&quot;:&quot;Jessica Davis is President of Insight Threat Intelligence and is the author of Women in Modern Terrorism: From Liberations Wars to Global Terrorism and the Islamic State (2017), and Illicit Money: Financing Terrorism in the 21st Century (2021).&quot;,&quot;photo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!ICh7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe312ae7c-114b-4e4f-9ce1-8bf50ddb7a27_2344x2049.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2026-02-05T14:02:57.520Z&quot;,&quot;cover_image&quot;:&quot;https://images.unsplash.com/photo-1551955682-78a3c53ab544?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxMXx8Ym9uZGl8ZW58MHx8fHwxNzY5NDU5NTgzfDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/attack-financing-bondi-beach-2025&quot;,&quot;section_name&quot;:&quot;Attack profiles&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:185884183,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:4,&quot;comment_count&quot;:0,&quot;publication_id&quot;:329102,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!I_1w!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4649d7af-94ce-49ea-8c58-368ec26cd423_900x900.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;793b34d3-50a2-40c8-a57f-7fdb637f14ff&quot;,&quot;caption&quot;:&quot;This op-ed was published two weeks ago in the Globe and Mail.&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;A proposal: a strategic mandate for Canada's financial crimes agency&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:33479672,&quot;name&quot;:&quot;Jessica Davis, PhD&quot;,&quot;bio&quot;:&quot;Jessica Davis is President of Insight Threat Intelligence and is the author of Women in Modern Terrorism: From Liberations Wars to Global Terrorism and the Islamic State (2017), and Illicit Money: Financing Terrorism in the 21st Century (2021).&quot;,&quot;photo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!ICh7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe312ae7c-114b-4e4f-9ce1-8bf50ddb7a27_2344x2049.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2026-02-10T14:02:51.901Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!HH5B!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd451c279-820b-46d9-9bf1-5937adf93d4e_1490x1810.heic&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/a-proposal-a-strategic-mandate-for&quot;,&quot;section_name&quot;:&quot;Commentary&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:185877694,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:3,&quot;comment_count&quot;:0,&quot;publication_id&quot;:329102,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!I_1w!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4649d7af-94ce-49ea-8c58-368ec26cd423_900x900.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;458f3bf2-26eb-4528-9d46-226db7579422&quot;,&quot;caption&quot;:&quot;Last week, the United Nations Monitoring Team released its 37th report on ISIL, Al-Qaeda, and associated groups. As I often do, I have reviewed it with a particular focus on terrorist financing and what it reveals about how these groups are sustaining themselves. What follows is a brief synopsis of the key financial dynamics that stood out in the report&#8230;&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Innovation at the Margins, but Continuity at the Core: How ISIL and AQ Are Adapting&#8212;and Enduring&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:33479672,&quot;name&quot;:&quot;Jessica Davis, PhD&quot;,&quot;bio&quot;:&quot;Jessica Davis is President of Insight Threat Intelligence and is the author of Women in Modern Terrorism: From Liberations Wars to Global Terrorism and the Islamic State (2017), and Illicit Money: Financing Terrorism in the 21st Century (2021).&quot;,&quot;photo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!ICh7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe312ae7c-114b-4e4f-9ce1-8bf50ddb7a27_2344x2049.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2026-02-17T14:02:47.973Z&quot;,&quot;cover_image&quot;:&quot;https://images.unsplash.com/photo-1727221167365-d365e63e7ebc?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzfHx1bml0ZWQlMjBuYXRpb25zfGVufDB8fHx8MTc3MTE4MTk5NHww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/innovation-at-the-margins-but-continuity&quot;,&quot;section_name&quot;:&quot;News&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:188059236,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:2,&quot;comment_count&quot;:0,&quot;publication_id&quot;:329102,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!I_1w!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4649d7af-94ce-49ea-8c58-368ec26cd423_900x900.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;f23000a7-a0db-457a-b970-c67903301e06&quot;,&quot;caption&quot;:&quot;In part 1 of this series, we examined how Iran has increasingly turned to cryptocurrency as a core tool in its sanctions-evasion toolkit, using digital assets to bypass conventional financial controls and support its broader regional network of allied armed groups, including Hezbollah, Hamas, and Ansarallah (the Houthis).&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;From Tehran to Sana&#8217;a: Cryptocurrency and Sanctions Evasion in the Axis of Illicit Finance&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:33479672,&quot;name&quot;:&quot;Jessica Davis, PhD&quot;,&quot;bio&quot;:&quot;Jessica Davis is President of Insight Threat Intelligence and is the author of Women in Modern Terrorism: From Liberations Wars to Global Terrorism and the Islamic State (2017), and Illicit Money: Financing Terrorism in the 21st Century (2021).&quot;,&quot;photo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!ICh7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe312ae7c-114b-4e4f-9ce1-8bf50ddb7a27_2344x2049.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2026-02-24T14:02:37.624Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!0BCO!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ec115eb-33b1-4e33-8147-a3b6ffc1f04e_626x682.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/from-tehran-to-sanaa-cryptocurrency&quot;,&quot;section_name&quot;:&quot;Group Profiles &quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:186790350,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:2,&quot;comment_count&quot;:0,&quot;publication_id&quot;:329102,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!I_1w!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4649d7af-94ce-49ea-8c58-368ec26cd423_900x900.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/p/following-the-money-7af?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/p/following-the-money-7af?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p><br>That&#8217;s a wrap for February! See you in March with more analysis and updates. Be sure to subscribe so you don&#8217;t miss out! This is news and analysis you won&#8217;t find anywhere else. </p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/subscribe?"><span>Subscribe now</span></a></p><p><em>&#169; 2026 Insight Threat Intelligence Ltd. All Rights Reserved.<br><br>This newsletter and its contents are protected by Canadian copyright law. Except as otherwise provided for under Canadian copyright law, this newsletter and its contents may not be copied, published, distributed, downloaded or otherwise stored in a retrieval system, transmitted or converted, in any form or by any means, electronic or otherwise, without the prior written permission of the copyright owner.</em></p>]]></content:encoded></item><item><title><![CDATA[Obscuring the Money Behind the Bombs: New Data on Terrorist Financial Tradecraft]]></title><description><![CDATA[How terrorists are hiding the source, destination, and use of funds -- and what to do about it]]></description><link>https://newsletter.insightthreatintel.com/p/obscuring-the-money-behind-the-bombs</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/obscuring-the-money-behind-the-bombs</guid><dc:creator><![CDATA[Jessica Davis, PhD]]></dc:creator><pubDate>Tue, 03 Mar 2026 14:03:28 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!t2RV!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21118c2c-ea5a-46c8-9fbd-40ae731b5546_1047x596.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Hello <strong>Insight Monitor</strong> subscribers, and welcome to another edition of our series on trends in terrorist financing, using a unique longitudinal dataset. This series goes beyond headline cases and anecdotes, offering data-driven insights and analysis you won&#8217;t find anywhere else. In this issue, I focus on how terrorists obscure the sources, destinations, and uses of funds&#8212;and what this reveals about terrorist financial adaptation.</em></p><p>Terrorist financing is often discussed in terms of <em>how money is raised</em>, but far less attention is paid to what happens next: how that money is deliberately hidden. In this context, obscuring refers to the financial tradecraft terrorists use to hide the source, destination, or ultimate use of funds&#8212;a set of practices designed to frustrate detection, complicate attribution, and sever the visible link between money and violence. Drawing on my existing dataset, this newsletter examines how terrorist groups and individuals disguise terrorist funds. Understanding these techniques is essential for a more operational understanding of how these networks and actors survive under sustained financial pressure.</p><p>To get caught up on the series so far (and learn more about the data, have a read: </p><ol><li><p><a href="https://newsletter.insightthreatintel.com/p/trends-in-terrorist-financing-2020?r=jxl2w&amp;utm_campaign=post&amp;utm_medium=web&amp;triedRedirect=true">Trends in Terrorist Financing 2020-2025</a></p></li><li><p><a href="https://newsletter.insightthreatintel.com/p/beyond-anecdotes-terrorist-financing">Beyond Anecdotes: Terrorist Financing Has Moved to Crypto</a></p></li></ol><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Insight Monitor is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>Over the past six years, terrorists have demonstrably increased their use of financial tradecraft to obscure the source, destination, and use of funds. Importantly, the patterns observed in open cases and enforcement actions almost certainly represent a lower bound of actual tradecraft in use: the most sophisticated methods are, by definition, the least likely to be detected, investigated, or publicly documented.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!rwix!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c9838f3-ac2a-4d6e-bc24-8599a04adc61_993x576.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!rwix!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c9838f3-ac2a-4d6e-bc24-8599a04adc61_993x576.png 424w, https://substackcdn.com/image/fetch/$s_!rwix!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c9838f3-ac2a-4d6e-bc24-8599a04adc61_993x576.png 848w, https://substackcdn.com/image/fetch/$s_!rwix!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c9838f3-ac2a-4d6e-bc24-8599a04adc61_993x576.png 1272w, https://substackcdn.com/image/fetch/$s_!rwix!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c9838f3-ac2a-4d6e-bc24-8599a04adc61_993x576.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!rwix!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c9838f3-ac2a-4d6e-bc24-8599a04adc61_993x576.png" width="993" height="576" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1c9838f3-ac2a-4d6e-bc24-8599a04adc61_993x576.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:576,&quot;width&quot;:993,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:59153,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://newsletter.insightthreatintel.com/i/153040222?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c9838f3-ac2a-4d6e-bc24-8599a04adc61_993x576.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!rwix!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c9838f3-ac2a-4d6e-bc24-8599a04adc61_993x576.png 424w, https://substackcdn.com/image/fetch/$s_!rwix!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c9838f3-ac2a-4d6e-bc24-8599a04adc61_993x576.png 848w, https://substackcdn.com/image/fetch/$s_!rwix!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c9838f3-ac2a-4d6e-bc24-8599a04adc61_993x576.png 1272w, https://substackcdn.com/image/fetch/$s_!rwix!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c9838f3-ac2a-4d6e-bc24-8599a04adc61_993x576.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Over time, terrorist financing has become more complex, though it still generally lacks the sophistication typically observed in large-scale money laundering or other forms of illicit finance. This growing complexity is not driven by a single innovation, but by the layering of methods that, when combined, increase network opacity. These methods include continued reliance on cash, the use of facilitators and enablers, the deployment of third parties and proxies, and the selective adoption of money-laundering techniques. Keep reading to learn more: </p>
      <p>
          <a href="https://newsletter.insightthreatintel.com/p/obscuring-the-money-behind-the-bombs">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[From Tehran to Sana’a: Cryptocurrency and Sanctions Evasion in the Axis of Illicit Finance]]></title><description><![CDATA[Ansarallah (the Houthis) and cryptocurrency-enabled terrorist financing]]></description><link>https://newsletter.insightthreatintel.com/p/from-tehran-to-sanaa-cryptocurrency</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/from-tehran-to-sanaa-cryptocurrency</guid><dc:creator><![CDATA[Jessica Davis, PhD]]></dc:creator><pubDate>Tue, 24 Feb 2026 14:02:37 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!0BCO!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ec115eb-33b1-4e33-8147-a3b6ffc1f04e_626x682.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>In part 1 of this series,<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a> we examined how Iran has increasingly turned to cryptocurrency as a core tool in its sanctions-evasion toolkit, using digital assets to bypass conventional financial controls and support its broader regional network of allied armed groups, including Hezbollah, Hamas, and Ansarallah (the Houthis).</em> <em>In today&#8217;s edition of the series, we&#8217;re looking at how Iran moves money to the Houthis using cryptocurrency, and the networks that underpin this capability. Have a read to learn more about this threat network, what it means for global instability, and how to counter it. </em></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Insight Monitor is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h4>Part 1: </h4><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;6b648439-eb08-48ad-90b5-a587f64e5319&quot;,&quot;caption&quot;:&quot;This article marks the start of an eight-part series examining how Iran has increasingly relied on cryptocurrency to circumvent international sanctions. These developments unfold against a volatile backdrop: Iran&#8217;s 2025 confrontation with Israel, the ongoing activity of its regional proxy network, and protests driven by corruption, economic hardship (ex&#8230;&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;The Axis of Illicit Finance: Iran&#8217;s Crypto Strategy Explained&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:33479672,&quot;name&quot;:&quot;Jessica Davis, PhD&quot;,&quot;bio&quot;:&quot;Jessica Davis is President of Insight Threat Intelligence and is the author of Women in Modern Terrorism: From Liberations Wars to Global Terrorism and the Islamic State (2017), and Illicit Money: Financing Terrorism in the 21st Century (2021).&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e312ae7c-114b-4e4f-9ce1-8bf50ddb7a27_2344x2049.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2026-01-06T14:00:45.585Z&quot;,&quot;cover_image&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/87b19738-1968-494d-aa46-98d0020cd199_845x486.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/the-axis-of-illicit-finance-irans&quot;,&quot;section_name&quot;:&quot;Financiers&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:183357175,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:8,&quot;comment_count&quot;:0,&quot;publication_id&quot;:329102,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!I_1w!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4649d7af-94ce-49ea-8c58-368ec26cd423_900x900.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>The first installment of this eight-part series outlined how one of the world&#8217;s most heavily sanctioned states has evolved its financial infrastructure &#8212; integrating traditional networks with crypto rails &#8212; to sustain its economy and underwrite proxy activities across the Middle East. Against a backdrop of geopolitical conflict and tightening sanctions, Iran&#8217;s adoption of cryptocurrency is not just about evading sanctions but about embedding itself in an emerging &#8220;axis of illicit finance&#8221; that links it with other sanctioned states and actors, making crypto increasingly central to its ability to fund and project influence through its affiliates. In recent years, Iran&#8217;s proxy networks have conducted on-chain activity of over $2 billion; this activity is <a href="https://www.chainalysis.com/blog/2026-crypto-crime-report-introduction/">based on confirmed wallets identified in sanctions designations</a>, and likely represents a low estimate of Iran&#8217;s true use of cryptocurrency for terrorist financing.</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;37bb6dd4-9a5e-4707-9564-84177048320e&quot;,&quot;caption&quot;:&quot;The Houthis began a military campaign in October 2023 in solidarity with Hamas by launching missile and drone strikes that targeted an Israeli tourist resort. Their campaign escalated with additional missile strikes throughout the region and claiming the downing of a&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;The Houthis&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:85208154,&quot;name&quot;:&quot;Elena Martynova&quot;,&quot;bio&quot;:&quot;Researching terrorism &quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e88b531d-b106-4c92-8177-62a8a864bde5_2316x2316.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2024-01-25T14:01:26.911Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2bc199a-093f-4978-87f7-4d63e7fe4136_1500x1000.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/the-houthis&quot;,&quot;section_name&quot;:&quot;Group Profiles &quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:141021522,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:3,&quot;comment_count&quot;:0,&quot;publication_id&quot;:329102,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!I_1w!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4649d7af-94ce-49ea-8c58-368ec26cd423_900x900.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><h3>Yemen, the Houthis, and the Axis of Resistance</h3><p>Over the last two years, the Houthis have become even more important to Iran amid <a href="https://sanaacenter.org/publications/analysis/26051">geopolitical losses</a>. At the same time, cryptocurrency has become increasingly important for Iran, with the IRGC&#8217;s share of Iran&#8217;s cryptocurrency ecosystem <a href="https://www.chainalysis.com/blog/iranian-crypto-activity-geopolitical-tensions-2026/">rising to 50</a>% in the last quarter of 2025. For instance, several reports indicate that <a href="https://www.coindesk.com/policy/2026/01/02/iran-accepts-cryptocurrency-as-payment-for-advanced-weapons">Iran accepts crypto payments</a> for military equipment purchases, even if those payments are not necessarily processed directly through websites. Ultimately, sanctions targeting both Iran and the Houthis, and Iran&#8217;s development of crypto rails for payments to its proxies (among other uses), likely complement other, more traditional payment methods like hawala, cash couriers, and even bank transfers.</p><p>Like the other axis members, Iran funds the Yemen branch of its axis of resistance (Ansarallah / The Houthis) in various ways, primarily by diverting profits from illicit oil sales through cryptocurrency transactions. The crypto component of Iran&#8217;s hybrid threat-financing network that funds the Houthis is illustrated below. Some of the basic details are as follows:  </p><ul><li><p>According to the US OFAC, the IRGC-QF cooperates with Iran-based<sup> </sup><a href="https://home.treasury.gov/news/press-releases/jy0221">Ansarallah financial official Sa&#8217;id al-Jamal</a>; OFAC has identified <a href="https://home.treasury.gov/news/press-releases/jy2757">five cryptocurrency wallets</a> associated with him. Al-Jamal also operates exchange companies in Sana&#8217;a, Yemen, specifically Janat al Anhar General Trading LLC (formerly Abu Sumbol General Trading LLC). These businesses <a href="https://home.treasury.gov/news/press-releases/sb0367">facilitate payment for Iranian oil</a>. </p></li><li><p>Funds transfers are also facilitated for him through a variety of money exchanges located in the United Arab Emirates (UAE), including <a href="https://home.treasury.gov/news/press-releases/jy0221">Adoon General Trading FZE</a>. Al-Jamal reportedly generates revenue through the illicit sale of Iranian petroleum to customers in East Asia using a network of shipping firms in Malaysia. (Malaysia acts as an intermediary for some Iranian oil, with Iranian oil re-labelled as originating from Malaysia and sold to other countries, <a href="https://www.reuters.com/markets/commodities/chinas-march-iranian-oil-imports-surge-us-sanctions-fears-2025-04-10/">including China</a>).<sup> </sup></p></li><li><p>These oil transactions often appear in Iran&#8217;s shadow banking network and refer to <a href="https://finintegrity.org/out-of-the-shadows/">&#8220;Malaysian blend&#8221;</a> oil. Some of these transactions have been small-denomination inflows through <a href="https://www.trmlabs.com/resources/blog/new-drones-old-tactics-how-iran-uses-crypto-to-fund-conflict-and-evade-sanctions">informal exchanges</a>.</p></li></ul><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!0BCO!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ec115eb-33b1-4e33-8147-a3b6ffc1f04e_626x682.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!0BCO!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ec115eb-33b1-4e33-8147-a3b6ffc1f04e_626x682.png 424w, https://substackcdn.com/image/fetch/$s_!0BCO!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ec115eb-33b1-4e33-8147-a3b6ffc1f04e_626x682.png 848w, https://substackcdn.com/image/fetch/$s_!0BCO!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ec115eb-33b1-4e33-8147-a3b6ffc1f04e_626x682.png 1272w, https://substackcdn.com/image/fetch/$s_!0BCO!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ec115eb-33b1-4e33-8147-a3b6ffc1f04e_626x682.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!0BCO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ec115eb-33b1-4e33-8147-a3b6ffc1f04e_626x682.png" width="626" height="682" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9ec115eb-33b1-4e33-8147-a3b6ffc1f04e_626x682.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:682,&quot;width&quot;:626,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:130798,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://newsletter.insightthreatintel.com/i/186790350?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ec115eb-33b1-4e33-8147-a3b6ffc1f04e_626x682.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!0BCO!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ec115eb-33b1-4e33-8147-a3b6ffc1f04e_626x682.png 424w, https://substackcdn.com/image/fetch/$s_!0BCO!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ec115eb-33b1-4e33-8147-a3b6ffc1f04e_626x682.png 848w, https://substackcdn.com/image/fetch/$s_!0BCO!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ec115eb-33b1-4e33-8147-a3b6ffc1f04e_626x682.png 1272w, https://substackcdn.com/image/fetch/$s_!0BCO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ec115eb-33b1-4e33-8147-a3b6ffc1f04e_626x682.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>These transactions are not limited to the Middle East and are linked to the broader illicit finance network<sup> </sup>through Russia, specifically the Russian cryptocurrency exchange <a href="https://www.trmlabs.com/resources/blog/the-takedown-of-garantex-a-notorious-crypto-exchanges-role-in-illicit-finance">Garantex</a>, which is <a href="https://www.icij.org/news/2025/09/cryptocurrency-exchange-garantex-lives-on-despite-sanctions-new-report-unveils/">reportedly still active</a> despite sanctions and domain seizure. In April 2025, the US further identified eight wallets associated with Sa&#8217;id Al-Jamal and indicated that, in addition to facilitating illicit petroleum sales, he is also involved in weapons procurement from Russia and facilitating the sale of stolen <a href="https://home.treasury.gov/news/press-releases/sb0068">Ukrainian grain</a>. These addresses included six private wallets and two deposit addresses at mainstream services. According to Chainalysis, these addresses have moved nearly <a href="https://www.chainalysis.com/blog/ofac-sanctions-houthi-network-crypto-money-laundering-russia-april-2025/">$1 billion in illicit funds</a>. As part of this activity, the Houthis used deposit addresses at Garantex. In early 2026, allegations surfaced about the role of Binance in Iran&#8217;s illicit finance network, including for sending money to the Houthis. These allegations suggest that Binance has facilitated over $1.7 billion for Iran / IRGC / Axis of Resistance.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-2" href="#footnote-2" target="_self">2</a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/p/from-tehran-to-sanaa-cryptocurrency?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/p/from-tehran-to-sanaa-cryptocurrency?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p><strong>Financial Intelligence Sources</strong></p><p><em>Do you want to identify and exploit new sources of financial intelligence? Our evergreen course is your guide to finding, analyzing, and contextualizing open source financial intelligence. This step-by-step guide to FININT sources will greatly expand your intelligence knowledge and skills. This course is perfect for people new to financial intelligence and seasoned professionals. <a href="https://insightthreatintelligence.thinkific.com/courses/FININTSources">Enroll today</a></em></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://insightthreatintelligence.thinkific.com/courses/FININTSources" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Vv2Y!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e2d12f5-a284-4cb1-95cf-04742c85d0af_1144x400.png 424w, https://substackcdn.com/image/fetch/$s_!Vv2Y!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e2d12f5-a284-4cb1-95cf-04742c85d0af_1144x400.png 848w, https://substackcdn.com/image/fetch/$s_!Vv2Y!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e2d12f5-a284-4cb1-95cf-04742c85d0af_1144x400.png 1272w, https://substackcdn.com/image/fetch/$s_!Vv2Y!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e2d12f5-a284-4cb1-95cf-04742c85d0af_1144x400.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Vv2Y!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e2d12f5-a284-4cb1-95cf-04742c85d0af_1144x400.png" width="1144" height="400" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8e2d12f5-a284-4cb1-95cf-04742c85d0af_1144x400.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:400,&quot;width&quot;:1144,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:357457,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://insightthreatintelligence.thinkific.com/courses/FININTSources&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://newsletter.insightthreatintel.com/i/153040222?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e2d12f5-a284-4cb1-95cf-04742c85d0af_1144x400.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!Vv2Y!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e2d12f5-a284-4cb1-95cf-04742c85d0af_1144x400.png 424w, https://substackcdn.com/image/fetch/$s_!Vv2Y!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e2d12f5-a284-4cb1-95cf-04742c85d0af_1144x400.png 848w, https://substackcdn.com/image/fetch/$s_!Vv2Y!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e2d12f5-a284-4cb1-95cf-04742c85d0af_1144x400.png 1272w, https://substackcdn.com/image/fetch/$s_!Vv2Y!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e2d12f5-a284-4cb1-95cf-04742c85d0af_1144x400.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2>An International Network</h2><p>Anyone versed in counter-terrorist financing will also not find it surprising that this terrorist financing network has connections in T&#252;rkiye. According to OFAC, T&#252;rkiye-based Hassan Jafari has also worked with Sa&#8217;id al-Jamal to launder money on behalf of al-Jamal&#8217;s network and has arranged payments worth millions of dollars in support of <a href="https://home.treasury.gov/news/press-releases/sb0068">shipments for the Houthis</a>. Jafari has also worked with brothers Hushang and Sohrab Gahirat on the Houthis&#8217; commercial initiatives in Russia, including arms procurement and <a href="https://home.treasury.gov/news/press-releases/sb0068">grain shipments</a>.</p><p>Part of this network also extends into Syria. For instance, Alireza Derakshan and Arash Estaki Alivand coordinated more than $100 million in oil sales for the Iranian government through cryptocurrency and used a network of front companies across multiple jurisdictions. <a href="https://home.treasury.gov/news/press-releases/sb0248">Alivand worked as a financial facilitator</a> and oil broker for Syria-based Al Qatirji Company, while Derakhshan used UAE-based Minato Commercial Brokers as a front company to make a payment to Al Qatirji Company.</p><p>In Yemen, a network of money service businesses connects and facilitates cryptocurrency payments, as well as traditional financial transfers and likely cash-out services: </p><ul><li><p>Houthi finance official, Abdullah al-Jamal, has used a network of money service businesses, trade facilitators, and cryptocurrency addresses to move funds. </p></li><li><p>He has used the Sana&#8217;a-based money service business Mohammed Ali Al Thawr Exchange, and he also controls the Davos Exchange and Remittances company. </p></li><li><p>Other exchanges, specifically<sup> </sup>Khaled Al Hazmi and Brother Company General Partnership, have also transferred funds to <a href="https://home.treasury.gov/news/press-releases/jy2757.">Davos Exchange</a> as part of this illicit activity.</p></li></ul><p>This cryptocurrency network does not operate in isolation. Instead, it plugs directly into a wider ecosystem of exchange houses, front companies, and long-standing smuggling routes tied to the Houthis&#8217; weapons-procurement apparatus. Together, these crypto nodes form a parallel financial architecture&#8212;one that functions as a secondary payment system &#8212;designed to move value, settle transactions, and sustain illicit activity while insulating the network from sanctions and traditional financial controls. While parts of this network are visible through on-chain analysis, additional off-chain activity (including cash and hawala transactions) likely further obfuscates the network's full extent.</p><p>Iran and the Houthis&#8217; hybrid threat finance system is likely growing in complexity and sophistication, and is facilitated by access to greater pools of illicit cryptocurrency funds provided by Chinese money laundering networks. Furthermore, Ansarallah has used privacy-enhancing tools such as <a href="https://www.trmlabs.com/resources/blog/new-drones-old-tactics-how-iran-uses-crypto-to-fund-conflict-and-evade-sanctions">mixers and cross-chain protocols</a>, demonstrating financial tradecraft capabilities.</p><p>Ansarallah&#8217;s use of cryptocurrency for financing, facilitated by a small number of identified individuals, reflects a broader and potentially more complex network linked to Iran. These facilitators operate through companies, hawalas, and exchanges in T&#252;rkiye, Russia, Yemen, Syria, Lebanon, and the UAE, thereby enabling the group to access financial infrastructure beyond Yemen&#8217;s borders. While current evidence highlights these specific connections, it remains unclear whether this network represents the entirety of Ansarallah&#8217;s crypto-financing apparatus or merely the visible edge of a much larger system. The opacity of these networks, combined with Iran&#8217;s established role in supporting proxy groups through both traditional and emerging financial channels, suggests that the full scale and sophistication of Ansarallah&#8217;s digital financing strategy might still be underappreciated. </p><p>Following Iran&#8217;s significant military setbacks in the first half of 2025, <a href="https://sanaacenter.org/the-yemen-review/april-june-2025/25031">Iran needs Ansarallah more than ever</a>, and faces significant sunk costs in terms of existing investment in the group. As a result, Iran is likely to continue, and could increase, support for the group, and some of the tens or <a href="https://doi.org/10.1080/1057610X.2021.1954353">hundreds of millions of dollars a year that Iran provides to the group</a><sup> </sup>might increasingly move through cryptocurrency.</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;d71fce51-1012-4099-9ea5-8a10b11ce2cb&quot;,&quot;caption&quot;:&quot;Since October 2023, the Houthis have intensified their military operations in solidarity with Hamas, launching missile and drone attacks that have destabilized the region and disrupted global shipping in the Red Sea. Their personnel strength has further expanded to encompass&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Sanctioned but Sustained: Why the Houthis&#8217; Finances Endure Global Pressure&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:85208154,&quot;name&quot;:&quot;Elena Martynova&quot;,&quot;bio&quot;:&quot;Researching terrorism &quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e88b531d-b106-4c92-8177-62a8a864bde5_2316x2316.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2025-07-17T13:02:12.976Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!DbUL!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1ce816cd-716d-475f-b975-135412b63737_936x624.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/sanctioned-but-sustained-why-the&quot;,&quot;section_name&quot;:&quot;Group Profiles &quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:167732270,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:6,&quot;comment_count&quot;:0,&quot;publication_id&quot;:329102,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!I_1w!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4649d7af-94ce-49ea-8c58-368ec26cd423_900x900.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/p/from-tehran-to-sanaa-cryptocurrency?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thanks for reading Insight Monitor! This post is public so feel free to share it.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/p/from-tehran-to-sanaa-cryptocurrency?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/p/from-tehran-to-sanaa-cryptocurrency?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div><p><em>&#169; 2026 Insight Threat Intelligence Ltd. All Rights Reserved.<br><br>This newsletter and its contents are protected by Canadian copyright law. Except as otherwise provided for under Canadian copyright law, this newsletter and its contents may not be copied, published, distributed, downloaded or otherwise stored in a retrieval system, transmitted or converted, in any form or by any means, electronic or otherwise, without the prior written permission of the copyright owner.</em></p><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-1" href="#footnote-anchor-1" class="footnote-number" contenteditable="false" target="_self">1</a><div class="footnote-content"><p>This research is part of my post-doctoral work funded by the University of Calgary&#8217;s Faculty of Law.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-2" href="#footnote-anchor-2" class="footnote-number" contenteditable="false" target="_self">2</a><div class="footnote-content"><p>I remain somewhat skeptical of these numbers; many wallets are used for different purposes (and sometimes serve as cash-out services or hawalas), so counting all transactions as part of a terrorist financing network might not be accurate. It&#8217;s worth having a solid understanding of a methodology before fully embracing these estimates. </p></div></div>]]></content:encoded></item><item><title><![CDATA[Innovation at the Margins, but Continuity at the Core: How ISIL and AQ Are Adapting—and Enduring]]></title><description><![CDATA[Reviewing the 37th UN Monitoring Team report]]></description><link>https://newsletter.insightthreatintel.com/p/innovation-at-the-margins-but-continuity</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/innovation-at-the-margins-but-continuity</guid><dc:creator><![CDATA[Jessica Davis, PhD]]></dc:creator><pubDate>Tue, 17 Feb 2026 14:02:47 GMT</pubDate><enclosure url="https://images.unsplash.com/photo-1727221167365-d365e63e7ebc?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzfHx1bml0ZWQlMjBuYXRpb25zfGVufDB8fHx8MTc3MTE4MTk5NHww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Last week, the United Nations Monitoring Team released its 37th report on ISIL, Al-Qaeda, and associated groups.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a> As I often do, I have reviewed it with a particular focus on terrorist financing and what it reveals about how these groups are sustaining themselves. What follows is a brief synopsis of the key financial dynamics that stood out in the report. Some of our prior analysis is linked below: </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://images.unsplash.com/photo-1727221167365-d365e63e7ebc?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzfHx1bml0ZWQlMjBuYXRpb25zfGVufDB8fHx8MTc3MTE4MTk5NHww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://images.unsplash.com/photo-1727221167365-d365e63e7ebc?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzfHx1bml0ZWQlMjBuYXRpb25zfGVufDB8fHx8MTc3MTE4MTk5NHww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1727221167365-d365e63e7ebc?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzfHx1bml0ZWQlMjBuYXRpb25zfGVufDB8fHx8MTc3MTE4MTk5NHww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1727221167365-d365e63e7ebc?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzfHx1bml0ZWQlMjBuYXRpb25zfGVufDB8fHx8MTc3MTE4MTk5NHww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1727221167365-d365e63e7ebc?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzfHx1bml0ZWQlMjBuYXRpb25zfGVufDB8fHx8MTc3MTE4MTk5NHww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1456w" sizes="100vw"><img src="https://images.unsplash.com/photo-1727221167365-d365e63e7ebc?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzfHx1bml0ZWQlMjBuYXRpb25zfGVufDB8fHx8MTc3MTE4MTk5NHww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" width="362" height="241.33333333333334" data-attrs="{&quot;src&quot;:&quot;https://images.unsplash.com/photo-1727221167365-d365e63e7ebc?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzfHx1bml0ZWQlMjBuYXRpb25zfGVufDB8fHx8MTc3MTE4MTk5NHww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:4672,&quot;width&quot;:7008,&quot;resizeWidth&quot;:362,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;A very tall building sitting next to a body of water&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="A very tall building sitting next to a body of water" title="A very tall building sitting next to a body of water" srcset="https://images.unsplash.com/photo-1727221167365-d365e63e7ebc?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzfHx1bml0ZWQlMjBuYXRpb25zfGVufDB8fHx8MTc3MTE4MTk5NHww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1727221167365-d365e63e7ebc?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzfHx1bml0ZWQlMjBuYXRpb25zfGVufDB8fHx8MTc3MTE4MTk5NHww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1727221167365-d365e63e7ebc?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzfHx1bml0ZWQlMjBuYXRpb25zfGVufDB8fHx8MTc3MTE4MTk5NHww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1727221167365-d365e63e7ebc?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzfHx1bml0ZWQlMjBuYXRpb25zfGVufDB8fHx8MTc3MTE4MTk5NHww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/@nhuenerfuerst">Nils Huenerfuerst</a> on <a href="https://unsplash.com">Unsplash</a></figcaption></figure></div><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;ed99f1e9-d3a8-422a-9471-cb98581dbf3e&quot;,&quot;caption&quot;:&quot;Last week, the United nations Monitoring Team produced its thirty-third report on ISIL and Al Qaeda. I usually do a quick review of these reports on Twitter, but have decided to move my analysis over to Insight Monitor to better preserve and formalize it. This analysis pulls out the main finance pieces as reported by member states, outlines what&#8217;s new, &#8230;&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;The state of terrorist financing, as seen by the United Nations&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:33479672,&quot;name&quot;:&quot;Jessica Davis, PhD&quot;,&quot;bio&quot;:&quot;Jessica Davis is President of Insight Threat Intelligence and is the author of Women in Modern Terrorism: From Liberations Wars to Global Terrorism and the Islamic State (2017), and Illicit Money: Financing Terrorism in the 21st Century (2021).&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e312ae7c-114b-4e4f-9ce1-8bf50ddb7a27_2344x2049.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2024-02-06T14:00:18.875Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!fzjw!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7846263e-b43d-4227-9a12-96a180188773_771x739.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/analysis-the-state-of-terrorist-financing&quot;,&quot;section_name&quot;:&quot;Group Profiles &quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:141409271,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:7,&quot;comment_count&quot;:0,&quot;publication_id&quot;:329102,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!I_1w!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4649d7af-94ce-49ea-8c58-368ec26cd423_900x900.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;f7aa4f3b-ac91-468e-9919-42b03cea91ab&quot;,&quot;caption&quot;:&quot;At the beginning of February, the UN Monitoring Team released its Thirty-Fifth report on ISIL and Al-Qaeda, outlining operational activities and trends as reported by Member States. This analysis summarizes the key threats related to terrorism financing, counter-terrorism successes, and some financing evolutions within these organizations, as detailed in the report.&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Evolving Threats: Key Financing Takeaways from the UN&#8217;s Latest ISIL and Al-Qaeda Report&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:85208154,&quot;name&quot;:&quot;Elena Martynova&quot;,&quot;bio&quot;:&quot;Researching terrorism &quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e88b531d-b106-4c92-8177-62a8a864bde5_2316x2316.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2025-03-06T08:01:23.057Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!UA5K!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4a55a893-382a-42c4-b11e-068d549dd49a_1024x1024.webp&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/evolving-threats-key-financing-takeaways&quot;,&quot;section_name&quot;:&quot;News&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:158423842,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:1,&quot;comment_count&quot;:0,&quot;publication_id&quot;:329102,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!I_1w!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4649d7af-94ce-49ea-8c58-368ec26cd423_900x900.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;93fb3cb2-8500-4ec2-9a68-1161bfb21fd7&quot;,&quot;caption&quot;:&quot;Hello, Insight Monitor subscribers, and welcome to another week of news and analysis you won&#8217;t find anywhere else. Last week, the latest UN Monitoring Team report was released. And while we&#8217;re certainly not first to do a summary and highlight key points, we did take our time to go through it, find all the terrorist financing-related content, and pull ou&#8230;&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Hawala in the Cloud, Cash Under the Mattress: ISIL&#8217;s Evolving Finances&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:33479672,&quot;name&quot;:&quot;Jessica Davis, PhD&quot;,&quot;bio&quot;:&quot;Jessica Davis is President of Insight Threat Intelligence and is the author of Women in Modern Terrorism: From Liberations Wars to Global Terrorism and the Islamic State (2017), and Illicit Money: Financing Terrorism in the 21st Century (2021).&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e312ae7c-114b-4e4f-9ce1-8bf50ddb7a27_2344x2049.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100},{&quot;id&quot;:85208154,&quot;name&quot;:&quot;Elena Martynova&quot;,&quot;bio&quot;:&quot;Researching terrorism &quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e88b531d-b106-4c92-8177-62a8a864bde5_2316x2316.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2025-08-11T13:02:53.648Z&quot;,&quot;cover_image&quot;:&quot;https://images.unsplash.com/photo-1727221167365-d365e63e7ebc?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHx1bml0ZWQlMjBuYXRpb25zfGVufDB8fHx8MTc1NDg0NTkwMHww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/hawala-in-the-cloud-cash-under-the&quot;,&quot;section_name&quot;:&quot;Commentary&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:170617622,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:7,&quot;comment_count&quot;:0,&quot;publication_id&quot;:329102,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!I_1w!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4649d7af-94ce-49ea-8c58-368ec26cd423_900x900.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>One of the most notable developments in AQ/ISIL terrorist financing concerns the Allied Democratic Forces (ADF), which is reportedly using satellite internet to facilitate cryptocurrency conversions into state-issued currency, including through mobile money applications. This demonstrates not only the increasing accessibility of crypto for terrorist actors but also a significant operational adaptation to access crypto even in remote areas. The technical and logistical barriers are being overcome, and groups are increasingly integrating digital assets into local financial ecosystems.</p><p>At the same time, while cryptocurrency adaptation is increasing, it does not displace more traditional revenue streams. Across theatres, local taxation and extortion networks remain central to sustaining operations, alongside criminal activity such as smuggling and illicit trade. The report reinforces a familiar pattern: innovation at the margins, but continuity at the core. For most groups, territorial control, coercive taxation, and embedded criminal economies continue to underpin their financing strategies.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Insight Monitor is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h3><strong>JNIM</strong></h3><p>According to the UN, <a href="https://newsletter.insightthreatintel.com/p/gold-guns-and-cattle-jnims-30-billion?utm_source=publication-search">JNIM</a> profited from a single large ransom payment and used that to increase its capabilities. Here at Insight Monitor, we wrote about that large ransom payment, noting that &#8220;the money will certainly allow JNIM more operational freedom of movement in the coming months, and likely incentivize them to gain more territory and solidify control and influence in the region.&#8221; JNIM engages in both low-level (and low-cost) local kidnappings, as well as higher cost (and higher reward) international kidnapping for ransom. </p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;f3896081-93ca-4d48-a02b-13c867b15518&quot;,&quot;caption&quot;:&quot;JNIM (Al-Qaeda affiliate Jama&#8217;at Nusrat al-Islam wal-Muslimin) has been on the march in Africa, expanding its areas of operations across Burkina Faso, Mali, and Niger, and most recently into Nigeria. The group has encroached on Mali&#8217;s capital, Bamako, and created a fuel blockade over the last two months that has seriously threatened the capital.&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;JNIM's $50 million windfall&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:33479672,&quot;name&quot;:&quot;Jessica Davis, PhD&quot;,&quot;bio&quot;:&quot;Jessica Davis is President of Insight Threat Intelligence and is the author of Women in Modern Terrorism: From Liberations Wars to Global Terrorism and the Islamic State (2017), and Illicit Money: Financing Terrorism in the 21st Century (2021).&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e312ae7c-114b-4e4f-9ce1-8bf50ddb7a27_2344x2049.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2025-11-04T11:35:29.725Z&quot;,&quot;cover_image&quot;:&quot;https://images.unsplash.com/photo-1619149808494-d9a0a7eba166?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxtb25leSUyMHRlcnJvcmlzbSUyMHVhZXxlbnwwfHx8fDE3NjIxODQ2MTh8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/jnims-50-million-windfall&quot;,&quot;section_name&quot;:&quot;Group Profiles &quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:177894948,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:6,&quot;comment_count&quot;:0,&quot;publication_id&quot;:329102,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!I_1w!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4649d7af-94ce-49ea-8c58-368ec26cd423_900x900.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>JNIM is assessed by the UN to be the wealthiest Al-Qaeda affiliate after Al-Shabaab, having significantly expanded its revenue base through territorial control. The group raises funds by taxing and regulating gold mining and other commercial activities, imposing road tolls and transportation fees, and engaging in smuggling and livestock rustling. It also collects zakat (charitable donations), with rates varying by location; in areas where local communities resist or are perceived as uncooperative, zakat can be increased to extortionate levels. This diversified and locally calibrated approach to revenue generation has strengthened JNIM&#8217;s financial resilience.</p><h3>Lakurawa</h3><p>The UN also mentioned (I believe for the first time) Lakurawa, a group within the Islamic State Greater Sahel,<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-2" href="#footnote-2" target="_self">2</a> and described their financing as primarily illegal tax collection and cattle rustling. You can read more about Lakurawa in this <a href="https://thesoufancenter.org/intelbrief-2026-february-6/">Soufan Center</a> intel brief. </p><h4><strong>Terrorist Financing Analysis</strong></h4><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://insightthreatintelligence.thinkific.com/bundles/tf-analysis" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!f7rH!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 424w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 848w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 1272w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!f7rH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png" width="1066" height="507" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:507,&quot;width&quot;:1066,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:698946,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://insightthreatintelligence.thinkific.com/bundles/tf-analysis&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!f7rH!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 424w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 848w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 1272w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>Our terrorist financing analysis course caters to researchers, intelligence, law enforcement, and compliance professionals, helping them learn about terrorist financing and analyze suspicious patterns to disrupt terrorist activities more effectively. <a href="https://insightthreatintelligence.thinkific.com/bundles/tf-analysis">Sign up </a>today to grow your counter-terrorism expertise.</em> </p><div><hr></div><h4><strong>ADF</strong></h4><p>The Monitoring team also reported an increase in ADF's use of cryptocurrency for financing. They also noted that the ADF now has greater satellite connectivity, enabling the group to convert cryptocurrency into usable funds via mobile money applications and wallets. This capability allows them, even when deep in the bush and in areas outside of conventional cell coverage, to access and covert cryptocurrency to state-issued currency. To read more about ADF financing: </p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;00f0ce86-1803-47dc-b52d-8041f1b60ef4&quot;,&quot;caption&quot;:&quot;The Allied Democratic Forces (ADF) is the most active and violent armed group in the Democratic Republic of the Congo (DRC). Since 2013, the organization has conducted dozens of attacks, killing over 6,000 civilians and causing the displacement of over&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;ISIL-Affiliated Allied Democratic Forces&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:85208154,&quot;name&quot;:&quot;Elena Martynova&quot;,&quot;bio&quot;:&quot;Researching terrorism &quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e88b531d-b106-4c92-8177-62a8a864bde5_2316x2316.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2023-04-06T13:01:46.606Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!bsu5!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbe8bc100-7f81-408b-bfc9-a7a0ee3d6582_1920x1500.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/isil-affiliated-allied-democratic&quot;,&quot;section_name&quot;:&quot;Group Profiles &quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:112927316,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:7,&quot;comment_count&quot;:3,&quot;publication_id&quot;:329102,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!I_1w!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4649d7af-94ce-49ea-8c58-368ec26cd423_900x900.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/p/innovation-at-the-margins-but-continuity?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/p/innovation-at-the-margins-but-continuity?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><h3>ISIL</h3><p>The UN monitoring team assesses that the revenue collection capability of <strong>ISIL in Somalia</strong> has been significantly degraded. While the group continues to generate revenue through its business interests, it can no longer collect revenue in key locations such as Bosasso, Qandala, and Ba&#8217;ad, where security conditions have tightened. The securitization of these areas has disrupted their taxation and extortion activities, constraining their ability to operate as they once did. That said, ISIL-Somalia has been able to draw on <a href="https://newsletter.insightthreatintel.com/p/financing-terrorism-throughout-africa?utm_source=publication-search">residual funds</a>, which have helped sustain the group despite these setbacks.</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;31efd22d-4045-4da0-a349-73d9ff2e3368&quot;,&quot;caption&quot;:&quot;Last week, the US captured ISIL-Somalia&#8217;s finance chief Abdiweli Mohamed Yusuf, along with two others. This capture is highly significant: any kinetic action against high-ranking finance officials helps to disrupt, degrade, and ultimately dismantle financial ecosystems that support terrorist violence.&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;ISIL Finance Chief Captured in Somalia&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:33479672,&quot;name&quot;:&quot;Jessica Davis, PhD&quot;,&quot;bio&quot;:&quot;Jessica Davis is President of Insight Threat Intelligence and is the author of Women in Modern Terrorism: From Liberations Wars to Global Terrorism and the Islamic State (2017), and Illicit Money: Financing Terrorism in the 21st Century (2021).&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e312ae7c-114b-4e4f-9ce1-8bf50ddb7a27_2344x2049.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2025-08-05T13:03:10.604Z&quot;,&quot;cover_image&quot;:&quot;https://images.unsplash.com/photo-1554672723-60f4d5d5074f?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwyMXx8bW9uZXl8ZW58MHx8fHwxNzU0MDYyNDE2fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/isil-finance-chief-captured-in-somalia&quot;,&quot;section_name&quot;:&quot;Financiers&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:169934803,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:8,&quot;comment_count&quot;:0,&quot;publication_id&quot;:329102,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!I_1w!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4649d7af-94ce-49ea-8c58-368ec26cd423_900x900.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p><strong>ISIL-K</strong> has sought to exploit geopolitical flashpoints, including the war in Gaza, to drive fundraising and mobilize support. By framing distant conflicts as part of a broader narrative of global grievance, the group attempts to tap into issues that resonate with potential donors and sympathizers. This reflects a broader adaptation strategy: rather than relying solely on local revenue generation, ISIL-K leverages international events to expand its financial reach and reinforce its relevance within the global jihadist movement.</p><p>At the same time, counterterrorism efforts have disrupted elements of ISIL&#8217;s broader financial architecture. In <strong>Iraq</strong>, authorities dismantled a finance network with connections stretching to C&#244;te d&#8217;Ivoire, Madagascar, and Togo. The geographic spread of this network underscores the transnational character of ISIL&#8217;s facilitation structures and its reliance on dispersed nodes to move and store funds. Disruptions in one theatre, therefore, have ripple effects across regions, illustrating both the network's scope and its potential vulnerability to coordinated action.</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;ab063c8a-bcf6-498a-96fc-db9fd10145ee&quot;,&quot;caption&quot;:&quot;This week, the Combating Terrorism Center (CTC) published my report, &#8220;The Financial Future of the Islamic State,&#8221; which sheds light on this persistent threat's evolving economic strategies. The report delves into how the Islamic State (IS) is adapting its financial operations amidst ongoing global efforts to curb its influence.&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;The Financial Future of the Islamic State&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:33479672,&quot;name&quot;:&quot;Jessica Davis, PhD&quot;,&quot;bio&quot;:&quot;Jessica Davis is President of Insight Threat Intelligence and is the author of Women in Modern Terrorism: From Liberations Wars to Global Terrorism and the Islamic State (2017), and Illicit Money: Financing Terrorism in the 21st Century (2021).&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e312ae7c-114b-4e4f-9ce1-8bf50ddb7a27_2344x2049.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2024-08-15T13:00:26.341Z&quot;,&quot;cover_image&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2990c976-b735-453b-b68d-408ea91d2d16_1899x628.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/the-financial-future-of-the-is&quot;,&quot;section_name&quot;:&quot;Group Profiles &quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:147701825,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:0,&quot;comment_count&quot;:0,&quot;publication_id&quot;:329102,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!I_1w!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4649d7af-94ce-49ea-8c58-368ec26cd423_900x900.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>ISIL-K has also faced setbacks in the digital financial space. The group reportedly lost access to approximately $100,000 in Monero after several individuals were arrested, preventing it from retrieving funds held in associated wallets. In response, it altered its Monero quick response code distributed through its propaganda arm Voice of Khorasan and introduced a new Bitcoin address. This episode highlights both the risks and adaptability associated with cryptocurrency use: while digital assets offer speed and global reach, they also expose groups to technical and operational vulnerabilities when key facilitators are detained.</p><h3>Al Shabaab</h3><p>The report also notes developments concerning <strong>Al-Shabaab</strong> and its relationship with Al-Qaeda in the Arabian Peninsula (AQAP). While financial support from Al-Shabaab to AQAP may have declined, cooperation between the two groups continues. This suggests that even when financial flows fluctuate, operational or strategic ties endure, including those associated with weapons trafficking networks. In the Somali context, this underscores a broader pattern in which terrorist groups adapt to financial pressure but maintain networks that allow them to remain resilient.</p><p>To read more about Al Shabaab financing: </p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;fb52bc5e-08b3-415d-bbe5-46d39b68d235&quot;,&quot;caption&quot;:&quot;Over the last few months, we examined how Al-Shabaab raises funds, how it spends money, the methods it uses to move and store resources, how the group manages its finances, and most recently, how Al-Shabaab conceals the origins and movement of its funds. This is part of our work mapping how terrorist groups finance their activity, and we use our t&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Tracking Terrorist Financing: A Series on Al-Shabaab&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:85208154,&quot;name&quot;:&quot;Elena Martynova&quot;,&quot;bio&quot;:&quot;Researching terrorism &quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e88b531d-b106-4c92-8177-62a8a864bde5_2316x2316.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2025-07-09T13:01:53.689Z&quot;,&quot;cover_image&quot;:&quot;https://images.unsplash.com/reserve/LJIZlzHgQ7WPSh5KVTCB_Typewriter.jpg?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxuZXdzbGV0dGVyfGVufDB8fHx8MTc1MTk5MzYzNXww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/tracking-terrorist-financing-a-series&quot;,&quot;section_name&quot;:&quot;Group Profiles &quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:167383216,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:5,&quot;comment_count&quot;:0,&quot;publication_id&quot;:329102,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!I_1w!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4649d7af-94ce-49ea-8c58-368ec26cd423_900x900.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><h3>Libya</h3><p>In Libya, security services have dismantled at least four cells involved in terrorist financing, migrant and fighter smuggling, and media operations, with links extending to Europe, Iraq, Syria, the Sahel, and East Africa. One of these cells played a logistical role, facilitating operations through smuggling networks and money laundering. The use of smuggling routes and financial crime as enabling mechanisms reflects a pragmatic blending of ideological objectives with criminal enterprise; when one node is disrupted, others can absorb the shock.</p><h3>AQAP &amp; the Houthis</h3><p>At the same time, the threat from Al-Qaeda in the Arabian Peninsula (AQAP) is reportedly growing, driven in part by improved funding streams. AQAP, for instance, has profited from Al Shabaab piracy by receiving a share of payments made by vessels in exchange for transiting through high-risk waters. The group also uses Telegram to solicit funds and connect supporters to financial intermediaries. (This is a form of informal crowdfunding that allows them to access international support networks.) Increased access to resources appears to have strengthened the group&#8217;s operational tempo and capacity, underscoring the persistent relationship between financing and capability. Where funding improves, groups can move beyond subsistence-level activity and reconstitute networks, invest in recruitment, and plan more ambitious operations. This pattern reflects a familiar dynamic: financial resilience often precedes operational resurgence.</p><p>Further complicating the picture, the Houthis reportedly provided AQAP with financial support for a successful attack. This illustrates the fluidity of relationships in conflict environments, where tactical or transactional arrangements can override ideological divides. </p><h2>Conclusions</h2><p>The through line in this report is not dramatic innovation; it is consistency and slow adaptation to counter-terrorist financing measures. Groups are experimenting at the edges, whether through cryptocurrency, satellite internet access, or opportunistic alliances, but their core revenue models remain intact. Taxation, extortion, smuggling, and embedded criminal economies continue to sustain most organizations. Disrupting a wallet address or arresting a facilitator matters, but it rarely dismantles the underlying system. These networks are adaptive by design; when pressure is applied in one area, activity shifts to another.</p><p>Countering this ecosystem is becoming increasingly difficult amid geopolitical fragmentation and strategic distraction. Cooperation on sanctions enforcement, financial intelligence sharing, and capacity-building is more difficult to sustain when alliances are divided and disrupted and multilateral institutions are strained. Terrorist groups, by contrast, exploit these seams: weak governance, contested territories, and inconsistent enforcement all make terrorist groups stronger. As states turn inward or prioritize great-power competition, the space for illicit finance expands. The difficulty of coordinated disruption, combined with enduring funding streams, leaves all of us less safe than we might otherwise be.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Insight Monitor is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><p><em>&#169; 2026 Insight Threat Intelligence Ltd. All Rights Reserved.<br><br>This newsletter and its contents are protected by Canadian copyright law. Except as otherwise provided for under Canadian copyright law, this newsletter and its contents may not be copied, published, distributed, downloaded or otherwise stored in a retrieval system, transmitted or converted, in any form or by any means, electronic or otherwise, without the prior written permission of the copyright owner.</em></p><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-1" href="#footnote-anchor-1" class="footnote-number" contenteditable="false" target="_self">1</a><div class="footnote-content"><p>United Nations Security Council, <em>Thirty-Seventh Report of the Analytical Support and Sanctions Monitoring Team Submitted Pursuant to Resolution 2734 (2024) Concerning ISIL (Da&#8217;esh), Al-Qaida and Associated Individuals and Entities</em>.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-2" href="#footnote-anchor-2" class="footnote-number" contenteditable="false" target="_self">2</a><div class="footnote-content"><p>Our profile of ISGS&#8217;s financing is available through our case studies library: https://insightthreatintelligence.thinkific.com/courses/take/terrorist-financing-case-studies-library/texts/47282318-how-to-access-the-case-studies</p></div></div>]]></content:encoded></item><item><title><![CDATA[Global Terrorism Financing Report]]></title><description><![CDATA[January 2026]]></description><link>https://newsletter.insightthreatintel.com/p/global-terrorism-financing-report-047</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/global-terrorism-financing-report-047</guid><dc:creator><![CDATA[Emelia Connolly]]></dc:creator><pubDate>Thu, 12 Feb 2026 14:01:18 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!jIyV!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F361258c8-bd68-4955-8cb8-63499d5a770f_2000x1125.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Welcome back, Insight Monitor subscribers!</em></p><p><em>This month&#8217;s Global Terrorism Financing Report uncovers networks spanning Gaza to California&#8212;from fake charities funnelling millions to Hamas, Houthi oil smuggling, Hizballah&#8217;s laundering via Canadian auto dealers, Spanish crypto transfers, Russian plots in Lithuania, to Australian lone actors.</em></p><p>Stay a while, have a read, and share with a colleague, and don&#8217;t miss out on our long-read recommendations!</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Insight Monitor is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!jIyV!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F361258c8-bd68-4955-8cb8-63499d5a770f_2000x1125.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!jIyV!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F361258c8-bd68-4955-8cb8-63499d5a770f_2000x1125.jpeg 424w, https://substackcdn.com/image/fetch/$s_!jIyV!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F361258c8-bd68-4955-8cb8-63499d5a770f_2000x1125.jpeg 848w, https://substackcdn.com/image/fetch/$s_!jIyV!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F361258c8-bd68-4955-8cb8-63499d5a770f_2000x1125.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!jIyV!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F361258c8-bd68-4955-8cb8-63499d5a770f_2000x1125.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!jIyV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F361258c8-bd68-4955-8cb8-63499d5a770f_2000x1125.jpeg" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/361258c8-bd68-4955-8cb8-63499d5a770f_2000x1125.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:315388,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://newsletter.insightthreatintel.com/i/186532683?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F361258c8-bd68-4955-8cb8-63499d5a770f_2000x1125.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!jIyV!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F361258c8-bd68-4955-8cb8-63499d5a770f_2000x1125.jpeg 424w, https://substackcdn.com/image/fetch/$s_!jIyV!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F361258c8-bd68-4955-8cb8-63499d5a770f_2000x1125.jpeg 848w, https://substackcdn.com/image/fetch/$s_!jIyV!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F361258c8-bd68-4955-8cb8-63499d5a770f_2000x1125.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!jIyV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F361258c8-bd68-4955-8cb8-63499d5a770f_2000x1125.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h4><strong>Terrorist Financing Analysis</strong></h4><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://insightthreatintelligence.thinkific.com/bundles/tf-analysis" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!f7rH!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 424w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 848w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 1272w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!f7rH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png" width="1066" height="507" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:507,&quot;width&quot;:1066,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:698946,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://insightthreatintelligence.thinkific.com/bundles/tf-analysis&quot;,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!f7rH!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 424w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 848w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 1272w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>Our terrorist financing analysis course caters to researchers, intelligence, law enforcement, and compliance professionals, helping them learn about terrorist financing and analyze suspicious patterns to disrupt terrorist activities more effectively. <a href="https://insightthreatintelligence.thinkific.com/bundles/tf-analysis">Sign up </a>today to grow your counter-terrorism expertise.</em> </p>
      <p>
          <a href="https://newsletter.insightthreatintel.com/p/global-terrorism-financing-report-047">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[A proposal: a strategic mandate for Canada's financial crimes agency]]></title><description><![CDATA[Published in the Globe and Mail]]></description><link>https://newsletter.insightthreatintel.com/p/a-proposal-a-strategic-mandate-for</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/a-proposal-a-strategic-mandate-for</guid><dc:creator><![CDATA[Jessica Davis, PhD]]></dc:creator><pubDate>Tue, 10 Feb 2026 14:02:51 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!HH5B!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd451c279-820b-46d9-9bf1-5937adf93d4e_1490x1810.heic" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>This op-ed was published <a href="https://www.theglobeandmail.com/opinion/article-canadian-financial-crimes-agency/">two weeks ago in the Globe and Mail</a></em>. </p><p><em>Jessica Davis is the president of Insight Threat Intelligence and the author of </em>Illicit Money: Financing Terrorism in the Twenty-First Century<em>. She was consulted by the government of Canada on the development of a new financial crimes agency.</em></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Insight Monitor is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://www.theglobeandmail.com/opinion/article-canadian-financial-crimes-agency/" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!HH5B!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd451c279-820b-46d9-9bf1-5937adf93d4e_1490x1810.heic 424w, https://substackcdn.com/image/fetch/$s_!HH5B!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd451c279-820b-46d9-9bf1-5937adf93d4e_1490x1810.heic 848w, https://substackcdn.com/image/fetch/$s_!HH5B!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd451c279-820b-46d9-9bf1-5937adf93d4e_1490x1810.heic 1272w, https://substackcdn.com/image/fetch/$s_!HH5B!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd451c279-820b-46d9-9bf1-5937adf93d4e_1490x1810.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!HH5B!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd451c279-820b-46d9-9bf1-5937adf93d4e_1490x1810.heic" width="1456" height="1769" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d451c279-820b-46d9-9bf1-5937adf93d4e_1490x1810.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1769,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:197272,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:&quot;https://www.theglobeandmail.com/opinion/article-canadian-financial-crimes-agency/&quot;,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://newsletter.insightthreatintel.com/i/185877694?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd451c279-820b-46d9-9bf1-5937adf93d4e_1490x1810.heic&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!HH5B!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd451c279-820b-46d9-9bf1-5937adf93d4e_1490x1810.heic 424w, https://substackcdn.com/image/fetch/$s_!HH5B!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd451c279-820b-46d9-9bf1-5937adf93d4e_1490x1810.heic 848w, https://substackcdn.com/image/fetch/$s_!HH5B!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd451c279-820b-46d9-9bf1-5937adf93d4e_1490x1810.heic 1272w, https://substackcdn.com/image/fetch/$s_!HH5B!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd451c279-820b-46d9-9bf1-5937adf93d4e_1490x1810.heic 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>In Budget 2025, the Carney government promised to create a Canadian <a href="https://budget.canada.ca/2025/report-rapport/pdf/budget-2025.pdf">Financial Crimes Agency</a>, introducing legislation by the spring of 2026, to address a growing range of financial threats facing Canadians.</p><p>This is not the first time Canadians have heard this promise: a financial crimes agency was promised in the <a href="https://liberal.ca/our-platform/canada-financial-crimes-agency/">Liberal election platform</a> of 2021 and has been in various stages of policy development since that time. Yet Canadians have heard very little about the promised agency, except for Finance Minister Fran&#231;ois-Philippe Champagne&#8217;s promise in the fall of 2025 that it would <a href="https://www.canada.ca/en/department-finance/news/2025/10/minister-champagne-takes-aim-at-financial-scams-and-abuse-announces-anti-fraud-strategy-and-new-financial-crimes-agency.html">tackle sophisticated financial crimes</a>.</p><p>As Canadians face unprecedented levels of sophisticated fraud, ransomware attacks, and geopolitical uncertainty, it&#8217;s time for the government to set an ambitious and clear mandate to protect Canadians and our financial sector.</p><p>Canada is slowly coming to terms with the fact that its once most-valued partner is increasingly unreliable. This is true in the world of trade as much as it is true in the world of security and intelligence.</p><p>The United States has long been an important law-enforcement partner, conducting joint investigations with Canadian police and often taking the lead on terrorist financing or money-laundering investigations. Today, and for the foreseeable future, Canada must prepare to go it alone on critical issues, as the U.S. has recently proven that it can only be relied upon to serve its own immediate and mercurial interests.</p><p>In this context of geopolitical uncertainty, Canada must protect the financial sector and Canadians against a smorgasbord of threats. Top of mind for most Canadians is fraud: many know someone who has been directly targeted by <a href="https://www.theglobeandmail.com/business/article-ontario-serious-fraud-office-increasingly-sophisticated-scams/">sophisticated fraud</a>. These frauds are often perpetrated from abroad, sometimes by people who themselves are victims of human trafficking networks. Money from these schemes is moved swiftly offshore, and often through cryptocurrency. Another threat, ransomware, targets critical infrastructure and services, holding mission-critical data hostage until a ransom is paid. When payments are made to restore services, those payments embolden and strengthen criminals.</p><p>While fraud and ransomware are well-known threats to Canadians, the threat from those seeking to avoid sanctions is quietly stalking our financial system. Historically, enforcement of Canadian sanctions has been <a href="https://www.theglobeandmail.com/business/commentary/article-canada-civil-enforcement-economic-sanctions-russia-ukraine/">spotty at best</a>. In the cryptocurrency era, sanctions evasion through Canada has been supercharged. According to <a href="https://www.trmlabs.com/reports-and-whitepapers/crypto-regulation-and-illicit-finance-in-canada">one report</a>, the Canadian cryptocurrency sector ranks in the top 10 worldwide in terms of exposure to sanctioned entities. This places Canada on the same list as countries such as <a href="https://www.trmlabs.com/reports-and-whitepapers/2024-crypto-adoption-and-illicit-exposure-report">North Korea, Russia, and Iran</a>. Canada needs to take immediate action, or we risk becoming a haven for sanctions evasion.</p><p>Finally, Canada also needs to address the growing issue of professional money laundering networks. These networks of professionals (accountants, lawyers, and business owners) exist to launder the proceeds of a variety of crimes, including drug trafficking and fentanyl production. These professionals create separation between the main crime and the ultimate beneficiary of the money, making it harder to hold criminals accountable. Addressing this issue requires specialized, skilled, and dedicated financial crime professionals.</p><p>The financial sector is a bright beacon in Canada&#8217;s economy. Canada must get smart, innovative, and efficient at combating financial crimes targeting and exploiting the sector.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/p/a-proposal-a-strategic-mandate-for?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/p/a-proposal-a-strategic-mandate-for?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p></p><p>The future Canadian Financial Crimes Agency will face tremendous challenges from the threat environment and from structural issues in this country. In addition to the threats outlined above, the agency will have to spend considerable resources to avoid conflict with other departments, the RCMP, and other police forces. It will also need to engage in horizontal co-ordination across the 13 federal departments and agencies responsible for Canada&#8217;s anti-money laundering regime, as well as with provinces and territories.</p><p>While avoiding conflict and ensuring co-ordination will be important, the future agency will also need serious teeth. It will need considerable powers to collect intelligence and evidence, analyze that information, investigate crimes, and, ideally, to compel, prohibit, sanction, and disclose information as required. The agency will also require a clear reporting and review structure, with actionable objectives and performance metrics.</p><p>A new agency will be expensive, but it will also be a tremendous opportunity for Canada to develop its considerable existing financial investigative capabilities into a world-class agency to fight serious and transnational financial crimes and protect our important financial sector and Canadians.</p><p>A future Financial Crimes Agency needs a focused mandate to address the most pressing threats and robust authorities to carry out this mission.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/p/a-proposal-a-strategic-mandate-for?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/p/a-proposal-a-strategic-mandate-for?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Insight Monitor is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p><em>&#169; 2026 Insight Threat Intelligence Ltd. All Rights Reserved.<br><br>This newsletter and its contents are protected by Canadian copyright law. Except as otherwise provided for under Canadian copyright law, this newsletter and its contents may not be copied, published, distributed, downloaded or otherwise stored in a retrieval system, transmitted or converted, in any form or by any means, electronic or otherwise, without the prior written permission of the copyright owner.</em></p>]]></content:encoded></item><item><title><![CDATA[The Cost of Terror: Financing Behind the Bondi Beach Attack]]></title><description><![CDATA[The antisemitic terrorist attack at Bondi Beach on 14 December 2025 was an unspeakable tragedy that killed 15 people and injured 40, and that investigators believe was motivated at least in part by ISIL. While it&#8217;s still early days and information is relatively sparse, it&#8217;s important to understand how the alleged attackers mobilized to violence, and how they financed the attack. Certainly,]]></description><link>https://newsletter.insightthreatintel.com/p/attack-financing-bondi-beach-2025</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/attack-financing-bondi-beach-2025</guid><dc:creator><![CDATA[Jessica Davis, PhD]]></dc:creator><pubDate>Thu, 05 Feb 2026 14:02:57 GMT</pubDate><enclosure url="https://images.unsplash.com/photo-1551955682-78a3c53ab544?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxMXx8Ym9uZGl8ZW58MHx8fHwxNzY5NDU5NTgzfDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>The <a href="https://www.pm.gov.au/media/press-conference-parliament-house-canberra-23-dec-2025">antisemitic</a> terrorist attack at Bondi Beach on 14 December 2025 was an unspeakable tragedy that killed 15 people and injured 40, and that investigators believe was motivated at least in part by <a href="https://www.abc.net.au/news/2025-12-22/nsw-sydney-bondi-terror-attack-naveed-akram-court-police-facts/106170286">ISIL</a>. While it&#8217;s still early days and information is relatively sparse, it&#8217;s important to understand how the alleged attackers mobilized to violence, and how they financed the attack. Certainly, <a href="https://www.afp.gov.au/news-centre/media-statement/afp-commissioner-krissy-barrett-op-arques-media-conference-statement-20">Operation Arques</a> and the upcoming inquiry will provide some of this insight, but this could take months or years; it&#8217;s important that practitioners in Australia and other countries understand the costs involved in perpetrating this type of attack, how it was financed, and how financial intelligence might have been useful in disrupting it.</p><p>To do that, this Insight Monitor will examine the attack&#8217;s elements, estimate the financing, identify areas for detection (and, if possible, disruption), and compare it with other similar attacks in recent history. Subscribe to read more: </p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Insight Monitor is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>
      <p>
          <a href="https://newsletter.insightthreatintel.com/p/attack-financing-bondi-beach-2025">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Following the Money]]></title><description><![CDATA[Recap of Insight Monitor for January 2026]]></description><link>https://newsletter.insightthreatintel.com/p/following-the-money-d2e</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/following-the-money-d2e</guid><dc:creator><![CDATA[Lisa Niemzyk]]></dc:creator><pubDate>Tue, 03 Feb 2026 14:03:18 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!wRJl!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe73de2cb-ab0b-45e9-8e44-130382136f84_1024x1024.heic" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Hello, <strong>Insight Monitor</strong> subscribers! It has been a busy month here at ITI. We kicked off the year with the introduction of a new dataset on terrorist financing, setting the foundation for deeper analysis of how illicit finance is evolving. Later this week, we will have our analysis of how the 2025 Bondi Beach terrorist attack was financed, and what that means for detecting and disrupting terrorist activity. Be sure to subscribe so you don&#8217;t miss out! </em></p><p>But before we dive in&#8230; Jessica has been busy in the background this month:</p><ul><li><p>She shared her insights in <a href="https://globalnews.ca/news/11641296/toronto-car-dealer-money-laundering-hezbollah/">this Global News article</a> involving a Toronto auto exporter who has been accused of laundering money for Hezbollah. </p><p></p></li><li><p>She provided expert commentary in a <a href="https://www.moneylaunderingbulletin.com/terroristfinancing/harder-than-ever--terrorist-finance-detection-in-alternative-remittance-160851.htm">Money Laundering Bulletin article </a>on how Hawala networks and crypto-enabled transfers are exploited by terrorist groups.</p><p></p></li><li><p>She was the guest speaker in the <em><a href="https://verafin.com/resource/terrorist-financing-detection-tools-tactics-and-real-world-solutions/">Terrorist Financing Detection: Tools, Tactics and Real-World Solutions</a></em><strong><a href="https://verafin.com/resource/terrorist-financing-detection-tools-tactics-and-real-world-solutions/"> </a></strong><a href="https://verafin.com/resource/terrorist-financing-detection-tools-tactics-and-real-world-solutions/">webinar</a> hosted by Nasdaq Verafin. </p></li></ul><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Insight Monitor is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!wRJl!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe73de2cb-ab0b-45e9-8e44-130382136f84_1024x1024.heic" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!wRJl!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe73de2cb-ab0b-45e9-8e44-130382136f84_1024x1024.heic 424w, https://substackcdn.com/image/fetch/$s_!wRJl!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe73de2cb-ab0b-45e9-8e44-130382136f84_1024x1024.heic 848w, https://substackcdn.com/image/fetch/$s_!wRJl!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe73de2cb-ab0b-45e9-8e44-130382136f84_1024x1024.heic 1272w, https://substackcdn.com/image/fetch/$s_!wRJl!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe73de2cb-ab0b-45e9-8e44-130382136f84_1024x1024.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!wRJl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe73de2cb-ab0b-45e9-8e44-130382136f84_1024x1024.heic" width="514" height="514" data-attrs="{&quot;src&quot;:&quot;https://substackcdn.com/image/fetch/$s_!wRJl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe73de2cb-ab0b-45e9-8e44-130382136f84_1024x1024.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:514,&quot;width&quot;:514,&quot;resizeWidth&quot;:514,&quot;bytes&quot;:195723,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!wRJl!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe73de2cb-ab0b-45e9-8e44-130382136f84_1024x1024.heic 424w, https://substackcdn.com/image/fetch/$s_!wRJl!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe73de2cb-ab0b-45e9-8e44-130382136f84_1024x1024.heic 848w, https://substackcdn.com/image/fetch/$s_!wRJl!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe73de2cb-ab0b-45e9-8e44-130382136f84_1024x1024.heic 1272w, https://substackcdn.com/image/fetch/$s_!wRJl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe73de2cb-ab0b-45e9-8e44-130382136f84_1024x1024.heic 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>As always, we published our latest <strong>Global Terrorist Financing Report,</strong> highlighting major developments from the past month.</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;de592369-a2f5-487b-bd68-23ddde51775c&quot;,&quot;caption&quot;:&quot;Happy New Year, Insight Monitor Subscribers! This month, we cover key developments in terrorism financing with stories from Canada, the US, the UK, South America, Africa, India, Pakistan, and more! In December 2025, there was a surge in law enforcement crackdowns across North America and Europe, alongside new sanctions and emerging digital financing methods. Explore how global efforts are evolving to disrupt the financial networks behind terrorism below:&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Global Terrorism Financing Report &quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:313776655,&quot;name&quot;:&quot;Emelia Connolly&quot;,&quot;bio&quot;:null,&quot;photo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!9E-n!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9783d60b-0c55-4a2b-9ccd-a05d4ca26b39_828x828.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2026-01-15T14:01:07.793Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!aPlz!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F30d44883-37d5-44cd-91c4-cf9e211cece8_1639x826.jpeg&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/global-terrorism-financing-report-57c&quot;,&quot;section_name&quot;:&quot;News&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:183393321,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:5,&quot;comment_count&quot;:0,&quot;publication_id&quot;:329102,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!I_1w!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4649d7af-94ce-49ea-8c58-368ec26cd423_900x900.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div><hr></div><h4><strong>Financial Intelligence Sources</strong></h4><p><em>Ready to go beyond the basics of financial intelligence? Our Financial Intelligence Sources course dives deeper, exploring open and closed sources, leaked data, and more. Perfect for researchers, compliance and intelligence professionals, and anyone in a FININT or OSINT role.</em></p><p><em>Join our community, tackle real-world exercises, and gain skills you won&#8217;t find anywhere else. <a href="https://insightthreatintelligence.thinkific.com/courses/FININTSources">Enroll now</a> and take your expertise to the next level!</em></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!XObl!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1a78cc4-2d9c-4beb-92f7-6e7e68d7a117_500x297.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!XObl!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1a78cc4-2d9c-4beb-92f7-6e7e68d7a117_500x297.png 424w, https://substackcdn.com/image/fetch/$s_!XObl!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1a78cc4-2d9c-4beb-92f7-6e7e68d7a117_500x297.png 848w, https://substackcdn.com/image/fetch/$s_!XObl!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1a78cc4-2d9c-4beb-92f7-6e7e68d7a117_500x297.png 1272w, https://substackcdn.com/image/fetch/$s_!XObl!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1a78cc4-2d9c-4beb-92f7-6e7e68d7a117_500x297.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!XObl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1a78cc4-2d9c-4beb-92f7-6e7e68d7a117_500x297.png" width="500" height="297" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d1a78cc4-2d9c-4beb-92f7-6e7e68d7a117_500x297.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:297,&quot;width&quot;:500,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:191906,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://newsletter.insightthreatintel.com/i/186254311?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1a78cc4-2d9c-4beb-92f7-6e7e68d7a117_500x297.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!XObl!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1a78cc4-2d9c-4beb-92f7-6e7e68d7a117_500x297.png 424w, https://substackcdn.com/image/fetch/$s_!XObl!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1a78cc4-2d9c-4beb-92f7-6e7e68d7a117_500x297.png 848w, https://substackcdn.com/image/fetch/$s_!XObl!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1a78cc4-2d9c-4beb-92f7-6e7e68d7a117_500x297.png 1272w, https://substackcdn.com/image/fetch/$s_!XObl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1a78cc4-2d9c-4beb-92f7-6e7e68d7a117_500x297.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h3>Articles </h3><p>This month, we kicked off an 8-part series exploring how Iran uses cryptocurrency to evade sanctions and operate within a broader illicit financial network. We also introduced our <em>Trends in Terrorist Financing 2020-2025 </em>dataset, built from six years of research, which highlights key patterns in how terrorist financing operates. Finally, we examined how digital assets are increasingly used alongside traditional financial systems, the rise of crypto-hawala networks, and the regulatory and intelligence challenges this creates.</p><p>Stay informed with our latest analyses &#8212; explore our newest articles below:</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;2f184a51-af8b-4f2b-99a5-7c391bc93bb0&quot;,&quot;caption&quot;:&quot;This article marks the start of an eight-part series examining how Iran has increasingly relied on cryptocurrency to circumvent international sanctions. These developments unfold against a volatile backdrop: Iran&#8217;s 2025 confrontation with Israel, the ongoing activity of its regional proxy network, and protests driven by corruption, economic hardship (ex&#8230;&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;The Axis of Illicit Finance: Iran&#8217;s Crypto Strategy Explained&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:33479672,&quot;name&quot;:&quot;Jessica Davis, PhD&quot;,&quot;bio&quot;:&quot;Jessica Davis is President of Insight Threat Intelligence and is the author of Women in Modern Terrorism: From Liberations Wars to Global Terrorism and the Islamic State (2017), and Illicit Money: Financing Terrorism in the 21st Century (2021).&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e312ae7c-114b-4e4f-9ce1-8bf50ddb7a27_2344x2049.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2026-01-06T14:00:45.585Z&quot;,&quot;cover_image&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/87b19738-1968-494d-aa46-98d0020cd199_845x486.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/the-axis-of-illicit-finance-irans&quot;,&quot;section_name&quot;:&quot;Financiers&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:183357175,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:7,&quot;comment_count&quot;:0,&quot;publication_id&quot;:329102,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!I_1w!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4649d7af-94ce-49ea-8c58-368ec26cd423_900x900.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;c4581f1d-9868-4cb6-94e5-47ca5e1f850f&quot;,&quot;caption&quot;:&quot;Hello Insight Monitor subscribers! After six years of building, cleaning, and analyzing, I&#8217;m finally ready to share a new dataset that changes the conversation on terrorist financing. This isn&#8217;t just another trends piece. It&#8217;s evidence-driven, assumption-busting research that brings clarity to what&#8217;s actually happening in terrorist finance today. The go&#8230;&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Trends in Terrorist Financing 2020-2025&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:33479672,&quot;name&quot;:&quot;Jessica Davis, PhD&quot;,&quot;bio&quot;:&quot;Jessica Davis is President of Insight Threat Intelligence and is the author of Women in Modern Terrorism: From Liberations Wars to Global Terrorism and the Islamic State (2017), and Illicit Money: Financing Terrorism in the 21st Century (2021).&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e312ae7c-114b-4e4f-9ce1-8bf50ddb7a27_2344x2049.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2026-01-20T14:03:14.363Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!i-Sp!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6bac2d4e-8c1e-47ef-9190-9114500a5a1a_881x479.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/trends-in-terrorist-financing-2020&quot;,&quot;section_name&quot;:&quot;Primers&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:184698854,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:2,&quot;comment_count&quot;:0,&quot;publication_id&quot;:329102,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!I_1w!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4649d7af-94ce-49ea-8c58-368ec26cd423_900x900.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;451732c4-dac6-41d7-9cd5-2515b7daf0dc&quot;,&quot;caption&quot;:&quot;This week, we&#8217;re taking a close look at how terrorists move money. Drawing on our Trends in Terrorist Financing 2020-2025 dataset, we can now say with authority that it wasn&#8217;t just a blip: terrorist financing mostly happens through cryptocurrency now. Have a read to learn about the data behind this bold statement, and what it means for the future of countering the financing of terrorism.&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Beyond Anecdotes: Terrorist Financing Has Moved to Crypto&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:33479672,&quot;name&quot;:&quot;Jessica Davis, PhD&quot;,&quot;bio&quot;:&quot;Jessica Davis is President of Insight Threat Intelligence and is the author of Women in Modern Terrorism: From Liberations Wars to Global Terrorism and the Islamic State (2017), and Illicit Money: Financing Terrorism in the 21st Century (2021).&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e312ae7c-114b-4e4f-9ce1-8bf50ddb7a27_2344x2049.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2026-01-27T14:02:42.231Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!XVkD!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F836c8f86-8059-4837-af36-51b1711467da_548x471.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/beyond-anecdotes-terrorist-financing&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:185090479,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:4,&quot;comment_count&quot;:0,&quot;publication_id&quot;:329102,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!I_1w!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4649d7af-94ce-49ea-8c58-368ec26cd423_900x900.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/p/following-the-money-d2e?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/p/following-the-money-d2e?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p><br>That&#8217;s a wrap for January! See you in February with more analysis and updates. Be sure to subscribe so you don&#8217;t miss out! This is news and analysis you won&#8217;t find anywhere else. </p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/subscribe?"><span>Subscribe now</span></a></p><p><em>&#169; 2026 Insight Threat Intelligence Ltd. All Rights Reserved.<br><br>This newsletter and its contents are protected by Canadian copyright law. Except as otherwise provided for under Canadian copyright law, this newsletter and its contents may not be copied, published, distributed, downloaded or otherwise stored in a retrieval system, transmitted or converted, in any form or by any means, electronic or otherwise, without the prior written permission of the copyright owner.</em></p>]]></content:encoded></item><item><title><![CDATA[Beyond Anecdotes: Terrorist Financing Has Moved to Crypto]]></title><description><![CDATA[Six years of data on terrorist financing proves it]]></description><link>https://newsletter.insightthreatintel.com/p/beyond-anecdotes-terrorist-financing</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/beyond-anecdotes-terrorist-financing</guid><dc:creator><![CDATA[Jessica Davis, PhD]]></dc:creator><pubDate>Tue, 27 Jan 2026 14:02:42 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!XVkD!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F836c8f86-8059-4837-af36-51b1711467da_548x471.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>This week, we&#8217;re taking a close look at how terrorists move money. Drawing on our <a href="https://open.substack.com/pub/insightintel/p/trends-in-terrorist-financing-2020?r=jxl2w&amp;utm_campaign=post&amp;utm_medium=web&amp;showWelcomeOnShare=true">Trends in Terrorist Financing 2020-2025 dataset</a>, we can now say with authority that it wasn&#8217;t just a blip: terrorist financing mostly happens through cryptocurrency now. Have a read to learn about the data behind this bold statement, and what it means for the future of countering the financing of terrorism. </em></p><h3>The Data</h3><p>This research grew out of frustration with claims about &#8220;new&#8221; or &#8220;increasing&#8221; terrorist-financing trends that are made without evidence. To address this, the project built its own empirical foundation by systematically collecting and coding real-world cases of terrorist financing over the past eight years. Each case captures reported financial activity used to support terrorism and is analyzed using a six-part framework that examines how funds are raised, used, moved, stored, managed, and concealed. The approach emphasizes observable activity.</p><p>The data are drawn exclusively from open sources, including media reporting, court documents, and government publications, and are subjected to a multi-stage validation process to ensure consistency and accuracy. The resulting dataset contains more than 21,000 data points across 1,150 cases, coded across 19 variables such as country, group, financing methods, and sources. While collection began in 2018, analysis relies on cases from 2020 onward, when data quality became sufficiently robust. Together, this methodology provides a rare evidence-based foundation for assessing terrorist-financing trends and testing claims about how those activities evolve over time.</p><p>Learn more <a href="https://open.substack.com/pub/insightintel/p/trends-in-terrorist-financing-2020?r=jxl2w&amp;utm_campaign=post&amp;utm_medium=web&amp;showWelcomeOnShare=true">here</a>.</p><h3>When Terrorists Used Banks</h3><p>When <em>Illicit Money</em> was published in 2021, banks remained the primary channel through which terrorists moved money internationally, despite more than two decades of sustained counter-terrorist financing efforts. This persistence reflects a core challenge in CTF: terrorist financing is extraordinarily difficult to detect within the formal financial system. Large organizations such as Hamas and Hizballah have relied on complex front-company networks to obscure illicit activity, while small cells and lone actors typically move modest sums that attract little scrutiny.</p><p>In practice, many terrorist transactions closely resemble ordinary remittances or everyday financial activity, making them hard to distinguish from legitimate flows. The amounts involved are frequently below mandatory reporting thresholds, which vary by jurisdiction but are easily circumvented in the context of terrorist financing. Detection becomes even more challenging when terrorist networks benefit from a trusted insider within a financial institution or affiliated business, further blurring the line between licit and illicit activity.</p><h3>Crypto Enters the Chat</h3><p>Around 2022, a noticeable shift emerged in terrorist financing patterns, with cryptocurrency appearing with increasing frequency across cases. This change intersects with nearly every aspect of my investigative, research, and policy work, reflecting how digital assets have moved from the margins to the mainstream of terrorist money movement. Today, cryptocurrency is present in roughly 8&#8211;12 percent of documented cases and has become the most visible method for moving funds, in part because it dominates in volume and is easier to observe, trace, and publicly report on than many traditional methods like hawala.</p><p>Keep reading to find out how we know this, and what it means for the future of counterterrorist financing: </p><h4><strong>Financial Intelligence Fundamentals</strong></h4><p><em>Do you want to learn more about financial intelligence and how to use it in research, investigations, and analysis? Our financial intelligence fundamentals course is for you! This course is perfect for people new to financial intelligence and seasoned professionals. <a href="https://insightthreatintelligence.thinkific.com/courses/introFININT">Enroll today</a></em></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://insightthreatintelligence.thinkific.com/courses/introFININT" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!8tvZ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png 424w, https://substackcdn.com/image/fetch/$s_!8tvZ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png 848w, https://substackcdn.com/image/fetch/$s_!8tvZ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png 1272w, https://substackcdn.com/image/fetch/$s_!8tvZ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!8tvZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png" width="905" height="496" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:496,&quot;width&quot;:905,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:731766,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://insightthreatintelligence.thinkific.com/courses/introFININT&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!8tvZ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png 424w, https://substackcdn.com/image/fetch/$s_!8tvZ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png 848w, https://substackcdn.com/image/fetch/$s_!8tvZ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png 1272w, https://substackcdn.com/image/fetch/$s_!8tvZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div>
      <p>
          <a href="https://newsletter.insightthreatintel.com/p/beyond-anecdotes-terrorist-financing">
              Read more
          </a>
      </p>
   ]]></content:encoded></item></channel></rss>