<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Insight Monitor: Research Reads]]></title><description><![CDATA[A critical review of recent research in areas of illicit financing, distilling the "so what" and evidence base of research. ]]></description><link>https://newsletter.insightthreatintel.com/s/research-reads</link><image><url>https://substackcdn.com/image/fetch/$s_!I_1w!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4649d7af-94ce-49ea-8c58-368ec26cd423_900x900.png</url><title>Insight Monitor: Research Reads</title><link>https://newsletter.insightthreatintel.com/s/research-reads</link></image><generator>Substack</generator><lastBuildDate>Thu, 14 May 2026 08:05:57 GMT</lastBuildDate><atom:link href="https://newsletter.insightthreatintel.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Jessica Davis]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[jmd@insightthreatintel.com]]></webMaster><itunes:owner><itunes:email><![CDATA[jmd@insightthreatintel.com]]></itunes:email><itunes:name><![CDATA[Jessica Davis, PhD]]></itunes:name></itunes:owner><itunes:author><![CDATA[Jessica Davis, PhD]]></itunes:author><googleplay:owner><![CDATA[jmd@insightthreatintel.com]]></googleplay:owner><googleplay:email><![CDATA[jmd@insightthreatintel.com]]></googleplay:email><googleplay:author><![CDATA[Jessica Davis, PhD]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Chokepoints: How the Global Economy Becomes a Weapon of War]]></title><description><![CDATA[The Insight Monitor Book Club]]></description><link>https://newsletter.insightthreatintel.com/p/chokepoints-how-the-global-economy</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/chokepoints-how-the-global-economy</guid><dc:creator><![CDATA[Jessica Davis, PhD]]></dc:creator><pubDate>Tue, 21 Oct 2025 13:02:01 GMT</pubDate><enclosure url="https://images.unsplash.com/photo-1495446815901-a7297e633e8d?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw2fHxib29rJTIwY2x1YnxlbnwwfHx8fDE3NTk1MDI1NTJ8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Hello, <strong>Insight Monitor</strong> subscribers. Welcome to a new <strong>research reads </strong>review. In this series, we review and summarize recent research in illicit financing, highlighting new data, insights, or findings that can inform how we counter this threat. I hope you find this insightful, and if you want to suggest a book or article for review, let us know in the survey. (Thank you to those who have already replied &#8212; I&#8217;ve updated our criteria for this newsletter segment to include your suggestions.) As always, please read and share this with colleagues who might be interested. Thanks for caring about illicit finance and international security!</em></p><p><em>~Jess</em></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Insight Monitor is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h3></h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://images.unsplash.com/photo-1495446815901-a7297e633e8d?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw2fHxib29rJTIwY2x1YnxlbnwwfHx8fDE3NTk1MDI1NTJ8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://images.unsplash.com/photo-1495446815901-a7297e633e8d?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw2fHxib29rJTIwY2x1YnxlbnwwfHx8fDE3NTk1MDI1NTJ8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1495446815901-a7297e633e8d?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw2fHxib29rJTIwY2x1YnxlbnwwfHx8fDE3NTk1MDI1NTJ8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1495446815901-a7297e633e8d?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw2fHxib29rJTIwY2x1YnxlbnwwfHx8fDE3NTk1MDI1NTJ8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1495446815901-a7297e633e8d?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw2fHxib29rJTIwY2x1YnxlbnwwfHx8fDE3NTk1MDI1NTJ8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1456w" sizes="100vw"><img src="https://images.unsplash.com/photo-1495446815901-a7297e633e8d?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw2fHxib29rJTIwY2x1YnxlbnwwfHx8fDE3NTk1MDI1NTJ8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" width="6000" height="4000" data-attrs="{&quot;src&quot;:&quot;https://images.unsplash.com/photo-1495446815901-a7297e633e8d?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw2fHxib29rJTIwY2x1YnxlbnwwfHx8fDE3NTk1MDI1NTJ8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:4000,&quot;width&quot;:6000,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;book lot on table&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="book lot on table" title="book lot on table" srcset="https://images.unsplash.com/photo-1495446815901-a7297e633e8d?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw2fHxib29rJTIwY2x1YnxlbnwwfHx8fDE3NTk1MDI1NTJ8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1495446815901-a7297e633e8d?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw2fHxib29rJTIwY2x1YnxlbnwwfHx8fDE3NTk1MDI1NTJ8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1495446815901-a7297e633e8d?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw2fHxib29rJTIwY2x1YnxlbnwwfHx8fDE3NTk1MDI1NTJ8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1495446815901-a7297e633e8d?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw2fHxib29rJTIwY2x1YnxlbnwwfHx8fDE3NTk1MDI1NTJ8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/@tomhermans">Tom Hermans</a> on <a href="https://unsplash.com">Unsplash</a></figcaption></figure></div><h3>Review: Edward Fishman, <em>Chokepoints: How the Global Economy Became a Weapon of War </em>(Elliott &amp; Thompson Limited, 2025).</h3><p></p><h5><strong>BLUF:</strong> <em>Chokepoints</em> argues that in the 21st century, the US has leveraged control over key economic domains, such as the US dollar, global financial networks, and advanced technology supply chains, into powerful tools of geopolitical influence. The book examines how US administrations have employed tools such as sanctions and export controls to coerce rivals like Russia, China, and Iran, and through these coercive measures, have reshaped global power dynamics without resorting to traditional military force. The book also includes a stark warning: that economic interdependence will continue to unravel, making these tools less impactful.</h5><p></p><p><strong>Author Info:</strong> Edward Fishman is an international relations scholar and a former U.S. diplomat. He&#8217;s currently a Senior Research Scholar at Columbia University&#8217;s Center on Global Energy Policy and teaches as an Adjunct Professor at the School of International and Public Affairs. He holds fellowships at both the Center for a New American Security and the Atlantic Council.</p><h3>Brief Summary</h3><p> In <em>Chokepoints</em>, Fishman shows how today&#8217;s scramble for economic security is redrawing the global map and pushing us toward the end of globalization as we&#8217;ve known it. The roots of this shift can be traced back to the Bretton Woods system established after World War II, when fixed exchange rates and the US dollar&#8217;s convertibility into gold solidified the dollar as the world&#8217;s reserve currency. Even after Nixon suspended the dollar&#8217;s link to gold, the financial interdependence born at Bretton Woods endured, giving Washington unprecedented leverage over the global economy. This legacy of dollar dominance created the very chokepoints that now empower US economic warfare, but also expose the vulnerabilities that could unravel globalization in the decades ahead.</p><p>The US has weaponized its dominance over the dollar and global financial networks, turning sanctions, export controls, and other economic tools into instruments of statecraft by controlling access to the US dollar, markets, and financial systems. This has created a new geopolitical divide: countries that fear US economic warfare and try to insulate themselves from it, those more concerned about China&#8217;s growing ability to wield economic weapons, and a third camp of &#8220;swing states&#8221; seeking to straddle both worlds, which are at once influential and vulnerable.</p><p>Fishman also raises a warning: chokepoints that empower US economic warfare are becoming glaring vulnerabilities for the global economy itself. The unravelling of economic interdependence could push the world into divided blocs, peaceful for now but less stable in the long run. He argues that the US must professionalize its approach to economic warfare, including by building institutional expertise, developing training programs, and even offering academic courses devoted to the subject, if it wants to sustain its advantage. (This advice would be well-heeded even for middle powers that find themselves in influential blocs like the G7 and seek to wield economic power through sanctions.)</p><p>Interestingly, Fishman looks to the future of sanctions and export controls, suggesting that they could be applied to global challenges such as climate change or AI governance, given the US&#8217;s leverage over finance and advanced technologies. While this suggestion feels divorced from our current reality (where we are all trying to survive the transition of the US into a belligerent and unpredictable autocracy), as we settle into our new reality, it is good advice for those looking to do more than just survive, but also shape the future of humanity.</p><div><hr></div><h4><strong>Financial Intelligence Fundamentals</strong></h4><p><em>Do you want to learn more about financial intelligence and how to use it in research, investigations, and analysis? Our financial intelligence fundamentals course is for you! This course is perfect for people new to financial intelligence and seasoned professionals. <a href="https://insightthreatintelligence.thinkific.com/courses/introFININT">Enroll today</a></em></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://insightthreatintelligence.thinkific.com/courses/introFININT" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!8tvZ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png 424w, https://substackcdn.com/image/fetch/$s_!8tvZ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png 848w, https://substackcdn.com/image/fetch/$s_!8tvZ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png 1272w, https://substackcdn.com/image/fetch/$s_!8tvZ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!8tvZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png" width="905" height="496" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:496,&quot;width&quot;:905,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:731766,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://insightthreatintelligence.thinkific.com/courses/introFININT&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!8tvZ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png 424w, https://substackcdn.com/image/fetch/$s_!8tvZ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png 848w, https://substackcdn.com/image/fetch/$s_!8tvZ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png 1272w, https://substackcdn.com/image/fetch/$s_!8tvZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><p>Fishman frames an &#8220;impossible trinity&#8221; of economic interdependence, economic security, and geopolitical competition: only two can coexist, and the likely outcome is a fragmented global economy where great power rivalry persists, with the risk that, in the absence of viable economic tools, conflict could return to the battlefield.</p><p>While the book, written before Trump&#8217;s return to office, does not account for Trump&#8217;s application of sanctions and tariffs against allies, international institutions, and even ICC judges, and how this risks accelerating the decline of US economic power. However, it is prescient in that Fishman rightly points out that measures that instrumentalize the dollar for overtly political ends might undermine the dollar&#8217;s role as the reserve currency. He also notes that China&#8217;s efforts to promote alternatives, such as the digital renminbi, have so far struggled to gain traction (for now).</p><p><strong>Methods:</strong> This book differs from our usual <em>Research Reads</em> in that it&#8217;s a popular book, rather than an academic one. It traces the historical evolution of economic warfare through the lens of the US and its allies.</p><h4>Who Should Read this book</h4><p>This is a well-written, engaging history of US economic warfare. It&#8217;s a must-read for anyone interested in the future of conflict and how economics and finance shape the battlefield.</p><p><strong>Other references:</strong> This book should be read in conjunction with Daniel W. Drezner et al., eds., <em>The Uses and Abuses of Weaponized Interdependence</em> (Brookings Institution Press, 2021).</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/p/chokepoints-how-the-global-economy?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/p/chokepoints-how-the-global-economy?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p></p><p><em>&#169; 2025 Insight Threat Intelligence Ltd. All Rights Reserved.<br><br>This newsletter and its contents are protected by Canadian copyright law. Except as otherwise provided for under Canadian copyright law, this newsletter and its contents may not be copied, published, distributed, downloaded or otherwise stored in a retrieval system, transmitted or converted, in any form or by any means, electronic or otherwise, without the prior written permission of the copyright owner.</em></p>]]></content:encoded></item><item><title><![CDATA[Is left-wing terrorism on the rise in the US? ]]></title><description><![CDATA[And how does this compare to trends in Canada?]]></description><link>https://newsletter.insightthreatintel.com/p/is-left-wing-terrorism-on-the-rise</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/is-left-wing-terrorism-on-the-rise</guid><dc:creator><![CDATA[Jessica Davis, PhD]]></dc:creator><pubDate>Fri, 26 Sep 2025 11:26:48 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!VZ0d!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76ebc23f-51b9-4e0c-a897-664bf6dc42b4_2548x1430.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Hello, <strong>Insight Monitor</strong> subscribers, and welcome to a special edition of the newsletter where, on a Friday morning, I woke up and chose data. I hope you enjoy this discussion of terrorism threat levels in Canada and the US!</em></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Insight Monitor is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>This week, my friend and colleague Dan Byman and his coauthor Riley McCabe produced an <a href="https://apple.news/AmXJelWIRSiG-lBPEN0IN8g">Atlantic article</a> and an accompanying <a href="https://www.csis.org/analysis/left-wing-terrorism-and-political-violence-united-states-what-data-tells-us">CSIS report on left-wing terrorism</a> in the United States. It generated a significant uproar, as I&#8217;m sure many can imagine. (I had to limit my interactions on Bluesky as a result. Don&#8217;t let anyone ever tell you that only X has an echo chamber or political ideology problem.) </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://www.csis.org/analysis/left-wing-terrorism-and-political-violence-united-states-what-data-tells-us#h2-definitions" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!VZ0d!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76ebc23f-51b9-4e0c-a897-664bf6dc42b4_2548x1430.png 424w, https://substackcdn.com/image/fetch/$s_!VZ0d!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76ebc23f-51b9-4e0c-a897-664bf6dc42b4_2548x1430.png 848w, https://substackcdn.com/image/fetch/$s_!VZ0d!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76ebc23f-51b9-4e0c-a897-664bf6dc42b4_2548x1430.png 1272w, https://substackcdn.com/image/fetch/$s_!VZ0d!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76ebc23f-51b9-4e0c-a897-664bf6dc42b4_2548x1430.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!VZ0d!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76ebc23f-51b9-4e0c-a897-664bf6dc42b4_2548x1430.png" width="1456" height="817" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/76ebc23f-51b9-4e0c-a897-664bf6dc42b4_2548x1430.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:817,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:4845030,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://www.csis.org/analysis/left-wing-terrorism-and-political-violence-united-states-what-data-tells-us#h2-definitions&quot;,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://newsletter.insightthreatintel.com/i/174604699?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76ebc23f-51b9-4e0c-a897-664bf6dc42b4_2548x1430.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!VZ0d!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76ebc23f-51b9-4e0c-a897-664bf6dc42b4_2548x1430.png 424w, https://substackcdn.com/image/fetch/$s_!VZ0d!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76ebc23f-51b9-4e0c-a897-664bf6dc42b4_2548x1430.png 848w, https://substackcdn.com/image/fetch/$s_!VZ0d!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76ebc23f-51b9-4e0c-a897-664bf6dc42b4_2548x1430.png 1272w, https://substackcdn.com/image/fetch/$s_!VZ0d!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76ebc23f-51b9-4e0c-a897-664bf6dc42b4_2548x1430.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Now, the first thing I want to note is the headlines about this article. I don&#8217;t know if the authors wrote the Atlantic headline, but it&#8217;s a bit misleading. It says &#8220;left wing terrorism is on the rise&#8221;. Is it? The Washington Post does a fair bit better with the headline &#8220;<a href="https://www.washingtonpost.com/nation/2025/09/25/political-violence-leftist-right-wing/">Left-wing actors responsible for more attacks this year</a>&#8230;&#8221;. This, from what I&#8217;ve seen of the data, the second headline is more accurate.  </p><p>Those not steeped in data might wonder what point I&#8217;m making, so let me explain. </p><p>The authors collect data from January 1, 1994, to July 1, 2025 and categorize attacks and plots as left and right wing, as well as jihadist and ethnonationalist. This is standard practice: We all make categorization and coding decisions to enable our analysis. The authors are transparent with how they do this, and also note that some attacks defied categorization. (Also normal). You can definitely disagree with coding decisions. In fact, it&#8217;s encouraged! Reproducibility is an essential part of the scientific process, so having someone else review your data, recode it, and rerun the analysis can yield truly interesting results. Do they get something similar? Your data, theory, and explanations are robust. Do they get something different? Also interesting and requires investigation! </p><p>The authors collected 750 terrorist incidents during this time frame. This is a pretty robust sample. (Remember: terrorism tends to be a small data problem, unlike general crime.) Their data appears to show an increase in left-wing terrorism attacks and plots over this time (Figure 1). I say &#8216;appears&#8217; because there are no tests for statistical significance noted in the analysis. When I recreated the data and ran tests for statistical significance at 5 and 10-year intervals, there was none. (This means left-wing terrorism is actually stable over time, not increasing.) I didn&#8217;t include the first half of 2025 in my analysis because I don&#8217;t have data intervals for half years. </p><p>Does that mean that the author&#8217;s data and conclusions are wrong? Not quite. I just think they&#8217;re premature. 2025 might well be a turning point in the data, but it&#8217;s too soon to say. (Hence why the second headline is better written than the first.) </p><p>I would also say that the authors&#8217; discussion of terrorist incidents, motivation, and the changing political landscape is really good. The only thing I would change is how they characterize the change (or rather, the lack of change) in the number of left-wing attacks, and add tests for statistical significance. </p><h3>How does this compare to Canada? </h3><p>Canada and the US tend to have terrorism trends that reflect each other (or rather, Canada tends to lag the US&#8217;s overall trend). In Canada, you can see a significant spike in ideologically motivated terrorist attacks in 2017, illustrated in the graph below. Interestingly, this is equal parts attacks from right-wing and left-wing terrorism. (I had to re-code my data to match the authors' definitions, because IMVE terrorism in Canada is both right and left.) </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!XDvL!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F05c7ca64-fa17-419e-9686-e2d7e87d5371_1024x768.heic" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!XDvL!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F05c7ca64-fa17-419e-9686-e2d7e87d5371_1024x768.heic 424w, https://substackcdn.com/image/fetch/$s_!XDvL!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F05c7ca64-fa17-419e-9686-e2d7e87d5371_1024x768.heic 848w, https://substackcdn.com/image/fetch/$s_!XDvL!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F05c7ca64-fa17-419e-9686-e2d7e87d5371_1024x768.heic 1272w, https://substackcdn.com/image/fetch/$s_!XDvL!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F05c7ca64-fa17-419e-9686-e2d7e87d5371_1024x768.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!XDvL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F05c7ca64-fa17-419e-9686-e2d7e87d5371_1024x768.heic" width="1024" height="768" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/05c7ca64-fa17-419e-9686-e2d7e87d5371_1024x768.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:768,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:44930,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://newsletter.insightthreatintel.com/i/174604699?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F05c7ca64-fa17-419e-9686-e2d7e87d5371_1024x768.heic&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!XDvL!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F05c7ca64-fa17-419e-9686-e2d7e87d5371_1024x768.heic 424w, https://substackcdn.com/image/fetch/$s_!XDvL!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F05c7ca64-fa17-419e-9686-e2d7e87d5371_1024x768.heic 848w, https://substackcdn.com/image/fetch/$s_!XDvL!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F05c7ca64-fa17-419e-9686-e2d7e87d5371_1024x768.heic 1272w, https://substackcdn.com/image/fetch/$s_!XDvL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F05c7ca64-fa17-419e-9686-e2d7e87d5371_1024x768.heic 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;176d5a2f-8dbd-41ae-ab79-006d492e5deb&quot;,&quot;caption&quot;:&quot;The terrorist attack in New Orleans this year has reignited the discussion about terrorism in the US, and, by extension, Canada. Some media outlets have talked about the return of ISIL (they never went away), while some experts have talked about the&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Terror on the Rise: What the increase in terrorism charges in Canada can tell us about the threat&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:33479672,&quot;name&quot;:&quot;Jessica Davis, PhD&quot;,&quot;bio&quot;:&quot;Jessica Davis is President of Insight Threat Intelligence and is the author of Women in Modern Terrorism: From Liberations Wars to Global Terrorism and the Islamic State (2017), and Illicit Money: Financing Terrorism in the 21st Century (2021).&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e312ae7c-114b-4e4f-9ce1-8bf50ddb7a27_2344x2049.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100},{&quot;id&quot;:2410581,&quot;name&quot;:&quot;Brett Williams&quot;,&quot;bio&quot;:&quot;Librarian. Skeptic. Geek.&quot;,&quot;photo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1102bdc4-37a8-49b2-a1b6-69f7d3df8ba6_2946x2104.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2025-01-08T13:27:55.415Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fceb5244d-2b96-443e-9b83-0bb1917cece6_1024x768.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/terror-on-the-rise-what-the-increase&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:154292004,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:9,&quot;comment_count&quot;:0,&quot;publication_id&quot;:329102,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!I_1w!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4649d7af-94ce-49ea-8c58-368ec26cd423_900x900.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>Since 2017, however, there have only been two left-wing terrorist attacks in Canada.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a> All the other IMVE attacks have been right-wing. </p><p>So, to compare these data with the US, I&#8217;d say that Canada has seen a sharp drop-off in left-wing terrorism, while the US&#8217;s experience has been steadier. However, like the US, Canada has seen a significant rise in right-wing terrorism. The question is: will this trend persist? </p><p>Again, it&#8217;s worth reflecting on the authors&#8217; discussion to understand the challenges facing both countries and anticipate what we might expect from terrorism in this country. </p><div class="pullquote"><p>&#8220;&#8230;widespread polarization and misperceptions that the other side is far more violent than it actually is creates a dangerous environment where extremists can more easily rationalize using violence. Growth in even a tiny minority who are willing to commit partisan violence has the potential for tremendous consequences considering the combustible political climate in the United States and the fact that symbolic and strategically important political leaders are among the potential targets.&#8221;</p></div><p>We should read this as a warning. Polarization and mis and disinformation fan the flames of extremism, and can increase the pool of people who are willing to commit violence for their beliefs &#8212; regardless of their ideology or political affiliation. I would also add that violence tends to beget violence, so when one group becomes more violent, it can also spark a backlash from other groups. </p><p>That&#8217;s all I have time for this morning, but if you want to see a more robust comparative analysis between Dan&#8217;s data and my Canadian data, and a discussion of those results, let me know. (And don&#8217;t forget to upgrade to paid to support this type of analysis!)</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/subscribe?"><span>Subscribe now</span></a></p><p></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://insightthreatintelligence.thinkific.com/bundles/tf-analysis" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!f7rH!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 424w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 848w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 1272w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!f7rH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png" width="1066" height="507" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:507,&quot;width&quot;:1066,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:698946,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://insightthreatintelligence.thinkific.com/bundles/tf-analysis&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!f7rH!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 424w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 848w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 1272w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><p>Our terrorist financing analysis course caters to researchers, intelligence, law enforcement, and compliance professionals to help them learn about terrorist financing, and analyze suspicious patterns and activities more effectively. Sign up today!</p><div><hr></div><p>Thanks for reading! If you found this insightful, please share it with a friend. </p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/p/is-left-wing-terrorism-on-the-rise?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/p/is-left-wing-terrorism-on-the-rise?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p></p><p><em>&#169; 2025 Insight Threat Intelligence Ltd. All Rights Reserved.<br><br>This newsletter and its contents are protected by Canadian copyright law. Except as otherwise provided for under Canadian copyright law, this newsletter and its contents may not be copied, published, distributed, downloaded or otherwise stored in a retrieval system, transmitted or converted, in any form or by any means, electronic or otherwise, without the prior written permission of the copyright owner.</em></p><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-1" href="#footnote-anchor-1" class="footnote-number" contenteditable="false" target="_self">1</a><div class="footnote-content"><p>These were two anarchist incidents in Montreal (IYKYK): https://www.lapresse.ca/actualites/justice-et-faits-divers/faits-divers/201711/28/01-5145123-des-anarchistes-revendiquent-une-attaque-contre-le-president-de-junex.php and https://www.ctvnews.ca/montreal/article/arson-squad-investigating-after-a-dozen-police-cars-torched-overnight/</p></div></div>]]></content:encoded></item><item><title><![CDATA[Digital Dark Money: A Critical Review of Terrorist Financing via Cryptocurrency]]></title><description><![CDATA[Edition 4 of the Research Reads Bookclub]]></description><link>https://newsletter.insightthreatintel.com/p/digital-dark-money-a-critical-review</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/digital-dark-money-a-critical-review</guid><dc:creator><![CDATA[Jessica Davis, PhD]]></dc:creator><pubDate>Tue, 18 Feb 2025 14:01:55 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!dfhV!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F733a8595-2af2-4b4c-9415-871b2132bd51_1792x1024.heic" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Hello, <strong>Insight Monitor</strong> subscribers. Welcome to another week and a new <strong>research reads </strong>review. In this series, we review and summarize recent research in illicit financing, highlighting new data, insights, or findings that can inform how we counter this threat. I hope you find this insightful, and if you want to suggest a book or article for review, let us know in the survey. (Thank you to those who have already replied &#8212; I&#8217;ve updated our criteria for this newsletter segment to include your suggestions.) As always, please read and share this with colleagues who might be interested. Thanks for caring about illicit finance and international security!</em></p><p><em>~Jess</em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/survey/42595&quot;,&quot;text&quot;:&quot;Research Reads Survey&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/survey/42595"><span>Research Reads Survey</span></a></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Insight Monitor is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!dfhV!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F733a8595-2af2-4b4c-9415-871b2132bd51_1792x1024.heic" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!dfhV!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F733a8595-2af2-4b4c-9415-871b2132bd51_1792x1024.heic 424w, https://substackcdn.com/image/fetch/$s_!dfhV!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F733a8595-2af2-4b4c-9415-871b2132bd51_1792x1024.heic 848w, https://substackcdn.com/image/fetch/$s_!dfhV!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F733a8595-2af2-4b4c-9415-871b2132bd51_1792x1024.heic 1272w, https://substackcdn.com/image/fetch/$s_!dfhV!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F733a8595-2af2-4b4c-9415-871b2132bd51_1792x1024.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!dfhV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F733a8595-2af2-4b4c-9415-871b2132bd51_1792x1024.heic" width="494" height="282.2857142857143" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/733a8595-2af2-4b4c-9415-871b2132bd51_1792x1024.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:832,&quot;width&quot;:1456,&quot;resizeWidth&quot;:494,&quot;bytes&quot;:466706,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!dfhV!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F733a8595-2af2-4b4c-9415-871b2132bd51_1792x1024.heic 424w, https://substackcdn.com/image/fetch/$s_!dfhV!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F733a8595-2af2-4b4c-9415-871b2132bd51_1792x1024.heic 848w, https://substackcdn.com/image/fetch/$s_!dfhV!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F733a8595-2af2-4b4c-9415-871b2132bd51_1792x1024.heic 1272w, https://substackcdn.com/image/fetch/$s_!dfhV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F733a8595-2af2-4b4c-9415-871b2132bd51_1792x1024.heic 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Image created by OpenAI</figcaption></figure></div><p>Don&#8217;t forget to <a href="https://insightthreatintelligence.thinkific.com/collections">check out our courses</a>! We have a growing selection of learning products to choose from, from financial intelligence investigations to terrorist financing analysis. We also have a dedicated financial intelligence community where you can ask questions and learn from your students, and of course, get expert help from me:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://insightthreatintelligence.thinkific.com/collections" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!auNr!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe1db4afc-53c1-4f83-8960-8e89500cc9c0_1057x754.png 424w, https://substackcdn.com/image/fetch/$s_!auNr!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe1db4afc-53c1-4f83-8960-8e89500cc9c0_1057x754.png 848w, https://substackcdn.com/image/fetch/$s_!auNr!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe1db4afc-53c1-4f83-8960-8e89500cc9c0_1057x754.png 1272w, https://substackcdn.com/image/fetch/$s_!auNr!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe1db4afc-53c1-4f83-8960-8e89500cc9c0_1057x754.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!auNr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe1db4afc-53c1-4f83-8960-8e89500cc9c0_1057x754.png" width="1057" height="754" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e1db4afc-53c1-4f83-8960-8e89500cc9c0_1057x754.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:754,&quot;width&quot;:1057,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:442221,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://insightthreatintelligence.thinkific.com/collections&quot;,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!auNr!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe1db4afc-53c1-4f83-8960-8e89500cc9c0_1057x754.png 424w, https://substackcdn.com/image/fetch/$s_!auNr!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe1db4afc-53c1-4f83-8960-8e89500cc9c0_1057x754.png 848w, https://substackcdn.com/image/fetch/$s_!auNr!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe1db4afc-53c1-4f83-8960-8e89500cc9c0_1057x754.png 1272w, https://substackcdn.com/image/fetch/$s_!auNr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe1db4afc-53c1-4f83-8960-8e89500cc9c0_1057x754.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3>Review: Maria Jofre, Alberto Aziani, and Edoardo Villa, &#8220;Terrorist Financing: Traditional vs. Emerging Financial Technologies,&#8221; <em>Terrorism and Political Violence</em> 0, no. 0 (n.d.): 1&#8211;14, <a href="https://doi.org/10.1080/09546553.2024.2433635">https://doi.org/10.1080/09546553.2024.2433635</a>.</h3><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/p/digital-dark-money-a-critical-review?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/p/digital-dark-money-a-critical-review?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><h5>BLUF: Between 2010 and 2020, terrorists primarily used traditional methods to finance their activities (such as banks, hawalas, and high-value goods). Cryptocurrency only accounted for 4% of terrorist financing activity.</h5><p></p><p><strong>Author info:</strong> Maria Jofre is a data analyst at <a href="https://www.openownership.org/en/">Open Ownership</a> and academic. Alberto Aziani is an Associate Professor of Sociology of Law and Deviance at the Department of Sociology and Social Research at the University of Milano-Bicocca. Edoardo Villa is a Consultant in Governance Risk &amp; Compliance - Financial Services at KPMG Advisory S.p.A.</p><h3>Brief Summary </h3><p>This study highlights the need to expand research on how terrorists use technology to facilitate financing and the associated threats and risks. Contributing empirical research, this article aims to bridge the gap in understanding the evolving methodologies employed by terrorist financiers. Such research is critical to helping institutions strengthen their capacity to counter terrorist financing by developing a deeper, evidence-based understanding of the modus operandi of those who finance terrorism.</p><p>Specifically, this study empirically assesses the financial technologies and methods used by terrorist financiers to transfer funds within and between organizations, focusing on capital movement rather than fund generation. The findings reveal that while there is increasing attention on emerging technologies like cryptocurrencies, terrorist financiers continue to rely predominantly on traditional methods of transferring money. </p><p><strong>Methods: </strong>The study's methods relied on a comprehensive analysis of data from the LexisNexis WorldCompliance dataset, which initially identified over 90,000 records. Through a rigorous screening process based on eligibility criteria&#8212;such as sufficient information, deduplication, relevance of sources, and confirmation of terrorist financing methods&#8212;this dataset was refined to include 121 cases of terrorist financing occurring between 2010 and 2020. The researchers adopted a frequentist approach, leveraging keyword-based quantitative analysis and in-depth qualitative analysis.</p><p>To assess the robustness of the data, the authors compared general trends in the dataset with the Global Terrorism Index, finding alignment in temporal patterns and peaks, which the authors say supports the reliability of the data over time. The analysis revealed the following breakdown of methods: 54% of cases involved the banking system, 24% used legal entities, 24% relied on hawala systems, 22% engaged high-value commodities, 14% involved money transfer services, while newer technologies like cryptocurrencies, internet payment systems, and e-commerce platforms accounted for 4%, 4%, and 2% of cases, respectively.</p><p>The study acknowledges limitations in the dataset, including potential underreporting, an incomplete picture of the prevalence of terrorist financing methods, and the likelihood that emerging trends or technologies might not yet be fully captured due to data lag. These limitations underscore the need for ongoing research to provide a more comprehensive understanding of terrorist financing patterns.</p><p>Interestingly, in my book <em><a href="https://www.rienner.com/title/Illicit_Money_Financing_Terrorism_in_the_Twenty_First_Century">Illicit Money</a></em> (released in 2021 and based on data up to 2020), I found very similar results. I found that 38% of cases involved the banking system, 19% relied on money service businesses, 22% used high-value commodities and/or trade-based movement, 24% relied on hawala, and 6% relied on cryptocurrency transfers. <a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a></p><p>However, my recent work suggests that cryptocurrency use has increased significantly since 2021. </p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;e2a3ba0b-f50b-49af-a459-7ad97320fcee&quot;,&quot;caption&quot;:&quot;Hello, Insight Monitor subscribers! I&#8217;m excited to share a new product with you today &#8212; our analysis of terrorist financing trends. I often get asked, &#8220;What&#8217;s new?&#8221; in terrorist financing? I struggle to answer because I don&#8217;t want to refer to headlines. I prefer my answers to be data-driven. If you feel the same way, today, you&#8217;re in luck! We crunched the numbers, and we can tell you ~exactly~ what&#8217;s new in terrorist financing. Have a read and let me know what you think in the comments or through email. We love hearing from you, and would be delighted to answer any questions you have about this. Thanks for caring about illicit finance and global security,&quot;,&quot;cta&quot;:null,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Terrorist financing enters its cryptocurrency era&quot;,&quot;publishedBylines&quot;:[],&quot;post_date&quot;:&quot;2024-08-22T13:01:06.554Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0603deea-04b9-484c-97df-69d59bb49961_720x543.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/terrorist-financing-enters-its-cryptocurrency&quot;,&quot;section_name&quot;:&quot;Primers&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:147980151,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:3,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F09b767fc-6dde-4336-90bb-7806e0822653_900x900.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p><strong>Who should read this article? </strong>This article is a good baseline for anyone seeking to understand terrorist financing methods and mechanisms, and should be read in conjunction with other research in this area including:</p><p>Joe Whittaker, &#8220;The Role of Financial Technologies in US-Based ISIS Terror Plots,&#8221; <em>Studies in Conflict &amp; Terrorism</em> 0, no. 0 (October 12, 2022): 1&#8211;26, <a href="https://doi.org/10.1080/1057610X.2022.2133345">https://doi.org/10.1080/1057610X.2022.2133345</a>.</p><p>Evangeline Ducas and Alex Wilner, &#8220;The Security and Financial Implications of Blockchain Technologies: Regulating Emerging Technologies in Canada,&#8221; <em>International Journal</em> 72, no. 4 (December 1, 2017): 538&#8211;62, <a href="https://doi.org/10.1177/0020702017741909">https://doi.org/10.1177/0020702017741909</a>.</p><p>Cynthia Dion-Schwarz, David Manheim, and Patrick B. Johnston, &#8220;Terrorist Use of Cryptocurrencies: Technical and Organizational Barriers and Future Threats&#8221; (RAND Corporation, March 27, 2019), <a href="https://www.rand.org/pubs/research_reports/RR3026.html">https://www.rand.org/pubs/research_reports/RR3026.html</a>.</p><p>Jessica Davis, <em>Illicit Money: Financing Terrorism in the 21st Century</em> (Lynne Rienner Publishers, 2021).</p><p>Marc-Andr&#233; Argentino, Jessica Davis, and Tore Refslund Hamming, &#8220;Financing Violent Extremism: An Examination of Maligned Creativity in the Use of Financial Technologies&#8221; (ICSR, April 12, 2023), <a href="https://icsr.info/2023/04/12/financing-violent-extremism-an-examination-of-maligned-creativity-in-the-use-of-financial-technologies/">https://icsr.info/2023/04/12/financing-violent-extremism-an-examination-of-maligned-creativity-in-the-use-of-financial-technologies/</a>.</p><p>And of course the various Insight Monitor articles on cryptocurrency and terrorist financing! </p><p>Did you find this article insightful? Share it with a friend! </p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/p/digital-dark-money-a-critical-review?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/p/digital-dark-money-a-critical-review?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p><em>&#169; 2025 Insight Threat Intelligence Ltd. All Rights Reserved.<br><br>This newsletter and its contents are protected by Canadian copyright law. Except as otherwise provided for under Canadian copyright law, this newsletter and its contents may not be copied, published, distributed, downloaded or otherwise stored in a retrieval system, transmitted or converted, in any form or by any means, electronic or otherwise, without the prior written permission of the copyright owner.</em></p><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-1" href="#footnote-anchor-1" class="footnote-number" contenteditable="false" target="_self">1</a><div class="footnote-content"><p>Jessica Davis, <em>Illicit Money: Financing Terrorism in the 21st Century</em> (Lynne Rienner Publishers, 2021), p. 221</p><p></p></div></div>]]></content:encoded></item><item><title><![CDATA[Funding the Flames: The Dark Side of Crowdfunding and Terrorism]]></title><description><![CDATA[Edition 3 of the Insight Monitor Bookclub]]></description><link>https://newsletter.insightthreatintel.com/p/funding-the-flames-a-review-of-financial</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/funding-the-flames-a-review-of-financial</guid><pubDate>Tue, 26 Nov 2024 14:03:01 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!dfhV!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F733a8595-2af2-4b4c-9415-871b2132bd51_1792x1024.heic" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Hello, <strong>Insight Monitor</strong> subscribers. Welcome to another week and a new <strong>research reads </strong>review. In this series, we review and summarize recent research in illicit financing, highlighting new data, insights, or findings that can inform how we counter this threat. I hope you find this insightful, and if you want to suggest a book or article for review, let us know in the survey. As always, please read and share this with colleagues who might be interested. Thanks for caring about illicit finance and international security! </em></p><p><em>~Jess  </em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/survey/42595&quot;,&quot;text&quot;:&quot;Research Reads Suggestions&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://newsletter.insightthreatintel.com/survey/42595"><span>Research Reads Suggestions</span></a></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!dfhV!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F733a8595-2af2-4b4c-9415-871b2132bd51_1792x1024.heic" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!dfhV!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F733a8595-2af2-4b4c-9415-871b2132bd51_1792x1024.heic 424w, https://substackcdn.com/image/fetch/$s_!dfhV!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F733a8595-2af2-4b4c-9415-871b2132bd51_1792x1024.heic 848w, https://substackcdn.com/image/fetch/$s_!dfhV!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F733a8595-2af2-4b4c-9415-871b2132bd51_1792x1024.heic 1272w, https://substackcdn.com/image/fetch/$s_!dfhV!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F733a8595-2af2-4b4c-9415-871b2132bd51_1792x1024.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!dfhV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F733a8595-2af2-4b4c-9415-871b2132bd51_1792x1024.heic" width="494" height="282.2857142857143" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/733a8595-2af2-4b4c-9415-871b2132bd51_1792x1024.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:832,&quot;width&quot;:1456,&quot;resizeWidth&quot;:494,&quot;bytes&quot;:466706,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!dfhV!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F733a8595-2af2-4b4c-9415-871b2132bd51_1792x1024.heic 424w, https://substackcdn.com/image/fetch/$s_!dfhV!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F733a8595-2af2-4b4c-9415-871b2132bd51_1792x1024.heic 848w, https://substackcdn.com/image/fetch/$s_!dfhV!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F733a8595-2af2-4b4c-9415-871b2132bd51_1792x1024.heic 1272w, https://substackcdn.com/image/fetch/$s_!dfhV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F733a8595-2af2-4b4c-9415-871b2132bd51_1792x1024.heic 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Image created by OpenAI</figcaption></figure></div><p>Don&#8217;t forget to check out our courses! We have a growing selection of learning products to choose from, from financial intelligence investigations to terrorist financing analysis. We also have a dedicated financial intelligence community where you can ask questions and learn from your students, and of course, get expert help from me: </p><h3>Insight Academy Offerings</h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://insightthreatintelligence.thinkific.com/collections" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!SuKS!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5af17c67-c377-4523-a1a2-c756d6cc53fd_1049x819.png 424w, https://substackcdn.com/image/fetch/$s_!SuKS!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5af17c67-c377-4523-a1a2-c756d6cc53fd_1049x819.png 848w, https://substackcdn.com/image/fetch/$s_!SuKS!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5af17c67-c377-4523-a1a2-c756d6cc53fd_1049x819.png 1272w, https://substackcdn.com/image/fetch/$s_!SuKS!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5af17c67-c377-4523-a1a2-c756d6cc53fd_1049x819.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!SuKS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5af17c67-c377-4523-a1a2-c756d6cc53fd_1049x819.png" width="1049" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5af17c67-c377-4523-a1a2-c756d6cc53fd_1049x819.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1049,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:353837,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://insightthreatintelligence.thinkific.com/collections&quot;,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!SuKS!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5af17c67-c377-4523-a1a2-c756d6cc53fd_1049x819.png 424w, https://substackcdn.com/image/fetch/$s_!SuKS!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5af17c67-c377-4523-a1a2-c756d6cc53fd_1049x819.png 848w, https://substackcdn.com/image/fetch/$s_!SuKS!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5af17c67-c377-4523-a1a2-c756d6cc53fd_1049x819.png 1272w, https://substackcdn.com/image/fetch/$s_!SuKS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5af17c67-c377-4523-a1a2-c756d6cc53fd_1049x819.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><h3>Review: &nbsp;Shai Farber and Snir Ahiad Yehezkel, &#8220;Financial Extremism: The Dark Side of Crowdfunding and Terrorism,&#8221; <em>Terrorism and Political Violence</em> 0, no. 0 (2024.): 1&#8211;20, <a href="https://doi.org/10.1080/09546553.2024.2362665">https://doi.org/10.1080/09546553.2024.2362665</a>.</h3><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/p/funding-the-flames-a-review-of-financial?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/p/funding-the-flames-a-review-of-financial?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><h5><strong>BLUF</strong>: This article seeks to fill a gap in academic research by describing and explaining how terrorist organizations exploit crowdfunding platforms and digital currencies. The article includes a set of observations about terrorist crowdfunding campaigns that form the basis of policy recommendations.</h5><p></p><p><strong>Author info: </strong>&nbsp;Shai Farber is a senior lecturer at the Max Stern Yezreel Valley College and Snir Ahiad Yehezkel is a student in the faculty of law at Bar-Ilan University. </p><h3>Brief summary: </h3><p><strong>Methods: </strong>The authors combine open-source material (including academic literature, policy documents, news reports, crowdfunding platform archives, text from extremist communication channels, telegram chats, international conventions, laws, and regulations) with three semi-structured interviews.</p><p>Based on this research, the authors make nine key observations: Terrorist crowdfunding campaigns are used to facilitate online payments and payment methods and attract public attention (both increasing the terrorist&#8217;s reach and exposing it to potential law enforcement action). Terrorists often launch campaigns soliciting funds for false charitable causes, and they tend to raise modest donations. Terrorists prefer to use small and unpopular crowdfunding sites when they use formal platforms, and multiple credit cards from the same individual are sometimes charged on crowdfunding sites.&nbsp; Off platform, terrorists sometimes solicit cash. Terrorists also use non-profit organizations as a &#8220;front&#8221; for raising money but redirect those funds to their accounts. Funds for these campaigns often originate from countries &#8220;at risk&#8221; or tax havens.</p><p>From these observations, the authors propose the following strategies to mitigate the risk posed by terrorist exploitation of crowdfunding sites. They argue that crowdfunding platforms should be regulated and adhere to counterterrorist financing regulations and that platforms should adopt a risk-based monitoring approach for their campaigns. Further, the authors argue that cryptocurrency exchanges should be regulated to help mitigate these risks and that international cooperation should be fostered to help understand and articulate crowdfunding risks. The authors also suggest that technology firms and financial institutions should collaborate to detect and disrupt terrorist financing, making a case for the broader adoption of blockchain analytics tools and technologies. They also suggest that public awareness campaigns should be launched to educate the public about the vulnerabilities of crowdfunding platforms, that crowdfunding regulation and monitoring should be within the scope of Financial Action Task Force mutual evaluations, and that more research money should be allocated to help develop novel technological solutions for detecting and disrupting terrorist financing online.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Insight Monitor is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><p><strong>Who should read this article? </strong>This article is a good primer for anyone new to the area of crowdfunding and terrorist financing, and should be read in conjunction with other research in this area including:</p><ul><li><p>Jessica Davis, &#8220;New Technologies but Old Methods in Terrorism Financing,&#8221; <em>Royal United Services Institute for Defence and Security Studies</em>, CRAAFT Research Briefing, no. 2 (July 22, 2020): 7.</p></li><li><p>Financial Action Task Force, &#8220;Crowdfunding for Terrorism Financing,&#8221; October 2023, <a href="https://www.fatf-gafi.org/content/dam/fatf-gafi/reports/Crowdfunding-Terrorism-Financing.pdf.coredownload.inline.pdf">https://www.fatf-gafi.org/content/dam/fatf-gafi/reports/Crowdfunding-Terrorism-Financing.pdf.coredownload.inline.pdf</a>.</p></li><li><p>Alex Newhouse, &#8220;From Classifieds to Crypto: How White Supremacist Groups Have Embraced Crowdfunding&#8221; (Middlebury Institute of International Studies at Monterey, 2019), <a href="https://www.middlebury.edu/institute/sites/www.middlebury.edu.institute/files/2019-06/Alex%20Newhouse%20CTEC%20Paper.pdf?fv=9T_mzirH">https://www.middlebury.edu/institute/sites/www.middlebury.edu.institute/files/2019-06/Alex%20Newhouse%20CTEC%20Paper.pdf?fv=9T_mzirH</a>.</p></li><li><p>Stephen Reimer and Matthew Redhead, &#8220;Bit by Bit Impacts of New Technologies on Terrorism Financing Risks,&#8221; Occassional Paper, Project Craaft (Royal United Services Institute, April 2022), <a href="https://static1.squarespace.com/static/5e399e8c6e9872149fc4a041/t/624c339b2bb62359821fa1dd/1649161117463/Bit+By+Bit.pdf">https://static1.squarespace.com/static/5e399e8c6e9872149fc4a041/t/624c339b2bb62359821fa1dd/1649161117463/Bit+By+Bit.pdf</a>.</p></li><li><p>Smith, Brenna, &#8220;The Evolution Of Bitcoin In Terrorist Financing,&#8221; <em>Bellingcat</em>, August 9, 2019, <a href="https://www.bellingcat.com/news/2019/08/09/the-evolution-of-bitcoin-in-terrorist-financing/">https://www.bellingcat.com/news/2019/08/09/the-evolution-of-bitcoin-in-terrorist-financing/</a>.</p></li></ul><h3>Advancing the Research</h3><p>This article is a good starting point for formalizing observations about terrorist financing and crowdfunding. However, differentiation between formal and informal crowdfunding campaigns (those using official platforms and those using messaging services to solicit funds) and categorization of methods and observations between these two types of crowdfunding might have yielded different and interesting results. </p><p>Further work should explore the circumstances in which terrorists adopt crowdfunding as a method of raising funds and how states and counterterrorism investigators can anticipate the adoption of this technique. Further research should also collect data more broadly (ideally, interviews with people in multiple jurisdictions) and specify, possibly using a large n set of case studies, how often terrorist actors (movements, groups, and individuals) use crowdfunding and how this differs across ideologies.</p><div><hr></div><p>What did you think about our <strong>Research Reads</strong>? Let us know in the comments, and be sure to complete the survey if you want us to review something in particular! </p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/survey/42595&quot;,&quot;text&quot;:&quot;Research Reads Suggestions&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://newsletter.insightthreatintel.com/survey/42595"><span>Research Reads Suggestions</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/p/funding-the-flames-a-review-of-financial?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/p/funding-the-flames-a-review-of-financial?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><div><hr></div><p><em>&#169; 2024 Insight Threat Intelligence Ltd. All Rights Reserved.<br><br>This newsletter and its contents are protected by Canadian copyright law. Except as otherwise provided for under Canadian copyright law, this newsletter and its contents may not be copied, published, distributed, downloaded or otherwise stored in a retrieval system, transmitted or converted, in any form or by any means, electronic or otherwise, without the prior written permission of the copyright owner.</em></p>]]></content:encoded></item><item><title><![CDATA[Risk and Reward: How Shadow Economies Impact the Financial Practices of Militant Organizations]]></title><description><![CDATA[Edition 2 of the Insight Monitor Bookclub]]></description><link>https://newsletter.insightthreatintel.com/p/risk-and-reward-how-shadow-economies</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/risk-and-reward-how-shadow-economies</guid><pubDate>Tue, 01 Oct 2024 13:02:12 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!dfhV!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F733a8595-2af2-4b4c-9415-871b2132bd51_1792x1024.heic" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Hello, <strong>Insight Monitor</strong> subscribers. Welcome to another week and a new <strong>research reads </strong>review. I hope you find this insightful, and if you want to suggest a book or article for review, let us know in the survey:  </em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/survey/42595&quot;,&quot;text&quot;:&quot;Research Reads Suggestions&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://newsletter.insightthreatintel.com/survey/42595"><span>Research Reads Suggestions</span></a></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!dfhV!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F733a8595-2af2-4b4c-9415-871b2132bd51_1792x1024.heic" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!dfhV!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F733a8595-2af2-4b4c-9415-871b2132bd51_1792x1024.heic 424w, https://substackcdn.com/image/fetch/$s_!dfhV!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F733a8595-2af2-4b4c-9415-871b2132bd51_1792x1024.heic 848w, https://substackcdn.com/image/fetch/$s_!dfhV!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F733a8595-2af2-4b4c-9415-871b2132bd51_1792x1024.heic 1272w, https://substackcdn.com/image/fetch/$s_!dfhV!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F733a8595-2af2-4b4c-9415-871b2132bd51_1792x1024.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!dfhV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F733a8595-2af2-4b4c-9415-871b2132bd51_1792x1024.heic" width="494" height="282.2857142857143" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/733a8595-2af2-4b4c-9415-871b2132bd51_1792x1024.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:832,&quot;width&quot;:1456,&quot;resizeWidth&quot;:494,&quot;bytes&quot;:466706,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!dfhV!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F733a8595-2af2-4b4c-9415-871b2132bd51_1792x1024.heic 424w, https://substackcdn.com/image/fetch/$s_!dfhV!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F733a8595-2af2-4b4c-9415-871b2132bd51_1792x1024.heic 848w, https://substackcdn.com/image/fetch/$s_!dfhV!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F733a8595-2af2-4b4c-9415-871b2132bd51_1792x1024.heic 1272w, https://substackcdn.com/image/fetch/$s_!dfhV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F733a8595-2af2-4b4c-9415-871b2132bd51_1792x1024.heic 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Image created by OpenAI</figcaption></figure></div><h3>Review: Amira Jadoon and Daniel Milton, &#8220;Risk and Reward: How Shadow Economies Impact the Financial Practices of Militant Organizations,&#8221; <em>Terrorism and Political Violence</em> 0, no. 0 (6 Aug 2024): 1&#8211;19, <a href="https://doi.org/10.1080/09546553.2024.2381211">https://doi.org/10.1080/09546553.2024.2381211</a>.</h3><p></p><h5><strong>BLUF</strong>: This article argues that terrorist groups make strategic choices in fundraising. Groups operating in states with large shadow economies will likely adopt intricate, high-yield fundraising tactics over &#8220;hit or miss&#8221; methods.</h5><p></p><p><strong>Author info: </strong>&nbsp;Amira Jadoon, assistant professor at Clemson University, and Daniel Milton, Director of Research at the Combating Terrorism Center at West Point</p><p>This article seeks to answer the question of how terrorist and insurgent groups or their leaders decide which fundraising options are the most viable and weigh the risks and benefits of associated methods. The presence of a shadow economy in the terrorist or insurgent area of operations is &#8220;one of the most important&#8221; factors in determining fundraising choice. How terrorist and insurgent groups raise money can be influenced by resource availability, organizational characteristics, and other strategic considerations (p.3).</p><p>The authors put forward a plausible hypothesis. There are plenty of examples of terrorist and insurgent groups using shadow (or informal) economies to raise funds (amongst other things, like creating facilitation and smuggling networks for goods and people). Some key examples include Hamas in Gaza, the Islamic State in both Iraq and Syria, the PKK in T&#252;rkiye (and later Europe), the LTTE in Sri Lanka, etc.</p><p>The article further differentiates between the types of coordination that fundraising methods require. The authors describe high-coordination, reliable payout strategies, such as drug trafficking and smuggling, and low-coordination, unreliable payout strategies, such as extortion, robbery, and kidnapping. They find that high-coordination strategies are more likely to occur in areas with large shadow economies.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Insight Monitor is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><p><strong>Who should read this article? </strong>This article is primarily intended for academics and has utility for policymakers trying to combat terrorist financing and understand strategic choices and decision logic.</p><p>How does it advance our knowledge?</p><blockquote><p>1.&nbsp;&nbsp;&nbsp;&nbsp; This article advances our knowledge by mapping the strategic choices of terrorists in terms of fundraising.</p><p>2.&nbsp;&nbsp;&nbsp;&nbsp; Policymakers can anticipate terrorist financing methods to focus on drug trafficking and smuggling in areas with large informal sectors.</p></blockquote><p><strong>Methods</strong>: This article is based on a case study (FARC in Colombia) and a quantitative study with data from 1998-2012 covering 130 groups. The authors find a statistically significant relationship between many variables in their five models. These models use different dependent variables (fundraising methods): drug trafficking, smuggling, extortion, robbery, and kidnapping. They convincingly demonstrate that terrorist and insurgent organizations are more likely to pursue high-pay, high-coordination activities like drug trafficking if they operate in states that have large shadow economies (p. 15).</p><p>The authors' categorization of fundraising activities provides a useful framework for understanding the complexities of illicit financing. However, classifying certain activities as high-coordination or low-coordination merits further scrutiny. While drug trafficking and smuggling are rightly identified as high-coordination activities, several other activities measured&#8212;such as extortion and kidnapping&#8212;arguably require similar levels of coordination. For example, groups like the LTTE and Al Shabaab have developed intricate extortion networks, including taxation systems, receipt issuance, and management structures to avoid double taxation. A similar dynamic is present in some Islamic State-controlled areas of Africa. Likewise, kidnapping often involves multiple actors across criminal networks, local populations, and entities providing security.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a>Acknowledging these complexities could enhance the internal validity of the study's findings and provide a more comprehensive understanding of these activities and the strategic choices that terrorists make in funding decisions.</p><p><strong>What&#8217;s missing: </strong>There is a growing body of work on terrorist adaptation (and financing), as well as economics and terrorist financing, that might have some bearing on future work in this area, particularly the work of Sandler<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-2" href="#footnote-2" target="_self">2</a><sup> </sup>and Myers.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-3" href="#footnote-3" target="_self">3</a></p><p>The article doesn&#8217;t consider the issue of how counter-terrorist financing efforts affect the strategic choices of terrorist groups. To be fair, no existing dataset of these activities exists that can be included in these models. While I think this is a critical issue (arguably one that has the most bearing on financing choices, including financing activities beyond just fundraising), this is also not easy to model. To understand terrorist decision-making and adaptation, this issue will have to be overcome, and counter-terrorist financing activities will have to be included in future models of terrorist behaviour and decision-making.</p><p>Finally, the article raises an interesting question of cause and effect. The authors convincingly demonstrate that terrorists exploit shadow economies. However, is it also possible that terrorist and insurgent groups primarily arise in countries that have large shadow economies, possibly indicative of a lack of governance? Or do shadow economies somehow facilitate the development of terrorist groups? Understanding this relationship further might shed more light on how and if terrorists are really making decisions about fundraising or whether they are simply exploiting whatever is available to them.</p><p><strong>Readability</strong>: Despite using advanced quantitative methods, this article is surprisingly readable and will be accessible to a general audience. Interpreting the results does, however, require knowledge of econometrics. &nbsp;&nbsp;</p><div><hr></div><p>What did you think about our <strong>Research Reads</strong>? Let us know in the comments, and be sure to complete the survey if you want us to review something in particular! </p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/survey/42595&quot;,&quot;text&quot;:&quot;Research Reads Suggestions&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://newsletter.insightthreatintel.com/survey/42595"><span>Research Reads Suggestions</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/p/risk-and-reward-how-shadow-economies?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/p/risk-and-reward-how-shadow-economies?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p><em>Do you want to learn more about financial intelligence and how to use it in research, investigations, and analysis? Our financial intelligence fundamentals course is for you! This course is perfect for people new to financial intelligence and seasoned professionals. <a href="https://insightthreatintelligence.thinkific.com/courses/introFININT">Enroll today</a>!</em></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://insightthreatintelligence.thinkific.com/courses/introFININT" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!twUc!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe22a91b0-2f94-4a22-9e09-e862e5a6dfa8_1920x1080.heic 424w, https://substackcdn.com/image/fetch/$s_!twUc!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe22a91b0-2f94-4a22-9e09-e862e5a6dfa8_1920x1080.heic 848w, https://substackcdn.com/image/fetch/$s_!twUc!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe22a91b0-2f94-4a22-9e09-e862e5a6dfa8_1920x1080.heic 1272w, https://substackcdn.com/image/fetch/$s_!twUc!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe22a91b0-2f94-4a22-9e09-e862e5a6dfa8_1920x1080.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!twUc!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe22a91b0-2f94-4a22-9e09-e862e5a6dfa8_1920x1080.heic" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e22a91b0-2f94-4a22-9e09-e862e5a6dfa8_1920x1080.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:237073,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:&quot;https://insightthreatintelligence.thinkific.com/courses/introFININT&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!twUc!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe22a91b0-2f94-4a22-9e09-e862e5a6dfa8_1920x1080.heic 424w, https://substackcdn.com/image/fetch/$s_!twUc!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe22a91b0-2f94-4a22-9e09-e862e5a6dfa8_1920x1080.heic 848w, https://substackcdn.com/image/fetch/$s_!twUc!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe22a91b0-2f94-4a22-9e09-e862e5a6dfa8_1920x1080.heic 1272w, https://substackcdn.com/image/fetch/$s_!twUc!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe22a91b0-2f94-4a22-9e09-e862e5a6dfa8_1920x1080.heic 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><p><em>&#169; 2024 Insight Threat Intelligence Ltd. All Rights Reserved.<br><br>This newsletter and its contents are protected by Canadian copyright law. Except as otherwise provided for under Canadian copyright law, this newsletter and its contents may not be copied, published, distributed, downloaded or otherwise stored in a retrieval system, transmitted or converted, in any form or by any means, electronic or otherwise, without the prior written permission of the copyright owner.</em></p><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-1" href="#footnote-anchor-1" class="footnote-number" contenteditable="false" target="_self">1</a><div class="footnote-content"><p>Jessica Davis and Alex Wilner, &#8220;Paying Terrorist Ransoms: Frayed Consensus, Uneven Outcomes &amp; Undue Harm,&#8221; <em>International Journal</em>, September 26, 2022, 00207020221130308, https://doi.org/10.1177/00207020221130308.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-2" href="#footnote-anchor-2" class="footnote-number" contenteditable="false" target="_self">2</a><div class="footnote-content"><p>Todd Sandler, &#8220;An Economic Perspective on Terrorism and Counterterrorism,&#8221; <em>Terrorism and Political Violence</em> 0, no. 0 (2023): 1&#8211;17, https://doi.org/10.1080/09546553.2023.2259992.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-3" href="#footnote-anchor-3" class="footnote-number" contenteditable="false" target="_self">3</a><div class="footnote-content"><p>Graham Myres, &#8220;Investing in the Market of Violence: Toward a Micro-Theory of Terrorist Financing,&#8221; <em>Studies in Conflict &amp; Terrorism</em>35, no. 10 (October 2012): 693&#8211;711, https://doi.org/10.1080/1057610X.2012.712031.</p><p></p></div></div>]]></content:encoded></item><item><title><![CDATA[The Compliance Industrial Complex and Its Grip on Modern Governance]]></title><description><![CDATA[Welcome to the Insight Monitor Bookclub!]]></description><link>https://newsletter.insightthreatintel.com/p/the-compliance-industrial-complex</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/the-compliance-industrial-complex</guid><pubDate>Tue, 30 Jul 2024 13:01:28 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!dfhV!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F733a8595-2af2-4b4c-9415-871b2132bd51_1792x1024.heic" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Hello, <strong>Insight Monitor</strong> subscribers. Welcome to a new feature of our newsletter&#8212;Research Reads. This feature will function as a book club for subscribers. Here, I&#8217;ll review the latest research on illicit financing and international security threats. These reviews help us update our heuristics for combatting illicit finance with the latest evidence-based research. (<strong>Because if you want to do evidence-based policy, training and interventions, well, you need to know what the evidence says!</strong>) They will also identify gaps for future research that folks interested in this area will hopefully fill. In each review, you&#8217;ll get a &#8220;bottom line up front&#8221; (BLUF) summary of the research (book or article), a sense of who should read the book, and how it advances our knowledge. If you want to recommend a piece of research for review, you can do that by taking our short survey at the bottom of the article:  </em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/survey/42595&quot;,&quot;text&quot;:&quot;Research Reads Suggestions&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://newsletter.insightthreatintel.com/survey/42595"><span>Research Reads Suggestions</span></a></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!dfhV!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F733a8595-2af2-4b4c-9415-871b2132bd51_1792x1024.heic" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!dfhV!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F733a8595-2af2-4b4c-9415-871b2132bd51_1792x1024.heic 424w, https://substackcdn.com/image/fetch/$s_!dfhV!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F733a8595-2af2-4b4c-9415-871b2132bd51_1792x1024.heic 848w, https://substackcdn.com/image/fetch/$s_!dfhV!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F733a8595-2af2-4b4c-9415-871b2132bd51_1792x1024.heic 1272w, https://substackcdn.com/image/fetch/$s_!dfhV!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F733a8595-2af2-4b4c-9415-871b2132bd51_1792x1024.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!dfhV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F733a8595-2af2-4b4c-9415-871b2132bd51_1792x1024.heic" width="494" height="282.2857142857143" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/733a8595-2af2-4b4c-9415-871b2132bd51_1792x1024.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:832,&quot;width&quot;:1456,&quot;resizeWidth&quot;:494,&quot;bytes&quot;:466706,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!dfhV!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F733a8595-2af2-4b4c-9415-871b2132bd51_1792x1024.heic 424w, https://substackcdn.com/image/fetch/$s_!dfhV!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F733a8595-2af2-4b4c-9415-871b2132bd51_1792x1024.heic 848w, https://substackcdn.com/image/fetch/$s_!dfhV!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F733a8595-2af2-4b4c-9415-871b2132bd51_1792x1024.heic 1272w, https://substackcdn.com/image/fetch/$s_!dfhV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F733a8595-2af2-4b4c-9415-871b2132bd51_1792x1024.heic 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Image created by OpenAI</figcaption></figure></div><h3>Review: Tereza &#216;stb Kuldova, <em>Compliance-Industrial Complex: The Operating System of a Pre-Crime Society</em>, 1st ed. 2022 edition (Cham: Palgrave Macmillan, 2022).</h3><h5><strong>BLUF</strong>: This book argues that the compliance industrial complex fundamentally shapes governance and control mechanisms, influencing how humans are surveilled and managed. It also argues that the compliance function plays an essential role in corporate power and hybrid policing practices.</h5><p>The compliance industrial complex is the sector (yes, it&#8217;s an entire sub-sector of the finance sector of the economy!) that was created following the creation of the Financial Action Task Force and the establishment of global anti-money laundering standards (and, later, counterterrorist financing efforts). The compliance industrial complex is composed of financial institutions, their compliance officers (charged with detecting, preventing, and reporting money laundering and terrorist financing), regulatory technology companies that facilitate this, as well as policymakers, consultants, and academics and researchers studying policies, regulations, and practices. </p><p>This complex is described as shaping how people are governed, how they can interact with the financial system, and how they are controlled in that context. </p><p>As you can no doubt tell from the tone, this book takes a critical studies approach to regulation and surveillance. I know some of you will find that tone off-putting, so it can be useful to remember that this approach to research and analysis is meant to challenge conceptual frameworks and perspectives. It&#8217;s ~meant~ to be provocative. So when you read this, it&#8217;s useful to think about what the author is trying to challenge and why. </p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Insight Monitor is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p><strong>Who should read this book? </strong>It is largely targeted at academics but could also be interesting for policymakers and compliance professionals. </p><p><strong>How does it advance our knowledge?</strong> </p><ol><li><p>The <strong>critique of the language of compliance</strong>. The compliance industrial complex tends to use universalized terms of good governance such as integrity, transparency, accountability, and risk, but upon closer examination, these terms are &#8220;strikingly hollow.&#8221; (p.25) <em>(I&#8217;ve often wondered what the phrase &#8220;protect the integrity of the financial sector&#8221; actually means.)</em> </p></li><li><p>Critique of <strong>&#8220;tech optimism&#8221;:</strong> The author finds that there is little evidence to support the role of AI in advancing compliance outcomes, and the compliance industry tends to fetishize data-driven predictions despite &#8220;false expertise and bogus promises&#8221; that are sold under a myth of neutrality and objectivity. (p. 123-9)</p></li><li><p><strong>The complexity of the regulatory environment:</strong> The author identified some people in the compliance industry and found that the regulatory environment is so complex that it is beyond the capacity of a single human to process. This creates an open question about what and who this is serving. The complexity further requires incorporating increasingly complex technological solutions into the compliance function, regardless of the evidence to support their efficacy.</p></li></ol><p><strong>Methods:</strong> This essay is based on an anthropological study of compliance professionals, primarily through attendance at webinars and conferences and through interviews. There is insufficient detail on methods to judge whether a similar study would come to the same conclusions. It&#8217;s also unclear about the geographic scope of this research and whether the findings apply across different jurisdictions.  </p><p><strong>What&#8217;s missing:</strong> A fairly robust critical studies approach to anti-money laundering and counter-terrorist financing exists. Many of you might be familiar with the work of <a href="https://doi.org/10.1177/1367549408091845">Marieke de Goede</a> or <a href="http://academic.oup.com/bjc/article/58/4/845/4107537">Anthony Amicelle</a>. Surprisingly, this book does not engage with that literature. </p><p><strong>Readability</strong>: This book targets an academic audience and assumes some knowledge and familiarity with critical studies as a discipline. </p><p>What did you think about our first <strong>Research Reads</strong>? Let us know in the comments, and be sure to complete the survey if you want us to review something in particular! </p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/survey/42595&quot;,&quot;text&quot;:&quot;Research Reads Suggestions&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://newsletter.insightthreatintel.com/survey/42595"><span>Research Reads Suggestions</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/p/the-compliance-industrial-complex?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/p/the-compliance-industrial-complex?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p><em>Do you want to learn more about financial intelligence and how to use it in research, investigations, and analysis? Our financial intelligence fundamentals course is for you! This course is perfect for people new to financial intelligence and seasoned professionals. <a href="https://insightthreatintelligence.thinkific.com/courses/introFININT">Enroll today</a>!</em></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://insightthreatintelligence.thinkific.com/courses/introFININT" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!twUc!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe22a91b0-2f94-4a22-9e09-e862e5a6dfa8_1920x1080.heic 424w, https://substackcdn.com/image/fetch/$s_!twUc!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe22a91b0-2f94-4a22-9e09-e862e5a6dfa8_1920x1080.heic 848w, https://substackcdn.com/image/fetch/$s_!twUc!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe22a91b0-2f94-4a22-9e09-e862e5a6dfa8_1920x1080.heic 1272w, https://substackcdn.com/image/fetch/$s_!twUc!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe22a91b0-2f94-4a22-9e09-e862e5a6dfa8_1920x1080.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!twUc!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe22a91b0-2f94-4a22-9e09-e862e5a6dfa8_1920x1080.heic" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e22a91b0-2f94-4a22-9e09-e862e5a6dfa8_1920x1080.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:237073,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:&quot;https://insightthreatintelligence.thinkific.com/courses/introFININT&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!twUc!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe22a91b0-2f94-4a22-9e09-e862e5a6dfa8_1920x1080.heic 424w, https://substackcdn.com/image/fetch/$s_!twUc!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe22a91b0-2f94-4a22-9e09-e862e5a6dfa8_1920x1080.heic 848w, https://substackcdn.com/image/fetch/$s_!twUc!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe22a91b0-2f94-4a22-9e09-e862e5a6dfa8_1920x1080.heic 1272w, https://substackcdn.com/image/fetch/$s_!twUc!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe22a91b0-2f94-4a22-9e09-e862e5a6dfa8_1920x1080.heic 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><p><em>&#169; 2024 Insight Threat Intelligence Ltd. All Rights Reserved.<br><br>This newsletter and its contents are protected by Canadian copyright law. Except as otherwise provided for under Canadian copyright law, this newsletter and its contents may not be copied, published, distributed, downloaded or otherwise stored in a retrieval system, transmitted or converted, in any form or by any means, electronic or otherwise, without the prior written permission of the copyright owner.</em></p>]]></content:encoded></item></channel></rss>