<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Insight Monitor: Group Profiles ]]></title><description><![CDATA[Profiles of how terrorist and extremist organizations finance their activities. ]]></description><link>https://newsletter.insightthreatintel.com/s/group-profiles</link><image><url>https://substackcdn.com/image/fetch/$s_!I_1w!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4649d7af-94ce-49ea-8c58-368ec26cd423_900x900.png</url><title>Insight Monitor: Group Profiles </title><link>https://newsletter.insightthreatintel.com/s/group-profiles</link></image><generator>Substack</generator><lastBuildDate>Thu, 14 May 2026 08:09:58 GMT</lastBuildDate><atom:link href="https://newsletter.insightthreatintel.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Jessica Davis]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[jmd@insightthreatintel.com]]></webMaster><itunes:owner><itunes:email><![CDATA[jmd@insightthreatintel.com]]></itunes:email><itunes:name><![CDATA[Jessica Davis, PhD]]></itunes:name></itunes:owner><itunes:author><![CDATA[Jessica Davis, PhD]]></itunes:author><googleplay:owner><![CDATA[jmd@insightthreatintel.com]]></googleplay:owner><googleplay:email><![CDATA[jmd@insightthreatintel.com]]></googleplay:email><googleplay:author><![CDATA[Jessica Davis, PhD]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Iranian funding of Hamas through Cryptocurrency]]></title><description><![CDATA[Part 3 of our axis of illicit finance series]]></description><link>https://newsletter.insightthreatintel.com/p/iranian-funding-of-hamas-through</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/iranian-funding-of-hamas-through</guid><dc:creator><![CDATA[Jessica Davis, PhD]]></dc:creator><pubDate>Tue, 28 Apr 2026 13:02:13 GMT</pubDate><enclosure url="https://images.unsplash.com/photo-1525260268417-e73c4edc9d74?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxM3x8aXJhbnxlbnwwfHx8fDE3NzU3NjEyMDh8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Hello, Insight Monitor subscribers, and welcome to part 3 of our series on Iran&#8217;s use of cryptocurrency to finance its sanctions evasion activity and the axis of illicit finance. </em></p><p>In part 1 of this series, we explained the Iran sanctions context and how Iran began widespread use of cryptocurrency in 2018, largely as a response to those sanctions. We highlighted Iran&#8217;s role in mining Bitcoin, which creates liquidity for the regime while also leveraging its oil surplus.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Insight Monitor is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://images.unsplash.com/photo-1525260268417-e73c4edc9d74?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxM3x8aXJhbnxlbnwwfHx8fDE3NzU3NjEyMDh8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://images.unsplash.com/photo-1525260268417-e73c4edc9d74?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxM3x8aXJhbnxlbnwwfHx8fDE3NzU3NjEyMDh8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1525260268417-e73c4edc9d74?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxM3x8aXJhbnxlbnwwfHx8fDE3NzU3NjEyMDh8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1525260268417-e73c4edc9d74?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxM3x8aXJhbnxlbnwwfHx8fDE3NzU3NjEyMDh8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1525260268417-e73c4edc9d74?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxM3x8aXJhbnxlbnwwfHx8fDE3NzU3NjEyMDh8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1456w" sizes="100vw"><img src="https://images.unsplash.com/photo-1525260268417-e73c4edc9d74?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxM3x8aXJhbnxlbnwwfHx8fDE3NzU3NjEyMDh8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" width="348" height="261" data-attrs="{&quot;src&quot;:&quot;https://images.unsplash.com/photo-1525260268417-e73c4edc9d74?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxM3x8aXJhbnxlbnwwfHx8fDE3NzU3NjEyMDh8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:3024,&quot;width&quot;:4032,&quot;resizeWidth&quot;:348,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Shanghair Oriental Pearl Tower, China&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Shanghair Oriental Pearl Tower, China" title="Shanghair Oriental Pearl Tower, China" srcset="https://images.unsplash.com/photo-1525260268417-e73c4edc9d74?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxM3x8aXJhbnxlbnwwfHx8fDE3NzU3NjEyMDh8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1525260268417-e73c4edc9d74?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxM3x8aXJhbnxlbnwwfHx8fDE3NzU3NjEyMDh8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1525260268417-e73c4edc9d74?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxM3x8aXJhbnxlbnwwfHx8fDE3NzU3NjEyMDh8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1525260268417-e73c4edc9d74?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxM3x8aXJhbnxlbnwwfHx8fDE3NzU3NjEyMDh8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/@armantaherian">Arman Taherian</a> on <a href="https://unsplash.com">Unsplash</a></figcaption></figure></div><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;830a4185-d518-449f-859e-355e2ffdc8f4&quot;,&quot;caption&quot;:&quot;This article marks the start of an eight-part series examining how Iran has increasingly relied on cryptocurrency to circumvent international sanctions. These developments unfold against a volatile backdrop: Iran&#8217;s 2025 confrontation with Israel, the ongoing activity of its regional proxy network, and protests driven by corruption, economic hardship (ex&#8230;&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;The Axis of Illicit Finance: Iran&#8217;s Crypto Strategy Explained&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:33479672,&quot;name&quot;:&quot;Jessica Davis, PhD&quot;,&quot;bio&quot;:&quot;Jessica Davis is President of Insight Threat Intelligence and is the author of Women in Modern Terrorism: From Liberations Wars to Global Terrorism and the Islamic State (2017), and Illicit Money: Financing Terrorism in the 21st Century (2021).&quot;,&quot;photo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!ICh7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe312ae7c-114b-4e4f-9ce1-8bf50ddb7a27_2344x2049.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2026-01-06T14:00:45.585Z&quot;,&quot;cover_image&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/87b19738-1968-494d-aa46-98d0020cd199_845x486.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/the-axis-of-illicit-finance-irans&quot;,&quot;section_name&quot;:&quot;Financiers&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:183357175,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:14,&quot;comment_count&quot;:0,&quot;publication_id&quot;:329102,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!I_1w!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4649d7af-94ce-49ea-8c58-368ec26cd423_900x900.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>In part 2 of the series, we explored how Iran uses cryptocurrency to finance the Houthis (Ansarallah). We illuminated the various companies, exchanges, and individuals involved in Iran-Yemen crypto threat finance, highlighting the many jurisdictions this network spans.</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;c8139c7d-df03-45e1-9edc-f145715be2e8&quot;,&quot;caption&quot;:&quot;In part 1 of this series, we examined how Iran has increasingly turned to cryptocurrency as a core tool in its sanctions-evasion toolkit, using digital assets to bypass conventional financial controls and support its broader regional network of allied armed groups, including Hezbollah, Hamas, and Ansarallah (the Houthis).&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;From Tehran to Sana&#8217;a: Cryptocurrency and Sanctions Evasion in the Axis of Illicit Finance&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:33479672,&quot;name&quot;:&quot;Jessica Davis, PhD&quot;,&quot;bio&quot;:&quot;Jessica Davis is President of Insight Threat Intelligence and is the author of Women in Modern Terrorism: From Liberations Wars to Global Terrorism and the Islamic State (2017), and Illicit Money: Financing Terrorism in the 21st Century (2021).&quot;,&quot;photo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!ICh7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe312ae7c-114b-4e4f-9ce1-8bf50ddb7a27_2344x2049.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2026-02-24T14:02:37.624Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!0BCO!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ec115eb-33b1-4e33-8147-a3b6ffc1f04e_626x682.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/from-tehran-to-sanaa-cryptocurrency&quot;,&quot;section_name&quot;:&quot;Group Profiles &quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:186790350,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:3,&quot;comment_count&quot;:0,&quot;publication_id&quot;:329102,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!I_1w!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4649d7af-94ce-49ea-8c58-368ec26cd423_900x900.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>&#171;in part 3 of the series&#8230;&#187;</p><p>Today, we&#8217;re looking at the role of Iran&#8217;s illicit crypto finance network in financing Hamas. Hamas is part of Iran&#8217;s Axis of Resistance and has been funded by the regime to the tune of $100 million per year. While much of this is provided to Hamas through cash couriers, hawala transfers, and trade-based financing mechanisms, some of it is provided through cryptocurrency transactions.</p><p>Hamas&#8217;s relationship with cryptocurrency is an interesting one. The group was an early adopter of cryptocurrency, soliciting donations on its public website almost a decade ago. Hamas has used cryptocurrencies such as Bitcoin and stablecoins to store and transfer funds, and has <a href="https://www.reuters.com/world/middle-east/hamas-cash-to-crypto-global-finance-maze-israels-sights-2023-10-16/">raised hundreds of thousands (if not millions) by soliciting cryptocurrency donations</a> from its members and supporters worldwide.<sup> </sup>To conceal the origin and final destination of cryptocurrency transactions, the Qassam Brigades&#8217; website <a href="https://www.counterextremism.com/threat/hamas/report">offered instructions in multiple languages on creating Bitcoin wallets and making untraceable donations to Hamas.</a><sup> </sup>To further enhance anonymity, Hamas also <a href="https://www.counterextremism.com/threat/hamas/report">generated unique transaction links for individual Bitcoin wallets on its website</a>, avoiding cryptocurrency exchanges that are more susceptible to tracking by authorities.</p><p>Hamas has not had complete freedom to operate in the cryptocurrency market. In June 2021, <a href="https://www.reuters.com/world/middle-east/hamas-cash-to-crypto-global-finance-maze-israels-sights-2023-10-16/">Israel&#8217;s National Bureau for Counter-Terrorist Financing (NBCTF) seized multiple cryptocurrency wallets linked to a Hamas fundraising campaign</a>, some associated with the Qassam Brigade.<sup> </sup><a href="https://content.govdelivery.com/accounts/USTREAS/bulletins/3766304">One of these wallets belonged to Buy Cash Money and Money Transfer Company</a>, a Gaza-based business providing money transfer and virtual currency exchange services. <a href="https://content.govdelivery.com/accounts/USTREAS/bulletins/3766304">Buy Cash facilitated fund transfers for not only Hamas but also affiliates of other terrorist groups</a>, such as Al Qaeda and ISIS.<sup> </sup>However, this was not the end of Hamas&#8217;s use of cryptocurrency. While Iran has a number of different means to move money to Hamas, the IRGC has also used cryptocurrency to fund the group.</p><p>In April 2023, Israel&#8217;s NBCTF <a href="https://home.treasury.gov/news/press-releases/jy2036">seized 189 cryptocurrency accounts that were associated with three Palestinian currency exchanges, including Gaza and T&#252;rkiye-based exchange Al-Markaziya Li-Siarafa</a>, which Israel designated for its support for Hamas.<sup> </sup>This exchange, previously known by a different name (Al-Mutahadun for Exchange), is <a href="https://home.treasury.gov/news/press-releases/jy2036">alleged to be directly involved in facilitating tens of millions of dollars from the IRGC-QF to Hamas and Palestinian Islamic Jihad (PIJ)</a>.<sup> </sup> <a href="https://home.treasury.gov/news/press-releases/jy2036">Al-Markaziya is owned by Zuhair Shamlakh, a Gaza-based money changer.</a><sup>  </sup>He is <a href="https://www.wsj.com/world/middle-east/hamas-needed-a-new-way-to-get-money-from-iran-it-turned-to-crypto-739619aa?st=16a0bppwsg9wakk.">alleged to have used a network of exchanges that sent digital tokens to operators abroad</a> to settle hawala balances, as well as to wallets controlled by Hamas-affiliated money exchanges.<sup> </sup><a href="https://www.wsj.com/world/middle-east/hamas-needed-a-new-way-to-get-money-from-iran-it-turned-to-crypto-739619aa?st=16a0bppwsg9wakk.">Around 2020, this method of transfer became a central part of Hamas&#8217;s operational financial activity.</a></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!kjv7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F300c764b-7773-43de-bce9-36d6ef084373_462x623.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!kjv7!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F300c764b-7773-43de-bce9-36d6ef084373_462x623.png 424w, https://substackcdn.com/image/fetch/$s_!kjv7!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F300c764b-7773-43de-bce9-36d6ef084373_462x623.png 848w, https://substackcdn.com/image/fetch/$s_!kjv7!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F300c764b-7773-43de-bce9-36d6ef084373_462x623.png 1272w, https://substackcdn.com/image/fetch/$s_!kjv7!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F300c764b-7773-43de-bce9-36d6ef084373_462x623.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!kjv7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F300c764b-7773-43de-bce9-36d6ef084373_462x623.png" width="462" height="623" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/300c764b-7773-43de-bce9-36d6ef084373_462x623.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:623,&quot;width&quot;:462,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!kjv7!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F300c764b-7773-43de-bce9-36d6ef084373_462x623.png 424w, https://substackcdn.com/image/fetch/$s_!kjv7!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F300c764b-7773-43de-bce9-36d6ef084373_462x623.png 848w, https://substackcdn.com/image/fetch/$s_!kjv7!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F300c764b-7773-43de-bce9-36d6ef084373_462x623.png 1272w, https://substackcdn.com/image/fetch/$s_!kjv7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F300c764b-7773-43de-bce9-36d6ef084373_462x623.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Another known Hamas financing network is the Herzallah network. This network is centered on the Gaza-based Herzallah Exchange and General Trading Company LLC, which has worked with Hamas to facilitate transactions through cryptocurrencies and has laundered funds for Hamas and PIJ. The <a href="https://home.treasury.gov/news/press-releases/jy2036">exchange is owned by Muhammad Fallah Kamil Hirzallah, Na&#8217;im Kamil Raghib Hirzallah, and Salah Kamil Raghib Hirzallah</a>.<sup> </sup>While there are no publicly identified transactions from Iran moving through this exchange, this remains a possible avenue for Iranian crypto funding of Hamas.</p><h4><strong>Financial Intelligence Fundamentals</strong></h4><p><em>Do you want to learn more about financial intelligence and how to use it in research, investigations, and analysis? Our financial intelligence fundamentals course is for you! This course is perfect for people new to financial intelligence and seasoned professionals. <a href="https://insightthreatintelligence.thinkific.com/courses/introFININT">Enroll today</a></em></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://insightthreatintelligence.thinkific.com/courses/introFININT" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!8tvZ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png 424w, https://substackcdn.com/image/fetch/$s_!8tvZ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png 848w, https://substackcdn.com/image/fetch/$s_!8tvZ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png 1272w, https://substackcdn.com/image/fetch/$s_!8tvZ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!8tvZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png" width="905" height="496" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:496,&quot;width&quot;:905,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:731766,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:&quot;&quot;,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://insightthreatintelligence.thinkific.com/courses/introFININT&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!8tvZ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png 424w, https://substackcdn.com/image/fetch/$s_!8tvZ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png 848w, https://substackcdn.com/image/fetch/$s_!8tvZ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png 1272w, https://substackcdn.com/image/fetch/$s_!8tvZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><p>The attribution of wallets and the transactions moving through them is complicated. In some cases, wallets are wholly attributed to the IRGC even when they are used by multiple entities. In one case, the NBCTF designated two hot wallets used by the IRGC. Even though other (non-IRGC) funds likely moved through those wallets, the entire set of wallets was designated by Israeli authorities. When this type of action is reported by the media, it can lead to exaggerated estimates of terrorist financing, as the nuances of wallet control and use are sometimes lost, and all funds that have flowed through those wallets are incorrectly &#8220;attributed&#8221; to the IRGC. In reality, these wallets often represent informal exchanges, over-the-counter brokers, or hawalas, meaning that they serve a diverse set of clients, not just Hamas or other terrorist groups. As such, describing all the transactions flowing through the wallets as &#8220;terror finance&#8221; is misleading.</p><p>While there is evidence of direct cryptocurrency transactions between Iran-linked wallets, facilitators, and Hamas, transactions appear to have largely passed through informal exchanges or hawaladars providing cash-out services, making the scale of this activity difficult to quantify.  <a href="https://insightthreatintelligence.thinkific.com/courses/hamasfinancingreport">Historically, Iran&#8217;s support to Hamas has primarily moved through cash couriers into Gaza</a>, as well as other types of transactions to deposit funds into the group&#8217;s wider financial networks abroad.</p><p>However, with recent disruptions to traditional supply routes, Iran could increasingly turn to cryptocurrency to facilitate transfers. The change in regime brought about by the Iran-US-Israel war has removed <a href="https://www.wsj.com/world/middle-east/iran-radical-regime-change-a42d96ea?st=9H3DgV&amp;reflink=desktopwebshare_permalink">significant layers of older regime members</a>; the newer, younger leaders are likely to more fully embrace cryptocurrency as a means of transferring funds to its proxies, including Hamas. At the same time, Israel&#8217;s focused targeting of financial facilitators in Gaza has likely constrained the effectiveness of any such efforts, leaving the future role of cryptocurrency in Hamas&#8217;s financing both fluid and uncertain.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/p/iranian-funding-of-hamas-through?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/p/iranian-funding-of-hamas-through?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p><em>This research is part of my post-doctoral work funded by the University of Calgary&#8217;s Faculty of Law.</em></p><div><hr></div><p><em>&#169; 2026 Insight Threat Intelligence Ltd. All Rights Reserved.<br><br>This newsletter and its contents are protected by Canadian copyright law. Except as otherwise provided for under Canadian copyright law, this newsletter and its contents may not be copied, published, distributed, downloaded or otherwise stored in a retrieval system, transmitted or converted, in any form or by any means, electronic or otherwise, without the prior written permission of the copyright owner.</em></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Insight Monitor is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[From Tehran to Sana’a: Cryptocurrency and Sanctions Evasion in the Axis of Illicit Finance]]></title><description><![CDATA[Ansarallah (the Houthis) and cryptocurrency-enabled terrorist financing]]></description><link>https://newsletter.insightthreatintel.com/p/from-tehran-to-sanaa-cryptocurrency</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/from-tehran-to-sanaa-cryptocurrency</guid><dc:creator><![CDATA[Jessica Davis, PhD]]></dc:creator><pubDate>Tue, 24 Feb 2026 14:02:37 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!0BCO!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ec115eb-33b1-4e33-8147-a3b6ffc1f04e_626x682.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>In part 1 of this series,<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a> we examined how Iran has increasingly turned to cryptocurrency as a core tool in its sanctions-evasion toolkit, using digital assets to bypass conventional financial controls and support its broader regional network of allied armed groups, including Hezbollah, Hamas, and Ansarallah (the Houthis).</em> <em>In today&#8217;s edition of the series, we&#8217;re looking at how Iran moves money to the Houthis using cryptocurrency, and the networks that underpin this capability. Have a read to learn more about this threat network, what it means for global instability, and how to counter it. </em></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Insight Monitor is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h4>Part 1: </h4><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;6b648439-eb08-48ad-90b5-a587f64e5319&quot;,&quot;caption&quot;:&quot;This article marks the start of an eight-part series examining how Iran has increasingly relied on cryptocurrency to circumvent international sanctions. These developments unfold against a volatile backdrop: Iran&#8217;s 2025 confrontation with Israel, the ongoing activity of its regional proxy network, and protests driven by corruption, economic hardship (ex&#8230;&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;The Axis of Illicit Finance: Iran&#8217;s Crypto Strategy Explained&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:33479672,&quot;name&quot;:&quot;Jessica Davis, PhD&quot;,&quot;bio&quot;:&quot;Jessica Davis is President of Insight Threat Intelligence and is the author of Women in Modern Terrorism: From Liberations Wars to Global Terrorism and the Islamic State (2017), and Illicit Money: Financing Terrorism in the 21st Century (2021).&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e312ae7c-114b-4e4f-9ce1-8bf50ddb7a27_2344x2049.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2026-01-06T14:00:45.585Z&quot;,&quot;cover_image&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/87b19738-1968-494d-aa46-98d0020cd199_845x486.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/the-axis-of-illicit-finance-irans&quot;,&quot;section_name&quot;:&quot;Financiers&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:183357175,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:8,&quot;comment_count&quot;:0,&quot;publication_id&quot;:329102,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!I_1w!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4649d7af-94ce-49ea-8c58-368ec26cd423_900x900.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>The first installment of this eight-part series outlined how one of the world&#8217;s most heavily sanctioned states has evolved its financial infrastructure &#8212; integrating traditional networks with crypto rails &#8212; to sustain its economy and underwrite proxy activities across the Middle East. Against a backdrop of geopolitical conflict and tightening sanctions, Iran&#8217;s adoption of cryptocurrency is not just about evading sanctions but about embedding itself in an emerging &#8220;axis of illicit finance&#8221; that links it with other sanctioned states and actors, making crypto increasingly central to its ability to fund and project influence through its affiliates. In recent years, Iran&#8217;s proxy networks have conducted on-chain activity of over $2 billion; this activity is <a href="https://www.chainalysis.com/blog/2026-crypto-crime-report-introduction/">based on confirmed wallets identified in sanctions designations</a>, and likely represents a low estimate of Iran&#8217;s true use of cryptocurrency for terrorist financing.</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;37bb6dd4-9a5e-4707-9564-84177048320e&quot;,&quot;caption&quot;:&quot;The Houthis began a military campaign in October 2023 in solidarity with Hamas by launching missile and drone strikes that targeted an Israeli tourist resort. Their campaign escalated with additional missile strikes throughout the region and claiming the downing of a&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;The Houthis&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:85208154,&quot;name&quot;:&quot;Elena Martynova&quot;,&quot;bio&quot;:&quot;Researching terrorism &quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e88b531d-b106-4c92-8177-62a8a864bde5_2316x2316.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2024-01-25T14:01:26.911Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2bc199a-093f-4978-87f7-4d63e7fe4136_1500x1000.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/the-houthis&quot;,&quot;section_name&quot;:&quot;Group Profiles &quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:141021522,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:3,&quot;comment_count&quot;:0,&quot;publication_id&quot;:329102,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!I_1w!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4649d7af-94ce-49ea-8c58-368ec26cd423_900x900.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><h3>Yemen, the Houthis, and the Axis of Resistance</h3><p>Over the last two years, the Houthis have become even more important to Iran amid <a href="https://sanaacenter.org/publications/analysis/26051">geopolitical losses</a>. At the same time, cryptocurrency has become increasingly important for Iran, with the IRGC&#8217;s share of Iran&#8217;s cryptocurrency ecosystem <a href="https://www.chainalysis.com/blog/iranian-crypto-activity-geopolitical-tensions-2026/">rising to 50</a>% in the last quarter of 2025. For instance, several reports indicate that <a href="https://www.coindesk.com/policy/2026/01/02/iran-accepts-cryptocurrency-as-payment-for-advanced-weapons">Iran accepts crypto payments</a> for military equipment purchases, even if those payments are not necessarily processed directly through websites. Ultimately, sanctions targeting both Iran and the Houthis, and Iran&#8217;s development of crypto rails for payments to its proxies (among other uses), likely complement other, more traditional payment methods like hawala, cash couriers, and even bank transfers.</p><p>Like the other axis members, Iran funds the Yemen branch of its axis of resistance (Ansarallah / The Houthis) in various ways, primarily by diverting profits from illicit oil sales through cryptocurrency transactions. The crypto component of Iran&#8217;s hybrid threat-financing network that funds the Houthis is illustrated below. Some of the basic details are as follows:  </p><ul><li><p>According to the US OFAC, the IRGC-QF cooperates with Iran-based<sup> </sup><a href="https://home.treasury.gov/news/press-releases/jy0221">Ansarallah financial official Sa&#8217;id al-Jamal</a>; OFAC has identified <a href="https://home.treasury.gov/news/press-releases/jy2757">five cryptocurrency wallets</a> associated with him. Al-Jamal also operates exchange companies in Sana&#8217;a, Yemen, specifically Janat al Anhar General Trading LLC (formerly Abu Sumbol General Trading LLC). These businesses <a href="https://home.treasury.gov/news/press-releases/sb0367">facilitate payment for Iranian oil</a>. </p></li><li><p>Funds transfers are also facilitated for him through a variety of money exchanges located in the United Arab Emirates (UAE), including <a href="https://home.treasury.gov/news/press-releases/jy0221">Adoon General Trading FZE</a>. Al-Jamal reportedly generates revenue through the illicit sale of Iranian petroleum to customers in East Asia using a network of shipping firms in Malaysia. (Malaysia acts as an intermediary for some Iranian oil, with Iranian oil re-labelled as originating from Malaysia and sold to other countries, <a href="https://www.reuters.com/markets/commodities/chinas-march-iranian-oil-imports-surge-us-sanctions-fears-2025-04-10/">including China</a>).<sup> </sup></p></li><li><p>These oil transactions often appear in Iran&#8217;s shadow banking network and refer to <a href="https://finintegrity.org/out-of-the-shadows/">&#8220;Malaysian blend&#8221;</a> oil. Some of these transactions have been small-denomination inflows through <a href="https://www.trmlabs.com/resources/blog/new-drones-old-tactics-how-iran-uses-crypto-to-fund-conflict-and-evade-sanctions">informal exchanges</a>.</p></li></ul><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!0BCO!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ec115eb-33b1-4e33-8147-a3b6ffc1f04e_626x682.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!0BCO!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ec115eb-33b1-4e33-8147-a3b6ffc1f04e_626x682.png 424w, https://substackcdn.com/image/fetch/$s_!0BCO!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ec115eb-33b1-4e33-8147-a3b6ffc1f04e_626x682.png 848w, https://substackcdn.com/image/fetch/$s_!0BCO!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ec115eb-33b1-4e33-8147-a3b6ffc1f04e_626x682.png 1272w, https://substackcdn.com/image/fetch/$s_!0BCO!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ec115eb-33b1-4e33-8147-a3b6ffc1f04e_626x682.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!0BCO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ec115eb-33b1-4e33-8147-a3b6ffc1f04e_626x682.png" width="626" height="682" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9ec115eb-33b1-4e33-8147-a3b6ffc1f04e_626x682.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:682,&quot;width&quot;:626,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:130798,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://newsletter.insightthreatintel.com/i/186790350?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ec115eb-33b1-4e33-8147-a3b6ffc1f04e_626x682.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!0BCO!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ec115eb-33b1-4e33-8147-a3b6ffc1f04e_626x682.png 424w, https://substackcdn.com/image/fetch/$s_!0BCO!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ec115eb-33b1-4e33-8147-a3b6ffc1f04e_626x682.png 848w, https://substackcdn.com/image/fetch/$s_!0BCO!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ec115eb-33b1-4e33-8147-a3b6ffc1f04e_626x682.png 1272w, https://substackcdn.com/image/fetch/$s_!0BCO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ec115eb-33b1-4e33-8147-a3b6ffc1f04e_626x682.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>These transactions are not limited to the Middle East and are linked to the broader illicit finance network<sup> </sup>through Russia, specifically the Russian cryptocurrency exchange <a href="https://www.trmlabs.com/resources/blog/the-takedown-of-garantex-a-notorious-crypto-exchanges-role-in-illicit-finance">Garantex</a>, which is <a href="https://www.icij.org/news/2025/09/cryptocurrency-exchange-garantex-lives-on-despite-sanctions-new-report-unveils/">reportedly still active</a> despite sanctions and domain seizure. In April 2025, the US further identified eight wallets associated with Sa&#8217;id Al-Jamal and indicated that, in addition to facilitating illicit petroleum sales, he is also involved in weapons procurement from Russia and facilitating the sale of stolen <a href="https://home.treasury.gov/news/press-releases/sb0068">Ukrainian grain</a>. These addresses included six private wallets and two deposit addresses at mainstream services. According to Chainalysis, these addresses have moved nearly <a href="https://www.chainalysis.com/blog/ofac-sanctions-houthi-network-crypto-money-laundering-russia-april-2025/">$1 billion in illicit funds</a>. As part of this activity, the Houthis used deposit addresses at Garantex. In early 2026, allegations surfaced about the role of Binance in Iran&#8217;s illicit finance network, including for sending money to the Houthis. These allegations suggest that Binance has facilitated over $1.7 billion for Iran / IRGC / Axis of Resistance.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-2" href="#footnote-2" target="_self">2</a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/p/from-tehran-to-sanaa-cryptocurrency?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/p/from-tehran-to-sanaa-cryptocurrency?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p><strong>Financial Intelligence Sources</strong></p><p><em>Do you want to identify and exploit new sources of financial intelligence? Our evergreen course is your guide to finding, analyzing, and contextualizing open source financial intelligence. This step-by-step guide to FININT sources will greatly expand your intelligence knowledge and skills. This course is perfect for people new to financial intelligence and seasoned professionals. <a href="https://insightthreatintelligence.thinkific.com/courses/FININTSources">Enroll today</a></em></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://insightthreatintelligence.thinkific.com/courses/FININTSources" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Vv2Y!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e2d12f5-a284-4cb1-95cf-04742c85d0af_1144x400.png 424w, https://substackcdn.com/image/fetch/$s_!Vv2Y!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e2d12f5-a284-4cb1-95cf-04742c85d0af_1144x400.png 848w, https://substackcdn.com/image/fetch/$s_!Vv2Y!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e2d12f5-a284-4cb1-95cf-04742c85d0af_1144x400.png 1272w, https://substackcdn.com/image/fetch/$s_!Vv2Y!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e2d12f5-a284-4cb1-95cf-04742c85d0af_1144x400.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Vv2Y!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e2d12f5-a284-4cb1-95cf-04742c85d0af_1144x400.png" width="1144" height="400" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8e2d12f5-a284-4cb1-95cf-04742c85d0af_1144x400.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:400,&quot;width&quot;:1144,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:357457,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://insightthreatintelligence.thinkific.com/courses/FININTSources&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://newsletter.insightthreatintel.com/i/153040222?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e2d12f5-a284-4cb1-95cf-04742c85d0af_1144x400.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!Vv2Y!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e2d12f5-a284-4cb1-95cf-04742c85d0af_1144x400.png 424w, https://substackcdn.com/image/fetch/$s_!Vv2Y!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e2d12f5-a284-4cb1-95cf-04742c85d0af_1144x400.png 848w, https://substackcdn.com/image/fetch/$s_!Vv2Y!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e2d12f5-a284-4cb1-95cf-04742c85d0af_1144x400.png 1272w, https://substackcdn.com/image/fetch/$s_!Vv2Y!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e2d12f5-a284-4cb1-95cf-04742c85d0af_1144x400.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2>An International Network</h2><p>Anyone versed in counter-terrorist financing will also not find it surprising that this terrorist financing network has connections in T&#252;rkiye. According to OFAC, T&#252;rkiye-based Hassan Jafari has also worked with Sa&#8217;id al-Jamal to launder money on behalf of al-Jamal&#8217;s network and has arranged payments worth millions of dollars in support of <a href="https://home.treasury.gov/news/press-releases/sb0068">shipments for the Houthis</a>. Jafari has also worked with brothers Hushang and Sohrab Gahirat on the Houthis&#8217; commercial initiatives in Russia, including arms procurement and <a href="https://home.treasury.gov/news/press-releases/sb0068">grain shipments</a>.</p><p>Part of this network also extends into Syria. For instance, Alireza Derakshan and Arash Estaki Alivand coordinated more than $100 million in oil sales for the Iranian government through cryptocurrency and used a network of front companies across multiple jurisdictions. <a href="https://home.treasury.gov/news/press-releases/sb0248">Alivand worked as a financial facilitator</a> and oil broker for Syria-based Al Qatirji Company, while Derakhshan used UAE-based Minato Commercial Brokers as a front company to make a payment to Al Qatirji Company.</p><p>In Yemen, a network of money service businesses connects and facilitates cryptocurrency payments, as well as traditional financial transfers and likely cash-out services: </p><ul><li><p>Houthi finance official, Abdullah al-Jamal, has used a network of money service businesses, trade facilitators, and cryptocurrency addresses to move funds. </p></li><li><p>He has used the Sana&#8217;a-based money service business Mohammed Ali Al Thawr Exchange, and he also controls the Davos Exchange and Remittances company. </p></li><li><p>Other exchanges, specifically<sup> </sup>Khaled Al Hazmi and Brother Company General Partnership, have also transferred funds to <a href="https://home.treasury.gov/news/press-releases/jy2757.">Davos Exchange</a> as part of this illicit activity.</p></li></ul><p>This cryptocurrency network does not operate in isolation. Instead, it plugs directly into a wider ecosystem of exchange houses, front companies, and long-standing smuggling routes tied to the Houthis&#8217; weapons-procurement apparatus. Together, these crypto nodes form a parallel financial architecture&#8212;one that functions as a secondary payment system &#8212;designed to move value, settle transactions, and sustain illicit activity while insulating the network from sanctions and traditional financial controls. While parts of this network are visible through on-chain analysis, additional off-chain activity (including cash and hawala transactions) likely further obfuscates the network's full extent.</p><p>Iran and the Houthis&#8217; hybrid threat finance system is likely growing in complexity and sophistication, and is facilitated by access to greater pools of illicit cryptocurrency funds provided by Chinese money laundering networks. Furthermore, Ansarallah has used privacy-enhancing tools such as <a href="https://www.trmlabs.com/resources/blog/new-drones-old-tactics-how-iran-uses-crypto-to-fund-conflict-and-evade-sanctions">mixers and cross-chain protocols</a>, demonstrating financial tradecraft capabilities.</p><p>Ansarallah&#8217;s use of cryptocurrency for financing, facilitated by a small number of identified individuals, reflects a broader and potentially more complex network linked to Iran. These facilitators operate through companies, hawalas, and exchanges in T&#252;rkiye, Russia, Yemen, Syria, Lebanon, and the UAE, thereby enabling the group to access financial infrastructure beyond Yemen&#8217;s borders. While current evidence highlights these specific connections, it remains unclear whether this network represents the entirety of Ansarallah&#8217;s crypto-financing apparatus or merely the visible edge of a much larger system. The opacity of these networks, combined with Iran&#8217;s established role in supporting proxy groups through both traditional and emerging financial channels, suggests that the full scale and sophistication of Ansarallah&#8217;s digital financing strategy might still be underappreciated. </p><p>Following Iran&#8217;s significant military setbacks in the first half of 2025, <a href="https://sanaacenter.org/the-yemen-review/april-june-2025/25031">Iran needs Ansarallah more than ever</a>, and faces significant sunk costs in terms of existing investment in the group. As a result, Iran is likely to continue, and could increase, support for the group, and some of the tens or <a href="https://doi.org/10.1080/1057610X.2021.1954353">hundreds of millions of dollars a year that Iran provides to the group</a><sup> </sup>might increasingly move through cryptocurrency.</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;d71fce51-1012-4099-9ea5-8a10b11ce2cb&quot;,&quot;caption&quot;:&quot;Since October 2023, the Houthis have intensified their military operations in solidarity with Hamas, launching missile and drone attacks that have destabilized the region and disrupted global shipping in the Red Sea. Their personnel strength has further expanded to encompass&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Sanctioned but Sustained: Why the Houthis&#8217; Finances Endure Global Pressure&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:85208154,&quot;name&quot;:&quot;Elena Martynova&quot;,&quot;bio&quot;:&quot;Researching terrorism &quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e88b531d-b106-4c92-8177-62a8a864bde5_2316x2316.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2025-07-17T13:02:12.976Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!DbUL!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1ce816cd-716d-475f-b975-135412b63737_936x624.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/sanctioned-but-sustained-why-the&quot;,&quot;section_name&quot;:&quot;Group Profiles &quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:167732270,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:6,&quot;comment_count&quot;:0,&quot;publication_id&quot;:329102,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!I_1w!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4649d7af-94ce-49ea-8c58-368ec26cd423_900x900.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/p/from-tehran-to-sanaa-cryptocurrency?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thanks for reading Insight Monitor! This post is public so feel free to share it.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/p/from-tehran-to-sanaa-cryptocurrency?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/p/from-tehran-to-sanaa-cryptocurrency?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div><p><em>&#169; 2026 Insight Threat Intelligence Ltd. All Rights Reserved.<br><br>This newsletter and its contents are protected by Canadian copyright law. Except as otherwise provided for under Canadian copyright law, this newsletter and its contents may not be copied, published, distributed, downloaded or otherwise stored in a retrieval system, transmitted or converted, in any form or by any means, electronic or otherwise, without the prior written permission of the copyright owner.</em></p><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-1" href="#footnote-anchor-1" class="footnote-number" contenteditable="false" target="_self">1</a><div class="footnote-content"><p>This research is part of my post-doctoral work funded by the University of Calgary&#8217;s Faculty of Law.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-2" href="#footnote-anchor-2" class="footnote-number" contenteditable="false" target="_self">2</a><div class="footnote-content"><p>I remain somewhat skeptical of these numbers; many wallets are used for different purposes (and sometimes serve as cash-out services or hawalas), so counting all transactions as part of a terrorist financing network might not be accurate. It&#8217;s worth having a solid understanding of a methodology before fully embracing these estimates. </p></div></div>]]></content:encoded></item><item><title><![CDATA[JNIM's $50 million windfall]]></title><description><![CDATA[And how it will impact terrorism in the region]]></description><link>https://newsletter.insightthreatintel.com/p/jnims-50-million-windfall</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/jnims-50-million-windfall</guid><dc:creator><![CDATA[Jessica Davis, PhD]]></dc:creator><pubDate>Tue, 04 Nov 2025 11:35:29 GMT</pubDate><enclosure url="https://images.unsplash.com/photo-1619149808494-d9a0a7eba166?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxtb25leSUyMHRlcnJvcmlzbSUyMHVhZXxlbnwwfHx8fDE3NjIxODQ2MTh8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>JNIM (<em>Al-Qaeda affiliate Jama&#8217;at Nusrat al-Islam wal-Muslimin)</em> has been on the march in Africa, expanding its areas of operations across <a href="https://eurafrica.info/2025/07/09/jnim-in-mali-how-an-al-qaeda-offshoot-became-one-of-africas-deadliest-militant-groups/">Burkina Faso, Mali, and Niger</a>, and most recently into <a href="https://www.aljazeera.com/news/2025/10/31/al-qaeda-linked-jnim-says-one-killed-in-its-first-nigeria-attack">Nigeria</a>. The group has encroached on Mali&#8217;s capital, Bamako, and created a fuel blockade over the last two months that has seriously threatened the capital. </p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://images.unsplash.com/photo-1619149808494-d9a0a7eba166?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxtb25leSUyMHRlcnJvcmlzbSUyMHVhZXxlbnwwfHx8fDE3NjIxODQ2MTh8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://images.unsplash.com/photo-1619149808494-d9a0a7eba166?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxtb25leSUyMHRlcnJvcmlzbSUyMHVhZXxlbnwwfHx8fDE3NjIxODQ2MTh8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1619149808494-d9a0a7eba166?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxtb25leSUyMHRlcnJvcmlzbSUyMHVhZXxlbnwwfHx8fDE3NjIxODQ2MTh8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1619149808494-d9a0a7eba166?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxtb25leSUyMHRlcnJvcmlzbSUyMHVhZXxlbnwwfHx8fDE3NjIxODQ2MTh8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1619149808494-d9a0a7eba166?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxtb25leSUyMHRlcnJvcmlzbSUyMHVhZXxlbnwwfHx8fDE3NjIxODQ2MTh8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1456w" sizes="100vw"><img src="https://images.unsplash.com/photo-1619149808494-d9a0a7eba166?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxtb25leSUyMHRlcnJvcmlzbSUyMHVhZXxlbnwwfHx8fDE3NjIxODQ2MTh8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" width="252" height="168" data-attrs="{&quot;src&quot;:&quot;https://images.unsplash.com/photo-1619149808494-d9a0a7eba166?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxtb25leSUyMHRlcnJvcmlzbSUyMHVhZXxlbnwwfHx8fDE3NjIxODQ2MTh8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:2656,&quot;width&quot;:3984,&quot;resizeWidth&quot;:252,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;person holding 5000 indonesian rupiah&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="person holding 5000 indonesian rupiah" title="person holding 5000 indonesian rupiah" srcset="https://images.unsplash.com/photo-1619149808494-d9a0a7eba166?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxtb25leSUyMHRlcnJvcmlzbSUyMHVhZXxlbnwwfHx8fDE3NjIxODQ2MTh8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1619149808494-d9a0a7eba166?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxtb25leSUyMHRlcnJvcmlzbSUyMHVhZXxlbnwwfHx8fDE3NjIxODQ2MTh8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1619149808494-d9a0a7eba166?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxtb25leSUyMHRlcnJvcmlzbSUyMHVhZXxlbnwwfHx8fDE3NjIxODQ2MTh8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1619149808494-d9a0a7eba166?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxtb25leSUyMHRlcnJvcmlzbSUyMHVhZXxlbnwwfHx8fDE3NjIxODQ2MTh8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/@mufidpwt">Mufid Majnun</a> on <a href="https://unsplash.com">Unsplash</a></figcaption></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/p/jnims-50-million-windfall?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/p/jnims-50-million-windfall?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p>Last week, news reports surfaced indicating that JNIM  received a <a href="https://www.reuters.com/world/middle-east/deal-reached-free-uae-hostages-mali-sources-say-2025-10-31/">$50 million ransom</a> from the UAE for several hostages the group had kidnapped. This is not new: JNIM has conducted widespread kidnapping campaigns targeting foreign nationals to finance its operations.  However, according to BBC Monitoring, the exchange also involved an additional $20 million of arms and ammunition for the militants,<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a> and the release of 20 JNIM prisoners from a Bamako jail. <em>(Alternatively, some sources report that JNIM will receive an additional $20 million instead of the arms and ammunition.)</em> As part of the deal, JNIM militants began allowing fuel tankers and trucks to reach the capital. (Other sources, including the excellent <a href="https://youtu.be/UrettJWdtXQ?si=VB4e436973JYywsi">Wassim Nasr,</a> report that the blockade remains in place and that this was not part of the negotiation.)</p><p>Prior to 2020, groups within the JNIM umbrella were primarily conducting local kidnappings for ransom. These &#8220;snatch and grab&#8221; kidnappings tend to be shorter in duration and raise smaller sums of money, while international kidnappings for ransom tend to generate far greater ransoms. (I analyze this distinction in my book <em><a href="https://www.rienner.com/title/Illicit_Money_Financing_Terrorism_in_the_Twenty_First_Century">Illicit Money: Financing Terrorism in the 21st Century</a></em>). In 2020, JNIM secured around <a href="https://theconversation.com/funding-terror-how-west-africas-deadly-jihadists-get-the-money-they-need-to-survive-242306">$40 million in ransom</a> for one French and two Italian hostages, so these sums of money are not unprecedented for the group.</p><p>Here at <em><strong>Insight Monitor</strong></em>, we ~very~ roughly estimate that JNIM generates about $100 million per year in revenues. <em>(Estimating terrorist revenues is extremely difficult, particularly as it tends to rely on estimates of informal economic activity, taxation, extortion, territory controlled, and a host of other sources of funds. You can read our full analysis below.)</em></p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;a6843928-11ae-49fa-8ee5-36a04f71254e&quot;,&quot;caption&quot;:&quot;Jama&#8217;at Nusrat al-Islam wal-Muslimin (JNIM), the al-Qaeda&#8211;aligned coalition formed in 2017, has become one of the world&#8217;s most dangerous terrorist organizations. Operating throughout the Sahel, the group has doubled the number of attacks it has carried out in 2025 compared to 2024.&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Gold, Guns, and Cattle: JNIM&#8217;s $100 million War Economy in the Sahel&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:85208154,&quot;name&quot;:&quot;Elena Martynova&quot;,&quot;bio&quot;:&quot;Researching terrorism &quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e88b531d-b106-4c92-8177-62a8a864bde5_2316x2316.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2025-09-11T13:02:49.249Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!U9BF!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe931ae1e-7ae6-47bb-8eca-8987cb71a4a8_1500x1000.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/gold-guns-and-cattle-jnims-30-billion&quot;,&quot;section_name&quot;:&quot;Group Profiles &quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:172677416,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:7,&quot;comment_count&quot;:2,&quot;publication_id&quot;:329102,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!I_1w!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4649d7af-94ce-49ea-8c58-368ec26cd423_900x900.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>They use this money to pay for fighters, food, sustenance, and sometimes weapons (although many of their weapons have been stolen from the various militaries they confront), as well as to provide <a href="https://theconversation.com/why-an-armed-group-linked-to-al-qaida-is-gaining-ground-in-mali-268787">governance, security, and justice</a> in their areas of territorial control. This money also helps to accelerate their <a href="https://www.orfonline.org/expert-speak/sub-saharan-africa-remains-the-epicentre-of-global-jihadist-terrorism">operational reach and sophistication</a> by allowing them to purchase and use improvised explosive devices and <a href="https://smallwarsjournal.com/2025/08/17/countering-jnims-drone-proliferation-in-the-sahel/">drones to conduct assaults</a>. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://insightthreatintelligence.thinkific.com/bundles/tf-analysis" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!f7rH!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 424w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 848w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 1272w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!f7rH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png" width="1066" height="507" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:507,&quot;width&quot;:1066,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:698946,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://insightthreatintelligence.thinkific.com/bundles/tf-analysis&quot;,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!f7rH!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 424w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 848w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 1272w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><p><em>Our terrorist financing analysis course caters to researchers, intelligence, law enforcement, and compliance professionals to help them learn about terrorist financing and analyze suspicious patterns and activities more effectively. Sign up today!</em></p><div><hr></div><p>This ransom is not pure profit for JNIM: there will be <a href="https://www.rienner.com/title/Illicit_Money_Financing_Terrorism_in_the_Twenty_First_Century">fees to be paid</a> to those involved in hostage care, negotiations, security, etc., but this will still be a lot of money for the group. It&#8217;s important to note that ransom payments <a href="https://journals.sagepub.com/doi/10.1177/00207020221130308">do not always lead directly</a> to more terrorist attacks. However, in this case, research suggests that there will be at least a short-term <a href="https://www.tandfonline.com/doi/full/10.1080/09546553.2025.2565449">increase in the number or intensity</a> of attacks. Further, given the state of the militant advance on the capital, this influx of funds could provide a significant cash reserve for the group as they combat Malian forces. Regardless, kidnapping for ransom has been, and will remain, a core part of the group&#8217;s business model. Targeting mining operations and foreign nationals will be a focus for the group, because these types of international kidnappings for ransom generate the most profits, particularly with governments (and corporations) that have the financial (and moral) capacity to pay. </p><p>While JNIM&#8217;s strategic goals regarding the capital (and Mali in general) are contested, this money could well support a <a href="https://theconversation.com/why-an-armed-group-linked-to-al-qaida-is-gaining-ground-in-mali-268787">full-scale siege</a> of Bamako. And if not a siege, the money will certainly allow JNIM more operational freedom of movement in the coming months, and likely incentivize them to gain more territory and solidify control and influence in the region. This influx of funds is certainly not going to help the security situation in Mali in the short to medium term and will likely enable more operations (and more technologically sophisticated attacks) in the coming months. </p><p><em>If you&#8217;ve been thinking about subscribing to <strong>Insight Monitor</strong></em>, <em>the time to lock in is now! Our prices will increase (modestly) in 2026. </em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/subscribe?"><span>Subscribe now</span></a></p><p><em>&#169; 2025 Insight Threat Intelligence Ltd. All Rights Reserved.<br><br>This newsletter and its contents are protected by Canadian copyright law. Except as otherwise provided for under Canadian copyright law, this newsletter and its contents may not be copied, published, distributed, downloaded or otherwise stored in a retrieval system, transmitted or converted, in any form or by any means, electronic or otherwise, without the prior written permission of the copyright owner.</em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/p/jnims-50-million-windfall?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/p/jnims-50-million-windfall?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p></p><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-1" href="#footnote-anchor-1" class="footnote-number" contenteditable="false" target="_self">1</a><div class="footnote-content"><p>Also reported by Wassim Nasr: https://x.com/SimNasr/status/1985384025754910880</p></div></div>]]></content:encoded></item><item><title><![CDATA[Why Disrupting the La Familia Michoacana Cartel Is More Difficult Than Seizing Their Drugs]]></title><description><![CDATA[Group Profile]]></description><link>https://newsletter.insightthreatintel.com/p/why-disrupting-the-la-familia-michoacana</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/why-disrupting-the-la-familia-michoacana</guid><dc:creator><![CDATA[Elena Martynova]]></dc:creator><pubDate>Tue, 30 Sep 2025 13:02:41 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!1BJS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F71367c0d-5a52-4892-bfd7-5fbb176254e3_1088x562.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>La Familia Michoacana (LFM) is an umbrella organization composed of multiple criminal cartel factions in Mexico. Among these, <strong>La Nueva Familia Michoacana </strong>and the<strong> United Cartels </strong>are the most significant, both of which have been <a href="https://www.dea.gov/sites/default/files/2025-07/2025NationalDrugThreatAssessment.pdf">designated as Foreign Terrorist Organizations (FTOs)</a> by the US Department of State. This article, part of our series on the financial structures of major criminal groups, provides a profile of LFM and its factions. It examines the origins and operations of the group as well as its financial strategies: how funds are raised, used, stored, moved, managed, and obscured, highlighting the mechanisms that keep LFM one of Mexico&#8217;s most profitable criminal networks.</em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/subscribe?"><span>Subscribe now</span></a></p><h3><strong>Origins and Operations</strong></h3><p>LFM started in the Mexican state of <a href="https://www.dea.gov/sites/default/files/2025-07/2025NationalDrugThreatAssessment.pdf">Michoac&#225;n in 2006</a>.<em> </em>The group <a href="https://www.ojp.gov/ncjrs/virtual-library/abstracts/los-zetas-and-la-familia-michoacana-drug-trafficking-organizations">originally split</a> from <a href="https://newsletter.insightthreatintel.com/p/narco-economics-the-gulf-cartels">the Gulf Cartel</a> and its armed wing, Los Zetas, and established itself by mixing violence with religious rhetoric. Under its leader Nazario Moreno Gonz&#225;lez, LFM promoted a <a href="https://insightcrime.org/mexico-organized-crime-news/familia-michoacana-mexico-profile/">quasi-religious doctrine</a> of family values, discipline, and moral order, even as it trafficked drugs and killed rivals. It became famous for a <a href="https://www.ojp.gov/ncjrs/virtual-library/abstracts/los-zetas-and-la-familia-michoacana-drug-trafficking-organizations">2006 attack in Uruapan</a>, when members threw five severed heads onto a nightclub floor. The group&#8217;s activities <a href="https://insightcrime.org/mexico-organized-crime-news/familia-michoacana-mexico-profile/">initially centred on the production and distribution of methamphetamine, marijuana, and other illicit drugs and precursor chemicals</a>, but over time diversified into extortion, racketeering, and kidnapping.</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;caddf7ca-e786-410c-8494-e5ae59c8f6a2&quot;,&quot;caption&quot;:&quot;In early 2025, the US designated several major drug cartels as foreign terrorist organizations, a move that triggered sanctions such as asset freezes and strict limitations on financial transactions. This action, covered in detail in the &#8220;Podmergency&#8221; Secure Line episode&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Narco-Economics: The Gulf Cartel&#8217;s Money&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:85208154,&quot;name&quot;:&quot;Elena Martynova&quot;,&quot;bio&quot;:&quot;Research Analyst &quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e88b531d-b106-4c92-8177-62a8a864bde5_2316x2316.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2025-09-02T10:57:28.299Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!tVjv!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F96cac9f4-cbcd-48ea-b583-43d8c19931b2_1500x1000.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/narco-economics-the-gulf-cartels&quot;,&quot;section_name&quot;:&quot;Group Profiles &quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:169672361,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:4,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!qcEy!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc845f459-e1ac-4902-ad4d-0887e24ab430_900x900.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>While the original LFM fragmented after Moreno&#8217;s reported death in 2010, its successors remain powerful. Today, there are two major factions: La Nueva Familia Michoacana (LNFM) and the United Cartels (C&#225;rteles Unidos, CU). These factions operate under the broader LFM umbrella but retain independent financial and operational structures. LNFM <a href="https://www.dea.gov/sites/default/files/2025-07/2025NationalDrugThreatAssessment.pdf">focuses its operations in Guerrero and Michoac&#225;n</a> (including the Port of L&#225;zaro C&#225;rdenas, one of Mexico&#8217;s largest seaports), whereas CU exerts influence in <a href="https://www.dea.gov/sites/default/files/2025-07/2025NationalDrugThreatAssessment.pdf">southern Michoac&#225;n and has extended operations into neighbouring states</a> (with territory overlapping that of LNFM). LNFM is the most powerful faction and alone is responsible for the <a href="https://www.justice.gov/usao-ndga/pr/la-nueva-familia-michoacana-drug-cartel-member-sentenced-federal-prison">annual transportation, importation, and distribution</a> of approximately 12 tons of methamphetamine, 13 tons of opioids, including heroin and fentanyl, and 18 tons of cocaine in the United States.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://www.dea.gov/sites/default/files/2025-07/2025NationalDrugThreatAssessment.pdf" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!88hW!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1f49e38-f580-4fab-8b40-2ba0169e679a_936x680.png 424w, https://substackcdn.com/image/fetch/$s_!88hW!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1f49e38-f580-4fab-8b40-2ba0169e679a_936x680.png 848w, https://substackcdn.com/image/fetch/$s_!88hW!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1f49e38-f580-4fab-8b40-2ba0169e679a_936x680.png 1272w, https://substackcdn.com/image/fetch/$s_!88hW!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1f49e38-f580-4fab-8b40-2ba0169e679a_936x680.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!88hW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1f49e38-f580-4fab-8b40-2ba0169e679a_936x680.png" width="936" height="680" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d1f49e38-f580-4fab-8b40-2ba0169e679a_936x680.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:680,&quot;width&quot;:936,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:212136,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://www.dea.gov/sites/default/files/2025-07/2025NationalDrugThreatAssessment.pdf&quot;,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://newsletter.insightthreatintel.com/i/173076037?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1f49e38-f580-4fab-8b40-2ba0169e679a_936x680.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!88hW!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1f49e38-f580-4fab-8b40-2ba0169e679a_936x680.png 424w, https://substackcdn.com/image/fetch/$s_!88hW!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1f49e38-f580-4fab-8b40-2ba0169e679a_936x680.png 848w, https://substackcdn.com/image/fetch/$s_!88hW!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1f49e38-f580-4fab-8b40-2ba0169e679a_936x680.png 1272w, https://substackcdn.com/image/fetch/$s_!88hW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1f49e38-f580-4fab-8b40-2ba0169e679a_936x680.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div>
      <p>
          <a href="https://newsletter.insightthreatintel.com/p/why-disrupting-the-la-familia-michoacana">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Gold, Guns, and Cattle: JNIM’s $100 million War Economy in the Sahel]]></title><description><![CDATA[Group Profile]]></description><link>https://newsletter.insightthreatintel.com/p/gold-guns-and-cattle-jnims-30-billion</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/gold-guns-and-cattle-jnims-30-billion</guid><dc:creator><![CDATA[Elena Martynova]]></dc:creator><pubDate>Thu, 11 Sep 2025 13:02:49 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!U9BF!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe931ae1e-7ae6-47bb-8eca-8987cb71a4a8_1500x1000.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Jama&#8217;at Nusrat al-Islam wal-Muslimin (JNIM), the al-Qaeda&#8211;aligned coalition formed in 2017, has become <a href="https://www.economicsandpeace.org/wp-content/uploads/2024/02/GTI-2024-web-290224.pdf#page=4">one of the world&#8217;s most dangerous terrorist organizations</a>. Operating throughout the Sahel, the group has <a href="https://www.bbc.com/news/articles/cg4r5wylwq6o">doubled the number of attacks</a> it has carried out in 2025 compared to 2024.</em></p><p><em>We have previously examined JNIM subgroups, with articles on <a href="https://newsletter.insightthreatintel.com/p/al-mourabitoun">Al Mourabitoun</a> and <a href="https://newsletter.insightthreatintel.com/p/ansar-al-dine">Ansar al-Dine</a> available on Substack and Katibat Macina included in our terrorism financing case study library. This post provides a standalone overview of JNIM, focusing on developments in its financial profile since 2023. The group&#8217;s strength is not only related to its operational tempo, but also to its ability to raise, manage, and obscure funds.</em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/subscribe?"><span>Subscribe now</span></a></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!U9BF!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe931ae1e-7ae6-47bb-8eca-8987cb71a4a8_1500x1000.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!U9BF!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe931ae1e-7ae6-47bb-8eca-8987cb71a4a8_1500x1000.png 424w, https://substackcdn.com/image/fetch/$s_!U9BF!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe931ae1e-7ae6-47bb-8eca-8987cb71a4a8_1500x1000.png 848w, https://substackcdn.com/image/fetch/$s_!U9BF!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe931ae1e-7ae6-47bb-8eca-8987cb71a4a8_1500x1000.png 1272w, https://substackcdn.com/image/fetch/$s_!U9BF!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe931ae1e-7ae6-47bb-8eca-8987cb71a4a8_1500x1000.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!U9BF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe931ae1e-7ae6-47bb-8eca-8987cb71a4a8_1500x1000.png" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e931ae1e-7ae6-47bb-8eca-8987cb71a4a8_1500x1000.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:111378,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://newsletter.insightthreatintel.com/i/172677416?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe931ae1e-7ae6-47bb-8eca-8987cb71a4a8_1500x1000.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!U9BF!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe931ae1e-7ae6-47bb-8eca-8987cb71a4a8_1500x1000.png 424w, https://substackcdn.com/image/fetch/$s_!U9BF!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe931ae1e-7ae6-47bb-8eca-8987cb71a4a8_1500x1000.png 848w, https://substackcdn.com/image/fetch/$s_!U9BF!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe931ae1e-7ae6-47bb-8eca-8987cb71a4a8_1500x1000.png 1272w, https://substackcdn.com/image/fetch/$s_!U9BF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe931ae1e-7ae6-47bb-8eca-8987cb71a4a8_1500x1000.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3><strong>Origins and Operations</strong></h3><p>JNIM was created in March 2017 through the merger of <a href="https://www.bbc.com/news/articles/cg4r5wylwq6o">several jihadist groups</a> operating in Mali and the wider Sahel: Ansar Dine, Katibat Macina, Al-Mourabitoun, Ansar al-Islam, and the Sahara branch of al-Qaeda in the Islamic Maghreb (AQIM). The coalition consolidated these different jihadist entities into a unified front, enabling greater coordination, shared resources, and a collective identity under the al-Qaeda banner. Iyad Ag Ghali, a Tuareg former diplomat and rebel, <a href="https://www.bbc.com/news/articles/cg4r5wylwq6o">is the leader of JNIM</a>, while Amadou Koufa, a Fulani cleric, is deputy.</p><p>As of 2025, JNIM has <a href="https://www.washingtonpost.com/world/2025/06/08/jnim-militants-west-africa-sahel-terrorism/">around 6,000 fighters</a>, making it the largest militant force in the region. Its strongholds stretch from Mali and Burkina Faso into Niger and the Gulf of Guinea states, with Burkina Faso alone recording over <a href="https://www.bbc.com/news/articles/cg4r5wylwq6o">280 JNIM attacks</a> in the first half of 2025. Militarily, the group deploys guerrilla warfare tactics, ambushes, and suicide bombings, often <a href="https://acleddata.com/report/jamaat-nusrat-al-islam-wal-muslimin-jnim">targeting state forces</a>, international missions, and rival jihadist groups such as the Islamic State Sahel Province. Politically, JNIM seeks to build legitimacy in communities by positioning itself as a security provider and enforcer of &#8220;justice.&#8221;</p><h3><strong>Raising Funds</strong></h3><p>JNIM is predominantly financed through local revenue streams as part of the Sahel&#8217;s war economy.</p><h4><em><strong>Gold Mining</strong></em></h4><p>Artisanal gold mining is JNIM&#8217;s most profitable sector. The group controls or influences mining sites, regulates access, and taxes production and transport. Within JNIM-controlled areas, artisanal sites can produce up to 725 kilograms of gold annually, worth <a href="http://theconversation.com/funding-terror-how-west-africas-deadly-jihadists-get-the-money-they-need-to-survive-242306">approximately US$34 million</a>, with primary export destinations in the United Arab Emirates, Turkey, and Switzerland. Revenue from gold mining is not only financial but <a href="https://reliefweb.int/report/mali/non-state-armed-groups-and-illicit-economies-west-africa-jamaat-nusrat-al-islam-wal-muslimin-jnim">also strategic</a>: mines serve as recruitment grounds, storage sites for weapons, and logistical hubs, allowing JNIM to secure both resources and social influence.</p><h4><em><strong>Kidnapping for Ransom</strong></em></h4><p>Kidnapping for ransom has declined slightly as a source of revenue but remains a central element of JNIM&#8217;s financing strategy. Between 2017 and 2023, the group <a href="http://theconversation.com/funding-terror-how-west-africas-deadly-jihadists-get-the-money-they-need-to-survive-242306">carried out 845 of 1,100</a> recorded kidnappings across Mali, Burkina Faso, and Niger. Ransom amounts vary widely: local businessmen can be released for sums as low as <a href="https://reliefweb.int/report/mali/non-state-armed-groups-and-illicit-economies-west-africa-jamaat-nusrat-al-islam-wal-muslimin-jnim">$3,000&#8211;$5,000</a>, while foreigners can get multimillion-dollar payouts. In 2020, JNIM reportedly secured a <a href="http://theconversation.com/funding-terror-how-west-africas-deadly-jihadists-get-the-money-they-need-to-survive-242306">~$40.5 million ransom</a> for the release of one French and two Italian hostages. More recently, reflecting the group&#8217;s continued focus on resource extraction, JNIM <a href="https://thesoufancenter.org/intelbrief-2025-july-15/">abducted four foreign nationals</a> in July 2025 from a major cement and lime production site in Karaga.</p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://insightthreatintelligence.thinkific.com/bundles/tf-analysis" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!f7rH!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 424w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 848w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 1272w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!f7rH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png" width="1066" height="507" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:507,&quot;width&quot;:1066,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:698946,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://insightthreatintelligence.thinkific.com/bundles/tf-analysis&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!f7rH!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 424w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 848w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 1272w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Our terrorist financing analysis course caters to researchers, intelligence, law enforcement, and compliance professionals to help them learn about terrorist financing, and analyze suspicious patterns and activities more effectively. As part of the course, you receive access to a Case Study Library that contains more group profiles like this one. Sign up today!</p><div><hr></div><h4><em><strong>Livestock Theft (often reported as &#8216;Cattle Rustling&#8217;)</strong></em></h4><p>JNIM has increasingly relied on livestock as a source of revenue, using both theft and coercion. They sometimes raid communities and steal cattle outright, while in other cases they seize animals under the pretense of collecting the Islamic tax (zakat). Unlike traditional zakat, which is intended to help the impoverished, JNIM diverts these resources to sustain its fighters, weapons, and operations. In 2021, the group reportedly generated <a href="https://reliefweb.int/report/mali/non-state-armed-groups-and-illicit-economies-west-africa-jamaat-nusrat-al-islam-wal-muslimin-jnim">$739,200 from cattle theft</a> in Mali&#8217;s Youwarou district alone, while its subgroup Ansarul Islam earned between <a href="https://reliefweb.int/report/mali/non-state-armed-groups-and-illicit-economies-west-africa-jamaat-nusrat-al-islam-wal-muslimin-jnim">US$42,000 and US$50,000</a> per month through similar raids in other regions. Militants have confiscated entire herds from villages in Burkina Faso, and in central Mali, livestock owners are compelled to give <a href="https://reliefweb.int/report/mali/non-state-armed-groups-and-illicit-economies-west-africa-jamaat-nusrat-al-islam-wal-muslimin-jnim">one-year-old bull calves for every 30 cattl</a>e and one-year-old heifers for every 40 cattle in exchange for &#8220;protection.&#8221; Stolen livestock are transported across borders and sold in markets in <a href="http://theconversation.com/funding-terror-how-west-africas-deadly-jihadists-get-the-money-they-need-to-survive-242306">Mali, Mauritania, or Senegal</a>.</p><h4><em><strong>Taxation, Fundraising, and Extortion</strong></em></h4><p>JNIM collects zakat and imposes various taxes as part of its broader strategy to generate revenue and assert control over territory. The importance of <a href="https://reliefweb.int/report/mali/non-state-armed-groups-and-illicit-economies-west-africa-jamaat-nusrat-al-islam-wal-muslimin-jnim">zakat varies by region</a>: in Kidal, Mali, the group relies more on fundraising than zakat, and contributions are more voluntary in some communities but mandatory for those perceived as &#8220;pro-Islamic State&#8221;. In central Mali, zakat reportedly constitutes <a href="https://reliefweb.int/report/mali/non-state-armed-groups-and-illicit-economies-west-africa-jamaat-nusrat-al-islam-wal-muslimin-jnim">only a minor portion of JNIM&#8217;s resources</a>, with roughly two-thirds redistributed to the needy. Regional practices differ widely; in southwestern Tillaberi, Niger, zakat collection is described as <a href="https://reliefweb.int/report/mali/non-state-armed-groups-and-illicit-economies-west-africa-jamaat-nusrat-al-islam-wal-muslimin-jnim">&#8220;messy and extortionist&#8221;</a>, whereas in northern Tahoua, locals perceive it as largely non-violent and limited to traditional contributions.</p><p>Beyond zakat, JNIM taxes goods, including fuel, food, and medicines, along major roads and transit corridors in Mali and Burkina Faso, forcibly <a href="https://reliefweb.int/report/mali/non-state-armed-groups-and-illicit-economies-west-africa-jamaat-nusrat-al-islam-wal-muslimin-jnim">imposing &#8220;protection fees&#8221;</a> on merchants, truck drivers, and migrants passing through its territory. Noncompliance often results in the confiscation of goods or vehicles, as evident by one trader whose <a href="https://www.washingtonpost.com/world/2025/06/08/jnim-militants-west-africa-sahel-terrorism/">truck full of tea was seized</a>, taking a year to recover.</p><h4><em><strong>Illicit Smuggling</strong></em></h4><p>JNIM has embedded itself within broader illicit economies, collaborating with criminal networks involved in <a href="https://jied.lse.ac.uk/articles/10.31389/jied.253">drug trafficking, arms smuggling, and human trafficking</a>. While the group often <a href="https://www.atlanticcouncil.org/blogs/africasource/the-sahel-is-now-an-epicenter-of-drug-smuggling-that-is-terrible-news-for-everyone/">benefits indirectly by taxing or charging fees to traffickers</a>, it also engages directly in illicit activity. For example, it has exploited security gaps in Libya by <a href="https://documents-dds-ny.un.org/doc/UNDOC/GEN/N18/469/50/PDF/N1846950.pdf?OpenElement">levying fees on human smugglers</a> forced to use routes through JNIM-controlled territory. In another case, <a href="https://jied.lse.ac.uk/articles/10.31389/jied.253">AQIM landed a Boeing 727 full of cocaine</a> (the origin and ownership unknown) near Gao, Mali, burned the plane after unloading, and transported the cargo via trade routes to Libya and Morocco for European markets. It has also leveraged its territorial control to offer protection services to actors involved in illicit smuggling. By 2021, JNIM had <a href="https://jied.lse.ac.uk/articles/10.31389/jied.253">expanded its influence</a> across mines, trade and smuggling routes, and large wildlife parks, functioning as a de facto security provider to smugglers, miners, and hunters in exchange for a share of their revenue.</p><h4><em><strong>Looting</strong></em></h4><p>JNIM diversifies its resources through the looting of military stockpiles, trucks, and the diversion of humanitarian aid convoys. The group frequently <a href="https://reliefweb.int/report/mali/non-state-armed-groups-and-illicit-economies-west-africa-jamaat-nusrat-al-islam-wal-muslimin-jnim">targets fuel trucks</a>, sometimes intercepting deliveries suspected to be prearranged by traffickers. Large quantities of fuel are consumed by JNIM fighters, and in some cases, this has <a href="https://reliefweb.int/report/mali/non-state-armed-groups-and-illicit-economies-west-africa-jamaat-nusrat-al-islam-wal-muslimin-jnim">reportedly driven up prices</a>, creating more profitable local markets. Surplus fuel is sometimes <a href="https://reliefweb.int/report/mali/non-state-armed-groups-and-illicit-economies-west-africa-jamaat-nusrat-al-islam-wal-muslimin-jnim">resold or distributed</a> at below-market prices to sympathetic sellers or communities.</p><p>JNIM has also systematically hijacked transport trucks and vehicles carrying a variety of goods along major roadways, including <a href="https://reliefweb.int/report/mali/non-state-armed-groups-and-illicit-economies-west-africa-jamaat-nusrat-al-islam-wal-muslimin-jnim">NGO vehicles and ambulances</a> from district health centers. On multiple occasions, aid trucks have been diverted, with food and medicine redistributed to select communities under JNIM control. For example, in April 2022, a convoy of eight new United Nations vehicles bound for Niger <a href="https://reliefweb.int/report/mali/non-state-armed-groups-and-illicit-economies-west-africa-jamaat-nusrat-al-islam-wal-muslimin-jnim">was reportedly stolen by JNIM combatants</a>.</p><h3><strong>Using Funds</strong></h3><h4><em><strong>Weapons and Equipment</strong></em></h4><p>One of JNIM&#8217;s main expenses is equipment for its military operations, such as weapons, ammunition, fuel, vehicles, and motorbikes. Motorbikes are particularly valuable in the Sahel&#8217;s terrain. JNIM often <a href="https://reliefweb.int/report/mali/non-state-armed-groups-and-illicit-economies-west-africa-jamaat-nusrat-al-islam-wal-muslimin-jnim">pre-pays for bulk purchases of new motorbikes</a> from traders who divert them from regional supply chains, frequently through ports such as Lagos, Lom&#233;, and Cotonou. Local dealers describe JNIM as <a href="https://jied.lse.ac.uk/articles/10.31389/jied.253">reliable customers</a> who pay upfront and place regular, large orders, ensuring a constant supply. Alongside this investment in mobility, JNIM has also allocated funds toward <a href="https://documents.un.org/doc/undoc/gen/n25/176/00/pdf/n2517600.pdf">acquiring and deploying drones</a>, which, when combined with improvised explosive devices and motorbike-mounted bombs, have enabled increasingly complex attacks on well-defended targets.</p><h4><em><strong>Consolidation of Territorial Control and Attacks</strong></em></h4><p>JNIM carries out systematic attacks to consolidate its territorial control and undermine state authority. The group frequently targets symbols of foreign influence, including French and UN forces, and more recently has <a href="https://www.washingtonpost.com/world/2025/06/08/jnim-militants-west-africa-sahel-terrorism/">threatened Russian mercenaries</a> fighting alongside Malian troops.</p><p>To exert control over local populations, JNIM <a href="https://acleddata.com/report/jamaat-nusrat-al-islam-wal-muslimin-jnim">sets up irregular checkpoints</a> where fighters gather intelligence, conduct identity checks for military personnel, state militiamen, and perceived collaborators, and seize vehicles, motorcycles, and other goods to sustain their operations. The group also <a href="https://acleddata.com/report/jamaat-nusrat-al-islam-wal-muslimin-jnim">imposes embargoes and blockades</a> on towns, villages, and entire administrative subdivisions, including the Bandiagara region in Mali and parts of Kompienga, further reinforcing its authority over local communities.</p><p>JNIM additionally targets schools and critical infrastructure to weaken state presence and expand influence. <a href="https://acleddata.com/report/jamaat-nusrat-al-islam-wal-muslimin-jnim">Attacks on schools</a> disrupt formal education, replacing secular instruction with religious teachings aligned with the group&#8217;s ideology. <a href="https://acleddata.com/report/jamaat-nusrat-al-islam-wal-muslimin-jnim">Roads, bridges, and convoys are also frequently attacked</a>, undermining state capacity while simultaneously creating opportunities for taxation.</p><h4><em><strong>Governance and Service Provision</strong></em></h4><p>JNIM also channels resources into governance, providing limited but strategic services to strengthen its legitimacy. Despite having <a href="https://acleddata.com/report/jamaat-nusrat-al-islam-wal-muslimin-jnim">relatively low bureaucratic capacity</a>, the group offers basic justice and security functions, including dispute resolution and the management of goods and services from nongovernmental organizations. In some areas, it <a href="https://reliefweb.int/report/mali/non-state-armed-groups-and-illicit-economies-west-africa-jamaat-nusrat-al-islam-wal-muslimin-jnim">redistributes zakat</a> revenues to vulnerable populations. JNIM <a href="https://reliefweb.int/report/mali/non-state-armed-groups-and-illicit-economies-west-africa-jamaat-nusrat-al-islam-wal-muslimin-jnim">arbitrates disputes, resolves theft cases, and sometimes returns stolen goods</a>, including livestock and items such as telecommunications antenna batteries, to local communities. It has also undertaken initiatives aimed at <a href="https://reliefweb.int/report/mali/non-state-armed-groups-and-illicit-economies-west-africa-jamaat-nusrat-al-islam-wal-muslimin-jnim">generating support</a>, such as targeting individuals involved in robberies, gang activity, or other crimes, positioning itself as a more effective authority than weak state structures.</p><h4><em><strong>Communications</strong></em></h4><p>JNIM allocates resources to enhance both propaganda and operational communications. The group has reportedly acquired satellite internet systems, <a href="https://www.bbc.com/news/articles/cg4r5wylwq6o">such as Starlink</a>, to improve battlefield coordination. These systems provide high-speed internet in areas where regular mobile networks are unavailable or unreliable, allowing JNIM to synchronize operations across dispersed units, coordinate attacks, and respond rapidly to shifting security conditions. In parallel, enhanced connectivity supports the group&#8217;s propaganda efforts, enabling the dissemination of messages, videos, and ideological content.</p><h3><strong>Storing and Moving Funds</strong></h3><p>JNIM primarily relies on cash and in-kind resources, including looted goods, gold, and stolen cattle. <a href="https://reliefweb.int/report/mali/non-state-armed-groups-and-illicit-economies-west-africa-jamaat-nusrat-al-islam-wal-muslimin-jnim">Cash reserves are decentralized</a>, with local commanders holding funds to ensure liquidity for ransom payments, supply purchases, and other immediate needs. Mining sites and rural bases also serve as <a href="https://reliefweb.int/report/mali/non-state-armed-groups-and-illicit-economies-west-africa-jamaat-nusrat-al-islam-wal-muslimin-jnim">storage hubs</a> for both money and weapons. Funds are moved along routes under the group&#8217;s control or, in some cases, through hawala networks. In addition<a href="https://reliefweb.int/report/mali/non-state-armed-groups-and-illicit-economies-west-africa-jamaat-nusrat-al-islam-wal-muslimin-jnim">, JNIM invests in small businesses and shops</a>, lends money to merchants, and occasionally uses formal banking systems, embedding itself in local commerce in ways that both generate revenue and strengthen its local legitimacy. Unlike some Islamic State affiliates in the region, there is little evidence that JNIM has adopted cryptocurrency. While <a href="https://ctc.westpoint.edu/the-financial-future-of-the-islamic-state/">ISWAP has reportedly experimented with virtual assets such as Tether</a>, no such activity has been confirmed in JNIM&#8217;s case.</p><h3><strong>Managing Funds</strong></h3><p>JNIM manages its finances through a hybrid system that combines centralized oversight with local autonomy. The group&#8217;s leadership hierarchy is <a href="https://reliefweb.int/report/mali/non-state-armed-groups-and-illicit-economies-west-africa-jamaat-nusrat-al-islam-wal-muslimin-jnim">structured around three tiers</a>: central leadership, regional commanders, and local area commanders, anchored by its Majlis al-Shura (leadership council), which sets strategic priorities. High-value operations, such as major kidnappings or international negotiations, typically <a href="https://reliefweb.int/report/mali/non-state-armed-groups-and-illicit-economies-west-africa-jamaat-nusrat-al-islam-wal-muslimin-jnim">require approval from senior leader</a>s. Senior commanders are also <a href="https://reliefweb.int/report/mali/non-state-armed-groups-and-illicit-economies-west-africa-jamaat-nusrat-al-islam-wal-muslimin-jnim">deployed across regions</a> to maintain cohesion and ensure that local financial practices align with broader strategy, preventing fragmentation. For example, Sidan ag Hitta, <a href="https://home.treasury.gov/news/press-releases/jy2293">sanctioned by the US in 2021</a>, coordinated all JNIM negotiations concerning Western hostages, while Jafar Dicko, sanctioned in 2024, oversaw kidnappings in Burkina Faso through the JNIM-affiliated group Ansarul Islam.</p><p>At the local level, JNIM operates on what experts describe as a <a href="https://www.washingtonpost.com/world/2025/06/08/jnim-militants-west-africa-sahel-terrorism/">&#8220;franchise model,&#8221;</a> adapting its financial governance to regional conditions. This includes tailoring taxation and zakat collection practices to local customs and grievances. In parts of Mali, <a href="https://reliefweb.int/report/mali/non-state-armed-groups-and-illicit-economies-west-africa-jamaat-nusrat-al-islam-wal-muslimin-jnim">zakat collection</a> is coercive and deeply resented, while in Burkina Faso and Niger, JNIM has sought to frame contributions as voluntary, redistributing some revenues to local communities to bolster legitimacy. The group also relies on external operatives to sustain its financial and logistical networks. For instance, in July 2024, authorities dismantled a <a href="https://documents.un.org/doc/undoc/gen/n25/041/59/pdf/n2504159.pdf">Libyan-led JNIM cell</a> that supplied satellite communication systems and wireless devices to support operations.</p><h3><strong>Obscuring Funds</strong></h3><p>Because JNIM controls territory in many areas, it does not always need to conceal its financial activity locally. Operating in a predominantly cash-based economy, JNIM is able to collect zakat in livestock or cash and then pay for goods and services without relying on banks, allowing the group to circumvent the regulated financial system almost entirely.</p><p>Concealment becomes more important when funds leave the region or enter the formal economy. To achieve this, the group often relies on <a href="https://reliefweb.int/report/mali/non-state-armed-groups-and-illicit-economies-west-africa-jamaat-nusrat-al-islam-wal-muslimin-jnim">intermediaries</a> such as local traders or criminal networks who manage ransom payments, gold sales, or procurement on its behalf. Revenues from gold mining are also laundered through illicit dealers operating in <a href="https://jied.lse.ac.uk/articles/10.31389/jied.253">international hubs like Dubai and Turkey</a>.</p><p>At the local level, JNIM uses different techniques to disguise or legitimize revenue collection. Payments for access to mining sites or protection fees are frequently framed as zakat, which reduces resistance from communities.</p><h3><strong>A Shifting Identity?</strong></h3><p>JNIM is likely to maintain strong financial resilience unless its key revenue streams, including illicit gold exports, livestock markets, and ransom networks, are actively disrupted, all of which would require a significant improvement in governance across the region. At the same time, the group appears to be reshaping its identity. Its <a href="https://www.washingtonpost.com/world/2025/06/08/jnim-militants-west-africa-sahel-terrorism/">congratulatory statement on HTS victory in Syria and the leader&#8217;s omission of al-Qaeda in a recent interview</a> suggest a deliberate attempt at rebranding and distancing itself from the global Al-Qaeda network, which it already does not rely on for funding. Looking forward, we will see whether this shift will hold or change the group&#8217;s trajectory.</p><p>Ultimately, financing in the region remains cash-based and relies on territorial control. Significant improvements in state authority are unlikely in the short to medium term, leaving JNIM well positioned to maintain and expand its operations. The group could also incorporate other groups by offering financial and organizational incentives, further strengthening its power. The security outlook for the region thus remains bleak.</p><p><em>Did you find this post insightful? Share it with a colleague!</em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/p/gold-guns-and-cattle-jnims-30-billion?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/p/gold-guns-and-cattle-jnims-30-billion?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p><em>&#169; 2025 Insight Threat Intelligence Ltd. All Rights Reserved.<br><br>This newsletter and its contents are protected by Canadian copyright law. Except as otherwise provided for under Canadian copyright law, this newsletter and its contents may not be copied, published, distributed, downloaded or otherwise stored in a retrieval system, transmitted or converted, in any form or by any means, electronic or otherwise, without the prior written permission of the copyright owner.</em></p>]]></content:encoded></item><item><title><![CDATA[Narco-Economics: The Gulf Cartel’s Money]]></title><description><![CDATA[Group Profile]]></description><link>https://newsletter.insightthreatintel.com/p/narco-economics-the-gulf-cartels</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/narco-economics-the-gulf-cartels</guid><dc:creator><![CDATA[Elena Martynova]]></dc:creator><pubDate>Tue, 02 Sep 2025 10:57:28 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!tVjv!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F96cac9f4-cbcd-48ea-b583-43d8c19931b2_1500x1000.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>In early 2025, the US <a href="https://www.state.gov/designation-of-international-cartels/">designated several major drug cartels as foreign terrorist organizations</a>, a move that triggered sanctions such as asset freezes and strict limitations on financial transactions. This action, covered in detail in the <a href="https://open.spotify.com/episode/6eREHOhMXj8kSRxgd3L1cK?si=abf400b234e44d1e">&#8220;Podmergency&#8221; Secure Line episode</a>, was soon echoed by the Canadian government, which formally <a href="https://www.canada.ca/en/public-safety-canada/news/2025/02/government-of-canada-lists-seven-transnational-criminal-organizations-as-terrorist-entities.html">listed these groups as terrorist entities</a> under the Criminal Code. The Canadian designation enables law enforcement to freeze cartel assets within the country.</em></p><p><em>Among the groups listed, the Gulf Cartel stands out as one of the oldest and largest criminal organizations in Mexico. By the late 1990s, the cartel was <a href="http://insightcrime.org/mexico-organized-crime-news/gulf-cartel-profile/">reportedly generating billions of dollars annually</a>, and it continues to operate as a major player in the global drug trade. While it is primarily known for drug trafficking, the <a href="https://www.state.gov/designation-of-international-cartels/">US government</a> cited its use of extreme violence, including targeted assassinations of civilians and officials, as a means to intimidate the public and assert territorial control, as actions that meet the threshold for terrorism.</em></p><p><em>Keep reading to learn more about the Gulf Cartel&#8217;s financial profile and don&#8217;t forget to subscribe to stay informed of our coverage on drug cartel financing.</em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/subscribe?"><span>Subscribe now</span></a></p><h3><strong>Origins and Operations</strong></h3><p>The Gulf Cartel, based in northeastern Mexico, has long <a href="http://insightcrime.org/mexico-organized-crime-news/gulf-cartel-profile/">maintained control</a> over key segments of the US-Mexico border, particularly near the Gulf of Mexico. Its origins trace back to the Prohibition era, when it was involved in <a href="http://insightcrime.org/mexico-organized-crime-news/gulf-cartel-profile/">smuggling alcohol and heroin</a>. The organization <a href="http://insightcrime.org/mexico-organized-crime-news/gulf-cartel-profile/">rose to prominence</a> in 1984 under Juan Garc&#237;a Abrego, who secured a trafficking agreement with the Colombian Cali Cartel. This alliance redirected drug routes into the US through Mexico after American authorities <a href="http://insightcrime.org/mexico-organized-crime-news/gulf-cartel-profile/">cracked down</a> on Caribbean smuggling corridors. At its peak, the cartel <a href="http://insightcrime.org/mexico-organized-crime-news/gulf-cartel-profile/">dominated drug trafficking</a> into Texas&#8217;s Rio Grande Valley, moving <a href="https://www.dea.gov/sites/default/files/2025-07/2025NationalDrugThreatAssessment.pdf">fentanyl, methamphetamine, cocaine, and heroin</a> through its strongholds in cities like Matamoros and Reynosa in the state of Tamaulipas.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://www.dea.gov/sites/default/files/2025-07/2025NationalDrugThreatAssessment.pdf" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!FM5O!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3d515f01-8042-46f7-96c5-6aa243141935_936x692.png 424w, https://substackcdn.com/image/fetch/$s_!FM5O!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3d515f01-8042-46f7-96c5-6aa243141935_936x692.png 848w, https://substackcdn.com/image/fetch/$s_!FM5O!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3d515f01-8042-46f7-96c5-6aa243141935_936x692.png 1272w, https://substackcdn.com/image/fetch/$s_!FM5O!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3d515f01-8042-46f7-96c5-6aa243141935_936x692.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!FM5O!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3d515f01-8042-46f7-96c5-6aa243141935_936x692.png" width="936" height="692" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3d515f01-8042-46f7-96c5-6aa243141935_936x692.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:692,&quot;width&quot;:936,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:213860,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://www.dea.gov/sites/default/files/2025-07/2025NationalDrugThreatAssessment.pdf&quot;,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://newsletter.insightthreatintel.com/i/169672361?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3d515f01-8042-46f7-96c5-6aa243141935_936x692.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!FM5O!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3d515f01-8042-46f7-96c5-6aa243141935_936x692.png 424w, https://substackcdn.com/image/fetch/$s_!FM5O!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3d515f01-8042-46f7-96c5-6aa243141935_936x692.png 848w, https://substackcdn.com/image/fetch/$s_!FM5O!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3d515f01-8042-46f7-96c5-6aa243141935_936x692.png 1272w, https://substackcdn.com/image/fetch/$s_!FM5O!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3d515f01-8042-46f7-96c5-6aa243141935_936x692.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>In recent years, however, the Gulf Cartel has <a href="http://insightcrime.org/mexico-organized-crime-news/gulf-cartel-profile/">experienced a decline</a>, losing both territory and cohesion as it broke into rival factions. Much of the cartel&#8217;s destabilization can be traced to its own creation of Los Zetas, a militia originally formed as the cartel&#8217;s violent enforcement arm.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a> By 2010, Los Zetas had grown into a powerful paramilitary force of over ten thousand, known for their extreme brutality, extortion, and kidnappings, eventually breaking away and operating independently.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-2" href="#footnote-2" target="_self">2</a> Their violence and growing ambition significantly contributed to the Gulf Cartel&#8217;s internal collapse. Today, much of the academic and investigative focus has shifted toward Los Zetas, and as a result, current data on the Gulf Cartel is often outdated or complicated by its ongoing fragmentation.</p>
      <p>
          <a href="https://newsletter.insightthreatintel.com/p/narco-economics-the-gulf-cartels">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Sanctioned but Sustained: Why the Houthis’ Finances Endure Global Pressure]]></title><description><![CDATA[Group Profile]]></description><link>https://newsletter.insightthreatintel.com/p/sanctioned-but-sustained-why-the</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/sanctioned-but-sustained-why-the</guid><dc:creator><![CDATA[Elena Martynova]]></dc:creator><pubDate>Thu, 17 Jul 2025 13:02:12 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!DbUL!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1ce816cd-716d-475f-b975-135412b63737_936x624.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Since October 2023, the Houthis have intensified their military operations in solidarity with Hamas, launching <a href="https://www.reuters.com/world/middle-east/israel-warns-possible-hostile-aircraft-near-red-sea-city-eilat-2023-10-31/">missile and drone attacks</a> that have destabilized the region and disrupted <a href="https://www.reuters.com/world/middle-east/iranian-hezbollah-commanders-help-direct-houthi-attacks-yemen-sources-say-2024-01-20/">global shipping in the Red Sea</a>. Their personnel strength has further expanded to encompass </em>approximately <a href="https://docs.un.org/en/S/2024/731">350,000 militants</a>.<em> In response, the US and UK have conducted a series of air strikes, including the March 15, 2025 American bombing of Houthi targets</em> <em>(plans for which were l<a href="https://www.theatlantic.com/politics/archive/2025/03/trump-administration-accidentally-texted-me-its-war-plans/682151/">eaked via a Signal group chat</a></em>)<em>.</em></p><p><em>Since the Houthis continue to pose an economic and security threat, <a href="https://www.fdd.org/analysis/2025/04/24/new-sanctions-against-the-houthis-take-aim-at-the-terrorist-groups-banking-sector/">the Trump administration </a>has focused new disruption efforts on the financial networks that sustain their operations. Previous rounds of sanctions and other financial measures have had <a href="https://docs.un.org/en/S/2024/731">limited impact</a> due to humanitarian concerns and the Yemeni government's limited capacity to freeze Houthi-controlled assets.</em></p><p><em>As an addendum to our <a href="https://newsletter.insightthreatintel.com/p/the-houthis">January 2024 coverage</a>, this article provides additional information on how and why the Houthis have such robust financial capabilities.</em></p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;7dfd35d7-a5f6-4a27-8edd-92d9824e23a3&quot;,&quot;caption&quot;:&quot;The Houthis began a military campaign in October 2023 in solidarity with Hamas by launching missile and drone strikes that targeted an Israeli tourist resort. Their campaign escalated with additional missile strikes throughout the region and claiming the downing of a&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;The Houthis&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:85208154,&quot;name&quot;:&quot;Elena Martynova&quot;,&quot;bio&quot;:&quot;Research Analyst &quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e88b531d-b106-4c92-8177-62a8a864bde5_2316x2316.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2024-01-25T14:01:26.911Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2bc199a-093f-4978-87f7-4d63e7fe4136_1500x1000.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/the-houthis&quot;,&quot;section_name&quot;:&quot;Group Profiles &quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:141021522,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:3,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!i6d1!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee6d6275-21f4-4f93-beb3-0ccf9c112d29_900x900.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/subscribe?"><span>Subscribe now</span></a></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!DbUL!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1ce816cd-716d-475f-b975-135412b63737_936x624.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!DbUL!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1ce816cd-716d-475f-b975-135412b63737_936x624.png 424w, https://substackcdn.com/image/fetch/$s_!DbUL!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1ce816cd-716d-475f-b975-135412b63737_936x624.png 848w, https://substackcdn.com/image/fetch/$s_!DbUL!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1ce816cd-716d-475f-b975-135412b63737_936x624.png 1272w, https://substackcdn.com/image/fetch/$s_!DbUL!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1ce816cd-716d-475f-b975-135412b63737_936x624.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!DbUL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1ce816cd-716d-475f-b975-135412b63737_936x624.png" width="936" height="624" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1ce816cd-716d-475f-b975-135412b63737_936x624.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:624,&quot;width&quot;:936,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:179916,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://newsletter.insightthreatintel.com/i/167732270?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1ce816cd-716d-475f-b975-135412b63737_936x624.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!DbUL!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1ce816cd-716d-475f-b975-135412b63737_936x624.png 424w, https://substackcdn.com/image/fetch/$s_!DbUL!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1ce816cd-716d-475f-b975-135412b63737_936x624.png 848w, https://substackcdn.com/image/fetch/$s_!DbUL!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1ce816cd-716d-475f-b975-135412b63737_936x624.png 1272w, https://substackcdn.com/image/fetch/$s_!DbUL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1ce816cd-716d-475f-b975-135412b63737_936x624.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3><strong>Raising</strong> <strong>Funds</strong></h3><h4><em><strong>Taxation, Customs, and Extortion Fees</strong></em></h4><p>The <a href="https://docs.un.org/en/S/2024/731">UN Panel of Experts on Yemen</a> highlight that the Houthis generate significant revenue, approximately YR 3.392 trillion in 2023 (US 13.6 billion) per year. The group has recently <a href="https://docs.un.org/en/S/2024/731">increased taxation, customs duties, and imposed new levies</a>. These include customs fees on goods entering <a href="https://merip.org/2025/01/yemens-ansar-allah/">Red Sea ports under their control</a>, which remain critical gateways for goods entering Yemen. The Houthis have also been extorting shipping agencies, allegedly demanding payments in exchange for not targeting vessels. This maritime extortion could generate up to <a href="https://docs.un.org/en/S/2024/731">$180 million per month</a>.</p><p>On land, the Houthis impose taxes on goods transported from areas controlled by the Government of Yemen into Houthi-held territories. In 2023 alone, revenues from these land-based collection points were estimated at <a href="https://docs.un.org/en/S/2024/731">YR 300 billion ($1.2 million)</a>.</p>
      <p>
          <a href="https://newsletter.insightthreatintel.com/p/sanctioned-but-sustained-why-the">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Tracking Terrorist Financing: A Series on Al-Shabaab]]></title><description><![CDATA[Group Profile]]></description><link>https://newsletter.insightthreatintel.com/p/tracking-terrorist-financing-a-series</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/tracking-terrorist-financing-a-series</guid><dc:creator><![CDATA[Elena Martynova]]></dc:creator><pubDate>Wed, 09 Jul 2025 13:01:53 GMT</pubDate><enclosure url="https://images.unsplash.com/reserve/LJIZlzHgQ7WPSh5KVTCB_Typewriter.jpg?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxuZXdzbGV0dGVyfGVufDB8fHx8MTc1MTk5MzYzNXww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Over the last few months, we examined how Al-Shabaab raises funds, how it spends money, the methods it uses to move and store resources, how the group manages its finances, and most recently, how Al-Shabaab conceals the origins and movement of its funds. This is part of our work mapping how terrorist groups finance their activity, and we use our t<a href="https://www.insightthreatintel.com/news/terror-financing-blueprint">errorist financing blueprint</a> as an analytic framework, making this the most robust analysis of Al-Shabaab finance you&#8217;ll find anywhere. </em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/subscribe?"><span>Subscribe now</span></a></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://images.unsplash.com/reserve/LJIZlzHgQ7WPSh5KVTCB_Typewriter.jpg?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxuZXdzbGV0dGVyfGVufDB8fHx8MTc1MTk5MzYzNXww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://images.unsplash.com/reserve/LJIZlzHgQ7WPSh5KVTCB_Typewriter.jpg?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxuZXdzbGV0dGVyfGVufDB8fHx8MTc1MTk5MzYzNXww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/reserve/LJIZlzHgQ7WPSh5KVTCB_Typewriter.jpg?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxuZXdzbGV0dGVyfGVufDB8fHx8MTc1MTk5MzYzNXww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/reserve/LJIZlzHgQ7WPSh5KVTCB_Typewriter.jpg?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxuZXdzbGV0dGVyfGVufDB8fHx8MTc1MTk5MzYzNXww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/reserve/LJIZlzHgQ7WPSh5KVTCB_Typewriter.jpg?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxuZXdzbGV0dGVyfGVufDB8fHx8MTc1MTk5MzYzNXww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1456w" sizes="100vw"><img src="https://images.unsplash.com/reserve/LJIZlzHgQ7WPSh5KVTCB_Typewriter.jpg?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxuZXdzbGV0dGVyfGVufDB8fHx8MTc1MTk5MzYzNXww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" width="299" height="438.53333333333336" data-attrs="{&quot;src&quot;:&quot;https://images.unsplash.com/reserve/LJIZlzHgQ7WPSh5KVTCB_Typewriter.jpg?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxuZXdzbGV0dGVyfGVufDB8fHx8MTc1MTk5MzYzNXww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:11000,&quot;width&quot;:7500,&quot;resizeWidth&quot;:299,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;black Fayorit typewriter with printer paper&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="black Fayorit typewriter with printer paper" title="black Fayorit typewriter with printer paper" srcset="https://images.unsplash.com/reserve/LJIZlzHgQ7WPSh5KVTCB_Typewriter.jpg?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxuZXdzbGV0dGVyfGVufDB8fHx8MTc1MTk5MzYzNXww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/reserve/LJIZlzHgQ7WPSh5KVTCB_Typewriter.jpg?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxuZXdzbGV0dGVyfGVufDB8fHx8MTc1MTk5MzYzNXww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/reserve/LJIZlzHgQ7WPSh5KVTCB_Typewriter.jpg?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxuZXdzbGV0dGVyfGVufDB8fHx8MTc1MTk5MzYzNXww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/reserve/LJIZlzHgQ7WPSh5KVTCB_Typewriter.jpg?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxuZXdzbGV0dGVyfGVufDB8fHx8MTc1MTk5MzYzNXww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo by <a href="true">Florian Klauer</a> on <a href="https://unsplash.com">Unsplash</a></figcaption></figure></div><p></p><p>Al-Shabaab generates significant revenue annually&#8212;estimated by the UN in 2025 to be between $100 and $200 million, primarily through taxation, control of trade routes, and smuggling activities.</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;e741374b-d746-4284-a2b5-aadc86104b7e&quot;,&quot;caption&quot;:&quot;As we reported in our Global Terrorism Financing Report for December, Somali government forces have recently captured or killed high ranking Al-Shabaab financial operatives. These operatives include Mohamed Mire Jama, a top leader, who served as a finance chief and was responsible for financing the 2013 Westgate Mall and 2019 DusitD2 Complex Attacks.&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;How does Al-Shabaab have so much money?&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:85208154,&quot;name&quot;:&quot;Elena Martynova&quot;,&quot;bio&quot;:&quot;Research Analyst &quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e88b531d-b106-4c92-8177-62a8a864bde5_2316x2316.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2025-03-04T14:03:29.657Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!VowY!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faf77b941-6a47-4503-86f2-3f9854fd71ad_1500x1000.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/how-does-al-shabaab-have-so-much&quot;,&quot;section_name&quot;:&quot;Group Profiles &quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:157821872,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:4,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!i6d1!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee6d6275-21f4-4f93-beb3-0ccf9c112d29_900x900.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>While the group&#8217;s income has increased over time, its expenditures on salaries, military operations, and other activities have remained relatively stable.</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;63fc76e8-a076-42d0-a1ce-4689e39b7fb3&quot;,&quot;caption&quot;:&quot;With an annual revenue estimated between $100 million and $200 million, Al-Shabaab has substantial financial resources&#8212;but also extensive expenses to cover. In 2018, the Hiraal Institute estimated that Al-Shabaab&#8217;s annual expenditures totaled approximately $23.6 million, paying salaries and bribes, providing basic services, and even investing in businesses. The group was assessed to spend an&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Al-Shabaab&#8217;s Spending Priorities&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:85208154,&quot;name&quot;:&quot;Elena Martynova&quot;,&quot;bio&quot;:&quot;Research Analyst &quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e88b531d-b106-4c92-8177-62a8a864bde5_2316x2316.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2025-04-08T13:03:54.734Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!YTX1!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbf0669ec-b6c6-44c9-873a-026c511ab5b3_1500x1000.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/al-shabaabs-spending-priorities&quot;,&quot;section_name&quot;:&quot;Group Profiles &quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:160247595,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:2,&quot;comment_count&quot;:2,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!i6d1!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee6d6275-21f4-4f93-beb3-0ccf9c112d29_900x900.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>Unlike many other groups, Al-Shabaab has not adopted cryptocurrency; instead, it relies on a combination of formal and informal financial systems to move funds as well as cash and other financial technologies like mobile money.</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;9454e41d-8548-4035-ac31-14ddbc60ce89&quot;,&quot;caption&quot;:&quot;While many terrorist organizations prefer cash due to its anonymity and ease of movement, the use of cryptocurrency has also been on the rise in recent years. Al-Shabaab, however, stands out for its significant reliance on mobile money to conduct transactions. In addition to mobile money, the group also still uses cash, formal financial institutions,&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Moving Money for Al-Shabaab&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:85208154,&quot;name&quot;:&quot;Elena Martynova&quot;,&quot;bio&quot;:&quot;Research Analyst &quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e88b531d-b106-4c92-8177-62a8a864bde5_2316x2316.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2025-04-30T13:02:40.675Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!Fwqp!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feea7d566-44c9-41ad-81c0-87b956ed7771_1500x1000.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/moving-money-for-al-shabaab&quot;,&quot;section_name&quot;:&quot;Group Profiles &quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:161893104,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:8,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!i6d1!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee6d6275-21f4-4f93-beb3-0ccf9c112d29_900x900.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>The group operates under a top-down leadership structure with formal institutions such as taxation and finance offices that help maintain consistent funding and limit risks from external pressures or internal corruption. Local fundraising is delegated to regional operatives, while senior leaders oversee broader financial planning.</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;04e0ab01-0bb3-49f2-b806-967ccb92f59d&quot;,&quot;caption&quot;:&quot;In line with Al-Qaeda, Al-Shabaab operates under a top-down leadership structure, with senior leaders playing a direct role in financial oversight. The group has appointed key figures to manage large-scale financial planning, while delegating localized fundraising and collection efforts to regional operatives. At the core of this system are formal institutions such as a taxation department and a finance office, which function similarly to those of a state. This institutionalized financial management enables Al-Shabaab to maintain a steady flow of resources and enhances its resilience, not only against external disruption but also against internal corruption.&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Local Control, Global Reach: Al-Shabaab&#8217;s Financial Management Structure&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:85208154,&quot;name&quot;:&quot;Elena Martynova&quot;,&quot;bio&quot;:&quot;Research Analyst &quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e88b531d-b106-4c92-8177-62a8a864bde5_2316x2316.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2025-05-29T13:01:17.137Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!sDBl!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd01af1f-a981-44e3-875a-28993e8044af_1294x862.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/local-control-global-reach-al-shabaabs&quot;,&quot;section_name&quot;:&quot;Group Profiles &quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:164464996,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:4,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!i6d1!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee6d6275-21f4-4f93-beb3-0ccf9c112d29_900x900.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>Our latest article focuses on the methods Al-Shabaab uses to obscure its financial activities, including trade-based money laundering, using legitimate businesses and charities as fronts, and exploiting gender bises to further hide its transactions.</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;c3785b4a-e619-4a66-baf6-3422f03adb35&quot;,&quot;caption&quot;:&quot;Al-Shabaab has a comprehensive financial structure to support its activities across Somalia and beyond. The group brings in substantial revenue each year and directs those funds toward a variety of expenditures, including service provision, military operations, salaries, and recruitment. As outlined in earlier articles in this series, Al-Shabaab uses a mix of formal and informal mechanisms to move, store, and manage its money, often adapting to counter-terrorism measures.&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Concealing Al-Shabaab's Financial Flows&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:85208154,&quot;name&quot;:&quot;Elena Martynova&quot;,&quot;bio&quot;:&quot;Research Analyst &quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e88b531d-b106-4c92-8177-62a8a864bde5_2316x2316.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2025-07-03T13:03:20.629Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!EVKV!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F03cef6ff-5a60-4bdf-8e6d-76620ca28b3c_936x624.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/concealing-al-shabaabs-financial&quot;,&quot;section_name&quot;:&quot;Group Profiles &quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:167379313,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:4,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!i6d1!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee6d6275-21f4-4f93-beb3-0ccf9c112d29_900x900.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>Thanks again for reading, subscribing, and sharing. We&#8217;ll keep bringing you in-depth coverage as we have on Al-Shabaab, <a href="https://newsletter.insightthreatintel.com/p/hamas-financing-report">Hamas</a>, and <a href="https://newsletter.insightthreatintel.com/p/atalante">white power extremist groups in Canada</a>. Stay tuned for more. And if you want to learn how to do this type of analysis from top experts, check out our online course! </p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/p/tracking-terrorist-financing-a-series?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/p/tracking-terrorist-financing-a-series?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://insightthreatintelligence.thinkific.com/bundles/tf-analysis" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!f7rH!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 424w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 848w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 1272w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!f7rH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png" width="1066" height="507" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:507,&quot;width&quot;:1066,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:698946,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://insightthreatintelligence.thinkific.com/bundles/tf-analysis&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!f7rH!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 424w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 848w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 1272w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><p>Our terrorist financing analysis course caters to researchers, intelligence, law enforcement, and compliance professionals to help them learn about terrorist financing, and analyze suspicious patterns and activities more effectively. Sign up today!</p><div><hr></div><p><em>&#169; 2025 Insight Threat Intelligence Ltd. All Rights Reserved.<br><br>This newsletter and its contents are protected by Canadian copyright law. Except as otherwise provided for under Canadian copyright law, this newsletter and its contents may not be copied, published, distributed, downloaded or otherwise stored in a retrieval system, transmitted or converted, in any form or by any means, electronic or otherwise, without the prior written permission of the copyright owner.</em></p>]]></content:encoded></item><item><title><![CDATA[Concealing Al-Shabaab's Financial Flows]]></title><description><![CDATA[Group Profile]]></description><link>https://newsletter.insightthreatintel.com/p/concealing-al-shabaabs-financial</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/concealing-al-shabaabs-financial</guid><dc:creator><![CDATA[Elena Martynova]]></dc:creator><pubDate>Thu, 03 Jul 2025 13:03:20 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!EVKV!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F03cef6ff-5a60-4bdf-8e6d-76620ca28b3c_936x624.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Al-Shabaab has a comprehensive financial structure to support its activities across Somalia and beyond. The group brings in substantial revenue each year and directs those funds toward a variety of expenditures, including service provision, military operations, salaries, and recruitment. As outlined in earlier articles in this series, Al-Shabaab uses a mix of formal and informal mechanisms to move, store, and manage its money, often adapting to counter-terrorism measures.</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;78232400-775a-4ba7-b01f-4de4aa40795f&quot;,&quot;caption&quot;:&quot;As we reported in our Global Terrorism Financing Report for December, Somali government forces have recently captured or killed high ranking Al-Shabaab financial operatives. These operatives include Mohamed Mire Jama, a top leader, who served as a finance chief and was responsible for financing the 2013 Westgate Mall and 2019 DusitD2 Complex Attacks.&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;How does Al-Shabaab have so much money?&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:85208154,&quot;name&quot;:&quot;Elena Martynova&quot;,&quot;bio&quot;:&quot;Research Analyst &quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e88b531d-b106-4c92-8177-62a8a864bde5_2316x2316.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2025-03-04T14:03:29.657Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!VowY!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faf77b941-6a47-4503-86f2-3f9854fd71ad_1500x1000.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/how-does-al-shabaab-have-so-much&quot;,&quot;section_name&quot;:&quot;Group Profiles &quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:157821872,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:4,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!i6d1!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee6d6275-21f4-4f93-beb3-0ccf9c112d29_900x900.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;dd116bee-5b12-4499-9160-0721dfe79078&quot;,&quot;caption&quot;:&quot;With an annual revenue estimated between $100 million and $200 million, Al-Shabaab has substantial financial resources&#8212;but also extensive expenses to cover. In 2018, the Hiraal Institute estimated that Al-Shabaab&#8217;s annual expenditures totaled approximately $23.6 million, paying salaries and bribes, providing basic services, and even investing in businesses. The group was assessed to spend an&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Al-Shabaab&#8217;s Spending Priorities&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:85208154,&quot;name&quot;:&quot;Elena Martynova&quot;,&quot;bio&quot;:&quot;Research Analyst &quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e88b531d-b106-4c92-8177-62a8a864bde5_2316x2316.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2025-04-08T13:03:54.734Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!YTX1!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbf0669ec-b6c6-44c9-873a-026c511ab5b3_1500x1000.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/al-shabaabs-spending-priorities&quot;,&quot;section_name&quot;:&quot;Group Profiles &quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:160247595,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:2,&quot;comment_count&quot;:2,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!i6d1!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee6d6275-21f4-4f93-beb3-0ccf9c112d29_900x900.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;6b595d43-ac10-4d3e-a78e-b451b27ae6fe&quot;,&quot;caption&quot;:&quot;While many terrorist organizations prefer cash due to its anonymity and ease of movement, the use of cryptocurrency has also been on the rise in recent years. Al-Shabaab, however, stands out for its significant reliance on mobile money to conduct transactions. In addition to mobile money, the group also still uses cash, formal financial institutions,&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Moving Money for Al-Shabaab&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:85208154,&quot;name&quot;:&quot;Elena Martynova&quot;,&quot;bio&quot;:&quot;Research Analyst &quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e88b531d-b106-4c92-8177-62a8a864bde5_2316x2316.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2025-04-30T13:02:40.675Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!Fwqp!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feea7d566-44c9-41ad-81c0-87b956ed7771_1500x1000.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/moving-money-for-al-shabaab&quot;,&quot;section_name&quot;:&quot;Group Profiles &quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:161893104,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:8,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!i6d1!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee6d6275-21f4-4f93-beb3-0ccf9c112d29_900x900.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;313862a3-67e1-4b34-9a1c-403170bef240&quot;,&quot;caption&quot;:&quot;In line with Al-Qaeda, Al-Shabaab operates under a top-down leadership structure, with senior leaders playing a direct role in financial oversight. The group has appointed key figures to manage large-scale financial planning, while delegating localized fundraising and collection efforts to regional operatives. At the core of this system are formal institutions such as a taxation department and a finance office, which function similarly to those of a state. This institutionalized financial management enables Al-Shabaab to maintain a steady flow of resources and enhances its resilience, not only against external disruption but also against internal corruption.&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Local Control, Global Reach: Al-Shabaab&#8217;s Financial Management Structure&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:85208154,&quot;name&quot;:&quot;Elena Martynova&quot;,&quot;bio&quot;:&quot;Research Analyst &quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e88b531d-b106-4c92-8177-62a8a864bde5_2316x2316.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2025-05-29T13:01:17.137Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!sDBl!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd01af1f-a981-44e3-875a-28993e8044af_1294x862.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/local-control-global-reach-al-shabaabs&quot;,&quot;section_name&quot;:&quot;Group Profiles &quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:164464996,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:4,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!i6d1!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee6d6275-21f4-4f93-beb3-0ccf9c112d29_900x900.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>This article examines the last piece of Al-Shabaab&#8217;s <a href="https://newsletter.insightthreatintel.com/p/the-terrorist-financing-blueprint?utm_source=publication-search">financial blueprint</a>: the obfuscation tactics employed to conceal the origins, flow, and use of their funds. The group uses a variety of tactics, including trade-based money laundering and organizational structures involving charities, legitimate businesses, and front companies. They also exploit gender biases to further obscure their financial activities. These practices are key to understanding how Al-Shabaab protects its network from disruption and sustains its operations over time.</p><p>In this final installment of our series on Al-Shabaab, we highlight actors and key examples that demonstrate the diverse obfuscation tactics that the group uses.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/subscribe?"><span>Subscribe now</span></a></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!EVKV!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F03cef6ff-5a60-4bdf-8e6d-76620ca28b3c_936x624.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!EVKV!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F03cef6ff-5a60-4bdf-8e6d-76620ca28b3c_936x624.png 424w, https://substackcdn.com/image/fetch/$s_!EVKV!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F03cef6ff-5a60-4bdf-8e6d-76620ca28b3c_936x624.png 848w, https://substackcdn.com/image/fetch/$s_!EVKV!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F03cef6ff-5a60-4bdf-8e6d-76620ca28b3c_936x624.png 1272w, https://substackcdn.com/image/fetch/$s_!EVKV!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F03cef6ff-5a60-4bdf-8e6d-76620ca28b3c_936x624.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!EVKV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F03cef6ff-5a60-4bdf-8e6d-76620ca28b3c_936x624.png" width="936" height="624" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/03cef6ff-5a60-4bdf-8e6d-76620ca28b3c_936x624.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:624,&quot;width&quot;:936,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:90752,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://newsletter.insightthreatintel.com/i/167379313?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F03cef6ff-5a60-4bdf-8e6d-76620ca28b3c_936x624.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!EVKV!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F03cef6ff-5a60-4bdf-8e6d-76620ca28b3c_936x624.png 424w, https://substackcdn.com/image/fetch/$s_!EVKV!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F03cef6ff-5a60-4bdf-8e6d-76620ca28b3c_936x624.png 848w, https://substackcdn.com/image/fetch/$s_!EVKV!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F03cef6ff-5a60-4bdf-8e6d-76620ca28b3c_936x624.png 1272w, https://substackcdn.com/image/fetch/$s_!EVKV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F03cef6ff-5a60-4bdf-8e6d-76620ca28b3c_936x624.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3><strong>Trade-Based Money Laundering</strong></h3><h4><em>Charcoal Trade</em></h4><p>Al-Shabaab has significantly relied on trade-based money laundering tactics, especially in involvement in Somalia&#8217;s charcoal trade, to finance operations and obscure the origins of its funds. Despite a United Nations Security Council ban on charcoal exports from Somalia imposed in 2012, the group continued to profit from the trade in subsequent years. Estimates from 2018 and 2019 suggest that Al-Shabaab earned between <a href="https://combinedmaritimeforces.com/2018/11/24/ctf152-hold-counter-charcoal-smuggling-conference/">US$7.5 million</a><strong> </strong>and <a href="https://www.tandfonline.com/doi/full/10.1080/1057610X.2019.1628622">US$50 million</a> annually.<strong> </strong>Although the trade appeared to slow between 2020 and 2021, <a href="https://home.treasury.gov/news/press-releases/jy1499">US sanctions</a> and investigations revealed that the illicit activity had resumed.</p><p>To bypass the UN ban, Al-Shabaab and its facilitators employ a variety of smuggling and financial obfuscation techniques. Shipments are often mislabeled to conceal their Somali origin, with forged documentation indicating that the charcoal originates from countries such as Iran, Comoros, Ghana, or Ivory Coast.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a><em> A</em> common smuggling route involves vessels arriving in Somalia carrying sugar and departing with charcoal, thereby creating a two-way illicit trade corridor. The financial proceeds from these exports are typically deposited in Gulf State banks and rerouted back to Al-Shabaab through import-export businesses and front companies.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-2" href="#footnote-2" target="_self">2</a></p>
      <p>
          <a href="https://newsletter.insightthreatintel.com/p/concealing-al-shabaabs-financial">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[The Base – Financing Extremism and Foreign Interference]]></title><description><![CDATA[Group Profile]]></description><link>https://newsletter.insightthreatintel.com/p/the-base-financing-extremism-and</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/the-base-financing-extremism-and</guid><dc:creator><![CDATA[Elena Martynova]]></dc:creator><pubDate>Thu, 26 Jun 2025 13:03:30 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!lg77!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9725e065-1377-42a0-ab94-5b8988e8ee7a_1500x1000.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>In 2025, the Base, a neo-Nazi accelerationist group, made renewed efforts to solicit <a href="https://www.counterextremism.com/press/extremist-content-online-leader-nazi-group-base-posts-video-and-group-requests-cryptocurrency">cryptocurrency donations</a>. New allegations have also emerged that its founder, Rinaldo Nazzaro, a former Pentagon contractor, is <a href="https://www.theguardian.com/us-news/2025/apr/24/neo-nazi-group-the-base-leader-russian-spy-allegations">a Russian intelligence asset</a>. These developments highlight the group&#8217;s ongoing activities, including <a href="https://www.theguardian.com/us-news/2025/jun/07/the-base-neo-nazi-group-paramilitary-training">organizing training camps in the US</a>, and reported attempts to carry out <a href="https://www.theguardian.com/us-news/2025/apr/24/neo-nazi-group-the-base-leader-russian-spy-allegations">sabotage and assassination operations</a> in Ukraine. This article takes a closer look at the Base&#8217;s finances to identify opportunities to detect and disrupt their activities.</em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/subscribe?"><span>Subscribe now</span></a></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!lg77!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9725e065-1377-42a0-ab94-5b8988e8ee7a_1500x1000.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!lg77!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9725e065-1377-42a0-ab94-5b8988e8ee7a_1500x1000.png 424w, https://substackcdn.com/image/fetch/$s_!lg77!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9725e065-1377-42a0-ab94-5b8988e8ee7a_1500x1000.png 848w, https://substackcdn.com/image/fetch/$s_!lg77!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9725e065-1377-42a0-ab94-5b8988e8ee7a_1500x1000.png 1272w, https://substackcdn.com/image/fetch/$s_!lg77!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9725e065-1377-42a0-ab94-5b8988e8ee7a_1500x1000.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!lg77!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9725e065-1377-42a0-ab94-5b8988e8ee7a_1500x1000.png" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9725e065-1377-42a0-ab94-5b8988e8ee7a_1500x1000.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:69832,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://newsletter.insightthreatintel.com/i/166789082?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9725e065-1377-42a0-ab94-5b8988e8ee7a_1500x1000.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!lg77!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9725e065-1377-42a0-ab94-5b8988e8ee7a_1500x1000.png 424w, https://substackcdn.com/image/fetch/$s_!lg77!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9725e065-1377-42a0-ab94-5b8988e8ee7a_1500x1000.png 848w, https://substackcdn.com/image/fetch/$s_!lg77!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9725e065-1377-42a0-ab94-5b8988e8ee7a_1500x1000.png 1272w, https://substackcdn.com/image/fetch/$s_!lg77!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9725e065-1377-42a0-ab94-5b8988e8ee7a_1500x1000.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3><strong>Origins and Operations</strong></h3><p>The Base is a neo-Nazi, white supremacist paramilitary organization <a href="https://www.publicsafety.gc.ca/cnt/ntnl-scrt/cntr-trrrsm/lstd-ntts/crrnt-lstd-ntts-en.aspx#540">founded in 2018</a>. While the group was initially primarily active in the US, the Base has also maintained a presence in <a href="https://www.fatf-gafi.org/content/dam/fatf-gafi/reports/Ethnically-or-racially-motivated-terrorism-financing.pdf">Canada, Australia, South Africa, and parts of Europe</a>. At its peak, the group <a href="https://www.vice.com/en/article/neo-nazi-group-the-base-is-recruiting-again-despite-fbi-takedown/">had around 60 members</a>, although its numbers reduced significantly to roughly a dozen individuals across the US following arrests by law enforcement. Despite these disruptions, the Base has <a href="https://www.theguardian.com/us-news/2025/jun/07/the-base-neo-nazi-group-paramilitary-training">recently intensified its recruitment efforts</a>, and exact estimates of its current global membership remain unknown.</p><p>As of mid-2021, the Base had been involved in two acts of vandalism and three foiled violent plots in the US. Most of these <a href="https://www.csis.org/blogs/examining-extremism/examining-extremism-base">targeted minority groups</a>, including the Jewish community. The group's activities have also <a href="https://icct.nl/publication/base-and-basis-listing-far-right-terror-groups">extended to Europe</a>, where one of the eco-fascist cells was implicated in burning a mink farm, and other cells were sharing manuals for 3D-printed weapons.</p>
      <p>
          <a href="https://newsletter.insightthreatintel.com/p/the-base-financing-extremism-and">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Local Control, Global Reach: Al-Shabaab’s Financial Management Structure]]></title><description><![CDATA[Group Profile]]></description><link>https://newsletter.insightthreatintel.com/p/local-control-global-reach-al-shabaabs</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/local-control-global-reach-al-shabaabs</guid><dc:creator><![CDATA[Elena Martynova]]></dc:creator><pubDate>Thu, 29 May 2025 13:01:17 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!sDBl!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd01af1f-a981-44e3-875a-28993e8044af_1294x862.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>In line with Al-Qaeda, Al-Shabaab operates under a top-down leadership structure, with senior leaders playing a direct role in financial oversight.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a> The group has appointed key figures to manage large-scale financial planning, while delegating localized fundraising and collection efforts to regional operatives. At the core of this system are formal institutions such as a taxation department and a finance office, which function similarly to those of a state. This institutionalized financial management enables Al-Shabaab to maintain a steady flow of resources and enhances its resilience, not only against external disruption but also against internal corruption.</em></p><p>This article is part 4 in our series about Al-Shabaab financing: </p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;265de94c-eb4c-4617-a70a-66b9f29acd34&quot;,&quot;caption&quot;:&quot;As we reported in our Global Terrorism Financing Report for December, Somali government forces have recently captured or killed high ranking Al-Shabaab financial operatives. These operatives include Mohamed Mire Jama, a top leader, who served as a finance chief and was responsible for financing the 2013 Westgate Mall and 2019 DusitD2 Complex Attacks.&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;How does Al-Shabaab have so much money?&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:85208154,&quot;name&quot;:&quot;Elena Martynova&quot;,&quot;bio&quot;:&quot;Research Analyst &quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e88b531d-b106-4c92-8177-62a8a864bde5_2316x2316.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2025-03-04T14:03:29.657Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faf77b941-6a47-4503-86f2-3f9854fd71ad_1500x1000.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/how-does-al-shabaab-have-so-much&quot;,&quot;section_name&quot;:&quot;Group Profiles &quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:157821872,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:4,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee6d6275-21f4-4f93-beb3-0ccf9c112d29_900x900.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;d1e37d3b-4a44-4e36-b984-7227b078ce68&quot;,&quot;caption&quot;:&quot;With an annual revenue estimated between $100 million and $200 million, Al-Shabaab has substantial financial resources&#8212;but also extensive expenses to cover. In 2018, the Hiraal Institute estimated that Al-Shabaab&#8217;s annual expenditures totaled approximately $23.6 million, paying salaries and bribes, providing basic services, and even investing in businesses. The group was assessed to spend an&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Al-Shabaab&#8217;s Spending Priorities&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:85208154,&quot;name&quot;:&quot;Elena Martynova&quot;,&quot;bio&quot;:&quot;Research Analyst &quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e88b531d-b106-4c92-8177-62a8a864bde5_2316x2316.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2025-04-08T13:03:54.734Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbf0669ec-b6c6-44c9-873a-026c511ab5b3_1500x1000.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/al-shabaabs-spending-priorities&quot;,&quot;section_name&quot;:&quot;Group Profiles &quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:160247595,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:2,&quot;comment_count&quot;:2,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee6d6275-21f4-4f93-beb3-0ccf9c112d29_900x900.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;7dc1de96-50f5-4ada-8990-dd9782a4e62f&quot;,&quot;caption&quot;:&quot;While many terrorist organizations prefer cash due to its anonymity and ease of movement, the use of cryptocurrency has also been on the rise in recent years. Al-Shabaab, however, stands out for its significant reliance on mobile money to conduct transactions. In addition to mobile money, the group also still uses cash, formal financial institutions,&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Moving Money for Al-Shabaab&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:85208154,&quot;name&quot;:&quot;Elena Martynova&quot;,&quot;bio&quot;:&quot;Research Analyst &quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e88b531d-b106-4c92-8177-62a8a864bde5_2316x2316.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2025-04-30T13:02:40.675Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feea7d566-44c9-41ad-81c0-87b956ed7771_1500x1000.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/moving-money-for-al-shabaab&quot;,&quot;section_name&quot;:&quot;Group Profiles &quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:161893104,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:8,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee6d6275-21f4-4f93-beb3-0ccf9c112d29_900x900.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p><em>Keep reading to learn more about Al-Shabaab&#8217;s financial management structure.</em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/subscribe?"><span>Subscribe now</span></a></p><h3><strong>Broader Organizational Structure</strong></h3><p>Formal decision-making within Al-Shabaab is structured around two primary councils: the Shura Council (advisory) and the Tanfid Council (executive).<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-2" href="#footnote-2" target="_self">2</a> While the Shura Council proposes policies and offers guidance, actual authority and final decisions lie with the Tanfid Council, which is composed of influential militia commanders, clan leaders, and religious figures.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-3" href="#footnote-3" target="_self">3</a> These councils, together with Al-Shabaab&#8217;s emir and his deputies, operate under internal organizational guidelines that define the powers of key officials as well as the procedures for appointment and dismissal.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-4" href="#footnote-4" target="_self">4</a></p><p>Operational implementation of the decisions are carried out by &#8216;maktabs&#8217;, or departments, which act as the functional arms of the organization. These have varied in number from seven to eleven over time. Core departments include:<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-5" href="#footnote-5" target="_self">5</a></p><ul><li><p><strong>Da&#8217;wa (Preaching and Ideology)</strong> &#8211; Al-Shabaab&#8217;s ideological department, responsible for religious outreach and control of the group&#8217;s education system.</p></li><li><p><strong>Zakat (Religious Taxation and In-Kind Taxes)</strong> &#8211; Oversees the collection of Islamic taxes, including in-kind goods such as livestock and agricultural produce.</p></li><li><p><strong>Finance</strong> &#8211; Collects monetary taxes and oversees financial inflows.</p></li><li><p><strong>Wilayat (Regional Administration)</strong> &#8211; Manages civil governance through appointed governors in each Somali region.</p></li><li><p><strong>Amniyat (Security and Intelligence)</strong> &#8211; Handles internal security, assassinations, and counter-intelligence.</p></li><li><p><strong>Jabhat (Military/Army)</strong> &#8211; Directs combat operations and armed units.</p></li><li><p><strong>Garsoor (Justice)</strong> &#8211; Administers Sharia-based legal rulings.</p></li><li><p><strong>Hisbah</strong> &#8211; Morality police.</p></li></ul><p>Each maktab is led by a chief who reports directly to the emir. Territorial control is divided among regional governors, who are responsible for civil services, including welfare, local infrastructure, and overseeing regional branches of the maktabs.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-6" href="#footnote-6" target="_self">6</a> These governors do not often command military units but report to the governor of governors, who serves as the main liaison with the emir.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-7" href="#footnote-7" target="_self">7</a> Within these departments and regional branches, Al-Shabaab has a <a href="https://scholarspace.library.gwu.edu/downloads/h989r403n?disposition=inline&amp;locale=en">wider, less defined network of operatives and facilitators</a> involved in financial activities. Some of the key figures hold <a href="https://2021-2025.state.gov/terrorist-designation-of-al-shabaab-leaders-2/">multiple positions</a>, such as serving as regional finance emir, in addition to being the head of a local intelligence unit or court.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!sDBl!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd01af1f-a981-44e3-875a-28993e8044af_1294x862.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!sDBl!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd01af1f-a981-44e3-875a-28993e8044af_1294x862.png 424w, https://substackcdn.com/image/fetch/$s_!sDBl!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd01af1f-a981-44e3-875a-28993e8044af_1294x862.png 848w, https://substackcdn.com/image/fetch/$s_!sDBl!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd01af1f-a981-44e3-875a-28993e8044af_1294x862.png 1272w, https://substackcdn.com/image/fetch/$s_!sDBl!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd01af1f-a981-44e3-875a-28993e8044af_1294x862.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!sDBl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd01af1f-a981-44e3-875a-28993e8044af_1294x862.png" width="1294" height="862" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cd01af1f-a981-44e3-875a-28993e8044af_1294x862.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:862,&quot;width&quot;:1294,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:152967,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://newsletter.insightthreatintel.com/i/164464996?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd01af1f-a981-44e3-875a-28993e8044af_1294x862.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!sDBl!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd01af1f-a981-44e3-875a-28993e8044af_1294x862.png 424w, https://substackcdn.com/image/fetch/$s_!sDBl!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd01af1f-a981-44e3-875a-28993e8044af_1294x862.png 848w, https://substackcdn.com/image/fetch/$s_!sDBl!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd01af1f-a981-44e3-875a-28993e8044af_1294x862.png 1272w, https://substackcdn.com/image/fetch/$s_!sDBl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd01af1f-a981-44e3-875a-28993e8044af_1294x862.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div>
      <p>
          <a href="https://newsletter.insightthreatintel.com/p/local-control-global-reach-al-shabaabs">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Moving Money for Al-Shabaab]]></title><description><![CDATA[Group Profile]]></description><link>https://newsletter.insightthreatintel.com/p/moving-money-for-al-shabaab</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/moving-money-for-al-shabaab</guid><dc:creator><![CDATA[Elena Martynova]]></dc:creator><pubDate>Wed, 30 Apr 2025 13:02:40 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Fwqp!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feea7d566-44c9-41ad-81c0-87b956ed7771_1500x1000.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>While many terrorist organizations prefer cash due to its anonymity and ease of movement, the <a href="https://newsletter.insightthreatintel.com/p/terrorist-financing-enters-its-cryptocurrency">use of cryptocurrency</a> has also been on the rise in recent years. Al-Shabaab, however, stands out for its significant reliance on mobile money to conduct transactions. In addition to mobile money, the group also still uses cash, formal financial institutions, <a href="https://home.treasury.gov/news/press-releases/jy2168">Ha&#8230;</a></em></p>
      <p>
          <a href="https://newsletter.insightthreatintel.com/p/moving-money-for-al-shabaab">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[ISIL-KP Financing]]></title><description><![CDATA[Updated 15 April 2025]]></description><link>https://newsletter.insightthreatintel.com/p/isil-kp-financing-9fe</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/isil-kp-financing-9fe</guid><dc:creator><![CDATA[Jessica Davis, PhD]]></dc:creator><pubDate>Thu, 24 Apr 2025 13:30:20 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!JZ3m!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F81ff34ff-a182-4ebf-a74c-3a30ce462d5b_6016x4000.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Earlier this year, the latest UN ISIL and Al-Qaeda monitoring report highlighted that ISIL-KP represents the &#8220;most <a href="https://docs.un.org/en/S/2025/71/Rev.1">serious threat</a> to the de facto authorities, ethnic and religious minorities, the United Nations, foreign nationals and international representatives in Afghanistan&#8221; and poses the greatest extra-regional terrorist threat.</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;be248461-c390-4f9f-ac4b-c0cd4909e364&quot;,&quot;caption&quot;:&quot;At the beginning of February, the UN Monitoring Team released its Thirty-Fifth report on ISIL and Al-Qaeda, outlining operational activities and trends as reported by Member States. This analysis summarizes the key threats related to terrorism financing, counter-terrorism successes, and some financing evolutions within these organizations, as detailed in the report.&quot;,&quot;cta&quot;:null,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Evolving Threats: Key Financing Takeaways from the UN&#8217;s Latest ISIL and Al-Qaeda Report&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:85208154,&quot;name&quot;:&quot;Elena Martynova&quot;,&quot;bio&quot;:&quot;Research Analyst &quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e88b531d-b106-4c92-8177-62a8a864bde5_2316x2316.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2025-03-06T08:01:23.057Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4a55a893-382a-42c4-b11e-068d549dd49a_1024x1024.webp&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/evolving-threats-key-financing-takeaways&quot;,&quot;section_name&quot;:&quot;News&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:158423842,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:1,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee6d6275-21f4-4f93-beb3-0ccf9c112d29_900x900.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>Although some have previously suggested that ISIL-KP is &#8220;<a href="https://www.washingtonpost.com/world/2021/08/23/taliban-isis-alqaeda-faq/">starved financially</a>&#8221;, the group has reportedly <a href="https://docs.un.org/en/S/2024/556">improved its financial and logistical capabilities</a>. ISIL-KP continues to <a href="https://docs.un.org/en/S/2025/71/Rev.1">conduct attacks in Afghanistan</a>, challenging the Taliban&#8217;s consolidation of control. It also claimed responsibility for January 2024 <a href="https://newlinesmag.com/argument/the-curious-case-of-the-kerman-attacks/">Kerman Bombings</a> and the March 2024 <a href="https://www.aljazeera.com/news/2024/3/23/moscow-concert-hall-attack-why-is-isil-targeting">Moscow Crocus City Hall Attack</a>.</p><p><em>This article provides an update and overview of the group&#8217;s financing activities. This analysis was originally written for my book, Illicit Money: Financing Terrorism in the 21st Century, but has been updated and is current to April 2025.</em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.rienner.com/title/Illicit_Money_Financing_Terrorism_in_the_Twenty_First_Century&quot;,&quot;text&quot;:&quot;Purchase: Illicit Money&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.rienner.com/title/Illicit_Money_Financing_Terrorism_in_the_Twenty_First_Century"><span>Purchase: Illicit Money</span></a></p><p><code>Last updated 15 April 2025</code></p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!JZ3m!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F81ff34ff-a182-4ebf-a74c-3a30ce462d5b_6016x4000.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!JZ3m!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F81ff34ff-a182-4ebf-a74c-3a30ce462d5b_6016x4000.jpeg 424w, https://substackcdn.com/image/fetch/$s_!JZ3m!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F81ff34ff-a182-4ebf-a74c-3a30ce462d5b_6016x4000.jpeg 848w, https://substackcdn.com/image/fetch/$s_!JZ3m!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F81ff34ff-a182-4ebf-a74c-3a30ce462d5b_6016x4000.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!JZ3m!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F81ff34ff-a182-4ebf-a74c-3a30ce462d5b_6016x4000.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!JZ3m!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F81ff34ff-a182-4ebf-a74c-3a30ce462d5b_6016x4000.jpeg" width="1456" height="968" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/81ff34ff-a182-4ebf-a74c-3a30ce462d5b_6016x4000.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:968,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:10514171,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!JZ3m!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F81ff34ff-a182-4ebf-a74c-3a30ce462d5b_6016x4000.jpeg 424w, https://substackcdn.com/image/fetch/$s_!JZ3m!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F81ff34ff-a182-4ebf-a74c-3a30ce462d5b_6016x4000.jpeg 848w, https://substackcdn.com/image/fetch/$s_!JZ3m!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F81ff34ff-a182-4ebf-a74c-3a30ce462d5b_6016x4000.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!JZ3m!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F81ff34ff-a182-4ebf-a74c-3a30ce462d5b_6016x4000.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3>Raising Funds</h3><p>In Afghanistan, ISIL-KP clashes with the Taliban in terms of funding and resources. ISIL generated the majority of its funds from taxing and extorting the local population in its area of control and influence, from donations from ISIL core and wealthy donors, and from identity-based support networks, as well as kidnapping for ransom. Tax rates vary, ranging between 10% and 15% depending on whether the economic activity is legitimate or illegal. This control / influence can be fleeting, and does not depend on ongoing territorial control (although that is certainly desirable from the group&#8217;s perspective). This taxation / extortion activity includes control of <a href="https://www.globalwitness.org/en/campaigns/afghanistan/talc-everyday-mineral-funding-afghan-insurgents/">mining sites</a>, including talc, chromite, precious and semi-precious stones as well as <a href="https://documents-dds-ny.un.org/doc/UNDOC/GEN/N18/054/89/PDF/N1805489.pdf?OpenElement">agriculture</a>. Prior to being taken over by ISIL-KP, the mining sites had been held by the Taliban who profited from them, but <a href="https://www.globalwitness.org/en/campaigns/afghanistan/talc-everyday-mineral-funding-afghan-insurgents/">did not mine them directly</a>. The group is <a href="https://ctc.usma.edu/wp-content/uploads/2020/03/Broken-but-Not-Defeated.pdf">also reported</a> to raise funds from timber smuggling</p><p>Kidnapping for ransom has further served as a revenue source for the group. In 2018, three men were <a href="https://www.dawn.com/news/1440056/investigators-find-held-is-men-sent-funds-to-afghanistan">arrested in Karachi</a> for conducting 5-6 kidnappings and sending the money to ISIL-KP through hundi and hawala networks, as well as through bank accounts used to transfer funds to Afghanistan. The Islamic State earmarked the funds to conduct terrorist attacks in Pakistan. Estimates from 2015 and 2016 suggest that the group is able to generate between $300 and $350 million in revenues from this activity, but this is largely dependent on the territory they are able to control / extort, and is therefore highly variable.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a> The group is believed to have suffered unspecified financial losses <a href="https://documents-dds-ny.un.org/doc/UNDOC/GEN/N21/168/50/PDF/N2116850.pdf?OpenElement">in 2020</a> likely related to counter-terrorism operations and reduction in territory (specifically in <a href="https://oig.treasury.gov/sites/oig/files/2021-01/OIG-CA-21-012.pdf">southern Nangarhar</a>).</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/subscribe?"><span>Subscribe now</span></a></p>
      <p>
          <a href="https://newsletter.insightthreatintel.com/p/isil-kp-financing-9fe">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Al-Shabaab’s Spending Priorities]]></title><description><![CDATA[Group Profile]]></description><link>https://newsletter.insightthreatintel.com/p/al-shabaabs-spending-priorities</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/al-shabaabs-spending-priorities</guid><dc:creator><![CDATA[Elena Martynova]]></dc:creator><pubDate>Tue, 08 Apr 2025 13:03:54 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!YTX1!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbf0669ec-b6c6-44c9-873a-026c511ab5b3_1500x1000.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>With an annual revenue<a href="https://newsletter.insightthreatintel.com/p/how-does-al-shabaab-have-so-much"> estimated between $100 million and $200 million</a>, Al-Shabaab has substantial financial resources&#8212;but also extensive expenses to cover. In 2018, <a href="https://hiraalinstitute.org/wp-content/uploads/2018/07/AS-Finance-System.pdf">the Hiraal Institute</a> estimated that Al-Shabaab&#8217;s annual expenditures totaled approximately $23.6 million, paying salaries and bribes, providing basic services, and even investing in businesses. The group was assessed to spend an <a href="https://hiraalinstitute.org/wp-content/uploads/2018/07/AS-Finance-System.pdf">additional $2 million per year</a> on ammunition and explosives. Since then, Al-Shabaab has <a href="https://globalinitiative.net/wp-content/uploads/2022/12/AS-protection-economies.-WEB.pdf">increased tax collection</a> and thus the amount of revenue generated. The <a href="https://hiraalinstitute.org/wp-content/uploads/2020/10/A-Losing-Game.pdf">salaries and number of operations</a>, however, have not drastically grown over the last few years. Even with its operating costs, the group is running a substantial financial surplus.</em></p><p><em>What else does the group spend its money on? Find out below.</em></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Insight Monitor is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!YTX1!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbf0669ec-b6c6-44c9-873a-026c511ab5b3_1500x1000.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!YTX1!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbf0669ec-b6c6-44c9-873a-026c511ab5b3_1500x1000.png 424w, https://substackcdn.com/image/fetch/$s_!YTX1!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbf0669ec-b6c6-44c9-873a-026c511ab5b3_1500x1000.png 848w, https://substackcdn.com/image/fetch/$s_!YTX1!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbf0669ec-b6c6-44c9-873a-026c511ab5b3_1500x1000.png 1272w, https://substackcdn.com/image/fetch/$s_!YTX1!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbf0669ec-b6c6-44c9-873a-026c511ab5b3_1500x1000.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!YTX1!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbf0669ec-b6c6-44c9-873a-026c511ab5b3_1500x1000.png" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/bf0669ec-b6c6-44c9-873a-026c511ab5b3_1500x1000.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:123789,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://newsletter.insightthreatintel.com/i/160247595?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbf0669ec-b6c6-44c9-873a-026c511ab5b3_1500x1000.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!YTX1!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbf0669ec-b6c6-44c9-873a-026c511ab5b3_1500x1000.png 424w, https://substackcdn.com/image/fetch/$s_!YTX1!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbf0669ec-b6c6-44c9-873a-026c511ab5b3_1500x1000.png 848w, https://substackcdn.com/image/fetch/$s_!YTX1!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbf0669ec-b6c6-44c9-873a-026c511ab5b3_1500x1000.png 1272w, https://substackcdn.com/image/fetch/$s_!YTX1!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbf0669ec-b6c6-44c9-873a-026c511ab5b3_1500x1000.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3><strong>Organizational Expenses</strong></h3><h4><em>Salaries</em></h4><p>Al-Shabaab allocates a significant portion of its financial resources for paying salaries to soldiers, administrators, and other officials. Foot soldiers, who make up the bulk of the group&#8217;s members, are paid relatively modest wages. In <a href="https://frc.gov.so/wp-content/uploads/2022/05/NRA-Report-2022.pdf">2022</a>, new recruits earned about $30 per month, and trained cadets and drivers earned $70 per month. In addition to salaries, food costs for these fighters totalled about <a href="https://hiraalinstitute.org/wp-content/uploads/2018/07/AS-Finance-System.pdf">$3.6 million per year</a> in 2018, based on $2 per fighter per day.</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;3fe405ee-c905-4dcc-bfcf-6179445fe28b&quot;,&quot;caption&quot;:&quot;As we reported in our Global Terrorism Financing Report for December, Somali government forces have recently captured or killed high ranking Al-Shabaab financial operatives. These operatives include Mohamed Mire Jama, a top leader, who served as a finance chief and was responsible for financing the 2013 Westgate Mall and 2019 DusitD2 Complex Attacks.&quot;,&quot;cta&quot;:null,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;How does Al-Shabaab have so much money?&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:85208154,&quot;name&quot;:&quot;Elena Martynova&quot;,&quot;bio&quot;:&quot;Research Analyst &quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e88b531d-b106-4c92-8177-62a8a864bde5_2316x2316.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2025-03-04T14:03:29.657Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faf77b941-6a47-4503-86f2-3f9854fd71ad_1500x1000.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/how-does-al-shabaab-have-so-much&quot;,&quot;section_name&quot;:&quot;Group Profiles &quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:157821872,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:4,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee6d6275-21f4-4f93-beb3-0ccf9c112d29_900x900.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>Among Al-Shabaab&#8217;s personnel, the Amniyaat (the group&#8217;s security force) receive the highest base salaries, <a href="https://hiraalinstitute.org/wp-content/uploads/2018/07/AS-Finance-System.pdf">starting at $200 per month</a>. Their financial packages also include <a href="https://hiraalinstitute.org/wp-content/uploads/2018/07/AS-Finance-System.pdf">&#8216;additional benefits&#8217;</a> to support their activities, particularly when operating in enemy territory &#8211; but there are limited details on these other incentives. Commanders and administrative officials also earn competitive salaries, with starting pay of $200 per month, which can rise to <a href="https://hiraalinstitute.org/wp-content/uploads/2018/07/AS-Finance-System.pdf">$400 depending on rank</a>. The Somali Government outlines that very high-ranking officials, such as the group&#8217;s Emir, are among the highest-paid members, <a href="https://frc.gov.so/wp-content/uploads/2022/05/NRA-Report-2022.pdf">earning up to $25,000 per month</a>.</p>
      <p>
          <a href="https://newsletter.insightthreatintel.com/p/al-shabaabs-spending-priorities">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Drugs, Weapons, and Aryan Strikeforce]]></title><description><![CDATA[Group Profile]]></description><link>https://newsletter.insightthreatintel.com/p/drugs-weapons-and-aryan-strikeforce</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/drugs-weapons-and-aryan-strikeforce</guid><dc:creator><![CDATA[Elena Martynova]]></dc:creator><pubDate>Tue, 11 Mar 2025 13:01:25 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!dKeo!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0a7fb726-fe49-4746-8ff3-f620ca9c1966_1500x1000.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Aryan Strikeforce was a neo-Nazi organization founded by Ian Davison before his arrest on <a href="https://www.theguardian.com/world/2010/apr/30/teenager-rightwing-nazi-terror-plot">terrorism charges</a> in the UK in 2009. The group was revived in Davison&#8217;s absence in New Jersey by <a href="http://idavox.com/index.php/2017/04/13/next-on-the-white-power-chopping-block-josh-hatchet-steever-and-jake-boots-robards/">Joshua Steever</a> who embedded the group into a <a href="https://www.splcenter.org/hatewatch/2016/07/21/meet-aryan-nationalist-alliance-%E2%80%93-racist-hodgepodge-doomed-fail">national network of white power groups</a>. Despite claims of having over <a href="https://www.congress.gov/116/meeting/house/110369/witnesses/HHRG-116-BA10-Wstate-MaplesJ-20200115.pdf">30 chapters in the United States and abroad</a>, there is limited evidence of Aryan Strikeforce&#8217;s presence outside New Jersey and Pennsylvania. The group was officially designated as a terrorist entity in <a href="https://www.canada.ca/en/public-safety-canada/news/2021/06/government-of-canada-lists-four-new-terrorist-entities.html">Canada in 2021</a> following the arrest of <a href="https://www.pennlive.com/news/2017/05/purported_aryan_strikeforce_vi.html">Steever and five other members</a> on drug and weapons trafficking charges in 2017.</em></p><p><em>Keep reading to find out more about how Aryan Strikeforce raised and obfuscated their illicit funds.</em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/subscribe?"><span>Subscribe now</span></a></p><h3><strong>Origins and Operations</strong></h3><p>Aryan Strikeforce was created in the United Kingdom between <a href="https://www.state.gov/wp-content/uploads/2023/02/Country_Reports_2021_Complete_MASTER.no_maps-011323-Accessible.pdf">2006 and 2010</a>. In 2013, <a href="https://www.splcenter.org/resources/hate-watch/aryan-strikeforce-leader-gets-20-years-prison-neo-nazi-gang-falters/">Joshua Steever</a>, a former member of Combat 18 and founder of <a href="https://www.splcenter.org/fighting-hate/intelligence-report/2013/neo-nazi-website-targets-enemies-lists-personal-information">Aryan Terror Brigade</a>, established a new version of the Aryan Strikeforce after being <a href="https://www.splcenter.org/resources/reports/neo-nazi-website-targets-enemies-lists-personal-information/">expelled from his previous group.</a> Over time, the group claimed to <a href="https://www.publicsafety.gc.ca/cnt/ntnl-scrt/cntr-trrrsm/lstd-ntts/crrnt-lstd-ntts-en.aspx#61">establish chapters</a> in the UK and the US, with connections in Eastern Europe, South America, South Africa, and Canada.</p><p>The group promoted a <a href="https://www.publicsafety.gc.ca/cnt/ntnl-scrt/cntr-trrrsm/lstd-ntts/crrnt-lstd-ntts-en.aspx#61">decentralized structure and advocated for violent action</a> to overthrow governments and incite racial conflict. In 2016, the group was reportedly involved in <a href="https://www.publicsafety.gc.ca/cnt/ntnl-scrt/cntr-trrrsm/lstd-ntts/crrnt-lstd-ntts-en.aspx#61">planning a suicide bombing</a> targeting counter-protesters during a white supremacist rally in Pennsylvania. Other than the plot, Aryan Strikeforce members primarily engaged in <a href="https://www.publicsafety.gc.ca/cnt/ntnl-scrt/cntr-trrrsm/lstd-ntts/crrnt-lstd-ntts-en.aspx#61">various criminal activities</a>, including the production of chemical weapons, the transfer of bomb-making instructions, and trafficking firearms.</p><p>Group members also collaborated with <a href="https://www.splcenter.org/resources/extremist-files/national-socialist-movement/">National Socialist Movement</a> leader Jeff Schoep to form the Aryan National Alliance (ANA). This coalition brought together <a href="https://www.splcenter.org/hatewatch/2016/07/21/meet-aryan-nationalist-alliance-%E2%80%93-racist-hodgepodge-doomed-fail">over 20 white supremacist groups</a> across the US and Canada. This effort aimed to consolidate and coordinate the activities of various extremist organizations, including Aryan Nations and the National Socialist Movement.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!dKeo!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0a7fb726-fe49-4746-8ff3-f620ca9c1966_1500x1000.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!dKeo!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0a7fb726-fe49-4746-8ff3-f620ca9c1966_1500x1000.png 424w, https://substackcdn.com/image/fetch/$s_!dKeo!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0a7fb726-fe49-4746-8ff3-f620ca9c1966_1500x1000.png 848w, https://substackcdn.com/image/fetch/$s_!dKeo!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0a7fb726-fe49-4746-8ff3-f620ca9c1966_1500x1000.png 1272w, https://substackcdn.com/image/fetch/$s_!dKeo!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0a7fb726-fe49-4746-8ff3-f620ca9c1966_1500x1000.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!dKeo!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0a7fb726-fe49-4746-8ff3-f620ca9c1966_1500x1000.png" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0a7fb726-fe49-4746-8ff3-f620ca9c1966_1500x1000.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:112554,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!dKeo!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0a7fb726-fe49-4746-8ff3-f620ca9c1966_1500x1000.png 424w, https://substackcdn.com/image/fetch/$s_!dKeo!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0a7fb726-fe49-4746-8ff3-f620ca9c1966_1500x1000.png 848w, https://substackcdn.com/image/fetch/$s_!dKeo!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0a7fb726-fe49-4746-8ff3-f620ca9c1966_1500x1000.png 1272w, https://substackcdn.com/image/fetch/$s_!dKeo!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0a7fb726-fe49-4746-8ff3-f620ca9c1966_1500x1000.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div>
      <p>
          <a href="https://newsletter.insightthreatintel.com/p/drugs-weapons-and-aryan-strikeforce">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[How does Al-Shabaab have so much money?]]></title><description><![CDATA[Group Profile]]></description><link>https://newsletter.insightthreatintel.com/p/how-does-al-shabaab-have-so-much</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/how-does-al-shabaab-have-so-much</guid><dc:creator><![CDATA[Elena Martynova]]></dc:creator><pubDate>Tue, 04 Mar 2025 14:03:29 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!VowY!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faf77b941-6a47-4503-86f2-3f9854fd71ad_1500x1000.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>As we reported in our <a href="https://newsletter.insightthreatintel.com/p/global-terrorism-financing-report-832?utm_source=publication-search">Global Terrorism Financing Report</a> for December, Somali government forces have recently captured or killed high ranking Al-Shabaab financial operatives. These operatives include <a href="https://eastleighvoice.co.ke/villa-somalia/100642/dusitd2-attack-financier-mohamed-jama-killed-by-airstrike-in-somalia">Mohamed Mire Jama</a>, a top leader, who served as a finance chief and was responsible for financing the 2013 Westgate Mall and 2019 DusitD2 Complex Attacks.</em></p><p><em>Al-Shabaab funds its operations through imposing taxes, controlling trade routes, and smuggling goods, among other methods. In February 2025, <a href="https://docs.un.org/en/S/2025/71/Rev.1">the UN reported</a> that the group&#8217;s annual revenue ranges between $100-$200 million.</em></p><p><em>Keep reading to learn about the many ways that Al-Shabaab raises funds.</em></p><p>&#127881; <strong>We&#8217;re Celebrating 7 Years of Insight Threat Intelligence!</strong> &#127881;</p><p>We&#8217;ve been at the forefront of <strong>research, investigation, education, and expert analysis</strong> in illicit finance, security, and intelligence for seven years. We couldn&#8217;t have done it without our incredible community!</p><p>To celebrate, we&#8217;re offering <strong>20% off all courses</strong> for a limited time! Whether you&#8217;re starting your journey in financial intelligence or looking to deepen your expertise, now is the time.</p><p>Use code <strong>ITI20</strong> at checkout! &#127891;&#10024;</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://insightthreatintelligence.thinkific.com&quot;,&quot;text&quot;:&quot;Insight Academy&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://insightthreatintelligence.thinkific.com"><span>Insight Academy</span></a></p><p>&#128197; Offer valid until March 31!</p><p></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/subscribe?"><span>Subscribe now</span></a></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!VowY!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faf77b941-6a47-4503-86f2-3f9854fd71ad_1500x1000.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!VowY!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faf77b941-6a47-4503-86f2-3f9854fd71ad_1500x1000.png 424w, https://substackcdn.com/image/fetch/$s_!VowY!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faf77b941-6a47-4503-86f2-3f9854fd71ad_1500x1000.png 848w, https://substackcdn.com/image/fetch/$s_!VowY!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faf77b941-6a47-4503-86f2-3f9854fd71ad_1500x1000.png 1272w, https://substackcdn.com/image/fetch/$s_!VowY!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faf77b941-6a47-4503-86f2-3f9854fd71ad_1500x1000.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!VowY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faf77b941-6a47-4503-86f2-3f9854fd71ad_1500x1000.png" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/af77b941-6a47-4503-86f2-3f9854fd71ad_1500x1000.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:113828,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://newsletter.insightthreatintel.com/i/157821872?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faf77b941-6a47-4503-86f2-3f9854fd71ad_1500x1000.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!VowY!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faf77b941-6a47-4503-86f2-3f9854fd71ad_1500x1000.png 424w, https://substackcdn.com/image/fetch/$s_!VowY!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faf77b941-6a47-4503-86f2-3f9854fd71ad_1500x1000.png 848w, https://substackcdn.com/image/fetch/$s_!VowY!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faf77b941-6a47-4503-86f2-3f9854fd71ad_1500x1000.png 1272w, https://substackcdn.com/image/fetch/$s_!VowY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faf77b941-6a47-4503-86f2-3f9854fd71ad_1500x1000.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3><strong>Origins and Operations</strong></h3><p>Al-Shabaab, meaning "The Youth" in Arabic, <a href="http://theconversation.com/how-crime-is-closely-linked-to-al-shabaabs-survival-strategy-134432">emerged in Somalia</a> around 2004 as the youth wing of the Islamic Courts Union (ICU). Following Ethiopia's 2006 invasion and dismantling of the ICU, Al-Shabaab <a href="http://theconversation.com/how-crime-is-closely-linked-to-al-shabaabs-survival-strategy-134432">became an insurgency</a>, gaining control of southern and central Somalia. By 2009, the group <a href="https://home.treasury.gov/news/press-releases/jy1028">pledged allegiance to al-Qaeda</a> and became an official affiliate in 2012.</p><p>Al-Shabaab conducted its first attack outside Somalia in 2010, killing 74 civilians in Uganda. It intensified operations against Kenya following the country&#8217;s 2011 military intervention, with the <a href="https://rusi.org/explore-our-research/publications/rusi-newsbrief/the-hydra-headed-challenge-of-al-shabaabs-financing">2013 Westgate Mall attack</a> in Nairobi killing 67 people. The 2019 DusitD2 complex attack also gained global attention after Al-Shabaab claimed responsibility for <a href="https://www.voanews.com/a/us-offers-10-million-reward-for-mastermind-of-2019-nairobi-terrorist-attack-/6917350.html">killing 22 individuals and injuring an additional 30</a>.</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;e37ab06d-5620-44a4-8ee5-96274a152554&quot;,&quot;caption&quot;:&quot;On January 15, 2019, Al-Shabaab launched an attack on DusitD2 hotel and office complex, a compound located in an upscale neighborhood of Nairobi, Kenya. The attack began when Mahir Riziki detonated his suicide vest near the hotel restaurant. Following the bombing, four gunmen entered the complex and opened fire on civilians inside. The attack killed 22 &#8230;&quot;,&quot;cta&quot;:null,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Nairobi DusitD2 Complex Attack&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:85208154,&quot;name&quot;:&quot;Elena Martynova&quot;,&quot;bio&quot;:&quot;Research Analyst &quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e88b531d-b106-4c92-8177-62a8a864bde5_2316x2316.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2023-03-28T13:01:26.489Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F01dc789c-0b72-4bca-9b8c-1a833f5a74a0_1080x1080.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/nairobi-dusitd2-complex-attack&quot;,&quot;section_name&quot;:&quot;Attack profiles&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:108177064,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:4,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee6d6275-21f4-4f93-beb3-0ccf9c112d29_900x900.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>The group operates in Somalia, <a href="https://digitallibrary.un.org/record/3990958/files/S_2022_754-AR.pdf">Ethiopia</a>, <a href="https://www.researchgate.net/profile/Mariam-Shah-3/publication/375597465_Chapter_A_Critical_Assessment_of_Pakistani_Counter-Terrorism_Financing_Measures_-_Book_'Countering_Terrorist_and_Criminal_Financing_Theory_and_Practice'_Publisher_CRC_Press/links/6551d9623fa26f66f4fbf3c4/Chapter-A-Critical-Assessment-of-Pakistani-Counter-Terrorism-Financing-Measures-Book-Countering-Terrorist-and-Criminal-Financing-Theory-and-Practice-Publisher-CRC-Press.pdf">Kenya, Djibouti, Tanzania, and Uganda</a>. Al-Shabaab has an estimated <a href="https://africacenter.org/spotlight/reclaiming-al-shabaabs-revenue/">5,000 to 10,000 fighters</a>, and was responsible for over <a href="https://africacenter.org/spotlight/reclaiming-al-shabaabs-revenue/">2,500 violent events and 6,000 fatalities</a> in 2022/2023.</p>
      <p>
          <a href="https://newsletter.insightthreatintel.com/p/how-does-al-shabaab-have-so-much">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[A Counter-Terrorism Success Story? ISIL Sinai]]></title><description><![CDATA[Group Profile]]></description><link>https://newsletter.insightthreatintel.com/p/a-counter-terrorism-success-story</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/a-counter-terrorism-success-story</guid><dc:creator><![CDATA[Elena Martynova]]></dc:creator><pubDate>Tue, 11 Feb 2025 14:01:12 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!fQW3!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3044186a-1bab-4223-b451-7c181058cd5a_1024x608.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>In 2014, the jihadist terrorist group Ansar Bayt al-Maqdia (ABM) pledged allegiance to the Islamic State and became ISIL Sinai Province. During its first few years of operation, the group committed over <a href="https://greydynamics.com/islamic-state-in-sinai-a-deep-dive-on-wilayat-sinai/">500 attacks in the northern Sinai region of Egypt</a>, mainly targeting Egyptian security forces. However, as a result of both kinetic and non-kinetic counter-terrorism measures, the group lost many of its strongholds, and since early 2023, ISIL Sinai has remained largely inactive.</em></p><p><em>Is it too early to call the group a counter-terrorism success story? Keep reading to learn about ISIL Sinai&#8217;s financial profile.</em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/subscribe?"><span>Subscribe now</span></a></p><h3>Origins and Operations</h3><p>ABM <a href="https://www.icct.nl/publication/security-sinai-present-and-future">first appeared in 2011</a> and primarily carried out attacks against the Egyptian and Israeli governments. In October 2014, leaders from both ABM and the Islamic State supposedly <a href="https://www.inss.org.il/wp-content/uploads/systemfiles/Wilayat%20Sinai%20The%20Islamic%20State%E2%80%99s%20Egyptian%20Affiliate%20%20Zack%20Gold.pdf">met to negotiate potential funding opportunities</a>. ABM&#8217;s pledge of allegiance to ISIL could have thus been a financial decision.</p><p>After becoming an affiliate, ISIL Sinai <a href="https://www.nationalsecurity.gov.au/what-australia-is-doing/terrorist-organisations/listed-terrorist-organisations/islamic-state-sinai-province-(is-sinai)">conducted operations</a> against foreign and religious targets, including bombing a Russian passenger aircraft, executing a Croatian citizen, and attacking Egyptian Coptic Christians. The group primarily operated in the northern Sinai region of Egypt. In 2021, the <a href="https://documents-dds-ny.un.org/doc/UNDOC/GEN/N23/038/91/PDF/N2303891.pdf">UN assessed</a> ISIL Sinai had around 1,000 fighters. However, the group is now estimated to have a <a href="https://documents-dds-ny.un.org/doc/UNDOC/GEN/N18/201/01/PDF/N1820101.pdf">few hundred remaining members</a>.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!fQW3!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3044186a-1bab-4223-b451-7c181058cd5a_1024x608.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!fQW3!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3044186a-1bab-4223-b451-7c181058cd5a_1024x608.png 424w, https://substackcdn.com/image/fetch/$s_!fQW3!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3044186a-1bab-4223-b451-7c181058cd5a_1024x608.png 848w, https://substackcdn.com/image/fetch/$s_!fQW3!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3044186a-1bab-4223-b451-7c181058cd5a_1024x608.png 1272w, https://substackcdn.com/image/fetch/$s_!fQW3!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3044186a-1bab-4223-b451-7c181058cd5a_1024x608.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!fQW3!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3044186a-1bab-4223-b451-7c181058cd5a_1024x608.png" width="1024" height="608" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3044186a-1bab-4223-b451-7c181058cd5a_1024x608.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:&quot;normal&quot;,&quot;height&quot;:608,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!fQW3!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3044186a-1bab-4223-b451-7c181058cd5a_1024x608.png 424w, https://substackcdn.com/image/fetch/$s_!fQW3!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3044186a-1bab-4223-b451-7c181058cd5a_1024x608.png 848w, https://substackcdn.com/image/fetch/$s_!fQW3!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3044186a-1bab-4223-b451-7c181058cd5a_1024x608.png 1272w, https://substackcdn.com/image/fetch/$s_!fQW3!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3044186a-1bab-4223-b451-7c181058cd5a_1024x608.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"><em>Substack Image Generation</em></figcaption></figure></div>
      <p>
          <a href="https://newsletter.insightthreatintel.com/p/a-counter-terrorism-success-story">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Charity or Cover? The case of a PKK-affiliated non-profit in Canada]]></title><description><![CDATA[Anatolia Cultural Foundation]]></description><link>https://newsletter.insightthreatintel.com/p/charity-or-cover-the-case-of-a-pkk</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/charity-or-cover-the-case-of-a-pkk</guid><dc:creator><![CDATA[Jessica Davis, PhD]]></dc:creator><pubDate>Thu, 30 Jan 2025 14:03:26 GMT</pubDate><enclosure url="https://images.unsplash.com/photo-1639551937445-56c1fe6c4cef?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwyfHxkb2h1a3xlbnwwfHx8fDE3MzYxNzc1NTd8MA&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Hello <strong>Insight Monitor</strong> subscribers, and welcome to another week of financial intelligence, threat financing, and international security news and analysis. Late last year, UK Counterterrorism police <a href="https://www.bbc.com/news/articles/c1lg37mrgd1o?at_format=link&amp;at_link_id=872C0DE4-ACAD-11EF-8ACC-F28662035B6F&amp;at_ptr_name=twitter&amp;at_campaign_type=owned&amp;at_link_origin=BBCBreaking&amp;at_campaign=Social_Flow&amp;at_medium=social&amp;at_link_type=web_link&amp;at_bbc_team=editorial">arrested six people</a> on terrorism charges relating to the PKK. This week, we&#8217;re looking at a Canadian charitable organization that had its charitable status revoked for financing the PKK, and yet continues to operate in Canada. We&#8217;ll explore how this happened, what the organization is accused of, and what needs to be done in Canada to make our financial system more resilient against terrorist financing. Have a read, and share it with a friend! </em></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Insight Monitor is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h3>The PKK</h3><p>The Kurdistan Workers&#8217; Party, or PKK, was formally established in 1978 in T&#252;rkiye by Abdullah &#214;calan and is a Marxist-Lenist group whose mission is to ignite a communist revolution through guerilla warfare and create a separate Kurdish state.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a>  The group formally began operations in T&#252;rkiye in 1983, but these activities have not been contained to the country.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-2" href="#footnote-2" target="_self">2</a> The PKK has been responsible for 29% of all terrorism-related deaths in OECD countries between 2009 and 2014, and the group has launched thousands of terrorist attacks.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-3" href="#footnote-3" target="_self">3</a> </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://images.unsplash.com/photo-1639551937445-56c1fe6c4cef?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwyfHxkb2h1a3xlbnwwfHx8fDE3MzYxNzc1NTd8MA&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://images.unsplash.com/photo-1639551937445-56c1fe6c4cef?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwyfHxkb2h1a3xlbnwwfHx8fDE3MzYxNzc1NTd8MA&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1639551937445-56c1fe6c4cef?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwyfHxkb2h1a3xlbnwwfHx8fDE3MzYxNzc1NTd8MA&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1639551937445-56c1fe6c4cef?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwyfHxkb2h1a3xlbnwwfHx8fDE3MzYxNzc1NTd8MA&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1639551937445-56c1fe6c4cef?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwyfHxkb2h1a3xlbnwwfHx8fDE3MzYxNzc1NTd8MA&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1456w" sizes="100vw"><img src="https://images.unsplash.com/photo-1639551937445-56c1fe6c4cef?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwyfHxkb2h1a3xlbnwwfHx8fDE3MzYxNzc1NTd8MA&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080" width="409" height="271.9414893617021" data-attrs="{&quot;src&quot;:&quot;https://images.unsplash.com/photo-1639551937445-56c1fe6c4cef?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwyfHxkb2h1a3xlbnwwfHx8fDE3MzYxNzc1NTd8MA&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:4000,&quot;width&quot;:6016,&quot;resizeWidth&quot;:409,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;a group of people on a beach with a mountain in the background&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="a group of people on a beach with a mountain in the background" title="a group of people on a beach with a mountain in the background" srcset="https://images.unsplash.com/photo-1639551937445-56c1fe6c4cef?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwyfHxkb2h1a3xlbnwwfHx8fDE3MzYxNzc1NTd8MA&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1639551937445-56c1fe6c4cef?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwyfHxkb2h1a3xlbnwwfHx8fDE3MzYxNzc1NTd8MA&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1639551937445-56c1fe6c4cef?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwyfHxkb2h1a3xlbnwwfHx8fDE3MzYxNzc1NTd8MA&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1639551937445-56c1fe6c4cef?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwyfHxkb2h1a3xlbnwwfHx8fDE3MzYxNzc1NTd8MA&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo by <a href="true">Levi Meir Clancy</a> on <a href="https://unsplash.com">Unsplash</a></figcaption></figure></div><p>The PKK was initially sponsored by states such as Syria and received support from the Soviet Union, Cyprus, Greece, Armenia, Libya, Iran, Iraq, Bulgaria and Cuba. Following the collapse of the Soviet Union, the PKK needed to find new sources of funds, so they expanded into criminal activities, relying heavily on the drug trade but also on support campaigns, publication sales, grants, and subscriptions, as well as funds from legitimate businesses diverted to the group.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-4" href="#footnote-4" target="_self">4</a> </p><p>Today, the PKK has an elaborate network of fundraising activities, ranging from extortion and taxation to robbery, drug trafficking and arms smuggling. They also engage in money laundering, kidnapping for ransom, and counterfeiting, among other activities.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-5" href="#footnote-5" target="_self">5</a></p><p>Despite being a proscribed terrorist group in the UK, EU, and Canada, the PKK has managed to maintain its organizational financing activities. Part of the reason for this is the lack of interest in the issue from proscribing states: it becomes a simple matter for states to ignore the activity so long as the PKK establishes a plausible front or avoids using known PKK operatives as the point people on charitable or commercial activities.</p><p> Lack of international cooperation to counter the PKK, combined with lukewarm efforts domestically, means that the group operates and finances itself with relative domestic and international impunity. One of the countries it exploits to do so is Canada; while not as important as the European drugs market, the group's support from international donor networks is likely an important part of its financing operations.</p><h3>The PKK in Canada</h3>
      <p>
          <a href="https://newsletter.insightthreatintel.com/p/charity-or-cover-the-case-of-a-pkk">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Militants to Ministers: The Financial Profile of Hay’at Tahrir al-Sham]]></title><description><![CDATA[Group Profile]]></description><link>https://newsletter.insightthreatintel.com/p/militants-to-ministers-the-financial</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/militants-to-ministers-the-financial</guid><dc:creator><![CDATA[Elena Martynova]]></dc:creator><pubDate>Tue, 21 Jan 2025 11:29:54 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!XnmL!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb253bb25-9e12-4573-b974-d4aa687d11a5_1500x1000.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>At the start of December 2024, Bashar al-Assad fled Syria, and his regime collapsed following Hay'at Tahrir al-Sham&#8217;s (HTS) advance on Aleppo. The group was able to successfully carry out the campaign due to a variety of factors, including HTS&#8217;s extensive operational planning and the Assad regime&#8217;s relative military weakness. Despite being designated as a <a href="https://www.csis.org/blogs/examining-extremism/examining-extremism-hayat-tahrir-al-sham-hts">terrorist organization</a>, which complicated its ability to generate legitimate revenue, HTS has a sophisticated financial network that capitalizes on local taxation, foreign donations, and criminal revenue streams.</em></p><p>Keep reading to learn about HTS&#8217;s financial network and how it will help the group sustain power in the region.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/subscribe?"><span>Subscribe now</span></a></p><h3><strong>Origins and Operations</strong></h3><p>Based in Syria&#8217;s northern Idlib province, HTS is a rebel group that opposed the Bashar al-Assad regime. The group was originally <a href="https://www.bbc.com/news/articles/ce313jn453zo">founded in 2011</a> as Jabhat al-Nusra, an al-Qaeda affiliate. Jabhat al-Nusra was dissolved when one of the leaders, Abu Mohammed al-Jolani, <a href="https://www.bbc.com/news/articles/ce313jn453zo">broke ranks with al-Qaeda</a> and merged 5 Islamist militias and opposition factions in 2017 to create HTS. HTS is estimated to have between <a href="https://www.csis.org/blogs/examining-extremism/examining-extremism-hayat-tahrir-al-sham-hts">12,000-20,000 members</a> and mainly targets Assad forces, rival militias, and Russian operations.</p>
      <p>
          <a href="https://newsletter.insightthreatintel.com/p/militants-to-ministers-the-financial">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Ecofascism in Finland: Sinimusta Liike (Blue and Black Movement)]]></title><description><![CDATA[Hello, Insight Monitor subscribers, and welcome to another edition of our series on ecofascism movements.]]></description><link>https://newsletter.insightthreatintel.com/p/ecofascism-in-finland-sinimusta-liike</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/ecofascism-in-finland-sinimusta-liike</guid><dc:creator><![CDATA[Dan Collen]]></dc:creator><pubDate>Tue, 03 Dec 2024 14:01:47 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!H8j6!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c18fe69-b9fe-4f65-8569-0452daf4af0e_1500x1000.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Hello, <strong>Insight Monitor </strong>subscribers, and welcome to another edition of our series on ecofascism movements. Today, we&#8217;re looking at the Blue and Black Movement in Finland (Sinimusta Liike). This</em> <em>is youth-oriented <a href="https://www.mtvuutiset.fi/artikkeli/eduskuntavaaleihin-tahtaava-sinimusta-liike-on-avoimen-rasistinen-ja-fasistinen-me-olemme-rotuidentiteettia-yllapitava-puolue/8584266#gs.gt9d7h">group</a> and de-registered political party. They propose white nationalism as a solution to environmental preservation - likening immigrant populations to invasive species harmful to Finland&#8217;s natural ecosystem - and plan to protect Finland&#8217;s natural resources through fascist state governance.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a>&nbsp;They have been described by academics as <a href="https://hdl.handle.net/1887/3764529">employing Ecofascism in their political platform</a> and are <a href="https://blogi.elokapina.me/elokapina-must-be-antifascist-being-post-political-would-leave-a-dangerous-void/">considered an Ecofascist group</a> by environmentalists.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-2" href="#footnote-2" target="_self">2</a> We hope you find this article insightful, and please share it with a friend to help us grow our community! </em></p><p><em>Thanks for caring about illicit finance and global security, </em></p><p><em>~Jess</em></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Insight Monitor is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2>Origins and Operations</h2><p>The Blue and Black Movement was <a href="https://www.researchgate.net/publication/378497457_The_nightless_nights_of_the_'Nazi_camp'_The_Finnish_far-right's_anti-climate_politics_in_urban_space">formed from young members of the far-right Finns Party</a>, some of whom were <a href="https://yle.fi/a/74-20088501">disillusioned</a> with the Party&#8217;s lack of open support of white nationalism.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-3" href="#footnote-3" target="_self">3</a> The party took its name from the youth wing of the fascist federal party <em><a href="https://www.mtvuutiset.fi/artikkeli/eduskuntavaaleihin-tahtaava-sinimusta-liike-on-avoimen-rasistinen-ja-fasistinen-me-olemme-rotuidentiteettia-yllapitava-puolue/8584266#gs.hppg34">Is&#228;nmaallinen kansanliike</a> </em>(Patriotic People's Movement), which operated in the 1930s.</p><p>The Blue and Black Movement&#8217;s first two applications to become a registered federal political party were <a href="https://yle.fi/a/74-20085113">rejected</a> by Finland&#8217;s Ministry of Justice over concerns that the group&#8217;s programme did not respect constitutional law and universal human rights. This rejection led them them to tone down their official programme.</p><p>In April 2021, Finland&#8217;s national chapter of Extinction Rebellion published an English-language essay <a href="https://blogi.elokapina.me/elokapina-must-be-antifascist-being-post-political-would-leave-a-dangerous-void/">warning environmentalists</a> about the Blue and Black Movement, calling the group &#8220;explicitly ecofascist&#8221; and saying that:</p><blockquote><p>&#8220;it would be too easy to fool ourselves believing that their (Blue and Black&#8217;s) ecology is sincere and not merely a fig leaf or vehicle for more sinister aims.&#8221;</p></blockquote><p>After adjusting their platform, the Blue and Black Movement was accepted as a political party in 2022 and ran in Finland&#8217;s 2023 parliamentary election, garnering <a href="https://tulospalvelu.vaalit.fi/EKV-2023/en/tulos_kokomaa.html">approximately 0.1% of votes</a>. They were subsequently de-registered in 2023 after it was determined they reverted back to their <a href="https://yle.fi/a/74-20085113">original party programme</a> after registration, and remain de-registered due a lack of sufficient support. Chairperson Tuukka Kuru was <a href="https://yle.fi/a/74-20088501">convicted of incitement of hatred</a> and <a href="https://www.state.gov/reports/2023-report-on-international-religious-freedom/finland/">fined &#8364;1,280 ($1,400)</a> over antisemitic social media comments in June of 2023. The party has attempted to <a href="https://yle.fi/a/74-20088501">register again as a federal party</a> and remains active under Kuru&#8217;s leadership.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!H8j6!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c18fe69-b9fe-4f65-8569-0452daf4af0e_1500x1000.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!H8j6!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c18fe69-b9fe-4f65-8569-0452daf4af0e_1500x1000.png 424w, https://substackcdn.com/image/fetch/$s_!H8j6!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c18fe69-b9fe-4f65-8569-0452daf4af0e_1500x1000.png 848w, https://substackcdn.com/image/fetch/$s_!H8j6!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c18fe69-b9fe-4f65-8569-0452daf4af0e_1500x1000.png 1272w, https://substackcdn.com/image/fetch/$s_!H8j6!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c18fe69-b9fe-4f65-8569-0452daf4af0e_1500x1000.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!H8j6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c18fe69-b9fe-4f65-8569-0452daf4af0e_1500x1000.png" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3c18fe69-b9fe-4f65-8569-0452daf4af0e_1500x1000.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:196105,&quot;alt&quot;:&quot;Timeline titled &#8220;Blue and Black Movement/Sinimusta Liike.&#8221; 2020: Finns Party cuts off Finns Party Youth from the party over support of white nationalism. Sinimusta Liike registers as a party in December 2020. 2021: Sinimusta Liike is formally announced in January 2021. The group publishes blogs and organizes in-person networking events with international neo-Nazis by Fall 2021. (Antifascistinen Verkosto, 2021). 2022: Sinimusta Liike succeeds at obtaining 5000 official supporters and becomes an official federal political party. 2023: Sinimusta Liike runs 88 candidates in Finland&#8217;s 2023 Parliamentary Election and receives 2,307 votes nation-wide. Two months later, Chairperson Tuukka Kuru is convicted of inciting hatred towards Jews. They are de-registered as a political party later this year. 2024: Sinimusta Liike campaigns to garner the minimum support to re-register as a political party, but still falls several thousand signatures short by Fall 2024. Copyright 2024 Insight Threat Intelligence Ltd. All Rights Reserved.&quot;,&quot;title&quot;:&quot;Timeline titled &#8220;Blue and Black Movement/Sinimusta Liike.&#8221; 2020: Finns Party cuts off Finns Party Youth from the party over support of white nationalism. Sinimusta Liike registers as a party in December 2020. 2021: Sinimusta Liike is formally announced in January 2021. The group publishes blogs and organizes in-person networking events with international neo-Nazis by Fall 2021. (Antifascistinen Verkosto, 2021). 2022: Sinimusta Liike succeeds at obtaining 5000 official supporters and becomes an official federal political party. 2023: Sinimusta Liike runs 88 candidates in Finland&#8217;s 2023 Parliamentary Election and receives 2,307 votes nation-wide. Two months later, Chairperson Tuukka Kuru is convicted of inciting hatred towards Jews. They are de-registered as a political party later this year. 2024: Sinimusta Liike campaigns to garner the minimum support to re-register as a political party, but still falls several thousand signatures short by Fall 2024. Copyright 2024 Insight Threat Intelligence Ltd. All Rights Reserved.&quot;,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Timeline titled &#8220;Blue and Black Movement/Sinimusta Liike.&#8221; 2020: Finns Party cuts off Finns Party Youth from the party over support of white nationalism. Sinimusta Liike registers as a party in December 2020. 2021: Sinimusta Liike is formally announced in January 2021. The group publishes blogs and organizes in-person networking events with international neo-Nazis by Fall 2021. (Antifascistinen Verkosto, 2021). 2022: Sinimusta Liike succeeds at obtaining 5000 official supporters and becomes an official federal political party. 2023: Sinimusta Liike runs 88 candidates in Finland&#8217;s 2023 Parliamentary Election and receives 2,307 votes nation-wide. Two months later, Chairperson Tuukka Kuru is convicted of inciting hatred towards Jews. They are de-registered as a political party later this year. 2024: Sinimusta Liike campaigns to garner the minimum support to re-register as a political party, but still falls several thousand signatures short by Fall 2024. Copyright 2024 Insight Threat Intelligence Ltd. All Rights Reserved." title="Timeline titled &#8220;Blue and Black Movement/Sinimusta Liike.&#8221; 2020: Finns Party cuts off Finns Party Youth from the party over support of white nationalism. Sinimusta Liike registers as a party in December 2020. 2021: Sinimusta Liike is formally announced in January 2021. The group publishes blogs and organizes in-person networking events with international neo-Nazis by Fall 2021. (Antifascistinen Verkosto, 2021). 2022: Sinimusta Liike succeeds at obtaining 5000 official supporters and becomes an official federal political party. 2023: Sinimusta Liike runs 88 candidates in Finland&#8217;s 2023 Parliamentary Election and receives 2,307 votes nation-wide. Two months later, Chairperson Tuukka Kuru is convicted of inciting hatred towards Jews. They are de-registered as a political party later this year. 2024: Sinimusta Liike campaigns to garner the minimum support to re-register as a political party, but still falls several thousand signatures short by Fall 2024. Copyright 2024 Insight Threat Intelligence Ltd. All Rights Reserved." srcset="https://substackcdn.com/image/fetch/$s_!H8j6!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c18fe69-b9fe-4f65-8569-0452daf4af0e_1500x1000.png 424w, https://substackcdn.com/image/fetch/$s_!H8j6!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c18fe69-b9fe-4f65-8569-0452daf4af0e_1500x1000.png 848w, https://substackcdn.com/image/fetch/$s_!H8j6!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c18fe69-b9fe-4f65-8569-0452daf4af0e_1500x1000.png 1272w, https://substackcdn.com/image/fetch/$s_!H8j6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c18fe69-b9fe-4f65-8569-0452daf4af0e_1500x1000.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2>Raising Funds</h2><p>The Blue and Black Movement requires membership fees for all official members, which must be submitted along with membership applications. The initial cost to join is &#8364;30 ($32.26), but the group&#8217;s membership application form does not specify how frequently members must pay after their initial application.</p><p>The Blue and Black Movement sells official merchandise on their website, with items ranging in price from &#8364;5.90 ($6.34) to &#8364;29.90 ($31.18). Their only merchandise store uses Woocommerce, an open-source Ecommerce plugin for the Wordpress platform. Woocommerce is <a href="https://newsletter.insightthreatintel.com/p/extremist-financing-through-merchandise">commonly used by far-right groups to sell merchandise</a>.</p><p>The Blue and Black Movement reported &#8364;5 497,24 ($6,006.42) in official party donations during the <a href="https://www.vaalirahoitusvalvonta.fi/en/frontpage/politicalpartyfunding/searchpoliticalpartyfundingdisclosures/fundingandcontributions.html">2023 parliamentary election cycle</a>. As a minor political party, the Blue and Black Movement was not subjected to strict public financial disclosures during their time as a registered political party.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-4" href="#footnote-4" target="_self">4</a></p><div><hr></div><h4><strong>Terrorist Financing Analysis</strong></h4><p><em>Our Terrorist Financing Analysis course now includes a new download! Students of this course get access to our Hamas financing report for free to further their learning and ensure that their knowledge is completely up to date. Be sure to <a href="https://insightthreatintelligence.thinkific.com/bundles/tf-analysis">sign up today</a> for the terrorist financing analysis course to lock in 2024 pricing!</em> </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://insightthreatintelligence.thinkific.com/bundles/tf-analysis" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!dU_K!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8782aff-c9c3-4da5-a41b-acd2326801de.heic 424w, https://substackcdn.com/image/fetch/$s_!dU_K!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8782aff-c9c3-4da5-a41b-acd2326801de.heic 848w, https://substackcdn.com/image/fetch/$s_!dU_K!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8782aff-c9c3-4da5-a41b-acd2326801de.heic 1272w, https://substackcdn.com/image/fetch/$s_!dU_K!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8782aff-c9c3-4da5-a41b-acd2326801de.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!dU_K!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8782aff-c9c3-4da5-a41b-acd2326801de.heic" width="514" height="514" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b8782aff-c9c3-4da5-a41b-acd2326801de.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1080,&quot;width&quot;:1080,&quot;resizeWidth&quot;:514,&quot;bytes&quot;:204417,&quot;alt&quot;:&quot;A graphic promoting the terrorist financing analysis course. It shows a traintrack on a bridge. &quot;,&quot;title&quot;:&quot;&quot;,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:&quot;https://insightthreatintelligence.thinkific.com/bundles/tf-analysis&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="A graphic promoting the terrorist financing analysis course. It shows a traintrack on a bridge. " title="A graphic promoting the terrorist financing analysis course. It shows a traintrack on a bridge. " srcset="https://substackcdn.com/image/fetch/$s_!dU_K!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8782aff-c9c3-4da5-a41b-acd2326801de.heic 424w, https://substackcdn.com/image/fetch/$s_!dU_K!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8782aff-c9c3-4da5-a41b-acd2326801de.heic 848w, https://substackcdn.com/image/fetch/$s_!dU_K!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8782aff-c9c3-4da5-a41b-acd2326801de.heic 1272w, https://substackcdn.com/image/fetch/$s_!dU_K!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8782aff-c9c3-4da5-a41b-acd2326801de.heic 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h2>Using Funds</h2><p>According to the National Audit Office of Finland, the Blue and Black Movement <a href="https://www.vaalirahoitusvalvonta.fi/en/frontpage/politicalpartyfunding/searchpoliticalpartyfundingdisclosures/fundingandcontributions.html">spent &#8364;964,919</a> ($1,037,669) in the 2023 parliamentary election. Since the party has been deregistered as an official political party, their recent spending activities are not the subject of public reporting.</p>
      <p>
          <a href="https://newsletter.insightthreatintel.com/p/ecofascism-in-finland-sinimusta-liike">
              Read more
          </a>
      </p>
   ]]></content:encoded></item></channel></rss>