<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Insight Monitor: Commentary]]></title><description><![CDATA[Opinion pieces and commentary on international security issues. ]]></description><link>https://newsletter.insightthreatintel.com/s/commentary</link><image><url>https://substackcdn.com/image/fetch/$s_!I_1w!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4649d7af-94ce-49ea-8c58-368ec26cd423_900x900.png</url><title>Insight Monitor: Commentary</title><link>https://newsletter.insightthreatintel.com/s/commentary</link></image><generator>Substack</generator><lastBuildDate>Wed, 08 Apr 2026 00:35:47 GMT</lastBuildDate><atom:link href="https://newsletter.insightthreatintel.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Jessica Davis]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[jmd@insightthreatintel.com]]></webMaster><itunes:owner><itunes:email><![CDATA[jmd@insightthreatintel.com]]></itunes:email><itunes:name><![CDATA[Jessica Davis, PhD]]></itunes:name></itunes:owner><itunes:author><![CDATA[Jessica Davis, PhD]]></itunes:author><googleplay:owner><![CDATA[jmd@insightthreatintel.com]]></googleplay:owner><googleplay:email><![CDATA[jmd@insightthreatintel.com]]></googleplay:email><googleplay:author><![CDATA[Jessica Davis, PhD]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[A proposal: a strategic mandate for Canada's financial crimes agency]]></title><description><![CDATA[Published in the Globe and Mail]]></description><link>https://newsletter.insightthreatintel.com/p/a-proposal-a-strategic-mandate-for</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/a-proposal-a-strategic-mandate-for</guid><dc:creator><![CDATA[Jessica Davis, PhD]]></dc:creator><pubDate>Tue, 10 Feb 2026 14:02:51 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!HH5B!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd451c279-820b-46d9-9bf1-5937adf93d4e_1490x1810.heic" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>This op-ed was published <a href="https://www.theglobeandmail.com/opinion/article-canadian-financial-crimes-agency/">two weeks ago in the Globe and Mail</a></em>. </p><p><em>Jessica Davis is the president of Insight Threat Intelligence and the author of </em>Illicit Money: Financing Terrorism in the Twenty-First Century<em>. She was consulted by the government of Canada on the development of a new financial crimes agency.</em></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Insight Monitor is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://www.theglobeandmail.com/opinion/article-canadian-financial-crimes-agency/" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!HH5B!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd451c279-820b-46d9-9bf1-5937adf93d4e_1490x1810.heic 424w, https://substackcdn.com/image/fetch/$s_!HH5B!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd451c279-820b-46d9-9bf1-5937adf93d4e_1490x1810.heic 848w, https://substackcdn.com/image/fetch/$s_!HH5B!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd451c279-820b-46d9-9bf1-5937adf93d4e_1490x1810.heic 1272w, https://substackcdn.com/image/fetch/$s_!HH5B!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd451c279-820b-46d9-9bf1-5937adf93d4e_1490x1810.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!HH5B!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd451c279-820b-46d9-9bf1-5937adf93d4e_1490x1810.heic" width="1456" height="1769" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d451c279-820b-46d9-9bf1-5937adf93d4e_1490x1810.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1769,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:197272,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:&quot;https://www.theglobeandmail.com/opinion/article-canadian-financial-crimes-agency/&quot;,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://newsletter.insightthreatintel.com/i/185877694?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd451c279-820b-46d9-9bf1-5937adf93d4e_1490x1810.heic&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!HH5B!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd451c279-820b-46d9-9bf1-5937adf93d4e_1490x1810.heic 424w, https://substackcdn.com/image/fetch/$s_!HH5B!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd451c279-820b-46d9-9bf1-5937adf93d4e_1490x1810.heic 848w, https://substackcdn.com/image/fetch/$s_!HH5B!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd451c279-820b-46d9-9bf1-5937adf93d4e_1490x1810.heic 1272w, https://substackcdn.com/image/fetch/$s_!HH5B!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd451c279-820b-46d9-9bf1-5937adf93d4e_1490x1810.heic 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>In Budget 2025, the Carney government promised to create a Canadian <a href="https://budget.canada.ca/2025/report-rapport/pdf/budget-2025.pdf">Financial Crimes Agency</a>, introducing legislation by the spring of 2026, to address a growing range of financial threats facing Canadians.</p><p>This is not the first time Canadians have heard this promise: a financial crimes agency was promised in the <a href="https://liberal.ca/our-platform/canada-financial-crimes-agency/">Liberal election platform</a> of 2021 and has been in various stages of policy development since that time. Yet Canadians have heard very little about the promised agency, except for Finance Minister Fran&#231;ois-Philippe Champagne&#8217;s promise in the fall of 2025 that it would <a href="https://www.canada.ca/en/department-finance/news/2025/10/minister-champagne-takes-aim-at-financial-scams-and-abuse-announces-anti-fraud-strategy-and-new-financial-crimes-agency.html">tackle sophisticated financial crimes</a>.</p><p>As Canadians face unprecedented levels of sophisticated fraud, ransomware attacks, and geopolitical uncertainty, it&#8217;s time for the government to set an ambitious and clear mandate to protect Canadians and our financial sector.</p><p>Canada is slowly coming to terms with the fact that its once most-valued partner is increasingly unreliable. This is true in the world of trade as much as it is true in the world of security and intelligence.</p><p>The United States has long been an important law-enforcement partner, conducting joint investigations with Canadian police and often taking the lead on terrorist financing or money-laundering investigations. Today, and for the foreseeable future, Canada must prepare to go it alone on critical issues, as the U.S. has recently proven that it can only be relied upon to serve its own immediate and mercurial interests.</p><p>In this context of geopolitical uncertainty, Canada must protect the financial sector and Canadians against a smorgasbord of threats. Top of mind for most Canadians is fraud: many know someone who has been directly targeted by <a href="https://www.theglobeandmail.com/business/article-ontario-serious-fraud-office-increasingly-sophisticated-scams/">sophisticated fraud</a>. These frauds are often perpetrated from abroad, sometimes by people who themselves are victims of human trafficking networks. Money from these schemes is moved swiftly offshore, and often through cryptocurrency. Another threat, ransomware, targets critical infrastructure and services, holding mission-critical data hostage until a ransom is paid. When payments are made to restore services, those payments embolden and strengthen criminals.</p><p>While fraud and ransomware are well-known threats to Canadians, the threat from those seeking to avoid sanctions is quietly stalking our financial system. Historically, enforcement of Canadian sanctions has been <a href="https://www.theglobeandmail.com/business/commentary/article-canada-civil-enforcement-economic-sanctions-russia-ukraine/">spotty at best</a>. In the cryptocurrency era, sanctions evasion through Canada has been supercharged. According to <a href="https://www.trmlabs.com/reports-and-whitepapers/crypto-regulation-and-illicit-finance-in-canada">one report</a>, the Canadian cryptocurrency sector ranks in the top 10 worldwide in terms of exposure to sanctioned entities. This places Canada on the same list as countries such as <a href="https://www.trmlabs.com/reports-and-whitepapers/2024-crypto-adoption-and-illicit-exposure-report">North Korea, Russia, and Iran</a>. Canada needs to take immediate action, or we risk becoming a haven for sanctions evasion.</p><p>Finally, Canada also needs to address the growing issue of professional money laundering networks. These networks of professionals (accountants, lawyers, and business owners) exist to launder the proceeds of a variety of crimes, including drug trafficking and fentanyl production. These professionals create separation between the main crime and the ultimate beneficiary of the money, making it harder to hold criminals accountable. Addressing this issue requires specialized, skilled, and dedicated financial crime professionals.</p><p>The financial sector is a bright beacon in Canada&#8217;s economy. Canada must get smart, innovative, and efficient at combating financial crimes targeting and exploiting the sector.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/p/a-proposal-a-strategic-mandate-for?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/p/a-proposal-a-strategic-mandate-for?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p></p><p>The future Canadian Financial Crimes Agency will face tremendous challenges from the threat environment and from structural issues in this country. In addition to the threats outlined above, the agency will have to spend considerable resources to avoid conflict with other departments, the RCMP, and other police forces. It will also need to engage in horizontal co-ordination across the 13 federal departments and agencies responsible for Canada&#8217;s anti-money laundering regime, as well as with provinces and territories.</p><p>While avoiding conflict and ensuring co-ordination will be important, the future agency will also need serious teeth. It will need considerable powers to collect intelligence and evidence, analyze that information, investigate crimes, and, ideally, to compel, prohibit, sanction, and disclose information as required. The agency will also require a clear reporting and review structure, with actionable objectives and performance metrics.</p><p>A new agency will be expensive, but it will also be a tremendous opportunity for Canada to develop its considerable existing financial investigative capabilities into a world-class agency to fight serious and transnational financial crimes and protect our important financial sector and Canadians.</p><p>A future Financial Crimes Agency needs a focused mandate to address the most pressing threats and robust authorities to carry out this mission.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/p/a-proposal-a-strategic-mandate-for?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/p/a-proposal-a-strategic-mandate-for?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Insight Monitor is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p><em>&#169; 2026 Insight Threat Intelligence Ltd. All Rights Reserved.<br><br>This newsletter and its contents are protected by Canadian copyright law. Except as otherwise provided for under Canadian copyright law, this newsletter and its contents may not be copied, published, distributed, downloaded or otherwise stored in a retrieval system, transmitted or converted, in any form or by any means, electronic or otherwise, without the prior written permission of the copyright owner.</em></p>]]></content:encoded></item><item><title><![CDATA[FINTRAC is Doing the Most: Annual Report 2024-2025]]></title><description><![CDATA[And everyone else is going to have to step up soon (especially the RCMP)]]></description><link>https://newsletter.insightthreatintel.com/p/fintrac-is-doing-the-most-annual</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/fintrac-is-doing-the-most-annual</guid><dc:creator><![CDATA[Jessica Davis, PhD]]></dc:creator><pubDate>Fri, 31 Oct 2025 13:02:47 GMT</pubDate><enclosure url="https://images.unsplash.com/photo-1744473755637-e09f0c2fab41?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxfHxjcnlwdG9jdXJyZW5jeSUyMGV4Y2hhbmdlfGVufDB8fHx8MTc2MTg1NjQ3Mnww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Each year, FINTRAC&#8217;s annual report provides one of the only publicly available windows into Canada&#8217;s illicit finance landscape. They report on a wide variety of important metrics, including how many disclosures they share with partners, the kinds and number of reports they&#8217;ve received, and the number of disclosures provided to law enforcement for criminal non-compliance with Canada&#8217;s anti-money laundering and counter-terrorist financing regime. I&#8217;ve been conducting independent analyses of these reports since 2022, and I maintain a unique dataset that compiles most FINTRAC-reported metrics back to the Centre&#8217;s inception. This enables me to evaluate not only year-over-year changes but also long-term trends in Canada&#8217;s counter-illicit finance system. As always, I&#8217;ll share charts and visualizations of this year&#8217;s data further below.</p><p>This year&#8217;s report has me asking some serious questions: Canada&#8217;s anti-money laundering, counter-terrorist financing, and sanctions-evasion framework gives FINTRAC extraordinary visibility into the financial lives of ordinary Canadians. This is an intrusion into privacy that is justified only if it delivers meaningful security outcomes. Collecting vast amounts of personal financial data may be proportionate to the threats we face, but proportionality depends on the system&#8217;s effectiveness, not just its intent. FINTRAC cannot achieve impact on its own; the rest of the regime must convert intelligence into action, enforcement, and results. With the promised Canadian Financial Crimes Agency still on the horizon, we should be asking: is our current AML/CTF and sanctions regime truly effective enough to warrant the level of privacy intrusion it demands?</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://images.unsplash.com/photo-1744473755637-e09f0c2fab41?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxfHxjcnlwdG9jdXJyZW5jeSUyMGV4Y2hhbmdlfGVufDB8fHx8MTc2MTg1NjQ3Mnww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://images.unsplash.com/photo-1744473755637-e09f0c2fab41?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxfHxjcnlwdG9jdXJyZW5jeSUyMGV4Y2hhbmdlfGVufDB8fHx8MTc2MTg1NjQ3Mnww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1744473755637-e09f0c2fab41?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxfHxjcnlwdG9jdXJyZW5jeSUyMGV4Y2hhbmdlfGVufDB8fHx8MTc2MTg1NjQ3Mnww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1744473755637-e09f0c2fab41?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxfHxjcnlwdG9jdXJyZW5jeSUyMGV4Y2hhbmdlfGVufDB8fHx8MTc2MTg1NjQ3Mnww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1744473755637-e09f0c2fab41?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxfHxjcnlwdG9jdXJyZW5jeSUyMGV4Y2hhbmdlfGVufDB8fHx8MTc2MTg1NjQ3Mnww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1456w" sizes="100vw"><img src="https://images.unsplash.com/photo-1744473755637-e09f0c2fab41?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxfHxjcnlwdG9jdXJyZW5jeSUyMGV4Y2hhbmdlfGVufDB8fHx8MTc2MTg1NjQ3Mnww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" width="344" height="229.448" data-attrs="{&quot;src&quot;:&quot;https://images.unsplash.com/photo-1744473755637-e09f0c2fab41?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxfHxjcnlwdG9jdXJyZW5jeSUyMGV4Y2hhbmdlfGVufDB8fHx8MTc2MTg1NjQ3Mnww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:2001,&quot;width&quot;:3000,&quot;resizeWidth&quot;:344,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Cryptocurrency coins sit on a keyboard.&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Cryptocurrency coins sit on a keyboard." title="Cryptocurrency coins sit on a keyboard." srcset="https://images.unsplash.com/photo-1744473755637-e09f0c2fab41?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxfHxjcnlwdG9jdXJyZW5jeSUyMGV4Y2hhbmdlfGVufDB8fHx8MTc2MTg1NjQ3Mnww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1744473755637-e09f0c2fab41?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxfHxjcnlwdG9jdXJyZW5jeSUyMGV4Y2hhbmdlfGVufDB8fHx8MTc2MTg1NjQ3Mnww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1744473755637-e09f0c2fab41?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxfHxjcnlwdG9jdXJyZW5jeSUyMGV4Y2hhbmdlfGVufDB8fHx8MTc2MTg1NjQ3Mnww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1744473755637-e09f0c2fab41?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxfHxjcnlwdG9jdXJyZW5jeSUyMGV4Y2hhbmdlfGVufDB8fHx8MTc2MTg1NjQ3Mnww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/@jakubzerdzicki">Jakub &#379;erdzicki</a> on <a href="https://unsplash.com">Unsplash</a></figcaption></figure></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!7ICO!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fce946f85-2ad9-4d65-bfc6-df8f4f5a4c98_851x544.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!7ICO!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fce946f85-2ad9-4d65-bfc6-df8f4f5a4c98_851x544.png 424w, https://substackcdn.com/image/fetch/$s_!7ICO!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fce946f85-2ad9-4d65-bfc6-df8f4f5a4c98_851x544.png 848w, https://substackcdn.com/image/fetch/$s_!7ICO!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fce946f85-2ad9-4d65-bfc6-df8f4f5a4c98_851x544.png 1272w, https://substackcdn.com/image/fetch/$s_!7ICO!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fce946f85-2ad9-4d65-bfc6-df8f4f5a4c98_851x544.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!7ICO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fce946f85-2ad9-4d65-bfc6-df8f4f5a4c98_851x544.png" width="851" height="544" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ce946f85-2ad9-4d65-bfc6-df8f4f5a4c98_851x544.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:544,&quot;width&quot;:851,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:43358,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://newsletter.insightthreatintel.com/i/177597753?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fce946f85-2ad9-4d65-bfc6-df8f4f5a4c98_851x544.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!7ICO!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fce946f85-2ad9-4d65-bfc6-df8f4f5a4c98_851x544.png 424w, https://substackcdn.com/image/fetch/$s_!7ICO!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fce946f85-2ad9-4d65-bfc6-df8f4f5a4c98_851x544.png 848w, https://substackcdn.com/image/fetch/$s_!7ICO!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fce946f85-2ad9-4d65-bfc6-df8f4f5a4c98_851x544.png 1272w, https://substackcdn.com/image/fetch/$s_!7ICO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fce946f85-2ad9-4d65-bfc6-df8f4f5a4c98_851x544.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Source: Author&#8217;s data compiled from FINTRAC annual reports 2002-2025</figcaption></figure></div><p>If there&#8217;s one chart I would use to illustrate FINTRAC&#8217;s activities over the years, it&#8217;s the one above. It outlines all the reports that the Centre has received from reporting entities. However: I&#8217;d prefer to contextualize this with the action (or inaction) taken by others in the regime to combat terrorist financing, money laundering, and sanctions evasion. Maybe I&#8217;ll do that in the future. But for now, here&#8217;s what FINTRAC had to say. This year, there were a few notable shifts &#8212; some encouraging, others concerning.</p><p>Get caught up on our previous analysis here: </p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;7ea1d3be-76b7-45ea-8a3b-733392ace693&quot;,&quot;caption&quot;:&quot;FINTRAC&#8217;s annual report was released on 1 December 2022, and there are some nice little tidbits in there about the state of financial intelligence in Canada, and the operation of the Centre. Today&#8217;s Insight Intelligence is a short summary of some of the bits I found most interesting (with my usual focus on terrorist financing / threat financing).&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Analyzing FINTRAC's annual report: Safe Canadians, Secure Economy&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:33479672,&quot;name&quot;:&quot;Jessica Davis, PhD&quot;,&quot;bio&quot;:&quot;Jessica Davis is President of Insight Threat Intelligence and is the author of Women in Modern Terrorism: From Liberations Wars to Global Terrorism and the Islamic State (2017), and Illicit Money: Financing Terrorism in the 21st Century (2021).&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e312ae7c-114b-4e4f-9ce1-8bf50ddb7a27_2344x2049.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2022-12-06T14:01:10.988Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!-4tr!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F74b122c8-adb4-45dc-83a5-821f292ed11c_936x610.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/analyzing-fintracs-annual-report&quot;,&quot;section_name&quot;:&quot;Commentary&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:88261454,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:2,&quot;comment_count&quot;:0,&quot;publication_id&quot;:329102,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!I_1w!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4649d7af-94ce-49ea-8c58-368ec26cd423_900x900.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;1854b251-8798-4169-b474-8b15e8665d14&quot;,&quot;caption&quot;:&quot;Recently, I read through every FINTRAC report looking for some clues as to the effectiveness of Canada&#8217;s counter-terrorist financing regime. While the jury is still out on that question (which also happens to be the subject of my dissertation), the exercise allowed me to pull out some interesting data and points for comparison with this year&#8217;s report. T&#8230;&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Safe Canadians, Secure Economy: FINTRAC&#8217;s 2020-2021 Annual Report&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:33479672,&quot;name&quot;:&quot;Jessica Davis, PhD&quot;,&quot;bio&quot;:&quot;Jessica Davis is President of Insight Threat Intelligence and is the author of Women in Modern Terrorism: From Liberations Wars to Global Terrorism and the Islamic State (2017), and Illicit Money: Financing Terrorism in the 21st Century (2021).&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e312ae7c-114b-4e4f-9ce1-8bf50ddb7a27_2344x2049.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2022-03-08T14:00:52.337Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!fHmH!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F6a6924b0-1eb4-4962-80a6-6f3fa015eb43_1244x870.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/safe-canadians-secure-economy-fintracs&quot;,&quot;section_name&quot;:&quot;Primers&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:49885818,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:3,&quot;comment_count&quot;:0,&quot;publication_id&quot;:329102,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!I_1w!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4649d7af-94ce-49ea-8c58-368ec26cd423_900x900.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;cbcf1232-2ee4-4161-bedd-9b1e4e50b24a&quot;,&quot;caption&quot;:&quot;It&#8217;s the most wonderful time of the year! FINTRAC&#8217;s annual report dropped last week. Okay, I&#8217;ll admit that I&#8217;m probably the only one that excited about this report. But for those of you who don&#8217;t know, this report is one of the most transparent descriptions of the activities of a department or agency in the Canadian security and intelligence service. And while I&#8217;m often annoyed about our lack of measurements in the anti-money laundering and counter-terrorist financing world, this report at least gives us ~some~ insight. Read to find out how Canada is doing in its fight against money laundering, terrorist financing, and other financial crimes!&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Is Canada giving up on tackling terrorist financing? &quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:33479672,&quot;name&quot;:&quot;Jessica Davis, PhD&quot;,&quot;bio&quot;:&quot;Jessica Davis is President of Insight Threat Intelligence and is the author of Women in Modern Terrorism: From Liberations Wars to Global Terrorism and the Islamic State (2017), and Illicit Money: Financing Terrorism in the 21st Century (2021).&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e312ae7c-114b-4e4f-9ce1-8bf50ddb7a27_2344x2049.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2023-12-07T14:01:27.892Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!VnAd!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F075f5c74-65d7-4d44-ae39-60c731086a4a_733x431.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/is-canada-giving-up-on-tackling-terrorist&quot;,&quot;section_name&quot;:&quot;Commentary&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:139466621,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:4,&quot;comment_count&quot;:0,&quot;publication_id&quot;:329102,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!I_1w!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4649d7af-94ce-49ea-8c58-368ec26cd423_900x900.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;b12bf81d-0b6c-4528-8ea9-aceb83b989f5&quot;,&quot;caption&quot;:&quot;Hello Insight Monitor subscribers! It&#8217;s the most wonderful time of the year again: FINTRAC annual report season! The Center&#8217;s annual report gives us unique insights into the operations of Canada&#8217;s financial intelligence unit. This year, there are a number of highlights, such as FINTRAC&#8217;s first disclosure to Global Affairs Canada, new data on disclosures&#8230;&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Canada&#8217;s $44 Billion Dirty Money Crisis&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:33479672,&quot;name&quot;:&quot;Jessica Davis, PhD&quot;,&quot;bio&quot;:&quot;Jessica Davis is President of Insight Threat Intelligence and is the author of Women in Modern Terrorism: From Liberations Wars to Global Terrorism and the Islamic State (2017), and Illicit Money: Financing Terrorism in the 21st Century (2021).&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e312ae7c-114b-4e4f-9ce1-8bf50ddb7a27_2344x2049.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2024-11-28T14:00:50.330Z&quot;,&quot;cover_image&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d21454ed-c11b-4d72-92c9-66b676520849_1792x1024.webp&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/canadas-44-billion-dirty-money-industry&quot;,&quot;section_name&quot;:&quot;Primers&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:152242396,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:8,&quot;comment_count&quot;:0,&quot;publication_id&quot;:329102,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!I_1w!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4649d7af-94ce-49ea-8c58-368ec26cd423_900x900.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Insight Monitor is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>
      <p>
          <a href="https://newsletter.insightthreatintel.com/p/fintrac-is-doing-the-most-annual">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[ISIL in Sri Lanka?]]></title><description><![CDATA[As we reported earlier this year, the Islamic State claimed responsibility for the 2019 Easter Sunday bombings in Sri Lanka.]]></description><link>https://newsletter.insightthreatintel.com/p/isil-in-sri-lanka</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/isil-in-sri-lanka</guid><dc:creator><![CDATA[Elena Martynova]]></dc:creator><pubDate>Tue, 28 Oct 2025 13:02:33 GMT</pubDate><enclosure url="https://images.unsplash.com/photo-1569669568849-39a2939a4b65?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwyNXx8c3JpJTIwbGFua2F8ZW58MHx8fHwxNzYwNjMzOTIzfDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em><a href="https://newsletter.insightthreatintel.com/p/investigating-the-2019-sri-lanka">As we reported earlier this year</a>, the Islamic State claimed responsibility for the 2019 Easter Sunday bombings in Sri Lanka. Despite multiple government and independent investigations, the extent of the Islamic State&#8217;s direct support and broader presence in the country remains unclear. </em></p><p><em>So, what does the terrorist financing landscape in Sri Lanka look like, and does ISIL actually operate there? Keep reading to find out.</em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/subscribe?"><span>Subscribe now</span></a></p><h4><strong>Terrorism Financing Context</strong></h4><p>Sri Lanka&#8217;s counterterrorism efforts have historically focused on the Liberation Tigers of Tamil Eelam (LTTE), a separatist group active in the civil war until 2009. The LTTE maintained <a href="https://www.rienner.com/title/Illicit_Money_Financing_Terrorism_in_the_Twenty_First_Century">extensive global financing networks</a> through foreign support, wealthy donors, the Tamil diaspora, and charitable organizations while diverting funds to insurgent activities.  Its fundraising operations extended to <a href="https://www.rienner.com/title/Illicit_Money_Financing_Terrorism_in_the_Twenty_First_Century">more than fifty countries</a>, at times raising millions per month.  </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://images.unsplash.com/photo-1569669568849-39a2939a4b65?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwyNXx8c3JpJTIwbGFua2F8ZW58MHx8fHwxNzYwNjMzOTIzfDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://images.unsplash.com/photo-1569669568849-39a2939a4b65?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwyNXx8c3JpJTIwbGFua2F8ZW58MHx8fHwxNzYwNjMzOTIzfDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1569669568849-39a2939a4b65?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwyNXx8c3JpJTIwbGFua2F8ZW58MHx8fHwxNzYwNjMzOTIzfDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1569669568849-39a2939a4b65?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwyNXx8c3JpJTIwbGFua2F8ZW58MHx8fHwxNzYwNjMzOTIzfDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1569669568849-39a2939a4b65?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwyNXx8c3JpJTIwbGFua2F8ZW58MHx8fHwxNzYwNjMzOTIzfDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1456w" sizes="100vw"><img src="https://images.unsplash.com/photo-1569669568849-39a2939a4b65?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwyNXx8c3JpJTIwbGFua2F8ZW58MHx8fHwxNzYwNjMzOTIzfDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" width="352" height="527.9503806033267" data-attrs="{&quot;src&quot;:&quot;https://images.unsplash.com/photo-1569669568849-39a2939a4b65?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwyNXx8c3JpJTIwbGFua2F8ZW58MHx8fHwxNzYwNjMzOTIzfDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:5320,&quot;width&quot;:3547,&quot;resizeWidth&quot;:352,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;photography of people near street during daytime&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="photography of people near street during daytime" title="photography of people near street during daytime" srcset="https://images.unsplash.com/photo-1569669568849-39a2939a4b65?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwyNXx8c3JpJTIwbGFua2F8ZW58MHx8fHwxNzYwNjMzOTIzfDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1569669568849-39a2939a4b65?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwyNXx8c3JpJTIwbGFua2F8ZW58MHx8fHwxNzYwNjMzOTIzfDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1569669568849-39a2939a4b65?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwyNXx8c3JpJTIwbGFua2F8ZW58MHx8fHwxNzYwNjMzOTIzfDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1569669568849-39a2939a4b65?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwyNXx8c3JpJTIwbGFua2F8ZW58MHx8fHwxNzYwNjMzOTIzfDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/@alexazabache">Alex Azabache</a> on <a href="https://unsplash.com">Unsplash</a></figcaption></figure></div><p>Since the <a href="https://ndupress.ndu.edu/Portals/68/Documents/jfq/jfq-59/jfq-59_40-44_Smith.pdf?ver=8NrZ-_3wIjxkUc7YJqVKIA%3D%3D#:~:text=Sri%20Lanka's%20government%20defeated%20the%20ethnic%20separatist,as%20the%20Tamil%20Tigers%2C%20in%20May%202009">LTTE&#8217;s defeat in 2009</a>,  publicly documented cases of terrorism financing in Sri Lanka are limited, with most reporting <a href="https://www.dailymirror.lk/breaking-news/CBSL-Chief-urges-banks-to-tighten-controls-as-SL-prepares-for-critical-AMLCFT-review/108-303258">emphasizing regulatory and legal frameworks</a> rather than operational financial networks.  On June 3, 2024, however, the Sri Lankan government announced the freezing of all funds, financial assets, and economic resources belonging to <a href="https://www.satp.org/terrorism-assessment/srilanka">15 groups and 210 individuals</a> allegedly involved in terrorist activities (many of which were from Tamil groups). </p>
      <p>
          <a href="https://newsletter.insightthreatintel.com/p/isil-in-sri-lanka">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Vibes-Based Audits: What NSIRA Found Inside the CRA’s Charity Audits Division]]></title><description><![CDATA[Hello, Insight Monitor subscribers, and welcome to another week of news and analysis on all things related to illicit finance and international security.]]></description><link>https://newsletter.insightthreatintel.com/p/vibes-based-audits-what-nsira-found</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/vibes-based-audits-what-nsira-found</guid><dc:creator><![CDATA[Jessica Davis, PhD]]></dc:creator><pubDate>Tue, 07 Oct 2025 13:02:48 GMT</pubDate><enclosure url="https://images.unsplash.com/photo-1593115057322-e94b77572f20?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzfHxsYXd8ZW58MHx8fHwxNzU5NzgxMzQxfDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Hello, <strong>Insight Monitor </strong>subscribers, and welcome to another week of news and analysis on all things related to illicit finance and international security. This week, we&#8217;re looking at Canada&#8217;s National Security Intelligence Review Agency&#8217;s (one of several security and intelligence review and oversight functions) analysis of how Canada regulates and ultimately deregisters charities. This is part of our counterterrorist financing system intended to prevent the abuse of charities by terrorist groups, entities, and individuals. Needless to say, NSIRA found a few&#8230;.issues&#8230;in how this system operates. Have a read to learn more! And if you&#8217;re not Canadian, this is still very much worth a read, because NSIRA goes into pretty good detail on how to assess risk in the sector. Something for all of us to learn from. </em></p><p>Last week, the National Security Intelligence Review Agency (NSIRA), released its review of the Canada Revenue Agency&#8217;s (CRA) <a href="https://nsira-ossnr.gc.ca/en/reviews/find-a-review/23-08/">Review and Analysis Division</a>. The purpose of the review was to try and determine whether the division treats registered Canadian charities fairly and without discrimination on the basis of religion.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/p/vibes-based-audits-what-nsira-found?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/p/vibes-based-audits-what-nsira-found?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://images.unsplash.com/photo-1593115057322-e94b77572f20?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzfHxsYXd8ZW58MHx8fHwxNzU5NzgxMzQxfDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://images.unsplash.com/photo-1593115057322-e94b77572f20?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzfHxsYXd8ZW58MHx8fHwxNzU5NzgxMzQxfDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1593115057322-e94b77572f20?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzfHxsYXd8ZW58MHx8fHwxNzU5NzgxMzQxfDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1593115057322-e94b77572f20?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzfHxsYXd8ZW58MHx8fHwxNzU5NzgxMzQxfDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1593115057322-e94b77572f20?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzfHxsYXd8ZW58MHx8fHwxNzU5NzgxMzQxfDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1456w" sizes="100vw"><img src="https://images.unsplash.com/photo-1593115057322-e94b77572f20?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzfHxsYXd8ZW58MHx8fHwxNzU5NzgxMzQxfDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" width="355" height="236.6438223938224" data-attrs="{&quot;src&quot;:&quot;https://images.unsplash.com/photo-1593115057322-e94b77572f20?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzfHxsYXd8ZW58MHx8fHwxNzU5NzgxMzQxfDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:3453,&quot;width&quot;:5180,&quot;resizeWidth&quot;:355,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;brown wooden tool on white surface&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="brown wooden tool on white surface" title="brown wooden tool on white surface" srcset="https://images.unsplash.com/photo-1593115057322-e94b77572f20?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzfHxsYXd8ZW58MHx8fHwxNzU5NzgxMzQxfDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1593115057322-e94b77572f20?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzfHxsYXd8ZW58MHx8fHwxNzU5NzgxMzQxfDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1593115057322-e94b77572f20?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzfHxsYXd8ZW58MHx8fHwxNzU5NzgxMzQxfDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1593115057322-e94b77572f20?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzfHxsYXd8ZW58MHx8fHwxNzU5NzgxMzQxfDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/@tingeyinjurylawfirm">Tingey Injury Law Firm</a> on <a href="https://unsplash.com">Unsplash</a></figcaption></figure></div><p>This review was sparked, <a href="https://www.cbc.ca/news/politics/cra-nsira-muslim-charities-1.6778878">at least in part</a>, by the report &#8220;Under Layered Suspicion: A Review of CRA Audits of Muslim-Led Charities&#8221;.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a> The report looked at a selection of case studies and concluded that the <em>possibility </em>of bias in CRA &#8220;informs the structure, design, and/or bureaucratic application&#8221; of government policies, including the anti-terrorism financing regime. This report was widely cited as demonstrating bias in CRA&#8217;s approach to charities. That report, however, never actually went that far, nor would its methodology support findings like that. <em>(Nerd out with me here for a minute: for a study to find bias based on religion, a broader sample of audits of charities would have to be analyzed across a diverse set of charitable causes, and then intervening variables such as quality of governance and management structure controlled for in order to identify bias in an outcome like deregistration.)</em></p><p> Enter NSIRA.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Insight Monitor is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>NSIRA also didn&#8217;t find that CRA&#8217;s Review and Analysis Division (RAD) had breached its non-discrimination obligations under Canadian Law. But there&#8217;s a very troubling reason why not, and I&#8217;m going to spend some time unpacking that.</p><h3><strong>What is RAD?</strong></h3><p>CRA&#8217;s Review and Analysis Division was established in the post 9/11 counter terrorism framework as part of Canada&#8217;s obligations under the Financial Action Task Force&#8217;s (FATF) Recommendation 8. This recommendation requires that all countries protect non-profit organizations from terrorist financing abuse through a risk-based approach that targets only those most vulnerable to misuse. Basically, charities and non-profit organizations were identified as a significant source of terrorist financing after the terrorist attacks of September 11, 2001, and this was the global response to that. To learn more about how terrorists exploit charities and the broader charitable sector: </p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;9711d08e-5220-4b90-a2bd-d4fef41a0b15&quot;,&quot;caption&quot;:&quot;In May 2021, the International Civil Liberties Monitoring Group released a report on The CRA&#8217;s Prejudiced Audits. The report outlines how Canada&#8217;s supervision and monitoring of charities in Canada evolved after the terrorist attacks of September 11, 2001, and how that work has been carried out largely in secret. While&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Terrorist Financing through Charities&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:33479672,&quot;name&quot;:&quot;Jessica Davis, PhD&quot;,&quot;bio&quot;:&quot;Jessica Davis is President of Insight Threat Intelligence and is the author of Women in Modern Terrorism: From Liberations Wars to Global Terrorism and the Islamic State (2017), and Illicit Money: Financing Terrorism in the 21st Century (2021).&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e312ae7c-114b-4e4f-9ce1-8bf50ddb7a27_2344x2049.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2021-06-21T13:00:58.066Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!dTFk!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F89bf8803-d6af-4e59-b4ed-faee33acdb97_1097x584.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/terrorist-financing-through-charities&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:37594437,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:11,&quot;comment_count&quot;:0,&quot;publication_id&quot;:329102,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!I_1w!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4649d7af-94ce-49ea-8c58-368ec26cd423_900x900.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>RAD is responsible for conducting audits of charities to identify potential terrorist financing abuse (although the Charities Directorate, writ large, can also audit for broader issues). NSIRA&#8217;s review focused on the trigger for these audits, or essentially, what led RAD to conduct an audit of the charitable organization. </p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;11ac33d4-01f6-4147-8a4d-0521e1904601&quot;,&quot;caption&quot;:&quot;The Canada Revenue Agency has stripped the Ottawa Islamic Centre and Assalam Mosque of its charitable status for &#8220;activities that promote hate and intolerance&#8221; after audits raised concerns about some of the speakers the centre had invited.&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Ottawa mosque's charitable status revoked for \&quot;activities that promote hate and intolerance\&quot;&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:33479672,&quot;name&quot;:&quot;Jessica Davis, PhD&quot;,&quot;bio&quot;:&quot;Jessica Davis is President of Insight Threat Intelligence and is the author of Women in Modern Terrorism: From Liberations Wars to Global Terrorism and the Islamic State (2017), and Illicit Money: Financing Terrorism in the 21st Century (2021).&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e312ae7c-114b-4e4f-9ce1-8bf50ddb7a27_2344x2049.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2018-08-10T14:58:00.000Z&quot;,&quot;cover_image&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/460e89dd-4bfd-4b9f-8d27-d11ab5580fcf_1746x1240.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/ottawa-mosques-charitable-status&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:37546565,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:0,&quot;comment_count&quot;:0,&quot;publication_id&quot;:329102,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!I_1w!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4649d7af-94ce-49ea-8c58-368ec26cd423_900x900.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>These triggers include things like derogatory media, intelligence from security and intelligence partners, public tips, or referrals from other areas of the CRA. In cases of serious non-compliance, CRA can order the revocation of the charitable status of the organization. (Note: this does not mean that the organization has to stop functioning, and there are no criminal penalties associated with this. In fact, some charities that have had their status revoked have continued to operate as non-profit entities in Canada, enjoying tax-free status. Have a read of the case below to find out what happens when a charity loses its tax-free status. It&#8217;s not particularly good news.)</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;8c1b05b9-c5d8-4eaf-bdbd-65c5319a2af9&quot;,&quot;caption&quot;:&quot;Hello Insight Monitor subscribers, and welcome to another week of financial intelligence, threat financing, and international security news and analysis. Late last year, UK Counterterrorism police arrested six people on terrorism charges relating to the PKK. This week, we&#8217;re looking at a Canadian charitable organization that had its charitable status revoked for financing the PKK, and yet continues to operate in Canada. We&#8217;ll explore how this happened, what the organization is accused of, and what needs to be done in Canada to make our financial system more resilient against terrorist financing. Have a read, and share it with a friend!&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Charity or Cover? The case of a PKK-affiliated non-profit in Canada&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:33479672,&quot;name&quot;:&quot;Jessica Davis, PhD&quot;,&quot;bio&quot;:&quot;Jessica Davis is President of Insight Threat Intelligence and is the author of Women in Modern Terrorism: From Liberations Wars to Global Terrorism and the Islamic State (2017), and Illicit Money: Financing Terrorism in the 21st Century (2021).&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e312ae7c-114b-4e4f-9ce1-8bf50ddb7a27_2344x2049.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2025-01-30T14:03:26.089Z&quot;,&quot;cover_image&quot;:&quot;https://images.unsplash.com/photo-1639551937445-56c1fe6c4cef?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwyfHxkb2h1a3xlbnwwfHx8fDE3MzYxNzc1NTd8MA&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/charity-or-cover-the-case-of-a-pkk&quot;,&quot;section_name&quot;:&quot;Group Profiles &quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:152147376,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:9,&quot;comment_count&quot;:0,&quot;publication_id&quot;:329102,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!I_1w!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4649d7af-94ce-49ea-8c58-368ec26cd423_900x900.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><h3><strong>The Findings</strong></h3><p>The report is well worth reading, particularly in the context of Canada&#8217;s upcoming FATF mutual evaluation (starting later this year, and expected to conclude, with results published, in 2026). This report will certainly be on the FATF assessor&#8217;s reading list. Let me highlight some of the findings from the report and explain why I think these are so important.</p><h3><strong>RAD&#8217;s indicators of terrorist abuse</strong></h3><p>NSIRA found that RAD does not have an evidence-based method for validating risk indicators that it relies on to justify scrutinizing a charity for terrorism-related concerns. They have a list of indicators, but they don&#8217;t record which indicators are triggered that lead to an audit. This is what the youth today might call vibes analysis.</p><p>While this is quite bad from a transparency and accountability perspective, let&#8217;s take a quick look at the positive outcome of this. In their response to the review, CRA said: </p><div class="pullquote"><p>&#8220;Effective for the 2025-26 fiscal year, the CRA will implement a formal tracking mechanism to oversee audit referrals and refine processes for documenting audit selection criteria and decisions. This will enable the CRA to formally document annual audit planning decisions, and identify which registered charities will be audited during a fiscal period based on established priorities and available resources.&#8221;</p></div><p>This is extremely good news, and highlights the best outcome of NSIRA&#8217;s reviews: a strengthening of internal processes, and ultimately, a strengthening of rule of law in Canada. At a time when we see this deteriorating around the world, and particularly in our southern neighbours, I think we should take a moment to enjoy this. </p><p>CRA relies on risk indicators as part of its process for selecting charities for audits. These indicators reflect &#8220;internationally recognized indicators&#8221; as developed by the FATF. <em>(Sidebar: Anyone involved in risk indicator development knows how slippery this process is. I wouldn&#8217;t describe it as evidence-based, or methdologically sound. Probably something we should all work on, right?)</em> </p><p>NSIRA found that the CRA&#8217;s indicators are also not formally assessed for effectiveness, and they recommended that RAD develop an evidence-based method for validating indicators. This is a great suggestion for countries all around the world who are using similar methods to assess risks of charitable abuse. But here&#8217;s the bottom line of NSIRA&#8217;s review: they aren&#8217;t recording their use of indicators, and those indicators themselves aren&#8217;t validated or based on real evidence. <strong>More vibes</strong>.</p><p>Here&#8217;s the real kicker though. The lack of rigour in RAD&#8217;s processes introduced the <em><strong>risk</strong></em> of bias and discrimination. NSIRA could not go further, however, because of how poor RAD&#8217;s internal governance is/was (it&#8217;s important to note here that steps have already been taken to start fixing this). There was &#8220;no consistency in the documentation for capturing and assessing risks&#8221;, and the lack of standardization means that the selection of charities for audit is &#8220;highly subjective and could be susceptible to bias.&#8221; Basically: the work was so poorly documented and standards were so uneven (when they existed at all) that NSIRA couldn&#8217;t even test for bias in their review.</p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://insightthreatintelligence.thinkific.com/bundles/tf-analysis" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!f7rH!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 424w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 848w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 1272w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!f7rH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png" width="1066" height="507" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:507,&quot;width&quot;:1066,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:698946,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://insightthreatintelligence.thinkific.com/bundles/tf-analysis&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!f7rH!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 424w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 848w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 1272w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>Our terrorist financing analysis course caters to researchers, intelligence, law enforcement, and compliance professionals to help them learn about terrorist financing, and analyze suspicious patterns and activities more effectively. Sign up today!</em></p><div><hr></div><h4><strong>Going forward</strong></h4><p>I want to take a second to highlight that responses to this review haven&#8217;t been entirely fact-based. For instance, the <a href="https://x.com/ICLMG/status/1974169516868562985">International Civil Liberties Monitoring Group</a> stated that NSIRA &#8220;confirmed&#8221; their findings that audits of Muslim charities are &#8220;flawed, biased &amp; discriminatory&#8221;. Having read this review, NSIRA has definitely found the audits to be flawed. But biased and discriminatory? Nope. (This whole topic has big &#8220;vibes-over-evidence&#8221; energy.)</p><p>You can read CRA&#8217;s response to the NSIRA <a href="https://www.canada.ca/en/revenue-agency/corporate/about-canada-revenue-agency-cra/transparency-proactive-disclosure-canada-revenue-agency/responses-reviews-reports/response-nsira-report.html">review here</a>. My sincere hope is that even more steps are taken to tighten up how the CRA conducts audits of charities for terrorist abuse, and that the CRA really takes a close look at its indicators in the current geopolitical context of terrorism, state-sponsored terrorism, and extremism. Because terrorists find charities (and charitable causes) useful for financing and facilitation activities, it is unlikely to stop anytime soon.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-2" href="#footnote-2" target="_self">2</a></p><p>To use these types of indicators, it&#8217;ll be important for them to remain contextually relevant. For instance, I would argue that if RAD wants to continue using the indicator &#8220;conducting activities in or close to a foreign high-risk jurisdiction&#8221;, they&#8217;re going to have to include the United States as one of those high-risk jurisdictions. I&#8217;m not being facetious. A handful of terrorist entities on our terrorist list (Three Percenters, James Mason, Proud Boys, and the Base) originate in the United States. If we&#8217;re going to call Syria a high-risk jurisdiction because it&#8217;s been home to several terrorist groups, then we have to do the same for the United States.</p><p>Oh, also, someone should do something about the non-profit organizations. They are almost entirely unregulated and unaudited, and they are just as likely to be abused for terrorist financing purposes as registered charities. Vibes-based legislation and regulation.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/p/vibes-based-audits-what-nsira-found?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/p/vibes-based-audits-what-nsira-found?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p><em>Did you find this post insightful? Share it with a colleague, and help us grow our community of people who care about illicit finance! </em></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Insight Monitor is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><p><em>&#169; 2025 Insight Threat Intelligence Ltd. All Rights Reserved.<br><br>This newsletter and its contents are protected by Canadian copyright law. Except as otherwise provided for under Canadian copyright law, this newsletter and its contents may not be copied, published, distributed, downloaded or otherwise stored in a retrieval system, transmitted or converted, in any form or by any means, electronic or otherwise, without the prior written permission of the copyright owner.</em></p><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-1" href="#footnote-anchor-1" class="footnote-number" contenteditable="false" target="_self">1</a><div class="footnote-content"><p>Anver M. Emon and Nadia Z. Nasan, <em>Under Layered Suspicion: A Review of CRA Audits of Muslim-Led Charities</em> (2021), https://uploads-ssl.webflow.com/6014cdeca65f7f2af7e18187/605eb346393ed260c23713e2_Under_Layered_Suspicion_Report_Mar2021.pdf.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-2" href="#footnote-anchor-2" class="footnote-number" contenteditable="false" target="_self">2</a><div class="footnote-content"><p>Another sidebar. I think CRA RAD has the capacity to become a world leader (and ideally, trainer), in developing and validating risk indicators. They have the skills, knowledge, and frameworks to do this. The whole sector is ripe for reform, and I would personally love to work on this, either with CRA or with one of my partner organizations working in this area. </p></div></div>]]></content:encoded></item><item><title><![CDATA[Hawala in the Cloud, Cash Under the Mattress: ISIL’s Evolving Finances]]></title><description><![CDATA[Thirty-sixth report of the Analytical Support and Sanctions Monitoring Team submitted pursuant to resolution 2734 (2024) concerning ISIL (Da&#8217;esh), Al-Qaida and associated individuals and entities]]></description><link>https://newsletter.insightthreatintel.com/p/hawala-in-the-cloud-cash-under-the</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/hawala-in-the-cloud-cash-under-the</guid><dc:creator><![CDATA[Jessica Davis, PhD]]></dc:creator><pubDate>Mon, 11 Aug 2025 13:02:53 GMT</pubDate><enclosure url="https://images.unsplash.com/photo-1727221167365-d365e63e7ebc?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHx1bml0ZWQlMjBuYXRpb25zfGVufDB8fHx8MTc1NDg0NTkwMHww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Hello, <strong>Insight Monitor </strong>subscribers, and welcome to another week of news and analysis you won&#8217;t find anywhere else. Last week, the latest UN Monitoring Team report was released. And while we&#8217;re certainly not first to do a summary and highlight key points, we did take our time to go through it, find all the terrorist financing-related content, and pull out some novel developments and key issues. So here you go! Have a read, and let us know what you think. </em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/p/hawala-in-the-cloud-cash-under-the?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/p/hawala-in-the-cloud-cash-under-the?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p>The 36th Analytical Support and Sanctions Monitoring Team<a href="https://docs.un.org/S/2025/482?_gl=1*1hb5w3e*_ga*MzU5MTQxMzI1LjE3NTI2MDE3NDc.*_ga_TK9BQL5X7Z*czE3NTQ4NDM1MTEkbzMkZzAkdDE3NTQ4NDM1MTEkajYwJGwwJGgw"> report</a>, submitted in July 2025, offers a wealth of new insight into the financing of ISIL, Al-Qaida and their affiliates. Beyond the expected operational updates, the report contains some of the most interesting recent developments in terrorist financing, showing how groups are adapting both traditional methods and emerging technologies to sustain their activities.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://images.unsplash.com/photo-1727221167365-d365e63e7ebc?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHx1bml0ZWQlMjBuYXRpb25zfGVufDB8fHx8MTc1NDg0NTkwMHww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://images.unsplash.com/photo-1727221167365-d365e63e7ebc?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHx1bml0ZWQlMjBuYXRpb25zfGVufDB8fHx8MTc1NDg0NTkwMHww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1727221167365-d365e63e7ebc?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHx1bml0ZWQlMjBuYXRpb25zfGVufDB8fHx8MTc1NDg0NTkwMHww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1727221167365-d365e63e7ebc?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHx1bml0ZWQlMjBuYXRpb25zfGVufDB8fHx8MTc1NDg0NTkwMHww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1727221167365-d365e63e7ebc?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHx1bml0ZWQlMjBuYXRpb25zfGVufDB8fHx8MTc1NDg0NTkwMHww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1456w" sizes="100vw"><img src="https://images.unsplash.com/photo-1727221167365-d365e63e7ebc?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHx1bml0ZWQlMjBuYXRpb25zfGVufDB8fHx8MTc1NDg0NTkwMHww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" width="408" height="272" data-attrs="{&quot;src&quot;:&quot;https://images.unsplash.com/photo-1727221167365-d365e63e7ebc?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHx1bml0ZWQlMjBuYXRpb25zfGVufDB8fHx8MTc1NDg0NTkwMHww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:4672,&quot;width&quot;:7008,&quot;resizeWidth&quot;:408,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;A very tall building sitting next to a body of water&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="A very tall building sitting next to a body of water" title="A very tall building sitting next to a body of water" srcset="https://images.unsplash.com/photo-1727221167365-d365e63e7ebc?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHx1bml0ZWQlMjBuYXRpb25zfGVufDB8fHx8MTc1NDg0NTkwMHww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1727221167365-d365e63e7ebc?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHx1bml0ZWQlMjBuYXRpb25zfGVufDB8fHx8MTc1NDg0NTkwMHww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1727221167365-d365e63e7ebc?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHx1bml0ZWQlMjBuYXRpb25zfGVufDB8fHx8MTc1NDg0NTkwMHww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1727221167365-d365e63e7ebc?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHx1bml0ZWQlMjBuYXRpb25zfGVufDB8fHx8MTc1NDg0NTkwMHww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/@nhuenerfuerst">Nils Huenerfuerst</a> on <a href="https://unsplash.com">Unsplash</a></figcaption></figure></div><p>ISIL continues to rely on familiar methods of moving money through hawala networks and cash transfers, but these are now augmented by more sophisticated tactics. Female couriers are increasingly employed to transport funds in order to avoid detection. As we&#8217;ve long talked about, using female financial facilitators is a form of financial tradecraft intended to take advantage of counterterrorism forces&#8217; bias against seeing women as terrorist actors. </p><p>Cloud hawala systems, where transaction records are stored online rather than in physical ledgers, are becoming more common, complicating monitoring efforts. (On the other hand, these online ledgers are likely vulnerable to cyber intrusions, so they present a unique opportunity for intelligence collection. Traditionally, collecting intelligence on hawala operations has involved significant HUMINT capabilities.) Safe-drop boxes have also emerged as a technique, allowing operatives to deposit funds at exchange offices that can be retrieved using only a password or code, adding another layer of operational security.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Insight Monitor is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;6ead0245-b96c-4f45-8314-87e9487514cf&quot;,&quot;caption&quot;:&quot;Welcome to the Insight Intelligence newsletter! And a special welcome to the new subscribers this week &#8211; I love seeing our community of interest grow. This week&#8217;s analysis is all about the role of women as financial facilitators and terrorist financiers. If you find this analysis interesting, please share it with a friend!&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Women Financing Terrorism&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:33479672,&quot;name&quot;:&quot;Jessica Davis, PhD&quot;,&quot;bio&quot;:&quot;Jessica Davis is President of Insight Threat Intelligence and is the author of Women in Modern Terrorism: From Liberations Wars to Global Terrorism and the Islamic State (2017), and Illicit Money: Financing Terrorism in the 21st Century (2021).&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e312ae7c-114b-4e4f-9ce1-8bf50ddb7a27_2344x2049.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2021-12-02T14:00:35.732Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!8ECr!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fd41f44e6-b102-42e5-8574-8f41a677240d_6800x4538.jpeg&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/women-in-terrorism-financing&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:44782392,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:1,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!qcEy!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc845f459-e1ac-4902-ad4d-0887e24ab430_900x900.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>In Somalia, the Al-Karrar office has been cut off from central ISIL funding, prompting the search for alternative income streams. One adaptation has been to rely on small-scale kidnap-for-ransom schemes, with demands as low as US $50 to $100 sent via mobile money applications to secure quick releases. This is reminiscent of the same tactic used by various criminal entities in Nigeria, where &#8220;express kidnappings&#8221; are common. (In my book,<a href="https://www.rienner.com/title/Illicit_Money_Financing_Terrorism_in_the_Twenty_First_Century"> </a><em><a href="https://www.rienner.com/title/Illicit_Money_Financing_Terrorism_in_the_Twenty_First_Century">Illicit Money</a></em>, I make the distinction between these types of local kidnappings for ransom, which usually generate small proceeds, and large international kidnappings for ransom that can generate ransoms in the tens of millions of dollars.) </p><p>The group has also begun keeping physical cash caches in hidden locations, while also concealing funds in the bank accounts of sympathetic businessmen and investing in local enterprises&#8212;both to mask resources and to generate ongoing returns. Similar investments were made in Mozambique, which we wrote about for Insight Monitor back in 2023. </p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;9544192b-a19b-4404-956c-70ac732b3b03&quot;,&quot;caption&quot;:&quot;In 2019, the Islamic State declared a new affiliate in Central Africa Province (ISCAP), made up of branches in the Democratic Republic of Congo and Mozambique. The Congo branch is comprised of the Allied Democratic Forces (ADF), while the Mozambique branch&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Ansar al-Sunna - The Islamic State in Mozambique&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:85208154,&quot;name&quot;:&quot;Elena Martynova&quot;,&quot;bio&quot;:&quot;Research Analyst &quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e88b531d-b106-4c92-8177-62a8a864bde5_2316x2316.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100},{&quot;id&quot;:33479672,&quot;name&quot;:&quot;Jessica Davis, PhD&quot;,&quot;bio&quot;:&quot;Jessica Davis is President of Insight Threat Intelligence and is the author of Women in Modern Terrorism: From Liberations Wars to Global Terrorism and the Islamic State (2017), and Illicit Money: Financing Terrorism in the 21st Century (2021).&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e312ae7c-114b-4e4f-9ce1-8bf50ddb7a27_2344x2049.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2023-05-18T12:07:36.158Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!luHB!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa96b9b59-086b-45ed-b8a8-67f022fc1b46_1300x1000.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/ansar-al-sunna-the-islamic-state&quot;,&quot;section_name&quot;:&quot;Group Profiles &quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:121922852,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:7,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!qcEy!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc845f459-e1ac-4902-ad4d-0887e24ab430_900x900.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>Building on what has previously been reported, the Monitoring Team noted that ISIL-KP in Afghanistan has <a href="https://ctc.westpoint.edu/the-financial-future-of-the-islamic-state/">embraced cryptocurrencies</a> as a key component of its financial toolkit, using platforms such as Monero, KuCoin, MEXC, Huobi and Totalcoin. While Monero&#8217;s popularity appears to be waning due to de-platforming from national exchanges and the difficulty of converting it, other tools are filling the gap. Chief among them is &#8220;Cash Now,&#8221; a cryptocurrency exchange app that facilitates rapid swaps between different crypto assets, giving ISIL operatives ready access to liquid funds without relying on the formal banking sector.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a> Telegram&#8217;s @wallet funding app has also gained traction because it requires no know-your-customer checks, and unhosted wallets are increasingly used for single-use transfers that leave few traces. The report also notes that ISIL operatives are experimenting with AI-generated fake documents to circumvent know-your-customer procedures..</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://insightthreatintelligence.thinkific.com/bundles/tf-analysis" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!f7rH!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 424w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 848w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 1272w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!f7rH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png" width="1066" height="507" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:507,&quot;width&quot;:1066,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:698946,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://insightthreatintelligence.thinkific.com/bundles/tf-analysis&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!f7rH!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 424w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 848w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 1272w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><p><em>Our terrorist financing analysis course caters to researchers, intelligence, law enforcement, and compliance professionals to help them learn about terrorist financing, and analyze suspicious patterns and activities more effectively. Sign up today!</em></p><div><hr></div><p>Libya&#8217;s intelligence service has recently dismantled three ISIL facilitation networks. The first specialized in recruiting operatives from North Africa and moving them to Somalia and the Sahel, providing forged passports and safe houses along the way. The second laundered money through front companies to help fighters and their families escape the al-Hawl camp in Syria and relocate to Libya, where they were housed in ISIL-funded safe houses. This network also pursued investments in regional countries. The third focused on transferring funds to ISIL using cryptocurrencies. This is interesting, as much of ISIL&#8217;s network in Libya <a href="https://insightthreatintelligence.thinkific.com/courses/terrorist-financing-case-studies-library">has reportedly been destroye</a>d in recent years.</p><p>Taken together, these developments point to a clear trend: the increasing sophistication of financial tradecraft across ISIL&#8217;s network and in the broader terrorist financing arena. Investments in legitimate-seeming companies suggest an interest in long-term sustainability, while the growing adoption of cryptocurrencies reflects both opportunism and a growing liquidity in the cryptocurrency market that makes them useful for terrorist (both organizational and operational) financing. The report underscores that even when traditional funding lines are disrupted, these groups find ways to diversify income streams, conceal assets and adapt quickly to enforcement pressures</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/p/hawala-in-the-cloud-cash-under-the?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/p/hawala-in-the-cloud-cash-under-the?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p><em>&#169; 2025 Insight Threat Intelligence Ltd. All Rights Reserved.<br><br>This newsletter and its contents are protected by Canadian copyright law. Except as otherwise provided for under Canadian copyright law, this newsletter and its contents may not be copied, published, distributed, downloaded or otherwise stored in a retrieval system, transmitted or converted, in any form or by any means, electronic or otherwise, without the prior written permission of the copyright owner.</em></p><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-1" href="#footnote-anchor-1" class="footnote-number" contenteditable="false" target="_self">1</a><div class="footnote-content"><p>Interesting, right? I&#8217;m trying to find out more about this app. Stay tuned. </p></div></div>]]></content:encoded></item><item><title><![CDATA[Inside the FATF’s new terrorist financing report: insights and implications with Jessica Davis and Stephen Reimer]]></title><description><![CDATA[A recording from Jessica Davis's live video]]></description><link>https://newsletter.insightthreatintel.com/p/inside-the-fatfs-new-terrorist-financing</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/inside-the-fatfs-new-terrorist-financing</guid><dc:creator><![CDATA[Jessica Davis, PhD]]></dc:creator><pubDate>Wed, 23 Jul 2025 19:50:55 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/168326542/cf690d29b42ef55131e1ad4b7f5b9585.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>It was great to chat with <span class="mention-wrap" data-attrs="{&quot;name&quot;:&quot;Stephen Reimer&quot;,&quot;id&quot;:272066928,&quot;type&quot;:&quot;user&quot;,&quot;url&quot;:null,&quot;photo_url&quot;:null,&quot;uuid&quot;:&quot;6a47d99e-6bab-433a-88e7-6db1cf882b32&quot;}" data-component-name="MentionToDOM"></span>, <a href="https://www.rusi.org/people/reimer">associate fellow with RUSI&#8217;s CFS</a>, on the new FATF report on terrorist financing risks on Substack Live earlier today. You can check out the full video above. </p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Insight Monitor is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>We covered a lot of ground, including: </p><ul><li><p>how input to the FATF report is solicited; </p></li><li><p>what struck us as most interesting in the report;</p></li><li><p>how the report can be used by governments, financial institutions, and researchers; </p></li><li><p>that OnlyFans reference &#129760;; </p></li><li><p>new technologies (<a href="https://newsletter.insightthreatintel.com/p/terrorist-financing-enters-its-cryptocurrency?utm_source=publication-search">crypto, of course!</a>) and terrorist financing; </p></li><li><p><a href="https://www.rusi.org/explore-our-research/publications/occasional-papers/missing-connections-crime-enabled-terrorism-financing-europe">crime and terrorism</a>;</p></li><li><p>the <a href="https://www.rusi.org/podcasts/suspicious-transaction-report/episode-4-addressing-authoritarian-abuse-fatf-standards">uses and abuses of FATF standards</a>;</p></li><li><p>the <a href="https://newsletter.insightthreatintel.com/p/cryptocurrency-meets-hawala?utm_source=publication-search">cryptocurrency and hawala mashup</a>;</p></li><li><p>and much more! </p></li></ul><p>We were joined by many of you (thanks!), and look forward to doing another one of these soon (maybe). If you think this is a good format, let us know in the comments or by messaging us. We&#8217;re eager to hear your thoughts and develop content that suits a broad range of readers. You can reach me here, of course, and you can reach Stephen on <a href="https://www.linkedin.com/in/stephen-reimer-651258b8/">LinkedIn</a>. </p><div class="install-substack-app-embed install-substack-app-embed-web" data-component-name="InstallSubstackAppToDOM"><img class="install-substack-app-embed-img" src="https://substackcdn.com/image/fetch/$s_!qcEy!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc845f459-e1ac-4902-ad4d-0887e24ab430_900x900.png"><div class="install-substack-app-embed-text"><div class="install-substack-app-header">Get more from Jessica Davis in the Substack app</div><div class="install-substack-app-text">Available for iOS and Android</div></div><a href="https://substack.com/app/app-store-redirect?utm_campaign=app-marketing&amp;utm_content=author-post-insert&amp;utm_source=insightintel" target="_blank" class="install-substack-app-embed-link"><button class="install-substack-app-embed-btn button primary">Get the app</button></a></div><h3>New Articles</h3><p>I also wanted to flag a couple of new publications. This week, I published an article with <span class="mention-wrap" data-attrs="{&quot;name&quot;:&quot;Lawfare&quot;,&quot;id&quot;:24182539,&quot;type&quot;:&quot;user&quot;,&quot;url&quot;:null,&quot;photo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fbce66d59-bd71-4843-baf9-90d09cad0340_4800x4800.png&quot;,&quot;uuid&quot;:&quot;736e217c-f5d5-4f86-b14f-ff65aa8089b0&quot;}" data-component-name="MentionToDOM"></span> on how counterterrorist financing tools can be used (and abused) to counter organized criminal groups. Have a read of it here: <a href="https://www.lawfaremedia.org/article/lessons-from-the-ledger">Lessons from the Ledger</a>. </p><p>I also wrote an article for GNet on the recent terrorism case in Canada of the group of military (former, current, and proximate) members seeking to create a &#8220;new society&#8221; in Canada and their anti-government ideology. You can read it here: &#8220;<a href="https://gnet-research.org/2025/07/23/a-new-society-behind-canadian-armed-forces-members-plot-to-form-a-militia-and-seize-land/">&#8216;A New Society&#8217;: Behind Canadian Armed Forces Members&#8217; Plot to Form a Militia and Seize Land</a>.</p><p>Have a great rest of the week, and we&#8217;ll be back to our regularly scheduled articles next week. </p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/p/inside-the-fatfs-new-terrorist-financing?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/p/inside-the-fatfs-new-terrorist-financing?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p><em>&#169; 2025 Insight Threat Intelligence Ltd. All Rights Reserved.<br><br>This newsletter and its contents are protected by Canadian copyright law. Except as otherwise provided for under Canadian copyright law, this newsletter and its contents may not be copied, published, distributed, downloaded or otherwise stored in a retrieval system, transmitted or converted, in any form or by any means, electronic or otherwise, without the prior written permission of the copyright owner.</em></p>]]></content:encoded></item><item><title><![CDATA[Digital Blow to Tehran: Hackers Disrupt Iran’s Illicit Finance Network]]></title><description><![CDATA[Iran's illicit finance network disrupted....for now.]]></description><link>https://newsletter.insightthreatintel.com/p/digital-blow-to-tehran-hackers-disrupt</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/digital-blow-to-tehran-hackers-disrupt</guid><dc:creator><![CDATA[Jessica Davis, PhD]]></dc:creator><pubDate>Sat, 21 Jun 2025 20:57:33 GMT</pubDate><enclosure url="https://images.unsplash.com/photo-1688765654157-564c4b2a7f39?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw4MXx8aXJhbiUyMGNyeXB0b3xlbnwwfHx8fDE3NTA1MzkyOTJ8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Hello, <strong>Insight Monitor</strong> subscribers, and welcome to a special edition of our newsletter. Today, we&#8217;re looking at the hack of Iran&#8217;s Nobitex cryptocurrency exchange and the implications of this hack on Iran&#8217;s ability to settle financial transactions and fund its Axis of Resistance (proxy network of militias and terrorist groups). As readers of this newsletter know, I often remove the paywall from analysis that I think is in the public interest. Today, there is no paywall because this research is part of my postdoctoral associate position at the University of Calgary&#8217;s Faculty of Law, a publicly funded university (which means my research is publicly funded as well). Isn&#8217;t higher education in Canada great? Without further ado, let&#8217;s talk cryptocurrency, terrorist financing, state-sponsored hacker groups, and the Iran-Israel conflict.</em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/subscribe?"><span>Subscribe now</span></a></p><p><em>However, if you want to support the ITI research team and other analysis from this newsletter, you&#8217;re still welcome to become a paying subscribe! This helps us produce more news and analysis you won&#8217;t find anywhere else. And there&#8217;s no shortage of topics&#8230;.</em></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://images.unsplash.com/photo-1688765654157-564c4b2a7f39?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw4MXx8aXJhbiUyMGNyeXB0b3xlbnwwfHx8fDE3NTA1MzkyOTJ8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://images.unsplash.com/photo-1688765654157-564c4b2a7f39?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw4MXx8aXJhbiUyMGNyeXB0b3xlbnwwfHx8fDE3NTA1MzkyOTJ8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1688765654157-564c4b2a7f39?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw4MXx8aXJhbiUyMGNyeXB0b3xlbnwwfHx8fDE3NTA1MzkyOTJ8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1688765654157-564c4b2a7f39?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw4MXx8aXJhbiUyMGNyeXB0b3xlbnwwfHx8fDE3NTA1MzkyOTJ8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1688765654157-564c4b2a7f39?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw4MXx8aXJhbiUyMGNyeXB0b3xlbnwwfHx8fDE3NTA1MzkyOTJ8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1456w" sizes="100vw"><img src="https://images.unsplash.com/photo-1688765654157-564c4b2a7f39?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw4MXx8aXJhbiUyMGNyeXB0b3xlbnwwfHx8fDE3NTA1MzkyOTJ8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" width="421" height="631.4454521896864" data-attrs="{&quot;src&quot;:&quot;https://images.unsplash.com/photo-1688765654157-564c4b2a7f39?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw4MXx8aXJhbiUyMGNyeXB0b3xlbnwwfHx8fDE3NTA1MzkyOTJ8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:5788,&quot;width&quot;:3859,&quot;resizeWidth&quot;:421,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;a view of a city with mountains in the background&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="a view of a city with mountains in the background" title="a view of a city with mountains in the background" srcset="https://images.unsplash.com/photo-1688765654157-564c4b2a7f39?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw4MXx8aXJhbiUyMGNyeXB0b3xlbnwwfHx8fDE3NTA1MzkyOTJ8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1688765654157-564c4b2a7f39?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw4MXx8aXJhbiUyMGNyeXB0b3xlbnwwfHx8fDE3NTA1MzkyOTJ8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1688765654157-564c4b2a7f39?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw4MXx8aXJhbiUyMGNyeXB0b3xlbnwwfHx8fDE3NTA1MzkyOTJ8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1688765654157-564c4b2a7f39?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw4MXx8aXJhbiUyMGNyeXB0b3xlbnwwfHx8fDE3NTA1MzkyOTJ8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo by <a href="true">Amir Mohammad Fallah</a> on <a href="https://unsplash.com">Unsplash</a></figcaption></figure></div><h3>The Nobitex Hack</h3><p>Last week, in the midst of the Israel-Iran conflict, the largest cryptocurrency exchange in Iran was attacked by a &#8220;hacktivist&#8221; group, Gonjeshke Darande (Predatory Sparrow). Predatory Sparrow is believed to have <a href="https://www.wired.com/story/israels-predatory-sparrow-hackers-are-waging-cyberwar-on-irans-financial-system/">&#8220;links&#8221;</a> to Israel&#8217;s military or intelligence agencies, with some analysts suspecting that <a href="https://www.bbc.com/news/technology-62072480">Israel sponsors</a> the group. The hackers stole $90 million (in Bitcoin, EVM, Ethereum, Ripple, Dogecoin, Solana, and other cryptocurrencies) from the exchange, but effectively <a href="https://www.elliptic.co/blog/iranian-crypto-exchange-nobitex-hacked-pro-israel-group">&#8220;burned&#8221;</a>the money by transferring the funds to wallets for which they did not have the keys (the security mechanism needed to access the funds). The hackers also <a href="https://www.yahoo.com/news/irans-nobitex-source-code-exposed-103411315.html">reportedly released</a> the complete source code of the exchange, exposing assets still hosted on the exchange to possible theft. On Thursday, Nobitex responded, saying that <a href="https://www.yahoo.com/news/irans-nobitex-source-code-exposed-103411315.html">no additional losses</a> had occurred.</p><p>The Israel-affiliated hackers had previously attacked Iran&#8217;s Bank Sepah, and <a href="https://www.wired.com/story/israels-predatory-sparrow-hackers-are-waging-cyberwar-on-irans-financial-system/">claimed to have destroyed all the bank&#8217;s data</a> in retaliation for its association with the Islamic Revolutionary Guards Corp (IRGC).</p><h3>Iran&#8217;s Crypto Lifeline</h3><p>Nobitex is Iran&#8217;s <a href="https://www.trmlabs.com/resources/blog/iran-crypto-economy">largest cryptocurrency exchange</a>. Since the mid-2010s, cryptocurrency has become increasingly important for Iran&#8217;s economy, facilitating payments outside of the formal banking sector (and to evade sanctions and sanctions-related restrictions on financial transactions). Nobitex has provided the majority of cryptocurrency services to Iranians since 2017, and between 2018 and 2022, it is believed to have processed <a href="https://www.reuters.com/business/finance/exclusive-crypto-exchange-binance-helped-iranian-firms-trade-8-billion-despite-2022-11-04/">$8 billion in transactions</a> (often with the help of Binance). Nobitex processes transactions across multiple blockchains, including the ones that were attacked in the hack, <a href="applewebdata://8BB4FBED-F124-4534-9368-77C3BD5BB322/TRM%20Labs,%20%E2%80%9CNobitex%20Is%20First%20Decentralized%20Exchange%20Built%20and%20Launched%20in%20Iran%20|%20TRM%20Blog,%E2%80%9D%20TRM%20Insights%20(blog),%20September%2025,%202023,%20https:/www.trmlabs.com/resources/blog/nobidex-is-first-decentralized-exchange-built-and-launched-in-iran.">as well as Tron</a>. In addition to Nobitex, Iran also has <a href="applewebdata://8BB4FBED-F124-4534-9368-77C3BD5BB322/TRM%20Labs,%20%E2%80%9CIran%E2%80%99s%20Crypto%20Economy,%E2%80%9D%20TRM%20Insights%20(blog),%20April%2017,%202023,%20https:/www.trmlabs.com/resources/blog/iran-crypto-economy">four other large exchanges</a>: Wallex.ir, Excoino, Aban Tether, and Bit24.cash.</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;49794227-acb4-488d-9ca3-4b2cf196368d&quot;,&quot;caption&quot;:&quot;Ten years ago, when I first started looking at cryptocurrency and terrorist financing, the only currency used was Bitcoin. Terrorist financing through cryptocurrency was relatively rare and what I would describe as &#8220;proof of concept&#8221;. Within the last decade, the landscape has changed significantly, and terrorists are increasingly using cryptocurrency to move money for their financing needs. In fact, this is now&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Terrorist Financing with Tether&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:33479672,&quot;name&quot;:&quot;Jessica Davis&quot;,&quot;bio&quot;:&quot;Dr. Jessica Davis is President of Insight Threat Intelligence and is the author of Women in Modern Terrorism: From Liberations Wars to Global Terrorism and the Islamic State (2017), and Illicit Money: Financing Terrorism in the 21st Century (2021).&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e312ae7c-114b-4e4f-9ce1-8bf50ddb7a27_2344x2049.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2025-01-15T14:18:14.094Z&quot;,&quot;cover_image&quot;:&quot;https://images.unsplash.com/photo-1651055693398-0d66969cf759?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0NXx8dGV0aGVyfGVufDB8fHx8MTczMzg1MTA5MXww&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/terrorist-financing-with-tether&quot;,&quot;section_name&quot;:&quot;Financiers&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:152921953,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:8,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!i6d1!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee6d6275-21f4-4f93-beb3-0ccf9c112d29_900x900.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>Since 2018, Iran has used cryptocurrency to bypass US and international sanctions. The IRGC (and the IRGC QF in particular) uses cryptocurrency to move funds to support its various functions, including intelligence operations and its network of proxy groups (<a href="https://thesoufancenter.org/intelbrief-2024-april-30/">aka the Axis of Resistance</a>). Indeed, Nobitex was reportedly targeted for its role in facilitating sanctions evasion activity and for terrorist financing, specifically between the IRGC QF and proxies such as Hizballah, Hamas, and the Houthis.</p><p>According to a statement from Nobitex&#8217;s CEO AmirHossein Rad (<a href="https://x.com/nobitexmarket/status/1936334745249382666">via a video posted on the social media platform X</a>), the exchange had a delayed response to the hack due to limitations placed on Internet access in Iran and a lack of access to the company&#8217;s data centers. The Iranian <a href="https://www.msn.com/en-us/news/world/irans-internet-blackout-leaves-public-in-dark-and-creates-an-uneven-picture-of-the-war-with-israel/ar-AA1H66KI">government is believed</a> to have significantly reduced (and in some cases stopped) all internet access for periods during the conflict. Rad further stated that the exchange will fully compensate clients for all funds stolen from hot wallets (wallets hosted online on the exchange) and reiterated that the exchange remains liquid, as the majority of its assets are held in cold wallets (offline storage devices). He indicated that the exchange will come back online gradually over the next four to five days.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://insightthreatintelligence.thinkific.com/bundles/tf-analysis" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!f7rH!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 424w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 848w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 1272w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!f7rH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png" width="1066" height="507" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:507,&quot;width&quot;:1066,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:698946,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://insightthreatintelligence.thinkific.com/bundles/tf-analysis&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!f7rH!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 424w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 848w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 1272w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><p><em>Our terrorist financing analysis course caters to researchers, intelligence, law enforcement, and compliance professionals to help them learn about terrorist financing, and analyze suspicious patterns and activities more effectively. Sign up today!</em></p><div><hr></div><h3>Disrupting Iranian Illicit Finance</h3><p>The future of Nobitex and the impact of this hack on Iran&#8217;s financial sector is uncertain. If the exchange is able to return to operations and enhance security after the alleged leaking of its source code, the cryptocurrency ecosystem in Iran will remain largely intact. However, if Nobitex is unable to resume services, this will seriously reduce the ability of regular Iranians (and the Iranian regime) to move money into and out of Iran. With Bank Sepah also offline, this poses a significant hindrance to the IRGC&#8217;s financial operations. </p><p>While Iran&#8217;s proxy groups are unlikely to feel the pinch in the short term (1-2 weeks), if these financial service providers remain offline, Iranian proxies will likely start to experience financial limitations and possibly face financial disruption, hindering their ability to procure weapons and goods, as well as pay for services. While other Iranian cryptocurrency exchanges remain functional, they are unlikely to replace Nobitex's processing volume easily, and if or when they attempt to do so, they might also become targets for Predatory Sparrow. Reducing Iran&#8217;s ability to provide financial support to its proxies was likely the intended goal of the hack; while this has been achieved in the short term, it remains to be seen whether this will be successful in the long term.</p><p><em><strong>Did you find this Insightful? Share it with a friend! </strong></em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/p/digital-blow-to-tehran-hackers-disrupt?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/p/digital-blow-to-tehran-hackers-disrupt?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p><em>&#169; 2025 Insight Threat Intelligence Ltd. All Rights Reserved.<br><br>This newsletter and its contents are protected by Canadian copyright law. Except as otherwise provided for under Canadian copyright law, this newsletter and its contents may not be copied, published, distributed, downloaded or otherwise stored in a retrieval system, transmitted or converted, in any form or by any means, electronic or otherwise, without the prior written permission of the copyright owner.</em></p>]]></content:encoded></item><item><title><![CDATA[Greylisted and Red Flags: What FATF listings really achieve]]></title><description><![CDATA[A summary of the recent FATF outcomes, and a sneak peak at empirical analysis on the impact and outcomes of FATF greylistings.]]></description><link>https://newsletter.insightthreatintel.com/p/greylisted-and-red-flags-what-fatf</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/greylisted-and-red-flags-what-fatf</guid><dc:creator><![CDATA[Jessica Davis, PhD]]></dc:creator><pubDate>Mon, 16 Jun 2025 13:01:49 GMT</pubDate><enclosure url="https://images.unsplash.com/photo-1502920514313-52581002a659?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwyfHxicml0aXNoJTIwdmlyZ2luJTIwaXNsYW5kcyUyMG1vbmV5fGVufDB8fHx8MTc1MDAwMzI2OXww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Over the weekend, you&#8217;ll have likely seen lots of talk on social media about the FATF&#8217;s updated grey list (jurisdictions under increased monitoring) and what it means for those countries. Today, I&#8217;m going to do something a bit different: talk about those countries and what it means, but also share some new research on what the FATF&#8217;s grey list achieves (or doesn&#8217;t) in our fight against terrorism and terrorist financing. At a time when global resources are stretched thin by competing priorities and a reordering of the international system, it&#8217;s important to think critically about organizations, standards, and systems, and whether they are making the world a safer and fairer place. This is particularly true as the G7 prepares to meet, since the FATF originally emerged from G7 communiqu&#233;s, and if any group of countries can support more research into what the FATF standards achieve, it&#8217;s this one. And yes: this article needs an &#128680; empirical data alert! &#128680;</em></p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://images.unsplash.com/photo-1502920514313-52581002a659?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwyfHxicml0aXNoJTIwdmlyZ2luJTIwaXNsYW5kcyUyMG1vbmV5fGVufDB8fHx8MTc1MDAwMzI2OXww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://images.unsplash.com/photo-1502920514313-52581002a659?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwyfHxicml0aXNoJTIwdmlyZ2luJTIwaXNsYW5kcyUyMG1vbmV5fGVufDB8fHx8MTc1MDAwMzI2OXww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1502920514313-52581002a659?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwyfHxicml0aXNoJTIwdmlyZ2luJTIwaXNsYW5kcyUyMG1vbmV5fGVufDB8fHx8MTc1MDAwMzI2OXww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1502920514313-52581002a659?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwyfHxicml0aXNoJTIwdmlyZ2luJTIwaXNsYW5kcyUyMG1vbmV5fGVufDB8fHx8MTc1MDAwMzI2OXww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1502920514313-52581002a659?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwyfHxicml0aXNoJTIwdmlyZ2luJTIwaXNsYW5kcyUyMG1vbmV5fGVufDB8fHx8MTc1MDAwMzI2OXww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1456w" sizes="100vw"><img src="https://images.unsplash.com/photo-1502920514313-52581002a659?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwyfHxicml0aXNoJTIwdmlyZ2luJTIwaXNsYW5kcyUyMG1vbmV5fGVufDB8fHx8MTc1MDAwMzI2OXww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" width="247" height="165.34172767203515" data-attrs="{&quot;src&quot;:&quot;https://images.unsplash.com/photo-1502920514313-52581002a659?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwyfHxicml0aXNoJTIwdmlyZ2luJTIwaXNsYW5kcyUyMG1vbmV5fGVufDB8fHx8MTc1MDAwMzI2OXww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:2286,&quot;width&quot;:3415,&quot;resizeWidth&quot;:247,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;U.S. dollar banknote with map&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="U.S. dollar banknote with map" title="U.S. dollar banknote with map" srcset="https://images.unsplash.com/photo-1502920514313-52581002a659?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwyfHxicml0aXNoJTIwdmlyZ2luJTIwaXNsYW5kcyUyMG1vbmV5fGVufDB8fHx8MTc1MDAwMzI2OXww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1502920514313-52581002a659?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwyfHxicml0aXNoJTIwdmlyZ2luJTIwaXNsYW5kcyUyMG1vbmV5fGVufDB8fHx8MTc1MDAwMzI2OXww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1502920514313-52581002a659?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwyfHxicml0aXNoJTIwdmlyZ2luJTIwaXNsYW5kcyUyMG1vbmV5fGVufDB8fHx8MTc1MDAwMzI2OXww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1502920514313-52581002a659?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwyfHxicml0aXNoJTIwdmlyZ2luJTIwaXNsYW5kcyUyMG1vbmV5fGVufDB8fHx8MTc1MDAwMzI2OXww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a><figcaption class="image-caption">Photo by <a href="true">Christine Roy</a> on <a href="https://unsplash.com">Unsplash</a></figcaption></figure></div><h3>Outcomes of the FATF Meeting</h3><p>Last week, the Financial Action Task Force (FATF), the global standard-setter for anti-money laundering and counterterrorist financing, released its updated list of jurisdictions under increased monitoring, commonly known as the grey list, and those identified as high-risk and subject to a call for action, more commonly referred to as the blacklist. These designations aren&#8217;t just bureaucratic labels; they have real implications for countries&#8217; financial sectors, global investment flows, and geopolitical reputations.</p><p>To learn more about those impacts, have a read of<a href="https://icct.nl/sites/default/files/2023-01/Handbook_Schmid_2020.pdf"> this book chapter</a> I wrote a few years ago. </p><p>Tanzania and Croatia were removed from the grey list after 2.5 years, while Mali was removed after 3.5 years. The UK Virgin Islands were placed on the list for the first time, and Bolivia was grey listed for the second time (the first was in 2011). Over the course of the list&#8217;s existence, 87 countries have been listed, some of them multiple times.</p><p>A continent-by-continent analysis reveals that Africa dominates the list with 12 countries, followed by 4 from the Middle East, 5 from Asia, and 4 from the Americas. Only three countries on the entire list &#8212; Bulgaria, Monaco, and the British Virgin Islands&#8212; are part of the Global North.</p><p>This geographic breakdown matters. FATF listing disproportionately affects countries in the Global South, highlighting a persistent tension in global financial governance. While the FATF emphasizes technical compliance and effectiveness in anti-money laundering and counterterrorist financing frameworks, the designations carry significant political and economic weight. Being grey- or black-listed can reduce access to international banking systems, raise the cost of capital, and trigger de-risking by international financial institutions.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!wzFN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ac96ccd-a250-404f-b494-5d036afc44dc_2812x3750.heic" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!wzFN!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ac96ccd-a250-404f-b494-5d036afc44dc_2812x3750.heic 424w, https://substackcdn.com/image/fetch/$s_!wzFN!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ac96ccd-a250-404f-b494-5d036afc44dc_2812x3750.heic 848w, https://substackcdn.com/image/fetch/$s_!wzFN!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ac96ccd-a250-404f-b494-5d036afc44dc_2812x3750.heic 1272w, https://substackcdn.com/image/fetch/$s_!wzFN!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ac96ccd-a250-404f-b494-5d036afc44dc_2812x3750.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!wzFN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ac96ccd-a250-404f-b494-5d036afc44dc_2812x3750.heic" width="457" height="609.5425824175824" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5ac96ccd-a250-404f-b494-5d036afc44dc_2812x3750.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1942,&quot;width&quot;:1456,&quot;resizeWidth&quot;:457,&quot;bytes&quot;:133821,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://newsletter.insightthreatintel.com/i/166005765?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ac96ccd-a250-404f-b494-5d036afc44dc_2812x3750.heic&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!wzFN!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ac96ccd-a250-404f-b494-5d036afc44dc_2812x3750.heic 424w, https://substackcdn.com/image/fetch/$s_!wzFN!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ac96ccd-a250-404f-b494-5d036afc44dc_2812x3750.heic 848w, https://substackcdn.com/image/fetch/$s_!wzFN!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ac96ccd-a250-404f-b494-5d036afc44dc_2812x3750.heic 1272w, https://substackcdn.com/image/fetch/$s_!wzFN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ac96ccd-a250-404f-b494-5d036afc44dc_2812x3750.heic 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Current FATF Grey and Black list countries, and month / year of listing</figcaption></figure></div><p>As more countries from the Global South find themselves under FATF scrutiny, questions arise about equity in the global financial system and the capacity of lower-income countries to implement complex regulatory frameworks. At the same time, the listings serve as a reminder that illicit finance is a global challenge that transcends regions and political systems. Compliance isn&#8217;t just about checking boxes, but about building resilient and transparent financial institutions.</p><h3>So does it work? </h3><p>As part of my work for my PhD,<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a> I conducted a series of large data analyses looking at levels of terrorism in countries around the world (&#8220;levels of terrorism&#8221; was defined as the number of terrorist attacks each year, as well as the number of people killed and injured). To assess the impact of FATF grey and blacklisting on terrorism, I used a negative binomial regression (a statistical method designed to model count data, like the number of terrorist incidents in a country). This type of regression is ideal when the data shows high variability, meaning some countries experience very few attacks while others experience many. Negative binomial regression accounts for this uneven distribution, making it a good fit for analyzing patterns in terrorism.</p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://insightthreatintelligence.thinkific.com/bundles/tf-analysis" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!f7rH!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 424w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 848w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 1272w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!f7rH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png" width="1066" height="507" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:507,&quot;width&quot;:1066,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:698946,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://insightthreatintelligence.thinkific.com/bundles/tf-analysis&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!f7rH!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 424w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 848w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 1272w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>Our terrorist financing analysis course caters to researchers, intelligence, law enforcement, and compliance professionals to help them learn about terrorist financing, and analyze suspicious patterns and activities more effectively. Sign up today!</em></p><div><hr></div><p>In the model,<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-2" href="#footnote-2" target="_self">2</a> I included FATF listing status as a variable (amongst a half dozen others),<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-3" href="#footnote-3" target="_self">3</a> lagged by three years.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-4" href="#footnote-4" target="_self">4</a> This lag accounts for the time it typically takes for technical assistance and other remedial measures triggered by FATF listing to take effect. The results show that even three years after being placed on a FATF list, countries continue to experience increasing levels of terrorism. This raises important questions about the effectiveness of FATF-driven reforms at enhancing global security. There are a number of possible explanations (I will explore these when I publish my book based on my dissertation), and this by no means suggests that we should abandon the FATF process. Instead, while these findings are preliminary, they provide a valuable starting point for evaluating whether FATF listings result in meaningful security improvements.</p><p>These findings underscore the importance of seeking empirical evidence about the real-world impacts of global anti-money laundering and counter-terrorist financing (AML/CTF) policies. While FATF listings are designed to pressure countries into compliance, we still know surprisingly little about whether those efforts actually reduce threats like terrorism and money laundering. This analysis isn&#8217;t the final word&#8212;it&#8217;s a starting point. By grounding future discussions in data and measurable outcomes, we can move beyond assumptions and begin to ask harder questions: What works, what doesn&#8217;t, and why? As the global community continues to refine its AML/CTF strategies, it&#8217;s critical that we base those efforts on evidence, not just expectations.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/p/greylisted-and-red-flags-what-fatf?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/p/greylisted-and-red-flags-what-fatf?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p><em>Did you find this post insightful? Share it with a friend or colleague and help us grow our community! </em></p><p><em>&#169; 2025 Insight Threat Intelligence Ltd. All Rights Reserved.<br><br>This newsletter and its contents are protected by Canadian copyright law. Except as otherwise provided for under Canadian copyright law, this newsletter and its contents may not be copied, published, distributed, downloaded or otherwise stored in a retrieval system, transmitted or converted, in any form or by any means, electronic or otherwise, without the prior written permission of the copyright owner.</em></p><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-1" href="#footnote-anchor-1" class="footnote-number" contenteditable="false" target="_self">1</a><div class="footnote-content"><p>This research won both the <a href="https://sshrc-crsh.canada.ca/results-resultats/prizes-prix/2023/talent_davis-eng.aspx">SSHRC Impact Talent Award</a> and the <a href="https://convocation.carleton.ca/ceremony/medals-and-awards/">Carleton University Medal for Outstanding Doctoral Research</a>. It will be published as a book in 2026. </p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-2" href="#footnote-anchor-2" class="footnote-number" contenteditable="false" target="_self">2</a><div class="footnote-content"><p>There are actually 8 models across two different datasets, and the results were statistically significant in 7/8 of the models. </p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-3" href="#footnote-anchor-3" class="footnote-number" contenteditable="false" target="_self">3</a><div class="footnote-content"><p>These variables included: the year that the country signed the <em>International Convention for the Suppression of Terrorist Financing</em>, if the regime was autocratic, the country&#8217;s regulatory quality (World Bank data), the remittances the country receives as a proportion of GDP (more World Bank data), an interact variable, and a lagged attack variable. </p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-4" href="#footnote-anchor-4" class="footnote-number" contenteditable="false" target="_self">4</a><div class="footnote-content"><p>This data was generously shared by Julia Morse, author of <a href="https://www.cornellpress.cornell.edu/book/9781501761515/the-bankers-blacklist/">The Banker&#8217;s Blacklist</a>, a must-read book. I updated the data to 2018.</p></div></div>]]></content:encoded></item><item><title><![CDATA[From Housekeeping to High Stakes: The Hidden Power of Canada’s Border Bill]]></title><description><![CDATA[Hello, Insight Monitor subscribers!]]></description><link>https://newsletter.insightthreatintel.com/p/from-housekeeping-to-high-stakes</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/from-housekeeping-to-high-stakes</guid><dc:creator><![CDATA[Jessica Davis, PhD]]></dc:creator><pubDate>Thu, 05 Jun 2025 13:02:53 GMT</pubDate><enclosure url="https://images.unsplash.com/photo-1656424714760-66bc4074b532?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzNHx8Y2FuYWRhJTIwcGFybGlhbWVudHxlbnwwfHx8fDE3NDkwNDg1OTB8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Hello, <strong>Insight Monitor</strong> subscribers! Today, we have a special analysis of new Canadian legislation that came out this week aimed at securing Canada&#8217;s borders and tackling illicit finance, organized crime, and fentanyl trafficking. If it seems like that&#8217;s a lot for one bill to do, you&#8217;re right. So let&#8217;s talk about what this bill can and cannot achieve. As always, we appreciate all the shares and subscribers we can get, particularly as we close in on 8k members of our community!  </em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/subscribe?"><span>Subscribe now</span></a></p><p>On 3 June 2025, the Government of Canada tabled <a href="https://www.parl.ca/DocumentViewer/en/45-1/bill/C-2/first-reading">Bill C-2</a> in the House of Commons. The Bill, formally known as <em>&#8220;An Act respecting certain measures relating to the security of the border between Canada and the United States and respecting other related security measures&#8221;</em> (aka the Border Bill) &#8220;will <a href="https://www.canada.ca/en/public-safety-canada/news/2025/06/the-strong-borders-act---government-of-canada-strengthens-border-security.html">strengthen our laws</a> and keep Canadians safe by ensuring law enforcement has the right tools to keep our borders secure, combat transnational organized crime, stop the flow of illegal fentanyl, and crack down on money laundering&#8221;.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/p/from-housekeeping-to-high-stakes?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/p/from-housekeeping-to-high-stakes?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://images.unsplash.com/photo-1656424714760-66bc4074b532?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzNHx8Y2FuYWRhJTIwcGFybGlhbWVudHxlbnwwfHx8fDE3NDkwNDg1OTB8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://images.unsplash.com/photo-1656424714760-66bc4074b532?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzNHx8Y2FuYWRhJTIwcGFybGlhbWVudHxlbnwwfHx8fDE3NDkwNDg1OTB8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1656424714760-66bc4074b532?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzNHx8Y2FuYWRhJTIwcGFybGlhbWVudHxlbnwwfHx8fDE3NDkwNDg1OTB8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1656424714760-66bc4074b532?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzNHx8Y2FuYWRhJTIwcGFybGlhbWVudHxlbnwwfHx8fDE3NDkwNDg1OTB8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1656424714760-66bc4074b532?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzNHx8Y2FuYWRhJTIwcGFybGlhbWVudHxlbnwwfHx8fDE3NDkwNDg1OTB8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1456w" sizes="100vw"><img src="https://images.unsplash.com/photo-1656424714760-66bc4074b532?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzNHx8Y2FuYWRhJTIwcGFybGlhbWVudHxlbnwwfHx8fDE3NDkwNDg1OTB8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" width="517" height="387.75" data-attrs="{&quot;src&quot;:&quot;https://images.unsplash.com/photo-1656424714760-66bc4074b532?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzNHx8Y2FuYWRhJTIwcGFybGlhbWVudHxlbnwwfHx8fDE3NDkwNDg1OTB8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:3504,&quot;width&quot;:4672,&quot;resizeWidth&quot;:517,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Canadian parliament viewed from the East, with the Ottawa river below. &quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Canadian parliament viewed from the East, with the Ottawa river below. " title="Canadian parliament viewed from the East, with the Ottawa river below. " srcset="https://images.unsplash.com/photo-1656424714760-66bc4074b532?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzNHx8Y2FuYWRhJTIwcGFybGlhbWVudHxlbnwwfHx8fDE3NDkwNDg1OTB8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1656424714760-66bc4074b532?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzNHx8Y2FuYWRhJTIwcGFybGlhbWVudHxlbnwwfHx8fDE3NDkwNDg1OTB8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1656424714760-66bc4074b532?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzNHx8Y2FuYWRhJTIwcGFybGlhbWVudHxlbnwwfHx8fDE3NDkwNDg1OTB8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1656424714760-66bc4074b532?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzNHx8Y2FuYWRhJTIwcGFybGlhbWVudHxlbnwwfHx8fDE3NDkwNDg1OTB8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo by <a href="true">Sarah Baxter</a> on <a href="https://unsplash.com">Unsplash</a></figcaption></figure></div><p>The government claims that the Bill will &#8220;disrupt illicit financing&#8221;:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!14UT!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc021ab9c-2c0b-45ce-8a36-ccbedc4e837c_2942x1198.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!14UT!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc021ab9c-2c0b-45ce-8a36-ccbedc4e837c_2942x1198.png 424w, https://substackcdn.com/image/fetch/$s_!14UT!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc021ab9c-2c0b-45ce-8a36-ccbedc4e837c_2942x1198.png 848w, https://substackcdn.com/image/fetch/$s_!14UT!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc021ab9c-2c0b-45ce-8a36-ccbedc4e837c_2942x1198.png 1272w, https://substackcdn.com/image/fetch/$s_!14UT!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc021ab9c-2c0b-45ce-8a36-ccbedc4e837c_2942x1198.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!14UT!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc021ab9c-2c0b-45ce-8a36-ccbedc4e837c_2942x1198.png" width="1456" height="593" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c021ab9c-2c0b-45ce-8a36-ccbedc4e837c_2942x1198.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:593,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:370569,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://newsletter.insightthreatintel.com/i/165195539?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc021ab9c-2c0b-45ce-8a36-ccbedc4e837c_2942x1198.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!14UT!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc021ab9c-2c0b-45ce-8a36-ccbedc4e837c_2942x1198.png 424w, https://substackcdn.com/image/fetch/$s_!14UT!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc021ab9c-2c0b-45ce-8a36-ccbedc4e837c_2942x1198.png 848w, https://substackcdn.com/image/fetch/$s_!14UT!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc021ab9c-2c0b-45ce-8a36-ccbedc4e837c_2942x1198.png 1272w, https://substackcdn.com/image/fetch/$s_!14UT!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc021ab9c-2c0b-45ce-8a36-ccbedc4e837c_2942x1198.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Do the measures proposed in this bill sound familiar? That&#8217;s because most of these were already advertised in the Trudeau government&#8217;s fall economic statement last year. I wrote about that here:</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;17639448-6ee8-4647-a6e5-50499cc5a152&quot;,&quot;caption&quot;:&quot;Hello, Insight Monitor subscribers! Welcome to the hundreds of new subscribers and followers we&#8217;ve picked up over the last few days. I&#8217;m not sure where you&#8217;re all coming from, but welcome! Here, we talk about global security and money a lot, so I hope you&#8217;re interested in that. Today, I&#8217;m doing a quick overview of the security and illicit finance compon&#8230;&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;lg&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Fare thee well, Canadian Financial Crimes Agency&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:33479672,&quot;name&quot;:&quot;Jessica Davis&quot;,&quot;bio&quot;:&quot;Dr. Jessica Davis is President of Insight Threat Intelligence and is the author of Women in Modern Terrorism: From Liberations Wars to Global Terrorism and the Islamic State (2017), and Illicit Money: Financing Terrorism in the 21st Century (2021).&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e312ae7c-114b-4e4f-9ce1-8bf50ddb7a27_2344x2049.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2024-12-19T14:01:22.460Z&quot;,&quot;cover_image&quot;:&quot;https://images.unsplash.com/photo-1727529269745-ec6470562db4?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxN3x8b3R0YXdhfGVufDB8fHx8MTczNDYwODg3M3ww&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/fare-thee-well-canadian-financial&quot;,&quot;section_name&quot;:&quot;Commentary&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:153357792,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:0,&quot;comment_count&quot;:1,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee6d6275-21f4-4f93-beb3-0ccf9c112d29_900x900.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><h3>Illicit Finance Headlines</h3><h4>Bigger Fines, More Compliance?</h4><p>There are two main headlines for me. The first is the enhancement of FINTRAC&#8217;s administrative monetary penalty regime. FINTRAC, Canada&#8217;s financial intelligence unit, is also the regulator for financial entities.  These entities (banks, money service businesses like Western Union, and many others) are required to report suspicious and threshold transactions. This includes cash deposits and international wire transfers of $10,000 or more, among other things. When financial entities fail to meet these obligations, FINTRAC has the ability to administer monetary penalties. You will likely remember the recent fines against <a href="https://fintrac-canafe.canada.ca/pen/4-eng">RBC, CIBC and TD Bank</a>, all of which were over $1 million.</p><p>FINTRAC&#8217;s penalty regime has been under scrutiny for years because of the small value of its fines. It was hard to argue that compliance fines were a significant incentive to comply with reporting obligations when they topped out at a few million dollars. This might seem like a lot for an individual, but for many financial institutions, it was hardly more than a rounding error, if that.</p><p>Under the new proposal, the maximum penalties would be $4 million for individuals and $20 million for entities (an increase from $100,000 for individuals and $500,000 for entities). These violations can be stacked. For instance, <a href="https://fintrac-canafe.canada.ca/pen/amps/pen-2024-05-02-eng">TD Bank was fined $9.3 million</a> for five violations (of which there were many instances). I can&#8217;t explain exactly how the math works out, but basically, FINTRAC has the ability to issue penalties for each violation and instance of violations.</p><p>There are limits to the penalties. For individuals, this is <strong>the greater of</strong> $4 million and 3% of the person&#8217;s gross global income. For entities, this is the greater of $20 million and 3% of the entity&#8217;s gross global revenue. So, keeping with our example of TD Bank, it is conceivable that they could have faced far greater fines, limited only by 3% of their 2023 revenues. For reference, <a href="https://stories.td.com/ca/en/news/2023-11-30-td-bank-group-reports-fourth-quarter-and-fiscal-2023-results">3% of $2.9 billion</a> is $87 million. This is still a far cry from the penalty they faced in the United States, which was <a href="https://www.cbc.ca/news/business/td-bank-penalties-1.7348819">$3.1 billion</a>, but is also proportional to their Canadian revenues.</p><p>Also interesting is the addition of compliance order violations, which are (as far as I can see) new, and have even bigger penalties than original compliance violations, of $5 million and $30 million for individuals and entities, respectively. This makes sense. Once financial entities are under compliance orders, failure to abide by those orders is serious. The Trudeau government promised us increased criminal liability for serious non-compliance, and this is what I think we get instead of that. </p><p>Personally, I&#8217;d have preferred more serious criminal liability in these cases. Still, frankly, we have a limited ability to investigate and prosecute criminal non-compliance as it is, so I think this is actually the most feasible way to improve compliance.</p><h4>Cash Limits, Big Implications</h4><p>The second impactful amendment, in my view, is the one on cash transactions. While professions and businesses have long been required to report cash transactions of $10k or more, this new legislation will outlaw those transactions in their entirety. Casinos, in particular, will no longer be allowed to accept cash buy-ins of $10,000 or more, which will have the effect of driving cash deposits to financial institutions and entities. The idea here is that these institutions are better able to manage the risk (and reporting) associated with cash transactions of this nature. While this isn&#8217;t the part of the Bill that will garner headlines, I believe it is likely to be the most consequential amendment for disrupting illicit financing throughout the entire bill.</p><p>Yes, criminals will still have cash, and they will still launder it. But the number of places they are able to do so (particularly through the first stage of money laundering, <a href="https://www.theglobeandmail.com/business/economy/article-financial-crime-laws-border-security-bill-ottawa-laundering/">placement into the financial system</a>) will be limited. This will increase friction for criminals, which is the whole point. If a regime creates enough friction, it reduces profit for criminals. </p><h4>Housekeeping</h4><p>There are also a few other amendments that, in my view, are more like housekeeping for our illicit finance regime. These include making sure that information sharing for public-private partnerships is on firmer footing. (Specifically, the Integrated Money Laundering Intelligence Partnership between banks and law enforcement, but the new legislation is drafted to include terrorist financing and sanctions evasion, thus covering all of FINTRAC&#8217;s mandate.) FINTRAC will also be able to share disclosures with the Commissioner of Elections Canada, which will help on the foreign interference issue, and was a recommendation <a href="https://newsletter.insightthreatintel.com/p/foreign-interference-financing?utm_source=publication-search">I made at the foreign interference commission</a>. There are also other smaller amendments that I think are less impactful but will likely help FINTRAC do its business, such as universal enrolment for reporting entities and having FINTRAC&#8217;s Director a member of an OSFI (bank supervisor) committee. </p><h3>More Amendments, Little Illicit Finance Impact</h3><p>If you&#8217;re reading this and wondering how this will help &#8220;combat transnational organized crime, stop the flow of illegal fentanyl, and crack down on money laundering&#8221;, you&#8217;re not alone. Most of these amendments do very little to move the yardstick on these issues.</p><p>And of course, this Bill still has to pass through committees in both the House and the Senate, and survive a vote in the House of Commons. In a minority parliament, that is a challenging task. The opposition could drag out the committee process, and the government will have to find a few members of the House to support the bill. Alternatively, some members of the opposition might be absent from the House that day, thus creating an easy path for the Bill to pass. </p><p>Regardless of what happens with the Bill, the big issues preventing meaningful action on organized crime and money laundering remain: an RCMP desperately in need of reform to effectively investigate these crimes, a lack of analytic and investigative capability (mostly in terms of numbers although upskilling is a huge challenge when resources are stretched), and a lack of government prioritization (and resources). Those of you with eagle eyes will see that there&#8217;s nothing here on establishing a Canadian Financial Crimes Agency, or fixing the RCMP&#8217;s mandate so that they are better able to investigate these issues.</p><p>So here we are, with yet another Canadian government paying lip service to combating illicit finance, yet doing very little about it in practice.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/p/from-housekeeping-to-high-stakes?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/p/from-housekeeping-to-high-stakes?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p><em>Did you find this article insightful? Please share it with a friend and help us grow our community of individuals working to make the world a safer and fairer place for everyone. </em></p><div><hr></div><h4><strong>Financial Intelligence Fundamentals</strong></h4><p><em>Do you want to learn more about financial intelligence and how to use it in research, investigations, and analysis? Our financial intelligence fundamentals course is for you! This course is perfect for people new to financial intelligence and seasoned professionals. <a href="https://insightthreatintelligence.thinkific.com/courses/introFININT">Enroll today</a></em></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://insightthreatintelligence.thinkific.com/courses/introFININT" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!8tvZ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png 424w, https://substackcdn.com/image/fetch/$s_!8tvZ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png 848w, https://substackcdn.com/image/fetch/$s_!8tvZ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png 1272w, https://substackcdn.com/image/fetch/$s_!8tvZ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!8tvZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png" width="905" height="496" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:496,&quot;width&quot;:905,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:731766,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://insightthreatintelligence.thinkific.com/courses/introFININT&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!8tvZ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png 424w, https://substackcdn.com/image/fetch/$s_!8tvZ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png 848w, https://substackcdn.com/image/fetch/$s_!8tvZ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png 1272w, https://substackcdn.com/image/fetch/$s_!8tvZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><p></p><p><em>&#169; 2025 Insight Threat Intelligence Ltd. All Rights Reserved.<br><br>This newsletter and its contents are protected by Canadian copyright law. Except as otherwise provided for under Canadian copyright law, this newsletter and its contents may not be copied, published, distributed, downloaded or otherwise stored in a retrieval system, transmitted or converted, in any form or by any means, electronic or otherwise, without the prior written permission of the copyright owner.</em></p>]]></content:encoded></item><item><title><![CDATA[Security and Intelligence Priorities for the Carney Government]]></title><description><![CDATA[What a week it&#8217;s been!]]></description><link>https://newsletter.insightthreatintel.com/p/security-and-intelligence-priorities</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/security-and-intelligence-priorities</guid><dc:creator><![CDATA[Jessica Davis, PhD]]></dc:creator><pubDate>Wed, 07 May 2025 13:02:43 GMT</pubDate><enclosure url="https://images.unsplash.com/photo-1565535941810-e9892acd7704?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxNnx8Y2FuYWRhfGVufDB8fHx8MTc0NjYxNzY2Nnww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>What a week it&#8217;s been! Last week, I was in Doha, Qatar, for the <a href="https://globalsecurityforum.com">Global Security Forum</a>. This is my third year attending the forum, and it was as good as ever. This event helps me set my research priorities for the year and is a great chance to engage globally on a host of issues with a wide variety of partners, clients, and collaborators. The timing couldn&#8217;t have been better &#8211; I got to talk Canadian politics with people who probably gave almost no thought to Canadian politics before (everyone was asking me about the election!). There was even some talk of Canada&#8217;s place in the world, with some arguing we are well-positioned to join the European Union (a move I support if only for the cheese). It was a great time to consider Canada&#8217;s place in the world and where Canada should go next.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://images.unsplash.com/photo-1565535941810-e9892acd7704?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxNnx8Y2FuYWRhfGVufDB8fHx8MTc0NjYxNzY2Nnww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://images.unsplash.com/photo-1565535941810-e9892acd7704?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxNnx8Y2FuYWRhfGVufDB8fHx8MTc0NjYxNzY2Nnww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1565535941810-e9892acd7704?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxNnx8Y2FuYWRhfGVufDB8fHx8MTc0NjYxNzY2Nnww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1565535941810-e9892acd7704?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxNnx8Y2FuYWRhfGVufDB8fHx8MTc0NjYxNzY2Nnww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1565535941810-e9892acd7704?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxNnx8Y2FuYWRhfGVufDB8fHx8MTc0NjYxNzY2Nnww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1456w" sizes="100vw"><img src="https://images.unsplash.com/photo-1565535941810-e9892acd7704?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxNnx8Y2FuYWRhfGVufDB8fHx8MTc0NjYxNzY2Nnww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" width="369" height="276.75" data-attrs="{&quot;src&quot;:&quot;https://images.unsplash.com/photo-1565535941810-e9892acd7704?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxNnx8Y2FuYWRhfGVufDB8fHx8MTc0NjYxNzY2Nnww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:3024,&quot;width&quot;:4032,&quot;resizeWidth&quot;:369,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Canada passport&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Canada passport" title="Canada passport" srcset="https://images.unsplash.com/photo-1565535941810-e9892acd7704?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxNnx8Y2FuYWRhfGVufDB8fHx8MTc0NjYxNzY2Nnww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1565535941810-e9892acd7704?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxNnx8Y2FuYWRhfGVufDB8fHx8MTc0NjYxNzY2Nnww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1565535941810-e9892acd7704?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxNnx8Y2FuYWRhfGVufDB8fHx8MTc0NjYxNzY2Nnww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1565535941810-e9892acd7704?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxNnx8Y2FuYWRhfGVufDB8fHx8MTc0NjYxNzY2Nnww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo by <a href="true">Jaimie Harmsen</a> on <a href="https://unsplash.com">Unsplash</a></figcaption></figure></div><p>Following the Liberal election victory,<a href="https://substack.com/home/post/p-162891623"> Stephanie Carvin laid out her national security priorities</a> for the Carney government on her Substack. We&#8217;ve agreed (along with our co-host, Leah West) to do our final episode of Secure Line on this topic. </p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Insight Monitor is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>This promises to be a heady mix of issues for Canada, both domestic and international. Before this episode, I thought I&#8217;d lay out some of my logic and rationale for what I believe the Carney government&#8217;s top four national security priorities should be. A quick disclaimer: I chose four to align with Stephanie&#8217;s list. However, I also think that nothing is a priority if a government has anything more than a handful of priorities. So here are what I think the Carney government&#8217;s top four national security priorities should be:</p><h3>1. RCMP Reform</h3><p>Readers of this newsletter will not find this surprising. I&#8217;ve long been critical of the RCMP&#8217;s underperformance in matters of national security. Much of this is driven by structural issues and the overly broad mandate of the RCMP, which focuses on both federal and local policing. The RCMP also has many other responsibilities and activities that contribute to policing across Canada. This broad mandate has made it difficult for the RCMP to protect resources for long and complex investigations like financial crimes, as community policing resourcing often takes priority. Former Prime Minister Trudeau discussed this in his <a href="https://www.cbc.ca/news/politics/trudeau-rcmp-reform-federal-contract-1.7478761">white paper</a>, which he released on his last day in office. There&#8217;s a strong case to be made for separating federal policing responsibilities from contract policing, either under a functionally separate structure or a new enforcement agency. This is an issue whose time has come. I&#8217;ll likely have more to say about this shortly.</p><p>Along with RCMP reform, we need to do something about financial crimes enforcement. One option that the <a href="https://liberal.ca/our-platform/canada-financial-crimes-agency/">Trudeau government pursued</a>, but did not execute, was the creation of a financial crimes agency. From my perspective, I see two different models. Creating a standalone financial crimes agency would be beneficial without RCMP reform. However, financial crimes are intricately linked to all federal crimes, like espionage, foreign interference, serious organized crime, professional money laundering, sanctions evasion, terrorism, and political corruption. Because of this, the best solution for Canada is a reformed RCMP with a more explicit mandate, protected resources for federal policing (or even a standalone federal policing RCMP), which includes financial crimes. But if that doesn&#8217;t happen, a standalone financial crimes agency is the next best option.</p><p>One thing I don&#8217;t think we need to prioritize now is terrorism and violent extremism. That&#8217;s not to say that I don&#8217;t think it&#8217;s an issue &#8211; it certainly is! </p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;ef3c4721-0456-4d01-8946-54d7d21b57f8&quot;,&quot;caption&quot;:&quot;The terrorist attack in New Orleans this year has reignited the discussion about terrorism in the US, and, by extension, Canada. Some media outlets have talked about the return of ISIL (they never went away), while some experts have talked about the&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Terror on the Rise: What the increase in terrorism charges in Canada can tell us about the threat&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:33479672,&quot;name&quot;:&quot;Jessica Davis&quot;,&quot;bio&quot;:&quot;Dr. Jessica Davis is President of Insight Threat Intelligence and is the author of Women in Modern Terrorism: From Liberations Wars to Global Terrorism and the Islamic State (2017), and Illicit Money: Financing Terrorism in the 21st Century (2021).&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e312ae7c-114b-4e4f-9ce1-8bf50ddb7a27_2344x2049.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100},{&quot;id&quot;:2410581,&quot;name&quot;:&quot;Brett Williams&quot;,&quot;bio&quot;:&quot;Librarian. Skeptic. Geek.&quot;,&quot;photo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1102bdc4-37a8-49b2-a1b6-69f7d3df8ba6_2946x2104.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2025-01-08T13:27:55.415Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fceb5244d-2b96-443e-9b83-0bb1917cece6_1024x768.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/terror-on-the-rise-what-the-increase&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:154292004,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:8,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee6d6275-21f4-4f93-beb3-0ccf9c112d29_900x900.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>What I think, however, is that our systems are working pretty well in that regard. We&#8217;re seeing preventative arrests and peace bonds, and a generally low level of terrorism (compared internationally, despite it being a high threat level compared to Canadian history). In fact, I&#8217;d argue that this type of policing is the thing the RCMP does best. Does that mean it&#8217;s perfect? Of course not: I&#8217;d love to see more after-actions and lessons learned shaping policy and operations to fine-tune this process. But does the RCMP succeed in threat-to-life investigations? Broadly speaking, yes. So this isn&#8217;t the place where I think we need to place our priorities (for now). We need to maintain and fine-tune our approach.</p><h3>2. Enhanced and expanded intelligence relationships beyond the US</h3><p>The United States is Canada&#8217;s main intelligence partner. There is no doubt in my mind that this continues to be true. However, given what&#8217;s happening in the United States with some senior appointments and their concerning views on one of our main adversaries (Russia), the gutting of the FBI, staff reductions at intelligence agencies, and the overall antagonistic relationship with Canada that Trump seems intent on pursuing, this cannot continue. Canada needs to diversify its intelligence relationships beyond the US, eventually looking to replace the importance of that relationship with a network of new and expanded intelligence sharing agreements.</p><p>Of course, Canada has existing intelligence relationships beyond the US. We have the other members of the Five Eyes, and intelligence sharing with them can often be very robust, sometimes even surpassing intelligence sharing with the US on specific issues and operations. Beyond the Five Eyes, we also have intelligence sharing agreements with other European countries and countries around the world. All of these existing agreements need to be nurtured. We need to spend far more time strategically cultivating these relationships on areas of mutual interest to create redundancies in our intelligence relationships and networks, and diversify away from the United States. Shared interests should dictate intelligence relationships: We increasingly have fewer and fewer shared interests with the United States, and our intelligence apparatus should respond accordingly.</p><h3>3. Enhanced collection and use of intelligence for economic security and trade</h3><p>What are Canadian interests when it comes to intelligence collection and sharing? Certainly, security issues like terrorism, foreign interference and espionage are critical. However, I would go beyond this and argue that Canadian interests that should be supported by robust intelligence collection relate primarily to economic security and trade. That&#8217;s not to say that this capability doesn&#8217;t exist: it does. Canada already has a strong program on economic security, and some support for trade from intelligence. But if our current capabilities sit at a 5/10, we should be turning that up to a 9/10 or a 10/10. This would provide Canada (and our allies) with crucial intelligence, and support the development of trade relationships worldwide, helping us diversify away from the United States.</p><p>This is also a place where Canada could develop a very niche area of expertise. We already have a head start and expertise with the Investment Canada Act and supporting intelligence activities. Canada could use this expertise to support our allies, security and trade partners, and shore up those critical networks.</p><p>One additional capability that would be useful on this front would be the creation of a foreign human intelligence agency. Canada already collects some foreign intelligence through a variety of capabilities, but a human foreign intelligence agency would provide a unique set of capabilities, support economic security and trade development, give Canada unique intelligence to share with our enhanced network of intelligence partnerships. It&#8217;s critical to remember that intelligence relationships are often based on the principle of &#8220;Give To Get&#8221;, so we have to have something worth giving to get useful intelligence in return. I don&#8217;t see this as a short-term solution, but certainly, the policy work to develop this could be started, perhaps through a secretariat at Public Safety. There are years of policy and implementation work ahead of this happening, so it would be a good idea to get started now, to support broader intelligence and security priorities.</p><h3>4. Sanctions regime for criminal and cyber actors</h3><p>Finally, Canada should prioritize creating a sanctions regime for criminal and cyber actors. Our partners in the US and the UK already have this capability: to list criminal actors and cyber gangs, and subject them to financial and administrative restrictions. In Canada, we cannot list, for instance, ransomware gangs, under any of our existing sanctions regimes. (There might be some instances where we could squint and make the case under the terrorism listings regime, or SEMA, but these would be a stretch and an inelegant, and possibly unlawful, use of these regimes.) Instead, Canada should create a dedicated regime to target these actors.</p><p>This is a pressing issue because Canada is one of the most targeted countries for ransomware actors. Having a sanctions regime would allow Canada to restrict the movement of funds to these criminal actors, which could have a deterrent effect on their activities targeting Canadians. It would also enhance the tools that we could bring to bear on these actors, and align us with our partners in the UK and the US to target criminal entities. Enhanced intelligence activities on economic security would also facilitate this sanctions regime. Ransomware actors target Canadian critical infrastructure, including hospitals, as well as universities, so establishing a sanctions regime against criminal actors could be beneficial. It could also be used against international criminal organizations, and if done correctly, might unlock new investigative tools to facilitate complex investigations.</p><p>We&#8217;re going to talk this through next week for Secure Line, so you&#8217;ll get more details and debate on these proposed priorities. You&#8217;ll want to tune in to find out what Leah and Stephanie think, so keep an eye on your podcast feeds later next week. In the meantime, you can get caught up on the first season of Secure Line here, on YouTube, or wherever you get your podcasts.</p><iframe class="spotify-wrap podcast" data-attrs="{&quot;image&quot;:&quot;https://i.scdn.co/image/ab6765630000ba8af4e0627dc962c8bb17e3da71&quot;,&quot;title&quot;:&quot;Secure Line&quot;,&quot;subtitle&quot;:&quot;Jessica Davis, Stephanie Carvin, Leah West (A CASIS podcast) &quot;,&quot;description&quot;:&quot;Podcast&quot;,&quot;url&quot;:&quot;https://open.spotify.com/show/3p2sEFIXkjaA5ffxXEMBDL&quot;,&quot;belowTheFold&quot;:true,&quot;noScroll&quot;:false}" src="https://open.spotify.com/embed/show/3p2sEFIXkjaA5ffxXEMBDL" frameborder="0" gesture="media" allowfullscreen="true" allow="encrypted-media" loading="lazy" data-component-name="Spotify2ToDOM"></iframe><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/p/security-and-intelligence-priorities?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/p/security-and-intelligence-priorities?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><div><hr></div><h4><strong>Financial Intelligence Fundamentals</strong></h4><p><em>Do you want to learn more about financial intelligence and how to use it in research, investigations, and analysis? Our financial intelligence fundamentals course is for you! This course is perfect for people new to financial intelligence and seasoned professionals. <a href="https://insightthreatintelligence.thinkific.com/courses/introFININT">Enroll today</a></em></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://insightthreatintelligence.thinkific.com/courses/introFININT" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!8tvZ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png 424w, https://substackcdn.com/image/fetch/$s_!8tvZ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png 848w, https://substackcdn.com/image/fetch/$s_!8tvZ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png 1272w, https://substackcdn.com/image/fetch/$s_!8tvZ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!8tvZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png" width="905" height="496" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:496,&quot;width&quot;:905,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:731766,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://insightthreatintelligence.thinkific.com/courses/introFININT&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!8tvZ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png 424w, https://substackcdn.com/image/fetch/$s_!8tvZ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png 848w, https://substackcdn.com/image/fetch/$s_!8tvZ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png 1272w, https://substackcdn.com/image/fetch/$s_!8tvZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><p><em>&#169; 2025 Insight Threat Intelligence Ltd. All Rights Reserved.<br><br>This newsletter and its contents are protected by Canadian copyright law. Except as otherwise provided for under Canadian copyright law, this newsletter and its contents may not be copied, published, distributed, downloaded or otherwise stored in a retrieval system, transmitted or converted, in any form or by any means, electronic or otherwise, without the prior written permission of the copyright owner.</em></p>]]></content:encoded></item><item><title><![CDATA[The Merits of Designating Terrorgram?]]></title><description><![CDATA[Last month, Australia imposed financial sanctions on Terrorgram, defining the entity as &#8220;an online network that promotes white supremacy and racially motivated violence.&#8221; This move follows similar actions by the United Kingdom and the United States.]]></description><link>https://newsletter.insightthreatintel.com/p/the-merits-of-designating-terrorgram</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/the-merits-of-designating-terrorgram</guid><dc:creator><![CDATA[Elena Martynova]]></dc:creator><pubDate>Thu, 13 Mar 2025 14:03:14 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!KRZH!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e7e31cc-bf82-40ae-ae5b-9b57162d5d99_1024x608.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Last month, Australia <a href="https://www.foreignminister.gov.au/minister/penny-wong/media-release/new-counter-terrorism-financing-sanctions">imposed financial sanctions</a> on Terrorgram, defining the entity as &#8220;an online network that promotes white supremacy and racially motivated violence.&#8221; This move follows similar actions by the United Kingdom and the United States. Given Canada&#8217;s recent wave of designating new entities (specifically targeting criminal organizations), should we follow suit and list Terrorgram as a terrorist entity? </em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/subscribe?"><span>Subscribe now</span></a></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!KRZH!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e7e31cc-bf82-40ae-ae5b-9b57162d5d99_1024x608.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!KRZH!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e7e31cc-bf82-40ae-ae5b-9b57162d5d99_1024x608.png 424w, https://substackcdn.com/image/fetch/$s_!KRZH!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e7e31cc-bf82-40ae-ae5b-9b57162d5d99_1024x608.png 848w, https://substackcdn.com/image/fetch/$s_!KRZH!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e7e31cc-bf82-40ae-ae5b-9b57162d5d99_1024x608.png 1272w, https://substackcdn.com/image/fetch/$s_!KRZH!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e7e31cc-bf82-40ae-ae5b-9b57162d5d99_1024x608.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!KRZH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e7e31cc-bf82-40ae-ae5b-9b57162d5d99_1024x608.png" width="1024" height="608" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0e7e31cc-bf82-40ae-ae5b-9b57162d5d99_1024x608.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:&quot;normal&quot;,&quot;height&quot;:608,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!KRZH!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e7e31cc-bf82-40ae-ae5b-9b57162d5d99_1024x608.png 424w, https://substackcdn.com/image/fetch/$s_!KRZH!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e7e31cc-bf82-40ae-ae5b-9b57162d5d99_1024x608.png 848w, https://substackcdn.com/image/fetch/$s_!KRZH!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e7e31cc-bf82-40ae-ae5b-9b57162d5d99_1024x608.png 1272w, https://substackcdn.com/image/fetch/$s_!KRZH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e7e31cc-bf82-40ae-ae5b-9b57162d5d99_1024x608.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Source: Substack Image Generation</figcaption></figure></div><h3><strong>What is Terrorgram?</strong></h3><p>As outlined in <a href="https://newsletter.insightthreatintel.com/p/greenwashing-hate-ecofascism-and">Insight Monitor&#8217;s coverage of Ecofascism</a>, Terrorgram functions as a writing collective composed of anonymous but influential Nazi accelerationist figures and social media personalities. It has become a major producer of accelerationist propaganda, and draws inspiration from an evolving strain of neo-Nazism originating from Iron March. The network deifies figures such as Brenton Tarrant, Anders Breivik, and Ted Kaczynski, along with other mass murderers they refer to as &#8220;saints.&#8221;</p><div class="embedded-post-wrap" data-attrs="{&quot;id&quot;:150666976,&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/p/greenwashing-hate-ecofascism-and&quot;,&quot;publication_id&quot;:329102,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee6d6275-21f4-4f93-beb3-0ccf9c112d29_900x900.png&quot;,&quot;title&quot;:&quot;Greenwashing Hate: Ecofascism and Finance&quot;,&quot;truncated_body_text&quot;:&quot;Hello Insight Monitor subscribers! Today, we&#8217;re looking at ecofascism and some of the financial connections that underpin this movement. This article provides an ideological and historical overview of the movement and its intersections with other elements of the far and extreme right. Let us know what you think of this article in the comments, and thanks, as always, for caring about illicit finance and global security.&quot;,&quot;date&quot;:&quot;2024-10-29T13:03:04.363Z&quot;,&quot;like_count&quot;:1,&quot;comment_count&quot;:0,&quot;bylines&quot;:[{&quot;id&quot;:80301532,&quot;name&quot;:&quot;Dan Collen&quot;,&quot;handle&quot;:&quot;dancollen&quot;,&quot;previous_name&quot;:null,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e61b8cf8-6c08-4fc9-b9cd-a8c8ba95e0e9_640x640.jpeg&quot;,&quot;bio&quot;:&quot;Canadian researcher who writes about digital media, disinformation, and hate movements. Co-creator of Hatepedia.ca. Bylines in Insight Monitor, Canadian Anti-Hate Network, Global Network on Extremism and Technology, vice.com. He/Him.&quot;,&quot;profile_set_up_at&quot;:&quot;2023-03-08T14:24:52.728Z&quot;,&quot;publicationUsers&quot;:[{&quot;id&quot;:3979907,&quot;user_id&quot;:80301532,&quot;publication_id&quot;:3903420,&quot;role&quot;:&quot;admin&quot;,&quot;public&quot;:true,&quot;is_primary&quot;:false,&quot;publication&quot;:{&quot;id&quot;:3903420,&quot;name&quot;:&quot;Spineless and Literal&quot;,&quot;subdomain&quot;:&quot;spinelessandliteral&quot;,&quot;custom_domain&quot;:null,&quot;custom_domain_optional&quot;:false,&quot;hero_text&quot;:&quot;Spineless and Literal is a newsletter about the intersection of violent extremism and culture by Dan Collen. It is written with the belief that hate should be recognized but never normalized. &quot;,&quot;logo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0a0c31fe-50c7-4c27-902a-583f0c823c30_109x109.png&quot;,&quot;author_id&quot;:80301532,&quot;theme_var_background_pop&quot;:&quot;#FF6719&quot;,&quot;created_at&quot;:&quot;2025-01-26T19:57:24.926Z&quot;,&quot;email_from_name&quot;:null,&quot;copyright&quot;:&quot;Dan Collen&quot;,&quot;founding_plan_name&quot;:null,&quot;community_enabled&quot;:true,&quot;invite_only&quot;:false,&quot;payments_state&quot;:&quot;disabled&quot;,&quot;language&quot;:null,&quot;explicit&quot;:false,&quot;is_personal_mode&quot;:false}},{&quot;id&quot;:2080082,&quot;user_id&quot;:80301532,&quot;publication_id&quot;:329102,&quot;role&quot;:&quot;contributor&quot;,&quot;public&quot;:true,&quot;is_primary&quot;:false,&quot;publication&quot;:{&quot;id&quot;:329102,&quot;name&quot;:&quot;Insight Monitor&quot;,&quot;subdomain&quot;:&quot;insightintel&quot;,&quot;custom_domain&quot;:&quot;newsletter.insightthreatintel.com&quot;,&quot;custom_domain_optional&quot;:false,&quot;hero_text&quot;:&quot;Global security, terrorism, espionage and illicit financing -- news and analysis you won't find anywhere else! &quot;,&quot;logo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ee6d6275-21f4-4f93-beb3-0ccf9c112d29_900x900.png&quot;,&quot;author_id&quot;:33479672,&quot;theme_var_background_pop&quot;:&quot;#FF5CD7&quot;,&quot;created_at&quot;:&quot;2021-04-05T14:36:24.139Z&quot;,&quot;email_from_name&quot;:&quot;Insight Threat Intelligence&quot;,&quot;copyright&quot;:&quot;Jessica Davis&quot;,&quot;founding_plan_name&quot;:&quot;Founding Member&quot;,&quot;community_enabled&quot;:true,&quot;invite_only&quot;:false,&quot;payments_state&quot;:&quot;enabled&quot;,&quot;language&quot;:null,&quot;explicit&quot;:false,&quot;is_personal_mode&quot;:false}}],&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;utm_campaign&quot;:null,&quot;belowTheFold&quot;:false,&quot;type&quot;:&quot;newsletter&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="EmbeddedPostToDOM"><a class="embedded-post" native="true" href="https://newsletter.insightthreatintel.com/p/greenwashing-hate-ecofascism-and?utm_source=substack&amp;utm_campaign=post_embed&amp;utm_medium=web"><div class="embedded-post-header"><img class="embedded-post-publication-logo" src="https://substackcdn.com/image/fetch/$s_!i6d1!,w_56,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee6d6275-21f4-4f93-beb3-0ccf9c112d29_900x900.png"><span class="embedded-post-publication-name">Insight Monitor</span></div><div class="embedded-post-title-wrapper"><div class="embedded-post-title">Greenwashing Hate: Ecofascism and Finance</div></div><div class="embedded-post-body">Hello Insight Monitor subscribers! Today, we&#8217;re looking at ecofascism and some of the financial connections that underpin this movement. This article provides an ideological and historical overview of the movement and its intersections with other elements of the far and extreme right. Let us know what you think of this article in the comments, and thanks, as always, for caring about illicit finance and global security&#8230;</div><div class="embedded-post-cta-wrapper"><span class="embedded-post-cta">Read more</span></div><div class="embedded-post-meta">a year ago &#183; 1 like &#183; Dan Collen</div></a></div><p>A defining behavior of the network is its reliance on Telegram as a hub for announcing new extremist groups, recruiting members, and disseminating propaganda. While Telegram serves as its core platform, Terrorgram-affiliated groups also expanded to mainstream social media to reinforce their messaging and amplify allied organizations &#8211; however, the presence on these other platforms often does not last as long due to content moderation. <a href="https://www.techagainstterrorism.org/hubfs/CTEC__TAT-Accelerationism-Report-.pdf">Tech Against Terrorism</a> identified 21 entities operating as part of Terrorgram between June 2021 and February 2022, noting that these groups were distinct but appeared to be strategically allied.</p><p>Over the past year, the collective has faced significant setbacks as <a href="https://leftcoastrightwatch.org/articles/heres-the-gore-artist-turning-terrorgram-manuals-manifestos-into-audiobooks/">antifascist activists</a> identified individuals in <a href="https://www.vice.com/en/article/neo-nazis-arrested/">Canada</a> and the <a href="https://www.justice.gov/archives/opa/pr/leaders-transnational-terrorist-group-charged-soliciting-hate-crimes-soliciting-murder">United States</a> as part of the network. This has led to the arrest of multiple members on <a href="https://www.justice.gov/opa/pr/leaders-transnational-terrorist-group-charged-soliciting-hate-crimes-soliciting-murder">terrorism charges</a>, disrupting Terrorgram&#8217;s ability to operate freely.</p>
      <p>
          <a href="https://newsletter.insightthreatintel.com/p/the-merits-of-designating-terrorgram">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Insight Monitor Dispatches]]></title><description><![CDATA[Critical news and updates from the Insight Threat Intelligence Team]]></description><link>https://newsletter.insightthreatintel.com/p/insight-monitor-dispatches-039</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/insight-monitor-dispatches-039</guid><dc:creator><![CDATA[Jessica Davis, PhD]]></dc:creator><pubDate>Tue, 25 Feb 2025 19:51:32 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/5ef9a664-e40f-46a1-800f-9dadf227dab6_1024x1024.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Hello, <strong>Insight Monitor</strong> subscribers! I hope this newsletter finds you, because we have a couple of important updates. Let&#8217;s get to it!</em></p><p>First, a request. As most of you know, our <a href="https://newsletter.insightthreatintel.com/p/global-terrorism-financing-report-7ef">Global Terrorist Financing Report</a> comes out twice a month, and covers all the terrorist financing news from around the world. We&#8217;re going to expand that to include covering the newly minted terrorist organizations that are actually criminal organizations (Mexican Drug Trafficking Organizations, primarily). While I don&#8217;t agree with the listing / designation, the reality is is that because both the US and Canada think these are terrorist groups, we&#8217;re going to analyze them as such. Don&#8217;t worry, we&#8217;ll keep this in a separate section of our newsletter so you can skip it if it doesn&#8217;t apply to you. </p><p>But, relatedly, <strong>this is going to increase our team&#8217;s workload</strong>.  Already, this portion of the newsletter c<strong>osts us thousands of dollars every year to produce</strong>. We think it&#8217;s a valuable resource, and from what some of you have told me, you agree. So: in order to keep this news roundup happening, we are going to need to </p><ul><li><p>a) increase our paid subscriber base, and </p></li><li><p>b) put the news roundup behind a paywall right from the start. </p></li></ul><p>I know this will disappoint some of you,&#8212; this has been a free resource for years. But it hasn&#8217;t been free for us to create. </p><pre><code><strong>So here&#8217;s the ask: by the end of March, we need 30 more paid subscribers or we will have to stop producing the Global Terrorist Financing Report. It takes a lot of time and effort to find and curate all the articles, so we need to cover those costs. Subscribe and share so we can meet this goal and continue to produce this valuable resource! </strong></code></pre><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/subscribe?"><span>Subscribe now</span></a></p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;110ef16d-b41a-4f3a-8f7f-f22fe967a89c&quot;,&quot;caption&quot;:&quot;Hello, Insight Monitor subscribers, and welcome to another monthly roundup of all the news and analysis of terrorist financing you might have missed. As is becoming the norm, we have so much news from January that we had to split it into two newsletters. We&#8217;ll release the second half of the roundup next week. And if you can, please consider upgrading to&#8230;&quot;,&quot;cta&quot;:null,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Global Terrorism Financing Report &quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:2410581,&quot;name&quot;:&quot;Brett Williams&quot;,&quot;bio&quot;:&quot;Librarian. Skeptic. Geek.&quot;,&quot;photo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1102bdc4-37a8-49b2-a1b6-69f7d3df8ba6_2946x2104.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2025-02-20T14:03:38.190Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2eaee56f-810f-42a1-92cd-cbb93b3cabaa_1280x720.jpeg&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/global-terrorism-financing-report-7ef&quot;,&quot;section_name&quot;:&quot;News&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:157115280,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:4,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee6d6275-21f4-4f93-beb3-0ccf9c112d29_900x900.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><h3>Podcast Updates</h3><p>We&#8217;ve released two new episodes of Secure Line recently. The first features Global News reporter Stewart Bell talking about the terrorism threat in Canada. You won&#8217;t want to miss this, particularly in light of US retrenchment and its implications for counterterrorism. You can check it out here: </p><iframe class="spotify-wrap podcast" data-attrs="{&quot;image&quot;:&quot;https://i.scdn.co/image/ab6765630000ba8af4e0627dc962c8bb17e3da71&quot;,&quot;title&quot;:&quot;Terrorism Threat Medium?&quot;,&quot;subtitle&quot;:&quot;Jessica Davis, Stephanie Carvin, Leah West (A CASIS podcast) &quot;,&quot;description&quot;:&quot;Episode&quot;,&quot;url&quot;:&quot;https://open.spotify.com/episode/4FxyslqxD9oScaHrKyc87e&quot;,&quot;belowTheFold&quot;:true,&quot;noScroll&quot;:false}" src="https://open.spotify.com/embed/episode/4FxyslqxD9oScaHrKyc87e" frameborder="0" gesture="media" allowfullscreen="true" allow="encrypted-media" loading="lazy" data-component-name="Spotify2ToDOM"></iframe><p>Our episode &#8220;Implausible Deniability&#8221; was released today, and you can find it on all major platforms as well. We talk with Matthew Redhead about state threats, their intersection with organized crime, and his recent report &#8220;Old Wine in New Bottles&#8221;. It&#8217;s a must-listen for anyone interested in foreign interference and espionage. </p><iframe class="spotify-wrap podcast" data-attrs="{&quot;image&quot;:&quot;https://i.scdn.co/image/ab6765630000ba8af4e0627dc962c8bb17e3da71&quot;,&quot;title&quot;:&quot;Implausible Deniability: The New Age of State Threats&quot;,&quot;subtitle&quot;:&quot;Jessica Davis, Stephanie Carvin, Leah West (A CASIS podcast) &quot;,&quot;description&quot;:&quot;Episode&quot;,&quot;url&quot;:&quot;https://open.spotify.com/episode/1VG4U6DJnVusfdrPs06b2w&quot;,&quot;belowTheFold&quot;:true,&quot;noScroll&quot;:false}" src="https://open.spotify.com/embed/episode/1VG4U6DJnVusfdrPs06b2w" frameborder="0" gesture="media" allowfullscreen="true" allow="encrypted-media" loading="lazy" data-component-name="Spotify2ToDOM"></iframe><h3>Paywall Removed: Terror on the Rise</h3><p>By popular demand, we&#8217;ve removed the paywall on one of our recent analyses looking at the terrorism threat in Canada. Have a read, and let us know what you think! </p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;3d37a532-0492-4339-a7b8-977d38312157&quot;,&quot;caption&quot;:&quot;The terrorist attack in New Orleans this year has reignited the discussion about terrorism in the US, and, by extension, Canada. Some media outlets have talked about the return of ISIL (they never went away), while some experts have talked about the&quot;,&quot;cta&quot;:null,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;lg&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Terror on the Rise: What the increase in terrorism charges in Canada can tell us about the threat&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:33479672,&quot;name&quot;:&quot;Jessica Davis&quot;,&quot;bio&quot;:&quot;Dr. Jessica Davis is President of Insight Threat Intelligence and is the author of Women in Modern Terrorism: From Liberations Wars to Global Terrorism and the Islamic State (2017), and Illicit Money: Financing Terrorism in the 21st Century (2021).&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e312ae7c-114b-4e4f-9ce1-8bf50ddb7a27_2344x2049.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100},{&quot;id&quot;:2410581,&quot;name&quot;:&quot;Brett Williams&quot;,&quot;bio&quot;:&quot;Librarian. Skeptic. Geek.&quot;,&quot;photo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1102bdc4-37a8-49b2-a1b6-69f7d3df8ba6_2946x2104.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2025-01-08T13:27:55.415Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fceb5244d-2b96-443e-9b83-0bb1917cece6_1024x768.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/terror-on-the-rise-what-the-increase&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:154292004,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:7,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee6d6275-21f4-4f93-beb3-0ccf9c112d29_900x900.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>And in case you missed it, here&#8217;s another article without the paywall, part of our research reads series (aka the Insight Monitor bookclub). Be sure to check it out and update your knowledge on terrorist and illicit financing! </p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;4012a257-c4b0-4c14-b260-b2a40ad3c5ea&quot;,&quot;caption&quot;:&quot;Hello, Insight Monitor subscribers. Welcome to another week and a new research reads review. In this series, we review and summarize recent research in illicit financing, highlighting new data, insights, or findings that can inform how we counter this threat. I hope you find this insightful, and if you want to suggest a book or article for review, let u&#8230;&quot;,&quot;cta&quot;:null,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;lg&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Digital Dark Money: A Critical Review of Terrorist Financing via Cryptocurrency&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:33479672,&quot;name&quot;:&quot;Jessica Davis&quot;,&quot;bio&quot;:&quot;Dr. Jessica Davis is President of Insight Threat Intelligence and is the author of Women in Modern Terrorism: From Liberations Wars to Global Terrorism and the Islamic State (2017), and Illicit Money: Financing Terrorism in the 21st Century (2021).&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e312ae7c-114b-4e4f-9ce1-8bf50ddb7a27_2344x2049.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2025-02-18T14:01:55.274Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F733a8595-2af2-4b4c-9415-871b2132bd51_1792x1024.heic&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/digital-dark-money-a-critical-review&quot;,&quot;section_name&quot;:&quot;Research Reads&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:155931284,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:1,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee6d6275-21f4-4f93-beb3-0ccf9c112d29_900x900.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>That&#8217;s it for updates today. Remember, we&#8217;re doing a big subscription drive for the next five weeks, and we really need your support to keep doing what we love. If you can, please upgrade to paid, and if that&#8217;s not possible, sharing is caring! The more we grow our audience, the better! </p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/p/insight-monitor-dispatches-039?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/p/insight-monitor-dispatches-039?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p></p><p><em>&#169; 2025 Insight Threat Intelligence Ltd. All Rights Reserved.<br><br>This newsletter and its contents are protected by Canadian copyright law. Except as otherwise provided for under Canadian copyright law, this newsletter and its contents may not be copied, published, distributed, downloaded or otherwise stored in a retrieval system, transmitted or converted, in any form or by any means, electronic or otherwise, without the prior written permission of the copyright owner.</em></p>]]></content:encoded></item><item><title><![CDATA[Trade Wars and Dirty Money]]></title><description><![CDATA[Money laundering, fentanyl production, and criminal entities in Canada]]></description><link>https://newsletter.insightthreatintel.com/p/trade-wars-and-dirty-money</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/trade-wars-and-dirty-money</guid><dc:creator><![CDATA[Jessica Davis, PhD]]></dc:creator><pubDate>Tue, 04 Feb 2025 20:28:54 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!lw4m!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa404479f-b0bd-4d57-a5f9-09189dd13d0e_1792x1024.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>This week, President Trump threatened Canada with 25% tariffs. Part of his justification for this action was that organized crime groups in Canada export fentanyl to the United States.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a> There is little evidence to support this assertion, and a recent FINTRAC report indicates that most of the <a href="https://fintrac-canafe.canada.ca/intel/operation/iso-osi-eng.pdf">fentanyl produced in Canada</a> remains in the Canadian market.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-2" href="#footnote-2" target="_self">2</a> Regardless, in a deal to have the tariffs put on hold for 30 days, Prime Minister Justin Trudeau agreed to a s<a href="https://x.com/JustinTrudeau/status/1886529228193022429">eries of measures targeting</a> crime in Canada: </p><ul><li><p>$1.3 billion border plan (this had <a href="https://www.canada.ca/en/public-safety-canada/news/2024/12/the-government-of-canadas-border-plan-significant-investments-to-strengthen-border-security-and-our-immigration-system.html">previously been announced</a>) </p></li><li><p>Appointing a fentanyl czar</p></li><li><p>Listing cartels as terrorist organizations</p></li><li><p>Watching the border 24/7</p></li><li><p>Launching a joint Canada-U.S. strike force to target organized crime, fentanyl and money laundering</p></li><li><p>Signing a new intelligence directive on organized crime and fentanyl backed by $200 million </p></li></ul><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!lw4m!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa404479f-b0bd-4d57-a5f9-09189dd13d0e_1792x1024.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!lw4m!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa404479f-b0bd-4d57-a5f9-09189dd13d0e_1792x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!lw4m!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa404479f-b0bd-4d57-a5f9-09189dd13d0e_1792x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!lw4m!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa404479f-b0bd-4d57-a5f9-09189dd13d0e_1792x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!lw4m!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa404479f-b0bd-4d57-a5f9-09189dd13d0e_1792x1024.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!lw4m!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa404479f-b0bd-4d57-a5f9-09189dd13d0e_1792x1024.webp" width="1456" height="832" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a404479f-b0bd-4d57-a5f9-09189dd13d0e_1792x1024.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:832,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:671886,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/webp&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!lw4m!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa404479f-b0bd-4d57-a5f9-09189dd13d0e_1792x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!lw4m!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa404479f-b0bd-4d57-a5f9-09189dd13d0e_1792x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!lw4m!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa404479f-b0bd-4d57-a5f9-09189dd13d0e_1792x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!lw4m!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa404479f-b0bd-4d57-a5f9-09189dd13d0e_1792x1024.webp 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Insight Monitor is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>If some of this sounds like stuff Canada is already doing, that&#8217;s because it is. However, the last two points are likely new, and listing the cartels as terrorist organizations certainly is. While details are murky about what the joint Canada-U.S. &#8220;strike force&#8221; entails or the new intelligence directive, any efforts to combat money laundering and organized crime in Canada are welcome. </p><p>What exactly we&#8217;re going to do on the intelligence front is particularly unclear because, in Canada, we don&#8217;t really have &#8220;intelligence directives.&#8221; We have intelligence priorities, and combatting organized crime and illicit financing are a<a href="https://www.canada.ca/en/privy-council/services/publications/canada-intelligence-priorities.html">lready two priorities</a>. It might be a <a href="https://www.cbc.ca/news/politics/csis-ministerial-directive-1.6845542">Ministerial Directive</a> to law enforcement and intelligence services to do more on this issue. It&#8217;ll be interesting to see what, if any, details emerge because much of this is already happening. </p><p>Leaving that aside, let&#8217;s talk about two issues that Trudeau&#8217;s negotiations raise: the scope and scale of money laundering in Canada and listing cartels as terrorist entities. </p><h3>Money Laundering in Canada</h3><p>Like <a href="https://newsletter.insightthreatintel.com/p/attack-patterns-and-money-trails?utm_source=publication-search">terrorist financing</a>, there are several different ways to measure money laundering. In Canada, we frankly have no idea what the scope and scale of money laundering is. Our biggest issue is the lack of coherent and collated information on money laundering investigations, charges, prosecutions, and other forms of disruption.</p><p>However, we know plenty of suspected money laundering activity is happening in Canada. According to FINTRAC&#8217;s annual reports, the Centre shares thousands of disclosures with law enforcement about suspected money laundering in Canada yearly. Each disclosure could contain a single suspicious transaction or thousands of individual transactions. Still, in each case, disclosures must be shared based on reasonable grounds to suspect that the information would be relevant to a money laundering investigation. That&#8217;s a lot of possible money laundering. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!NUAl!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fad095465-0ffe-4a38-9b08-92fb4b7b1359_1498x856.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!NUAl!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fad095465-0ffe-4a38-9b08-92fb4b7b1359_1498x856.png 424w, https://substackcdn.com/image/fetch/$s_!NUAl!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fad095465-0ffe-4a38-9b08-92fb4b7b1359_1498x856.png 848w, https://substackcdn.com/image/fetch/$s_!NUAl!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fad095465-0ffe-4a38-9b08-92fb4b7b1359_1498x856.png 1272w, https://substackcdn.com/image/fetch/$s_!NUAl!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fad095465-0ffe-4a38-9b08-92fb4b7b1359_1498x856.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!NUAl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fad095465-0ffe-4a38-9b08-92fb4b7b1359_1498x856.png" width="1456" height="832" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ad095465-0ffe-4a38-9b08-92fb4b7b1359_1498x856.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:832,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:99427,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!NUAl!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fad095465-0ffe-4a38-9b08-92fb4b7b1359_1498x856.png 424w, https://substackcdn.com/image/fetch/$s_!NUAl!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fad095465-0ffe-4a38-9b08-92fb4b7b1359_1498x856.png 848w, https://substackcdn.com/image/fetch/$s_!NUAl!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fad095465-0ffe-4a38-9b08-92fb4b7b1359_1498x856.png 1272w, https://substackcdn.com/image/fetch/$s_!NUAl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fad095465-0ffe-4a38-9b08-92fb4b7b1359_1498x856.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Source: FINTRAC data compiled by Insight Threat Intelligence</figcaption></figure></div><p>There are also other measures of illicit activity in the Canadian economy: Canadian exposure to illicit crypto transactions. My friends at TRM Labs were kind enough to share their <a href="https://www.trmlabs.com/2024-crypto-adoption-and-illicit-activity-report">2024 Crypto Adoption and Illicit Exposure Report</a> with me, and there is some disturbing info in it. Their illicit crypto exposure index shows countries with the highest proportion of illicit crypto exposure. Canada is in the top ten this year for the first time, with the illustrious company of countries like Iran, North Korea, Nigeria, and Russia. This is not a good list to be on. The primary category of illicit activity in Canada? Sanctions evasion activity. </p><p>There are also the non-compliance disclosures that FINTRAC shares with law enforcement. These disclosures share information that rises above the usual regulatory failures and wades into potential criminal liability for not complying with the <em>Proceeds of Crime, Money Laundering, and Terrorist Financing Act</em>. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Ycnu!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa8fc2a9c-755c-4bd4-adbc-5a8d0a937a78_546x348.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Ycnu!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa8fc2a9c-755c-4bd4-adbc-5a8d0a937a78_546x348.png 424w, https://substackcdn.com/image/fetch/$s_!Ycnu!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa8fc2a9c-755c-4bd4-adbc-5a8d0a937a78_546x348.png 848w, https://substackcdn.com/image/fetch/$s_!Ycnu!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa8fc2a9c-755c-4bd4-adbc-5a8d0a937a78_546x348.png 1272w, https://substackcdn.com/image/fetch/$s_!Ycnu!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa8fc2a9c-755c-4bd4-adbc-5a8d0a937a78_546x348.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Ycnu!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa8fc2a9c-755c-4bd4-adbc-5a8d0a937a78_546x348.png" width="546" height="348" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a8fc2a9c-755c-4bd4-adbc-5a8d0a937a78_546x348.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:348,&quot;width&quot;:546,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:26042,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Ycnu!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa8fc2a9c-755c-4bd4-adbc-5a8d0a937a78_546x348.png 424w, https://substackcdn.com/image/fetch/$s_!Ycnu!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa8fc2a9c-755c-4bd4-adbc-5a8d0a937a78_546x348.png 848w, https://substackcdn.com/image/fetch/$s_!Ycnu!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa8fc2a9c-755c-4bd4-adbc-5a8d0a937a78_546x348.png 1272w, https://substackcdn.com/image/fetch/$s_!Ycnu!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa8fc2a9c-755c-4bd4-adbc-5a8d0a937a78_546x348.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">FINTRAC non-compliance disclosures. Data compiled by Insight Threat Intelligence</figcaption></figure></div><p>This often involves things like <a href="https://publications.gc.ca/collections/collection_2022/canafe-fintrac/FD4-26-2022-eng.pdf">professional money launderers</a> and informal value transfer systems. </p><p>Further, profit-motivated crime, particularly cybercrime, is rising in Canada. This often involves money laundering and organized crime.  Police-reported organized crime is also increasing in Canada (all data available from Statistics Canada).  Recent reporting from FINTRAC also indicates that Canada is home to<a href="https://publications.gc.ca/collections/collection_2024/canafe-fintrac/FD4-40-2024-eng.pdf"> professional money laundering networks</a>. </p><p>Finally, gravity models<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-3" href="#footnote-3" target="_self">3</a> of money laundering in Canada suggest that this was a $46.7 billion problem in 2018,<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-4" href="#footnote-4" target="_self">4</a> and would undoubtedly be a more substantial problem in 2025. </p><p>All of these measures point to a reasonably serious money laundering and crime problem in Canada. In the last election, the Liberals promised to tackle this issue, in part by establishing a financial crimes agency. That has not happened, and from what I understand, resources continue to be pulled from federal financial crime policing efforts despite a recent <a href="https://rcmp.ca/en/news/2025/01/federal-financial-crime-team-charges-bc-resident-connection-47-million-interprovincial-money-0">high-profile success</a>.  So there&#8217;s a non-zero chance (as much as it pains me to say it) that the threat of tariffs might motivate the government to finally get serious about money laundering and illicit finance in Canada. That&#8217;s the hope, anyway. </p><h3>Listing Cartels as Terrorist Organizations </h3><p>Part of Trudeau&#8217;s negotiations with Trump resulted in the agreement that Canada would list cartels as terrorist organizations. I&#8217;ve gotten a lot of questions about whether this would be lawful, and my answer is unfortunately, probably. And even if it isn&#8217;t, it likely doesn&#8217;t matter. Here&#8217;s why. </p><p>First, many cartels engage in targeted killings and general violence for the purpose of intimidating the population or a segment of the population, <a href="https://www.cnn.com/2024/06/05/americas/mexico-elections-mayor-killed-intl-hnk/index.html">such as politicians</a>. The criteria for listing involves carrying out terrorist activity (violence for a political purpose) is easily met by this activity. So the designation of cartels is likely lawful. </p><p>Second, even if the designation were not lawful (i.e. the criteria had not been met), it wouldn&#8217;t matter, and Canada would designate them anyway. Take, for instance, the listing of the IRGC. The Islamic Revolutionary Guards Corps is listed in its entirety as a terrorist entity, even though there&#8217;s a specific carve-out fo<a href="https://www.lawfaremedia.org/article/canadas-new-sanctions-against-iran-list-or-not-list">r state armies in the listing criteria</a>. Canada has shown that it is not interested in adhering to its own listing criteria in this process, and instead increasingly uses it as a political tool and for political theatre, as the <a href="https://www.cbc.ca/news/politics/mps-support-designating-irgc-terrorist-group-1.7198181">votes for listings have illustrated</a>. </p><p>There&#8217;s little threat of repercussions for Canada for not following its listing process and criteria: to challenge the listing, the designated entity would have to engage legal counsel, something that is difficult to do when you are prohibited from engaging in financial transactions. Further, most listed entities can&#8217;t be bothered to challenge the listing, as it has little material impact on their activities, particularly if they employ a modicum of financial tradecraft. </p><p>In other words, the sophisticated analysis I shared on Bluesky yesterday stands: It&#8217;s icky but lawful. </p><p>I&#8217;m sure there&#8217;ll be more to discuss on this issue over the coming days and months, and you can be sure that I&#8217;ll be writing about it here. But you can also listen to my analysis on my new podcast, <a href="https://open.spotify.com/show/3p2sEFIXkjaA5ffxXEMBDL?si=4c7545f3706c4228">Secure Line,</a> which I&#8217;m cohosting with Leah West and Stephanie Carvin. Subscribe wherever you get your podcasts. </p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/p/trade-wars-and-dirty-money?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/p/trade-wars-and-dirty-money?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><div><hr></div><h4><strong>Financial Intelligence Fundamentals</strong></h4><p><em>Do you want to learn more about financial intelligence and how to use it in research, investigations, and analysis? Our financial intelligence fundamentals course is for you! This course is perfect for people new to financial intelligence and seasoned professionals. <a href="https://insightthreatintelligence.thinkific.com/courses/introFININT">Enroll today</a></em></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://insightthreatintelligence.thinkific.com/courses/introFININT" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!8tvZ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png 424w, https://substackcdn.com/image/fetch/$s_!8tvZ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png 848w, https://substackcdn.com/image/fetch/$s_!8tvZ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png 1272w, https://substackcdn.com/image/fetch/$s_!8tvZ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!8tvZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png" width="905" height="496" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:496,&quot;width&quot;:905,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:731766,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://insightthreatintelligence.thinkific.com/courses/introFININT&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!8tvZ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png 424w, https://substackcdn.com/image/fetch/$s_!8tvZ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png 848w, https://substackcdn.com/image/fetch/$s_!8tvZ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png 1272w, https://substackcdn.com/image/fetch/$s_!8tvZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><p><em>&#169; 2025 Insight Threat Intelligence Ltd. All Rights Reserved.<br><br>This newsletter and its contents are protected by Canadian copyright law. Except as otherwise provided for under Canadian copyright law, this newsletter and its contents may not be copied, published, distributed, downloaded or otherwise stored in a retrieval system, transmitted or converted, in any form or by any means, electronic or otherwise, without the prior written permission of the copyright owner.</em></p><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-1" href="#footnote-anchor-1" class="footnote-number" contenteditable="false" target="_self">1</a><div class="footnote-content"><p>Really interesting addendum here: the <a href="https://www.theglobeandmail.com/canada/article-white-house-fentanyl-seizure-canadian-border-data/">Globe and Mail reports</a> that a good portion of the fentanyl seized at the US border and included in the justification for tariffs "has no known nexus to Canada."</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-2" href="#footnote-anchor-2" class="footnote-number" contenteditable="false" target="_self">2</a><div class="footnote-content"><p>FINTRAC has been cooperating with US partners on this issue for a number of years, in part through Project Guardian but also through the North American Drug Dialogue. </p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-3" href="#footnote-anchor-3" class="footnote-number" contenteditable="false" target="_self">3</a><div class="footnote-content"><p>I&#8217;m sure you&#8217;re wondering what this is. Experts have been trying to estimate the amount of money laundering since at least the 1990s, but there is still no agreed-upon method. The Cullen Commission reviewed many of these methods, most of which use a "top-down" approach by analyzing trade and financial data. One such method is the <strong>Gravity Model</strong>, also known as the <strong>Walker-Unger Gravity Model</strong>.</p><p>In 1998, experts estimated that money laundering comprised <strong>2-5% of global GDP</strong>. However, the Walker-Unger Gravity Model (1995) suggested a much higher figure&#8212;<strong>$2.85 trillion</strong>&#8212;which exceeded these earlier estimates.</p><p>The <strong>Gravity Model</strong> is based on Newton&#8217;s law of gravity, which is also used to estimate trade between countries. It assumes that the amount of money laundered from <strong>Country A to Country B</strong> depends on factors like <strong>population size, the attractiveness of Country B, and the distance between them</strong>. Other factors include <strong>whether the country is a SWIFT member, levels of corruption, conflict, banking secrecy, government policies, and income per person</strong>. These factors are used to estimate how much dirty money is moved from one country to another.</p><p>Using this model, the <strong>Maloney Report</strong> estimated that money laundering in <strong>Canada</strong> was <strong>$41.3 billion in 2015</strong> and <strong>$46.7 billion in 2018</strong>.</p><p>However, it is difficult to prove these models' accuracy because money laundering is a secretive activity. Some attempts to test the Walker model have found flaws, mainly when applied to <strong>trade-based money laundering</strong>.</p><p>In the end, <strong>gravity models can give a rough estimate of money laundering in Canada</strong>, but they should not be used alone. They should be combined with <strong>real-world data</strong> like crime rates and prosecutions. A mix of <strong>top-down (Gravity Model) and bottom-up (data-driven)</strong> methods would be more effective for tracking changes in money laundering over time.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-4" href="#footnote-anchor-4" class="footnote-number" contenteditable="false" target="_self">4</a><div class="footnote-content"><p>Austin F. Cullen, &#8220;Commission of Inquiry into Money Laundering in British Columbia,&#8221; June 3, 2022</p><p></p></div></div>]]></content:encoded></item><item><title><![CDATA[Fare thee well, Canadian Financial Crimes Agency]]></title><description><![CDATA[Canada's fall economic statement]]></description><link>https://newsletter.insightthreatintel.com/p/fare-thee-well-canadian-financial</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/fare-thee-well-canadian-financial</guid><dc:creator><![CDATA[Jessica Davis, PhD]]></dc:creator><pubDate>Thu, 19 Dec 2024 14:01:22 GMT</pubDate><enclosure url="https://images.unsplash.com/photo-1727529269745-ec6470562db4?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxN3x8b3R0YXdhfGVufDB8fHx8MTczNDYwODg3M3ww&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Hello, <strong>Insight Monitor </strong>subscribers! Welcome to the hundreds of new subscribers and followers we&#8217;ve picked up over the last few days. I&#8217;m not sure where you&#8217;re all coming from, but welcome! Here, we talk about global security and money a lot, so I hope you&#8217;re interested in that. Today, I&#8217;m doing a quick overview of the security and illicit finance compon&#8230;</em></p>
      <p>
          <a href="https://newsletter.insightthreatintel.com/p/fare-thee-well-canadian-financial">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Foreign Interference Financing]]></title><description><![CDATA[Testimony to PIFI, and full report to follow]]></description><link>https://newsletter.insightthreatintel.com/p/foreign-interference-financing</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/foreign-interference-financing</guid><dc:creator><![CDATA[Jessica Davis, PhD]]></dc:creator><pubDate>Fri, 25 Oct 2024 14:20:58 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5caed51-000b-4c5e-b150-d17bb309d71a_999x558.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Hello, <strong>Insight Monitor </strong>subscribers! My apologies for being a day late with our usual Thursday edition of the newsletter, but I wanted to be able to share what I was up to yesterday. I was asked to participate in the <a href="https://foreigninterferencecommission.ca/about/the-commission">Foreign Interference Commission</a>&#8217;s roundtable on political finance. Today, I&#8217;m sharing some of my notes and the recording of my presentation. I hope you find this insightful! </em></p><p><em>~Jess</em></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Insight Monitor is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>In 2023, the Government of Canada<a href="https://foreigninterferencecommission.ca/about/the-commission"> established</a> the Public Inquiry into Foreign Interference. The focus of the inquiry is foreign interference in federal electoral processes and democratic institutions. The current phase of the inquiry is reaching more broadly to understand the capacity of the government to detect, deter, and counter foreign interference. </p><p>I was asked to participate in the roundtable on political financing, and I focused on comments on foreign interference financing, drawing on international examples (and some Canadian) of concrete FI activity and its financial mechanisms. If you&#8217;re interested in this topic, you can check out all the roundtables <a href="https://foreigninterferencecommission.ca/public-hearings">here</a>. I recommend you watch the <a href="https://foreigninterferencecommission.ca/documents/round-table-schedule-panelists-and-topics">roundtables</a> from Wednesday, 23 October, on Canada&#8217;s national security apparatus and enforcing, deterring, and prosecuting foreign interference activities. Those two panels featured some faces that are likely to be familiar to readers of this newsletter (I have worked with several of these folks, both academically and professionally), and there were some very interesting and innovative ideas for combatting foreign interference. </p><p>The main takeaway from both of those panels, plus my own, is that, by and large, we do not need new offences for dealing with foreign interference. My own recommendations focus on structural changes and some tinkering with the <em>Proceeds of Crime, Money Laundering and Terrorist Financing Act</em> and associated regulations, but more on that next week when I submit my final report to the Commissioner. </p><p>For today, here&#8217;s a summary of my comments on what foreign interference financing looks like and a link to my presentation and questions and answers. I was very heartened by the Commissioner&#8217;s interest in financial intelligence, the role of FINTRAC in all of this, and getting to the facts. This was my second time participating in a Commission of Inquiry, and this was an excellent use of my time. </p><div><hr></div><p><em>Want to learn how to identify and exploit financial intelligence sources? In ten days, we are launching our latest offering in our series on financial intelligence. Don&#8217;t miss out: we&#8216;ve got lots of great content and a new community to help you learn and expand your knowledge of financial intelligence!</em></p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://insightthreatintelligence.thinkific.com/courses/FININTSources" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!LCgT!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbaee0510-f8ad-4f5c-84b6-7a8e383c5dba_1920x1080.heic 424w, https://substackcdn.com/image/fetch/$s_!LCgT!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbaee0510-f8ad-4f5c-84b6-7a8e383c5dba_1920x1080.heic 848w, https://substackcdn.com/image/fetch/$s_!LCgT!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbaee0510-f8ad-4f5c-84b6-7a8e383c5dba_1920x1080.heic 1272w, https://substackcdn.com/image/fetch/$s_!LCgT!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbaee0510-f8ad-4f5c-84b6-7a8e383c5dba_1920x1080.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!LCgT!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbaee0510-f8ad-4f5c-84b6-7a8e383c5dba_1920x1080.heic" width="324" height="182.25" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/baee0510-f8ad-4f5c-84b6-7a8e383c5dba_1920x1080.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:324,&quot;bytes&quot;:106912,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:&quot;https://insightthreatintelligence.thinkific.com/courses/FININTSources&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!LCgT!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbaee0510-f8ad-4f5c-84b6-7a8e383c5dba_1920x1080.heic 424w, https://substackcdn.com/image/fetch/$s_!LCgT!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbaee0510-f8ad-4f5c-84b6-7a8e383c5dba_1920x1080.heic 848w, https://substackcdn.com/image/fetch/$s_!LCgT!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbaee0510-f8ad-4f5c-84b6-7a8e383c5dba_1920x1080.heic 1272w, https://substackcdn.com/image/fetch/$s_!LCgT!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbaee0510-f8ad-4f5c-84b6-7a8e383c5dba_1920x1080.heic 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><div><hr></div><h3><strong>Foreign Interference Financing</strong></h3><p>Foreign interference requires resources and money. It takes money to build disinformation networks, pay influencers, and spread messages. It also takes money to engage in transnational repression activities, whether that&#8217;s through official salaries, bonuses, or stipends. It also takes money to buy votes, fund candidates and parties, and ensure that voters who support a particular message make it to the polls.</p><p>Financing has been a neglected element of foreign interference investigations and research. As such, I focus on international examples of foreign interference financing (some of which will also reflect what the commission has heard here in Canada) and will aim to give concrete examples of how money enables foreign interference.</p><p>These cases inform a discussion of Canada&#8217;s strengths and vulnerabilities (in terms of legislation, regulation, and capability). While there are some areas of improvement for Canada in terms of legislation, the vast majority of the work Canada needs to do to exploit financial intelligence for foreign interference financing disruption is in investigations: resources, skills, and political will.</p><p>Canada needs to invest in its&nbsp;capabilities to detect and disrupt foreign interference. This applies to its financial intelligence unit, FINTRAC,&nbsp;and its law enforcement and security services responsible for conducting these investigations. They must understand and exploit financial intelligence in the foreign interference space.</p><h3><strong>Financing Foreign Interference Activities</strong></h3><p>States use various methods to interfere in the politics of other countries:</p><ul><li><p><strong>Financing Political Parties and Candidates:</strong>&nbsp;Foreign actors have financially supported political parties and candidates aligned with their interests. These funds can be direct donations, loans, or other financially advantageous transactions.</p></li><li><p><strong>Funding Political Campaigns:</strong>&nbsp;Foreign governments have also funnelled money to support specific political campaigns. This funding can provide a significant advantage to the recipient, potentially distorting the electoral process and undermining fair competition.</p></li><li><p><strong>Incentivizing Voters:</strong>&nbsp;Foreign actors also directly target the electorate to influence voting behavior, such as discounted flights, shopping vouchers to encourage return to vote.</p></li><li><p><strong>Vote Buying:</strong>&nbsp;Vote buying is another potential method of foreign interference. While not as common as other tactics, it involves offering money or incentives directly in exchange for votes.</p></li><li><p><strong>Exploiting Diaspora Communities:</strong>&nbsp;Foreign actors also attempt to leverage their diasporas to influence elections in their host countries. This can involve mobilizing support for favoured candidates, providing financial contributions, or even engaging in voter intimidation.</p></li><li><p><strong>Misinformation / Disinformation</strong>: State actors will also spread mis- and dis-information in elections (and outside of election periods) to shape the information battlespace. In some cases, state actors pay troll farms to amplify particular messages.&nbsp; In other cases, states pay for advertisements, sponsor investigative journalism, and pay for interviews to promote their interests.</p></li></ul><h3><strong>Financial Transactions</strong>&nbsp;<strong>in Foreign Interference</strong></h3><p>The activities involved in foreign interference financing are essential to understand, as are the transactions that support these activities. These usually involve <strong>cash payments, cryptocurrency transfers, loans, and bank transfers, as well as the use of third-party intermediaries, foundations, think tanks, organized crime groups, political consultancies, shell companies, state-owned enterprises, and sometimes embassy accounts and resources. Gifts and luxury goods</strong> are also used to compensate threat actors for their role in foreign interference. In-kind donations (payment of legal fees, buying media space to promote a selected candidate or party) and even transportation subsidies to ensure voters get to the polls are all examples of financial transactions involved in foreign interference.</p><blockquote></blockquote><p><strong>Obfuscation: </strong>State actors often use intermediaries (including friends, family members, and trusted business associates) to send and receive funds on behalf of or in support of the political candidate or party and to obfuscate their role in the interference activity. In some cases, financial institutions might be co-opted to enable the transfer of funds with less scrutiny. Finally, states also pressure donors to give money to specific candidates.</p><p>These activities and transactions outline how Canada&#8217;s adversaries finance foreign interference activities. Much more research needs to be done to establish more robust patterns of activity that can be used to support detection and disruption. For now, however, this high-level description can inform discussions on legislation, regulations, policy, and enforcement. </p><p>You can watch my full presentation (and question &amp; answers) here (starting around the 24-minute mark): </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://foreigninterferencecommission.ca/public-hearings/day-39-october-24" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!VoPE!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5caed51-000b-4c5e-b150-d17bb309d71a_999x558.png 424w, https://substackcdn.com/image/fetch/$s_!VoPE!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5caed51-000b-4c5e-b150-d17bb309d71a_999x558.png 848w, https://substackcdn.com/image/fetch/$s_!VoPE!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5caed51-000b-4c5e-b150-d17bb309d71a_999x558.png 1272w, https://substackcdn.com/image/fetch/$s_!VoPE!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5caed51-000b-4c5e-b150-d17bb309d71a_999x558.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!VoPE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5caed51-000b-4c5e-b150-d17bb309d71a_999x558.png" width="999" height="558" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a5caed51-000b-4c5e-b150-d17bb309d71a_999x558.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:558,&quot;width&quot;:999,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:486500,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://foreigninterferencecommission.ca/public-hearings/day-39-october-24&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!VoPE!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5caed51-000b-4c5e-b150-d17bb309d71a_999x558.png 424w, https://substackcdn.com/image/fetch/$s_!VoPE!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5caed51-000b-4c5e-b150-d17bb309d71a_999x558.png 848w, https://substackcdn.com/image/fetch/$s_!VoPE!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5caed51-000b-4c5e-b150-d17bb309d71a_999x558.png 1272w, https://substackcdn.com/image/fetch/$s_!VoPE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5caed51-000b-4c5e-b150-d17bb309d71a_999x558.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>More to follow after my final report (including sources and recommendations) are shared with the Commission. </p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/p/foreign-interference-financing?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/p/foreign-interference-financing?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p></p>]]></content:encoded></item><item><title><![CDATA[Foreign Interference in Canada: Naming names? ]]></title><description><![CDATA[FI in Canada: What is to be done?]]></description><link>https://newsletter.insightthreatintel.com/p/foreign-interference-in-canada-naming</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/foreign-interference-in-canada-naming</guid><dc:creator><![CDATA[Jessica Davis, PhD]]></dc:creator><pubDate>Mon, 23 Sep 2024 19:00:55 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e0f9b0b-4ab5-4ec0-8985-f72dd0677c7f_1152x640.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Hello, <strong>Insight Monitor</strong> subscribers! Today, we have a special edition of our newsletter tackling some of the facts and issues surrounding foreign interference in Canada. Apologies to the non-Canadian readers: presumably, many of you have been following the issue in the media, but if not, I&#8217;ve included links throughout that will hopefully get you caught up. Here, I&#8217;m relying on my two decades+ of experience working in and with Canada&#8217;s security and intelligence community to opine on what should and should not be done to combat the foreign interference threat. Have a read, and let me know what you think in the comments! <br>~Jess</em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/subscribe?"><span>Subscribe now</span></a></p><p>On Friday, the Globe and Mail published an op-ed by the editorial board calling for the Prime Minister to release the names of &#8220;<a href="https://www.theglobeandmail.com/opinion/editorials/article-mr-trudeau-were-still-waiting-for-the-names-of-those-who-collude/?utm_source=dlvr.it&amp;utm_medium=twitter">those who collude against us</a>&#8221;. This is a reference to the 11 political candidates and 13 political staff members that Justice Hogue, Commissioner of Canada&#8217;s Public Inquiry into Foreign Interference in Federal Electoral Processes and Democratic Institutions (PIFI), said either had a direct connection to (witting or unwitting) or were affected by the activities of PRC threat actors in the 2019 election. </p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://foreigninterferencecommission.ca/reports" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!vqXA!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4f51ccb7-73b2-446a-b91c-47e2dabb6450_2426x552.heic 424w, https://substackcdn.com/image/fetch/$s_!vqXA!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4f51ccb7-73b2-446a-b91c-47e2dabb6450_2426x552.heic 848w, https://substackcdn.com/image/fetch/$s_!vqXA!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4f51ccb7-73b2-446a-b91c-47e2dabb6450_2426x552.heic 1272w, https://substackcdn.com/image/fetch/$s_!vqXA!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4f51ccb7-73b2-446a-b91c-47e2dabb6450_2426x552.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!vqXA!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4f51ccb7-73b2-446a-b91c-47e2dabb6450_2426x552.heic" width="1456" height="331" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4f51ccb7-73b2-446a-b91c-47e2dabb6450_2426x552.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:331,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:138528,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:&quot;https://foreigninterferencecommission.ca/reports&quot;,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!vqXA!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4f51ccb7-73b2-446a-b91c-47e2dabb6450_2426x552.heic 424w, https://substackcdn.com/image/fetch/$s_!vqXA!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4f51ccb7-73b2-446a-b91c-47e2dabb6450_2426x552.heic 848w, https://substackcdn.com/image/fetch/$s_!vqXA!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4f51ccb7-73b2-446a-b91c-47e2dabb6450_2426x552.heic 1272w, https://substackcdn.com/image/fetch/$s_!vqXA!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4f51ccb7-73b2-446a-b91c-47e2dabb6450_2426x552.heic 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a><figcaption class="image-caption">Public Inquiry into Foreign Interference in Federal Electoral Processes and Democratic Institutions</figcaption></figure></div><p><em>For background to Canada&#8217;s foreign interference inquiry and the issue in general:</em> </p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;6a6f5e4e-1143-4925-a6c6-c3de281c1fb6&quot;,&quot;caption&quot;:&quot;2022 was a hot year for foreign interference, or at least media coverage / speculation about foreign interference. Let&#8217;s unpack what we learned last year, with a special emphasis on both known knowns and unknown unknowns, and how we can think about, analyze, and counter foreign interference.&quot;,&quot;cta&quot;:null,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Foreign Interference in Canada: Police Stations, the Convoy, and Electoral Interference &quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:33479672,&quot;name&quot;:&quot;Jessica Davis&quot;,&quot;bio&quot;:&quot;Jessica Davis is President of Insight Threat Intelligence and is the author of Women in Modern Terrorism: From Liberations Wars to Global Terrorism and the Islamic State (2017), and Illicit Money: Financing Terrorism in the 21st Century (2021).&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e312ae7c-114b-4e4f-9ce1-8bf50ddb7a27_2344x2049.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2023-01-10T14:01:16.505Z&quot;,&quot;cover_image&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/09b767fc-6dde-4336-90bb-7806e0822653_900x900.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/foreign-interference-in-canada-convoy&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:91201509,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:6,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F09b767fc-6dde-4336-90bb-7806e0822653_900x900.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>While there's robust public interest in knowing the names of people named in classified intelligence for colluding with foreign governments, Hogue has said she will not release the names; the Globe editorial calls instead on the Prime Minister to do so. The editorial board argues that the precedent has been set by the Prime Minister sharing classified intelligence in the House of Commons relating to the targeted assassination of <a href="https://newsletter.insightthreatintel.com/p/khalistani-extremism-in-canada?utm_source=publication-search">Hardeep Singh Nijjar</a> in BC. However, this comparison creates a false equivalency: naming and shaming a state is very different from naming Canadian citizens or residents as complicit in foreign interference.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!gumX!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e0f9b0b-4ab5-4ec0-8985-f72dd0677c7f_1152x640.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!gumX!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e0f9b0b-4ab5-4ec0-8985-f72dd0677c7f_1152x640.jpeg 424w, https://substackcdn.com/image/fetch/$s_!gumX!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e0f9b0b-4ab5-4ec0-8985-f72dd0677c7f_1152x640.jpeg 848w, https://substackcdn.com/image/fetch/$s_!gumX!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e0f9b0b-4ab5-4ec0-8985-f72dd0677c7f_1152x640.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!gumX!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e0f9b0b-4ab5-4ec0-8985-f72dd0677c7f_1152x640.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!gumX!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e0f9b0b-4ab5-4ec0-8985-f72dd0677c7f_1152x640.jpeg" width="396" height="220" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6e0f9b0b-4ab5-4ec0-8985-f72dd0677c7f_1152x640.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:&quot;normal&quot;,&quot;height&quot;:640,&quot;width&quot;:1152,&quot;resizeWidth&quot;:396,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!gumX!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e0f9b0b-4ab5-4ec0-8985-f72dd0677c7f_1152x640.jpeg 424w, https://substackcdn.com/image/fetch/$s_!gumX!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e0f9b0b-4ab5-4ec0-8985-f72dd0677c7f_1152x640.jpeg 848w, https://substackcdn.com/image/fetch/$s_!gumX!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e0f9b0b-4ab5-4ec0-8985-f72dd0677c7f_1152x640.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!gumX!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e0f9b0b-4ab5-4ec0-8985-f72dd0677c7f_1152x640.jpeg 1456w" sizes="100vw"></picture><div></div></div></a><figcaption class="image-caption">Image generated by Substack&#8217;s AI Image generator</figcaption></figure></div><p>Further, it is not clear who, exactly, the editorial board wants named. The language that the Commissioner uses is critical here: there is a combination of witting and unwitting individuals implicated in this activity.  The editorial board wants to name the members of parliament implicated (a subset of the 24 individuals referenced in the Hogue report), but it&#8217;s not clear that the MPs were all wittingly complicit in the threat activity. There might be a case to be made for naming the witting individuals, but naming the unwitting ones and those who were impacted by these activities would paint everyone with the same brush.  I have a few concerns with this, but Justice Hogue says it best in the report: </p><p>&#8220;Canada is a state governed by the rule of law, which recognizes and protects the fundamental rights of every individual, including the right to fully defend oneself against charges and accusations,&#8221; <a href="https://nationalpost.com/news/canada/foreign-interference-inquiry-wont-name-mps-suspected-by-spy-watchdog">Hogue said</a>.</p><p>There is no meaningful way this can happen. Let me explain. </p><p><strong>Intelligence is not evidence</strong>. The accusations against these individuals (and the MPs that the Globe and Mail want to have named) are derived from intelligence. But this is not evidence. In intelligence, there are often motivated sources, circular reporting issues, intelligence from foreign agencies or highly sensitive sources that can't be disclosed, etc. Intelligence is about probability, not certainty. Given the classification and likely source of this information, full disclosure of where it came from (required for people to be able to accurately defend themselves against these accusations) cannot happen. We already know that there <a href="https://wesleywark.substack.com/p/the-han-dong-defamation-law-suit">are issues</a> with some of the information that has been reported.</p><p>As a result of the complexities of intelligence collection, analysis, and dissemination, <strong>the named individuals would not be able to fully defend themselves</strong>. The intelligence would not be revealed in its entirety, which means the individuals named would have no ability to refute specific instances or allegations. Without being able to refute the intelligence piece by piece, their defence would be hollow and unconvincing. They would be convicted in the court of public opinion.</p><p>Further, <strong>naming them would overtake the story but not provide any solutions</strong>. The media cycle would focus on the individuals, not the systemic problems facing Canada in dealing with FI. Focusing on the individuals would create the illusion of solving a problem, not actually fixing it. Yes, the government passed the FI bill, but as the recent case of Tenet media illustrates, there are still gaps in that <em>Act</em> and clear issues that still need resolving, to say nothing of enforcement. The 24 individuals referenced in the Commission&#8217;s report is not the sum total of the foreign interference problem in Canada. </p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;58f67f23-e380-4472-838d-5ccb6ded9d50&quot;,&quot;caption&quot;:&quot;Hello Insight Monitor subscribers! Welcome to another week of exciting illicit financing news and analysis. Today, we&#8217;re looking at the case of Tenet Media, Russian media outlet RT, influencers and foreign interference. This FI (and possibly sanctions evasion) case is fascinating and certainly something we&#8217;ll be following for some time to come. I&#8217;ve taken a few hours to read through the US indictment and chart the timeline of activities, key players, financial transactions, and corporate structures to the best of my ability. There&#8217;s some real nuggets in here, and I&#8217;ve visualized some of the information to make it clearer. I&#8217;ll endeavour to keep this analysis current as we get more information. As always, thanks for reading, and if you haven&#8217;t subscribed, please do! This is a reader-supported publication and one of the only ones in the world that covers illicit financing. Let&#8217;s get into it:&quot;,&quot;cta&quot;:null,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Networks of Deception: Russian propaganda, foreign interference, sanctions evasion, and the Canadian connection &quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:33479672,&quot;name&quot;:&quot;Jessica Davis&quot;,&quot;bio&quot;:&quot;Jessica Davis is President of Insight Threat Intelligence and is the author of Women in Modern Terrorism: From Liberations Wars to Global Terrorism and the Islamic State (2017), and Illicit Money: Financing Terrorism in the 21st Century (2021).&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e312ae7c-114b-4e4f-9ce1-8bf50ddb7a27_2344x2049.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2024-09-17T11:24:11.230Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c5b6b09-87c7-492e-a3d4-965d40bb9676_1131x544.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/networks-of-deception-russian-propaganda&quot;,&quot;section_name&quot;:&quot;News&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:148916558,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:4,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F09b767fc-6dde-4336-90bb-7806e0822653_900x900.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>The real solutions lie in prosecuting the individuals involved (for any law they might have broken, although there might not be any&#8230;) and having party leaders with classified clearances (and knowledge of the named individuals) withhold party nominations. (Relatedly, Elizabeth May <a href="https://www.cbc.ca/news/politics/elizabeth-may-nsicop-mps-1.7231497">said</a> no sitting MPs were listed in <a href="https://www.nsicop-cpsnr.ca/reports/rp-2024-06-03/special-report-foreign-interference.pdf">NSICOP</a>&#8217;s unredacted report.)</p><p>When I posted a version of this article in <a href="https://x.com/JessMarinDavis/status/1837821042632364410">a thread on X</a> (the platform formally known as Twitter), it caused quite the uproar. I&#8217;m going to take a few minutes and address a few of the more coherent and useful comments. </p><p>My former colleague Andrew Kirsch <a href="https://x.com/AS_Kirsch/status/1837977653610938808">asked </a>why we were holding this to an evidentiary standard when the MPs haven&#8217;t been charged with <a href="https://x.com/AS_Kirsch/status/1837977653610938808">a crime</a>. I think that&#8217;s exactly the point. Do we want a world in which the Prime Minister (or NSICOP, or another parliamentary committee) releases a list of names of people they believe have collaborated with foreign powers? What recourse would these individuals have? Slander/libel laws would likely not apply because of parliamentary privilege, so they would have no recourse or ability to correct the record. (And we all know intelligence gets things wrong sometimes.) Andrew also raises the prospect of a different level of disclosure depending on the severity of the allegations, which is something I&#8217;ll get to in a moment. </p><p>Another <a href="https://x.com/DhillonHariGTA/status/1838100292715352101">commenter </a>noted that some of our allies have decided to name and shame, including the UK.  In one case, MI5 named <a href="https://www.bbc.com/news/uk-62179004">Christine Lee </a>as an &#8220;agent of influence&#8221; for her work for the United Front Works Department and her efforts to &#8220;seed&#8221; the UK political system with candidates friendly to China. I don&#8217;t know the ins and outs of the case, but it seems as though there were no charges that could be brought in this case. I suspect this might have been a form of threat disruption from MI5. </p><p>Here&#8217;s one challenge in terms of prosecution: investigations seeded from intelligence, which (if underway) these almost certainly are, require <a href="https://x.com/5eyesScott/status/1837896128458903957">parallel reconstruction</a> to capture evidence that does not rely on the original intelligence, especially if that intelligence cannot be disclosed in a court of law, like highly classified or allied reporting. Depending on how much time has elapsed between the collection of the intelligence and the start of a law enforcement investigation, this reconstruction might be extremely difficult, if not impossible. Imagine a scenario in which CSIS acquires a recording of a phone conversation that happened four years ago. Two years later, CSIS acquires additional intelligence suggesting that the phone call, in addition to the new intelligence, might rise to the level of criminal activity. It&#8217;s now been two years since the phone call occurred, and even if the RCMP were able to get a warrant to tap the phone based on a <a href="https://www.nsicop-cpsnr.ca/reports/rp-2023-11-fp/04-en.html#">disclosure or advisory letter </a>from CSIS, the subjects of the investigation might not communicate again or engage in any illicit activity. This is a simplified hypothetical scenario, but it&#8217;s meant to illustrate that you can&#8217;t just push a &#8220;parallel reconstruct&#8221; button and have all the intelligence automatically become evidence. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!0I2f!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7114aa8-0ef0-4436-9434-4637669f5d81_1024x1024.heic" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!0I2f!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7114aa8-0ef0-4436-9434-4637669f5d81_1024x1024.heic 424w, https://substackcdn.com/image/fetch/$s_!0I2f!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7114aa8-0ef0-4436-9434-4637669f5d81_1024x1024.heic 848w, https://substackcdn.com/image/fetch/$s_!0I2f!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7114aa8-0ef0-4436-9434-4637669f5d81_1024x1024.heic 1272w, https://substackcdn.com/image/fetch/$s_!0I2f!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7114aa8-0ef0-4436-9434-4637669f5d81_1024x1024.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!0I2f!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7114aa8-0ef0-4436-9434-4637669f5d81_1024x1024.heic" width="260" height="260" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d7114aa8-0ef0-4436-9434-4637669f5d81_1024x1024.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:260,&quot;bytes&quot;:68730,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!0I2f!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7114aa8-0ef0-4436-9434-4637669f5d81_1024x1024.heic 424w, https://substackcdn.com/image/fetch/$s_!0I2f!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7114aa8-0ef0-4436-9434-4637669f5d81_1024x1024.heic 848w, https://substackcdn.com/image/fetch/$s_!0I2f!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7114aa8-0ef0-4436-9434-4637669f5d81_1024x1024.heic 1272w, https://substackcdn.com/image/fetch/$s_!0I2f!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7114aa8-0ef0-4436-9434-4637669f5d81_1024x1024.heic 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>This raises an interesting prospect (related to Andrew&#8217;s comment above). In the most egregious cases of foreign interference, there might not have been any laws broken. The <a href="https://www.parl.ca/legisinfo/en/bill/44-1/c-70">Foreign Interference bill</a> that passed earlier this year goes some way to solving this problem, but gaps remain. </p><p>That does not mean that there is nothing to be done. CSIS does have the power to engage in <a href="https://nsira-ossnr.gc.ca/en/reviews/ongoing-and-completed-reviews/completed-reviews/review-of-csis-threat-reduction-activities-a-focus-on-information-disclosure-to-external-parties/">threat reduction measures</a>. Some of these require a warrant, and others do not. There is a world in which CSIS, in consultation with relevant partners (and likely the political level as well), decides that naming an MP as a &#8220;foreign collaborator&#8221; or &#8220;agent of foreign influence&#8221; is a proportional and appropriate threat reduction measure. However, I would have to think that this a) might <a href="https://www.canada.ca/en/security-intelligence-service/news/2020/06/amendments-to-the-csis-act---threat-reduction-measures.html">require a warrant</a> and b) require that CSIS has tried other measures to reduce the threat before doing so, as this could be seen as democratic interference. I also think that this is not something my former colleagues at CSIS would be keen to do if they had any other option. Accusations of politicization of intelligence would almost certainly be forthcoming. </p><p>We also don&#8217;t know that CSIS ~hasn&#8217;t~ engaged in threat reduction activity relating to foreign interference. There&#8217;s a host of things that they can do, many of which would not require a warrant, to try to reduce the threat of foreign interference. </p><p>Anyway, the TL;DR here is that naming the "foreign collaborators" will not solve our FI problem. Instead, it will just distract us from the real issues facing Canada. <strong>These are hard policy problems</strong> that won&#8217;t be solved with a simple list. </p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/p/foreign-interference-in-canada-naming?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/p/foreign-interference-in-canada-naming?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><h4><strong>Financial Intelligence Fundamentals</strong></h4><p><em>Do you want to learn more about financial intelligence and how to use it in research, investigations, and analysis? Our financial intelligence fundamentals course is for you! This course is perfect for people new to financial intelligence and seasoned professionals. <a href="https://insightthreatintelligence.thinkific.com/courses/introFININT">Enroll today</a>!</em></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://insightthreatintelligence.thinkific.com/courses/introFININT" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!twUc!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe22a91b0-2f94-4a22-9e09-e862e5a6dfa8_1920x1080.heic 424w, https://substackcdn.com/image/fetch/$s_!twUc!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe22a91b0-2f94-4a22-9e09-e862e5a6dfa8_1920x1080.heic 848w, https://substackcdn.com/image/fetch/$s_!twUc!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe22a91b0-2f94-4a22-9e09-e862e5a6dfa8_1920x1080.heic 1272w, https://substackcdn.com/image/fetch/$s_!twUc!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe22a91b0-2f94-4a22-9e09-e862e5a6dfa8_1920x1080.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!twUc!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe22a91b0-2f94-4a22-9e09-e862e5a6dfa8_1920x1080.heic" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e22a91b0-2f94-4a22-9e09-e862e5a6dfa8_1920x1080.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:237073,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:&quot;https://insightthreatintelligence.thinkific.com/courses/introFININT&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!twUc!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe22a91b0-2f94-4a22-9e09-e862e5a6dfa8_1920x1080.heic 424w, https://substackcdn.com/image/fetch/$s_!twUc!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe22a91b0-2f94-4a22-9e09-e862e5a6dfa8_1920x1080.heic 848w, https://substackcdn.com/image/fetch/$s_!twUc!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe22a91b0-2f94-4a22-9e09-e862e5a6dfa8_1920x1080.heic 1272w, https://substackcdn.com/image/fetch/$s_!twUc!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe22a91b0-2f94-4a22-9e09-e862e5a6dfa8_1920x1080.heic 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><p><em>&#169; 2024 Insight Threat Intelligence Ltd. All Rights Reserved.<br><br>This newsletter and its contents are protected by Canadian copyright law. Except as otherwise provided for under Canadian copyright law, this newsletter and its contents may not be copied, published, distributed, downloaded or otherwise stored in a retrieval system, transmitted or converted, in any form or by any means, electronic or otherwise, without the prior written permission of the copyright owner.</em></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Insight Monitor is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[New Podcast: TRM Labs Talks]]></title><description><![CDATA[Jessica talks with TRM Labs's Ari Redbord about threat finance]]></description><link>https://newsletter.insightthreatintel.com/p/new-podcast-trm-labs-talks</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/new-podcast-trm-labs-talks</guid><dc:creator><![CDATA[Jessica Davis, PhD]]></dc:creator><pubDate>Tue, 16 Apr 2024 13:02:16 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/9361a93f-9ff0-4a52-8f60-898c81057dcd_1024x1024.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>A little while ago I sat down with Ari Redbord from TRM Labs to talk all things terrorist financing and cryptocurrency. We had a wide-ranging conversation and really got into the weeds about the current threat environment and how finance enables those threats. I hope you enjoy it, and as always, reach out if you have questions or things you want to discuss. </em></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Insight Monitor is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://www.trmlabs.com/post/trm-talks-dissecting-cryptos-role-in-terrorist-financing-with-threat-intelligence-expert-jessica-davis" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!07eJ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1587fcb7-c53d-4f57-bcd7-dac0b472f0f9_2682x1226.png 424w, https://substackcdn.com/image/fetch/$s_!07eJ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1587fcb7-c53d-4f57-bcd7-dac0b472f0f9_2682x1226.png 848w, https://substackcdn.com/image/fetch/$s_!07eJ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1587fcb7-c53d-4f57-bcd7-dac0b472f0f9_2682x1226.png 1272w, https://substackcdn.com/image/fetch/$s_!07eJ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1587fcb7-c53d-4f57-bcd7-dac0b472f0f9_2682x1226.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!07eJ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1587fcb7-c53d-4f57-bcd7-dac0b472f0f9_2682x1226.png" width="1456" height="666" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1587fcb7-c53d-4f57-bcd7-dac0b472f0f9_2682x1226.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:666,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:283799,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://www.trmlabs.com/post/trm-talks-dissecting-cryptos-role-in-terrorist-financing-with-threat-intelligence-expert-jessica-davis&quot;,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!07eJ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1587fcb7-c53d-4f57-bcd7-dac0b472f0f9_2682x1226.png 424w, https://substackcdn.com/image/fetch/$s_!07eJ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1587fcb7-c53d-4f57-bcd7-dac0b472f0f9_2682x1226.png 848w, https://substackcdn.com/image/fetch/$s_!07eJ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1587fcb7-c53d-4f57-bcd7-dac0b472f0f9_2682x1226.png 1272w, https://substackcdn.com/image/fetch/$s_!07eJ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1587fcb7-c53d-4f57-bcd7-dac0b472f0f9_2682x1226.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://open.spotify.com/episode/2h7FBOgoHVP0wtnGvnIogQ?si=9304b54bfb114908&quot;,&quot;text&quot;:&quot;Listen on Spotify&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://open.spotify.com/episode/2h7FBOgoHVP0wtnGvnIogQ?si=9304b54bfb114908"><span>Listen on Spotify</span></a></p><p>In the podcast, I talk about a number of resources (including <em><strong>Insight Monitor</strong></em>, which I assume you&#8217;re familiar with since you&#8217;re reading this post). The others are here: </p><p>&#128279;Our analysis of Hamas financing (full report): https://insightthreatintelligence.thinkific.com/courses/hamasfinancingreport</p><p>&#128279;My article in Terrorism and Political Violence outlining the policies and practices involved in counter-terrorist financing: https://doi.org/10.1080/09546553.2022.2083507</p><p></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://insightthreatintelligence.thinkific.com/bundles/tf-analysis" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!dU_K!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8782aff-c9c3-4da5-a41b-acd2326801de.heic 424w, https://substackcdn.com/image/fetch/$s_!dU_K!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8782aff-c9c3-4da5-a41b-acd2326801de.heic 848w, https://substackcdn.com/image/fetch/$s_!dU_K!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8782aff-c9c3-4da5-a41b-acd2326801de.heic 1272w, https://substackcdn.com/image/fetch/$s_!dU_K!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8782aff-c9c3-4da5-a41b-acd2326801de.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!dU_K!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8782aff-c9c3-4da5-a41b-acd2326801de.heic" width="514" height="514" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b8782aff-c9c3-4da5-a41b-acd2326801de.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1080,&quot;width&quot;:1080,&quot;resizeWidth&quot;:514,&quot;bytes&quot;:204417,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:&quot;https://insightthreatintelligence.thinkific.com/bundles/tf-analysis&quot;,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!dU_K!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8782aff-c9c3-4da5-a41b-acd2326801de.heic 424w, https://substackcdn.com/image/fetch/$s_!dU_K!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8782aff-c9c3-4da5-a41b-acd2326801de.heic 848w, https://substackcdn.com/image/fetch/$s_!dU_K!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8782aff-c9c3-4da5-a41b-acd2326801de.heic 1272w, https://substackcdn.com/image/fetch/$s_!dU_K!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8782aff-c9c3-4da5-a41b-acd2326801de.heic 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>If you want to learn more about terrorist and threat financing, sign up for our terrorist financing analysis course today! </p><p><em>&#169; 2024 Insight Threat Intelligence Ltd. All Rights Reserved.<br><br>This newsletter and its contents are protected by Canadian copyright law. Except as otherwise provided for under Canadian copyright law, this newsletter and its contents may not be copied, published, distributed, downloaded or otherwise stored in a retrieval system, transmitted or converted, in any form or by any means, electronic or otherwise, without the prior written permission of the copyright owner.</em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/p/new-podcast-trm-labs-talks?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/p/new-podcast-trm-labs-talks?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p></p>]]></content:encoded></item><item><title><![CDATA[Canada needs to detect terrorist actions sooner]]></title><description><![CDATA[Globe and Mail op ed]]></description><link>https://newsletter.insightthreatintel.com/p/canada-needs-to-detect-terrorist</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/canada-needs-to-detect-terrorist</guid><pubDate>Thu, 14 Mar 2024 13:00:58 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!fHht!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2e1664ab-033b-434b-8b6d-fe5a1ae3cb8a_1255x487.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Last month, the Globe and Mail asked me to write an op ed on the London truck attack, and the finding of terrorism during sentencing. Here&#8217;s the unedited version (differs slightly from the published version).</em> </p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/subscribe?"><span>Subscribe now</span></a></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://www.theglobeandmail.com/opinion/article-canada-needs-to-better-understand-extremists-to-detect-terrorist/" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!fHht!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2e1664ab-033b-434b-8b6d-fe5a1ae3cb8a_1255x487.png 424w, https://substackcdn.com/image/fetch/$s_!fHht!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2e1664ab-033b-434b-8b6d-fe5a1ae3cb8a_1255x487.png 848w, https://substackcdn.com/image/fetch/$s_!fHht!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2e1664ab-033b-434b-8b6d-fe5a1ae3cb8a_1255x487.png 1272w, https://substackcdn.com/image/fetch/$s_!fHht!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2e1664ab-033b-434b-8b6d-fe5a1ae3cb8a_1255x487.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!fHht!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2e1664ab-033b-434b-8b6d-fe5a1ae3cb8a_1255x487.png" width="1255" height="487" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2e1664ab-033b-434b-8b6d-fe5a1ae3cb8a_1255x487.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:487,&quot;width&quot;:1255,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:101680,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://www.theglobeandmail.com/opinion/article-canada-needs-to-better-understand-extremists-to-detect-terrorist/&quot;,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!fHht!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2e1664ab-033b-434b-8b6d-fe5a1ae3cb8a_1255x487.png 424w, https://substackcdn.com/image/fetch/$s_!fHht!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2e1664ab-033b-434b-8b6d-fe5a1ae3cb8a_1255x487.png 848w, https://substackcdn.com/image/fetch/$s_!fHht!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2e1664ab-033b-434b-8b6d-fe5a1ae3cb8a_1255x487.png 1272w, https://substackcdn.com/image/fetch/$s_!fHht!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2e1664ab-033b-434b-8b6d-fe5a1ae3cb8a_1255x487.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>***</p><p>For the first time, a Canadian has been sentenced to life in prison for a white nationalist terrorist attack. Last week, Nathaniel Veltman <a href="https://www.cbc.ca/news/canada/london/veltman-muslim-family-conviction-killing-1.7121217">was sentenced</a> to five life sentences after having been found guilty in November on four counts of first-degree murder and one count of attempted murder. Veltman killed four members of a Muslim family, and injured another, in what we now know was a terrorist attack motivated by white nationalism.</p><p>White nationalism is part of the ideologically-motivated violent extremist landscape. White nationalists want to create a <a href="https://www.economist.com/the-economist-explains/2019/08/14/what-is-white-nationalism">white ethno-state</a>. The majority are white supremacists, and want strict controls on non-white immigration, and sometimes go so far as to support ethnic cleansing or genocide. In this case, the killer took action on these ideas, trying to <a href="https://www.cp24.com/news/london-attack-ruling-first-to-recognize-terror-on-grounds-of-white-nationalism-1.6780385">rid Canada of minorities</a>, and in this case, specifically Muslims.</p><p>Ideologically-motivated violent extremism, a <a href="https://www.publicsafety.gc.ca/cnt/trnsprnc/brfng-mtrls/prlmntry-bndrs/20220914/21-en.aspx">category of extremism</a> that includes <a href="https://www.theglobeandmail.com/opinion/article-incel-related-violence-is-terrorism-and-the-world-should-start/">incel-motivated</a> violence, white supremacist and white nationalist violence, as well as anti-authority violence, is a growing concern for many Western countries, Canada included. In fact, this form of extremist violence has killed more people in Canada than another other type of political, ideological, or religiously-motivated violence, with the exception of the Air India terrorist attack in 1985.</p><p>The growth of this form of violent extremism is often attributed to the availability of extremist content online, ranging from extremist manifestos to the live-streaming of terrorist attacks. And while the availability of this content is concerning, this attribution misplaces cause and effect. The ideas are not driving the hate: instead, the hate and fear felt by these extremists is finding an outlet in these ideas. Just as Islamic State propaganda landed with young, socially-isolated and vulnerable Muslims and recent converts to Islam in the 2010s, so does white nationalist propaganda land with young, socially-isolated and vulnerable men and women in the 2020s.</p><p>In both cases, the first reaction of terrorism prevention professionals has been to advocate for content restrictions. While there is certainly content that should be restricted (terrorist manifestos and the live-streams of terrorist incidents are two clear-cut cases), restricting other types of extremist content quickly becomes difficult. The internet is decentralized and distributed, and so are the laws that govern content restrictions. Recent experience has demonstrated that this is not a practical solution.</p><p>Nor does restricting the content remove the underlying conditions for radicalization and mobilization (how people act on their extremist ideas). Even more confounding, millions of people consume extremist content online, and tens of thousands (and probably many more) are white nationalists. But only a very small fraction of these individuals will go on to commit acts of violence. The challenge lies in figuring out who will move from ideas to action.</p><p>One solution is to significantly expand law enforcement and security service surveillance of individuals consuming white nationalist (and other IMVE) content and try to proactively identify people mobilizing to violence. While possible, this would require a significant increase in national security budgets in Canada and would greatly enhance the number of people under surveillance, infringing on their civil liberties. It also would not solve the problem of signal to noise: there is still no good way to predict who will act on their extremist ideas.</p><p>This is why the finding of the attack being motivated by white nationalist extremism is so important for Canadians. We need to understand that this type of ideology can lead to murder and terrorism. People do not tend to radicalize and mobilize in isolation: they usually do that by consuming extremist content (often online, although it can also happen in-person), and will often try to find &#8220;fellow travellers&#8221; with whom they can share their extremist ideas. Even so-called lone actors (like Veltman, people who commit acts of terrorism on their own) share information about their intention and plans with people around them, although not always intentionally.</p><p>While the finding of terrorism in this case is important from a signaling perspective (helping Canadians understand that terrorism can look like a white man deliberately hitting a Muslim family with his vehicle), it does little to make Canada safer. To do that, law enforcement and security services need to get better at preventing this type of attack, which they can only do with better research into the mobilization process. They also need to be more transparent about why they are not able to detect attackers before they act: the reasons might point to legislative or policy changes that need to be made to make all Canadians safer. Fundamentally, law enforcement and security services need to develop better tools to detect and disrupt ideologically-motivated violent extremism before it takes another life in this country. The body count is already too high.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/p/canada-needs-to-detect-terrorist?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/p/canada-needs-to-detect-terrorist?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p><em>If you want to learn more about how the January 6th insurrection on the US Capitol was financed, and what can be done to stop the next incident, have a read of our report:</em> </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://insightthreatintelligence.thinkific.com/courses/financing-january-6th" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Y-hM!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcbe465a1-bc5a-4bf6-8510-6ed49c44326e_1467x552.png 424w, https://substackcdn.com/image/fetch/$s_!Y-hM!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcbe465a1-bc5a-4bf6-8510-6ed49c44326e_1467x552.png 848w, https://substackcdn.com/image/fetch/$s_!Y-hM!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcbe465a1-bc5a-4bf6-8510-6ed49c44326e_1467x552.png 1272w, https://substackcdn.com/image/fetch/$s_!Y-hM!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcbe465a1-bc5a-4bf6-8510-6ed49c44326e_1467x552.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Y-hM!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcbe465a1-bc5a-4bf6-8510-6ed49c44326e_1467x552.png" width="1456" height="548" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cbe465a1-bc5a-4bf6-8510-6ed49c44326e_1467x552.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:548,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1238173,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://insightthreatintelligence.thinkific.com/courses/financing-january-6th&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Y-hM!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcbe465a1-bc5a-4bf6-8510-6ed49c44326e_1467x552.png 424w, https://substackcdn.com/image/fetch/$s_!Y-hM!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcbe465a1-bc5a-4bf6-8510-6ed49c44326e_1467x552.png 848w, https://substackcdn.com/image/fetch/$s_!Y-hM!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcbe465a1-bc5a-4bf6-8510-6ed49c44326e_1467x552.png 1272w, https://substackcdn.com/image/fetch/$s_!Y-hM!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcbe465a1-bc5a-4bf6-8510-6ed49c44326e_1467x552.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>&#169; 2024 Insight Threat Intelligence Ltd. All Rights Reserved.<br><br>This newsletter and its contents are protected by Canadian copyright law. Except as otherwise provided for under Canadian copyright law, this newsletter and its contents may not be copied, published, distributed, downloaded or otherwise stored in a retrieval system, transmitted or converted, in any form or by any means, electronic or otherwise, without the prior written permission of the copyright owner.</em></p>]]></content:encoded></item><item><title><![CDATA[Canada's first prosecution of white nationalist terrorism]]></title><description><![CDATA[Interview with CBC's The Current]]></description><link>https://newsletter.insightthreatintel.com/p/canadas-first-prosecution-of-white</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/canadas-first-prosecution-of-white</guid><dc:creator><![CDATA[Jessica Davis, PhD]]></dc:creator><pubDate>Tue, 27 Feb 2024 14:01:06 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!wfLa!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f468905-20d6-4060-babc-a370455ef2c0_800x512" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Last week, I was on CBC&#8217;s The Current speaking with Matt Galloway about Canada&#8217;s first case of prosecuted white nationalist terrorism. This case is important because it demonstrates that the police and prosecutors have a viable strategy for investigating and prosecuting this type of offence as terrorism. They can now use that strategy to tackle harder cases, like pre-emptive cases. I&#8217;ve copied the transcript of the interview below, and you can also listen to it here: </em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cbc.ca/listen/live-radio/1-63/clip/16044551&quot;,&quot;text&quot;:&quot;Listen: CBC&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cbc.ca/listen/live-radio/1-63/clip/16044551"><span>Listen: CBC</span></a></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!wfLa!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f468905-20d6-4060-babc-a370455ef2c0_800x512" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!wfLa!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f468905-20d6-4060-babc-a370455ef2c0_800x512 424w, https://substackcdn.com/image/fetch/$s_!wfLa!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f468905-20d6-4060-babc-a370455ef2c0_800x512 848w, https://substackcdn.com/image/fetch/$s_!wfLa!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f468905-20d6-4060-babc-a370455ef2c0_800x512 1272w, https://substackcdn.com/image/fetch/$s_!wfLa!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f468905-20d6-4060-babc-a370455ef2c0_800x512 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!wfLa!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f468905-20d6-4060-babc-a370455ef2c0_800x512" width="424" height="424" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0f468905-20d6-4060-babc-a370455ef2c0_800x512&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:&quot;normal&quot;,&quot;height&quot;:512,&quot;width&quot;:512,&quot;resizeWidth&quot;:424,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!wfLa!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f468905-20d6-4060-babc-a370455ef2c0_800x512 424w, https://substackcdn.com/image/fetch/$s_!wfLa!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f468905-20d6-4060-babc-a370455ef2c0_800x512 848w, https://substackcdn.com/image/fetch/$s_!wfLa!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f468905-20d6-4060-babc-a370455ef2c0_800x512 1272w, https://substackcdn.com/image/fetch/$s_!wfLa!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f468905-20d6-4060-babc-a370455ef2c0_800x512 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Generated from Substack&#8217;s AI image generation tool</figcaption></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/subscribe?"><span>Subscribe now</span></a></p><p>If you&#8217;d like to read a bit of background on the case, you can read our analysis here: </p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;f93eb918-6217-4eda-aa62-8f05806da970&quot;,&quot;caption&quot;:&quot;Today marks the second anniversary of the London Truck Attack. On June 6, 2021, four members of a family were killed when Nathaniel Veltman drove his pickup truck onto a pedestrian crosswalk in London, Ontario. Police investigations found that the attack was motivated by anti-Muslim hatred. The perpetrator was initially charged with four counts of murde&#8230;&quot;,&quot;cta&quot;:null,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;The Second Anniversary of the London Truck Attack&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:85208154,&quot;name&quot;:&quot;Elena Martynova&quot;,&quot;bio&quot;:&quot;Research Analyst &quot;,&quot;photo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/f22ef549-0c81-4b18-bf1f-e4d127287ef6_674x674.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2023-06-06T13:01:02.212Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F353edbc3-c920-4bf7-92d2-40e767b9428a_933x532.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/the-second-anniversary-of-the-london&quot;,&quot;section_name&quot;:&quot;Attack profiles&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:126044873,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:1,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F09b767fc-6dde-4336-90bb-7806e0822653_900x900.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p><a href="https://www.cbc.ca/radio/thecurrent/friday-february-23-2024-full-transcript-1.7124652">From CBC&#8217;s The Current</a>: </p><p><strong>JESSICA DAVIS: </strong>Good morning, Matt.</p><p><strong>MG: </strong>When you read or perhaps listen to that judge's decision yesterday, what went through your mind?</p><p><strong>JESSICA DAVIS: </strong>My initial reaction was one of extreme relief. It's one of those, when we look at this case, it is a textbook case of terrorism. And I think many of us, you know, terrorism experts looked at this and said, well, we really hope that the judge finds this because to find otherwise would really question or raise a lot of questions about our terrorism legislation, our judicial system, etc. So, the relief was palpable, I think, from people who are watching this kind of thing.</p><p><strong>MG: </strong>What does that mean? A textbook case of terrorism? Because to Dr. Sukhera's point, in past, that has not been a luxury afforded to Muslim communities. They saw it as a textbook case, a slam dunk, but weren't sure that that would be seen within a court of law, for example, because of past cases.</p><p><strong>JESSICA DAVIS: </strong>Yeah. And I think that concerns about bias in our judicial system, in our police force are justified. There's a lot of cases in the past that could have constituted a terrorism offence, particularly, I think about the Quebec Mosque shooting that were not charged as a terrorism offence. That we didn't see any conversation around terrorism other than some public statements at the time. So, in this case, if you take an unbiased look at the Criminal Code definition of terrorism, this case is textbook. It was driven by a desire to create fear in a particular community. It was driven by a very clear, if sometimes muddled ideology, but a very clearly ideological position. And those are two key components of terrorism offences in this country. So, looking at this from an unbiased perspective, this absolutely had to meet the definition of terrorism.</p><p><strong>MG: </strong>Is your sense that that definition is being applied more broadly now? Last fall, a young man was successfully prosecuted for terrorism in a misogynist attack in a spa. We've also seen terror charges laid recently against people accused of being involved in neo-Nazi groups. So, are prosecutors and police taking those ideologies more seriously than in past and more seriously in the context of terrorism than in past?</p><p><strong>JESSICA DAVIS: </strong>I think we're definitely seeing a change in how terrorism is perceived amongst law enforcement, security services and prosecutors in this country, and it's a welcome change. I mentioned a minute ago the Quebec Mosque shooting. You know, that is the kind of thing that should have been charged as terrorism.</p><p><strong>MG: </strong>Why wasn't it as you understand it?</p><p><strong>JESSICA DAVIS: </strong>There's a lot of complexities around, you know, what charges get brought. So, it's difficult to say specifically, but I think at the time that that occurred, police and our security services in general were reluctant to see what we now call ideologically motivated violent extremism as a form of terrorism. There was a bit of a denial that this kind of activity could rise to the level of terrorism. That is changed really significantly in the last, I'd say, four or five years with the charges that you mentioned. And I think part of that is that in our law enforcement security services, there have always been people who saw this kind of violence as terrorism and were arguing that this definitely fit the definition of terrorism and should be treated as such. But there was also some bias. I think if we can be really honest about it in that community that was reluctant to see, frankly, white people perpetrating terrorism.</p><p><strong>MG: </strong>A member of the Afzaal family said after this ruling that he believed this decision would offer, and perhaps this speaks to what you were just saying, would offer safety in future to other communities, not just Muslim communities, but Black and Jewish communities as well. What do you think?</p><p><strong>JESSICA DAVIS: </strong>I think this case is so important. And the incel case that you mentioned a minute ago is so important because it demonstrates that police have now successful investigative strategies for dealing with this kind of terrorism, and that those strategies can lead to successful prosecutions. Without successful strategies like that, police can become, you know, rightly reluctant to pursue these kinds of charges. So, this sets a very important precedence investigativelly and legally.</p><p><strong>MG: </strong>It was interesting in reading the judge's ruling yesterday, something leapt out at me. I just want to read it to you. "It is too simplistic to draw a straight line of causation between the offender's actions and what he read on the internet, but the offender drew much of his rage from internet sources, which he repeatedly accessed in the days and moments leading up to this attack. The tentacles of hate can reach a broad audience when they are merely a click away." What do we do about that?</p><p><strong>JESSICA DAVIS: </strong>Well, I disagree with one piece in that statement, which is that the ideas are driving the hate. I think instead, it's better to think about it as the hate was finding an outlet in the ideas. And this puts the problem in a different perspective. A lot of our ideologically motivated violent extremists are driven by hate, anger, fear, social isolation. They're finding outlet in extremist content. There's a couple of options that we have for this. One of them is to try to take down all extremist content, but I probably don't need to explain how difficult that would be and how implausible that is as an actual strategy. We can try to limit it. We can try to restrict access to things like terrorist manifestos, which I think is a good idea. But seeing this as the solution is not, is not a solution to the terrorism and extremism problem. We can also significantly expand surveillance to try to proactively identify people who might go on to commit violence. But the number of people who are consuming this kind of content is in the hundreds of thousands, if not millions, and only a very, very small number of them will go on to commit an act of terrorism. So again, that's not a great solution either. We can also accept a particular level of terrorism, but that's not a satisfying solution for anybody who's lost a loved family member or a community member in a terrorist attack, and not one that I would advocate for either. Which leaves us with the much harder and longer-term solution, which is to build a society and a system that addresses or begins to address some of these underlying causes of hate and fear. And that is a very long-term prospect.</p><p><strong>MG: </strong>It speaks back to what Tabinda Bukharii said, that this hate didn't exist in a vacuum. It thrived in the whispers and the prejudices and the normalized fear of the other. I mean, that can be online, but that can be, as they say, in real life as well.</p><p><strong>JESSICA DAVIS: </strong>Yes. And I think that that was a really important and salient point when we think about people who are radicalizing and potentially mobilizing violence. We're all, most of us know people who have some form of extremist ideas, often driven by fear or concern. Fear of loss, you know, the sense that their position in society is being threatened. And we all need to accept that that's something that we need to be aware of and try to work to reduce the social isolation of those people and try to bring them back into the fold. Because it's the whispers that really drive the extremism.</p><p><strong>MG: </strong>In the meantime, your belief, just finally, is that--I said that this is a test case. That this case, having passed that test will change how law enforcement deals with incidents like this in future.</p><p><strong>JESSICA DAVIS: </strong>I think the changes already occurred. I think what we saw was proof of their new approach to this kind of thing. I think the real test, though, will come with cases that are less clear cut. Where there's less overwhelming evidence of the terrorist motivation, and when they're actually in the pre-emption stage. When they've stopped someone ahead of time. And there's no clear event that we can point to at the end.</p><p><strong>MG: </strong>Jessica, we'll leave it there. Thank you very much.</p><p><strong>JESSICA DAVIS: </strong>Thanks, Matt.</p><p><strong>MG: </strong>Jessica Davis is president of Insight Threat Intelligence and a former CSIS analyst.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/p/canadas-first-prosecution-of-white?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/p/canadas-first-prosecution-of-white?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p></p>]]></content:encoded></item><item><title><![CDATA[Making millions on terrorism? Hamas, short selling, and October 7th]]></title><description><![CDATA[Watching the birth of stigmatized knowledge and conspiracy theories]]></description><link>https://newsletter.insightthreatintel.com/p/making-millions-on-terrorism-hamas</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/making-millions-on-terrorism-hamas</guid><dc:creator><![CDATA[Jessica Davis, PhD]]></dc:creator><pubDate>Wed, 13 Dec 2023 11:47:21 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/801c00ca-f691-472f-9a7f-b53f23f12905_800x800.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Welcome to a special edition of Insight Monitor, where we&#8217;re looking at whether someone actually made millions short-selling Israeli securities before the Hamas attack. I&#8217;m making this article free to read because there&#8217;s a lot of misinformation out there that needs to be corrected. Have a read, and let me know what you think in the comments!</em> </p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/p/making-millions-on-terrorism-hamas?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/p/making-millions-on-terrorism-hamas?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><h2>The Puzzle</h2><p>Last week, two US-based researchers published an article <a href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4652027">&#8220;Trading on Terror?&#8221;</a>. The authors argue that in the days leading up to the October 7th Hamas attack, there was anomalous short selling on the Israeli stock exchange. </p><p><em>(Short selling is taking a position in the securities market, betting that the price of a security will lose value at some time in the future.)</em></p><p>The authors try to determine who took these short positions, and why. </p><p>They put forward <strong>two propositions</strong>: </p><ol><li><p>That abnormal short selling occurred </p></li><li><p>That informed traders knew about Hamas&#8217;s planned activities and sought to profit from them</p></li></ol><p><em>(Informed traders are people with more information than the general market participant, and who try to use this information to make a profit.)</em> </p><h3>Proposition 1: Anomalous short selling </h3><p>The basis of the research is that a sharp and unusual increase in the shorting of Israeli companies occurred just before the terrorist attacks of October 7th. The authors spend the bulk of their paper demonstrating this anomalous activity. In response to the article, the head of Israel Securities Authorities stated that there were <a href="https://www.reuters.com/world/middle-east/tel-aviv-bourse-says-no-unusual-trading-ahead-oct-7-hamas-attack-2023-12-05/">no significant trading abnormalities</a> in the lead-up to the attack. </p><p>The authors contend that the unusual short selling is consistent with substantial block trades, and that a small number of actors appear to be behind this options trading. </p><p><em>(Block trades are privately negotiated futures or options that are permitted to be executed apart from the public market)</em></p><p>Israeli authorities further determined that the short position in Bank Leumi (one of the illustrative cases) was actually taken by an <a href="https://www.reuters.com/world/middle-east/tel-aviv-bourse-says-no-unusual-trading-ahead-oct-7-hamas-attack-2023-12-05/">unidentified Israeli bank</a> known to the Tel Aviv Stock Exchange (TASE). Finally, whoever carried out these short sells would be transparent to the local regulator because they would <a href="https://en.globes.co.il/en/article-huge-errors-in-us-study-about-tase-short-sellers-1001464098">have to sign a lending agreement</a> with a TASE member, so the identity of the short sellers is not a mystery. </p><p><strong>In brief:</strong> according to Israeli authorities, there was nothing anonymous, or puzzling, about this activity. </p><p>I find these explanations from Israeli authorities particularly compelling because our political climate is not currently one in which we minimize Hamas&#8217;s capabilities. </p><h3>Proposition 2: That informed traders knew about Hamas&#8217;s planned activities and sought to profit from them</h3><p>Setting aside Proposition 1 for a moment, let&#8217;s evaluate Proposition 2 on its own merits. </p><p>The authors argue that the most plausible explanation for the anomalous activity is that whoever made the trades was familiar with <a href="https://www.economist.com/finance-and-economics/2023/12/05/did-hamas-make-millions-trading-the-october-7th-attacks">Hamas&#8217;s secrets</a>.  They look at pre-incident anomalies and conclude that in October, these anomalies were related to the Hamas attack. </p><p>To strengthen this assertion, the authors look at another date (5 April 2023) and find similar anomalies. According to The Times of Israel, this date was the original date of the Hamas attack. This assertion is based on source reporting from <a href="https://www.timesofisrael.com/hamas-onslaught-was-originally-planned-for-first-night-of-passover-report/">unnamed soldiers </a>in the Israel Defence Force&#8217;s 8200 signals intelligence unit. The authors conclude that &#8220;taken together, this evidence strengthens the interpretation that the trading observed in October and April was related to the Hamas attack rather than random noise.&#8221; </p><p>I disagree.</p><h3>General Problems with the Study </h3><p>There were several general problems with the study that affected its internal and external reliability. <a href="http://ttps://en.globes.co.il/en/article-huge-errors-in-us-study-about-tase-short-sellers-1001464098">Data problems</a> (not understanding that TASE prices are quoted in Agorot, not Shekels) seriously undermine the internal reliability of this paper.  </p><p>The study was also poorly theorized / conceptualized. There have been few (if any) studies linking short selling with terrorist activity, and certainly very few (if any) studies that suggest that terrorists raise funds in this way.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a>  The lack of familiarity with terrorist financing literature affects the external reliability of the paper, as well as the general theorizing about what happened, and why. </p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;caee16a3-ff6c-4ed7-afca-5312dadb61ab&quot;,&quot;caption&quot;:&quot;Hello all, I&#8217;m writing this newsletter to you in the context of the ongoing conflict in Israel / Gaza. What a week it&#8217;s been. I&#8217;ve had many questions about Hamas finance over the last few days, so the team and I are working on a series exploring that. Today, we&#8217;ll talk specifically about Hamas fundraising &amp; revenue generation, and in future articles, we&#8217;ll look at how the group uses, moves, stores, manages, and obscures their funds. Each of these mechanisms presents different counter-financing opportunities, so they&#8217;re important to analyze separately. This is developing analysis, so please check back frequently for updates &#8212; we will add new information and refine our analysis as information becomes available. As always, I appreciate you sharing this newsletter with anyone who might be interested or find it useful.&quot;,&quot;cta&quot;:null,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Hamas Fundraising &amp; Revenue-Generation&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:33479672,&quot;name&quot;:&quot;Jessica Davis&quot;,&quot;bio&quot;:&quot;Jessica Davis is President of Insight Threat Intelligence and is the author of Women in Modern Terrorism: From Liberations Wars to Global Terrorism and the Islamic State (2017), and Illicit Money: Financing Terrorism in the 21st Century (2021).&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e312ae7c-114b-4e4f-9ce1-8bf50ddb7a27_2344x2049.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2023-10-12T11:08:30.461Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9b7e1fc8-eb67-4270-9c12-379def7d1ce1_936x480.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/hamas-fundraising-and-revenue-generation&quot;,&quot;section_name&quot;:&quot;Group Profiles &quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:137892656,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:7,&quot;comment_count&quot;:1,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F09b767fc-6dde-4336-90bb-7806e0822653_900x900.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>There were also few, if any, alternative explanations considered and tested. For instance, some critiques have suggested that the anomalies could reflect the closing positions of investors on the first day of a quarter, or that they might have been a market-maker&#8217;s response to a trader buying up <a href="https://www.economist.com/finance-and-economics/2023/12/05/did-hamas-make-millions-trading-the-october-7th-attacks">shares in the fund</a>. </p><p>Finally, the type of statistical modelling that the authors use is not particularly compelling for determining correlation. For that, we would need a more robust model controlling for a series of variables as well as seasonality in stock prices and short-selling volumes to determine actual anomalous activity and potentially link it to prior knowledge of a terrorist attack. </p><p>The authors essentially identify anomalous activity (proposition 1), and explore one explanation (proposition 2) to explain it. But neither proposition stands on its own, and certainly not taken together. </p><p>Finally, the authors do not discuss how the informed traders would come to know about the attack. This would likely occur if the traders were in the inner sanctum of Hamas&#8217;s operational planning. Given the <a href="https://www.newyorker.com/news/news-desk/what-was-hamas-thinking">closed circle</a> involved in planning this attack, the idea that Hamas would share details of the attack is extremely unlikely, as is the idea that Hamas would encourage informed traders to short these stocks, particularly if it raised the risk of detection. </p><p>It&#8217;s worthwhile noting that Hamas has the financial sophistication to short sells stocks and exchange traded funds in advance of an attack. But they have enough money from other financing activities that doing anything so is not worth the effort, particularly if it raises the risk of detection. And even if they did seek to profit from their attack in this way, they would likely take small positions so as to avoid detection (and avoid creating anomalous data). </p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Insight Monitor is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h3>The Policy Response </h3><p>Despite these serious limitations, the authors go on to discuss policy responses. They state that informed traders profited by anticipating the events of October 7th. They suggest that there should be incentives for informed traders to report knowledge of impending terrorist attacks, and that these incentives need to be strong enough to overcome the profit motivation of the informed traders. </p><p>They do not, however, discuss how the informed traders might have become aware of a highly secretive terrorist operation, nor do they discuss the viability of encouraging people who might be in the inner circles of terrorist groups to disclose this information to law enforcement and security services. (They put this forward as a potential policy response to this alleged problem, but do not consider whether this is realistic or feasible.) </p><p>Ultimately, the authors conclude by saying that &#8220;we have provided suggestive evidence that trading on terror occurs through informed trading in securities markets.&#8221; I think they&#8217;ve failed to both demonstrate that there was anomalous activity, and certainly have failed to demonstrate that its only causal mechanism was prior knowledge of a terrorist attack, or even that this is a viable scenario. </p><p>Despite these serious flaws, we all know that this is going to come up for the next decade as &#8220;evidence&#8221; of terrorist use of securities / options trading. The only value this article has, in my view, is to demonstrate how poorly conceived research evolves into <a href="https://journals.sagepub.com/doi/abs/10.1177/0392192116669288">stigmatized knowledge</a> and can become part of conspiracy theories. </p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;68f2d36b-5fd3-4716-956a-4d1ab8e6f5a0&quot;,&quot;caption&quot;:&quot;Last week, we looked at how Hamas raises funds. Once the organization acquires the money, what does it spend it on? With estimated revenues as high as $590 million per year, there is a lot that Hamas can buy. Some of the groups&#8217; expenses are obvious &#8211; such as using funds to purchase weapons and to conduct military operations. However, Hamas also spends funds on social services, administrative costs, and other expenditure streams. Keep reading to learn more.&quot;,&quot;cta&quot;:null,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;How does Hamas spend its nearly half a billion dollar budget?&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:85208154,&quot;name&quot;:&quot;Elena Martynova&quot;,&quot;bio&quot;:&quot;Research Analyst &quot;,&quot;photo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/f22ef549-0c81-4b18-bf1f-e4d127287ef6_674x674.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2023-10-19T11:33:31.034Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F08986b86-86de-4fdf-9225-7bc6ce60ad54_1500x1000.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/how-does-hamas-spent-its-nearly-half&quot;,&quot;section_name&quot;:&quot;Group Profiles &quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:138087153,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:7,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F09b767fc-6dde-4336-90bb-7806e0822653_900x900.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;451864bc-bd66-4c50-86c3-8253bcdaea7d&quot;,&quot;caption&quot;:&quot;As the final instalment in our series on Hamas, we&#8217;re looking at how the organization manages its money. Hamas has a multifaceted governance structure that includes political, military, and social branches. Several leaders assume financial responsibilities within this structure, while numerous external financiers also play a crucial role in facilitating the group&#8217;s financial flows. Much like any other organization, however, Hamas has not been immune to issues of financial mismanagement &#8212; including instances of corruption and theft. Examining fund management is important because it offers critical insights into the operations and sustainability of Hamas. Furthermore, many of the group&#8217;s leaders and financiers have been sanctioned, shedding light on the international community&#8217;s disruption techniques and the organization&#8217;s ability to adapt to changing circumstances.&quot;,&quot;cta&quot;:null,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Hamas Financial Management&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:85208154,&quot;name&quot;:&quot;Elena Martynova&quot;,&quot;bio&quot;:&quot;Research Analyst &quot;,&quot;photo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/f22ef549-0c81-4b18-bf1f-e4d127287ef6_674x674.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2023-11-10T14:00:38.433Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc865f483-f6a4-46d9-9afa-5398e56f1c6e_1500x1000.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/hamas-financial-management&quot;,&quot;section_name&quot;:&quot;Group Profiles &quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:138732617,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:5,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F09b767fc-6dde-4336-90bb-7806e0822653_900x900.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;cd9d2d61-26b3-45d4-adb4-ffc4bb5154e3&quot;,&quot;caption&quot;:&quot;On October 18, 2023, the US Department of the Treasury&#8217;s Office of Foreign Assets Control imposed sanctions on ten key Hamas terrorist group members, operatives, and financial facilitators. These sanctions add to the already extensive list of Hamas-affiliated individuals and entities that the US has designated throughout the years. Sanctions and other measures are necessary to help counter the intricate financial network that Hamas has built to hide its money.&quot;,&quot;cta&quot;:null,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Hamas&#8217;s Financial Obfuscation Techniques&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:85208154,&quot;name&quot;:&quot;Elena Martynova&quot;,&quot;bio&quot;:&quot;Research Analyst &quot;,&quot;photo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/f22ef549-0c81-4b18-bf1f-e4d127287ef6_674x674.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2023-11-02T13:01:26.747Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1580b3b-5281-40fb-833d-79b3035bd45a_936x624.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/hamass-financial-obfuscation-techniques&quot;,&quot;section_name&quot;:&quot;Group Profiles &quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:138505342,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:6,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F09b767fc-6dde-4336-90bb-7806e0822653_900x900.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;4ca66375-d967-4916-9220-b8e0bfdc1d1b&quot;,&quot;caption&quot;:&quot;Analyzing the fundraising strategies and expenses of terrorist organizations yields insights that help determine which counter-terrorism financing tools could be most useful to employ. Earlier this month, we highlighted how Hamas raises and uses funds. Examining how Hamas stores and transfers funds can reveal additional opportunities to disrupt the group's financial operations.&quot;,&quot;cta&quot;:null,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;How Hamas Stores and Moves Money&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:85208154,&quot;name&quot;:&quot;Elena Martynova&quot;,&quot;bio&quot;:&quot;Research Analyst &quot;,&quot;photo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/f22ef549-0c81-4b18-bf1f-e4d127287ef6_674x674.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2023-10-26T13:01:22.155Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc6a3401b-e9ee-47eb-b88b-a19cd426e34a_936x624.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/how-hamas-stores-and-moves-money&quot;,&quot;section_name&quot;:&quot;Group Profiles &quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:138291957,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:7,&quot;comment_count&quot;:1,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F09b767fc-6dde-4336-90bb-7806e0822653_900x900.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://insightthreatintelligence.thinkific.com/bundles/tf-analysis" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!dU_K!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8782aff-c9c3-4da5-a41b-acd2326801de.heic 424w, https://substackcdn.com/image/fetch/$s_!dU_K!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8782aff-c9c3-4da5-a41b-acd2326801de.heic 848w, https://substackcdn.com/image/fetch/$s_!dU_K!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8782aff-c9c3-4da5-a41b-acd2326801de.heic 1272w, https://substackcdn.com/image/fetch/$s_!dU_K!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8782aff-c9c3-4da5-a41b-acd2326801de.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!dU_K!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8782aff-c9c3-4da5-a41b-acd2326801de.heic" width="514" height="514" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b8782aff-c9c3-4da5-a41b-acd2326801de.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1080,&quot;width&quot;:1080,&quot;resizeWidth&quot;:514,&quot;bytes&quot;:204417,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:&quot;https://insightthreatintelligence.thinkific.com/bundles/tf-analysis&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!dU_K!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8782aff-c9c3-4da5-a41b-acd2326801de.heic 424w, https://substackcdn.com/image/fetch/$s_!dU_K!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8782aff-c9c3-4da5-a41b-acd2326801de.heic 848w, https://substackcdn.com/image/fetch/$s_!dU_K!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8782aff-c9c3-4da5-a41b-acd2326801de.heic 1272w, https://substackcdn.com/image/fetch/$s_!dU_K!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8782aff-c9c3-4da5-a41b-acd2326801de.heic 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Our terrorist financing analysis course is open for the next two months. In February, we&#8217;re going to close it to new registrations while we do an update, and re-open sometime in mid-2024. So sign up today if this is on your to-do list for 2023 or 2024! All current students maintain access to course content, forever. </p><p><em>&#169; 2023 Insight Threat Intelligence Ltd. All Rights Reserved.<br><br>This newsletter and its contents are protected by Canadian copyright law. Except as otherwise provided for under Canadian copyright law, this newsletter and its contents may not be copied, published, distributed, downloaded or otherwise stored in a retrieval system, transmitted or converted, in any form or by any means, electronic or otherwise, without the prior written permission of the copyright owner.</em></p><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-1" href="#footnote-anchor-1" class="footnote-number" contenteditable="false" target="_self">1</a><div class="footnote-content"><p>Jessica Davis, &#8220;Understanding the Effects and Impacts of Counter-Terrorist Financing Policy and Practice,&#8221; <em>Terrorism and Political Violence</em> 0, no. 0 (June 9, 2022): 1&#8211;17, <a href="https://doi.org/10.1080/09546553.2022.2083507">https://doi.org/10.1080/09546553.2022.2083507</a>.</p><p></p></div></div>]]></content:encoded></item></channel></rss>