<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Insight Monitor: Financiers]]></title><description><![CDATA[Arrests, prosecutions, and disruptions of financiers and their networks. ]]></description><link>https://newsletter.insightthreatintel.com/s/financiers</link><image><url>https://substackcdn.com/image/fetch/$s_!I_1w!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4649d7af-94ce-49ea-8c58-368ec26cd423_900x900.png</url><title>Insight Monitor: Financiers</title><link>https://newsletter.insightthreatintel.com/s/financiers</link></image><generator>Substack</generator><lastBuildDate>Wed, 08 Apr 2026 19:31:07 GMT</lastBuildDate><atom:link href="https://newsletter.insightthreatintel.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Jessica Davis]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[jmd@insightthreatintel.com]]></webMaster><itunes:owner><itunes:email><![CDATA[jmd@insightthreatintel.com]]></itunes:email><itunes:name><![CDATA[Jessica Davis, PhD]]></itunes:name></itunes:owner><itunes:author><![CDATA[Jessica Davis, PhD]]></itunes:author><googleplay:owner><![CDATA[jmd@insightthreatintel.com]]></googleplay:owner><googleplay:email><![CDATA[jmd@insightthreatintel.com]]></googleplay:email><googleplay:author><![CDATA[Jessica Davis, PhD]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Obscuring the Money Behind the Bombs: New Data on Terrorist Financial Tradecraft]]></title><description><![CDATA[How terrorists are hiding the source, destination, and use of funds -- and what to do about it]]></description><link>https://newsletter.insightthreatintel.com/p/obscuring-the-money-behind-the-bombs</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/obscuring-the-money-behind-the-bombs</guid><dc:creator><![CDATA[Jessica Davis, PhD]]></dc:creator><pubDate>Tue, 03 Mar 2026 14:03:28 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!t2RV!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21118c2c-ea5a-46c8-9fbd-40ae731b5546_1047x596.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Hello <strong>Insight Monitor</strong> subscribers, and welcome to another edition of our series on trends in terrorist financing, using a unique longitudinal dataset. This series goes beyond headline cases and anecdotes, offering data-driven insights and analysis you won&#8217;t find anywhere else. In this issue, I focus on how terrorists obscure the sources, destinations, and uses of funds&#8212;and what this reveals about terrorist financial adaptation.</em></p><p>Terrorist financing is often discussed in terms of <em>how money is raised</em>, but far less attention is paid to what happens next: how that money is deliberately hidden. In this context, obscuring refers to the financial tradecraft terrorists use to hide the source, destination, or ultimate use of funds&#8212;a set of practices designed to frustrate detection, complicate attribution, and sever the visible link between money and violence. Drawing on my existing dataset, this newsletter examines how terrorist groups and individuals disguise terrorist funds. Understanding these techniques is essential for a more operational understanding of how these networks and actors survive under sustained financial pressure.</p><p>To get caught up on the series so far (and learn more about the data, have a read: </p><ol><li><p><a href="https://newsletter.insightthreatintel.com/p/trends-in-terrorist-financing-2020?r=jxl2w&amp;utm_campaign=post&amp;utm_medium=web&amp;triedRedirect=true">Trends in Terrorist Financing 2020-2025</a></p></li><li><p><a href="https://newsletter.insightthreatintel.com/p/beyond-anecdotes-terrorist-financing">Beyond Anecdotes: Terrorist Financing Has Moved to Crypto</a></p></li></ol><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Insight Monitor is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>Over the past six years, terrorists have demonstrably increased their use of financial tradecraft to obscure the source, destination, and use of funds. Importantly, the patterns observed in open cases and enforcement actions almost certainly represent a lower bound of actual tradecraft in use: the most sophisticated methods are, by definition, the least likely to be detected, investigated, or publicly documented.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!rwix!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c9838f3-ac2a-4d6e-bc24-8599a04adc61_993x576.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!rwix!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c9838f3-ac2a-4d6e-bc24-8599a04adc61_993x576.png 424w, https://substackcdn.com/image/fetch/$s_!rwix!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c9838f3-ac2a-4d6e-bc24-8599a04adc61_993x576.png 848w, https://substackcdn.com/image/fetch/$s_!rwix!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c9838f3-ac2a-4d6e-bc24-8599a04adc61_993x576.png 1272w, https://substackcdn.com/image/fetch/$s_!rwix!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c9838f3-ac2a-4d6e-bc24-8599a04adc61_993x576.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!rwix!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c9838f3-ac2a-4d6e-bc24-8599a04adc61_993x576.png" width="993" height="576" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1c9838f3-ac2a-4d6e-bc24-8599a04adc61_993x576.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:576,&quot;width&quot;:993,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:59153,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://newsletter.insightthreatintel.com/i/153040222?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c9838f3-ac2a-4d6e-bc24-8599a04adc61_993x576.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!rwix!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c9838f3-ac2a-4d6e-bc24-8599a04adc61_993x576.png 424w, https://substackcdn.com/image/fetch/$s_!rwix!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c9838f3-ac2a-4d6e-bc24-8599a04adc61_993x576.png 848w, https://substackcdn.com/image/fetch/$s_!rwix!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c9838f3-ac2a-4d6e-bc24-8599a04adc61_993x576.png 1272w, https://substackcdn.com/image/fetch/$s_!rwix!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c9838f3-ac2a-4d6e-bc24-8599a04adc61_993x576.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Over time, terrorist financing has become more complex, though it still generally lacks the sophistication typically observed in large-scale money laundering or other forms of illicit finance. This growing complexity is not driven by a single innovation, but by the layering of methods that, when combined, increase network opacity. These methods include continued reliance on cash, the use of facilitators and enablers, the deployment of third parties and proxies, and the selective adoption of money-laundering techniques. Keep reading to learn more: </p>
      <p>
          <a href="https://newsletter.insightthreatintel.com/p/obscuring-the-money-behind-the-bombs">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[The Axis of Illicit Finance: Iran’s Crypto Strategy Explained]]></title><description><![CDATA[Part 1 of a new 8-part series on Iran's use of cryptocurrency for sanctions evasion]]></description><link>https://newsletter.insightthreatintel.com/p/the-axis-of-illicit-finance-irans</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/the-axis-of-illicit-finance-irans</guid><dc:creator><![CDATA[Jessica Davis, PhD]]></dc:creator><pubDate>Tue, 06 Jan 2026 14:00:45 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/87b19738-1968-494d-aa46-98d0020cd199_845x486.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>This article marks the start of an eight-part series examining how Iran has increasingly relied on cryptocurrency to circumvent international sanctions.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a> These developments unfold against a volatile backdrop: Iran&#8217;s 2025 confrontation with Israel, the ongoing activity of its regional proxy network, and protests driven by corruption, economic hardship (exacerbated by sanctions), and political repression. Understanding how and why Iran uses cryptocurrency in its sanctions evasion strategy is essential for anticipating how it could adapt to future countermeasures and what that would mean for global security. Iran&#8217;s crypto activity is also part of a broader story. It sits within what I describe as the &#8220;axis of illicit finance&#8221;: an emerging alternative financial system involving other sanctioned or adversarial states, such as Russia, Venezuela, and the DPRK, with China playing a key supporting role. Over the coming installments, this series will unpack how this system operates, who benefits from it, and why it matters now more than ever.</em></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Insight Monitor is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h3>Iran&#8217;s Sanctions Context</h3><p>Iran has long employed adaptive financial strategies to mitigate the effects of international sanctions and continue backing its regional proxy organizations, including a <a href="https://home.treasury.gov/news/press-releases/sb0341">shadow shipping fleet</a>, <a href="https://www.state.gov/releases/2025/06/sanctioning-irans-shadow-banking-network-of-money-launderers-and-illicit-oil-traders/">money service business and front company networks</a>, and <a href="https://www.iranintl.com/en/202503267996">cash couriers</a>. As sanctions have restricted access to formal financial systems, Iran and its affiliates have increasingly relied on cryptocurrency to bypass controls and send funds to the Axis of Resistance, including Hizballah, Hamas, Ansarallah, and Iraqi militias. While Iran&#8217;s cryptocurrency-based financing infrastructure remains under development, it continues to advance in sophistication and scope, integrating legacy financial systems with emerging digital mechanisms. It is also increasingly part of an <a href="https://www.rusi.org/explore-our-research/publications/insights-papers/alternative-financial-systems-and-reshaping-global-finance">alternative financial system</a>formed by Russia and the DPRK, and supported by China and used by other countries, including Venezuela. As a result, cryptocurrency is likely to constitute an increasingly significant component of both Iran&#8217;s efforts to withstand sanctions and its ability to underwrite proxy activities region-wide.</p><h3><strong>A State Shaped by One of the World&#8217;s Most Comprehensive Sanctions Regimes</strong></h3><p>Since the 1979 revolution, Iran&#8217;s economy has repeatedly been hit by international sanctions. These measures are designed to restrict Iran&#8217;s access to the US dollar and to US financial institutions, as well as to foreign banks with correspondent relationships in the United States, thereby limiting its ability to conduct trade and international transactions. At various points, the economic impact of these sanctions has been compounded by volatility in global oil prices.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-2" href="#footnote-2" target="_self">2</a> In other cases, US and international sanctions have prompted Iran to make concessions during negotiations aimed at constraining its nuclear capabilities and development.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-3" href="#footnote-3" target="_self">3</a> However, under conditions of maximum pressure, these sanctions have also spurred the Iranian regime to intensify its efforts to evade them&#8212;both to bolster its negotiating leverage and to mitigate the economic impact at home. Increasingly, these efforts have incorporated cryptocurrencies.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/p/the-axis-of-illicit-finance-irans?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/p/the-axis-of-illicit-finance-irans?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;9277b765-d68e-4d9a-bc97-f91462c07150&quot;,&quot;caption&quot;:&quot;Hello, Insight Monitor subscribers, and welcome to a special edition of our newsletter. Today, we&#8217;re looking at the hack of Iran&#8217;s Nobitex cryptocurrency exchange and the implications of this hack on Iran&#8217;s ability to settle financial transactions and fund its Axis of Resistance (proxy network of militias and terrorist groups). As readers of this newsle&#8230;&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Digital Blow to Tehran: Hackers Disrupt Iran&#8217;s Illicit Finance Network&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:33479672,&quot;name&quot;:&quot;Jessica Davis, PhD&quot;,&quot;bio&quot;:&quot;Jessica Davis is President of Insight Threat Intelligence and is the author of Women in Modern Terrorism: From Liberations Wars to Global Terrorism and the Islamic State (2017), and Illicit Money: Financing Terrorism in the 21st Century (2021).&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e312ae7c-114b-4e4f-9ce1-8bf50ddb7a27_2344x2049.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2025-06-21T20:57:33.000Z&quot;,&quot;cover_image&quot;:&quot;https://images.unsplash.com/photo-1688765654157-564c4b2a7f39?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw4MXx8aXJhbiUyMGNyeXB0b3xlbnwwfHx8fDE3NTA1MzkyOTJ8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/digital-blow-to-tehran-hackers-disrupt&quot;,&quot;section_name&quot;:&quot;Commentary&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:166487630,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:15,&quot;comment_count&quot;:4,&quot;publication_id&quot;:329102,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!I_1w!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4649d7af-94ce-49ea-8c58-368ec26cd423_900x900.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!b458!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e0101cb-b82d-4ad6-8295-2c9d87ea5b44_800x2100.heic" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!b458!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e0101cb-b82d-4ad6-8295-2c9d87ea5b44_800x2100.heic 424w, https://substackcdn.com/image/fetch/$s_!b458!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e0101cb-b82d-4ad6-8295-2c9d87ea5b44_800x2100.heic 848w, https://substackcdn.com/image/fetch/$s_!b458!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e0101cb-b82d-4ad6-8295-2c9d87ea5b44_800x2100.heic 1272w, https://substackcdn.com/image/fetch/$s_!b458!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e0101cb-b82d-4ad6-8295-2c9d87ea5b44_800x2100.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!b458!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e0101cb-b82d-4ad6-8295-2c9d87ea5b44_800x2100.heic" width="800" height="2100" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8e0101cb-b82d-4ad6-8295-2c9d87ea5b44_800x2100.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:2100,&quot;width&quot;:800,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:147531,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://newsletter.insightthreatintel.com/i/183357175?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e0101cb-b82d-4ad6-8295-2c9d87ea5b44_800x2100.heic&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!b458!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e0101cb-b82d-4ad6-8295-2c9d87ea5b44_800x2100.heic 424w, https://substackcdn.com/image/fetch/$s_!b458!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e0101cb-b82d-4ad6-8295-2c9d87ea5b44_800x2100.heic 848w, https://substackcdn.com/image/fetch/$s_!b458!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e0101cb-b82d-4ad6-8295-2c9d87ea5b44_800x2100.heic 1272w, https://substackcdn.com/image/fetch/$s_!b458!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e0101cb-b82d-4ad6-8295-2c9d87ea5b44_800x2100.heic 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>To finance its proxies and evade sanctions, Iran operates a <a href="https://finintegrity.org/out-of-the-shadows/">parallel financial infrastructure</a> comprising a network of informal money transfer businesses, bank accounts, and front companies, all designed to launder the proceeds of oil sales and create <a href="https://www.economist.com/finance-and-economics/2024/10/17/inside-the-secret-oil-trade-that-funds-irans-wars">plausible deniability about the origin of the oil</a>. Wherever possible, this network intersects with the Western financial system, facilitating Iranian financial activities globally. For instance, media reports indicate that two financial technology companies, <a href="https://www.economist.com/finance-and-economics/2024/10/17/inside-the-secret-oil-trade-that-funds-irans-wars">Paysera and Wise</a>, have unwittingly processed payments for the network. Over the last eight years, Iran has also added cryptocurrency capabilities to this shadow banking network.</p><p>Serious cryptocurrency activity in Iran took off in the mid-2010s with the launch of Nobitex, the country&#8217;s <a href="https://www.reuters.com/business/finance/exclusive-crypto-exchange-binance-helped-iranian-firms-trade-8-billion-despite-2022-11-04/">first major crypto exchange</a>. As of 2023, Nobitex was Iran&#8217;s largest crypto exchange; Iran also has <a href="https://www.trmlabs.com/resources/blog/iran-crypto-economy">four other large exchanges</a>: Wallex.ir, Excoino, Aban Tether, and Bit24.cash.<sup> </sup>Nobitex is deeply embedded in Iran&#8217;s traditional payment ecosystem and enables real-time currency deposits, withdrawals, and account verification. Nobitex functions as a full-service financial bridge that allows users to bypass the international banking system, demonstrating &#8220;<a href="https://www.trmlabs.com/resources/blog/inside-the-nobitex-breach-what-the-leaked-source-code-reveals-about-irans-crypto-infrastructure">how crypto rails and domestic banking infrastructure can be fused in sanctioned jurisdictions to create resilient, borderless payment systems</a>.&#8221; Iranian citizens (and sometimes even regime members) use cryptocurrency as a means of <a href="https://irannewsupdate.com/news/economy/cryptocurrency-in-iran-a-double-edged-sword-amid-sanctions-and-economic-turmoil/">moving capital</a> out of Iran, particularly during geopolitical crises. Even for Iranian citizens not looking to offshore their wealth, many invest in cryptocurrency to protect their assets from the volatility of the Iranian currency and the broader economy.</p><p>Iran&#8217;s widespread adoption of cryptocurrency is unsurprising: sanctions can spur adoption, especially in regions with high income inequality.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-4" href="#footnote-4" target="_self">4</a> Indeed, cryptocurrency adoption is influenced by factors such as economic instability and infrastructure availability, and adoption rates are higher in countries with limited access to the traditional financial system.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-5" href="#footnote-5" target="_self">5</a></p><p>Beginning in 2018, Iran has turned to cryptocurrency to evade US sanctions. The IRGC is a key user, leveraging crypto to fund intelligence work and its proxy network across the Middle East, as well as foreign interference efforts such as sabotage, property damage, and possibly targeted killings.</p><h4><strong>Course Alert: Terrorist Financing Analysis</strong></h4><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://insightthreatintelligence.thinkific.com/bundles/tf-analysis" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!f7rH!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 424w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 848w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 1272w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!f7rH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png" width="1066" height="507" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:507,&quot;width&quot;:1066,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:698946,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://insightthreatintelligence.thinkific.com/bundles/tf-analysis&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!f7rH!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 424w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 848w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 1272w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>Our terrorist financing analysis course caters to researchers, intelligence, law enforcement, and compliance professionals, helping them learn about terrorist financing and analyze suspicious patterns to disrupt terrorist activities more effectively. <a href="https://insightthreatintelligence.thinkific.com/bundles/tf-analysis">Sign up </a>today to grow your counter-terrorism expertise.</em> </p><div><hr></div><p>The Iranian state, regime officials, and the IRGC use cryptocurrency to evade sanctions and gain access to international markets. According to one blockchain analytics company, Nobitex, as well as other Iranian exchanges, have used &#8220;<a href="https://www.trmlabs.com/resources/blog/new-drones-old-tactics-how-iran-uses-crypto-to-fund-conflict-and-evade-sanctions">advanced techniques&#8221;</a> to move funds and obfuscate their origin and destination. For instance, Iran uses cryptocurrency transactions to pay for imports that cannot be processed through <a href="https://www.csis.org/analysis/cryptocurrencies-and-us-sanctions-evasion-implications-russia">conventional payment systems</a> and to make up for revenues lost due to sanctions. Further, Iran has <a href="https://www.csis.org/analysis/cryptocurrencies-and-us-sanctions-evasion-implications-russia">specifically legalized</a> cryptocurrency payments for imports to circumvent sanctions and avoid using the dollar.<sup> </sup></p><p>In addition to cryptocurrency transactions, Iran also uses its oil surplus to power <a href="https://www.elliptic.co/blog/how-iran-uses-bitcoin-mining-to-evade-sanctions">Bitcoin mining</a>, effectively converting energy into cryptocurrency. Given Iran&#8217;s extensive use of cryptocurrency and connections through various blockchains to international markets, generating Bitcoin in this way creates liquidity for Iran, revenues that can be used to purchase goods and services, and money it can send to its proxies in its &#8220;Axis of Resistance&#8221;. Indeed, the <a href="https://www.ncr-iran.org/en/publications/special-reports/bitcoin-mining-in-iran-irgc-operations-and-the-power-grid-crisis/">IRGC</a> is widely believed to have undertaken extensive Bitcoin mining operations.<sup> </sup></p><p>Once Iran has obtained cryptocurrency, it uses those funds to finance other illicit activities. This includes financing groups within its axis of resistance that support Iran&#8217;s goal of regional hegemony,<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-6" href="#footnote-6" target="_self">6</a> as well as potentially using virtual assets to fund influence operations abroad.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-7" href="#footnote-7" target="_self">7</a> To date, cryptocurrency transactions from IRGC Qods Force (QF) have been sent to Hizballah, Hamas, and Ansarallah as part of the IRGC QF&#8217;s broader financing strategy. Cryptocurrency transactions might have benefited other groups in the Axis of Resistance as well.</p><p>Iran&#8217;s turn toward cryptocurrency marks the latest evolution in a long-running effort to withstand and circumvent one of the world&#8217;s most comprehensive sanctions regimes. What began as a workaround to maintain economic resilience has now become integral to financing Iran&#8217;s broader foreign policy aims, particularly the sustainment of its proxy network across the Middle East. As Iran&#8217;s crypto-financing infrastructure grows more sophisticated and increasingly interwoven with an emerging alternative financial system involving Russia, Venezuela, the DPRK, and China, the implications extend far beyond Tehran&#8217;s borders. The following articles in this series will examine how Iran&#8217;s proxies leverage these financial innovations, the specific methods used to move and conceal funds, and the expanding role of China and Russia in supporting and enabling Iran&#8217;s alternative financial architecture.</p><p>Read Part 2 here: </p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;a72f0991-1357-474b-9cab-1ef7238f2c51&quot;,&quot;caption&quot;:&quot;In part 1 of this series, we examined how Iran has increasingly turned to cryptocurrency as a core tool in its sanctions-evasion toolkit, using digital assets to bypass conventional financial controls and support its broader regional network of allied armed groups, including Hezbollah, Hamas, and Ansarallah (the Houthis).&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;From Tehran to Sana&#8217;a: Cryptocurrency and Sanctions Evasion in the Axis of Illicit Finance&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:33479672,&quot;name&quot;:&quot;Jessica Davis, PhD&quot;,&quot;bio&quot;:&quot;Jessica Davis is President of Insight Threat Intelligence and is the author of Women in Modern Terrorism: From Liberations Wars to Global Terrorism and the Islamic State (2017), and Illicit Money: Financing Terrorism in the 21st Century (2021).&quot;,&quot;photo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!ICh7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe312ae7c-114b-4e4f-9ce1-8bf50ddb7a27_2344x2049.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2026-02-24T14:02:37.624Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!0BCO!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ec115eb-33b1-4e33-8147-a3b6ffc1f04e_626x682.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/from-tehran-to-sanaa-cryptocurrency&quot;,&quot;section_name&quot;:&quot;Group Profiles &quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:186790350,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:2,&quot;comment_count&quot;:0,&quot;publication_id&quot;:329102,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!I_1w!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4649d7af-94ce-49ea-8c58-368ec26cd423_900x900.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/p/the-axis-of-illicit-finance-irans?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thanks for reading Insight Monitor! This post is public so feel free to share it.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/p/the-axis-of-illicit-finance-irans?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/p/the-axis-of-illicit-finance-irans?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div><p><em>&#169; 2026 Insight Threat Intelligence Ltd. All Rights Reserved. This newsletter and its contents are protected by Canadian copyright law. Except as otherwise provided for under Canadian copyright law, this newsletter and its contents may not be copied, published, distributed, downloaded or otherwise stored in a retrieval system, transmitted or converted, in any form or by any means, electronic or otherwise, without the prior written permission of the copyright owner.</em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/subscribe?"><span>Subscribe now</span></a></p><p></p><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-1" href="#footnote-anchor-1" class="footnote-number" contenteditable="false" target="_self">1</a><div class="footnote-content"><p>This research is part of my post-doctoral work funded by the University of Calgary&#8217;s Faculty of Law. </p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-2" href="#footnote-anchor-2" class="footnote-number" contenteditable="false" target="_self">2</a><div class="footnote-content"><p> Massoud Karshenas and M Hashem Pesaran, &#8220;Economic Reform and the Reconstruction of the Iranian Economy,&#8221; <em>Middle East Journal</em> 49, no. 1 (1995): 89.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-3" href="#footnote-anchor-3" class="footnote-number" contenteditable="false" target="_self">3</a><div class="footnote-content"><p>Wendy R. Sherman, &#8220;How We Got the Iran Deal: And Why We&#8217;ll Miss It,&#8221; <em>Foreign Affairs</em> 97, no. 5 (October 9, 2018): 186&#8211;97.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-4" href="#footnote-anchor-4" class="footnote-number" contenteditable="false" target="_self">4</a><div class="footnote-content"><p>Nga Phan Thi Hang, &#8220;Sanctions and Cryptocurrency: A Catalyst for Digital Adoption?,&#8221; <em>Journal of Financial Regulation and Compliance</em> 33, no. 3 (2025): 406, https://doi.org/10.1108/JFRC-08-2024-0156</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-5" href="#footnote-anchor-5" class="footnote-number" contenteditable="false" target="_self">5</a><div class="footnote-content"><p>&#8220;Global Surge: Exploring Cryptocurrency Adoption with Evidence from Spatial Models,&#8221; <em>Financial Innovation</em> 11, no. 1 (December 2025): 96, https://doi.org/10.1186/s40854-025-00765-0.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-6" href="#footnote-anchor-6" class="footnote-number" contenteditable="false" target="_self">6</a><div class="footnote-content"><p>Daniel Sobelman, &#8220;Houthis in the Footsteps of Hizbullah,&#8221; <em>Survival</em> 65, no. 3 (May 4, 2023): 130, https://doi.org/10.1080/00396338.2023.2218704.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-7" href="#footnote-anchor-7" class="footnote-number" contenteditable="false" target="_self">7</a><div class="footnote-content"><p>Gonzalo Saiz, &#8220;Sanctions in the Virtual Asset Industry: SIFMANet Roundtable Report,&#8221; n.d., 2.</p><p></p></div></div>]]></content:encoded></item><item><title><![CDATA[A Tiny Piece of a $45B Puzzle: The Chow Money Laundering Case]]></title><description><![CDATA[A rare money laundering conviction in Canada]]></description><link>https://newsletter.insightthreatintel.com/p/a-tiny-piece-of-a-45b-puzzle-the</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/a-tiny-piece-of-a-45b-puzzle-the</guid><dc:creator><![CDATA[Jessica Davis, PhD]]></dc:creator><pubDate>Wed, 26 Nov 2025 14:03:44 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!mtR5!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb7e917e-bc6d-4dbd-b5ce-2ab422fa9ef0_2121x1414.heic" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>A multi-year investigation by British Columbia&#8217;s anti-gang police has resulted in an 18-month jail sentence for Alexandra Joie Chow, a Richmond woman who laundered hundreds of thousands of dollars in cash through an unlicensed money-services operation.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!mtR5!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb7e917e-bc6d-4dbd-b5ce-2ab422fa9ef0_2121x1414.heic" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!mtR5!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb7e917e-bc6d-4dbd-b5ce-2ab422fa9ef0_2121x1414.heic 424w, https://substackcdn.com/image/fetch/$s_!mtR5!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb7e917e-bc6d-4dbd-b5ce-2ab422fa9ef0_2121x1414.heic 848w, https://substackcdn.com/image/fetch/$s_!mtR5!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb7e917e-bc6d-4dbd-b5ce-2ab422fa9ef0_2121x1414.heic 1272w, https://substackcdn.com/image/fetch/$s_!mtR5!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb7e917e-bc6d-4dbd-b5ce-2ab422fa9ef0_2121x1414.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!mtR5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb7e917e-bc6d-4dbd-b5ce-2ab422fa9ef0_2121x1414.heic" width="378" height="252.08653846153845" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/eb7e917e-bc6d-4dbd-b5ce-2ab422fa9ef0_2121x1414.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:378,&quot;bytes&quot;:339319,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://newsletter.insightthreatintel.com/i/179956566?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb7e917e-bc6d-4dbd-b5ce-2ab422fa9ef0_2121x1414.heic&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!mtR5!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb7e917e-bc6d-4dbd-b5ce-2ab422fa9ef0_2121x1414.heic 424w, https://substackcdn.com/image/fetch/$s_!mtR5!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb7e917e-bc6d-4dbd-b5ce-2ab422fa9ef0_2121x1414.heic 848w, https://substackcdn.com/image/fetch/$s_!mtR5!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb7e917e-bc6d-4dbd-b5ce-2ab422fa9ef0_2121x1414.heic 1272w, https://substackcdn.com/image/fetch/$s_!mtR5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb7e917e-bc6d-4dbd-b5ce-2ab422fa9ef0_2121x1414.heic 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The case dates back to 2019 and stems from a Combined Forces Special Enforcement Unit&#8211;British Columbia (CFSEU-BC) probe into loan-sharking, illegal money services business, and the laundering of proceeds of crime. CFSEU-BC is an integrated policing program that draws officers from agencies across the province, including the RCMP, and is <a href="https://cfseu.bc.ca/about-cfseu-bc/">headquartered</a> at the RCMP&#8217;s E Division in Metro Vancouver. </p><p>Keep reading to see how a seemingly modest $828,000 laundering scheme exposes structural failures in Canada&#8217;s $45-billion illicit economy.</p>
      <p>
          <a href="https://newsletter.insightthreatintel.com/p/a-tiny-piece-of-a-45b-puzzle-the">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[The $177 Million Message: FINTRAC Raises the Bar for Crypto Compliance]]></title><description><![CDATA[With digital finance, borders are meaningless, and we're ill-equipped to handle that.]]></description><link>https://newsletter.insightthreatintel.com/p/the-177-million-message-fintrac-raises</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/the-177-million-message-fintrac-raises</guid><dc:creator><![CDATA[Jessica Davis, PhD]]></dc:creator><pubDate>Thu, 23 Oct 2025 14:40:30 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!-nJ5!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffafd0806-a405-4dcb-8c4c-6596482c783b_1310x635.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Yesterday, FINTRAC fined Xeltox Enterprises Ltd (operating as Cryptomus and previously known as Certa Payments Ltd) a record-breaking $177 million administrative monetary penalty. This is the largest penalty that FINTRAC has ever issued (by a long shot). Xeltox / Cryptomus is a virtual asset service provider registered in British Columbia that operates without staff or a physical presence in Canada.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!-nJ5!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffafd0806-a405-4dcb-8c4c-6596482c783b_1310x635.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!-nJ5!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffafd0806-a405-4dcb-8c4c-6596482c783b_1310x635.png 424w, https://substackcdn.com/image/fetch/$s_!-nJ5!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffafd0806-a405-4dcb-8c4c-6596482c783b_1310x635.png 848w, https://substackcdn.com/image/fetch/$s_!-nJ5!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffafd0806-a405-4dcb-8c4c-6596482c783b_1310x635.png 1272w, https://substackcdn.com/image/fetch/$s_!-nJ5!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffafd0806-a405-4dcb-8c4c-6596482c783b_1310x635.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!-nJ5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffafd0806-a405-4dcb-8c4c-6596482c783b_1310x635.png" width="1310" height="635" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/fafd0806-a405-4dcb-8c4c-6596482c783b_1310x635.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:635,&quot;width&quot;:1310,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:308091,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://newsletter.insightthreatintel.com/i/176925312?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffafd0806-a405-4dcb-8c4c-6596482c783b_1310x635.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!-nJ5!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffafd0806-a405-4dcb-8c4c-6596482c783b_1310x635.png 424w, https://substackcdn.com/image/fetch/$s_!-nJ5!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffafd0806-a405-4dcb-8c4c-6596482c783b_1310x635.png 848w, https://substackcdn.com/image/fetch/$s_!-nJ5!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffafd0806-a405-4dcb-8c4c-6596482c783b_1310x635.png 1272w, https://substackcdn.com/image/fetch/$s_!-nJ5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffafd0806-a405-4dcb-8c4c-6596482c783b_1310x635.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>In its news release on the administrative monetary penalty, FINTRAC noted that the penalty reflected the &#8220;magnitude of non-compliance&#8221; and the very serious nature of the violations. FINTRAC found that the crypto company failed to file suspicious transaction reports, noting that the company processed many transactions that it had reasonable grounds to suspect were related to proceeds from trafficking in child sexual abuse material, fraud, ransomware payments, and sanctions evasion.</p><p>The company also failed to report large virtual currency transactions of $10,000 or more (&#8220;threshold&#8221; reports in Canadian legislation).</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Insight Monitor is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h3><strong>Iran</strong></h3><p>The company also failed to comply with a Ministerial Directive (Iran). These directives are legally binding orders that tell reporting entities (like banks, money service businesses, casinos, etc.) how to handle transactions involving certain foreign jurisdictions, entities, or activities that pose a high risk of money laundering or terrorist financing. FINTRAC then communicates and enforces these directives. Under the current ministerial directive on <a href="https://fintrac-canafe.canada.ca/obligations/dir-iri-eng">Iran</a>, reporting entities must:</p><ul><li><p>Treat every transaction with Iran as high-risk</p></li><li><p>Verify the identity of any individual involved in these transactions</p></li><li><p>Ascertain the source of funds for these transactions</p></li><li><p>Keep a record of the transaction</p></li><li><p>Report all of these transactions to FINTRAC</p></li></ul><p>FINTRAC found <a href="https://www.theglobeandmail.com/business/article-fintrac-penalty-cryptocurrency-exchange-cryptomus-xeltox/">7,557 instances</a> between July 1, 2024, and December 31, 2024, in which the exchange failed to report transactions originating in Iran.</p><p>This is particularly important because over the last five years or so, Iran has increasingly used cryptocurrency to evade sanctions, finance the non-state (and terrorist) groups in its Axis of Resistance (such as Hizballah, Hamas, the Houthis, Palestinian Islamic Jihad, and others), to fund its proliferation activities and acquire dual-use materials, and facilitate oil sales.</p><p>While we don&#8217;t know if any of these transactions facilitated this activity (that&#8217;s part of the problem: the non-reporting of transactions prevents them from being analyzed for potential money laundering, terrorist financing, and sanctions evasion), this fine illustrates how a crypto exchange with a presence in Canada might be used for this highly illicit activity.</p><p>Interestingly, I looked at the company&#8217;s anti-money laundering statement, and it claims it does not process transactions with Iran. Or actually a host of other countries&#8230;.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!JOEJ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F35eeba79-b616-4665-b4d9-0c8326dbdea3_912x1071.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!JOEJ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F35eeba79-b616-4665-b4d9-0c8326dbdea3_912x1071.png 424w, https://substackcdn.com/image/fetch/$s_!JOEJ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F35eeba79-b616-4665-b4d9-0c8326dbdea3_912x1071.png 848w, https://substackcdn.com/image/fetch/$s_!JOEJ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F35eeba79-b616-4665-b4d9-0c8326dbdea3_912x1071.png 1272w, https://substackcdn.com/image/fetch/$s_!JOEJ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F35eeba79-b616-4665-b4d9-0c8326dbdea3_912x1071.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!JOEJ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F35eeba79-b616-4665-b4d9-0c8326dbdea3_912x1071.png" width="912" height="1071" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/35eeba79-b616-4665-b4d9-0c8326dbdea3_912x1071.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1071,&quot;width&quot;:912,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:368595,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://newsletter.insightthreatintel.com/i/176925312?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F35eeba79-b616-4665-b4d9-0c8326dbdea3_912x1071.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!JOEJ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F35eeba79-b616-4665-b4d9-0c8326dbdea3_912x1071.png 424w, https://substackcdn.com/image/fetch/$s_!JOEJ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F35eeba79-b616-4665-b4d9-0c8326dbdea3_912x1071.png 848w, https://substackcdn.com/image/fetch/$s_!JOEJ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F35eeba79-b616-4665-b4d9-0c8326dbdea3_912x1071.png 1272w, https://substackcdn.com/image/fetch/$s_!JOEJ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F35eeba79-b616-4665-b4d9-0c8326dbdea3_912x1071.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Source: Cryptomus website, accessed via VPN from Canada</figcaption></figure></div><p></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://insightthreatintelligence.thinkific.com/bundles/tf-analysis" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!f7rH!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 424w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 848w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 1272w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!f7rH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png" width="1066" height="507" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:507,&quot;width&quot;:1066,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:698946,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://insightthreatintelligence.thinkific.com/bundles/tf-analysis&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!f7rH!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 424w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 848w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 1272w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><p><em>Our terrorist financing analysis course caters to researchers, intelligence, law enforcement, and compliance professionals to help them learn about terrorist financing, and analyze suspicious patterns and activities more effectively. Sign up today!</em></p><div><hr></div><h3><strong>Exiting the Canadian Market?</strong></h3><p>The Globe and Mail <a href="https://www.theglobeandmail.com/business/article-fintrac-penalty-cryptocurrency-exchange-cryptomus-xeltox/">reported</a> that the Cryptomus website is blocked in Canada, and I confirmed that. However, using a VPN, I did have a look around the website (see the above-mentioned AML policy), and noted some of the services they offer. Given the website block, it appears the company is exiting the Canadian market.</p><p>This might make it challenging for FINTRAC to collect this penalty. (Briefly, the collection process looks like this: once FINTRAC issues a notice of violation, the entity has 30 days to act. If the entity pays the penalty, the matter is settled. The entity can also appeal the penalty to the Federal Court. The debt becomes owed to the Crown, interest starts accruing, and FINTRAC (or its delegates) can pursue collection. FINTRAC indicated that since 2012, 74% of penalties have been fully collected, and other cases are at the Federal Court.)<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a></p><p>I doubt there is any real prospect for collecting this fine, but it certainly is symbolic. Further, in C-2 (and subsequently C-12), amendments are proposed to FINTRAC&#8217;s legislation to increase the fines further. (I will happily be wrong, and would be delighted to see FINTRAC collect this fine. Let&#8217;s all keep our eyes out for news on this front.)</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;83040464-5ba7-460c-b229-74d665f8ad5b&quot;,&quot;caption&quot;:&quot;Hello, Insight Monitor subscribers! Today, we have a special analysis of new Canadian legislation that came out this week aimed at securing Canada&#8217;s borders and tackling illicit finance, organized crime, and fentanyl trafficking. If it seems like that&#8217;s a lot for one bill to do, you&#8217;re right. So let&#8217;s talk about what this bill can and cannot achieve. As&#8230;&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;From Housekeeping to High Stakes: The Hidden Power of Canada&#8217;s Border Bill&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:33479672,&quot;name&quot;:&quot;Jessica Davis, PhD&quot;,&quot;bio&quot;:&quot;Jessica Davis is President of Insight Threat Intelligence and is the author of Women in Modern Terrorism: From Liberations Wars to Global Terrorism and the Islamic State (2017), and Illicit Money: Financing Terrorism in the 21st Century (2021).&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e312ae7c-114b-4e4f-9ce1-8bf50ddb7a27_2344x2049.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2025-06-05T13:02:53.287Z&quot;,&quot;cover_image&quot;:&quot;https://images.unsplash.com/photo-1656424714760-66bc4074b532?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzNHx8Y2FuYWRhJTIwcGFybGlhbWVudHxlbnwwfHx8fDE3NDkwNDg1OTB8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/from-housekeeping-to-high-stakes&quot;,&quot;section_name&quot;:&quot;Commentary&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:165195539,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:5,&quot;comment_count&quot;:0,&quot;publication_id&quot;:329102,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!I_1w!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4649d7af-94ce-49ea-8c58-368ec26cd423_900x900.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><h3><strong>Why not criminal non-compliance?</strong></h3><p>One of the tools that exists in Canadian anti-money laundering laws is criminal non-compliance with the regime. Criminal non-compliance requires a person or entity to knowingly contravene certain sections (such as record-keeping requirements). In this case, it&#8217;s entirely possible that Cryptomus or its principals could have met the standard for criminal non-compliance. However, given that they have no real presence in Canada (and legal cooperation with <a href="https://www.theglobeandmail.com/business/article-fintrac-penalty-cryptocurrency-exchange-cryptomus-xeltox/">Kazakhstan and Uzbekistan</a> (the country of residence for the principals) is likely&#8230;challenging), I doubt there was any real prospect of charges in this case. But it might be the kind of thing that our much-promised and not-yet-delivered Financial Crimes Agency might look into.</p><p>This really illustrates how easily companies can operate and evade reporting requirements, and the consequences of failing to combat illicit financial activities. Crypto isn&#8217;t the wild west of finance anymore, but issues like this really illustrate how difficult effective regulation and enforcement are in an interconnected world. Canada&#8217;s AML/CTF regime still relies on territorial enforcement powers in a borderless financial ecosystem, which could increasingly render its enforcement mechanisms meaningless.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-2" href="#footnote-2" target="_self">2</a></p><h3>Serious Implications for the Fight Against Illicit Finance </h3><p>This case underscores how crypto exchanges can become nodes in transnational illicit finance networks, even when nominally registered in one jurisdiction but operating globally without a real footprint. The Cryptomus case illustrates how such entities can serve as <em>de facto gateways</em> for proceeds of cybercrime, sanctions evasion, and terrorist financing. </p><p>Further, the unreported Iranian transactions could point to latent sanctions-evasion corridors through crypto platforms, including those operating in Canada. Canada could be unknowingly enabling the digital infrastructure of sanctions evasion and illicit finance, with crypto exchanges acting as intermediaries for regimes or proxies (e.g., Iran-linked networks financing Hizballah or Houthis).</p><p>Beyond its symbolic value, the Xeltox/Cryptomus case reveals a deeper structural weakness: national AML systems remain ill-equipped to police decentralized and transnational digital value flows. When a company can register in one jurisdiction, have principals resident another, serve customers globally, ignore sanctions-related directives, and then simply block Canadian access after being fined, it exposes the fragility of enforcement in the face of digital finance&#8217;s borderless nature.</p><p>To date, the regulation and enforcement of national AML/CFT standards have been carried out at the national level. But with digital finance, borders are meaningless. This leaves only a few options for effective regulation and enforcement, like a supranational FIU with global enforcement powers, or a much more muscular FATF, or some sort of UN mechanism. All of these options will be difficult to implement in the current geopolitical climate. </p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/p/the-177-million-message-fintrac-raises?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/p/the-177-million-message-fintrac-raises?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Insight Monitor is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><p><em>&#169; 2025 Insight Threat Intelligence Ltd. All Rights Reserved.<br><br>This newsletter and its contents are protected by Canadian copyright law. Except as otherwise provided for under Canadian copyright law, this newsletter and its contents may not be copied, published, distributed, downloaded or otherwise stored in a retrieval system, transmitted or converted, in any form or by any means, electronic or otherwise, without the prior written permission of the copyright owner.</em></p><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-1" href="#footnote-anchor-1" class="footnote-number" contenteditable="false" target="_self">1</a><div class="footnote-content"><p>FINTRAC kindly provided this information in an email responding to some questions I asked about the collection process. </p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-2" href="#footnote-anchor-2" class="footnote-number" contenteditable="false" target="_self">2</a><div class="footnote-content"><p>That is not to say that we should not try, or that FINTRAC should abandon its efforts. It&#8217;s more to emphasize that the Canadian system can be perfect, and significant issues will still arise, and our financial sector will still be abused. </p></div></div>]]></content:encoded></item><item><title><![CDATA[Shuttering Hizballah’s Bank: Disruption or Diversion?]]></title><description><![CDATA[Lebanon has taken the unprecedented step of closing Hizballah&#8217;s bank, Al Qard al Hassan, capping off months of incremental restrictions. The central bank first banned exchange house interactions with the entity in July, then prohibited all transactions earlier this month.]]></description><link>https://newsletter.insightthreatintel.com/p/lebanon-cuts-a-key-node-what-al-qard</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/lebanon-cuts-a-key-node-what-al-qard</guid><dc:creator><![CDATA[Jessica Davis, PhD]]></dc:creator><pubDate>Tue, 19 Aug 2025 10:49:56 GMT</pubDate><enclosure url="https://images.unsplash.com/photo-1618481293647-ee7605370f5a?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxNnx8bGViYW5vbnxlbnwwfHx8fDE3NTU2MDA0Nzl8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Lebanon has taken the unprecedented step of closing <a href="https://www.washingtoninstitute.org/policy-analysis/hezbollah-prioritizes-its-own-interests-putting-lebanon-risk">Hizballah&#8217;s bank</a>, <a href="https://home.treasury.gov/news/press-releases/sm760">Al Qard al Hassan</a>, capping off months of <a href="https://yalibnan.com/2025/08/08/lebanons-central-bank-bans-interactions-with-hezbollahs-al-qard-al-hassan/">incremental restrictions</a>. The central bank first banned <a href="https://www.intellinews.com/lebanon-to-shut-down-al-qard-al-hasan-and-hezbollah-linked-money-changers-391811/">exchange house</a> interactions with the entity in July, then prohibited all transactions earlier this month. Now the bank itself is reportedly closed. The move coincides with US sanctions on <a href="https://ca.news.yahoo.com/u-sanctions-7-senior-leaders-083603329.html">seven</a> of its senior officials.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://images.unsplash.com/photo-1618481293647-ee7605370f5a?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxNnx8bGViYW5vbnxlbnwwfHx8fDE3NTU2MDA0Nzl8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://images.unsplash.com/photo-1618481293647-ee7605370f5a?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxNnx8bGViYW5vbnxlbnwwfHx8fDE3NTU2MDA0Nzl8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1618481293647-ee7605370f5a?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxNnx8bGViYW5vbnxlbnwwfHx8fDE3NTU2MDA0Nzl8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1618481293647-ee7605370f5a?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxNnx8bGViYW5vbnxlbnwwfHx8fDE3NTU2MDA0Nzl8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1618481293647-ee7605370f5a?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxNnx8bGViYW5vbnxlbnwwfHx8fDE3NTU2MDA0Nzl8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1456w" sizes="100vw"><img src="https://images.unsplash.com/photo-1618481293647-ee7605370f5a?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxNnx8bGViYW5vbnxlbnwwfHx8fDE3NTU2MDA0Nzl8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" width="491" height="280.22826390830306" data-attrs="{&quot;src&quot;:&quot;https://images.unsplash.com/photo-1618481293647-ee7605370f5a?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxNnx8bGViYW5vbnxlbnwwfHx8fDE3NTU2MDA0Nzl8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:4083,&quot;width&quot;:7154,&quot;resizeWidth&quot;:491,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;flag of us a on top of building&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="flag of us a on top of building" title="flag of us a on top of building" srcset="https://images.unsplash.com/photo-1618481293647-ee7605370f5a?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxNnx8bGViYW5vbnxlbnwwfHx8fDE3NTU2MDA0Nzl8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1618481293647-ee7605370f5a?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxNnx8bGViYW5vbnxlbnwwfHx8fDE3NTU2MDA0Nzl8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1618481293647-ee7605370f5a?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxNnx8bGViYW5vbnxlbnwwfHx8fDE3NTU2MDA0Nzl8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1618481293647-ee7605370f5a?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxNnx8bGViYW5vbnxlbnwwfHx8fDE3NTU2MDA0Nzl8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/@charbelkaram">Charbel Karam</a> on <a href="https://unsplash.com">Unsplash</a></figcaption></figure></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Insight Monitor is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>While this is being touted as a significant disruption to Hizballah&#8217;s financial operations, and by extension, the wider Axis of Resistance, the impact on many of the members in the axis will likely be minimal. For instance, the Houthis&#8217;s finances are diversified, domestically anchored, and increasingly shielded from Lebanese or even regional pressures. Much of their funding is raised and spent locally, and while they likely benefited from the Al Qard al Hassan network (as all members of the Axis of Resistance did), they never relied exclusively on it.</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;3c15438b-1193-48e1-9e98-9a249ef5c23d&quot;,&quot;caption&quot;:&quot;Since October 2023, the Houthis have intensified their military operations in solidarity with Hamas, launching missile and drone attacks that have destabilized the region and disrupted global shipping in the Red Sea. Their personnel strength has further expanded to encompass&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Sanctioned but Sustained: Why the Houthis&#8217; Finances Endure Global Pressure&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:85208154,&quot;name&quot;:&quot;Elena Martynova&quot;,&quot;bio&quot;:&quot;Research Analyst &quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e88b531d-b106-4c92-8177-62a8a864bde5_2316x2316.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2025-07-17T13:02:12.976Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!DbUL!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1ce816cd-716d-475f-b975-135412b63737_936x624.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/sanctioned-but-sustained-why-the&quot;,&quot;section_name&quot;:&quot;Group Profiles &quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:167732270,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:6,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!qcEy!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc845f459-e1ac-4902-ad4d-0887e24ab430_900x900.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>That said, Al Qard al Hassan played an important role in Iran&#8217;s hybrid threat finance network. Its closure eliminates a semi-licit node long used for transactions and to move funds across jurisdictions with some degree of plausible deniability. In the short term, this will stress the network. In the medium term, Iran&#8217;s threat finance network will exploit alternative pathways: informal value transfer systems, cryptocurrency, crypto-hawala, and deeper entrenchment in the shadow banking ecosystem. The bank might even be reconstituted under a different name or cover.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://insightthreatintelligence.thinkific.com/bundles/tf-analysis" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!f7rH!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 424w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 848w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 1272w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!f7rH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png" width="1066" height="507" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:507,&quot;width&quot;:1066,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:698946,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://insightthreatintelligence.thinkific.com/bundles/tf-analysis&quot;,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!f7rH!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 424w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 848w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 1272w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><p><em>Our terrorist financing analysis course caters to researchers, intelligence, law enforcement, and compliance professionals to help them learn about terrorist financing, and analyze suspicious patterns and activities more effectively. Sign up today!</em></p><div><hr></div><p>Iran provides financial support to its regional proxies (Hizballah, the Houthis, Hamas, Iraqi militias, etc.) through a mix of formal and informal financial architecture that allows Iran to channel support with limited exposure. Shutting down one node, especially one with semi-legitimate status, adds friction but doesn&#8217;t collapse the system. What it does do is force the network further underground. As nodes like Al Qard al Hassan are lost, the architecture tilts more toward opaque and decentralized financial instruments: crypto wallets, unregulated hawaladars, and the use of shell companies in permissive jurisdictions.</p><p>It also makes the network more difficult to monitor and disrupt. Formal nodes serve as pressure points; once they&#8217;re gone, enforcement agencies lose access to transaction data and choke points and have to find new nodes to exploit.</p><p>So, while this move is politically and symbolically significant, the operational impact is limited unless it's paired with broader enforcement across the rest of the hybrid network. As with past disruptions, the real question is whether the network adapts faster than the enforcement mechanisms targeting it. So far, history suggests it will.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/p/lebanon-cuts-a-key-node-what-al-qard?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/p/lebanon-cuts-a-key-node-what-al-qard?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p><em>&#169; 2025 Insight Threat Intelligence Ltd. All Rights Reserved.<br><br>This newsletter and its contents are protected by Canadian copyright law. Except as otherwise provided for under Canadian copyright law, this newsletter and its contents may not be copied, published, distributed, downloaded or otherwise stored in a retrieval system, transmitted or converted, in any form or by any means, electronic or otherwise, without the prior written permission of the copyright owner.</em></p>]]></content:encoded></item><item><title><![CDATA[ISIL Finance Chief Captured in Somalia]]></title><description><![CDATA[Last week, the US captured ISIL-Somalia&#8217;s finance chief Abdiweli Mohamed Yusuf, along with two others.]]></description><link>https://newsletter.insightthreatintel.com/p/isil-finance-chief-captured-in-somalia</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/isil-finance-chief-captured-in-somalia</guid><dc:creator><![CDATA[Jessica Davis, PhD]]></dc:creator><pubDate>Tue, 05 Aug 2025 13:03:10 GMT</pubDate><enclosure url="https://images.unsplash.com/photo-1554672723-60f4d5d5074f?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwyMXx8bW9uZXl8ZW58MHx8fHwxNzU0MDYyNDE2fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Last week, the <a href="https://taskandpurpose.com/news/us-forces-somalia-finance-chief/">US captured</a> ISIL-Somalia&#8217;s finance chief Abdiweli Mohamed Yusuf, along with two others. This capture is highly significant: any kinetic action against high-ranking finance officials helps to <em><a href="https://www.tandfonline.com/doi/full/10.1080/09546553.2022.2083507">disrupt, degrade, and ultimately dismantle </a></em>financial ecosystems that support terrorist violence. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://images.unsplash.com/photo-1554672723-60f4d5d5074f?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwyMXx8bW9uZXl8ZW58MHx8fHwxNzU0MDYyNDE2fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://images.unsplash.com/photo-1554672723-60f4d5d5074f?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwyMXx8bW9uZXl8ZW58MHx8fHwxNzU0MDYyNDE2fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1554672723-60f4d5d5074f?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwyMXx8bW9uZXl8ZW58MHx8fHwxNzU0MDYyNDE2fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1554672723-60f4d5d5074f?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwyMXx8bW9uZXl8ZW58MHx8fHwxNzU0MDYyNDE2fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1554672723-60f4d5d5074f?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwyMXx8bW9uZXl8ZW58MHx8fHwxNzU0MDYyNDE2fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1456w" sizes="100vw"><img src="https://images.unsplash.com/photo-1554672723-60f4d5d5074f?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwyMXx8bW9uZXl8ZW58MHx8fHwxNzU0MDYyNDE2fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" width="308" height="462" data-attrs="{&quot;src&quot;:&quot;https://images.unsplash.com/photo-1554672723-60f4d5d5074f?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwyMXx8bW9uZXl8ZW58MHx8fHwxNzU0MDYyNDE2fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:5472,&quot;width&quot;:3648,&quot;resizeWidth&quot;:308,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;time lapse photography of several burning US dollar banknotes&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="time lapse photography of several burning US dollar banknotes" title="time lapse photography of several burning US dollar banknotes" srcset="https://images.unsplash.com/photo-1554672723-60f4d5d5074f?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwyMXx8bW9uZXl8ZW58MHx8fHwxNzU0MDYyNDE2fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1554672723-60f4d5d5074f?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwyMXx8bW9uZXl8ZW58MHx8fHwxNzU0MDYyNDE2fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1554672723-60f4d5d5074f?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwyMXx8bW9uZXl8ZW58MHx8fHwxNzU0MDYyNDE2fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1554672723-60f4d5d5074f?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwyMXx8bW9uZXl8ZW58MHx8fHwxNzU0MDYyNDE2fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo by <a href="true">Jp Valery</a> on <a href="https://unsplash.com">Unsplash</a></figcaption></figure></div><p>There is some debate about whether he was ISIL-Somalia&#8217;s main financial leader. In 2023, the US designated him and indicated that he had been head of the group&#8217;s finance office <a href="https://home.treasury.gov/news/press-releases/jy1652">since at least 2019</a>. As with many things relating to ISIL Somalia leadership, his exact position in the organization is up for debate. Regardless, ISIL-Somalia has a rather complex financial management structure with some redundancies, several individauls responsible for collecting taxes (their main source of funds), and other management responsibilities. </p><p>Regardless of whether Yusuf was the financial leader for ISIL-Somalia, ISIL-Somalia as well as the al-Karrar office, or just in charge of tax collection, he undoubtedly has significant insight into the group&#8217;s financing activities and will be of huge intelligence value to the US. </p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Insight Monitor is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h3><strong>Degradation of Financial Leadership </strong></h3><p>Capturing Yusuf represents a direct hit to the financial leadership of the organization. This is a textbook example of targeting a <em>key facilitator</em> who likely had deep knowledge of fund sourcing, routing, disbursement, and possibly integration into licit sectors. Yusuf likely oversaw or approved resource allocations, making him central to ISIL-Somalia's ability to operationalize violence, and he has significant institutional memory, making him an important intelligence asset. </p><p>This action might have been made possible by another high-profile event: the death of the al-Karrar office head al-Sudani back in 2023. </p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;4abefb84-ad75-4f4d-9616-6fbcc35bfe7d&quot;,&quot;caption&quot;:&quot;Well, we&#8217;re nearly there. Almost 4,000 subscribers to Insight Intelligence! I&#8217;m a bit surprised that there are 4,000 of you out there that care about illicit financing&#8230;but it&#8217;s a pleasant surprise! Thank you for being part of this community. And please continue to share this newsletter with your friends and colleagues &#8212; it&#8217;s a huge help, and really rewa&#8230;&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;ISIL's East Africa Finance Network and the Death of al-Sudani&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:33479672,&quot;name&quot;:&quot;Jessica Davis&quot;,&quot;bio&quot;:&quot;Dr. Jessica Davis is President of Insight Threat Intelligence and is the author of Women in Modern Terrorism: From Liberations Wars to Global Terrorism and the Islamic State (2017), and Illicit Money: Financing Terrorism in the 21st Century (2021).&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e312ae7c-114b-4e4f-9ce1-8bf50ddb7a27_2344x2049.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2023-06-15T13:00:16.118Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!xsqb!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F47701eac-0236-4d03-a297-0ac4933e8742_5184x3456.jpeg&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/isils-east-africa-finance-network&quot;,&quot;section_name&quot;:&quot;Financiers&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:101011766,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:8,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!qcEy!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc845f459-e1ac-4902-ad4d-0887e24ab430_900x900.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>Yusuf likely also has knowledge of financial networks that connect into ISIL&#8217;s broader financial network, and could have knowledge of specific financial facilitators and intermediaries in each of the different ISIL Provinces and groups. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://insightthreatintelligence.thinkific.com/bundles/tf-analysis" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!f7rH!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 424w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 848w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 1272w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!f7rH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png" width="1066" height="507" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:507,&quot;width&quot;:1066,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:698946,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://insightthreatintelligence.thinkific.com/bundles/tf-analysis&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!f7rH!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 424w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 848w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 1272w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>Our terrorist financing analysis course caters to researchers, intelligence, law enforcement, and compliance professionals to help them learn about terrorist financing, and analyze suspicious patterns and activities more effectively. Sign up today!</em></p><p>By removing a core financial actor, the group will experience short-term constraints. Terrorist organizations often centralize financial authority, at least in part. Removing Yusuf likely slows payments to operatives, contractors, arms suppliers, and bribe recipients. However, taxation efforts are likely to remain intact, since these are managed by a hierarchy of managers and tax collectors. </p><p>While removing a key financial facilitator often reduces terrorist capacity in the short term, it does create the possibility that someone more capable and knowledgeable will take his place. If Yusuf&#8217;s successor is more technologically-focused, we might see an increase in ISIL&#8217;s use of cryptocurrency (already present, but not widespread yet). If his successor is more adept at trade networks, we might see ISIL increasingly rely on trade-based movement techniques. Many scenarios exist, and it&#8217;s important to develop each, identify indicators, and adapt to the second-order effects of Yusuf&#8217;s capture. </p><p>Regardless, this moment creates an intelligence opportunity, as new actors step into financial roles without the same tradecraft discipline, increasing the chances of detection. </p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;2b5d8ea9-b25e-48d9-aea2-383752868fc9&quot;,&quot;caption&quot;:&quot;The Islamic State in Somalia is assessed to be cash poor, according to a recent report from the Hiraal Institute.&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;ISIL-Somalia Financing Estimate &quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:33479672,&quot;name&quot;:&quot;Jessica Davis&quot;,&quot;bio&quot;:&quot;Dr. Jessica Davis is President of Insight Threat Intelligence and is the author of Women in Modern Terrorism: From Liberations Wars to Global Terrorism and the Islamic State (2017), and Illicit Money: Financing Terrorism in the 21st Century (2021).&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e312ae7c-114b-4e4f-9ce1-8bf50ddb7a27_2344x2049.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2018-11-05T15:34:00.000Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!J9pK!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F689f032c-453e-4b9c-881c-28bd23b48568_5184x3456.jpeg&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/isil-somalia-financing-estimate&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:39185488,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:1,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!qcEy!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc845f459-e1ac-4902-ad4d-0887e24ab430_900x900.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><h3><strong>Geographic and Strategic Implications</strong></h3><p>ISIL-Somalia has been a regional <a href="https://ctc.westpoint.edu/the-financial-future-of-the-islamic-state/">financial and operational node for ISI</a>L. Disrupting its financing (even in the short term) could have ripple effects across East Africa, particularly where funds transit through Kenya, Djibouti, or Yemen. It could also impact ISIL-KP (Afghanistan) and ISWAP, as there are known facilitation nodes between the Al Karrar office and those groups.  Further, CTF is not just about &#8220;following the money&#8221; to seize assets, but also about neutralizing the people and processes behind the money. This is a concrete demonstration of that principle.</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;39e69312-3af6-41be-94d1-041583f3802a&quot;,&quot;caption&quot;:&quot;In January 2023, Bilal-al-Sudani, a key financial facilitator of ISIL Somalia, was killed by the US. Weakening the al-Karrar office, the directing office of ISIL Somalia that acts as a major financial and administrative hub for the Islamic State, was a strategic objective associated with the operation. Despite these efforts, al-Karrar and ISIL Somalia have&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Financing Terrorism throughout Africa: ISIL Somalia and the Al-Karrar Office&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:85208154,&quot;name&quot;:&quot;Elena Martynova&quot;,&quot;bio&quot;:&quot;Research Analyst &quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e88b531d-b106-4c92-8177-62a8a864bde5_2316x2316.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2024-05-30T13:01:46.256Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!WwSq!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fca6e6b70-ffc4-4155-85be-16ca1533c948_1500x1000.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/financing-terrorism-throughout-africa&quot;,&quot;section_name&quot;:&quot;Group Profiles &quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:145079996,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:12,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!qcEy!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc845f459-e1ac-4902-ad4d-0887e24ab430_900x900.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>The capture of ISIL-Somalia&#8217;s finance chief represents a strategic CTF success. It degrades financial leadership, forces adaptation, and opens a window for intelligence exploitation. As with all counterterrorist financing (and counterterrorism in general), someone else will rise up to take on his role. But in the short term, this creates opportunities to undermine terrorist finance ecosystems and meaningfully disrupt operational capacity and strategic cohesion.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/p/isil-finance-chief-captured-in-somalia?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/p/isil-finance-chief-captured-in-somalia?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p><em>&#169; 2025 Insight Threat Intelligence Ltd. All Rights Reserved.<br><br>This newsletter and its contents are protected by Canadian copyright law. Except as otherwise provided for under Canadian copyright law, this newsletter and its contents may not be copied, published, distributed, downloaded or otherwise stored in a retrieval system, transmitted or converted, in any form or by any means, electronic or otherwise, without the prior written permission of the copyright owner.</em></p>]]></content:encoded></item><item><title><![CDATA[Terrorist Financing with Tether]]></title><description><![CDATA[Cryptocurrency, private private partnerships, and future of counterterrorist financing]]></description><link>https://newsletter.insightthreatintel.com/p/terrorist-financing-with-tether</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/terrorist-financing-with-tether</guid><dc:creator><![CDATA[Jessica Davis, PhD]]></dc:creator><pubDate>Wed, 15 Jan 2025 14:18:14 GMT</pubDate><enclosure url="https://images.unsplash.com/photo-1651055693398-0d66969cf759?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0NXx8dGV0aGVyfGVufDB8fHx8MTczMzg1MTA5MXww&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Ten years ago, when I first started looking at cryptocurrency and terrorist financing, the only currency used was Bitcoin. Terrorist financing through cryptocurrency was relatively rare and what I would describe as &#8220;proof of concept&#8221;. Within the last decade, the landscape has changed significantly, and terrorists are increasingly using cryptocurrency to move money for their financing needs. In fact, this is now <a href="https://newsletter.insightthreatintel.com/p/terrorist-financing-enters-its-cryptocurrency?utm_source=publication-search">the main way</a> that terrorist actors move money (although banks, money service businesses, hawala, and trade-based methods are still popular). Along with the more widespread adoption of cryptocurrency, terrorists have diversified the type of cryptocurrency they use, increasingly using USDT (Tether). This article looks at the cases of Tether use for terrorist financing and interesting developments in countering the financing of terrorism through cryptocurrency.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://images.unsplash.com/photo-1651055693398-0d66969cf759?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0NXx8dGV0aGVyfGVufDB8fHx8MTczMzg1MTA5MXww&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://images.unsplash.com/photo-1651055693398-0d66969cf759?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0NXx8dGV0aGVyfGVufDB8fHx8MTczMzg1MTA5MXww&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1651055693398-0d66969cf759?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0NXx8dGV0aGVyfGVufDB8fHx8MTczMzg1MTA5MXww&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1651055693398-0d66969cf759?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0NXx8dGV0aGVyfGVufDB8fHx8MTczMzg1MTA5MXww&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1651055693398-0d66969cf759?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0NXx8dGV0aGVyfGVufDB8fHx8MTczMzg1MTA5MXww&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1456w" sizes="100vw"><img src="https://images.unsplash.com/photo-1651055693398-0d66969cf759?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0NXx8dGV0aGVyfGVufDB8fHx8MTczMzg1MTA5MXww&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080" width="236" height="236" data-attrs="{&quot;src&quot;:&quot;https://images.unsplash.com/photo-1651055693398-0d66969cf759?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0NXx8dGV0aGVyfGVufDB8fHx8MTczMzg1MTA5MXww&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:2500,&quot;width&quot;:2500,&quot;resizeWidth&quot;:236,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;icon&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="icon" title="icon" srcset="https://images.unsplash.com/photo-1651055693398-0d66969cf759?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0NXx8dGV0aGVyfGVufDB8fHx8MTczMzg1MTA5MXww&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1651055693398-0d66969cf759?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0NXx8dGV0aGVyfGVufDB8fHx8MTczMzg1MTA5MXww&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1651055693398-0d66969cf759?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0NXx8dGV0aGVyfGVufDB8fHx8MTczMzg1MTA5MXww&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1651055693398-0d66969cf759?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0NXx8dGV0aGVyfGVufDB8fHx8MTczMzg1MTA5MXww&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a><figcaption class="image-caption">Photo by <a href="true">Mariia Shalabaieva</a> on <a href="https://unsplash.com">Unsplash</a></figcaption></figure></div><p>USDT (Tether) is a type of cryptocurrency known as a stablecoin, which is designed to maintain a stable value by being pegged to a state-backed currency, typically the US Dollar. USDT is designed to have a 1:1 value with the dollar. Tether Limited, the company behind USDT, <a href="https://tether.to/en/">claims</a> that each token is backed by reserves, including traditional currency, cash equivalents, and other assets. Initially launched on the Bitcoin blockchain, USDT is now available on multiple blockchain networks, including Ethereum and Tron. Tether has faced criticism over the transparency of its reserves, with critics questioning whether it holds enough assets to fully back the circulating USDT supply. Tether can be used on many different blockchains; until November 2024, the Tron blockchain hosted the largest amount of USDT. However, as of November, Ethereum blockchain is now <a href="https://cointelegraph.com/news/ethereum-surpasses-tron-blockchain-most-usdt-supply">leading blockchain for Tether</a>, surpassing Tron.</p><blockquote><p>(Sidebar: for an interesting discussion of stablecoins, their fungibility, and the network effects of the stablecoin market, have a read of <a href="https://jpkoning.blogspot.com/2025/01/stablecoins-are-non-fungible-bank.html">this piece</a> by JP Koning on his blog <strong>Moneyness</strong>.) </p></blockquote><p>Tether is one of the main cryptocurrencies used for terrorist financing. <a href="https://www.trmlabs.com/post/terrorist-financing-six-crypto-related-trends-to-watch-in-2023">Others include</a> Bitcoin, Ethereum, Dogecoin, Zcash, and Monero. Terrorists often try to transact in cryptocurrencies with a lot of market share &#8212; this is how they hide the proverbial needle in the haystack. Tether, being one of the largest stablecoins, fits this bill perfectly. </p><p>The same features that make it attractive to legitimate users also make <a href="https://www.trmlabs.com/post/tron-tether-and-trm-labs-establish-first-ever-private-sector-financial-crime-unit-to-combat-crypto-crime.">it attractive to illicit ones</a>. This includes low transaction fees, a lack of volatility, and ease of use. Indeed, the lack of volatility of USDT is likely a main draw: while terrorists initially solicited donations in Bitcoin (many still do), the volatility of this asset makes it difficult to use for financing operational and organizational activities. For instance, at any given time, the amount of Bitcoin needed to purchase a weapon or improvised explosive component will change significantly. While this might be useful from a revenue-generating perspective, it adds logistical challenges to individuals trying to perpetrate an attack. They either end up needing to get more funds (if the Bitcoin initially transferred was too little to complete their purchases) or end up with a surplus and need to find a way to either return the money to the funder or accept that they&#8217;ve made a small profit from their activities. Tether is more straightforward: you can transfer the exact amount needed, and it maintains its value.</p><h3><strong>Terrorists Using Tether</strong></h3>
      <p>
          <a href="https://newsletter.insightthreatintel.com/p/terrorist-financing-with-tether">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Extremist Financing Through Merchandise Sales]]></title><description><![CDATA[Hello Insight Monitor subscribers, and welcome to another edition of our newsletter. Today, we&#8217;re looking at how extremists finance their activities and propaganda through merchandise sales. I&#8217;m also happy to report that our intrepid newsletter has almost 6,000 subscribers, so please keep sharing and push us over that milestone. Further, the launch of our course on Financial Intelligence Fundamentals has gone well, with many students signing up. The first cohort will likely finish sometime next week, and we&#8217;re looking forward to the feedback. In the meantime, we hope you enjoy this analysis.]]></description><link>https://newsletter.insightthreatintel.com/p/extremist-financing-through-merchandise</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/extremist-financing-through-merchandise</guid><dc:creator><![CDATA[Dan Collen]]></dc:creator><pubDate>Tue, 09 Jul 2024 13:02:09 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97a68d41-0cb0-459d-97f3-5cd6cca967c6_1500x1000.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Hello <strong>Insight Monitor</strong> subscribers, and welcome to another edition of our newsletter. Today, we&#8217;re looking at how extremists finance their activities and propaganda through merchandise sales. I&#8217;m also happy to report that our intrepid newsletter has almost 6,000 subscribers, so please keep sharing and push us over that milestone. Further, the launch of our course on Financial Intelligence Fundamentals has gone well, with many students signing up. The first cohort will likely finish sometime next week, and we&#8217;re looking forward to the feedback. In the meantime, we hope you enjoy this analysis. </em></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Insight Monitor is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><p>Extremists believe the success or survival of an in-group (most often their own) can&#8217;t be separated from &#8220;<a href="https://www.jmberger.com/definition">the need for hostile action against an out-group</a>.&#8221; (JM Berger&#8217;s definition from 2018).  As readers of this newsletter certainly know, extremist movements often resort to covert processes to finance actions against out groups. However, this isn&#8217;t necessarily the case for far-right extremists. Instead, many far-right extremist groups in North America (a subset of ideologically-motivated extremists) benefit from the overt sale of their merchandise.</p><p>While the public nature of the sale of far-right extremist products is by no means a secret, book sales, in particular, have been especially recognized in recent months due to the <a href="https://www.vulture.com/article/rupaul-bookstore-allstora-controversy-explained.html">controversy</a> surrounding Rupaul Charles&#8217; drop-shipping site <em><a href="https://www.dailydot.com/news/rupaul-bookstore-allstora-dropshipping/">Allstora</a>.<strong> </strong></em>While Charles said the secondary retail website would be &#8220;all-inclusive,&#8221; reports quickly emerged about far-right literature being included on the platform, including favourable translations of <a href="https://www.dailydot.com/news/rupaul-bookstore-allstora-dropshipping/">Mein Kampf and </a><em><a href="https://www.dailydot.com/news/rupaul-bookstore-allstora-dropshipping/">the Turner Diaries</a></em>. At the time of writing, Allstora provides a platform for books sales by many far-right extremist groups, including the <a href="https://www.adl.org/resources/backgrounder/national-alliance-backgrounder">Cosmotheist Church</a> (a white supremacist church founded by Turner Diaries author William Luther Pierce),<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a> publishers in the <a href="https://newsletter.insightthreatintel.com/p/order-of-nine-angles">Order of Nine Angles</a>, and the infamous neo-Nazi publishing company <a href="https://www.splcenter.org/hatewatch/2022/06/13/white-nationalist-book-publishers-revealed">Antelope Hill</a>.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-2" href="#footnote-2" target="_self">2</a></p><p>Of course, far-right extremist groups&#8217; capacity to enrich themselves through the online shopping habits of supporters is by no means limited to book sales. (It&#8217;s not even limited to selling their merchandise, as Proud Boys&#8217; chair Enrique Tarrio claims to have <a href="https://www.businessinsider.com/proud-boys-enrique-tarrio-says-selling-blm-anti-trump-shirts-2021-6">sold pro-Black Lives Matter attire</a> to divert payment processor&#8217;s suspicions.) Far-right extremist groups also sell clothing, accessories, d&#233;cor, music, and more. While many of these sales are direct, independent labels with links to white power groups also likely play a role in financing. A notable example is <em>Midgard</em>, associated with the Nordic Resistance Movement, and a retailer of white power music, merchandise, and books whose customer data was <a href="https://gnet-research.org/2024/01/18/the-midgard-leak-exposing-the-global-business-of-the-far-right/">publicly leaked</a> in December by <em>Anti-Fascist</em> <em>Action Stockholm</em>. In a preface to the leak, Anti-Fascist Action Stockholm describes Midgard as having &#8220;<a href="https://midgard.antifa.se/">actively participated in and financially supported several Nazi organizations</a>.&#8221;</p><p>Today, we&#8217;ll be looking at how five far-right extremist groups and two clothing brands with ties to far-right extremist groups raise funds through online sales. While these groups and brands are only a drop in the ocean in the vast ecosystem of far-right E-Commerce, they provide insight into how these outfitters typically operate.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!unH8!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2c41f0c-7ea0-4a1c-bac3-d9a5a359c83d_1500x1000.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!unH8!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2c41f0c-7ea0-4a1c-bac3-d9a5a359c83d_1500x1000.jpeg 424w, https://substackcdn.com/image/fetch/$s_!unH8!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2c41f0c-7ea0-4a1c-bac3-d9a5a359c83d_1500x1000.jpeg 848w, https://substackcdn.com/image/fetch/$s_!unH8!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2c41f0c-7ea0-4a1c-bac3-d9a5a359c83d_1500x1000.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!unH8!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2c41f0c-7ea0-4a1c-bac3-d9a5a359c83d_1500x1000.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!unH8!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2c41f0c-7ea0-4a1c-bac3-d9a5a359c83d_1500x1000.jpeg" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e2c41f0c-7ea0-4a1c-bac3-d9a5a359c83d_1500x1000.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:624368,&quot;alt&quot;:&quot;An infographic titled &#8220;RIGHT-WING EXTREMIST MERCHANDISING FAST FACTS.&#8221; It displays boxes with the logos of of Will2Rise, Goyim Defense League/GoyimTV, America First, Diagolon, Blood Tribe, Team Asgard, and Vinland Battlewear. Each has fast facts next to it. Platform, Processor, and Payments.  Will2Rise: &#8220;Platform:  Woocommerce  Processor:  Stripe  Payments:  Paypal, Credit, Cash&#8221;    Goyim Defense League/GoyimTV: &#8220;Platform:  Woocommerce  Processor:  Several indirect processors  Payments:  Bitcoin, Monero, Ethereum, Litecoin, Dogecoin, XRP, Cast, Cheque, Money order, Amazon gift card&#8221;  America First: &#8220;Platform:  Woocommerce  Processor:  BTCPay  Payments:  Bitcoin&#8221;  Diagolon: &#8220;Platform:  Several (including Stripe Marketplace Platform, Wix)  Processor:  Several (including Stripe, Paypal)  Payments:  Credit&#8221;  Blood Tribe: &#8220;Platform:  GoDaddy ECommerce  Processor:  Google Pay  Payments:  Credit&#8221;  Team Asgard: &#8220;Platform:  WooCommerce  Processor:  Stripe  Payments:  Credit&#8221;  Vinland Battlewear: &#8220;Platform:  WooCommerce  Processor:  Stripe  Payments:  Credit&#8221;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="An infographic titled &#8220;RIGHT-WING EXTREMIST MERCHANDISING FAST FACTS.&#8221; It displays boxes with the logos of of Will2Rise, Goyim Defense League/GoyimTV, America First, Diagolon, Blood Tribe, Team Asgard, and Vinland Battlewear. Each has fast facts next to it. Platform, Processor, and Payments.  Will2Rise: &#8220;Platform:  Woocommerce  Processor:  Stripe  Payments:  Paypal, Credit, Cash&#8221;    Goyim Defense League/GoyimTV: &#8220;Platform:  Woocommerce  Processor:  Several indirect processors  Payments:  Bitcoin, Monero, Ethereum, Litecoin, Dogecoin, XRP, Cast, Cheque, Money order, Amazon gift card&#8221;  America First: &#8220;Platform:  Woocommerce  Processor:  BTCPay  Payments:  Bitcoin&#8221;  Diagolon: &#8220;Platform:  Several (including Stripe Marketplace Platform, Wix)  Processor:  Several (including Stripe, Paypal)  Payments:  Credit&#8221;  Blood Tribe: &#8220;Platform:  GoDaddy ECommerce  Processor:  Google Pay  Payments:  Credit&#8221;  Team Asgard: &#8220;Platform:  WooCommerce  Processor:  Stripe  Payments:  Credit&#8221;  Vinland Battlewear: &#8220;Platform:  WooCommerce  Processor:  Stripe  Payments:  Credit&#8221;" title="An infographic titled &#8220;RIGHT-WING EXTREMIST MERCHANDISING FAST FACTS.&#8221; It displays boxes with the logos of of Will2Rise, Goyim Defense League/GoyimTV, America First, Diagolon, Blood Tribe, Team Asgard, and Vinland Battlewear. Each has fast facts next to it. Platform, Processor, and Payments.  Will2Rise: &#8220;Platform:  Woocommerce  Processor:  Stripe  Payments:  Paypal, Credit, Cash&#8221;    Goyim Defense League/GoyimTV: &#8220;Platform:  Woocommerce  Processor:  Several indirect processors  Payments:  Bitcoin, Monero, Ethereum, Litecoin, Dogecoin, XRP, Cast, Cheque, Money order, Amazon gift card&#8221;  America First: &#8220;Platform:  Woocommerce  Processor:  BTCPay  Payments:  Bitcoin&#8221;  Diagolon: &#8220;Platform:  Several (including Stripe Marketplace Platform, Wix)  Processor:  Several (including Stripe, Paypal)  Payments:  Credit&#8221;  Blood Tribe: &#8220;Platform:  GoDaddy ECommerce  Processor:  Google Pay  Payments:  Credit&#8221;  Team Asgard: &#8220;Platform:  WooCommerce  Processor:  Stripe  Payments:  Credit&#8221;  Vinland Battlewear: &#8220;Platform:  WooCommerce  Processor:  Stripe  Payments:  Credit&#8221;" srcset="https://substackcdn.com/image/fetch/$s_!unH8!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2c41f0c-7ea0-4a1c-bac3-d9a5a359c83d_1500x1000.jpeg 424w, https://substackcdn.com/image/fetch/$s_!unH8!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2c41f0c-7ea0-4a1c-bac3-d9a5a359c83d_1500x1000.jpeg 848w, https://substackcdn.com/image/fetch/$s_!unH8!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2c41f0c-7ea0-4a1c-bac3-d9a5a359c83d_1500x1000.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!unH8!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2c41f0c-7ea0-4a1c-bac3-d9a5a359c83d_1500x1000.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>Do you want to learn more about financial intelligence and how to use it in research, investigations, and analysis? Our financial intelligence fundamentals course is for you! Launching 2 July 2024, this course is perfect for people new to financial intelligence and seasoned professionals. <a href="https://insightthreatintelligence.thinkific.com/courses/introFININT">Enroll today</a>!</em></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://insightthreatintelligence.thinkific.com/courses/introFININT" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!twUc!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe22a91b0-2f94-4a22-9e09-e862e5a6dfa8_1920x1080.heic 424w, https://substackcdn.com/image/fetch/$s_!twUc!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe22a91b0-2f94-4a22-9e09-e862e5a6dfa8_1920x1080.heic 848w, https://substackcdn.com/image/fetch/$s_!twUc!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe22a91b0-2f94-4a22-9e09-e862e5a6dfa8_1920x1080.heic 1272w, https://substackcdn.com/image/fetch/$s_!twUc!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe22a91b0-2f94-4a22-9e09-e862e5a6dfa8_1920x1080.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!twUc!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe22a91b0-2f94-4a22-9e09-e862e5a6dfa8_1920x1080.heic" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e22a91b0-2f94-4a22-9e09-e862e5a6dfa8_1920x1080.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:237073,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:&quot;&quot;,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:&quot;https://insightthreatintelligence.thinkific.com/courses/introFININT&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!twUc!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe22a91b0-2f94-4a22-9e09-e862e5a6dfa8_1920x1080.heic 424w, https://substackcdn.com/image/fetch/$s_!twUc!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe22a91b0-2f94-4a22-9e09-e862e5a6dfa8_1920x1080.heic 848w, https://substackcdn.com/image/fetch/$s_!twUc!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe22a91b0-2f94-4a22-9e09-e862e5a6dfa8_1920x1080.heic 1272w, https://substackcdn.com/image/fetch/$s_!twUc!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe22a91b0-2f94-4a22-9e09-e862e5a6dfa8_1920x1080.heic 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div>
      <p>
          <a href="https://newsletter.insightthreatintel.com/p/extremist-financing-through-merchandise">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Hamas's multimillion-dollar crypto empire]]></title><description><![CDATA[Revisiting the crypto crisis]]></description><link>https://newsletter.insightthreatintel.com/p/hamass-multimillion-dollar-crypto</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/hamass-multimillion-dollar-crypto</guid><dc:creator><![CDATA[Jessica Davis, PhD]]></dc:creator><pubDate>Thu, 06 Jun 2024 13:03:37 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!U-f0!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4d5452f6-c9f8-4fae-8764-3ef90946dc44.heic" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Hello <strong>Insight Monitor</strong></em><strong> </strong><em>subscribers! I&#8217;ve been meaning to write this article for months now. But I&#8217;m glad I waited because there&#8217;s been new information coming out monthly about Hamas&#8217;s cryptocurrency empire. Okay, so it&#8217;s not quite an empire, but it is an important part of how the group gets money &#8212; particularly from their state sponsor, Iran. Estimates of Iranian funding of the group range from $80-$300 million annually (I personally think it&#8217;s on the lower end of that scale&#8230;), and Iran has to move that money to Hamas leadership somehow. While they have a lot of tools at their disposal, cryptocurrency is irresistible for moving that amount of money internationally. But it&#8217;s also subject to countermeasures, as we&#8217;ll explore below. Have a read! </em></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Insight Monitor is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>Back in late 2023, a Wall Street Journal article came out <a href="https://www.wsj.com/world/middle-east/militants-behind-israel-attack-raised-millions-in-crypto-b9134b7a">claiming</a> that terrorist groups in Israel had raised over $130 million in cryptocurrency donations. ($93 million going to Palestinian Islamic Jihad, and $41 million going to Hamas.) The article said that wallets &#8220;linked&#8221; to these entities had received these funds. I was immediately skeptical &#8211; this would have amounted to a significant percentage of the <a href="https://newsletter.insightthreatintel.com/p/hamas-fundraising-and-revenue-generation">group&#8217;s yearly revenues</a>. While certainly possible, it did not seem probable, given the other ways that the group has moved money into and out of its territory.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!U-f0!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4d5452f6-c9f8-4fae-8764-3ef90946dc44.heic" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!U-f0!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4d5452f6-c9f8-4fae-8764-3ef90946dc44.heic 424w, https://substackcdn.com/image/fetch/$s_!U-f0!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4d5452f6-c9f8-4fae-8764-3ef90946dc44.heic 848w, https://substackcdn.com/image/fetch/$s_!U-f0!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4d5452f6-c9f8-4fae-8764-3ef90946dc44.heic 1272w, https://substackcdn.com/image/fetch/$s_!U-f0!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4d5452f6-c9f8-4fae-8764-3ef90946dc44.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!U-f0!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4d5452f6-c9f8-4fae-8764-3ef90946dc44.heic" width="1456" height="832" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4d5452f6-c9f8-4fae-8764-3ef90946dc44.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:832,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:184565,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!U-f0!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4d5452f6-c9f8-4fae-8764-3ef90946dc44.heic 424w, https://substackcdn.com/image/fetch/$s_!U-f0!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4d5452f6-c9f8-4fae-8764-3ef90946dc44.heic 848w, https://substackcdn.com/image/fetch/$s_!U-f0!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4d5452f6-c9f8-4fae-8764-3ef90946dc44.heic 1272w, https://substackcdn.com/image/fetch/$s_!U-f0!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4d5452f6-c9f8-4fae-8764-3ef90946dc44.heic 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Image created by OpenAI&#8217;s Dall-E</figcaption></figure></div><p></p>
      <p>
          <a href="https://newsletter.insightthreatintel.com/p/hamass-multimillion-dollar-crypto">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[The Wirecard Story: Espionage, Foreign Interference, and the Anatomy of a Financial Scandal]]></title><description><![CDATA[The story (so far) of Wirecard and its role in international intrigue]]></description><link>https://newsletter.insightthreatintel.com/p/the-wirecard-story-espionage-foreign</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/the-wirecard-story-espionage-foreign</guid><dc:creator><![CDATA[Jessica Davis, PhD]]></dc:creator><pubDate>Thu, 02 May 2024 13:00:54 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!NBDb!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85ae0974-820c-46d8-8f23-a2bd8d07e376.heic" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Hello <strong>Insight Monitor</strong> subscribers, and a warm welcome to all the folks who have joined us this week. As you all know, we&#8217;re celebrating our &#127881;3 Year Anniversary&#127881;! As part of that celebration, we have a few promotions going on. First of all, if you share this, or any other post from this week (using the share buttons), you&#8217;ll automatically be entered to win a complimentary paid year&#8217;s subscription to this newsletter. Help us build our community! Secondly, we have a 30% discount for anyone who wants to upgrade to a paid subscription. </em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/344372df&quot;,&quot;text&quot;:&quot;30% off&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://newsletter.insightthreatintel.com/344372df"><span>30% off</span></a></p><p><em>We hope you&#8217;ll join our community and help us celebrate our &#127881;3 Year Anniversary&#127881;! Alright, let&#8217;s get into today&#8217;s article, all about espionage, foreign interference, and of course, money. </em></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!NBDb!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85ae0974-820c-46d8-8f23-a2bd8d07e376.heic" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!NBDb!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85ae0974-820c-46d8-8f23-a2bd8d07e376.heic 424w, https://substackcdn.com/image/fetch/$s_!NBDb!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85ae0974-820c-46d8-8f23-a2bd8d07e376.heic 848w, https://substackcdn.com/image/fetch/$s_!NBDb!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85ae0974-820c-46d8-8f23-a2bd8d07e376.heic 1272w, https://substackcdn.com/image/fetch/$s_!NBDb!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85ae0974-820c-46d8-8f23-a2bd8d07e376.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!NBDb!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85ae0974-820c-46d8-8f23-a2bd8d07e376.heic" width="364" height="364" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/85ae0974-820c-46d8-8f23-a2bd8d07e376.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:364,&quot;bytes&quot;:197069,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!NBDb!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85ae0974-820c-46d8-8f23-a2bd8d07e376.heic 424w, https://substackcdn.com/image/fetch/$s_!NBDb!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85ae0974-820c-46d8-8f23-a2bd8d07e376.heic 848w, https://substackcdn.com/image/fetch/$s_!NBDb!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85ae0974-820c-46d8-8f23-a2bd8d07e376.heic 1272w, https://substackcdn.com/image/fetch/$s_!NBDb!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85ae0974-820c-46d8-8f23-a2bd8d07e376.heic 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Image created by OpenAI&#8217;s Dall-E</figcaption></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/p/the-wirecard-story-espionage-foreign?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/p/the-wirecard-story-espionage-foreign?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p>In 2020, Germany&#8217;s fastest-growing technology company (sometimes described as Germany&#8217;s answer to PayPal) announced that nearly &#8364;2 billion was missing from the company&#8217;s accounts. The financial scandal that led to this, and ultimately the collapse of the company, is worth <a href="https://www.newyorker.com/magazine/2023/03/06/how-the-biggest-fraud-in-german-history-unravelled">reading</a>, but today we&#8217;re here to talk about the espionage &amp; foreign interference angle of the case. Because the story of Wirecard is not just one of <a href="https://www.afr.com/world/europe/how-this-wirecard-executive-ran-a-brutal-russian-spy-ring-20240409-p5fihr">fraud</a>: it&#8217;s one about international intrigue, spies, Russian private military corporations, and how those threats get financed.</p><p>Subscribe to read more: </p>
      <p>
          <a href="https://newsletter.insightthreatintel.com/p/the-wirecard-story-espionage-foreign">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Decoding Entropy: Exposing the Platform Fueling Extremism and Financing]]></title><description><![CDATA[Platforming extremism]]></description><link>https://newsletter.insightthreatintel.com/p/entropys-role-in-imve-financing</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/entropys-role-in-imve-financing</guid><dc:creator><![CDATA[Dan Collen]]></dc:creator><pubDate>Thu, 28 Mar 2024 13:00:38 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e608164-12ae-46fb-bf83-ba9af9046bdc_1500x1000.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Hello <strong>Insight Monitor</strong> subscribers, and welcome to another edition of our newsletter where we look at extremist financing. This week, we&#8217;re doing something a little different, and looking at a platform and how it is financed, its corporate structure, and opportunities for disruption. This is particularly relevant in the lead up to US elections, and in a growing climate of political extremism. Let&#8217;s get into it. </em></p><p><em>~Jess</em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/subscribe?"><span>Subscribe now</span></a></p><p>Entropy is a Canadian livestreaming service and donation platform. It garnered significant recognition between 2019 and 2021 for providing a payment platform to influential extremists who had been demonetized from larger platforms, including prominent white nationalist Nick Fuentes. Today, it is used by dozens of extremist livestreamers and facilitates donations from potentially thousands of users.</p><h2>Entropy&#8217;s Network</h2><p>Entropy was launched in 2019 by Chthonic Software, a tech company co-founded by David John Bell, Emmanuel Constantinidis, and Rachel Constantinidis in Calgary, Alberta. In the website&#8217;s first two years, it attracted significant influential far-right personalities as livestreamers (live video bloggers), including Canadian white Nationalist <a href="https://gnet-research.org/2023/05/17/inside-the-cult-of-stefan-molyneux-a-historical-exploration-of-far-right-radicalisation-on-youtube/">Stefan Molyneux</a>, British neo-Nazi <a href="https://www.bbc.com/news/uk-politics-36390378">Mark Collett</a>, and &#8212; most notably &#8212; US white nationalist <a href="https://www.splcenter.org/hatewatch/2021/12/19/revealed-startup-creates-streaming-platform-extremists-big-tech-infrastructure">Nick Fuentes</a>.</p><p>In 2021, Entropy&#8217;s owners <a href="https://www.splcenter.org/hatewatch/2021/12/19/revealed-startup-creates-streaming-platform-extremists-big-tech-infrastructure">moved to T&#252;rkiye</a>. While the platform&#8217;s management has become more secretive in recent years, and have ceased all public marketing, the website appears to still be a thriving platform among white supremacist and neo-Nazi streamers in Canada and the US. The size of Entropy&#8217;s channels and user base is difficult to quantify due to the website&#8217;s user interface. The site only displays a limited number of channels in any category, and there is no method to browse accounts. However, the site&#8217;s most-subscribed channel has over 3500 subscribers.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a></p><p>While Entropy took steps throughout 2019 and 2020 to find and promote emerging far-right talent, it did not obtain or maintain exclusive streaming rights from its streamers. For example, Entropy&#8217;s most subscribed livestreamers are US neo-Nazi comedian and ex-Infowars host <a href="https://www.thedailybeast.com/neighbors-fear-bear-themed-compound-will-be-next-ruby-ridge">Owen Benjamin</a>, Canadian white supremacist <a href="https://newsletter.insightthreatintel.com/p/the-diagolon-network">Jeremy Mackenzie</a>, Nick Fuentes, and US antisemitic conspiracy theorist <a href="https://www.adl.org/resources/report/antisemitic-conspiracies-about-911-endure-20-years-later">Ryan Dawson</a>, respectively.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-2" href="#footnote-2" target="_self">2</a> Benjamin and Dawson both promote their livestreaming accounts with competitors&#8217; platforms (Odyssey and Rumble) on their own websites, but neither include links to their Entropy streams on the same pages.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-3" href="#footnote-3" target="_self">3</a> In fact, Owen Benjamin &#8212; Entropy&#8217;s biggest channel &#8212; promotes social media accounts for 12 different platforms on his website, but his Entropy account is not one of them. Likewise, Fuentes&#8217; primary streaming channel is on <a href="https://www.splcenter.org/fighting-hate/extremist-files/individual/nick-fuentes">his own brand&#8217;s platform</a>. </p><h2>Financing Through Entropy</h2><h3>How Entropy is Used</h3><p>Entropy has a relatively simple financial workflow. According to Entropy&#8217;s materials for livestreamers, the site asks streamers for their preferred method of payment, and an email address to receive invoices. However, the materials do not publicly specify which payment options Entropy accommodates. Entropy promises users that it does not store streamers&#8217; financial information and claims it uses encryption for payments: </p><div class="pullquote"><p>&#8220;When making a payment you authorize our payment processor to create an encrypted card token which we use to create a charge. We do not have access to your card details nor can we decrypt the token. When a charge is made we store information such as, but not limited to, amount, currency, sender, and receiver.&#8221;</p></div><p>While Entropy&#8217;s payment process processors are not visible to viewers, Southern Poverty Law Centre (SPLC) <a href="https://www.splcenter.org/hatewatch/2021/12/19/revealed-startup-creates-streaming-platform-extremists-big-tech-infrastructure">reported</a> that the site used Stripe before developing their own payment processing service. Chthonic&#8217;s Emmanuel Constantinidis told Entropy users on a Discord server that the service was developed after Stripe <a href="https://www.splcenter.org/hatewatch/2021/12/19/revealed-startup-creates-streaming-platform-extremists-big-tech-infrastructure">pressured</a> Entropy to stop facilitating payments to Nick Fuentes.</p><p>Entropy&#8217;s domain is currently registered by the US-based ICANN domain registration service <a href="https://www.namecheap.com/">Namecheap.com</a>.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!o18e!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd43caa60-509f-481f-b249-60bd4f3c0c72_1500x1000.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!o18e!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd43caa60-509f-481f-b249-60bd4f3c0c72_1500x1000.jpeg 424w, https://substackcdn.com/image/fetch/$s_!o18e!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd43caa60-509f-481f-b249-60bd4f3c0c72_1500x1000.jpeg 848w, https://substackcdn.com/image/fetch/$s_!o18e!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd43caa60-509f-481f-b249-60bd4f3c0c72_1500x1000.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!o18e!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd43caa60-509f-481f-b249-60bd4f3c0c72_1500x1000.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!o18e!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd43caa60-509f-481f-b249-60bd4f3c0c72_1500x1000.jpeg" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d43caa60-509f-481f-b249-60bd4f3c0c72_1500x1000.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:466815,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!o18e!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd43caa60-509f-481f-b249-60bd4f3c0c72_1500x1000.jpeg 424w, https://substackcdn.com/image/fetch/$s_!o18e!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd43caa60-509f-481f-b249-60bd4f3c0c72_1500x1000.jpeg 848w, https://substackcdn.com/image/fetch/$s_!o18e!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd43caa60-509f-481f-b249-60bd4f3c0c72_1500x1000.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!o18e!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd43caa60-509f-481f-b249-60bd4f3c0c72_1500x1000.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Figure 1: Entropy Fundraising</figcaption></figure></div><p>In archived web pages retrieved by the SPLC, Entropy&#8217;s own materials, and interviews with Chthonic, Entropy claims to take <a href="https://archive.md/aArOM">15% from paid interactions</a> and promises no hidden fees to both streamers and viewers who donate. Entropy&#8217;s main services are paid chats that incentivize donations through increased interactivity with streamers. A common example is Youtube&#8217;s &#8220;<a href="https://screenrant.com/youtube-super-chat-guide/">Super Chats</a>,&#8221; which Entropy has <a href="https://www.youtube.com/watch?v=Qh56DjyRyaU">mimicked</a> on their platform. Streamers often incentivize paid chat donations by promising to perform specific actions or discuss specific topics if people pay for Super Chats.</p><p>Entropy pays out streamers their 85% share of paid chat funds once per month. If payments do not exceed $100, they claim they move the payout to the next month, and so on, until a streamer is set to receive $100 in total.</p><h3>Why Entropy is Used</h3><p>Entropy provides many influential streamers with a financing solution that is relatively simple when compared to competing platforms. Entropy&#8217;s branding has largely focused on transparent pricing models, boasting that both streamers and donors face no hidden fees in their transactions on the website.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-4" href="#footnote-4" target="_self">4</a> This positions Entropy as a much more affordable alternative for demonetized streamers than starting their own streaming platforms, for example Alex Jones&#8217;s <em>Banned Video</em>.</p><p>Entropy&#8217;s personability as a brand and its genuine far-right politics could also be factors in livestreamers&#8217; decisions to use the website. As a small company, Chthonic used to frequently promote relatively small livestreamer&#8217;s channels on its own social media accounts. Much like Gab, an antisemitic social media platform <a href="https://web.archive.org/web/20190605233151/https:/twitter.com/Rachel_the_Dev/status/1136414298685575168">favoured by Entropy&#8217;s ownership</a> and users, Entropy&#8217;s ownership regularly engaged in far-right narratives and memes on social media. Entropy owner Rachel Constantinidis also participated in right-wing political streams.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-5" href="#footnote-5" target="_self">5</a></p><p>However, this part of Entropy&#8217;s branding and promotion appears to have ceased. Entropy&#8217;s account on Gab has not posted since 2021, and the Entropy developers&#8217; current Twitter account has not posted since 2023, while Chthonic&#8217;s Twitter account has been <a href="https://twitter.com/ChthonicTeam">deactivated</a>.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-6" href="#footnote-6" target="_self">6</a></p><p>Entropy&#8217;s greatest brand proposition to streamers and viewers is most likely Chthonic&#8217;s dedication that its streamers can remain monetized, even when faced with external pressure. The website has even <a href="https://www.splcenter.org/hatewatch/2021/12/19/revealed-startup-creates-streaming-platform-extremists-big-tech-infrastructure">monetized Unite The Right organizer Robert Ray</a> when he was a fugitive from the law. Furthermore, in 2021, when Entropy was pressured by Stripe to demonetize Nick Fuentes, Chthonic created a new platform for Fuentes to avoid demonetization.</p><p>However, Entropy&#8217;s own terms and services are more limiting than some other internet platforms used by right-wing extremists. The website does not allow pornography, impersonation, or &#8220;revealing private information about someone with the intention of causing them harm.&#8221;<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-7" href="#footnote-7" target="_self">7</a></p><p>Evidently, Chthonic&#8217;s loyalty to its streamers has not prevented them from cultivating larger audiences on competing platforms. Fuentes himself has since launched <a href="https://newsletter.insightthreatintel.com/p/canadian-extremism-financing-a-case?utm_source=%2Fsearch%2Fcozy.tv&amp;utm_medium=reader2">his own streaming platform, CozyTV</a>, which he has <a href="https://twitter.com/RightWingWatch/status/1481641451444260866">promoted</a> as an &#8220;anti-gay, anti-woman, anti-Black, antisemitic&#8221; streaming alternative.</p><p>An additional weakness in Entropy&#8217;s service is that the streaming quality is relatively poor, with lag being a common occurrence.</p><h2>Entropy&#8217;s Finances</h2><p>As a small, private company, it is difficult to gauge the costs incurred by Chthonic Software to build and maintain Entropy. Additionally, it is unclear if, or how, Entropy is marketed other than through extremist word of mouth. While Entropy could have spent money on social media marketing between 2019 and 2021, Chthonic seldom, if ever, publicly promotes Entropy today.</p><p>Prior to their move to T&#252;rkiye, Entropy&#8217;s owners appeared to be involved in development and marketing of Entropy, which could have reduced contracting costs for the company. Rachel Constantinidis often acted as the face of Entropy, at times appearing in videos promoting the platform posted to video platforms like Bitchute and Youtube.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-8" href="#footnote-8" target="_self">8</a> These videos had minimal production value, with much of the footage appearing as Constantinidis speaking to a webcam, and as such likely did not incur significant costs for Entropy.</p><p>The Entropy website is a <em>.live</em> domain registered through Arizona-based domain provider NameCheap.com. Other domains with similar names to Entropy&#8217;s website drastically range in costs, with many costing less than $10 per year and others costing several hundred.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!5xGS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e608164-12ae-46fb-bf83-ba9af9046bdc_1500x1000.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!5xGS!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e608164-12ae-46fb-bf83-ba9af9046bdc_1500x1000.jpeg 424w, https://substackcdn.com/image/fetch/$s_!5xGS!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e608164-12ae-46fb-bf83-ba9af9046bdc_1500x1000.jpeg 848w, https://substackcdn.com/image/fetch/$s_!5xGS!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e608164-12ae-46fb-bf83-ba9af9046bdc_1500x1000.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!5xGS!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e608164-12ae-46fb-bf83-ba9af9046bdc_1500x1000.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!5xGS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e608164-12ae-46fb-bf83-ba9af9046bdc_1500x1000.jpeg" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4e608164-12ae-46fb-bf83-ba9af9046bdc_1500x1000.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:623043,&quot;alt&quot;:&quot;&#8220;Geography of Entropy.&#8221; World map. &#8220;Company registered in Alberta to an address in Calgary&#8221;, &#8220;Major streamers are mostly based in US and Canada&#8221;, &#8220;Domain registered to address in Reykjav&#237;k, Iceland&#8221;, &#8220;Owners live in Antalya, Turkey&#8221;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="&#8220;Geography of Entropy.&#8221; World map. &#8220;Company registered in Alberta to an address in Calgary&#8221;, &#8220;Major streamers are mostly based in US and Canada&#8221;, &#8220;Domain registered to address in Reykjav&#237;k, Iceland&#8221;, &#8220;Owners live in Antalya, Turkey&#8221;" title="&#8220;Geography of Entropy.&#8221; World map. &#8220;Company registered in Alberta to an address in Calgary&#8221;, &#8220;Major streamers are mostly based in US and Canada&#8221;, &#8220;Domain registered to address in Reykjav&#237;k, Iceland&#8221;, &#8220;Owners live in Antalya, Turkey&#8221;" srcset="https://substackcdn.com/image/fetch/$s_!5xGS!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e608164-12ae-46fb-bf83-ba9af9046bdc_1500x1000.jpeg 424w, https://substackcdn.com/image/fetch/$s_!5xGS!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e608164-12ae-46fb-bf83-ba9af9046bdc_1500x1000.jpeg 848w, https://substackcdn.com/image/fetch/$s_!5xGS!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e608164-12ae-46fb-bf83-ba9af9046bdc_1500x1000.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!5xGS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e608164-12ae-46fb-bf83-ba9af9046bdc_1500x1000.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Figure 2: Entropy Geography</figcaption></figure></div><p>While Chthonic software does not currently appear to operate a website other than Entropy, Entropy&#8217;s contact information includes emails registered to a second domain, which records indicate is also registered through NameCheap.com.</p><p>Because Entropy claims that no additional fees are ever incurred by its users, its ownership likely incur wire transfer fees to pay out the streamers (a fairly minor cost for the business).</p><p>Entropy does not appear to incur contracting costs for website maintenance or customer service. Instead, Chthonic&#8217;s owners&#8217; personal emails are listed for troubleshooting support.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-9" href="#footnote-9" target="_self">9</a></p><h2>A Canadian company but an international footprint</h2><p>As of the time of writing, Entropy&#8217;s parent company Chthonic Software appears to still be <a href="https://albertacorporations.com/chthonic-software-inc">registered</a> as a company in Alberta. However, its business address has not been updated since before its owners moved to T&#252;rkiye. Businesses registered in Canada usually have a bank account at a Canadian financial institution; however, Chthonic might also have opened a bank account in T&#252;rkiye through which it processes its payments.</p><p>T&#252;rkiye is widely recognized for its <a href="https://www.fdd.org/analysis/2024/02/17/turkey-is-a-sanctuary-for-terrorism-financing/">leniency on terrorism financing</a>. As such, it is unlikely that Entropy&#8217;s owners, who primarily provide financing to non-violent extremists, would face legal consequence from Turkish authorities. Further, T&#252;rkiye is preoccupied with other forms of terrorism and extremism, and is unlikely to view this activity as a threat to its security or worth taking action against. The situation could be further complicated by the fact that Entropy&#8217;s domain and the domain that Chthonic&#8217;s owners&#8217; email addresses use are both registered to an address in Reykjavik, Iceland. However, this address has not been verified.</p><p>Conversely, deplatforming by other tech companies has hindered Entropy&#8217;s operations in the past. As the SPLC reported, Emmanuel Constantinidis claims Entropy was pressured by Stripe (a service that has been <a href="https://www.nbcnews.com/business/business-news/tech-platforms-continue-let-u-s-based-hate-groups-use-n1244816">criticized</a> for providing services to far-right extremists in the past) to demonetize Nick Fuentes. The site&#8217;s accompanying Google Chrome application also appears to have been <a href="https://chrome.google.com/webstore/detail/entropy/laapafclfdocppiklojgehcfbfgegkpd">removed</a> from Google&#8217;s app platform. However, it is possible that Google has not fully deplatformed Entropy. Entropy <a href="https://www.youtube.com/watch?v=Qh56DjyRyaU">has boasted integration with Youtube (owned by Google) and Twitch</a> for simultaneous streaming capabilities since 2019.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-10" href="#footnote-10" target="_self">10</a> Login pages on Entropy and the website&#8217;s FAQ sections indicate that it is still integrated with both services, as well as Rumble, Odyssey, Cozy, and DLive.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-11" href="#footnote-11" target="_self">11</a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/p/entropys-role-in-imve-financing?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/p/entropys-role-in-imve-financing?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p><em>Interested in learning more about terrorist financing and how best to analyze it? Sign up for our online course today!</em></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://insightthreatintelligence.thinkific.com/bundles/tf-analysis" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Fufy!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9db0286a-5a01-49e6-b61d-e20ab4744557.heic 424w, https://substackcdn.com/image/fetch/$s_!Fufy!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9db0286a-5a01-49e6-b61d-e20ab4744557.heic 848w, https://substackcdn.com/image/fetch/$s_!Fufy!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9db0286a-5a01-49e6-b61d-e20ab4744557.heic 1272w, https://substackcdn.com/image/fetch/$s_!Fufy!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9db0286a-5a01-49e6-b61d-e20ab4744557.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Fufy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9db0286a-5a01-49e6-b61d-e20ab4744557.heic" width="458" height="458" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9db0286a-5a01-49e6-b61d-e20ab4744557.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1080,&quot;width&quot;:1080,&quot;resizeWidth&quot;:458,&quot;bytes&quot;:204417,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:&quot;&quot;,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:&quot;https://insightthreatintelligence.thinkific.com/bundles/tf-analysis&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!Fufy!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9db0286a-5a01-49e6-b61d-e20ab4744557.heic 424w, https://substackcdn.com/image/fetch/$s_!Fufy!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9db0286a-5a01-49e6-b61d-e20ab4744557.heic 848w, https://substackcdn.com/image/fetch/$s_!Fufy!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9db0286a-5a01-49e6-b61d-e20ab4744557.heic 1272w, https://substackcdn.com/image/fetch/$s_!Fufy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9db0286a-5a01-49e6-b61d-e20ab4744557.heic 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>&#169; 2024 Insight Threat Intelligence Ltd. All Rights Reserved.<br><br>This newsletter and its contents are protected by Canadian copyright law. Except as otherwise provided for under Canadian copyright law, this newsletter and its contents may not be copied, published, distributed, downloaded or otherwise stored in a retrieval system, transmitted or converted, in any form or by any means, electronic or otherwise, without the prior written permission of the copyright owner.</em></p><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-1" href="#footnote-anchor-1" class="footnote-number" contenteditable="false" target="_self">1</a><div class="footnote-content"><p><em>Entropy Homepage</em>. Entropy, n.d. URL censored.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-2" href="#footnote-anchor-2" class="footnote-number" contenteditable="false" target="_self">2</a><div class="footnote-content"><p><em>Entropy Homepage</em>. URL censored.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-3" href="#footnote-anchor-3" class="footnote-number" contenteditable="false" target="_self">3</a><div class="footnote-content"><p>Owen Benjamin, &#8220;Social Media Channels,&#8221; Owen Benjamin, n.d. URL censored.; Ryan Dawson, &#8220;Ryan Dawson&#8217;s Anti-Neocon Report,&#8221; ANCReport, n.d. URL censored.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-4" href="#footnote-anchor-4" class="footnote-number" contenteditable="false" target="_self">4</a><div class="footnote-content"><p>&#8220;Policies &amp; Terms of Service.&#8221;; &#8220;Getting Started,&#8221; Entropy, n.d. URL censored.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-5" href="#footnote-anchor-5" class="footnote-number" contenteditable="false" target="_self">5</a><div class="footnote-content"><p><em>&#8220;</em>About to go live with [censored] to talk about our journey into Orthodoxy&#8221; <em>Rachel Constantinidis</em>. Twitter. March 22, 2019; &#8220;It was awesome to have you call in to my stream! Made me feel like a radio show host! <em>Rachel Constantinidis</em>. Twitter. March 18, 2019. URL censored.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-6" href="#footnote-anchor-6" class="footnote-number" contenteditable="false" target="_self">6</a><div class="footnote-content"><p>&#8220;@ChthonicTeam,&#8221; n.d. Twitter. URL censored.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-7" href="#footnote-anchor-7" class="footnote-number" contenteditable="false" target="_self">7</a><div class="footnote-content"><p>&#8220;Policies &amp; Terms of Service<em>,&#8221; </em>Entropy, n.d. URL censored.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-8" href="#footnote-anchor-8" class="footnote-number" contenteditable="false" target="_self">8</a><div class="footnote-content"><p>&#8220;Rachel Constantinidis,&#8221; Youtube, n.d. URL censored.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-9" href="#footnote-anchor-9" class="footnote-number" contenteditable="false" target="_self">9</a><div class="footnote-content"><p>&#8220;Contact<em>,&#8221; </em>Entropy, n.d. URL censored.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-10" href="#footnote-anchor-10" class="footnote-number" contenteditable="false" target="_self">10</a><div class="footnote-content"><p><em>Episode 1 with Tech Start up Chthonic Software</em>, 2019. Andrea With Bangs. Youtube. URL censored.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-11" href="#footnote-anchor-11" class="footnote-number" contenteditable="false" target="_self">11</a><div class="footnote-content"><p> &#8220;Policies &amp; Terms of Service<em>,&#8221; </em>Entropy, n.d. URL censored.</p></div></div>]]></content:encoded></item><item><title><![CDATA[Substack Nazi Update: Even more Nazis]]></title><description><![CDATA[Update to our analysis from January 2024]]></description><link>https://newsletter.insightthreatintel.com/p/substack-nazi-update-even-more-nazis</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/substack-nazi-update-even-more-nazis</guid><dc:creator><![CDATA[Jessica Davis, PhD]]></dc:creator><pubDate>Tue, 13 Feb 2024 14:00:17 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!r3_D!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04f1ffd7-5217-4d4e-991a-59855153204f_800x512" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Last month, we wrote an analysis of Substack&#8217;s Nazi problem. We found a disturbing number of publications that used Nazi symbols, terms or slogans, that explicitly defended, promoted, or celebrated Nazism, Adolf Hitler or the Holocaust, white supremacists or neo-Nazis, or that promoted white supremacy, white nationalism, or antisemitism on the platform. Despite Substack&#8217;s claims, many of these publications were monetized. Today, we&#8217;re publishing our update on this analysis following Substack&#8217;s removal of some Nazi publications.</em> </p><p>If you haven&#8217;t read our initial analysis, you should go back and read it before continuing with this article, because it will explain our methodology and definitions.</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;780efa80-a419-4c67-9edd-4d8c746bad9b&quot;,&quot;caption&quot;:&quot;In November 2023, Jonathan M. Katz wrote in The Atlantic about Substack&#8217;s Nazi problem. He argued that the platform has become a home to white supremacy and anti-Semitism, and that the platform profits from this activity. Following the publication of the Atlantic article, more than 200 writers on Substack&quot;,&quot;cta&quot;:null,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Nazis on Substack&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:33479672,&quot;name&quot;:&quot;Jessica Davis&quot;,&quot;bio&quot;:&quot;Jessica Davis is President of Insight Threat Intelligence and is the author of Women in Modern Terrorism: From Liberations Wars to Global Terrorism and the Islamic State (2017), and Illicit Money: Financing Terrorism in the 21st Century (2021).&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e312ae7c-114b-4e4f-9ce1-8bf50ddb7a27_2344x2049.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100},{&quot;id&quot;:80301532,&quot;name&quot;:&quot;Dan Collen&quot;,&quot;bio&quot;:&quot;Canadian who writes about digital media, disinformation, and hate movements. But, not necessarily on Substack.&quot;,&quot;photo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe3fa78e8-83ca-489c-adf2-5ec9e7ddb461_1229x1229.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2024-01-09T12:30:58.001Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff96b73ac-39ec-41df-b68c-07ebd97ebe2a_800x512&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/nazis-on-substack&quot;,&quot;section_name&quot;:&quot;Financiers&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:140485351,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:19,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F09b767fc-6dde-4336-90bb-7806e0822653_900x900.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/subscribe?"><span>Subscribe now</span></a></p><h3>The Good News</h3>
      <p>
          <a href="https://newsletter.insightthreatintel.com/p/substack-nazi-update-even-more-nazis">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Nazis on Substack]]></title><description><![CDATA[Monetizing Hate]]></description><link>https://newsletter.insightthreatintel.com/p/nazis-on-substack</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/nazis-on-substack</guid><dc:creator><![CDATA[Jessica Davis, PhD]]></dc:creator><pubDate>Tue, 09 Jan 2024 12:30:58 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!P1t-!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff96b73ac-39ec-41df-b68c-07ebd97ebe2a_800x512" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>In November 2023, Jonathan M. Katz wrote in The Atlantic about Substack&#8217;s <a href="https://www.theatlantic.com/ideas/archive/2023/11/substack-extremism-nazi-white-supremacy-newsletters/676156/">Nazi problem</a>. He argued that the platform has become a home to white supremacy and anti-Semitism, and that the platform profits from this activity. Following the publication of the Atlantic article, more than 200 writers on Substack <a href="https://www.theverge.com/2023/12/18/24006405/substackers-against-nazis-want-the-company-to-explain-itself">signed an open letter to the company</a> asking them why they are platforming and monetizing Nazis (Substackers against Nazis).</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!P1t-!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff96b73ac-39ec-41df-b68c-07ebd97ebe2a_800x512" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!P1t-!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff96b73ac-39ec-41df-b68c-07ebd97ebe2a_800x512 424w, https://substackcdn.com/image/fetch/$s_!P1t-!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff96b73ac-39ec-41df-b68c-07ebd97ebe2a_800x512 848w, https://substackcdn.com/image/fetch/$s_!P1t-!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff96b73ac-39ec-41df-b68c-07ebd97ebe2a_800x512 1272w, https://substackcdn.com/image/fetch/$s_!P1t-!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff96b73ac-39ec-41df-b68c-07ebd97ebe2a_800x512 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!P1t-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff96b73ac-39ec-41df-b68c-07ebd97ebe2a_800x512" width="512" height="512" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f96b73ac-39ec-41df-b68c-07ebd97ebe2a_800x512&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:&quot;normal&quot;,&quot;height&quot;:512,&quot;width&quot;:512,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!P1t-!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff96b73ac-39ec-41df-b68c-07ebd97ebe2a_800x512 424w, https://substackcdn.com/image/fetch/$s_!P1t-!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff96b73ac-39ec-41df-b68c-07ebd97ebe2a_800x512 848w, https://substackcdn.com/image/fetch/$s_!P1t-!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff96b73ac-39ec-41df-b68c-07ebd97ebe2a_800x512 1272w, https://substackcdn.com/image/fetch/$s_!P1t-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff96b73ac-39ec-41df-b68c-07ebd97ebe2a_800x512 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Nazi with money. Image generated by Substack.</figcaption></figure></div><p>Here at <strong>Insight Monitor</strong>, we are anti-Nazi. (Apparently this needs to be said in 2024.) But we are also pro-inquiry, and wanted to know exactly what Substack&#8217;s Nazi problem might look like, how much money Nazis might be making from their newsletters, and how Substack itself is profiting from this content. Basically: we wanted to qualify and quantify this problem in order to provide evidence for policy recommendations.</p><p>For those of you who aren&#8217;t subscribers, here&#8217;s the TL;DR:</p><ul><li><p>Nazis on Substack might make millions of dollars per year, with some creators making hundreds of thousands of dollars</p></li><li><p>Substack itself probably makes hundreds of thousands of dollars per year on Nazi content</p></li><li><p>Substack&#8217;s algorithm creates a network of Nazi substacks by recommending similar content</p></li><li><p>We should not give Nazis money: Substack should demonetize and de-prioritize these newsletters (at the very least)</p></li><li><p><a href="https://gifct.org">GIFCT</a> and <a href="https://techagainstterrorism.org/home">Tech Against Terrorism</a> should engage with Substack to help them develop better policies and practices</p></li><li><p>States should consider legislation and regulations against the monetization of hateful content (ideally platforms do this themselves&#8230;)</p></li></ul><p>Yesterday (8 January 2023), Substack announced that it would be removing Nazi publications from the platform. This is not a new policy &#8212; but rather a reconsideration of how it considers existing policies. The removals only apply to &#8220;credible threats of harm&#8221;. The application of the policy applies to <strong>five publications</strong>, and none of the publications removed had paid subscriptions enabled, and they <strong>accounted for about 100 active readers</strong>. </p><div class="pullquote"><p>This does not address the problem. Our dataset of Nazi content identified 75 publications with over a 100,000 readers, a significant proportion of which were monetized.</p></div><p>Subscribe to read more about how we came to these conclusions and our evidence-base: </p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/subscribe?"><span>Subscribe now</span></a></p><h3><strong>How we found Nazi newsletters</strong></h3><p>To find Nazi newsletters, we initiated our research using the publications of known white nationalists and neo-Nazis, for example, <a href="https://www.theatlantic.com/ideas/archive/2023/11/substack-extremism-nazi-white-supremacy-newsletters/676156/">a newsletter </a> mentioned in the &#8220;Substackers Against Nazis&#8221; controversy. We snowballed (expanded our sample) using Substack&#8217;s own suggestion algorithm, including dozens of suggested Substack publications in our initial dataset.</p><p>We also used subscriber lists to identify possible newsletters for inclusion. When newsletters had a low number of subscribers, we were able to use these lists to identify further newsletters that used hate-promoting iconography or language, and included these in our broader sample for further assessment against our criteria.</p><p>This is not an exhaustive examining of the Substack platform for Nazi material; instead, it is a sample in a broader population. The actual number of Nazi newsletters on the platform is unknown. </p><h4><em><strong>Inclusion Criteria</strong></em></h4><p>While we looked at nearly 100 publications, we analyzed the written content and imagery from <strong>75 Substack publications (newsletters)</strong> whose contents clearly fulfilled <strong>one or more</strong> of the following attributes:</p><ol><li><p>The publication uses Nazi symbols, terms, or slogans or explicitly defends, promotes, or celebrates Nazism.</p></li><li><p>The publication defends, promotes, or celebrates Adolf Hitler or other historic Nazis, or else defends or celebrates the Holocaust.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a></p></li><li><p>The publication defends, promotes, or praises individual white supremacists or neo-Nazis.</p></li><li><p>The publication promotes White Supremacy or White Nationalism.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-2" href="#footnote-2" target="_self">2</a></p></li><li><p>The publication promotes antisemitism.</p></li></ol><h4><em><strong>Evaluation</strong></em></h4><p>For each newsletter in the initial dataset, we looked at recent or pinned article titles and imagery against our inclusion criteria. Some of the newsletters initially included were excluded as they failed to meet any of our inclusion criteria, resulting in a final dataset of 75 Nazi newsletters.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-3" href="#footnote-3" target="_self">3</a></p><p>We also used keyword searches within the publication to determine inclusion and to analyze the content. Keywords promoting antisemitism and National Socialism included &#8220;<strong>Hitler</strong>,&#8221; &#8220;<strong>Jews</strong>,&#8221; &#8220;<strong>Holocaust</strong>,&#8221; and &#8220;<strong>ZOG</strong>&#8221; (Zionist-Occupied Government, a conspiratorial and antisemitic term commonly used by neo-Nazis). Additionally, keywords promoting white supremacy and white nationalism included &#8220;<strong>Blacks</strong>,&#8221; &#8220;<strong>white</strong>,&#8221; &#8220;<strong>race</strong>,&#8221; and certain <strong>anti-Black slurs</strong>. </p><p>While in many cases publications in our research promoted both National Socialism and white supremacy, 20 publications promoted white nationalism or extreme antisemitism without explicitly praising National Socialism or Nazism by name and without defending, denying, or celebrating the Holocaust or the actions of Nazi Germany in the second World War. At least five of these publications included articles by authors who were known to promote or defend Nazism outside of Substack.</p><p>In total, we found:</p><blockquote><p>1.&nbsp;&nbsp;&nbsp;&nbsp; <strong>45</strong> newsletters used Nazi symbols, terms, or slogans or explicitly defend, promote, or celebrate Nazism.</p><p>2.&nbsp;&nbsp;&nbsp;&nbsp; <strong>51</strong> newsletters defended, promoted, or celebrated Adolf Hitler or other historic Nazis, or else defended or celebrate the Holocaust.</p><p>3.&nbsp;&nbsp;&nbsp;&nbsp; <strong>65</strong> newsletters defended, promoted, or praised individual white supremacists or neo-Nazis.</p><p>4.&nbsp;&nbsp;&nbsp;&nbsp; <strong>69</strong> newsletters promoted white supremacy or white nationalism.</p><p>5.&nbsp;&nbsp;&nbsp;&nbsp; <strong>60</strong> newsletters promoted antisemitism.</p></blockquote><p>Over 40 publications included all five of our attributes, while only a few newsletters included only one of our attributes.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!_dO6!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73e53720-e199-412f-bddb-870ab0754623_750x452.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!_dO6!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73e53720-e199-412f-bddb-870ab0754623_750x452.png 424w, https://substackcdn.com/image/fetch/$s_!_dO6!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73e53720-e199-412f-bddb-870ab0754623_750x452.png 848w, https://substackcdn.com/image/fetch/$s_!_dO6!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73e53720-e199-412f-bddb-870ab0754623_750x452.png 1272w, https://substackcdn.com/image/fetch/$s_!_dO6!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73e53720-e199-412f-bddb-870ab0754623_750x452.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!_dO6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73e53720-e199-412f-bddb-870ab0754623_750x452.png" width="558" height="336.288" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/73e53720-e199-412f-bddb-870ab0754623_750x452.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:452,&quot;width&quot;:750,&quot;resizeWidth&quot;:558,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!_dO6!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73e53720-e199-412f-bddb-870ab0754623_750x452.png 424w, https://substackcdn.com/image/fetch/$s_!_dO6!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73e53720-e199-412f-bddb-870ab0754623_750x452.png 848w, https://substackcdn.com/image/fetch/$s_!_dO6!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73e53720-e199-412f-bddb-870ab0754623_750x452.png 1272w, https://substackcdn.com/image/fetch/$s_!_dO6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73e53720-e199-412f-bddb-870ab0754623_750x452.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Number of attributes in each newsletter</figcaption></figure></div><p>This categorization was based <strong>only</strong> on free material. We did not subscribe to any of these newsletters to identify further extremist or violent content. As such, this likely under-states the level of extremism / Nazi content in these newsletters, as authors might put the most extreme / inciting material behind a paywall. </p><h2><strong>Determining Monetization Levels</strong></h2><p>As readers of this newsletter know, creators who publish on Substack can choose to monetize their newsletters with a variety of subscription plans for their audience at monthly or annual rates. Additionally, publishers can choose to set a <a href="https://support.substack.com/hc/en-us/articles/360042039091-Can-I-set-up-another-subscription-plan-for-readers-who-want-to-pay-more-">&#8220;Founding Member&#8221; subscription rate for their publication</a>, which is typically more expensive than a standard subscription. A publisher can also let subscribers donate more money through the founding member option. While any Substack publication can be subscribed to for free, a publisher can choose to limit specific content to paying subscribers.</p><p>The exact number of paid subscribers that a Substack publication has is not available publicly. However, &#8220;bestseller badges&#8221; appear on Substack authors&#8217; accounts, indicating authors with <a href="https://support.substack.com/hc/en-us/articles/10661509585428-What-is-a-Substack-Bestseller-badge-">at least 100, 1000, or 10,000 subscribers</a>. (It is possible to hide this badge.) </p><p>In our analysis, we used this publicly-available information to estimate minimum and maximum numbers of paid subscribers for each publication based on their bestseller badge (or lack thereof) and determined what the minimum and maximum amount of money the author could be receiving from their paying Substack subscribers.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-4" href="#footnote-4" target="_self">4</a> </p><p>Further, substack <a href="https://support.substack.com/hc/en-us/articles/360037607131-How-much-does-Substack-cost-">claims 10%</a> of a publisher&#8217;s subscription payments as platform fees, while credit card processing fees tend to claim <a href="https://www.authormedia.com/substack-for-authors-an-exciting-opportunity-or-just-hype/">an additional 3 to 5%</a> of payments.</p><p>89% of publications including in our analysis had some option to monetize their content. However, the distribution of monetization is highly uneven, with some newsletters making little to no money, and others making (potentially) hundreds of thousands of dollars per year.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!P3-t!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9cb07a25-f12d-4e35-b919-7f1409c1c5c0_1202x698.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!P3-t!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9cb07a25-f12d-4e35-b919-7f1409c1c5c0_1202x698.png 424w, https://substackcdn.com/image/fetch/$s_!P3-t!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9cb07a25-f12d-4e35-b919-7f1409c1c5c0_1202x698.png 848w, https://substackcdn.com/image/fetch/$s_!P3-t!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9cb07a25-f12d-4e35-b919-7f1409c1c5c0_1202x698.png 1272w, https://substackcdn.com/image/fetch/$s_!P3-t!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9cb07a25-f12d-4e35-b919-7f1409c1c5c0_1202x698.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!P3-t!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9cb07a25-f12d-4e35-b919-7f1409c1c5c0_1202x698.png" width="606" height="351.9034941763727" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9cb07a25-f12d-4e35-b919-7f1409c1c5c0_1202x698.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:698,&quot;width&quot;:1202,&quot;resizeWidth&quot;:606,&quot;bytes&quot;:50582,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!P3-t!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9cb07a25-f12d-4e35-b919-7f1409c1c5c0_1202x698.png 424w, https://substackcdn.com/image/fetch/$s_!P3-t!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9cb07a25-f12d-4e35-b919-7f1409c1c5c0_1202x698.png 848w, https://substackcdn.com/image/fetch/$s_!P3-t!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9cb07a25-f12d-4e35-b919-7f1409c1c5c0_1202x698.png 1272w, https://substackcdn.com/image/fetch/$s_!P3-t!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9cb07a25-f12d-4e35-b919-7f1409c1c5c0_1202x698.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>One particular publication that espoused extreme antisemitism, at one point mocking a fictional Jewish person as &#8220;Jewberg,&#8221; and that defended contemporary white nationalism, had at least 1000 paying subscribers. This newsletter might be generating between $87,000 and $1,000,000 per year. (The reality is likely somewhere in the middle &#8212; million-dollar newsletters are rare, but not impossible.)</p><p>Another newsletter in our sample displayed Nazi iconography, identified itself as antisemitic, and claimed that &#8220;most blacks [sic] don&#8217;t have any brain matter&#8221; in &#8220;the part of the brain that deals with logic, sound decision-making and higher-thinking in general&#8221;. This newsletter generated between $8,200 and $343,000 annually.</p><h4><em><strong>The Network Problem</strong></em></h4><p>In addition to the monetization of hate, Substack&#8217;s feature of recommending similar publications to readers provides hate-promoting publications with a valuable tool to reach new audiences. In our research, we used this feature to discover neo-Nazi and white supremacist&#8217;s newsletters that were not previously known to us. While this aided our research, it demonstrates that Substack users viewing the same publications are likely to be recommended similar materials.</p><h3><strong>The Profit Motive</strong></h3><p>In addition to the ethical controversies about the monetization of hate content, this analysis raises the issue of Substack&#8217;s culpability in allowing for an easy method for promoting hate content. According to analysis conducted using the search engine optimization tool <a href="applewebdata://D72779E0-EE8C-4EFB-9BCB-0E42FDF93A11/moz.com">Moz</a>, Substack articles are relatively <a href="https://www.group.app/blog/substack-vs-medium-which-one-is-better/">highly prioritized in search engine results</a>, such as Google searches. While the search engine optimization of hate-promoting platforms varies, many independent blog sites and traditional forums frequented by hate movements are known to be low-priority in search engines. For example, the prominent neo-Nazi forum <a href="https://www.splcenter.org/fighting-hate/extremist-files/group/stormfront">Stormfront</a> has a domain authority of 65, which is significantly lower than Substack&#8217;s score of 92 (both measured at the time of publication).</p><p>Even in today&#8217;s social media environment, where hate speech is rampant on many major platforms, the extreme nature of many of the newsletters leads us to conclude that Substack is a uniquely large platform for financing hate content.</p><p>While many prominent neo-Nazis subscribe to Twitter/X Blue (for example former National Youth Front leader <a href="https://www.splcenter.org/hatewatch/2015/02/06/meet-national-youth-front-new-racists-campus">Angelo John &#8220;Lucas&#8221; Gage</a> has amassed over <a href="https://twitter.com/Shayan86/status/1737865195173622125">220,000 Twitter/X followers</a>) &#8212; and as such are eligible for monetary gain for their Tweets promoting National Socialism and hate speech, the nature of how Twitter/X finances popular accounts means that <a href="https://www.theverge.com/2023/7/13/23794189/twitter-blue-monetization-ad-revenue-sharing-payments">payments</a> for content can be inconsistent.</p><p>Conversely, financing through Substack is direct. As such, it can provide much more reliable, long-term funding than larger social media outlets with comparably <a href="https://www.vice.com/en/article/n7zm9q/elon-musk-twitter-nazis-white-supremacy">relaxed content moderation</a> policies.</p><p>These funds are important for these extremist content creators. Many of them have been publicly outed as neo-Nazis, white supremacists, and promoters of hate. These creators might find it difficult to obtain gainful employment because of the content that they produce, making them reliant on their Substack revenues. In other cases, they might be driven to produce more hateful content in order to drive revenue. </p><div class="pullquote"><p>In our analysis, some of the newsletters with the most Nazi attributes were also the most highly monetized newsletters, which raises a concerning correlation between extremism and money.</p></div><p>Finally, it&#8217;s worth noting Substack&#8217;s profit motive. While our estimates of revenue generation for these newsletters is crude, there is no doubt that Substack is profiting from this content. We estimate that Substack is generating somewhere between $24,000 and $724,000 in annual revenue from these newsletters &#8212; and our sample of Nazi newsletters is far from an exhaustive look at hate on the Substack platform.</p><h3><strong>The policy solution</strong></h3><p>Giving money to Nazis is not good. Without delving into the free speech issue (itself worthy of many newsletter articles), here at Insight, we tend to think that people should not be allowed to make money from hate. We agree with some of the proposals put forward in this thoughtful newsletter from <a href="https://www.platformer.news/p/why-substack-is-at-a-crossroads">Platformer</a> that these newsletters should, at the very least, be demonetized. They should also not appear in recommendations or be promoted by Substack in any way.</p><p>If Substack is unwilling to take action, then it might be worthwhile for concerned newsletter readers to engage with Stripe, the payment processor, as some of these newsletters might breach their terms of service. </p><p>There are other options as well, some of which involve state intervention and new rules and regulations around monetization of hate content, which will be time-consuming and cumbersome to develop and implement. (And in the case of Substack, a US-domiciled company, will likely run into constitutional challenges.)</p><p>There&#8217;s also likely a role here for GIFCT and Tech Against Terrorism to engage with Substack and help the company develop better policies around the monetization of hate.</p><p>The easiest and best way forward is the one that, to date, Substack has refused to do: demonetize Nazis. </p><p>For now, Insight Monitor will remain on the Substack platform. We agree with Platformer that no platform is perfect. However, this is exactly the type of issue that will be weighed in our consideration of the future of this newsletter. Feel free to let us know what you think in the comments. </p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/p/nazis-on-substack?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/p/nazis-on-substack?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p></p><p><em>Want to learn more about how violent events are financed? Check out our analysis of the financing of January 6th: </em></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://insightthreatintelligence.thinkific.com/courses/financing-january-6th" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!3Ofi!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa50a9995-1335-442c-988f-310f2929ea30.heic 424w, https://substackcdn.com/image/fetch/$s_!3Ofi!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa50a9995-1335-442c-988f-310f2929ea30.heic 848w, https://substackcdn.com/image/fetch/$s_!3Ofi!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa50a9995-1335-442c-988f-310f2929ea30.heic 1272w, https://substackcdn.com/image/fetch/$s_!3Ofi!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa50a9995-1335-442c-988f-310f2929ea30.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!3Ofi!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa50a9995-1335-442c-988f-310f2929ea30.heic" width="1456" height="675" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a50a9995-1335-442c-988f-310f2929ea30.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:675,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:159293,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:&quot;https://insightthreatintelligence.thinkific.com/courses/financing-january-6th&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!3Ofi!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa50a9995-1335-442c-988f-310f2929ea30.heic 424w, https://substackcdn.com/image/fetch/$s_!3Ofi!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa50a9995-1335-442c-988f-310f2929ea30.heic 848w, https://substackcdn.com/image/fetch/$s_!3Ofi!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa50a9995-1335-442c-988f-310f2929ea30.heic 1272w, https://substackcdn.com/image/fetch/$s_!3Ofi!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa50a9995-1335-442c-988f-310f2929ea30.heic 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>&#169; 2023 Insight Threat Intelligence Ltd. All Rights Reserved.<br><br>This newsletter and its contents are protected by Canadian copyright law. Except as otherwise provided for under Canadian copyright law, this newsletter and its contents may not be copied, published, distributed, downloaded or otherwise stored in a retrieval system, transmitted or converted, in any form or by any means, electronic or otherwise, without the prior written permission of the copyright owner.</em></p><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-1" href="#footnote-anchor-1" class="footnote-number" contenteditable="false" target="_self">1</a><div class="footnote-content"><p>For the purposes of this attribute, prominent National Socialists including Joseph Goebbels, Alfred Rosenberg, Heinrich Himmler, and Francis Parker Yockey were considered &#8220;historic&#8221; Nazis. Additionally, promotion of historic Nazi sympathizer Charles Lindbergh was included when the publication specifically defended Lindbergh&#8217;s affection for Nazi Germany.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-2" href="#footnote-anchor-2" class="footnote-number" contenteditable="false" target="_self">2</a><div class="footnote-content"><p>Though some publications did not promote White Nationalism by name, publications that called for the relocation or genocide of specific groups of people to achieve a goal of a Caucasian, &#8220;white,&#8221; or &#8220;Aryan&#8221; ethnostate were labeled as publications promoting White Nationalism.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-3" href="#footnote-anchor-3" class="footnote-number" contenteditable="false" target="_self">3</a><div class="footnote-content"><p>This is almost certainly a small sample of the Nazi / hate problem on Substack. We are but one small team doing an initial scoping exercise. There is certainly room for more robust and detailed analysis.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-4" href="#footnote-anchor-4" class="footnote-number" contenteditable="false" target="_self">4</a><div class="footnote-content"><p>This is not perfect: it is possible for creators to gift paid subscriptions, meaning that they generate no revenue from those &#8220;paid&#8221; subscribers.</p><p></p></div></div>]]></content:encoded></item><item><title><![CDATA[Terrorist financing ring disrupted in the US & Canada]]></title><description><![CDATA[Crypto, PayPal, Western Union....and more]]></description><link>https://newsletter.insightthreatintel.com/p/terrorist-financing-ring-disrupted</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/terrorist-financing-ring-disrupted</guid><dc:creator><![CDATA[Jessica Davis, PhD]]></dc:creator><pubDate>Tue, 12 Sep 2023 13:01:00 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Y_9u!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7e4425c7-8e9f-4cc4-8893-08c3674057b0_2309x1299.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<pre><code>Updated 10 September 2023</code></pre><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/subscribe?"><span>Subscribe now</span></a></p><p>In December 2022, <a href="https://www.justice.gov/usao-edny/pr/four-defendants-charged-conspiring-provide-cryptocurrency-isis">four individuals</a> were charged in the United States with conspiring the provide material support to ISIL. These charges are notable because of the extensive use of cryptocurrency and social media / messaging platforms to coordinate the funding of terrorism. They&#8217;re also notable because they include a woman in the group, as well as a Canadian citizen. </p><div class="embedded-post-wrap" data-attrs="{&quot;id&quot;:44782392,&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/p/women-in-terrorism-financing&quot;,&quot;publication_id&quot;:329102,&quot;publication_name&quot;:&quot;Insight Intelligence&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F09b767fc-6dde-4336-90bb-7806e0822653_900x900.png&quot;,&quot;title&quot;:&quot;Women Financing Terrorism&quot;,&quot;truncated_body_text&quot;:&quot;Welcome to the Insight Intelligence newsletter! And a special welcome to the new subscribers this week &#8211; I love seeing our community of interest grow. This week&#8217;s analysis is all about the role of women as financial facilitators and terrorist financiers. If you find this analysis interesting, please share it with a friend!&quot;,&quot;date&quot;:&quot;2021-12-02T14:00:35.732Z&quot;,&quot;like_count&quot;:0,&quot;comment_count&quot;:0,&quot;bylines&quot;:[{&quot;id&quot;:33479672,&quot;name&quot;:&quot;Jessica Davis&quot;,&quot;previous_name&quot;:null,&quot;photo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/11fcd0f3-76fc-47c8-a059-847d6401465f_863x613.jpeg&quot;,&quot;bio&quot;:&quot;Jessica Davis is President of Insight Threat Intelligence and is the author of Women in Modern Terrorism: From Liberations Wars to Global Terrorism and the Islamic State (2017), and Illicit Money: Financing Terrorism in the 21st Century (2021).&quot;,&quot;profile_set_up_at&quot;:&quot;2021-04-18T17:51:34.758Z&quot;,&quot;publicationUsers&quot;:[{&quot;id&quot;:248164,&quot;user_id&quot;:33479672,&quot;publication_id&quot;:329102,&quot;role&quot;:&quot;admin&quot;,&quot;public&quot;:true,&quot;is_primary&quot;:false,&quot;publication&quot;:{&quot;id&quot;:329102,&quot;name&quot;:&quot;Insight Intelligence&quot;,&quot;subdomain&quot;:&quot;insightintel&quot;,&quot;custom_domain&quot;:&quot;newsletter.insightthreatintel.com&quot;,&quot;custom_domain_optional&quot;:false,&quot;hero_text&quot;:&quot;Global security, terrorism, espionage and illicit financing -- news and analysis you won't find anywhere else! &quot;,&quot;logo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/09b767fc-6dde-4336-90bb-7806e0822653_900x900.png&quot;,&quot;author_id&quot;:33479672,&quot;theme_var_background_pop&quot;:&quot;#FF5CD7&quot;,&quot;created_at&quot;:&quot;2021-04-05T14:36:24.139Z&quot;,&quot;rss_website_url&quot;:null,&quot;email_from_name&quot;:&quot;Insight Threat Intelligence&quot;,&quot;copyright&quot;:&quot;Jessica Davis&quot;,&quot;founding_plan_name&quot;:&quot;Founding Member&quot;,&quot;community_enabled&quot;:true,&quot;invite_only&quot;:false,&quot;payments_state&quot;:&quot;enabled&quot;}}],&quot;twitter_screen_name&quot;:&quot;JessMarinDavis&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100,&quot;inviteAccepted&quot;:true}],&quot;utm_campaign&quot;:null,&quot;belowTheFold&quot;:false,&quot;type&quot;:&quot;newsletter&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="EmbeddedPostToDOM"><a class="embedded-post" native="true" href="https://newsletter.insightthreatintel.com/p/women-in-terrorism-financing?utm_source=substack&amp;utm_campaign=post_embed&amp;utm_medium=web"><div class="embedded-post-header"><img class="embedded-post-publication-logo" src="https://substackcdn.com/image/fetch/$s_!Ar7z!,w_56,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F09b767fc-6dde-4336-90bb-7806e0822653_900x900.png"><span class="embedded-post-publication-name">Insight Intelligence</span></div><div class="embedded-post-title-wrapper"><div class="embedded-post-title">Women Financing Terrorism</div></div><div class="embedded-post-body">Welcome to the Insight Intelligence newsletter! And a special welcome to the new subscribers this week &#8211; I love seeing our community of interest grow. This week&#8217;s analysis is all about the role of women as financial facilitators and terrorist financiers. If you find this analysis interesting, please share it with a friend&#8230;</div><div class="embedded-post-cta-wrapper"><span class="embedded-post-cta">Read more</span></div><div class="embedded-post-meta">4 years ago &#183; Jessica Davis</div></a></div>
      <p>
          <a href="https://newsletter.insightthreatintel.com/p/terrorist-financing-ring-disrupted">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[LafargeHolcim and Terrorist Financing]]></title><description><![CDATA[ISIL]]></description><link>https://newsletter.insightthreatintel.com/p/lafargeholcim-and-terrorist-financing</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/lafargeholcim-and-terrorist-financing</guid><dc:creator><![CDATA[Jessica Davis, PhD]]></dc:creator><pubDate>Thu, 31 Aug 2023 14:43:00 GMT</pubDate><enclosure url="https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/0563ac93-b4a1-447b-8f7b-6c7012821712_5184x3456.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Here at Insight Intelligence, we periodically update older articles with new information (as it becomes available). The case of LafargeHolcim and its payments to ISIL was overdue for an update. Read on to learn more about how the company is being held accountable for its terrorist financing activities.
</em></p><pre><code><em>
This analysis was last updated on 29 August 2023</em></code></pre><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/subscribe?"><span>Subscribe now</span></a></p><p>In 2021 and 2022, the cement giant&nbsp;<a href="https://www.ft.com/content/7ef75794-1283-11e8-940e-08320fc2a277">LafargeHolcim was investigated</a>&nbsp;and prosecuted for terrorist financing. Lafarge's&nbsp;<a href="https://www.theguardian.com/world/2018/jun/28/lafarge-charged-with-complicity-in-syria-crimes-against-humanity?CMP=share_btn_tw">subsidiary in Syria</a>&nbsp;is suspected of paying roughly&nbsp;<a href="https://www.nytimes.com/2018/03/10/business/isis-is-coming-how-a-french-company-pushed-the-limits-in-war-torn-syria.html?emc=edit_th_180311&amp;nl=todaysheadlines&amp;nlid=672021970311">$5 million</a>&nbsp;&nbsp;in protection money to armed groups in Syria in order to keep the&nbsp;<a href="https://www.bbc.com/news/business-44643703">Jalabiya cement plant&nbsp;</a>open, with an estimated $500,000 paid to the Islamic State (ISIL). The company also&nbsp;<a href="http://www.lemonde.fr/international/article/2018/05/07/lafarge-en-syrie-des-documents-secret-defense-peuvent-etre-declasses_5295762_3210.html">bought raw materials</a>&nbsp;from individuals connected to ISIL or from individuals in ISIL-controlled territory, potentially further supporting the group in this manner. Lafarge also reportedly paid&nbsp;&#8364;220,000 to release staff kidnapped in 2012. Keeping the cement operation open allowed Lafarge to obtain approximately <a href="https://www.justice.gov/opa/pr/lafarge-pleads-guilty-conspiring-provide-material-support-foreign-terrorist-organizations">$70.3 million in revenue</a>, and Lafarge also expected ISIL to take action <a href="https://www.justice.gov/opa/pr/lafarge-pleads-guilty-conspiring-provide-material-support-foreign-terrorist-organizations">against its competitors</a> by stopping the sale of competing imported Turkish cement or by imposing taxes on competing cement. </p>
      <p>
          <a href="https://newsletter.insightthreatintel.com/p/lafargeholcim-and-terrorist-financing">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Terrorist Financing in the Maldives: Crypto Front and Centre]]></title><description><![CDATA[Yes, you read that right. Terrorist financing in the Maldives. Using cryptocurrency. For those who aren&#8217;t steeped in terrorist financing, this will come as a surprise. But the Maldives have had a growing terrorism problem for a number of years, so it&#8217;s no real surprise that a hub of financing activity has grown there. (The networks identified have also been involved in propaganda production and dissemination). Let&#8217;s dig in and see what&#8217;s happening in this island paradise when it comes to terrorist financing.]]></description><link>https://newsletter.insightthreatintel.com/p/terrorist-financing-in-the-maldives</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/terrorist-financing-in-the-maldives</guid><dc:creator><![CDATA[Jessica Davis, PhD]]></dc:creator><pubDate>Thu, 10 Aug 2023 13:01:23 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F09b767fc-6dde-4336-90bb-7806e0822653_900x900.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Yes, you read that right. Terrorist financing in the Maldives. Using cryptocurrency. For those who aren&#8217;t steeped in terrorist financing, this will come as a surprise. But the Maldives have had a growing terrorism problem for a number of years, so it&#8217;s no real surprise that a hub of financing activity has grown there. (The networks identified have also been involved in propaganda production and dissemination). Let&#8217;s dig in and see what&#8217;s happening in this island paradise when it comes to terrorist financing.</em> </p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/subscribe?"><span>Subscribe now</span></a></p><p>Last week, the United States <a href="https://home.treasury.gov/news/press-releases/jy1659">imposed sanctions on 20 people</a> for financially supporting ISIL and Al Qaeda in the Maldives. These designations also include people accused of supporting ISIL-Khorosan Province. </p><p>The designation focused on the Addu City cell in the Maldives that has attempted to conduct terrorist attacks since 2018 and the ISILS-affiliated criminal gang Kuda Henveyru, which has attempted to fundraise for Maldivian ISIL foreign terrorist fighters in Syria. The designation includes a number of individuals and their companies, many of which can be found in the Maldives&#8217; rather excellent <a href="https://business.egov.mv/BusinessRegistry">corporate registry</a>. A number of these individuals and companies have other associated individuals and corporations not included in the sanctions that can be explored through the business registry. </p><p>Some of the funds raised were sent to ISIL in Indonesia, as well as Turkey. </p><p>One of the individuals sanctioned, Ali Shafiu, controls a crypto address on the <a href="https://blog.chainalysis.com/reports/ofac-sanctions-al-qaeda-isis-ali-shafiu/">TRON blockchain</a>. Here&#8217;s an interesting excerpt from a Chainanalysis report:</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://blog.chainalysis.com/reports/ofac-sanctions-al-qaeda-isis-ali-shafiu/" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!wr0d!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F44532d30-d18d-44eb-a228-d6d76af8ed35_808x188.png 424w, https://substackcdn.com/image/fetch/$s_!wr0d!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F44532d30-d18d-44eb-a228-d6d76af8ed35_808x188.png 848w, https://substackcdn.com/image/fetch/$s_!wr0d!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F44532d30-d18d-44eb-a228-d6d76af8ed35_808x188.png 1272w, https://substackcdn.com/image/fetch/$s_!wr0d!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F44532d30-d18d-44eb-a228-d6d76af8ed35_808x188.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!wr0d!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F44532d30-d18d-44eb-a228-d6d76af8ed35_808x188.png" width="808" height="188" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/44532d30-d18d-44eb-a228-d6d76af8ed35_808x188.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:188,&quot;width&quot;:808,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:42297,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://blog.chainalysis.com/reports/ofac-sanctions-al-qaeda-isis-ali-shafiu/&quot;,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!wr0d!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F44532d30-d18d-44eb-a228-d6d76af8ed35_808x188.png 424w, https://substackcdn.com/image/fetch/$s_!wr0d!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F44532d30-d18d-44eb-a228-d6d76af8ed35_808x188.png 848w, https://substackcdn.com/image/fetch/$s_!wr0d!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F44532d30-d18d-44eb-a228-d6d76af8ed35_808x188.png 1272w, https://substackcdn.com/image/fetch/$s_!wr0d!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F44532d30-d18d-44eb-a228-d6d76af8ed35_808x188.png 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a></figure></div><p><a href="https://www.trmlabs.com/post/ofac-sanctions-crypto-address-associated-with-isis">TRM Labs found</a> &nbsp;on-chain transactions from Shafiu&#8217;s address to addresses that they have associated with the media units of ISIL-KP and ISIL in Pakistan.</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;7e0f4eed-131a-4a95-8c0f-1097678de704&quot;,&quot;caption&quot;:&quot;Welcome to a regular edition of Insight Intelligence. Finally, after a two-week interruption brought to us by the Ottawa occupation, we are back to our regularly-scheduled programming. Today we&#8217;re looking at the intersection of hawalas and cryptocurrency, so prepare to get very nerdy. As always, a warm welcome to our new subscribers (we are approaching &#8230;&quot;,&quot;cta&quot;:null,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Cryptocurrency Meets Hawala&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:33479672,&quot;name&quot;:&quot;Jessica Davis&quot;,&quot;bio&quot;:&quot;Jessica Davis is President of Insight Threat Intelligence and is the author of Women in Modern Terrorism: From Liberations Wars to Global Terrorism and the Islamic State (2017), and Illicit Money: Financing Terrorism in the 21st Century (2021).&quot;,&quot;photo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/11fcd0f3-76fc-47c8-a059-847d6401465f_863x613.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2022-02-10T14:00:43.141Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Ffc62e0df-ebfa-4b6a-9814-f7278c479500_2121x1414.jpeg&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/cryptocurrency-meets-hawala&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:48434356,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:1,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Insight Intelligence&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F09b767fc-6dde-4336-90bb-7806e0822653_900x900.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>The question many of you might have is why crypto? The Maldives has a rather bustling cryptocurrency sector. Some resorts there even accept cryptocurrency as <a href="https://www.connectingtravel.com/news/soneva-moves-into-cryptocurrency-space">payment</a>. For terrorists operating in small countries, cryptocurrency might hold even more appeal than other methods of moving money, since they can avoid interacting with compliance staff or having their transactions caught up in geographic targeting and monitoring. And as the United Nations reported back in July, <a href="https://undocs.org/Home/Mobile?FinalSymbol=S%2F2023%2F549&amp;Language=E&amp;DeviceType=Desktop&amp;LangRequested=False">ISIL is increasingly using cryptocurrency</a> for international funds transfers.</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;f3a3a948-2d6f-4ea3-a4b3-04451337ec46&quot;,&quot;caption&quot;:&quot;ISIL-KP continues to conduct attacks in Afghanistan and more recently Pakistan, challenging the Taliban&#8217;s consolidation of control. This article provides an update and overview of the group&#8217;s financing activities following several notable arrests and the reported death of ISIL-KP&#8217;s leader. This analysis was originally written for my book, Illicit Money: Financing Terrorism in the 21st Century,&quot;,&quot;cta&quot;:null,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;ISIL-KP Financing&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:33479672,&quot;name&quot;:&quot;Jessica Davis&quot;,&quot;bio&quot;:&quot;Jessica Davis is President of Insight Threat Intelligence and is the author of Women in Modern Terrorism: From Liberations Wars to Global Terrorism and the Islamic State (2017), and Illicit Money: Financing Terrorism in the 21st Century (2021).&quot;,&quot;photo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/11fcd0f3-76fc-47c8-a059-847d6401465f_863x613.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2023-08-08T12:56:00.000Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F81ff34ff-a182-4ebf-a74c-3a30ce462d5b_6016x4000.jpeg&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/isil-kp-financing&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:40518920,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:2,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Insight Intelligence&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F09b767fc-6dde-4336-90bb-7806e0822653_900x900.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p><em>Did you find this article interesting? Share it with a friend and help us grow our community! </em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/p/terrorist-financing-in-the-maldives?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/p/terrorist-financing-in-the-maldives?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://www.insightthreatintel.com/terrorist-financing-analysis-course" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!1vsP!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7164ec7d-f0cc-46f8-839e-907548e944bf_1080x1080.png 424w, https://substackcdn.com/image/fetch/$s_!1vsP!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7164ec7d-f0cc-46f8-839e-907548e944bf_1080x1080.png 848w, https://substackcdn.com/image/fetch/$s_!1vsP!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7164ec7d-f0cc-46f8-839e-907548e944bf_1080x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!1vsP!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7164ec7d-f0cc-46f8-839e-907548e944bf_1080x1080.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!1vsP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7164ec7d-f0cc-46f8-839e-907548e944bf_1080x1080.png" width="498" height="498" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7164ec7d-f0cc-46f8-839e-907548e944bf_1080x1080.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1080,&quot;width&quot;:1080,&quot;resizeWidth&quot;:498,&quot;bytes&quot;:1119976,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://www.insightthreatintel.com/terrorist-financing-analysis-course&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!1vsP!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7164ec7d-f0cc-46f8-839e-907548e944bf_1080x1080.png 424w, https://substackcdn.com/image/fetch/$s_!1vsP!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7164ec7d-f0cc-46f8-839e-907548e944bf_1080x1080.png 848w, https://substackcdn.com/image/fetch/$s_!1vsP!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7164ec7d-f0cc-46f8-839e-907548e944bf_1080x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!1vsP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7164ec7d-f0cc-46f8-839e-907548e944bf_1080x1080.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div>]]></content:encoded></item><item><title><![CDATA[Financing Terrorism Through Prepaid Cards]]></title><description><![CDATA[Welcome back to another week of Insight Intelligence!]]></description><link>https://newsletter.insightthreatintel.com/p/financing-terrorism-through-prepaid</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/financing-terrorism-through-prepaid</guid><dc:creator><![CDATA[Jessica Davis, PhD]]></dc:creator><pubDate>Wed, 09 Aug 2023 13:01:11 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!RUge!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3639d1b1-0215-40b3-872c-cd48c866bfa9_1500x1000.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Welcome back to another week of Insight Intelligence! This week we&#8217;re looking at how terrorist financing happens through prepaid cards. We will likely also have a terrorist financing news roundup later in the week, and we might also have a new terrorist attack profile to share. We&#8217;ll continue our enhanced production schedule for the foreseeable future &#8212;we quite enjoy publishing two or more articles per week, and we hope you enjoy reading them! </em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/subscribe?"><span>Subscribe now</span></a></p><p>In June, a man in the United States was<a href="https://www.bostonherald.com/2023/06/08/wakefield-man-charged-in-alleged-terrorist-financing-scheme/"> arrested and charged</a> with concealing terrorist financing. Mateo Ventura allegedly purchased a number of gift cards and provided the access codes to his contact (whom he believed to be a member of ISIS, but was actually an online covert employee - OCE). The contact told Ventura that he sold the gift cards online on a dark web marketplace, and sent the funds to ISIS.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a> </p><p>While a rarer method of terrorist financing, this particular case is interesting in its use of dark web marketplaces, and is worth understanding more detail, particularly in terms of identifying this type of activity in subjects of interest or investigation. </p>
      <p>
          <a href="https://newsletter.insightthreatintel.com/p/financing-terrorism-through-prepaid">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[ISIL's East Africa Finance Network and the Death of al-Sudani]]></title><description><![CDATA[What does removing a financial leader achieve in counter-terrorism?]]></description><link>https://newsletter.insightthreatintel.com/p/isils-east-africa-finance-network</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/isils-east-africa-finance-network</guid><dc:creator><![CDATA[Jessica Davis, PhD]]></dc:creator><pubDate>Thu, 15 Jun 2023 13:00:16 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!xsqb!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F47701eac-0236-4d03-a297-0ac4933e8742_5184x3456.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Well, we&#8217;re nearly there. Almost 4,000 subscribers to Insight Intelligence! I&#8217;m a bit surprised that there are 4,000 of you out there that care about illicit financing&#8230;but it&#8217;s a pleasant surprise! Thank you for being part of this community. And please continue to share this newsletter with your friends and colleagues &#8212; it&#8217;s a huge help, and really rewa&#8230;</em></p>
      <p>
          <a href="https://newsletter.insightthreatintel.com/p/isils-east-africa-finance-network">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[ISIL's Al-Rawi Network]]></title><description><![CDATA[The future of ISIL's finance network?]]></description><link>https://newsletter.insightthreatintel.com/p/isils-al-rawi-network</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/isils-al-rawi-network</guid><dc:creator><![CDATA[Jessica Davis, PhD]]></dc:creator><pubDate>Thu, 27 Apr 2023 13:01:00 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!qR4_!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6719acfd-a7f8-4ffa-9db4-2c3c1cba9aa0_1500x600.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>ISIL provinces in Africa have received start-up funding from ISIL core, and in some cases, might be receiving ongoing funding. The networks supplying these funds remain unidentified, but one possible candidate is well-known to intelligence agencies: the al-Rawi network. The network is made up of financial facilitators located across <a href="https://home.treasury.gov/news/press-releases/jy1181">Europe, Asia, and Af&#8230;</a></em></p>
      <p>
          <a href="https://newsletter.insightthreatintel.com/p/isils-al-rawi-network">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[ISIS "Barber Funder"]]></title><description><![CDATA[A warm welcome to our new Insight Intelligence subscribers!]]></description><link>https://newsletter.insightthreatintel.com/p/isis-barber-funder</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/isis-barber-funder</guid><dc:creator><![CDATA[Jessica Davis, PhD]]></dc:creator><pubDate>Thu, 16 Feb 2023 14:01:37 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!4sqm!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feae84232-13dd-42d7-8612-504cd7853c53_4928x3264.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p></p><p><em>A warm welcome to our new Insight Intelligence subscribers! Last week we crossed the 3k subscriber threshold, and I have to say, I&#8217;m rather pleased that so many people find this newsletter interesting and useful. Thank you to all who have joined us, and who share this newsletter! This week, we&#8217;re taking a look at a terrorist financing case from the UK. We normally focus on terrorist attack financing, or terrorist organization financing. This case is a bit different, because it involves a terrorist financier: someone whose purpose and goal is to provide funds for terrorist activity. Let&#8217;s dig in.</em> </p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/subscribe?"><span>Subscribe now</span></a></p><p>At the beginning of January, a Barber shop owner in the UK (Tarek Namouz) was jailed for using COVID grants to fund terrorism. He received a 12 year sentence for <a href="https://www.bbc.com/news/uk-england-london-64177264">sending funds</a> he received from COVID relief to Islamic State terrorists in Syria. At the time of the offence, he was on licence for raping a woman. The funds were sent through a <a href="https://www.theguardian.com/uk-news/2023/jan/05/uk-barber-jailed-sending-islamic-state-thousand-of-pounds-covid-loans-tarek-namouz-funding-terrorism-london">currency exchange in West London</a>. The investigation found transfers totalling <a href="https://www.leicestermercury.co.uk/news/uk-world-news/barber-shop-owner-used-covid-7859619">&#163;11,284.69</a>, but he claimed to have sent &#163;25,000 to an Islamic State member to purchase sniper rifles and prepare for an attack against the Syrian government. As part of his defence, he claimed to have sent the funds to help the &#8220;poor and needy&#8221; in Syria. The funds transfers were coordinated through <a href="https://www.theguardian.com/uk-news/2023/jan/05/uk-barber-jailed-sending-islamic-state-thousand-of-pounds-covid-loans-tarek-namouz-funding-terrorism-london">WhatsApp messages</a>. He regularly <a href="https://www.independent.co.uk/news/uk/crime/isis-syria-covid-grant-london-b2241677.html">deleted the messages </a>as part of his operational security. He sent the funds in <a href="https://www.independent.co.uk/news/uk/crime/isis-syria-covid-grant-london-b2241677.html">seven transfers</a> over the course of months, starting with a small transfer of &#163;100, before increasing the transfers to between &#163;1,500 and &#163;2,700 at a time.</p><p>There are a number of things that are interesting in this case that are worth highlighting because they speak to broader trends in terrorist financing and efforts to detect and disrupt it: the currency exchange, the amounts sent, coordinating on WhatsApp, and the &#8216;cover story&#8217;. </p>
      <p>
          <a href="https://newsletter.insightthreatintel.com/p/isis-barber-funder">
              Read more
          </a>
      </p>
   ]]></content:encoded></item></channel></rss>