<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Insight Monitor: Primers]]></title><description><![CDATA[Primers are introductory articles about different topics meant to inform the public and provide a reliable source of information for journalists. Free to read. ]]></description><link>https://newsletter.insightthreatintel.com/s/primers</link><image><url>https://substackcdn.com/image/fetch/$s_!I_1w!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4649d7af-94ce-49ea-8c58-368ec26cd423_900x900.png</url><title>Insight Monitor: Primers</title><link>https://newsletter.insightthreatintel.com/s/primers</link></image><generator>Substack</generator><lastBuildDate>Wed, 08 Apr 2026 14:24:04 GMT</lastBuildDate><atom:link href="https://newsletter.insightthreatintel.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Jessica Davis]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[jmd@insightthreatintel.com]]></webMaster><itunes:owner><itunes:email><![CDATA[jmd@insightthreatintel.com]]></itunes:email><itunes:name><![CDATA[Jessica Davis, PhD]]></itunes:name></itunes:owner><itunes:author><![CDATA[Jessica Davis, PhD]]></itunes:author><googleplay:owner><![CDATA[jmd@insightthreatintel.com]]></googleplay:owner><googleplay:email><![CDATA[jmd@insightthreatintel.com]]></googleplay:email><googleplay:author><![CDATA[Jessica Davis, PhD]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Trends in Terrorist Financing 2020-2025]]></title><description><![CDATA[Introducing the Terrorism Financing Dataset]]></description><link>https://newsletter.insightthreatintel.com/p/trends-in-terrorist-financing-2020</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/trends-in-terrorist-financing-2020</guid><dc:creator><![CDATA[Jessica Davis, PhD]]></dc:creator><pubDate>Tue, 20 Jan 2026 14:03:14 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!i-Sp!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6bac2d4e-8c1e-47ef-9190-9114500a5a1a_881x479.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Hello Insight Monitor subscribers! After six years of building, cleaning, and analyzing, I&#8217;m finally ready to share a new dataset that changes the conversation on terrorist financing. This isn&#8217;t just another trends piece. It&#8217;s evidence-driven, assumption-busting research that brings clarity to what&#8217;s actually happening in terrorist finance today. The goal? Cut through speculation with solid data. Provoke debate. Challenge what we think we know. Check it out, share it widely, and if you haven&#8217;t already&#8212;subscribe to stay ahead of the curve. This is just the beginning.</em></p><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/p/trends-in-terrorist-financing-2020?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thanks for reading Insight Monitor! This post is public so feel free to share it.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/p/trends-in-terrorist-financing-2020?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/p/trends-in-terrorist-financing-2020?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div><h2>Understanding Trends in Terrorist Financing</h2><p>This research is driven by a grievance. It irks me endlessly when trends are presented in academic research or media commentary as &#8220;new&#8221; or &#8220;increasing&#8221; without any evidence to support these assertions.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!i-Sp!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6bac2d4e-8c1e-47ef-9190-9114500a5a1a_881x479.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!i-Sp!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6bac2d4e-8c1e-47ef-9190-9114500a5a1a_881x479.png 424w, https://substackcdn.com/image/fetch/$s_!i-Sp!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6bac2d4e-8c1e-47ef-9190-9114500a5a1a_881x479.png 848w, https://substackcdn.com/image/fetch/$s_!i-Sp!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6bac2d4e-8c1e-47ef-9190-9114500a5a1a_881x479.png 1272w, https://substackcdn.com/image/fetch/$s_!i-Sp!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6bac2d4e-8c1e-47ef-9190-9114500a5a1a_881x479.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!i-Sp!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6bac2d4e-8c1e-47ef-9190-9114500a5a1a_881x479.png" width="881" height="479" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6bac2d4e-8c1e-47ef-9190-9114500a5a1a_881x479.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:479,&quot;width&quot;:881,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:120524,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://newsletter.insightthreatintel.com/i/184698854?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6bac2d4e-8c1e-47ef-9190-9114500a5a1a_881x479.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!i-Sp!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6bac2d4e-8c1e-47ef-9190-9114500a5a1a_881x479.png 424w, https://substackcdn.com/image/fetch/$s_!i-Sp!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6bac2d4e-8c1e-47ef-9190-9114500a5a1a_881x479.png 848w, https://substackcdn.com/image/fetch/$s_!i-Sp!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6bac2d4e-8c1e-47ef-9190-9114500a5a1a_881x479.png 1272w, https://substackcdn.com/image/fetch/$s_!i-Sp!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6bac2d4e-8c1e-47ef-9190-9114500a5a1a_881x479.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>So I decided to put my money where my mouth is and create the evidence I would need to make statements like that. Eight years ago, I started collecting &#8220;cases&#8221; of terrorist financing. These are incidents of individuals or groups engaging in terrorist financing activity from around the world. Readers of the <a href="https://newsletter.insightthreatintel.com/p/global-terrorism-financing-report-57c">Global Terrorism Financing Report </a>will find this framing familiar: we use this case approach to populate that report.</p><p>In our data, a case of terrorist financing is any reported incident of terrorist activity financing &#8211; that is, any financial activity that was used to support terrorist activity. This activity is further broken down into six mechanisms: how terrorists raise, use, move, store, manage, and obscure the source, destination, and use of those funds. Again, this will feel familiar to many readers, because it&#8217;s the typology I developed in <em><a href="https://www.rienner.com/title/Illicit_Money_Financing_Terrorism_in_the_Twenty_First_Century">Illicit Money</a></em>. We further capture information on the methods used within each of these mechanisms, from things like cash couriers to hawalas to cryptocurrency and much more.</p><p>Our definition of terrorism is equally important to understand. We use a definition I developed for both <em>Women in Modern Terrorism</em> and <em>Illicit Money</em>, which draws heavily on the Canadian Criminal Code definition of terrorism. For us, it&#8217;s less about the ideology or group and more about the activity. In short, we&#8217;re looking for cases of violence (planned or disrupted) with a religious, ideological, or political motivation, intended to influence or intimidate a population (this can be as few as one person, such as a politician, or as many as an entire country).</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/p/trends-in-terrorist-financing-2020?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/p/trends-in-terrorist-financing-2020?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><h4><strong>Terrorist Financing Analysis</strong></h4><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://insightthreatintelligence.thinkific.com/bundles/tf-analysis" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!f7rH!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 424w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 848w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 1272w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!f7rH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png" width="1066" height="507" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:507,&quot;width&quot;:1066,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:698946,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://insightthreatintelligence.thinkific.com/bundles/tf-analysis&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!f7rH!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 424w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 848w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 1272w, https://substackcdn.com/image/fetch/$s_!f7rH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d650d25-9901-4ad9-bfe8-fb35eddbaeee_1066x507.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>Our terrorist financing analysis course caters to researchers, intelligence, law enforcement, and compliance professionals, helping them learn about terrorist financing and analyze suspicious patterns to disrupt terrorist activities more effectively. <a href="https://insightthreatintelligence.thinkific.com/bundles/tf-analysis">Sign up </a>today to grow your counter-terrorism expertise.</em> </p><h2>Data Collection</h2><p>We find these cases in open sources: in things like media reports, when our friends at CourtWatch report on indictments, from government reports, etc. We don&#8217;t use covert methods to collect this data, but we will include information released publicly that might have used covert methods.</p><p>We use a robust method to validate the data. First, a researcher finds all the relevant cases and writes them up for the Global Terrorism Financing Report. I then review the draft report and make any required deletions (for things that don&#8217;t fit our criteria). A second analyst then inputs these cases into the database, where I review them again. Finally, I do a tertiary review when I pull the data and conduct analysis.</p><p>Ultimately, this has yielded over 21,000 data points across 1150 records and 19 fields. These fields include coding for group, country, a text description of the case, the methods and mechanisms used, and of course sources. While there is data from 2018 onward, we only use the data from 2020 and onward because it&#8217;s more reliable. (It&#8217;s when I hired staff).</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!CI35!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F316d2bb6-e488-415a-aa41-9ef974a65c9b_896x469.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!CI35!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F316d2bb6-e488-415a-aa41-9ef974a65c9b_896x469.png 424w, https://substackcdn.com/image/fetch/$s_!CI35!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F316d2bb6-e488-415a-aa41-9ef974a65c9b_896x469.png 848w, https://substackcdn.com/image/fetch/$s_!CI35!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F316d2bb6-e488-415a-aa41-9ef974a65c9b_896x469.png 1272w, https://substackcdn.com/image/fetch/$s_!CI35!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F316d2bb6-e488-415a-aa41-9ef974a65c9b_896x469.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!CI35!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F316d2bb6-e488-415a-aa41-9ef974a65c9b_896x469.png" width="896" height="469" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/316d2bb6-e488-415a-aa41-9ef974a65c9b_896x469.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:469,&quot;width&quot;:896,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:68046,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://newsletter.insightthreatintel.com/i/184698854?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F316d2bb6-e488-415a-aa41-9ef974a65c9b_896x469.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!CI35!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F316d2bb6-e488-415a-aa41-9ef974a65c9b_896x469.png 424w, https://substackcdn.com/image/fetch/$s_!CI35!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F316d2bb6-e488-415a-aa41-9ef974a65c9b_896x469.png 848w, https://substackcdn.com/image/fetch/$s_!CI35!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F316d2bb6-e488-415a-aa41-9ef974a65c9b_896x469.png 1272w, https://substackcdn.com/image/fetch/$s_!CI35!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F316d2bb6-e488-415a-aa41-9ef974a65c9b_896x469.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2>What We&#8217;ve Found</h2><p>On average, we capture about 190 cases per year, although 2021 and 2022 had the lowest amounts of data. This might be due to a lack of terrorist financing, a lack of disruption/detection of terrorist financing, or other factors. In my experience, data blips like this generally result from a combination of factors.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!NotN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e9032b9-d146-4135-993b-88f228f14e2a_419x375.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!NotN!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e9032b9-d146-4135-993b-88f228f14e2a_419x375.png 424w, https://substackcdn.com/image/fetch/$s_!NotN!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e9032b9-d146-4135-993b-88f228f14e2a_419x375.png 848w, https://substackcdn.com/image/fetch/$s_!NotN!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e9032b9-d146-4135-993b-88f228f14e2a_419x375.png 1272w, https://substackcdn.com/image/fetch/$s_!NotN!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e9032b9-d146-4135-993b-88f228f14e2a_419x375.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!NotN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e9032b9-d146-4135-993b-88f228f14e2a_419x375.png" width="419" height="375" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4e9032b9-d146-4135-993b-88f228f14e2a_419x375.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:375,&quot;width&quot;:419,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:24911,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://newsletter.insightthreatintel.com/i/184698854?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e9032b9-d146-4135-993b-88f228f14e2a_419x375.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!NotN!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e9032b9-d146-4135-993b-88f228f14e2a_419x375.png 424w, https://substackcdn.com/image/fetch/$s_!NotN!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e9032b9-d146-4135-993b-88f228f14e2a_419x375.png 848w, https://substackcdn.com/image/fetch/$s_!NotN!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e9032b9-d146-4135-993b-88f228f14e2a_419x375.png 1272w, https://substackcdn.com/image/fetch/$s_!NotN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e9032b9-d146-4135-993b-88f228f14e2a_419x375.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Each year, we usually see the most reporting on how terrorists raise money. However, we also see lots of information on how they&#8217;re hiding that money. Less often reported is information on how terrorists are managing and storing funds. These mechanisms are likely harder to detect and less sexy to report on. However, they&#8217;re still critical for understanding (and more importantly, disrupting!) terrorist financing.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!iEOy!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F43d4d597-5b4c-43b6-b5f2-03cb32aca429_806x478.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!iEOy!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F43d4d597-5b4c-43b6-b5f2-03cb32aca429_806x478.png 424w, https://substackcdn.com/image/fetch/$s_!iEOy!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F43d4d597-5b4c-43b6-b5f2-03cb32aca429_806x478.png 848w, https://substackcdn.com/image/fetch/$s_!iEOy!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F43d4d597-5b4c-43b6-b5f2-03cb32aca429_806x478.png 1272w, https://substackcdn.com/image/fetch/$s_!iEOy!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F43d4d597-5b4c-43b6-b5f2-03cb32aca429_806x478.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!iEOy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F43d4d597-5b4c-43b6-b5f2-03cb32aca429_806x478.png" width="806" height="478" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/43d4d597-5b4c-43b6-b5f2-03cb32aca429_806x478.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:478,&quot;width&quot;:806,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:52007,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://newsletter.insightthreatintel.com/i/184698854?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F43d4d597-5b4c-43b6-b5f2-03cb32aca429_806x478.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!iEOy!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F43d4d597-5b4c-43b6-b5f2-03cb32aca429_806x478.png 424w, https://substackcdn.com/image/fetch/$s_!iEOy!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F43d4d597-5b4c-43b6-b5f2-03cb32aca429_806x478.png 848w, https://substackcdn.com/image/fetch/$s_!iEOy!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F43d4d597-5b4c-43b6-b5f2-03cb32aca429_806x478.png 1272w, https://substackcdn.com/image/fetch/$s_!iEOy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F43d4d597-5b4c-43b6-b5f2-03cb32aca429_806x478.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3>The Limitations</h3><p>There are plenty of limitations with this dataset (like all datasets). Firstly, as mentioned previously, there is no covert collection. This means we are certainly missing some trends and methods in the world of terrorist financing. Secondly, there are limitations to the data we can capture. Some of this is due to language, but it&#8217;s mostly due to time limitations. As this project is entirely funded by my company, Insight Threat Intelligence, I can&#8217;t assign unlimited resources to data collection. </p><div class="pullquote"><p>Reader support for Insight Monitor goes directly to supporting this project, so thank you to all our paid subscribers who have made this possible!</p></div><p>Thirdly, the data is limited to observable and reported data. We don&#8217;t have visibility (through this data collection method, anyway) of harder-to-identify terrorist financing methods. For instance, I think that the use of hawala is likely underreported in this data. Other methods and mechanisms are also likely underreported. Fourthly, there is likely a lag in the data in terms of when we see trends emerge. Disruptions, arrests, prosections, and even investigative journalism all takes time. This time creates a lag between when a terrorist financing method or mechanism occurs, and when it gets reported publicly. So while this is the only dataset like this in the world, it does have a time lag. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!73jl!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F64f383c8-716c-47bf-9d9c-23183c2374b9_861x495.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!73jl!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F64f383c8-716c-47bf-9d9c-23183c2374b9_861x495.png 424w, https://substackcdn.com/image/fetch/$s_!73jl!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F64f383c8-716c-47bf-9d9c-23183c2374b9_861x495.png 848w, https://substackcdn.com/image/fetch/$s_!73jl!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F64f383c8-716c-47bf-9d9c-23183c2374b9_861x495.png 1272w, https://substackcdn.com/image/fetch/$s_!73jl!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F64f383c8-716c-47bf-9d9c-23183c2374b9_861x495.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!73jl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F64f383c8-716c-47bf-9d9c-23183c2374b9_861x495.png" width="861" height="495" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/64f383c8-716c-47bf-9d9c-23183c2374b9_861x495.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:495,&quot;width&quot;:861,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:95736,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://newsletter.insightthreatintel.com/i/184698854?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F64f383c8-716c-47bf-9d9c-23183c2374b9_861x495.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!73jl!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F64f383c8-716c-47bf-9d9c-23183c2374b9_861x495.png 424w, https://substackcdn.com/image/fetch/$s_!73jl!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F64f383c8-716c-47bf-9d9c-23183c2374b9_861x495.png 848w, https://substackcdn.com/image/fetch/$s_!73jl!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F64f383c8-716c-47bf-9d9c-23183c2374b9_861x495.png 1272w, https://substackcdn.com/image/fetch/$s_!73jl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F64f383c8-716c-47bf-9d9c-23183c2374b9_861x495.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>And finally, definitions matter. While I have confidence in the definitions that we use, a broader definition of terrorism would capture more information. A narrow definition might yield more nuanced results. Part of the way we correct for this is through the use of filters and the ability to exclude entire classes of cases, like the recently listed criminal organizations. (While I think these do meet the legal threshold for listing as terrorist entities in Canada, I fundamentally think they operate differently from terrorist groups; as such, they should be analyzed separately.)</p><p>These limitations might seem daunting, but for me, it&#8217;s really about properly contextualizing our findings. We keep these limitations in mind as we write, so we never get out ahead of our skiis in our analysis. </p><h3>Next Steps</h3><p>If you stuck with me this long, that means you&#8217;re very likely a huge data nerd. Thank you! This series is right up your alley. There&#8217;s lots more to report on, so stay tuned for the next edition of the series on Trends in Terrorist Financing. You will see separate newsletters outlining how terrorists raise, use, move, store, manage, and obscure their funds, as well as a summary newsletter on key findings. We will likely publish this series once a month, so you&#8217;re in for a bit of a slow burn. Also, this series will only be available to paying subscribers, since they&#8217;re the ones supporting this database development. So if you want to read it, you know what to do! </p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Insight Monitor is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/p/trends-in-terrorist-financing-2020?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/p/trends-in-terrorist-financing-2020?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p></p><p><em>&#169; 2026 Insight Threat Intelligence Ltd. All Rights Reserved.<br><br>This newsletter and its contents are protected by Canadian copyright law. Except as otherwise provided for under Canadian copyright law, this newsletter and its contents may not be copied, published, distributed, downloaded or otherwise stored in a retrieval system, transmitted or converted, in any form or by any means, electronic or otherwise, without the prior written permission of the copyright owner.</em></p>]]></content:encoded></item><item><title><![CDATA[The Algeria Principles: A New Global Framework for Countering Terrorist Financing in Emerging Technologies]]></title><description><![CDATA[An overview of the principles, how they can be used, and why they matter.]]></description><link>https://newsletter.insightthreatintel.com/p/the-algeria-principles-a-new-global</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/the-algeria-principles-a-new-global</guid><dc:creator><![CDATA[Jessica Davis, PhD]]></dc:creator><pubDate>Tue, 27 May 2025 13:02:48 GMT</pubDate><enclosure url="https://images.unsplash.com/photo-1599813108789-59a0c2e59b6c?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw3fHx1bml0ZWQlMjBuYXRpb25zfGVufDB8fHx8MTc0ODAwMTkwNHww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Earlier this year, the United Nations Security Council took a modest but meaningful step to address a growing issue in terrorist financing: the use of financial technologies. The <strong><a href="https://docs.un.org/S/2025/22">Algeria Principles</a></strong><a href="https://docs.un.org/S/2025/22"> (</a><em><a href="https://docs.un.org/S/2025/22">S/2025/22</a></em>) are a set of non-binding recommendations designed to assist states in preventing, detecting, and disrupting the use of new and emerging technologies for terrorist financing. While they may seem like just another set of UN guidelines, they&#8217;re worth paying attention to, especially if you&#8217;re in compliance, financial regulation, fintech, or national security.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Insight Monitor is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://images.unsplash.com/photo-1599813108789-59a0c2e59b6c?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw3fHx1bml0ZWQlMjBuYXRpb25zfGVufDB8fHx8MTc0ODAwMTkwNHww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://images.unsplash.com/photo-1599813108789-59a0c2e59b6c?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw3fHx1bml0ZWQlMjBuYXRpb25zfGVufDB8fHx8MTc0ODAwMTkwNHww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1599813108789-59a0c2e59b6c?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw3fHx1bml0ZWQlMjBuYXRpb25zfGVufDB8fHx8MTc0ODAwMTkwNHww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1599813108789-59a0c2e59b6c?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw3fHx1bml0ZWQlMjBuYXRpb25zfGVufDB8fHx8MTc0ODAwMTkwNHww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1599813108789-59a0c2e59b6c?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw3fHx1bml0ZWQlMjBuYXRpb25zfGVufDB8fHx8MTc0ODAwMTkwNHww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1456w" sizes="100vw"><img src="https://images.unsplash.com/photo-1599813108789-59a0c2e59b6c?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw3fHx1bml0ZWQlMjBuYXRpb25zfGVufDB8fHx8MTc0ODAwMTkwNHww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" width="318" height="239.37158852344297" data-attrs="{&quot;src&quot;:&quot;https://images.unsplash.com/photo-1599813108789-59a0c2e59b6c?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw3fHx1bml0ZWQlMjBuYXRpb25zfGVufDB8fHx8MTc0ODAwMTkwNHww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:3227,&quot;width&quot;:4287,&quot;resizeWidth&quot;:318,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;city buildings near body of water during daytime&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="city buildings near body of water during daytime" title="city buildings near body of water during daytime" srcset="https://images.unsplash.com/photo-1599813108789-59a0c2e59b6c?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw3fHx1bml0ZWQlMjBuYXRpb25zfGVufDB8fHx8MTc0ODAwMTkwNHww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1599813108789-59a0c2e59b6c?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw3fHx1bml0ZWQlMjBuYXRpb25zfGVufDB8fHx8MTc0ODAwMTkwNHww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1599813108789-59a0c2e59b6c?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw3fHx1bml0ZWQlMjBuYXRpb25zfGVufDB8fHx8MTc0ODAwMTkwNHww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1599813108789-59a0c2e59b6c?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw3fHx1bml0ZWQlMjBuYXRpb25zfGVufDB8fHx8MTc0ODAwMTkwNHww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a><figcaption class="image-caption">Photo by <a href="true">the blowup</a> on <a href="https://unsplash.com">Unsplash</a></figcaption></figure></div><h3>Why Now?</h3><p>Terrorist financing is no longer limited to bank accounts and cash smuggling. As I&#8217;ve written elsewhere, cryptocurrency has become a major tool for terrorist financiers, especially when other channels are too costly or risky. Beyond crypto, we&#8217;re seeing terrorist organizations explore everything from crowdfunding platforms to gaming gift cards as ways to raise and move money.</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;75eb0e4c-4b8e-41fe-98e8-7f17ff476e78&quot;,&quot;caption&quot;:&quot;Hello, Insight Monitor subscribers! I&#8217;m excited to share a new product with you today &#8212; our analysis of terrorist financing trends. I often get asked, &#8220;What&#8217;s new?&#8221; in terrorist financing? I struggle to answer because I don&#8217;t want to refer to headlines. I prefer my answers to be data-driven. If you feel the same way, today, you&#8217;re in luck! We crunched the numbers, and we can tell you ~exactly~ what&#8217;s new in terrorist financing. Have a read and let me know what you think in the comments or through email. We love hearing from you, and would be delighted to answer any questions you have about this. Thanks for caring about illicit finance and global security,&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Terrorist financing enters its cryptocurrency era&quot;,&quot;publishedBylines&quot;:[],&quot;post_date&quot;:&quot;2024-08-22T13:01:06.554Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0603deea-04b9-484c-97df-69d59bb49961_720x543.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/terrorist-financing-enters-its-cryptocurrency&quot;,&quot;section_name&quot;:&quot;Primers&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:147980151,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:3,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee6d6275-21f4-4f93-beb3-0ccf9c112d29_900x900.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;82e76228-771e-46e2-a04e-1a72de458a0c&quot;,&quot;caption&quot;:&quot;After our brief hiatus last week, Insight Intelligence is back. We have an ambitious program scheduled for the fall, including more on the groups involved in the January 6th attack, other groups operating around the world, technologies involved in terrorist financing, and much more! Today I&#8217;m sharing an article that Elena and I wrote for&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Cutting Off Financing for the Next Capitol Insurrection&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:33479672,&quot;name&quot;:&quot;Jessica Davis&quot;,&quot;bio&quot;:&quot;Dr. Jessica Davis is President of Insight Threat Intelligence and is the author of Women in Modern Terrorism: From Liberations Wars to Global Terrorism and the Islamic State (2017), and Illicit Money: Financing Terrorism in the 21st Century (2021).&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e312ae7c-114b-4e4f-9ce1-8bf50ddb7a27_2344x2049.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100},{&quot;id&quot;:85208154,&quot;name&quot;:&quot;Elena Martynova&quot;,&quot;bio&quot;:&quot;Research Analyst &quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e88b531d-b106-4c92-8177-62a8a864bde5_2316x2316.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2022-09-06T13:00:47.927Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F2320ed67-631d-4a7d-8152-a5cb775399fe_1892x1390.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/cutting-off-financing-for-the-next&quot;,&quot;section_name&quot;:&quot;Commentary&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:71953556,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:3,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee6d6275-21f4-4f93-beb3-0ccf9c112d29_900x900.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;1cd20e93-ef81-426b-8ae5-6b9601c7d820&quot;,&quot;caption&quot;:&quot;Big news out of Canada yesterday. Khalilullah Yousuf pled guilty to terrorism charges. He was charged with financing (83.03), participation (83.13) and facilitation (83.19). According to Stewart Bell&#8217;s reporting, the prosecution sought (and received) a 12-year sentence. The activities occurred between March 2021 and July 2022. This case exemplifies many&#8230;&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Canada Gets a Third* Terrorism Financing Conviction&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:33479672,&quot;name&quot;:&quot;Jessica Davis&quot;,&quot;bio&quot;:&quot;Dr. Jessica Davis is President of Insight Threat Intelligence and is the author of Women in Modern Terrorism: From Liberations Wars to Global Terrorism and the Islamic State (2017), and Illicit Money: Financing Terrorism in the 21st Century (2021).&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e312ae7c-114b-4e4f-9ce1-8bf50ddb7a27_2344x2049.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2025-05-13T13:01:12.906Z&quot;,&quot;cover_image&quot;:&quot;https://images.unsplash.com/photo-1640574232355-08659783b9fb?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwyOXx8dGVycm9yaXNtJTIwbW9uZXl8ZW58MHx8fHwxNzQ3MDgzODUwfDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/canada-gets-a-third-terrorism-financing&quot;,&quot;section_name&quot;:&quot;News&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:163426045,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:8,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee6d6275-21f4-4f93-beb3-0ccf9c112d29_900x900.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>At the same time, regulation of financial technologies varies dramatically from one country to the next. Some states take a hands-off approach in a bid to attract innovation and investment. But this variation creates a familiar problem: <strong><a href="https://newsletter.insightthreatintel.com/p/lessons-learned-from-listing-violent?utm_source=publication-search">jurisdictional arbitrage</a></strong>. Terrorists and their support networks exploit gaps between jurisdictions. When one state lags behind in regulation or enforcement, it becomes a soft spot in the global financial system.</p><p>The Algeria Principles are a response to this growing threat.</p><h3>What Do the Principles Actually Do?</h3><p>To be blunt: not much&#8212;yet. They are non-binding, so they don&#8217;t impose any legal obligations. But their real power lies in the groundwork they lay for future action.</p><ul><li><p><strong>Foundation for future UNSC resolutions</strong>: The Principles can serve as a policy base for more robust measures down the line.</p></li><li><p><strong>Support for research and policy work</strong>: Researchers and NGOs can point to the Principles as UN-endorsed recognition of a specific threat vector.</p></li><li><p><strong>Anchor for engagement</strong>: States can reference the Principles in developing <strong>public-private partnerships</strong> (PPPs), especially when reaching out to fintechs and tech companies for collaboration on terrorist financing risks.</p></li></ul><p>In short, they create a shared reference point in an area that desperately needs one.</p><div><hr></div><h4><strong>Financial Intelligence Fundamentals</strong></h4><p><em>Do you want to learn more about financial intelligence and how to use it in research, investigations, and analysis? Our financial intelligence fundamentals course is for you! This course is perfect for people new to financial intelligence and seasoned professionals. <a href="https://insightthreatintelligence.thinkific.com/courses/introFININT">Enroll today</a></em></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://insightthreatintelligence.thinkific.com/courses/introFININT" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!8tvZ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png 424w, https://substackcdn.com/image/fetch/$s_!8tvZ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png 848w, https://substackcdn.com/image/fetch/$s_!8tvZ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png 1272w, https://substackcdn.com/image/fetch/$s_!8tvZ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!8tvZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png" width="905" height="496" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:496,&quot;width&quot;:905,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:731766,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://insightthreatintelligence.thinkific.com/courses/introFININT&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!8tvZ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png 424w, https://substackcdn.com/image/fetch/$s_!8tvZ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png 848w, https://substackcdn.com/image/fetch/$s_!8tvZ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png 1272w, https://substackcdn.com/image/fetch/$s_!8tvZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><p>The Algeria Principles will impact several different sectors implicated in the fight against terrorsit financing: </p><ul><li><p><strong>Regulators</strong>, especially those in financial supervision and sanctions enforcement, will find a roadmap for updating risk assessments and regulatory approaches.</p></li><li><p><strong>Reporting entities</strong>, including traditional financial institutions and virtual asset service providers, should understand how these principles could shape expectations regarding their internal controls.</p></li><li><p><strong>Fintech companies</strong> will better understand why states are increasingly approaching them not just about anti-money laundering (AML) concerns, but specifically about counterterrorist financing (CTF).</p></li></ul><p>That last point is critical. For too long, CTF has been treated as an AML afterthought. The Algeria Principles shift the focus explicitly to terrorist financing, recognizing that it requires distinct tools, partnerships, and understanding.</p><p>There are four key principles, and while they are expanded on at length (often with good and interesting suggestions for engagement and mitigation), they can be boiled down to the following: </p><ul><li><p>Enhance understanding of terrorist financing risks in fintech</p></li><li><p>Develop and implement risk-based, proportionate regulation</p></li><li><p>Detect and disrupt the abuse of new technologies</p></li><li><p>Evaluate the impact of CTF measures on new technologies</p></li></ul><p>Read the full document <a href="https://docs.un.org/S/2025/22">here</a>.</p><h3>Today&#8217;s Principles are Tomorrow&#8217;s Laws</h3><p>The Algeria Principles aren&#8217;t revolutionary, but they are a necessary first step towards more engagement and possibly more regulation. They signal a recognition at the highest levels of international policymaking that terrorist financing has changed&#8212;and that our tools, partnerships, and policies need to change with it. If you work in fintech, regulation, compliance, or financial intelligence, these principles should be on your radar. </p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/p/the-algeria-principles-a-new-global?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/p/the-algeria-principles-a-new-global?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p></p><p><em>&#169; 2025 Insight Threat Intelligence Ltd. All Rights Reserved.<br><br>This newsletter and its contents are protected by Canadian copyright law. Except as otherwise provided for under Canadian copyright law, this newsletter and its contents may not be copied, published, distributed, downloaded or otherwise stored in a retrieval system, transmitted or converted, in any form or by any means, electronic or otherwise, without the prior written permission of the copyright owner.</em></p>]]></content:encoded></item><item><title><![CDATA[They’re Washing Billions. You’re Paying the Price.]]></title><description><![CDATA[Money laundering makes us less safe and poorer. There's a simple solution.]]></description><link>https://newsletter.insightthreatintel.com/p/the-real-harms-of-money-laundering</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/the-real-harms-of-money-laundering</guid><dc:creator><![CDATA[Jessica Davis, PhD]]></dc:creator><pubDate>Tue, 01 Apr 2025 13:03:31 GMT</pubDate><enclosure url="https://images.unsplash.com/photo-1648477328950-c84fbf092b10?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxfHxibG9vZCUyMG1vbmV5fGVufDB8fHx8MTc0MzQ1NTkxOHww&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>I&#8217;m often asked why money laundering matters, and when I try to explain, I&#8217;m met with a glassy look. I&#8217;m clearly failing at this. Maybe that&#8217;s because it seems obvious to me: money laundering is bad because it incentivizes crime, which harms people. And yet&#8230;.that explanation has failed to capture people's attention (including Canadians). </p><p>Today, I will explain why everyone should care about money laundering: It directly impacts our well-being, both physically and economically. Hopefully, by the end of this article, you&#8217;ll be raging mad that anti-money laundering isn&#8217;t at the top of the political agenda in your country. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://images.unsplash.com/photo-1648477328950-c84fbf092b10?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxfHxibG9vZCUyMG1vbmV5fGVufDB8fHx8MTc0MzQ1NTkxOHww&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://images.unsplash.com/photo-1648477328950-c84fbf092b10?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxfHxibG9vZCUyMG1vbmV5fGVufDB8fHx8MTc0MzQ1NTkxOHww&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1648477328950-c84fbf092b10?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxfHxibG9vZCUyMG1vbmV5fGVufDB8fHx8MTc0MzQ1NTkxOHww&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1648477328950-c84fbf092b10?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxfHxibG9vZCUyMG1vbmV5fGVufDB8fHx8MTc0MzQ1NTkxOHww&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1648477328950-c84fbf092b10?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxfHxibG9vZCUyMG1vbmV5fGVufDB8fHx8MTc0MzQ1NTkxOHww&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1456w" sizes="100vw"><img src="https://images.unsplash.com/photo-1648477328950-c84fbf092b10?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxfHxibG9vZCUyMG1vbmV5fGVufDB8fHx8MTc0MzQ1NTkxOHww&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080" width="367" height="244.66666666666666" data-attrs="{&quot;src&quot;:&quot;https://images.unsplash.com/photo-1648477328950-c84fbf092b10?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxfHxibG9vZCUyMG1vbmV5fGVufDB8fHx8MTc0MzQ1NTkxOHww&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:3456,&quot;width&quot;:5184,&quot;resizeWidth&quot;:367,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;a pile of money with bullet shells on top of it&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="a pile of money with bullet shells on top of it" title="a pile of money with bullet shells on top of it" srcset="https://images.unsplash.com/photo-1648477328950-c84fbf092b10?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxfHxibG9vZCUyMG1vbmV5fGVufDB8fHx8MTc0MzQ1NTkxOHww&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1648477328950-c84fbf092b10?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxfHxibG9vZCUyMG1vbmV5fGVufDB8fHx8MTc0MzQ1NTkxOHww&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1648477328950-c84fbf092b10?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxfHxibG9vZCUyMG1vbmV5fGVufDB8fHx8MTc0MzQ1NTkxOHww&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1648477328950-c84fbf092b10?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxfHxibG9vZCUyMG1vbmV5fGVufDB8fHx8MTc0MzQ1NTkxOHww&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo by <a>Marek Studzinski</a> on <a href="https://unsplash.com">Unsplash</a></figcaption></figure></div><h2>Enabling Crime</h2><p>The first issue is a fairly obvious one, although the direct impacts on personal well-being are one step removed from traditional crime, making it harder to understand. A lot of crime (maybe most?)  is motivated by profit. Drug traffickers sell drugs to make money, thieves and fraudsters steal money and goods for profit (or to re-sell for profit), and human traffickers buy and sell humans to make money. It&#8217;s easy to understand the negative effects these crimes have on people: anyone who has ever been a victim of fraud or theft or had someone they know be victimized in this way understands the sense of insecurity even a minor incident can create (let alone the violence that often accompanies these activities). We all want less crime.</p><p>It&#8217;s harder to see the direct impacts of &#8220;white-collar&#8221; crime. Tax evasion, embezzlement, and insider trading are all forms of theft from governments, businesses, and individuals that ultimately make us all poorer and a select few much, much richer. Tax evasion is theft from the government (and, by extension, its citizens). Embezzlement is theft from a company or organization (and its shareholders, employees, or investors), and insider trading is theft from investors (by using confidential information to make better deals or advantageous trade to the detriment of people who don&#8217;t have that information). </p><p>Think about the case of <a href="https://archives.fbi.gov/archives/news/stories/2006/december/enron_121306">Enron</a>. Back in 2001, the company declared bankruptcy after officials embezzled tens of millions of dollars, causing the company to collapse. This destroyed the pensions and savings of thousands of people, including pensioners and shareholders of the company. Image a similar situation with your investments: would you be okay with losing $5,000, $10,000 or more to an embezzlement scheme? I know I wouldn&#8217;t. </p><p>Anyone who invests in public markets will recognize the impact this can have: lower profits and unfair wealth distribution. But what about people who don&#8217;t invest in public markets? Are they impacted? They are if they have any pensions or state benefits. For instance, in Canada, every Canadian is a pension holder in the Canada Pension Plan (CPP). The CPP investment board invests the plan's money from employers and employees. So, ultimately, every Canadian is an investor in public markets. So-called &#8220;white collar&#8221; crime affects everyone, but the more money you have in public markets and pensions, the more impacted you are. </p><p>So, we can agree that these crimes are bad, but what about the role of money laundering? Once criminals have gotten money from these activities, regardless of whether it is human trafficking or insider trading, they need to hide the source of funds. This is because if they don&#8217;t, as soon as law enforcement realizes what they are doing, they can freeze and seize those funds. Criminals have to hide the source of funds, making it hard for authorities to determine where the money came from. This is money laundering and is what makes these types of crimes profitable. Without money laundering, it would be easy for law enforcement to remove the profit motive of crimes. Would a drug dealer continue to sell drugs if the police could just come along and take all their money? Would people under-report their income and use elaborate schemes to make it appear like they made less money than they did if law enforcement could identify the discrepancy and seize unreported income? Probably not. </p><blockquote><p><a href="https://www.nytimes.com/2025/03/23/world/asia/cambodia-money-laundering-huione.html">&#8220;&#8230;money launderers are as vital to criminals as getaway drivers are to bank robbers. Without them, there would be no loot.&#8221;</a></p></blockquote><p>You&#8217;re probably thinking: yeah, maybe these activities have a direct impact on my bottom line, but that impact is spread out across the entire population, so I&#8217;m only harmed a little bit. And maybe that&#8217;s true. And if you&#8217;re willing to let criminals make money off you because tackling money laundering is hard, I guess that&#8217;s your choice. But what happens if a country&#8217;s money laundering problem becomes so big that it creates other harms, like distorting markets and undermining legitimate business? </p><h2>Market Distortion &amp; Manipulation</h2><p>When criminals have a large amount of cash to launder, they often make decisions that are not entirely profit-motivated. These decisions are mediated by the difficulty they face in laundering their money. They might pay above-market prices for goods when they obtain other benefits, like a seller willing not to ask difficult questions about the source of funds for things like cars, jewellery, or even real estate. </p><p>For instance, if several money launderers or criminals operate in a region (say, entirely at random, British Columbia), they might find real estate attractive as an investment and method to launder funds. When a lot of dirty money is invested in a regional real estate market, it can <a href="https://www2.gov.bc.ca/assets/gov/housing-and-tenancy/real-estate-in-bc/combatting-money-laundering-report.pdf">create a wedge</a> between local incomes and local real estate prices. The criminals pay more than the fair market value for a property because characteristics of the market (maybe banks, mortgage brokers, and real estate agents who aren&#8217;t looking to confirm the source of funds) create benefits for them beyond simply owning the property: they get the property, but they also get an asset they can use to explain their wealth. </p><p>In a few years (or months), the criminals might sell the property, then their source of funds becomes &#8220;real estate investing&#8221;. </p><p>In some cases, they might sell the property to other criminals for an above-market value (again, because of the benefits I described above), making a profit and enabling other criminals to enter this market. To some extent, this hypothetical scenario creates a pyramid or ponzi scheme: sustaining the inflated market requires an ongoing supply of new investors paying these high prices. Unfortunately, demand for houses is inelastic in many markets, meaning these prices stay high. Any regular person trying to enter the market now has to pay these new, inflated prices and hope there isn&#8217;t a market correction. The money launderers can take the hit from a correction, but can retail investors or families? Probably not. </p><h3>Unfair Competition </h3><p>Money launderers don&#8217;t just invest in real estate; they seek any asset that can hold (or appreciate) in value. They&#8217;re also looking for investments that can be used to explain large quantities of cash. For instance, coffee shops, bars, restaurants, and laundromats are all valuable places to park illicit cash. Not only can you get access to a real, tangible asset (which might be helpful as collateral for loans for other legitimate business ventures), but you get access to a business that generates a large volume of cash. Simply inflating sales can be enough to hide an influx of illicit cash: instead of reporting the sale of $2,000 worth of coffee one morning, money launderers might report the sale of $3,000 worth of coffee, stuffing $1,000 worth of cash into the register and calling it &#8220;sales.&#8221; For one day, this might not be that helpful. But if you did the same thing every day across multiple locations, you might have a successful method of laundering money.  For scams and other types of crime, <a href="https://www.nytimes.com/2025/03/23/world/asia/cambodia-money-laundering-huione.html">the internet and cryptocurrency have supercharged money laundering activity</a>.</p><p>And what about the people on the same street who are operating coffee shops that aren&#8217;t money laundering fronts? They might have a hard time competing with the lower prices of these establishments because to do the kind of volume that the fronts want to do, they will probably have slightly lower-than-market-rate prices. The fronts aren&#8217;t worried about making rent; they&#8217;re worried about creating a plausible front to move cash. Anyone who has ever operated a business can understand how this activity can create unfair competition. </p><h3>Undermining Trust in Financial Institutions</h3><p>We&#8217;ve probably all heard the story of TD Bank. In the US, the bank was fined US$3 billion after pleading guilty to money laundering. <a href="https://www.msn.com/en-ca/money/topstories/td-bank-fined-3b-us-after-pleading-guilty-in-historic-us-money-laundering-case/ar-AA1s33n7">At least one of the schemes involved 5 employees laundering drug proceeds. </a> TD Bank has basically become a punch line for jokes about money laundering in Canada and the US. While the direct effects of this are difficult to measure (I have yet to hear of many Canadians moving their money out of TD because of a lack of trust), if the problem becomes more systemic, citizens will stop holding cash and assets in their domestic financial institutions. This, in turn, reduces those institutions&#8217; ability to issue mortgages and other forms of credit. </p><h3>Economic Distortion </h3><p>Money laundering distorts economies by injecting large volumes of illicit funds into legitimate financial systems, often fueling artificial growth. As these illicit investments inflate economic indicators, there is reduced political and institutional incentive to address the underlying criminal activity. (For instance, this might be the case in some countries&#8217; financial and real estate sectors.) However, this false growth crowds out legitimate enterprises, distorts market competition, and undermines long-term economic stability. Over time, <a href="https://www.researchgate.net/profile/Melissa-Siegel/publication/46667096_The_Amounts_and_Effects_of_Money_Laundering/links/5524f6f20cf2caf11bfcebd8/The-Amounts-and-Effects-of-Money-Laundering.pdf">such distortion attracts further illicit activity</a>, entrenching criminal networks and increasing the likelihood of violence as these groups seek to protect their interests and expand their influence. The result is a warped economy where crime thrives, accountability weakens, and legitimate development is compromised.</p><h3>Reputational Damage Turns Concrete</h3><p>Some of you might still be thinking, &#8220;So what&#8221;? If there&#8217;s money to be made, it can&#8217;t be all bad, right? Well, you&#8217;d be right until you&#8217;re wrong. See, there&#8217;s this little thing called the Financial Action Task Force and international sanctions. States might apply sanctions to countries with serious criminal and illicit finance problems. For instance, the US designates some countries as jurisdictions of primary money laundering concern and, in exceptional cases, can prohibit US financial institutions from transacting <a href="https://www.fincen.gov/sites/default/files/shared/2016-27049.pdf">with the jurisdictio</a>n. Being cut off from the US financial system seriously affects business and individual investors. And the Financial Action Task Force can place countries on its grey or black list. While this is not a direct sanction, in practical terms, being placed on the grey list reduces foreign direct investment and <a href="https://icct.nl/app/uploads/2021/01/Handbook-ch-14-Davis-FINAL.pdf">increases friction for individuals doing business internationally by reducing correspondent banking relationships and transaction speed</a>. When countries are placed on the blacklist, they can effectively lose access to entire markets like the European Union and North America. </p><h3>Crime in Canada</h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!-hI4!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa104183a-3a11-4a92-8a92-e258e6cd8742_748x425.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!-hI4!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa104183a-3a11-4a92-8a92-e258e6cd8742_748x425.png 424w, https://substackcdn.com/image/fetch/$s_!-hI4!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa104183a-3a11-4a92-8a92-e258e6cd8742_748x425.png 848w, https://substackcdn.com/image/fetch/$s_!-hI4!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa104183a-3a11-4a92-8a92-e258e6cd8742_748x425.png 1272w, https://substackcdn.com/image/fetch/$s_!-hI4!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa104183a-3a11-4a92-8a92-e258e6cd8742_748x425.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!-hI4!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa104183a-3a11-4a92-8a92-e258e6cd8742_748x425.png" width="748" height="425" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a104183a-3a11-4a92-8a92-e258e6cd8742_748x425.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:425,&quot;width&quot;:748,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:31715,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://newsletter.insightthreatintel.com/i/159747059?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa104183a-3a11-4a92-8a92-e258e6cd8742_748x425.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!-hI4!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa104183a-3a11-4a92-8a92-e258e6cd8742_748x425.png 424w, https://substackcdn.com/image/fetch/$s_!-hI4!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa104183a-3a11-4a92-8a92-e258e6cd8742_748x425.png 848w, https://substackcdn.com/image/fetch/$s_!-hI4!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa104183a-3a11-4a92-8a92-e258e6cd8742_748x425.png 1272w, https://substackcdn.com/image/fetch/$s_!-hI4!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa104183a-3a11-4a92-8a92-e258e6cd8742_748x425.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The unfortunate problem in Canada is that there has been an increase in profit-motivated crime over the last decade. Police-reported cybercrime, as well as police-reported organized crime in Canada, have all increased dramatically.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a> Some of that increase is visible in information released by FINTRAC. Since 2001, FINTRAC has shared over 20,200 disclosures that it found relevant to a money laundering investigation. I&#8217;ve argued here before that FINTRAC disclosures are a very rough indicator of criminal activity in Canada (and we shouldn&#8217;t expect a 1:1 relationship between disclosures and prosecutions). However, some estimates suggest that Canada has a $50 billion money laundering problem (or roughly 2.4% of our GDP). Similarly, <a href="https://newsletter.insightthreatintel.com/p/canadas-44-billion-dirty-money-industry?utm_source=publication-search">FINTRAC indicated</a> that it disclosed $44 billion worth of transactions that it suspects are related to money laundering last year. This, along with other qualitative information about the prevalence and role of professional money launderers, suggests that Canada has a growing, not diminishing, problem with money laundering and crime. And increasingly, that is going to cost you and me money and, ultimately, our safety and security. </p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;8fb5ab9c-94e4-49d3-9ba1-f1627165b19f&quot;,&quot;caption&quot;:&quot;This week, Canada got its fall economic statement, included in which were a number of amendments to our anti-money laundering / counter-terrorist financing regime. Today, in our inaugural &#8220;primer&#8221;, we&#8217;re taking a look at professional money laundering networks. These primers are intended to explain illicit finance and intelligence issues to the broader p&#8230;&quot;,&quot;cta&quot;:null,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;lg&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Professional Money Laundering Networks&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:33479672,&quot;name&quot;:&quot;Jessica Davis&quot;,&quot;bio&quot;:&quot;Dr. Jessica Davis is President of Insight Threat Intelligence and is the author of Women in Modern Terrorism: From Liberations Wars to Global Terrorism and the Islamic State (2017), and Illicit Money: Financing Terrorism in the 21st Century (2021).&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e312ae7c-114b-4e4f-9ce1-8bf50ddb7a27_2344x2049.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2023-11-23T14:00:41.465Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa252d452-2a22-474b-b9d9-24e8a28a1364_876x976.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/professional-money-laundering-networks&quot;,&quot;section_name&quot;:&quot;Primers&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:139055772,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:12,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee6d6275-21f4-4f93-beb3-0ccf9c112d29_900x900.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><h3>What we can do</h3><p>Look, investigating and prosecuting money laundering is hard. I do a lot of work explaining why that is (and why it&#8217;s especially hard in Canada). I don&#8217;t have time to go into all of the reasons right now (but let me know if you want a separate article on that. I might write it.) Let me assure you that policy solutions exist. However, the thing that has to happen to make policies a reality is public pressure. Right now, political parties have almost no incentive to address the situation. They&#8217;re enjoying the benefits of illicit finance being invested in our economy and hoping someone else will be in power when our chickens come home to roost. </p><p>But I care about this, and I think you should too. I don&#8217;t want more crime in Canada, and I certainly don&#8217;t want criminals profiting from me, taking money from my investments or retirement, and generally making me poorer. Imagine if we could tax some or all of that money. I&#8217;d certainly take a 10% cut of $50 billion. It might even help buy us some fighter jets or something.</p><p>The good news is this: if money laundering is a $50 billion problem in Canada, the solution isn&#8217;t investing $50 billion in law enforcement (and related initiatives). I&#8217;m not even sure that it&#8217;s a $1 billion investment. Even a hundred million would probably yield a good return in reducing crime, seized assets, deterring professional money launderers from setting up shop, and maybe slowly unravelling some of the market-distorting effects that might have happened in Canada. </p><p>So when an election candidate comes to your door and says they want to make the housing market more affordable, ask them what they&#8217;re doing about money laundering. And when they say they want to be tough on crime, ask them what they&#8217;re doing about money laundering. And when they say they want to support small businesses and grow Canada&#8217;s economy, ask them what they&#8217;re doing about money laundering. </p><p>Investing in our ability to combat money laundering comes at a price I&#8217;d happily pay. What about you? </p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/p/the-real-harms-of-money-laundering?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/p/the-real-harms-of-money-laundering?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p></p><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-1" href="#footnote-anchor-1" class="footnote-number" contenteditable="false" target="_self">1</a><div class="footnote-content"><p>Statistics Canada reports significant increases in both of these types of crimes between 2016 and 2023. </p></div></div>]]></content:encoded></item><item><title><![CDATA[Tools and Skills for Identifying Canadian Companies]]></title><description><![CDATA[Trump tariffs have us trying to buy more Canadian. But how do we really do that? Corporate ownership is a murky world.....]]></description><link>https://newsletter.insightthreatintel.com/p/tools-and-skills-for-identifying</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/tools-and-skills-for-identifying</guid><dc:creator><![CDATA[Jessica Davis, PhD]]></dc:creator><pubDate>Sun, 09 Feb 2025 23:46:49 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!aZgF!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8f887ba-7d0b-4172-822b-66ec7aa5cde0_2119x1414.heic" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>On Sunday, President Trump announced that he would be imposing a 25% &#8220;duty&#8221; on <a href="https://www.cbc.ca/news/world/trump-tariff-steel-aluminum-canada-1.7454845">Canadian and Mexican steel and aluminum</a>. This was after initially announcing a 30 day reprieve from tariffs.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!aZgF!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8f887ba-7d0b-4172-822b-66ec7aa5cde0_2119x1414.heic" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!aZgF!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8f887ba-7d0b-4172-822b-66ec7aa5cde0_2119x1414.heic 424w, https://substackcdn.com/image/fetch/$s_!aZgF!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8f887ba-7d0b-4172-822b-66ec7aa5cde0_2119x1414.heic 848w, https://substackcdn.com/image/fetch/$s_!aZgF!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8f887ba-7d0b-4172-822b-66ec7aa5cde0_2119x1414.heic 1272w, https://substackcdn.com/image/fetch/$s_!aZgF!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8f887ba-7d0b-4172-822b-66ec7aa5cde0_2119x1414.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!aZgF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8f887ba-7d0b-4172-822b-66ec7aa5cde0_2119x1414.heic" width="478" height="319.1043956043956" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e8f887ba-7d0b-4172-822b-66ec7aa5cde0_2119x1414.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:972,&quot;width&quot;:1456,&quot;resizeWidth&quot;:478,&quot;bytes&quot;:121635,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!aZgF!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8f887ba-7d0b-4172-822b-66ec7aa5cde0_2119x1414.heic 424w, https://substackcdn.com/image/fetch/$s_!aZgF!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8f887ba-7d0b-4172-822b-66ec7aa5cde0_2119x1414.heic 848w, https://substackcdn.com/image/fetch/$s_!aZgF!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8f887ba-7d0b-4172-822b-66ec7aa5cde0_2119x1414.heic 1272w, https://substackcdn.com/image/fetch/$s_!aZgF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8f887ba-7d0b-4172-822b-66ec7aa5cde0_2119x1414.heic 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>In response to all of this tariffs and duty talk, there&#8217;s been a push to &#8220;buy Canadian&#8221;, or at least not American. </p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Insight Monitor is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p><em>(Personally, I prefer an &#8220;avoid American&#8221; policy because buying Canadian is protectionist, which is precisely what Trump&#8217;s tariffs are as well. But honestly, let&#8217;s all just do what we can here. And there will certainly be stuff that we can&#8217;t stop buying, and that&#8217;s okay too. And for my American readers and friends: this is difficult times, and we&#8217;re all just doing the best we can in a tough and unfair circumstance. I look forward to re-engaging with US businesses when all this is over, and I hope that&#8217;s soon.)</em></p><p>I&#8217;ve seen a lot of &#8220;Canadian&#8221; companies touted as good options. For instance, I saw one social media post suggesting people buy from MEC. Yes, MEC used to be a Canadian co-op, but it&#8217;s now Mountain Equipment Company, and is owned by a <a href="https://shop-eat-surf-outdoor.com/news/canadian-retailer-mountain-equipment-company-up-for-sale/602502/#:~:text=Los%20Angeles%2Dbased%20private%20investment,of%20the%20company%20in%202023.">US investment fund</a>. So how do you know what companies are Canadian and which ones aren&#8217;t? Here are a few tools to help you figure it out:</p><ol><li><p><strong>Basic web search</strong>. (Don&#8217;t use Google). Google has been <a href="https://en.wikipedia.org/wiki/Enshittification">enshitified recently</a>, so you won&#8217;t get good results. I suggest using a search engine like Duck Duck Go. You can simply type in the name of the company and ownership and see if there are any news articles about it. If that doesn&#8217;t work, you have to get into more detail.</p></li><li><p><strong>Public or private? </strong>You will need to determine if the company is publicly or privately held. If the company is a publicly traded company, then ownership is disclosed. You can use tools like Yahoo Finance to determine ownership. If it&#8217;s traded on the US or Canadian stock markets, it&#8217;s a public company. For instance, if we use Yahoo Finance to determine Shopify ownership, we learn that almost 72% of shares are held by institutional investors (like banks, pension funds, etc).</p></li><li><p><strong>Corporate records</strong>. Many companies disclose ownership in their corporate records / statements. You can also look in corporate databases. In Canada, companies can be registered either federally or provincially. For instance, Shopify is registered federally. You can access their info using this link: <a href="https://ised-isde.canada.ca/site/corporations-canada/en">https://ised-isde.canada.ca/site/corporations-canada/en</a> and searching for Shopify. There, we learn that their registered address is in Ottawa on O&#8217;Connor Street. You can also order copies of corporate documents, revealing more details. (Some examples that I&#8217;ve done for this newsletter<a href="https://newsletter.insightthreatintel.com/p/convoy-finance-creating-corporate?utm_source=publication-search"> are here</a>.) For a company that isn&#8217;t publicly traded, this is where you can find ownership. For instance, if you search for my company (Insight Threat Intelligence), you&#8217;ll find out that I&#8217;m the sole director of the corporation. In Ontario, you can find similar information, but it&#8217;ll <a href="https://www.appmybizaccount.gov.on.ca/onbis/master/viewInstance/view.pub?id=3abd3bce3cc0ad2a57be00d1528236627718992e93921a88&amp;_timestamp=719715070611825">cost you a bit of money to order the documents</a>. Perhaps a <a href="https://www.reddit.com/r/BuyCanadian/">subreddit</a> would be a great place to start compiling this information so we don&#8217;t all do these searches? The actual searchability of these provincial registries varies by province, so it&#8217;s a bit hit or miss. (This is part of the discussion around <a href="https://newsletter.insightthreatintel.com/p/a-missed-opportunity-canadas-cullen?utm_source=publication-search">beneficial ownership</a> and <a href="https://newsletter.insightthreatintel.com/p/canada-and-iran-sanctions?utm_source=publication-search">illicit finance</a> that I&#8217;ve been banging on about for years!)</p></li><li><p><strong>Identifying the name</strong>. In some cases, the operating name is different from the registered (legal) name of the company. You&#8217;ll often see a company &#8220;operating as&#8221;. You can usually find the legal name of the company in corporate documents. If that&#8217;s not an option, you can also email the company and see if they&#8217;ll tell you. If they&#8217;re super dodgy about it, that&#8217;s interesting&#8230;..and you should message me about that. For instance, I searched for my local coffee shop in the Ontario registry, and found out that the cafe was registered by a numbered federal company, so I searched that company in the federal database and found the ultimate owner, and their home address since that&#8217;s the registered address for the business.) </p></li></ol><p>In some cases, you&#8217;ll have to make your own determination of what constitutes a Canadian company. Is a company owned primarily by Canadians &#8220;Canadian&#8221;? Is it enough for it to be domiciled in Canada? There&#8217;s honestly a bit of a judgement call around some of this stuff, but hopefully these tools can get you started in equipping yourself with knowledge. Don&#8217;t just assume that a company that markets itself as Canadian actually is.</p><p>It&#8217;s also worth considering how your money gets used and what your end goal in a &#8220;Buy Canada&#8221; action is. In the case of Mountain Equipment Company, it almost exclusively (or exclusively?) operates in Canada, employing Canadians, but profits go to a US investment fund. Is that Canadian? Boycotting it would impact Canadians and their jobs, but profits are not kept here in Canada. This is where judgement calls have to be made.</p><p>Anyway, this is quick and dirty. There&#8217;s plenty more to learn about this stuff (I <a href="https://insightthreatintelligence.thinkific.com/collections">teach entire courses</a> on this!) but this should be enough to get folks started to understand what is, and what is not, a Canadian company.</p><p>Happy hunting, and be sure to let me know if you find anything surprising! </p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/p/tools-and-skills-for-identifying?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/p/tools-and-skills-for-identifying?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p></p><div><hr></div><h4><strong>Financial Intelligence Fundamentals</strong></h4><p><em>Do you want to learn more about financial intelligence and how to use it in research, investigations, and analysis? Our financial intelligence fundamentals course is for you! This course is perfect for people new to financial intelligence and seasoned professionals. <a href="https://insightthreatintelligence.thinkific.com/courses/introFININT">Enroll today</a></em></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://insightthreatintelligence.thinkific.com/courses/introFININT" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!8tvZ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png 424w, https://substackcdn.com/image/fetch/$s_!8tvZ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png 848w, https://substackcdn.com/image/fetch/$s_!8tvZ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png 1272w, https://substackcdn.com/image/fetch/$s_!8tvZ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!8tvZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png" width="905" height="496" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:496,&quot;width&quot;:905,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:731766,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://insightthreatintelligence.thinkific.com/courses/introFININT&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!8tvZ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png 424w, https://substackcdn.com/image/fetch/$s_!8tvZ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png 848w, https://substackcdn.com/image/fetch/$s_!8tvZ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png 1272w, https://substackcdn.com/image/fetch/$s_!8tvZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06aca25d-a54b-46e1-8126-b284b1bf2d59_905x496.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><p><em>&#169; 2025 Insight Threat Intelligence Ltd. All Rights Reserved.<br><br>This newsletter and its contents are protected by Canadian copyright law. Except as otherwise provided for under Canadian copyright law, this newsletter and its contents may not be copied, published, distributed, downloaded or otherwise stored in a retrieval system, transmitted or converted, in any form or by any means, electronic or otherwise, without the prior written permission of the copyright owner.</em></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Insight Monitor is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Canada’s $44 Billion Dirty Money Crisis]]></title><description><![CDATA[Reviewing FINTRAC's Annual Report 2023-2024]]></description><link>https://newsletter.insightthreatintel.com/p/canadas-44-billion-dirty-money-industry</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/canadas-44-billion-dirty-money-industry</guid><dc:creator><![CDATA[Jessica Davis, PhD]]></dc:creator><pubDate>Thu, 28 Nov 2024 14:00:50 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/d21454ed-c11b-4d72-92c9-66b676520849_1792x1024.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Hello <strong>Insight Monitor</strong> subscribers! It&#8217;s the most wonderful time of the year again: FINTRAC <a href="https://fintrac-canafe.canada.ca/new-neuf/nr/2024-11-26-eng">annual report season</a>! The Center&#8217;s annual report gives us unique insights into the operations of Canada&#8217;s financial intelligence unit. This year, there are a number of highlights, such as FINTRAC&#8217;s first disclosure to Global Affairs Canada, new data on disclosures and the value of transactions, and, of course, updated data on the reports FINTRAC receives. But one number stands out above the rest&#8212;$44 BILLION in illicit funds. What does this staggering figure mean for Canada? Dive in to explore key highlights, in-depth analysis, and insights into one of the country&#8217;s most secretive agencies. If you find this article thought-provoking, share it with a colleague&#8212;it&#8217;s a conversation worth starting!</em></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Insight Monitor is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h3>FINTRAC, in brief </h3><p>FINTRAC (the Financial Transactions Reports Analysis Centre of Canada) is Canada&#8217;s financial intelligence unit. These units are responsible for receiving and disseminating<a href="https://newsletter.insightthreatintel.com/p/financial-intelligence-a-primer?utm_source=publication-search"> financial intelligence</a> reported to them from banks, money service businesses, cryptocurrency exchanges, real estate brokerages, and more. </p><p>FINTRAC receives a number of &#8220;threshold&#8221; reports (reports sent to the Centre automatically) of transactions of CA$10,000 or more. This includes reports on large cash transactions, electronic funds transfers (wire transfers), and cross-border currency movements. FINTRAC also receives suspicious transaction reports about suspected money laundering, terrorist financing, and, as of this year, sanctions evasion.</p><p>There are different types of financial intelligence units, and Canada&#8217;s FINTRAC is an administrative unit: this means that FINTRAC does not conduct investigations. Instead, FINTRAC provides transactions (and some context and analysis) to law enforcement and security services, contributing financial intelligence to their investigations. It&#8217;s fair to say that FINTRAC has a finger in almost every law enforcement and security service investigation in Canada. </p><p> To learn more about FINTRAC, have a read of the three articles below: </p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;ee3c2bbf-4d20-413e-86f0-3001bffa2efe&quot;,&quot;caption&quot;:&quot;Recently, I read through every FINTRAC report looking for some clues as to the effectiveness of Canada&#8217;s counter-terrorist financing regime. While the jury is still out on that question (which also happens to be the subject of my dissertation), the exercise allowed me to pull out some interesting data and points for comparison with this year&#8217;s report. T&#8230;&quot;,&quot;cta&quot;:null,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Safe Canadians, Secure Economy: FINTRAC&#8217;s 2020-2021 Annual Report&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:33479672,&quot;name&quot;:&quot;Jessica Davis&quot;,&quot;bio&quot;:&quot;Jessica Davis is President of Insight Threat Intelligence and is the author of Women in Modern Terrorism: From Liberations Wars to Global Terrorism and the Islamic State (2017), and Illicit Money: Financing Terrorism in the 21st Century (2021).&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e312ae7c-114b-4e4f-9ce1-8bf50ddb7a27_2344x2049.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2022-03-08T14:00:52.337Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F6a6924b0-1eb4-4962-80a6-6f3fa015eb43_1244x870.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/safe-canadians-secure-economy-fintracs&quot;,&quot;section_name&quot;:&quot;Primers&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:49885818,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:3,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F09b767fc-6dde-4336-90bb-7806e0822653_900x900.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;f7adf955-0494-4be2-8bdf-69a61e12854d&quot;,&quot;caption&quot;:&quot;FINTRAC&#8217;s annual report was released on 1 December 2022, and there are some nice little tidbits in there about the state of financial intelligence in Canada, and the operation of the Centre. Today&#8217;s Insight Intelligence is a short summary of some of the bits I found most interesting (with my usual focus on terrorist financing / threat financing).&quot;,&quot;cta&quot;:null,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Analyzing FINTRAC's annual report: Safe Canadians, Secure Economy&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:33479672,&quot;name&quot;:&quot;Jessica Davis&quot;,&quot;bio&quot;:&quot;Jessica Davis is President of Insight Threat Intelligence and is the author of Women in Modern Terrorism: From Liberations Wars to Global Terrorism and the Islamic State (2017), and Illicit Money: Financing Terrorism in the 21st Century (2021).&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e312ae7c-114b-4e4f-9ce1-8bf50ddb7a27_2344x2049.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2022-12-06T14:01:10.988Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F74b122c8-adb4-45dc-83a5-821f292ed11c_936x610.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/analyzing-fintracs-annual-report&quot;,&quot;section_name&quot;:&quot;Commentary&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:88261454,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:2,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F09b767fc-6dde-4336-90bb-7806e0822653_900x900.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;538dfdab-b9c2-41c2-9532-47ce593496d5&quot;,&quot;caption&quot;:&quot;It&#8217;s the most wonderful time of the year! FINTRAC&#8217;s annual report dropped last week. Okay, I&#8217;ll admit that I&#8217;m probably the only one that excited about this report. But for those of you who don&#8217;t know, this report is one of the most transparent descriptions of the activities of a department or agency in the Canadian security and intelligence service. And while I&#8217;m often annoyed about our lack of measurements in the anti-money laundering and counter-terrorist financing world, this report at least gives us ~some~ insight. Read to find out how Canada is doing in its fight against money laundering, terrorist financing, and other financial crimes!&quot;,&quot;cta&quot;:null,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Is Canada giving up on tackling terrorist financing? &quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:33479672,&quot;name&quot;:&quot;Jessica Davis&quot;,&quot;bio&quot;:&quot;Jessica Davis is President of Insight Threat Intelligence and is the author of Women in Modern Terrorism: From Liberations Wars to Global Terrorism and the Islamic State (2017), and Illicit Money: Financing Terrorism in the 21st Century (2021).&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e312ae7c-114b-4e4f-9ce1-8bf50ddb7a27_2344x2049.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2023-12-07T14:01:27.892Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F075f5c74-65d7-4d44-ae39-60c731086a4a_733x431.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/is-canada-giving-up-on-tackling-terrorist&quot;,&quot;section_name&quot;:&quot;Commentary&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:139466621,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:4,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F09b767fc-6dde-4336-90bb-7806e0822653_900x900.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><h3>Sanctions Evasion</h3><p>This year, FINTRAC started to receive suspicious transaction reports relating to sanctions evasion. Prior to this, the Centre was limited to receiving only reports relating to suspected money laundering and terrorist financing. While some sanctions evasion involves money laundering, not all do, so there was a gap in what was reportable to FINTRAC. </p><p>While this update only came into force <a href="https://fintrac-canafe.canada.ca/guidance-directives/transaction-operation/sanctions/sanctions-eng">this summer</a> (2024), FINTRAC could disclose information to Global Affairs Canada since last summer (2023). These disclosures relate to the <em><a href="https://www.parl.ca/DocumentViewer/en/44-1/bill/C-47/royal-assent">Special Economic Measures Act </a></em><a href="https://www.parl.ca/DocumentViewer/en/44-1/bill/C-47/royal-assent">or the</a><em><a href="https://www.parl.ca/DocumentViewer/en/44-1/bill/C-47/royal-assent"> Justice for Victims of Corrupt Foreign Officials Act</a></em> and related sanctions. This year, FINTRAC sent Global Affairs Canada a single disclosure. </p><p>Questions still need to be answered about the utility of these disclosures for GAC, given their limitations on using Canadian information and targeting Canadians for sanctions, since FINTRAC&#8217;s data is skews heavily Canadian. </p><h3>Disclosing the Value of Transactions</h3><p>In recent years, FINTRAC has come under scrutiny for receiving a LOT of reports but disclosing very few. (For instance: this year, FINTRAC received nearly 49 million transaction reports, and disclosed 966,705, or 2% .) This was one of the criticisms levied at the organization during the Cullen Commission. (You can read what I thought about that <a href="https://newsletter.insightthreatintel.com/p/a-missed-opportunity-canadas-cullen?utm_source=publication-search">here</a>.) In response, FINTRAC has been updating its reporting, and this year, they have included a new table, reproduced below. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ouMD!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b6c3aa2-2043-4bfa-844e-a85e4427d9d4_2032x1186.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ouMD!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b6c3aa2-2043-4bfa-844e-a85e4427d9d4_2032x1186.png 424w, https://substackcdn.com/image/fetch/$s_!ouMD!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b6c3aa2-2043-4bfa-844e-a85e4427d9d4_2032x1186.png 848w, https://substackcdn.com/image/fetch/$s_!ouMD!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b6c3aa2-2043-4bfa-844e-a85e4427d9d4_2032x1186.png 1272w, https://substackcdn.com/image/fetch/$s_!ouMD!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b6c3aa2-2043-4bfa-844e-a85e4427d9d4_2032x1186.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ouMD!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b6c3aa2-2043-4bfa-844e-a85e4427d9d4_2032x1186.png" width="1456" height="850" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5b6c3aa2-2043-4bfa-844e-a85e4427d9d4_2032x1186.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:850,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1200611,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ouMD!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b6c3aa2-2043-4bfa-844e-a85e4427d9d4_2032x1186.png 424w, https://substackcdn.com/image/fetch/$s_!ouMD!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b6c3aa2-2043-4bfa-844e-a85e4427d9d4_2032x1186.png 848w, https://substackcdn.com/image/fetch/$s_!ouMD!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b6c3aa2-2043-4bfa-844e-a85e4427d9d4_2032x1186.png 1272w, https://substackcdn.com/image/fetch/$s_!ouMD!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b6c3aa2-2043-4bfa-844e-a85e4427d9d4_2032x1186.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Source: FINTRAC annual report 2023-2024, p.5</figcaption></figure></div><p>This table indicates that FINTRAC has shared a total of 966,705 transactions in 1783 unique disclosures. This is an average of 542 transactions in each disclosure. In total, the value of all transactions disclosed by FINTRAC this year was a whopping nearly $44 billion. That&#8217;s $44 billion of transactions that FINTRAC had reasonable grounds to suspect would be relevant to money laundering, terrorist financing, or threats to the security of Canada investigation. </p><h4>That seems like a lot of dirty money. </h4><p>Now, to nuance this a bit. First, there is the possibility that some of these transactions have been disclosed multiple times. For instance, a Hizballah financier who is also involved in procuring dual-use technology for Iran and running an illicit money service business in Canada might have their transactions disclosed as possible money laundering, terrorist financing, and sanctions evasion, and those transactions might be included in unique disclosures to three or more different organizations. I asked FINTRAC about this, and they indicated it is possible but rare. Some double-counting might happen in these totals, but it is not enough to shift the scope and scale of the money disclosed. </p><p>Secondly, it&#8217;s important to remember that these are transactions <strong>relevant to</strong> investigations of money laundering, terrorist financing, or threats to the security of Canada. That does not necessarily mean these transactions are any of those things. For instance, a terrorism suspect might have all his or her transactions FINTRAC received disclosed to CSIS or the RCMP, but it&#8217;s possible that only one or two of those transactions were actually intended for terrorist financing purposes. But all the transactions were <strong>relevant</strong> to the investigation, so they were all disclosed. Clear? </p><p>I think the $44 billion number <strong>overstates</strong> (possibly by quite a lot) the amount of &#8220;dirty&#8221; money actually present in those disclosures. I took issue with how similar numbers were represented in a recent op-ed, and you can read some of my reasoning <a href="https://newsletter.insightthreatintel.com/p/attack-patterns-and-money-trails">here</a>. However, I also think this might <strong>understate</strong> the amount of &#8220;dirty&#8221; money in Canada. FINTRAC only sees a portion of illicit transactions (domestic transactions aren&#8217;t reported to FINTRAC unless they&#8217;re deemed suspicious, for example), plus, lots of money laundering techniques try to limit what FINTRAC can see. Ultimately, I think we have to be careful about how we characterize these numbers (my clickbait heading notwithstanding) and why a deep understanding of what FINTRAC actually does (and sees) is essential when talking about dirty money in Canada. </p><p><strong>For context:</strong> If these transactions were contributing to Canada&#8217;s economy, illicit finance would probably be in the <a href="https://www.investopedia.com/articles/investing/042315/fundamentals-how-canada-makes-its-money.asp">top twenty sectors</a> contributing to Canada&#8217;s GDP. </p><h3>Terrorist Financing, Money Laundering, and Threats to the Security of Canada</h3><p>For the first 22 years of its existence, FINTRAC published statistics on the number of disclosures it provided to partners and how those disclosures were categorized (money laundering, terrorist financing, and threats to the security of Canada, or a combination of all three). Then, last year, FINTRAC stopped providing this information in its annual report. I <a href="https://newsletter.insightthreatintel.com/p/is-canada-giving-up-on-tackling-terrorist?utm_source=publication-search">took issue</a> with that then, and I still think this is a big blow to transparency. Not only do these categorizations provide context to the work that FINTRAC is doing, but they are also an important mechanism for holding the RCMP accountable for its responsibilities in investigating terrorist financing, money laundering, and sanctions evasion. We can look at these numbers and ask the RCMP: what are you folks up to? <em>(Hint: the number of money laundering and terrorist financing arrests is not remotely correlated to the number of disclosures the RCMP receives from FINTRAC on these issues.)</em></p><p>Anyway, despite not being provided in the annual report, the folks at FINTRAC were good enough to provide them to me (as they did last year)<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a>. In the chart below, the number of disclosures relating to terrorist financing or threats to the security of Canada steadily increased until 2016-2017, then began a decline. The main pandemic year, 2020-2021, shows the lowest level of these types of disclosures since 2012-2013. Over the last ten years, there has been a statistically significant decrease in the number of terrorist financing and threats disclosures. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!T9AC!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe7bec0c5-8a8d-41ef-9bd2-22582b2f1a8a_3373x1980.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!T9AC!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe7bec0c5-8a8d-41ef-9bd2-22582b2f1a8a_3373x1980.png 424w, https://substackcdn.com/image/fetch/$s_!T9AC!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe7bec0c5-8a8d-41ef-9bd2-22582b2f1a8a_3373x1980.png 848w, https://substackcdn.com/image/fetch/$s_!T9AC!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe7bec0c5-8a8d-41ef-9bd2-22582b2f1a8a_3373x1980.png 1272w, https://substackcdn.com/image/fetch/$s_!T9AC!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe7bec0c5-8a8d-41ef-9bd2-22582b2f1a8a_3373x1980.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!T9AC!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe7bec0c5-8a8d-41ef-9bd2-22582b2f1a8a_3373x1980.png" width="564" height="331.19505494505495" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e7bec0c5-8a8d-41ef-9bd2-22582b2f1a8a_3373x1980.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:855,&quot;width&quot;:1456,&quot;resizeWidth&quot;:564,&quot;bytes&quot;:344020,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!T9AC!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe7bec0c5-8a8d-41ef-9bd2-22582b2f1a8a_3373x1980.png 424w, https://substackcdn.com/image/fetch/$s_!T9AC!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe7bec0c5-8a8d-41ef-9bd2-22582b2f1a8a_3373x1980.png 848w, https://substackcdn.com/image/fetch/$s_!T9AC!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe7bec0c5-8a8d-41ef-9bd2-22582b2f1a8a_3373x1980.png 1272w, https://substackcdn.com/image/fetch/$s_!T9AC!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe7bec0c5-8a8d-41ef-9bd2-22582b2f1a8a_3373x1980.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Data compiled by Insight Threat Intelligence and provided by FINTRAC and derived from FINTRAC annual reports</figcaption></figure></div><p>There are a number of possible reasons for this. It&#8217;s possible that threat actors are using Canada less to conduct their activities, resulting in a decline in reporting from banks and other institutions to FINTRAC and a corresponding decrease in disclosures. It&#8217;s also possible that threat actors have gotten better at hiding their activities from reporting entities and FINTRAC and have adopted financial tradecraft to avoid FINTRAC reporting requirements. It&#8217;s also possible that FINTRAC has deprioritized terrorist and threat financing disclosures, although, based on my experience working there, I don&#8217;t think this is the case. FINTRAC might have also changed how it goes about sharing this information, and instead of providing quick, small disclosures, it provides fewer but more comprehensive disclosures. Finally, it&#8217;s also possible that banks and other reporting entities (and FINTRAC itself) are less well-adapted to the current threat environment and less able to detect and disclose terrorist and threat financing activities relating to foreign interference, ideologically-motivated violent extremism and other contemporary threats. </p><p>This decline in disclosures relating to terrorism and threats to the security of Canada is surprising, given that reports received by FINTRAC are at an all-time high, as are suspicious transaction reports, illustrated in the figures below.  </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!E8oB!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F51875127-95cf-43b5-af78-1c1130c6e260_5550x3382.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!E8oB!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F51875127-95cf-43b5-af78-1c1130c6e260_5550x3382.png 424w, https://substackcdn.com/image/fetch/$s_!E8oB!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F51875127-95cf-43b5-af78-1c1130c6e260_5550x3382.png 848w, https://substackcdn.com/image/fetch/$s_!E8oB!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F51875127-95cf-43b5-af78-1c1130c6e260_5550x3382.png 1272w, https://substackcdn.com/image/fetch/$s_!E8oB!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F51875127-95cf-43b5-af78-1c1130c6e260_5550x3382.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!E8oB!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F51875127-95cf-43b5-af78-1c1130c6e260_5550x3382.png" width="528" height="321.65934065934067" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/51875127-95cf-43b5-af78-1c1130c6e260_5550x3382.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:887,&quot;width&quot;:1456,&quot;resizeWidth&quot;:528,&quot;bytes&quot;:563743,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!E8oB!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F51875127-95cf-43b5-af78-1c1130c6e260_5550x3382.png 424w, https://substackcdn.com/image/fetch/$s_!E8oB!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F51875127-95cf-43b5-af78-1c1130c6e260_5550x3382.png 848w, https://substackcdn.com/image/fetch/$s_!E8oB!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F51875127-95cf-43b5-af78-1c1130c6e260_5550x3382.png 1272w, https://substackcdn.com/image/fetch/$s_!E8oB!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F51875127-95cf-43b5-af78-1c1130c6e260_5550x3382.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Data derived from FINTRAC annual reports and compiled by Insight Threat Intelligence</figcaption></figure></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!5pQr!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f3b772c-ceed-4e07-a1b9-9fd2df770a45_2887x2135.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!5pQr!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f3b772c-ceed-4e07-a1b9-9fd2df770a45_2887x2135.png 424w, https://substackcdn.com/image/fetch/$s_!5pQr!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f3b772c-ceed-4e07-a1b9-9fd2df770a45_2887x2135.png 848w, https://substackcdn.com/image/fetch/$s_!5pQr!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f3b772c-ceed-4e07-a1b9-9fd2df770a45_2887x2135.png 1272w, https://substackcdn.com/image/fetch/$s_!5pQr!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f3b772c-ceed-4e07-a1b9-9fd2df770a45_2887x2135.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!5pQr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f3b772c-ceed-4e07-a1b9-9fd2df770a45_2887x2135.png" width="524" height="387.60164835164835" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6f3b772c-ceed-4e07-a1b9-9fd2df770a45_2887x2135.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1077,&quot;width&quot;:1456,&quot;resizeWidth&quot;:524,&quot;bytes&quot;:312219,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!5pQr!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f3b772c-ceed-4e07-a1b9-9fd2df770a45_2887x2135.png 424w, https://substackcdn.com/image/fetch/$s_!5pQr!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f3b772c-ceed-4e07-a1b9-9fd2df770a45_2887x2135.png 848w, https://substackcdn.com/image/fetch/$s_!5pQr!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f3b772c-ceed-4e07-a1b9-9fd2df770a45_2887x2135.png 1272w, https://substackcdn.com/image/fetch/$s_!5pQr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f3b772c-ceed-4e07-a1b9-9fd2df770a45_2887x2135.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Data derived from FINTRAC annual reports and compiled by Insight Threat Intelligence</figcaption></figure></div><p>In my experience, changes in data like this are usually driven by several factors, not just one driver. </p><h3>The Looming FATF Review</h3><p>Next year, FATF will start its mutual evaluation of Canada using a new methodology to assess compliance with its recommendations. As part of this methodology, emphasis will be placed on countries posing more significant risks to the international financial systems. Countries prioritized for active review are a) FATF members, b) a high-income country, or c) a country with financial sector assets above <a href="https://cba.ca/fast-facts-the-canadian-banking-system">US$10 billion</a>. If you&#8217;re wondering, Canada fits all three criteria. </p><p>The big question is whether Canada will have <a href="https://www.fatf-gafi.org/en/publications/High-risk-and-other-monitored-jurisdictions/increased-monitoring-october-2024.html">strategic deficiencies</a> in its ability to counter money laundering, terrorist financing, and proliferation financing. By 2021 (after the initial 2016 review), Canada was found to be compliant or largely compliant across most of the FATF&#8217;s recommendations. However, Canada was only partially compliant on recommendations 8, 22, 24, 28, and 29, and non-compliant on recommendation 25. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!tutd!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbdd11eac-0afa-4395-8d71-4485b08cdc6c_877x379.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!tutd!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbdd11eac-0afa-4395-8d71-4485b08cdc6c_877x379.png 424w, https://substackcdn.com/image/fetch/$s_!tutd!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbdd11eac-0afa-4395-8d71-4485b08cdc6c_877x379.png 848w, https://substackcdn.com/image/fetch/$s_!tutd!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbdd11eac-0afa-4395-8d71-4485b08cdc6c_877x379.png 1272w, https://substackcdn.com/image/fetch/$s_!tutd!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbdd11eac-0afa-4395-8d71-4485b08cdc6c_877x379.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!tutd!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbdd11eac-0afa-4395-8d71-4485b08cdc6c_877x379.png" width="608" height="262.7502850627138" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/bdd11eac-0afa-4395-8d71-4485b08cdc6c_877x379.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:379,&quot;width&quot;:877,&quot;resizeWidth&quot;:608,&quot;bytes&quot;:46324,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!tutd!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbdd11eac-0afa-4395-8d71-4485b08cdc6c_877x379.png 424w, https://substackcdn.com/image/fetch/$s_!tutd!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbdd11eac-0afa-4395-8d71-4485b08cdc6c_877x379.png 848w, https://substackcdn.com/image/fetch/$s_!tutd!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbdd11eac-0afa-4395-8d71-4485b08cdc6c_877x379.png 1272w, https://substackcdn.com/image/fetch/$s_!tutd!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbdd11eac-0afa-4395-8d71-4485b08cdc6c_877x379.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Whether Canada gets as good a rating as the last follow-up report remains to be seen. FATF is likely looking for progress along many measurable outcomes, and it&#8217;s not clear that Canada has made much progress in the last eight years. We&#8217;re still waiting for our beneficial ownership registry to come online, for our foreign agent registry, and for the Financial Crimes Agency (<a href="https://newsletter.insightthreatintel.com/p/responding-to-illicit-financing-and?utm_source=publication-search">remember that</a>?), to say nothing of our dismal prosecution numbers. </p><p>At this point, I doubt that FATF will place Canada on the &#8220;grey&#8221; list for enhanced monitoring, but the new President might be interested in making an example of a G7 country. And if that&#8217;s the case, there&#8217;s a non-zero chance that example could be Canada. More likely, however, is that Canada is subject to frequent follow-up reports. The folks participating in the mutual evaluation will have a tough hill to climb to demonstrate compliance with FATF recommendations and the effectiveness of Canada&#8217;s regime. I wish them all the luck in the world because being grey-listed by FATF would be an absolute catastrophe for Canada&#8217;s reputation and economy, particularly with all the global volatility. However, the real travesty is that Canada has not done more to combat illicit finance over the last decade.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/p/canadas-44-billion-dirty-money-industry?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/p/canadas-44-billion-dirty-money-industry?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p><em>Want to learn more about terrorist financing and how to analyze it? </em></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://insightthreatintelligence.thinkific.com/bundles/tf-analysis" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!dU_K!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8782aff-c9c3-4da5-a41b-acd2326801de.heic 424w, https://substackcdn.com/image/fetch/$s_!dU_K!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8782aff-c9c3-4da5-a41b-acd2326801de.heic 848w, https://substackcdn.com/image/fetch/$s_!dU_K!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8782aff-c9c3-4da5-a41b-acd2326801de.heic 1272w, https://substackcdn.com/image/fetch/$s_!dU_K!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8782aff-c9c3-4da5-a41b-acd2326801de.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!dU_K!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8782aff-c9c3-4da5-a41b-acd2326801de.heic" width="514" height="514" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b8782aff-c9c3-4da5-a41b-acd2326801de.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1080,&quot;width&quot;:1080,&quot;resizeWidth&quot;:514,&quot;bytes&quot;:204417,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:&quot;https://insightthreatintelligence.thinkific.com/bundles/tf-analysis&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!dU_K!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8782aff-c9c3-4da5-a41b-acd2326801de.heic 424w, https://substackcdn.com/image/fetch/$s_!dU_K!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8782aff-c9c3-4da5-a41b-acd2326801de.heic 848w, https://substackcdn.com/image/fetch/$s_!dU_K!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8782aff-c9c3-4da5-a41b-acd2326801de.heic 1272w, https://substackcdn.com/image/fetch/$s_!dU_K!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8782aff-c9c3-4da5-a41b-acd2326801de.heic 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>Our terrorist financing analysis course caters to researchers, intelligence, law enforcement, and compliance professionals to help them learn about terrorist financing, and analyze suspicious patterns and activities more effectively. Sign up today and lock in 2024 pricing!</em></p><p><em>&#169; 2024 Insight Threat Intelligence Ltd. All Rights Reserved.<br><br>This newsletter and its contents are protected by Canadian copyright law. Except as otherwise provided for under Canadian copyright law, this newsletter and its contents may not be copied, published, distributed, downloaded or otherwise stored in a retrieval system, transmitted or converted, in any form or by any means, electronic or otherwise, without the prior written permission of the copyright owner.</em></p><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-1" href="#footnote-anchor-1" class="footnote-number" contenteditable="false" target="_self">1</a><div class="footnote-content"><p>I am grateful to FINTRAC for providing this information to me and not requiring a formal access to information request. However, I think that relying on the good will of an organization to provide information is a bad practice for transparency and accountability in Canada. I also think that it&#8217;s critical that there&#8217;s consistency of data over time so we can actually track changes and progress (or lack thereof). Perhaps something for one of the review agencies, such as NSIRA, or NSICOP, to take up. </p></div></div>]]></content:encoded></item><item><title><![CDATA[ ITAC: Canada's Integrated Terrorism Assessment Centre]]></title><description><![CDATA[Primer]]></description><link>https://newsletter.insightthreatintel.com/p/itac-canadas-integrated-terrorism</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/itac-canadas-integrated-terrorism</guid><dc:creator><![CDATA[Jessica Davis, PhD]]></dc:creator><pubDate>Thu, 07 Nov 2024 14:00:16 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!T3yC!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb3506f89-8e0d-4347-8391-0745e5c6ef82_1792x1024.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Hello <strong>Insight Monitor</strong> subscribers! Today, another article in our Primers series explores key issues, topics, and institutions in Canadian and international security. Although an often-overlooked security and intelligence agency in the Government of Canada, like many others, the Integrated Terrorism Assessment Centre (ITAC) became a subject of the <a href="https://publicorderemergencycommission.ca/final-report/">Public Inquiry into the 2022 Public Order Emergency</a>. In our previous coverage of the Freedom Convoy, we looked at government and law enforcement information-sharing capabilities after the enactment of the emergency measures.</em></p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;1d66904b-baf0-4c4a-9fc5-f47230eb5d3f&quot;,&quot;caption&quot;:&quot;In this 10th (and hopefully close to last!) edition of the convoy finance series, I look at what the emergency measures achieved, and what lessons can be learned from their implementation. Thanks to all who have subscribed recently &#8212; it really helps to keep this newsletter sustainable! And my apologies for the duplicate emails on the last newsletter. Substack tells me that the bug that caused you all to receive two emails has been fixed. Also, in the next few weeks, I should have a special surprise for you all &#8212; a new author! More on that later. For now, let&#8217;s learn some lessons about convoy finance.&quot;,&quot;cta&quot;:null,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Convoy Finance: Assessing effectiveness and learning lessons &quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:33479672,&quot;name&quot;:&quot;Jessica Davis&quot;,&quot;bio&quot;:&quot;Jessica Davis is President of Insight Threat Intelligence and is the author of Women in Modern Terrorism: From Liberations Wars to Global Terrorism and the Islamic State (2017), and Illicit Money: Financing Terrorism in the 21st Century (2021).&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e312ae7c-114b-4e4f-9ce1-8bf50ddb7a27_2344x2049.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2022-04-13T13:00:39.152Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F3ccb52ec-cb01-4e39-96d5-5f3f4ef31fa1_1366x768.jpeg&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/convoy-finance-assessing-effectiveness&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:51875213,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:1,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F09b767fc-6dde-4336-90bb-7806e0822653_900x900.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p><em>ITAC is one of the institutions in place to facilitate the timely dissemination of intelligence assessments before terrorist threats are actioned. However, there is limited and sometimes contradictory information on the organization.  Stephanie Carvin&#8217;s chapter in <a href="https://utorontopress.com/9781487525279/top-secret-canada/#:~:text=Top%20Secret%20Canada%20features%20essays,now%20and%20in%20the%20future.">Top Secret Canada: Understanding the Canadian Intelligence and National Security Community</a> is one of the few comprehensive sources on ITAC.</em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/subscribe?"><span>Subscribe now</span></a></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!T3yC!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb3506f89-8e0d-4347-8391-0745e5c6ef82_1792x1024.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!T3yC!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb3506f89-8e0d-4347-8391-0745e5c6ef82_1792x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!T3yC!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb3506f89-8e0d-4347-8391-0745e5c6ef82_1792x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!T3yC!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb3506f89-8e0d-4347-8391-0745e5c6ef82_1792x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!T3yC!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb3506f89-8e0d-4347-8391-0745e5c6ef82_1792x1024.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!T3yC!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb3506f89-8e0d-4347-8391-0745e5c6ef82_1792x1024.webp" width="1456" height="832" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b3506f89-8e0d-4347-8391-0745e5c6ef82_1792x1024.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:832,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;A professional terrorism taskforce working in an office environment. The team members are diverse, wearing business casual attire, and are engaged in various tasks such as analyzing data on computers, discussing strategies, and communicating over phones. The office is equipped with modern technology, large screens displaying maps and information, and a central conference table with documents and laptops. The atmosphere is calm, focused, and collaborative, conveying a sense of intelligence work, coordination, and strategic planning.&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="A professional terrorism taskforce working in an office environment. The team members are diverse, wearing business casual attire, and are engaged in various tasks such as analyzing data on computers, discussing strategies, and communicating over phones. The office is equipped with modern technology, large screens displaying maps and information, and a central conference table with documents and laptops. The atmosphere is calm, focused, and collaborative, conveying a sense of intelligence work, coordination, and strategic planning." title="A professional terrorism taskforce working in an office environment. The team members are diverse, wearing business casual attire, and are engaged in various tasks such as analyzing data on computers, discussing strategies, and communicating over phones. The office is equipped with modern technology, large screens displaying maps and information, and a central conference table with documents and laptops. The atmosphere is calm, focused, and collaborative, conveying a sense of intelligence work, coordination, and strategic planning." srcset="https://substackcdn.com/image/fetch/$s_!T3yC!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb3506f89-8e0d-4347-8391-0745e5c6ef82_1792x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!T3yC!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb3506f89-8e0d-4347-8391-0745e5c6ef82_1792x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!T3yC!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb3506f89-8e0d-4347-8391-0745e5c6ef82_1792x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!T3yC!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb3506f89-8e0d-4347-8391-0745e5c6ef82_1792x1024.webp 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h6>Image created by OpenAI&#8217;s DallE</h6><h3><strong>Mandate</strong></h3><p>ITAC is <a href="https://www.canada.ca/en/security-intelligence-service/integrated-terrorism-assessment-centre.html">&#8220;a federal organization responsible for assessing terrorism threats to Canada and Canadian interests worldwide</a>.&#8221;</p><p>ITAC&#8217;s <a href="https://www.canada.ca/en/security-intelligence-service/integrated-terrorism-assessment-centre.html">stated operations</a> are comprised of:</p><ol><li><p>Producing terrorism threat assessments for Canada and Canadian interests worldwide, based on classified and open-source information;</p></li><li><p>Assessing and recommending the National Terrorism Threat Level (NTTL) for Canada, used by government and law enforcement agencies; and</p></li><li><p>Assessing and setting terrorism threat levels for special events like the Olympics and internationally protected persons.</p></li></ol><p>ITAC is solely an assessment body with no collection authorities; instead, it relies on intelligence from other agencies, including CSIS. Classified <a href="https://publicorderemergencycommission.ca/files/documents/Final-Report/Vol-3-Report-of-the-Public-Inquiry-into-the-2022-Public-Order-Emergency.pdf">ITAC assessments</a> are distributed to federal agencies, while unclassified versions are shared with external partners, including certain law enforcement agencies. Unclassified ITAC assessments are sometimes released publicly through access to information requests. </p><h3><strong>History</strong></h3><p>ITAC was established in 2004 following the 9/11 attacks in the US and as part of the first and only Government of Canada <a href="https://publications.gc.ca/collections/Collection/CP22-77-2004E.pdf">National Security Strategy</a>. ITAC was initially named the Integrated <em>Threat</em> Assessment Centre. Canada followed the lead of allies like the US, the UK, and Australia, who adopted organizations with integrated models for threat assessment. These centres combine intelligence from various government sectors to provide timely, comprehensive threat assessments.</p><p>ITAC's creation aimed to enhance Canada's capacity to protect its citizens and contribute to international security efforts by <a href="https://publications.gc.ca/collections/Collection/CP22-77-2004E.pdf">facilitating the integration of intelligence</a>, ensuring that threat-related information is comprehensive and effectively shared across <a href="https://utorontopress.com/9781487525279/top-secret-canada/#:~:text=Top%20Secret%20Canada%20features%20essays,now%20and%20in%20the%20future.">public and private entities</a> for better decision-making. &nbsp;The centre was renamed in 2011 to focus specifically on terrorism threats and emphasize supporting the decision-making of senior federal leaders. </p><h3><strong>Organizational Structure</strong></h3><p>The centre operates under the Canadian Security Intelligence Service (CSIS) Act and is co-located with the Service, although it functions as a separate intelligence analysis body and maintains operational independence. ITAC employs professionals from <a href="https://utorontopress.com/9781487525279/top-secret-canada/#:~:text=Top%20Secret%20Canada%20features%20essays,now%20and%20in%20the%20future.">various agencies</a> such as the Canada Border Services Agency (CBSA), CSIS, the Department of National Defence, Global Affairs Canada, FINTRAC, and the Royal Canadian Mounted Police (RCMP), through secondment assignments. It also has a <a href="https://utorontopress.com/9781487525279/top-secret-canada/#:~:text=Top%20Secret%20Canada%20features%20essays,now%20and%20in%20the%20future.">permanent analytical and managerial staff</a> to help facilitate continuity and expertise within the organization. &nbsp;</p><p>ITAC is managed by <a href="https://publicorderemergencycommission.ca/files/documents/Final-Report/Vol-3-Report-of-the-Public-Inquiry-into-the-2022-Public-Order-Emergency.pdf">its own director</a>, who is appointed by the National Security and Intelligence Advisor (NSIA). The director is <a href="https://publicorderemergencycommission.ca/files/documents/Final-Report/Vol-3-Report-of-the-Public-Inquiry-into-the-2022-Public-Order-Emergency.pdf">held accountable to the CSIS director</a>, the NSIA, and deputy ministers from participating organizations. Additionally, ITAC is required to submit an annual report to the <a href="https://publicorderemergencycommission.ca/files/overview-reports/DOJ.IR.00000001.pdf?t=1673379038">Deputy Ministers&#8217; Committee on National Security</a>. Furthermore, the National Security and Intelligence Review Agency (NSIRA) and the National Security and Intelligence Committee of Parliamentarians have the authority to review the centre&#8217;s activities.</p><p>Additional details about ITAC as an organization, including the number of employees and its annual budget, have not been made public.</p><h3><strong>Organizational Value</strong></h3><p>ITAC&#8217;s primary value lies in its ability to facilitate intelligence sharing and analysis among Canadian security partners like CSIS, RCMP, CBSA, and international partners like the US, UK, Australia and New Zealand. This collaboration helps create a more comprehensive threat picture by integrating diverse perspectives and information sources. The secondment employment model further allows for a multi-disciplinary approach to incorporate analysis from several different security angles.</p><p>Another key benefit of ITAC is its centralized and specialized approach to terrorism threat assessments. By focusing exclusively on terrorism threats, ITAC produces comprehensive assessments for Canada and Canadian interests worldwide, leveraging expertise and information from various security agencies. The assessments produced by ITAC directly inform and recommend the <a href="https://www.canada.ca/en/services/defence/nationalsecurity/terrorism-threat-level.html">NTTL for Canada</a>. This guidance helps government and law enforcement agencies implement consistent security measures and effectively mitigate threats. Moreover, ITAC supports decision-making at senior levels by providing tailored intelligence products, <a href="https://www.canada.ca/en/security-intelligence-service/integrated-terrorism-assessment-centre.html">ranging from tactical reports to strategic analyses</a>. These insights assist federal leaders as well as law enforcement to make informed decisions regarding terrorism threats.</p><h3><strong>Criticisms</strong></h3><p>ITAC has faced criticism, one major concern <a href="https://utorontopress.com/9781487525279/top-secret-canada/#:~:text=Top%20Secret%20Canada%20features%20essays,now%20and%20in%20the%20future">being the lack of transparency</a> and public accountability. While ITAC operates under the CSIS Act and is accountable to review bodies, there is limited public information about its operations, threat assessments, and decision-making processes. This opacity has led to criticisms regarding the ability to assess its effectiveness and the adequacy of public accountability.</p><p>Another issue is the potential for operational overreach. Although ITAC's mandate is to focus solely on terrorism threats, there are concerns regarding interpretations of what terrorism means. The scope of ITAC&#8217;s activities could therefore expand beyond its intended focus. For instance, in 2011, ITAC monitored the potential for politically motivated violence during the &#8216;Occupy&#8217; protests in Canada, producing reports that <a href="https://utorontopress.com/9781487525279/top-secret-canada/#:~:text=Top%20Secret%20Canada%20features%20essays,now%20and%20in%20the%20future">activists criticized</a> as anti-democratic and unnecessarily amplifying security concerns about citizen protests.</p><p>Furthermore, ITAC&#8217;s reputation for analysis has been questioned. The main criticism stems from the unclear value of the NTTL, which ITAC has been responsible for setting since October 2014. The threat level, which has remained at "medium" since its inception, is meant to inform the public and various security stakeholders but requires no action from citizens. This broad, non-specific warning might not provide enough actionable information for local authorities, leading it to potentially being disregarded. National threat warnings often lack the local specificity necessary for effective action, especially in a country as large and diverse as Canada.</p><p><a href="https://utorontopress.com/9781487525279/top-secret-canada/#:~:text=Top%20Secret%20Canada%20features%20essays,now%20and%20in%20the%20future">Intelligence should be disseminated to those best positioned to use it effectively</a>, but it is unclear if this is consistently achieved with ITAC. The <a href="https://publicorderemergencycommission.ca/final-report/">Public Inquiry into the 2022 Public Order Emergency</a> found that there were free-standing intelligence reports from multiple federal, provincial, and municipal governments and police agencies, with products not always being shared effectively or reaching the appropriate audiences. ITAC, as with many other agencies, likely suffers from ineffective and heavily red-taped information dissemination practices, hindering its ability to be proactive.</p><p>ITAC's reliance on <a href="https://utorontopress.com/9781487525279/top-secret-canada/#:~:text=Top%20Secret%20Canada%20features%20essays,now%20and%20in%20the%20future">temporary staff assignments from various agencies</a>, rather than a dedicated, permanent workforce, also raises efficacy concerns. The rotational model might affect continuity, retention of institutional knowledge, and the long-term expertise of its analysts, leading to additional criticism regarding ITAC&#8217;s analytical capabilities.</p><h3><strong>Opportunities for Improvement</strong></h3><p>Overall, ITAC has the potential to play a crucial role in Canada&#8217;s national security by facilitating intelligence assessment and sharing. However, criticisms point to areas where its operations and transparency could be improved to enhance public trust and effectiveness. A review by NSIRA or NSICOP could be valuable in this regard. Such a review should examine ITAC's organizational and operational practices, as well as the net benefits of its products. Increasing transparency about the outcomes of this review, where feasible, would help demonstrate the organization&#8217;s value and identify areas for improvement.</p><p><em>Did you find this post insightful? Share it with a colleague!</em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/p/itac-canadas-integrated-terrorism?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/p/itac-canadas-integrated-terrorism?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://insightthreatintelligence.thinkific.com/bundles/tf-analysis" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!dU_K!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8782aff-c9c3-4da5-a41b-acd2326801de.heic 424w, https://substackcdn.com/image/fetch/$s_!dU_K!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8782aff-c9c3-4da5-a41b-acd2326801de.heic 848w, https://substackcdn.com/image/fetch/$s_!dU_K!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8782aff-c9c3-4da5-a41b-acd2326801de.heic 1272w, https://substackcdn.com/image/fetch/$s_!dU_K!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8782aff-c9c3-4da5-a41b-acd2326801de.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!dU_K!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8782aff-c9c3-4da5-a41b-acd2326801de.heic" width="514" height="514" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b8782aff-c9c3-4da5-a41b-acd2326801de.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1080,&quot;width&quot;:1080,&quot;resizeWidth&quot;:514,&quot;bytes&quot;:204417,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:&quot;https://insightthreatintelligence.thinkific.com/bundles/tf-analysis&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!dU_K!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8782aff-c9c3-4da5-a41b-acd2326801de.heic 424w, https://substackcdn.com/image/fetch/$s_!dU_K!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8782aff-c9c3-4da5-a41b-acd2326801de.heic 848w, https://substackcdn.com/image/fetch/$s_!dU_K!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8782aff-c9c3-4da5-a41b-acd2326801de.heic 1272w, https://substackcdn.com/image/fetch/$s_!dU_K!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8782aff-c9c3-4da5-a41b-acd2326801de.heic 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Our terrorist financing analysis course caters to researchers, intelligence, law enforcement, and compliance professionals to help them learn about terrorist financing, and analyze suspicious patterns and activities more effectively. Sign up today!</p><p><em>&#169; 2024 Insight Threat Intelligence Ltd. All Rights Reserved.<br><br>This newsletter and its contents are protected by Canadian copyright law. Except as otherwise provided for under Canadian copyright law, this newsletter and its contents may not be copied, published, distributed, downloaded or otherwise stored in a retrieval system, transmitted or converted, in any form or by any means, electronic or otherwise, without the prior written permission of the copyright owner.</em></p>]]></content:encoded></item><item><title><![CDATA[Terrorist financing enters its cryptocurrency era]]></title><description><![CDATA[A bi-annual update on global terrorist financing trends]]></description><link>https://newsletter.insightthreatintel.com/p/terrorist-financing-enters-its-cryptocurrency</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/terrorist-financing-enters-its-cryptocurrency</guid><pubDate>Thu, 22 Aug 2024 13:01:06 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0603deea-04b9-484c-97df-69d59bb49961_720x543.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Hello, <strong>Insight Monitor</strong> subscribers! I&#8217;m excited to share a new product with you today &#8212; our analysis of terrorist financing trends. I often get asked, &#8220;What&#8217;s new?&#8221; in terrorist financing? I struggle to answer because I don&#8217;t want to refer to headlines. I prefer my answers to be data-driven. If you feel the same way, today, you&#8217;re in luck! We crunched the numbers, and we can tell you ~exactly~ what&#8217;s new in terrorist financing. Have a read and let me know what you think in the comments or through email. We love hearing from you, and would be delighted to answer any questions you have about this. Thanks for caring about illicit finance and global security, </em></p><p><em>~Jess</em></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Insight Monitor is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2>Establishing a baseline</h2><p>Since 2018, I&#8217;ve captured terrorist financing &#8220;cases&#8221; from media reports, court cases, government press releases, and other open sources. These are incidents of terrorist financing that refer to operational or organizational financing. In each case, we look for financing attributes, such as the methods and mechanisms involved in raising, using, moving, storing, managing, and obscuring funds. This builds on the data and analysis from my 2021 book<a href="https://www.rienner.com/title/Illicit_Money_Financing_Terrorism_in_the_Twenty_First_Century"> </a><em><a href="https://www.rienner.com/title/Illicit_Money_Financing_Terrorism_in_the_Twenty_First_Century">Illicit Money</a></em>. </p><p>Over the last six years, I&#8217;ve identified 618 terrorist financing cases that are now included in this dataset. As you can see in the graph below, data collection in 2018 and 2019 was still spotty. We instituted new data collection practices in 2020, so things took off then, and the data is robust from 2020 onwards. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!IHAu!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3097c8c7-5bb4-42fc-8f74-e8f987d82f16_500x311.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!IHAu!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3097c8c7-5bb4-42fc-8f74-e8f987d82f16_500x311.png 424w, https://substackcdn.com/image/fetch/$s_!IHAu!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3097c8c7-5bb4-42fc-8f74-e8f987d82f16_500x311.png 848w, https://substackcdn.com/image/fetch/$s_!IHAu!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3097c8c7-5bb4-42fc-8f74-e8f987d82f16_500x311.png 1272w, https://substackcdn.com/image/fetch/$s_!IHAu!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3097c8c7-5bb4-42fc-8f74-e8f987d82f16_500x311.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!IHAu!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3097c8c7-5bb4-42fc-8f74-e8f987d82f16_500x311.png" width="500" height="311" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3097c8c7-5bb4-42fc-8f74-e8f987d82f16_500x311.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:311,&quot;width&quot;:500,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:17265,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!IHAu!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3097c8c7-5bb4-42fc-8f74-e8f987d82f16_500x311.png 424w, https://substackcdn.com/image/fetch/$s_!IHAu!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3097c8c7-5bb4-42fc-8f74-e8f987d82f16_500x311.png 848w, https://substackcdn.com/image/fetch/$s_!IHAu!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3097c8c7-5bb4-42fc-8f74-e8f987d82f16_500x311.png 1272w, https://substackcdn.com/image/fetch/$s_!IHAu!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3097c8c7-5bb4-42fc-8f74-e8f987d82f16_500x311.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>There is an apparent dip in terrorist financing cases in 2021 and 2022. This is interesting because it mirrors a similar dip in FINTRAC terrorist financing disclosures that we attribute to the pandemic. Or was there just less terrorist financing? Or less reporting on it? Many intervening factors are likely to explain this, but it is interesting to see global terrorist financing cases largely mirror FINTRAC disclosure trends. </p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/p/terrorist-financing-enters-its-cryptocurrency?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/p/terrorist-financing-enters-its-cryptocurrency?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;a9e9394e-216f-4fd0-a5cb-8a7ef200b8ad&quot;,&quot;caption&quot;:&quot;It&#8217;s the most wonderful time of the year! FINTRAC&#8217;s annual report dropped last week. Okay, I&#8217;ll admit that I&#8217;m probably the only one that excited about this report. But for those of you who don&#8217;t know, this report is one of the most transparent descriptions of the activities of a department or agency in the Canadian security and intelligence service. And while I&#8217;m often annoyed about our lack of measurements in the anti-money laundering and counter-terrorist financing world, this report at least gives us ~some~ insight. Read to find out how Canada is doing in its fight against money laundering, terrorist financing, and other financial crimes!&quot;,&quot;cta&quot;:null,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;lg&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Is Canada giving up on tackling terrorist financing? &quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:33479672,&quot;name&quot;:&quot;Jessica Davis&quot;,&quot;bio&quot;:&quot;Jessica Davis is President of Insight Threat Intelligence and is the author of Women in Modern Terrorism: From Liberations Wars to Global Terrorism and the Islamic State (2017), and Illicit Money: Financing Terrorism in the 21st Century (2021).&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e312ae7c-114b-4e4f-9ce1-8bf50ddb7a27_2344x2049.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2023-12-07T14:01:27.892Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F075f5c74-65d7-4d44-ae39-60c731086a4a_733x431.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/is-canada-giving-up-on-tackling-terrorist&quot;,&quot;section_name&quot;:&quot;Commentary&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:139466621,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:4,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F09b767fc-6dde-4336-90bb-7806e0822653_900x900.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://insightthreatintelligence.thinkific.com/bundles/tf-analysis" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!dU_K!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8782aff-c9c3-4da5-a41b-acd2326801de.heic 424w, https://substackcdn.com/image/fetch/$s_!dU_K!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8782aff-c9c3-4da5-a41b-acd2326801de.heic 848w, https://substackcdn.com/image/fetch/$s_!dU_K!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8782aff-c9c3-4da5-a41b-acd2326801de.heic 1272w, https://substackcdn.com/image/fetch/$s_!dU_K!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8782aff-c9c3-4da5-a41b-acd2326801de.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!dU_K!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8782aff-c9c3-4da5-a41b-acd2326801de.heic" width="514" height="514" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b8782aff-c9c3-4da5-a41b-acd2326801de.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1080,&quot;width&quot;:1080,&quot;resizeWidth&quot;:514,&quot;bytes&quot;:204417,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:&quot;https://insightthreatintelligence.thinkific.com/bundles/tf-analysis&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!dU_K!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8782aff-c9c3-4da5-a41b-acd2326801de.heic 424w, https://substackcdn.com/image/fetch/$s_!dU_K!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8782aff-c9c3-4da5-a41b-acd2326801de.heic 848w, https://substackcdn.com/image/fetch/$s_!dU_K!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8782aff-c9c3-4da5-a41b-acd2326801de.heic 1272w, https://substackcdn.com/image/fetch/$s_!dU_K!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8782aff-c9c3-4da5-a41b-acd2326801de.heic 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Our terrorist financing analysis course caters to researchers, intelligence, law enforcement, and compliance professionals to help them learn about terrorist financing and analyze suspicious patterns and activities more effectively. Sign up today!</p><div><hr></div><h2>New trends</h2>
      <p>
          <a href="https://newsletter.insightthreatintel.com/p/terrorist-financing-enters-its-cryptocurrency">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Covert Currency: State and Non-State Actors in Espionage Financing]]></title><description><![CDATA[Part of the illicit financing landscape]]></description><link>https://newsletter.insightthreatintel.com/p/espionage-financing</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/espionage-financing</guid><dc:creator><![CDATA[Jessica Davis, PhD]]></dc:creator><pubDate>Thu, 11 Jul 2024 13:07:19 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!MPUo!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F059c07c8-bff6-4599-8aed-9009ab2ebaae_1024x1024.heic" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>In the world of illicit financing, we often analyze terrorist financing, sanctions evasion, and money laundering, but we rarely discuss foreign interference/influence financing or espionage. Over the last few years, we&#8217;ve seen quite a number of court cases and arrests relating to espionage, so today, we&#8217;re going to unpack the money behind these threats. </em> </p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Insight Monitor is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><pre><code>Updated August 2024</code></pre><p>Espionage is the act of collecting secret information, usually through illegal means. It often involves state actors who use spies, agents, and technology to acquire secrets against target countries (or, in some cases, private sector assets). Espionage financing refers to the ways that espionage activities are financed. This can include the amounts of money paid for secrets, how the funds were transferred, how the technologies used for espionage are funded and developed, and even how the money was raised in the first place. This article provides an update on recent events in the espionage finance world and contextualizes it within the broader landscape of illicit finance. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!MPUo!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F059c07c8-bff6-4599-8aed-9009ab2ebaae_1024x1024.heic" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!MPUo!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F059c07c8-bff6-4599-8aed-9009ab2ebaae_1024x1024.heic 424w, https://substackcdn.com/image/fetch/$s_!MPUo!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F059c07c8-bff6-4599-8aed-9009ab2ebaae_1024x1024.heic 848w, https://substackcdn.com/image/fetch/$s_!MPUo!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F059c07c8-bff6-4599-8aed-9009ab2ebaae_1024x1024.heic 1272w, https://substackcdn.com/image/fetch/$s_!MPUo!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F059c07c8-bff6-4599-8aed-9009ab2ebaae_1024x1024.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!MPUo!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F059c07c8-bff6-4599-8aed-9009ab2ebaae_1024x1024.heic" width="436" height="436" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/059c07c8-bff6-4599-8aed-9009ab2ebaae_1024x1024.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:436,&quot;bytes&quot;:308159,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!MPUo!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F059c07c8-bff6-4599-8aed-9009ab2ebaae_1024x1024.heic 424w, https://substackcdn.com/image/fetch/$s_!MPUo!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F059c07c8-bff6-4599-8aed-9009ab2ebaae_1024x1024.heic 848w, https://substackcdn.com/image/fetch/$s_!MPUo!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F059c07c8-bff6-4599-8aed-9009ab2ebaae_1024x1024.heic 1272w, https://substackcdn.com/image/fetch/$s_!MPUo!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F059c07c8-bff6-4599-8aed-9009ab2ebaae_1024x1024.heic 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Image created by OpenAI&#8217;s image generator</figcaption></figure></div><p>Relatedly, foreign influence or foreign interference is how states deploy spies, agents, or even regular citizens to influence a country&#8217;s policies and politics in their favour or interfere in the normal course of politics or life in a country. While just as serious, foreign interference/influence financing looks a bit different from espionage financing, so we&#8217;ll deal with that threat in another issue of <strong>Insight Monitor</strong>. </p><p><strong>Espionage</strong> requires money, which is often provided through state budgets via embassies, electronic funds transfers, or cash. However, we are increasingly seeing espionage activities undertaken and financed through cryptocurrencies. </p><p>No country is immune to espionage, and individuals in sensitive positions provide information for a variety of reasons, but most of all for financial need. On average, espionage cases involve payments of around $480,000, but there&#8217;s a lot of variation: in some cases, perpetrators of espionage were paid as little as $25,000 for the information or access they shared, while in other cases, perpetrators were paid as much as $2 million. </p><div><hr></div><p><em>Do you want to learn more about financial intelligence and how to use it in research, investigations, and analysis? Our financial intelligence fundamentals course is for you! Launching 2 July 2024, this course is perfect for people new to financial intelligence and seasoned professionals. <a href="https://insightthreatintelligence.thinkific.com/courses/introFININT">Enroll today</a>!</em></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://insightthreatintelligence.thinkific.com/courses/introFININT" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!twUc!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe22a91b0-2f94-4a22-9e09-e862e5a6dfa8_1920x1080.heic 424w, https://substackcdn.com/image/fetch/$s_!twUc!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe22a91b0-2f94-4a22-9e09-e862e5a6dfa8_1920x1080.heic 848w, https://substackcdn.com/image/fetch/$s_!twUc!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe22a91b0-2f94-4a22-9e09-e862e5a6dfa8_1920x1080.heic 1272w, https://substackcdn.com/image/fetch/$s_!twUc!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe22a91b0-2f94-4a22-9e09-e862e5a6dfa8_1920x1080.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!twUc!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe22a91b0-2f94-4a22-9e09-e862e5a6dfa8_1920x1080.heic" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e22a91b0-2f94-4a22-9e09-e862e5a6dfa8_1920x1080.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:237073,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:&quot;https://insightthreatintelligence.thinkific.com/courses/introFININT&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!twUc!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe22a91b0-2f94-4a22-9e09-e862e5a6dfa8_1920x1080.heic 424w, https://substackcdn.com/image/fetch/$s_!twUc!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe22a91b0-2f94-4a22-9e09-e862e5a6dfa8_1920x1080.heic 848w, https://substackcdn.com/image/fetch/$s_!twUc!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe22a91b0-2f94-4a22-9e09-e862e5a6dfa8_1920x1080.heic 1272w, https://substackcdn.com/image/fetch/$s_!twUc!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe22a91b0-2f94-4a22-9e09-e862e5a6dfa8_1920x1080.heic 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h3>Canadian Cases</h3><p>On the lower end of this spectrum was one of the most recent espionage cases in Canada: Cameron Ortis. He was convicted of security of Information Act offences for transmitting classified information to a criminal organization and<a href="https://newsletter.insightthreatintel.com/p/cameron-ortis-trial-week-1"> offered to provide full documents for $20,000</a>. (As far as we know, no money was actually transmitted.)</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;a5d7bfe0-b0f3-41d1-b936-9b0e5ebbeab3&quot;,&quot;caption&quot;:&quot;On 12 September 2019, Cameron Ortis, Director General of the RCMP&#8217;s National Intelligence Co-Ordination Centre, was arrested in Ottawa, Ontario and charged the following day. The arrest shocked the Canadian intelligence community. The investigation (code-named Project Ace) and prosecution of Ortis is ongoing and much of the material is subject to a publ&#8230;&quot;,&quot;cta&quot;:null,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Canadian Spy: Project Ace (Cameron Ortis) &quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:33479672,&quot;name&quot;:&quot;Jessica Davis&quot;,&quot;bio&quot;:&quot;Jessica Davis is President of Insight Threat Intelligence and is the author of Women in Modern Terrorism: From Liberations Wars to Global Terrorism and the Islamic State (2017), and Illicit Money: Financing Terrorism in the 21st Century (2021).&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e312ae7c-114b-4e4f-9ce1-8bf50ddb7a27_2344x2049.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2021-10-14T13:00:49.558Z&quot;,&quot;cover_image&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/6666b6cb-30c0-49e4-ae5b-b8906ea47a20_2121x1414.jpeg&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/standing-brief-project-ace-cameron&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:42387755,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:1,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F09b767fc-6dde-4336-90bb-7806e0822653_900x900.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>Somehwere in the middle of the spectrum of espionage payments is Jeffrey Delisle, a Canadian sailor convicted of spying for Russia. He was also <a href="https://globalnews.ca/news/6585417/jeffrey-delisle-watchdog-russia-spy/">paid in cash</a>, prepaid cards, and by transfers from Russia, <a href="https://www.canlii.org/en/ns/nspc/doc/2012/2012nspc114/2012nspc114.html?resultIndex=1&amp;resultId=66c6694d97b6437cb2f29a4577ea679c&amp;searchId=2024-07-10T16:15:18:687/6c2ed7e17bea4adda0faeecdbab0a288&amp;searchUrlHash=AAAAAQAPSmVmZnJleSBEZWxpc2xlAAAAAAE">which occurred between 2007 and 2011</a>. He might have received as much as $144,000 or possibly more. </p><p>On the other end of the spectrum is the case of a Canadian doctor who is alleged to have been part of China&#8217;s Thousand Talents Program. Dr. Qiu worked at the National Microbiology Lab in Winnipeg and had an employment agreement with Hebei Medical University. She was compensated with funding of approximately CAD$1.2 million for science and research and was personally compensated CAD$ 15,000 per month and an additional $30,000 for leading laboratory operations when offside. Dr. Qiu and her husband had <a href="https://www.theglobeandmail.com/canada/article-winnipeg-scientists-fired-for-providing-confidential-information-to/">undisclosed bank</a> accounts in China&#8217;s Commercial Bank. In total, she was likely paid at least $210,000 (on top of her Canadian government salary and research funding), and possibly much more, for sharing information with Chinese research institutes. </p><p>Sometimes, no money appears to change hands. In 2022, <a href="https://www.cbc.ca/news/canada/montreal/chinese-spy-hydro-bail-1.6666526">Yuesheng Wang</a> was arrested by the RCMP and charged with economic espionage under the Security of Information Act. He faces three charges under the criminal code as well and is alleged to have given sensitive research and corporate information to a Chinese university and Chinese research centres, published scientific articles and filed patents with them. To date, there has been no information released about what, if any, financial compensation he received. </p><h3>US Cases</h3><p>Many cases of espionage in the US and plenty involve payment for services and information. For instance, an FBI official recently pled guilty to offences related to services he provided to Russian oligarch Oleg Deripaska to investigate a rival Russian oligarch and hid $225,000 in payments from an Albanian agent while still working for the FBI. In another case, Sgt. Korbein Shultz was arrested for providing sensitive security records in exchange for $<a href="https://www.bbc.com/news/world-us-canada-68508443">42,000 to a contact believed to be living in Hong Kong</a>. He appears to have been motivated by financial concerns and <a href="https://www.stripes.com/branches/army/2024-08-13/korbein-schultz-pleads-guilty-selling-sensitive-military-information-14856589.html">pled guilty</a> to selling sensitive information in August 2024.</p><p>In 2018, a former CIA officer was indicted on a charge of conspiring to commit espionage. Jerry Chun Shing Lee&nbsp;<a href="https://www.nytimes.com/2018/05/08/us/politics/cia-china-jerry-lee-indictment.html">was approached by</a>&nbsp;two Chinese intelligence officers who offered to pay him for information. The intelligence officers provided Lee with a series of email addresses through which they would communicate. The information Lee provided is believed to have&nbsp;<a href="https://www.nytimes.com/2017/05/20/world/asia/china-cia-spies-espionage.html">helped China unravel</a>&nbsp;the CIA's spy network in the country. Reports provide little insight into how much, or how, Lee was paid for the information he provided, although he '<a href="http://thehill.com/policy/national-security/386825-ex-cia-officer-charged-with-conspiracy-to-commit-espionage#.WvLAANTWAz4.twitter">made numerous unexplained cash deposits</a>'&#8217;, which could potentially have been cash payments for his services.</p><p>In 2021, a <a href="https://www.washingtonpost.com/national-security/2021/12/22/charles-lieber-harvard-professor-china-ties/">Harvard professor</a> was found guilty of concealing his ties to China and is alleged to have contributed to Chinese economic espionage. Lieber worked as part of China&#8217;s Thousand Talents Program and was paid hundreds of thousands of dollars. He was paid as much as $50,000 per month, $150,000 in living expenses, and $1.5 million in research grants. He received half of this money in US dollars, and the other half was deposited into Chinese bank accounts. (This case is remarkably similar to the case in Canada described above.)</p><p>In another case (from 2019), CIA Case Officer Kevin Patrick Mallory sold classified documents to Chinese intelligence for $25,000. He was motivated to sell the secrets because of debt and being behind on his mortgage. After a trip to the PRC, he had $16,500 in cash. </p><p>Also in 2019, former DIA officer Ron Rockwell Hansen pleaded guilty to transmitting information to the PRC. He received <a href="https://www.militarytimes.com/news/pentagon-congress/2019/09/25/ex-intelligence-officer-gets-10-years-in-espionage-case/">as much as $800,000</a> over several years for the secrets he provided. He often carried cash into the US after his trips abroad.</p><h3>Espionage and Cryptocurrency</h3><p>While cash is still an important part of espionage financing, cryptocurrency is increasingly prominent (in line with broader trends in illicit finance). In a 2021 case, a US navy employee and his wife are alleged to have tried to sell secrets about US nuclear submarines to a foreign country (some suggest this was likely France). The engineer allegedly asked for US$100,000 in cryptocurrency and, over the course of an undercover operation by the FBI, received payments of $10,000, $20,000,<a href="https://www.justice.gov/opa/pr/maryland-nuclear-engineer-and-spouse-arrested-espionage-related-charges"> and $70,000</a>. The payments were made using <a href="https://www.justice.gov/opa/press-release/file/1440946/download">Monero</a>. The couple were interested in selling their secrets for $5 million. </p><p>This method of paying sources/spies can be anonymous(ish), fast, relatively secure, and, when combined with other financing methods, can be effective for obscuring (or severing) the money trail. However, other methods of paying espionage networks remain common, including cash. In fact, money appears to be one of the main motivating factors for modern espionage, so understanding the financial trail is critical for detecting and disrupting these networks.</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;aad4bbba-2270-4df0-85b8-d203054b200f&quot;,&quot;caption&quot;:&quot;Welcome to a regular edition of Insight Intelligence. Finally, after a two-week interruption brought to us by the Ottawa occupation, we are back to our regularly-scheduled programming. Today we&#8217;re looking at the intersection of hawalas and cryptocurrency, so prepare to get very nerdy. As always, a warm welcome to our new subscribers (we are approaching &#8230;&quot;,&quot;cta&quot;:null,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Cryptocurrency Meets Hawala&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:33479672,&quot;name&quot;:&quot;Jessica Davis&quot;,&quot;bio&quot;:&quot;Jessica Davis is President of Insight Threat Intelligence and is the author of Women in Modern Terrorism: From Liberations Wars to Global Terrorism and the Islamic State (2017), and Illicit Money: Financing Terrorism in the 21st Century (2021).&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e312ae7c-114b-4e4f-9ce1-8bf50ddb7a27_2344x2049.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2022-02-10T14:00:43.141Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Ffc62e0df-ebfa-4b6a-9814-f7278c479500_2121x1414.jpeg&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/cryptocurrency-meets-hawala&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:48434356,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:2,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F09b767fc-6dde-4336-90bb-7806e0822653_900x900.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><h3>Cash Payments Still Reign</h3><p>Historically, cash has been the primary means of paying <a href="https://insightintel.substack.com/p/cold-war-foreign-influence-financing">spies and foreign actors</a> and remains a key component of espionage financing. More recently, <a href="https://www.scmp.com/news/world/europe/article/3144686/british-embassy-worker-germany-arrested-spying-russia?utm_content=article&amp;utm_medium=Social&amp;utm_source=Twitter#Echobox=1628675302-1">two arrests in Germany in 2021</a> of individuals suspected of spying for Russia also involved cash payments.</p><p>A German intelligence officer is also on trial for <a href="https://www.lexpress.fr/monde/un-agent-secret-allemand-soupconne-davoir-espionne-pour-les-russes-devant-les-juges-W3T42V6O3BEY7OPJRPMX77QIKI/?utm_term=Autofeed&amp;utm_medium=Social&amp;utm_source=Twitter#Echobox=1702438457">high treason</a>, suspected of espionage for Russia and providing classified information to Russian agents. Each man in the plot was compensated at least $400,000 Euros, paid in cash. </p><h4>Tradecraft Issues with Cash Payments</h4><p>Obscuring the money trail is important for spies who want to remain anonymous or have their activities be unattributable. Paying spies in cash also creates an issue&#8212;the individuals involved in the espionage activity have to figure out what to do with the cash and risk being exposed by anti-money laundering programs. For instance, a number of the cases detailed above involved cash payments of thousands of dollars. To use this money, the individuals involved would either have to pay for a lot of goods and services in cash (something that tends to raise alarm bells in an increasingly cashless society), or &#8220;place&#8221; the money into the financial system, which again, can raise alarm bells. </p><h3>Funding Espionage Activities </h3><p>Espionage isn&#8217;t free, and even well-funded intelligence organizations have reasons to fund their activities outside of the official budget, like removing oversight or further hiding their activities from adversary countries. </p><p>Russia is one country that has done this, including through the formal financial system. In 2013,&nbsp;<a href="https://www.business.dk/finans/whistleblower-alert-putin-family-and-russian-intelligence-used-danske-bank-to">Danske Bank was made aware</a>&nbsp;of potential money laundering through its branch in Estonia. The whistleblower report suggested that the bank was being used by Putin's family and a group of accused money launderers to launder funds and that the Russian Intelligence Service, the FSB, was also using it for the same purpose. The bank may also have been used in sanctions evasion. Danske Bank is&nbsp;<a href="https://www.wsj.com/articles/danske-bank-money-laundering-probe-involves-150-billion-of-transactions-1536317086">now examining</a>&nbsp;a further $150 billion in transactions received between 2007 and 2015.</p><p>Sometimes, a cover can also be a source of funds. For instance, <a href="https://thenightly.com.au/politics/australia/canberra-cafe-double-drummer-serves-aussie-spy-agency-office-of-national-intelligence-had-china-links-c-13893361">a Canberra cafe</a> that serves Australia&#8217;s top spies, federal police, and intelligence officials was found to be co-owned by a Chinese politician honoured by Xi Jinping for work advancing the Chinese Communist Party&#8217;s ambitions at home and abroad. This cafe might have generated profits, while also serving as a front for intelligence collection. </p><p>And in Zimbabwe, the state&#8217;s Central Intelligence Organization <a href="https://thesentry.org/reports/cio-business-network-zimbabwe/">enagages in private business as a source of off-budget financing</a>. This includes mushroom farming, exporting baby elephants, and diamond mining. One entity involved is Terrestrial Holdings, a business conglomerate of companies involved in hemp, solar energy, coal mining, tourism, and golf. The funds generated from these business ventures are separate from their official budget, meaning they can fund activities outside the normal budgetary (and oversight) processes. </p><p>Detecting espionage financing is just as difficult as detecting other forms of illicit financing, and possibly more so because of a lack of typologies and indicators of espionage financing. While there are a growing number of cases, we are still some distance from having reliable patterns that can be detected in financial transactions. However, these cases do provide important insight for individuals investigating suspected espionage financing: cash, bank transfers, and cryptocurrency transactions are all good places to start looking for the money trail. </p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/p/espionage-financing?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/p/espionage-financing?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p><em>&#169; 2024 Insight Threat Intelligence Ltd. All Rights Reserved.<br><br>This newsletter and its contents are protected by Canadian copyright law. Except as otherwise provided for under Canadian copyright law, this newsletter and its contents may not be copied, published, distributed, downloaded or otherwise stored in a retrieval system, transmitted or converted, in any form or by any means, electronic or otherwise, without the prior written permission of the copyright owner.</em></p>]]></content:encoded></item><item><title><![CDATA[Is Negotiating with Terrorists a Valid Counter-Terrorism Method?]]></title><description><![CDATA[Primer]]></description><link>https://newsletter.insightthreatintel.com/p/is-negotiating-with-terrorists-a</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/is-negotiating-with-terrorists-a</guid><dc:creator><![CDATA[Elena Martynova]]></dc:creator><pubDate>Thu, 16 May 2024 13:02:30 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!mrVf!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f2620a4-818a-4d6f-8e5b-a15c92b863c6_1020x1020.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Kidnapping for ransom is a lucrative business that generates significant funds for terrorist groups each year. The policy of not negotiating with terrorists, <a href="https://www.chathamhouse.org/2022/01/we-do-not-negotiate-terrorists-why">famously declared by President Nixon</a> during a 1970s hostage crisis in Sudan, has been an integral position of American and Canadian foreign policy for decades. Despite this public stance, the reality of negotiation as a counter terrorism measure is complex. States face the dilemma of whether to engage with terrorists to save lives or to maintain a hard line to deter future acts of terrorism. Since 2010, <a href="https://journals.sagepub.com/doi/10.1177/00207020221130308">over $1 billion has been paid to a variety of terrorist organizations</a> to free hostages. This raises questions about the effectiveness of the non-negotiation policy: is it a realistic approach for counter terrorism, and can it be employed to increase chances of successful outcomes?</em></p><p><em>This primer presents an overview of the common arguments for and against negotiating with terrorists, as well as negotiation best practices. For a look at the effect of paying ransoms for terrorism itself, check out an article that Jessica co-authored in 2022:</em></p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;9acecea1-0248-4804-920b-5c8138f0da0a&quot;,&quot;caption&quot;:&quot;Hello to all the new subscribers to Insight Intelligence &#8212; we&#8217;ve crossed the 2k threshold! Thank you very much to all who have been sharing this newsletters with colleagues. It makes a big difference in growing our community! This week&#8217;s article is an open-access one that I co-authored with Alex Wilner at Carleton University. We&#8217;ve been doing lots of wo&#8230;&quot;,&quot;cta&quot;:null,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Paying terrorist ransoms: Frayed consensus, uneven outcomes &amp; undue harm&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:33479672,&quot;name&quot;:&quot;Jessica Davis&quot;,&quot;bio&quot;:&quot;Jessica Davis is President of Insight Threat Intelligence and is the author of Women in Modern Terrorism: From Liberations Wars to Global Terrorism and the Islamic State (2017), and Illicit Money: Financing Terrorism in the 21st Century (2021).&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e312ae7c-114b-4e4f-9ce1-8bf50ddb7a27_2344x2049.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2022-10-04T13:01:08.771Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fded0f44c-60c0-4459-ac07-ffeb6bd2e5ef_1758x1208.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/paying-terrorist-ransoms-frayed-consensus&quot;,&quot;section_name&quot;:&quot;Commentary&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:75278002,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:2,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F09b767fc-6dde-4336-90bb-7806e0822653_900x900.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!mrVf!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f2620a4-818a-4d6f-8e5b-a15c92b863c6_1020x1020.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!mrVf!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f2620a4-818a-4d6f-8e5b-a15c92b863c6_1020x1020.jpeg 424w, https://substackcdn.com/image/fetch/$s_!mrVf!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f2620a4-818a-4d6f-8e5b-a15c92b863c6_1020x1020.jpeg 848w, https://substackcdn.com/image/fetch/$s_!mrVf!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f2620a4-818a-4d6f-8e5b-a15c92b863c6_1020x1020.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!mrVf!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f2620a4-818a-4d6f-8e5b-a15c92b863c6_1020x1020.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!mrVf!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f2620a4-818a-4d6f-8e5b-a15c92b863c6_1020x1020.jpeg" width="470" height="470" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1f2620a4-818a-4d6f-8e5b-a15c92b863c6_1020x1020.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1020,&quot;width&quot;:1020,&quot;resizeWidth&quot;:470,&quot;bytes&quot;:163987,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!mrVf!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f2620a4-818a-4d6f-8e5b-a15c92b863c6_1020x1020.jpeg 424w, https://substackcdn.com/image/fetch/$s_!mrVf!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f2620a4-818a-4d6f-8e5b-a15c92b863c6_1020x1020.jpeg 848w, https://substackcdn.com/image/fetch/$s_!mrVf!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f2620a4-818a-4d6f-8e5b-a15c92b863c6_1020x1020.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!mrVf!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f2620a4-818a-4d6f-8e5b-a15c92b863c6_1020x1020.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"><em>Image created by OpenAI&#8217;s Dall-E</em></figcaption></figure></div><h3><strong>What do we mean by negotiation, and who is involved?</strong></h3><p>Negotiation, fundamentally, is a process of discussion aimed at reaching an agreement. In the realm of counter terrorism, engaging in negotiations with terrorist groups is often equated with governments yielding to their demands. In reality, these discussions can involve a broader set of tactics and actors beyond the state. While typically envisioned scenarios involve governments paying ransoms in response to hostage situations, negotiations can also encompass other forms of objectives and concessions, such as <a href="https://www.reuters.com/world/how-iran-us-clinched-rare-detainee-swap-funds-release-2023-09-18/">prisoner exchanges</a> or <a href="https://www.usip.org/sites/default/files/SR240Cronin_3a.pdf">offers of amnesty</a>. Additionally, other parties, including families and businesses, can trigger or influence the outcome of negotiations and are necessary to understand the full scope of the strategy.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Insight Monitor is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h3><strong>Policy Positions of Different States</strong></h3><p>Many Western nations, including the United States, Canada, and the United Kingdom, officially maintain a policy of not negotiating with terrorists, particularly in hostage situations. This stance was asserted by Canada during the kidnapping of <a href="https://nationalpost.com/feature/two-canadians-kidnapped-and-killed-in-philippines-canada-still-refuses-to-negotiate">John Ridsdel and Robert Hall</a> by Abu Sayyaf in the Philippines in 2015. After Canada held firm to the policy of non-negotiation and not meeting ransom demands, <a href="https://nationalpost.com/feature/two-canadians-kidnapped-and-killed-in-philippines-canada-still-refuses-to-negotiate">Ridsdel and Hall were executed</a>. The event was controversial and although it highlighted the consequences of a non-negotiation doctrine, Canada <a href="https://nationalpost.com/feature/two-canadians-kidnapped-and-killed-in-philippines-canada-still-refuses-to-negotiate">still officially holds the same policies</a> regarding hostage-taking.</p><p>Regardless of the official position of states, negotiations still happen regularly. Presently, Israel has ongoing <a href="https://www.voanews.com/a/push-for-truce-ramps-up-as-israel-pummels-gaza/7588155.html">mediated discussions with Hamas</a> on a truce and hostage deal. Historically, the <a href="https://www.theguardian.com/commentisfree/2018/may/04/eta-ira-peace-northern-ireland-spain">Spanish government has engaged with ETA</a>, the <a href="https://www.theguardian.com/commentisfree/2018/may/04/eta-ira-peace-northern-ireland-spain">British government with the IRA</a>, and the <a href="https://www.nytimes.com/2007/09/02/world/asia/02hostage.html">Taliban alleged that South Korea paid more than $20 million for the freedom of 19 hostages</a>. Despite official statements to the contrary, it was reported that Canadian diplomat Robert Fowler's release from captivity in Niger <a href="https://globalnews.ca/news/597495/fowler-freed-for-about-1m-letter-reveals/">involved a ransom payment of $1.1 million in 2009</a>. The United States, while generally adhering to a non-negotiation policy, has also faced its own controversies, <a href="https://www.rand.org/pubs/articles/2014/the-bergdahl-taliban-prisoner-exchange-isnt-new-but.html">such as the exchange of five Taliban prisoners for Sergeant Bowe Bergdahl in 2014</a>. These instances highlight that, despite public declarations and posturing, negotiations with terrorists do occur.</p><p>In addition to state-level negotiations, there are instances where families and private corporations take matters into their own hands. The case of <a href="https://www.cbc.ca/news/world/canadian-amanda-lindhout-freed-in-somalia-1.816979">Canadian Amanda Lindhout</a> in Somalia is one example, where her family raised funds for her release when the government ceased its involvement. Private companies also often pay ransoms for their employees, with a significant number of <a href="https://www.thestar.com/news/canada/canada-does-not-negotiate-with-terrorists-except/article_28b924e1-d67a-573b-bd14-db9097155a34.html">Fortune 500 companies carrying kidnap and ransom insurance</a> for workers in high-risk areas. This insurance typically activates specialized risk-response teams to handle the situations.</p><h3><strong>Benefits of Non-Negotiation</strong></h3><p>Several key arguments advocating for non-negotiation with terrorists and emphasize the potential dangers or counterproductive outcomes. Firstly, paying ransoms offers no assurance of the hostages' safe return and could embolden terrorist groups by creating a lucrative business model out of kidnappings. This not only sets a precedent but could also lead to an <a href="https://www.sciencedirect.com/science/article/pii/S0176268016300143?via%3Dihub">increase in such incidents</a>, as terrorists perceive hostage-taking as a successful strategy to extort resources from governments.</p><p>Agreeing to terrorists' demands can inadvertently support their operations. The influx of <a href="https://journals.sagepub.com/doi/10.1177/00207020221130308">funds from ransoms</a> might sustain a terrorist group&#8217;s control over territories, enable them to compensate their members, and finance further terrorist activities and abductions. Such outcomes contribute to the persistence of the groups (although this is contested by Jessica&#8217;s recent research).</p><p>Negotiating with terrorists might also <a href="https://www.jstor.org/stable/26299800">inadvertently lend legitimacy to the terrorist groups, their objectives, and their methods</a>. It sends a signal that their tactics are effective, potentially inspiring others and lending credibility to their causes from the viewpoints of their supporters. This recognition can lead to an escalation of violence, as negotiations could be exploited by militant factions to buy time to regroup or plan further attacks. Additionally, the process of negotiation can <a href="https://www.usip.org/sites/default/files/SR240Cronin_3a.pdf">create fractures within terrorist groups</a>, emboldening hardline splinters to perpetuate even more extreme forms of violence to undermine any potential peace efforts.</p><p>From a political standpoint, engaging in talks with terrorists can contribute to the <a href="https://www.jstor.org/stable/20032216">destabilization of democratic states</a>. It can shake the confidence in the government, particularly if negotiations are perceived as yielding to the demands of terrorists. This not only undermines the democratic process but also weakens the broader norm of resolving conflicts through non-violent means. International efforts to delegitimize and combat terrorism <a href="https://www.jstor.org/stable/20032216">can be undercut</a>.</p><p>Lastly, history has shown that settlements reached through negotiations with terrorist <a href="https://www.icct.nl/event/negotiating-terrorists">groups are often fragile</a>, leading to a recurrent cycle of violence. The rationale behind a non-negotiation policy is based on the idea of removing any incentive for terrorist organizations to take hostages. By unequivocally denying potential gains from such acts, the aim is to ultimately discourage terrorists from engaging in hostage-taking as a strategy.</p><h3><strong>Drawbacks to Non-Negotiation</strong></h3><p>The refusal to negotiate with terrorists has not conclusively deterred the kidnapping of citizens from the United States, the United Kingdom, or Canada, nor has it consistently facilitated their release. Hostage-taking continues, with perpetrators often indifferent to the national policies of their victims' countries of origin. To kidnappers, foreigners can represent potential income and have propaganda value, <a href="https://www.thestar.com/news/canada/canada-does-not-negotiate-with-terrorists-except/article_28b924e1-d67a-573b-bd14-db9097155a34.html">irrespective of their nation's stance on negotiation</a>.</p><p>Internationally, <a href="https://www.theglobeandmail.com/opinion/article-does-the-global-consensus-on-refusing-to-pay-ransoms-to-terrorists/">there is a consensus among the global community to deter ransom payments</a>, but adherence to this pact varies, casting doubt on the collective resolve to a strict non-negotiation policy. The practice of negotiating, while publicly denied, occurs under the guise of various pretexts. Germany, for instance, has been reported to have paid a ransom disguised as humanitarian aid to <a href="https://www.nytimes.com/2014/07/30/world/africa/ransoming-citizens-europe-becomes-al-qaedas-patron.html">secure the release of hostages in Mali</a>. Similarly, third-party intermediaries are sometimes engaged to conduct negotiations indirectly, sidestepping official policies. This inconsistency highlights the challenges of a unified global approach to terrorism and raises questions about the effectiveness of non-negotiation as a deterrent.</p><p>High-ranking officials and diplomats are often prioritized in secretive negotiations, contrary to public statements. Companies with the means to carry ransom insurance tend to secure the release of their employees through private means. Those less protected, such as freelancers and solo travelers, could find themselves at the <a href="https://www.thestar.com/news/canada/canada-does-not-negotiate-with-terrorists-except/article_28b924e1-d67a-573b-bd14-db9097155a34.html">end of the priority list</a>, relying on their families who face the moral dilemma and legal risks of financing potential terrorist activities.</p><p>When negotiations are off the table, governments might resort to military interventions, which carry their own risks and uncertainties. For example, South African Pierre Korkie, who was <a href="https://www.nytimes.com/2014/12/08/world/middleeast/hostage-nearly-free-on-ransom-killed-during-seal-raid.html">supposedly in the process of being freed from Al Qaeda after his family reportedly negotiated a ransom deal</a>, was killed along with 9 others during a failed rescue attempt by American forces in 2014.</p><p>The assumption that paying ransoms leads to an increase in terrorist attacks isn't as clear-cut as it might seem. In <a href="https://newsletter.insightthreatintel.com/p/paying-terrorist-ransoms-frayed-consensus?utm_source=publication-search">Jessica's article</a>, the research shows a more nuanced picture: while one studied group did experience an uptick in violence correlated with receiving ransoms, for other groups, ransom payments were linked to either a decrease in the number of attacks or a reduction in their severity. This suggests that the effects of ransom payments on terrorist activity are more complicated than the prevailing logic might suggest.</p><p>The strict adherence to a non-negotiation stance has negatively impacted the development of best practices for handling similar situations. While the public rhetoric remains firm, the behind-the-scenes actions suggest a need to re-evaluate and potentially establish a more pragmatic and informed approach to negotiating with terrorist groups.</p><h3><strong>Best Practices for Negotiation</strong></h3><p>Engagement with terrorist organizations isn't always advantageous and heavily depends on the specifics of each situation. Nevertheless, there are certain considerations that could help increase the chances of positive outcomes in negotiations:</p><h3><em><strong>Understanding the Terrorist</strong></em></h3><p>The initial best practice involves comprehensive information gathering about the terrorist. This step is crucial to discern whether the group is more <a href="https://www.jstor.org/stable/20032216">ideologically driven or pragmatic</a> in its approach, which can influence their openness to negotiations. For example, organizations like Hamas and Hezbollah, despite their ideologies, have participated in pragmatic political behaviors. They are likely to be better candidates for negotiations than, for example, extremely ideologically driven lone actors. Distinguishing whether the captors are <a href="https://www.jstor.org/stable/20032216">purely politically motivated or also engage in criminal activities for profit</a> is vital, as this influences the strategy and potential incentives offered during negotiations. If hostages are taken for ideological reasons, it could be harder to come to an agreement as the terrorists <a href="https://brill.com/view/journals/hjd/3/2/article-p179_4.xml">make no demands and instead consider their actions as purely punitive</a>.</p><p>It's also essential to determine if the group has <a href="https://www.jstor.org/stable/20032216">state sponsorship</a>, which can affect their adherence to negotiated agreements. Depending on the relationship between the sponsor and the group, there could be more value in negotiating directly with the state.</p><h3><em><strong>Early Engagement and Controlled Implementation</strong></em></h3><p>Engaging early with the group is essential, as <a href="https://www.salon.com/2015/07/12/we_must_negotiate_with_terrorists_the_dirty_secret_our_government_does_not_want_to_admit/">trust-building</a> is a gradual process that requires time. &nbsp;Early discussions not only help in understanding the kidnappers' demands and capabilities but also in <a href="https://www.chathamhouse.org/2022/01/we-do-not-negotiate-terrorists-why">confirming who actually holds the hostages</a>. This is crucial to ensure negotiations are not misled by external parties falsely claiming involvement. Professional negotiators often advocate for initiating dialogue promptly and managing any necessary ransom payments with extreme caution. This includes using marked bills and conducting surveillance to trace the funds, <a href="https://finance.yahoo.com/news/why-g8-pact-stop-paying-132047111.html">potentially aiding in a rescue operation or even dismantling a financial network</a>.</p><h3><strong>Future Outlook</strong></h3><p>The lucrative nature of kidnapping and hostage-taking, especially as a method to raise funds, means that it is unlikely to stop regardless of any international pact to stop negotiating with terrorists. The practice continues and, in many instances, has resulted in the safe return of hostages. Negotiation, though not universally applicable or morally unambiguous, can sometimes lead to outcomes that align with counter terrorism objectives, including the potential for constructive engagement.</p><p>Current trends do not suggest significant shifts in the stances of many Western countries, though Canada might consider policy adjustments to <a href="https://www.thestar.com/news/canada/the-rcmp-is-now-telling-canadian-hostages-families-they-won-t-be-prosecuted-for-negotiating/article_9833a263-3233-5ee5-a6e5-81648c435a61.html">decriminalize ransom payments by families</a>, a point of divergence with the US approach. In the wider context, it is crucial to learn from past mistakes in tactics and to view negotiation as it truly is&#8212;an opportunity for two parties to reach a consensus. This perspective shifts the narrative from viewing negotiation and concessions as signs of governmental weakness to recognizing them as strategic tools in conflict resolution.</p><p>The impact of negotiations on public opinion remains an area for further exploration. It's important to assess whether public sentiment actually aligns with non-negotiation policies and whether the public understands the potential benefits of negotiating, particularly in terms of sustaining trust in government responses during crises. Furthermore, while media coverage can pressure governments to take action, it can also obscure decision-making during negotiations and potentially escalate conflicts. Additional research into the most effective media management strategies would also valuable. Finally, understanding how negotiation outcomes vary depending on the lead actor&#8212;whether it's a state, business, or private entity&#8212;could also provide important insights into the general odds and factors of negotiation success.</p><p>Negotiation is not an all-encompassing solution and is filled with complexities, such as public dissent and political opposition, which can impede its progress. Therefore, while keeping the negotiation channel open is valuable, it is equally important to recognize the many factors that influence its success. While best practices provide a foundation for negotiation strategies with terrorist groups, they highlight that there is no uniform solution for every scenario. Ultimately, negotiation should remain an option within the counter terrorism toolkit, employed cautiously and with a clear understanding of its potential and limitations.</p><p><em>Did you find this post insightful? Share it with a colleague!</em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/p/is-negotiating-with-terrorists-a?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/p/is-negotiating-with-terrorists-a?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://insightthreatintelligence.thinkific.com/bundles/tf-analysis" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!dU_K!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8782aff-c9c3-4da5-a41b-acd2326801de.heic 424w, https://substackcdn.com/image/fetch/$s_!dU_K!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8782aff-c9c3-4da5-a41b-acd2326801de.heic 848w, https://substackcdn.com/image/fetch/$s_!dU_K!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8782aff-c9c3-4da5-a41b-acd2326801de.heic 1272w, https://substackcdn.com/image/fetch/$s_!dU_K!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8782aff-c9c3-4da5-a41b-acd2326801de.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!dU_K!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8782aff-c9c3-4da5-a41b-acd2326801de.heic" width="514" height="514" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b8782aff-c9c3-4da5-a41b-acd2326801de.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1080,&quot;width&quot;:1080,&quot;resizeWidth&quot;:514,&quot;bytes&quot;:204417,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:&quot;https://insightthreatintelligence.thinkific.com/bundles/tf-analysis&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!dU_K!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8782aff-c9c3-4da5-a41b-acd2326801de.heic 424w, https://substackcdn.com/image/fetch/$s_!dU_K!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8782aff-c9c3-4da5-a41b-acd2326801de.heic 848w, https://substackcdn.com/image/fetch/$s_!dU_K!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8782aff-c9c3-4da5-a41b-acd2326801de.heic 1272w, https://substackcdn.com/image/fetch/$s_!dU_K!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8782aff-c9c3-4da5-a41b-acd2326801de.heic 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Our terrorist financing analysis course caters to researchers, intelligence, law enforcement, and compliance professionals to help them learn about terrorist financing, and analyze suspicious patterns and activities more effectively. Sign up today!</p><p><em>&#169; 2024 Insight Threat Intelligence Ltd. All Rights Reserved.<br><br>This newsletter and its contents are protected by Canadian copyright law. Except as otherwise provided for under Canadian copyright law, this newsletter and its contents may not be copied, published, distributed, downloaded or otherwise stored in a retrieval system, transmitted or converted, in any form or by any means, electronic or otherwise, without the prior written permission of the copyright owner.</em></p>]]></content:encoded></item><item><title><![CDATA[Exploiting the Dark Web for Terrorist Financing]]></title><description><![CDATA[Primer]]></description><link>https://newsletter.insightthreatintel.com/p/exploiting-the-dark-web-for-terrorist</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/exploiting-the-dark-web-for-terrorist</guid><dc:creator><![CDATA[Elena Martynova]]></dc:creator><pubDate>Thu, 18 Apr 2024 13:02:21 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/816f88af-1993-47a0-bb7d-299e6cfcac88_1024x1024.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>The dark web, often portrayed as a nebulous and shadowy corner of the internet, serves many purposes ranging from the innocuous to the illicit. The dark web plays a critical role for individuals in <a href="https://www.imf.org/en/Publications/fandd/issues/2019/09/the-truth-about-the-dark-web-kumar">oppressive regimes</a>, offering a platform for free expression and access to unfiltered information, while in more open societies, it supports whistleblowing and privacy. A significant portion of dark websites offer legitimate services such as forums, chat rooms, and marketplaces. One computer security firm&#8217;s <a href="https://www.imf.org/en/Publications/fandd/issues/2019/09/the-truth-about-the-dark-web-kumar">study in 2016</a> found that more than half of the domains they examined were legal. Furthermore, the Onion Router (Tor), an open-source  network that facilitates anonymous browsing on the dark web, is used by major organizations such as <a href="https://www.imf.org/en/Publications/fandd/issues/2019/09/the-truth-about-the-dark-web-kumar">leading newspapers, Facebook, and even the CIA</a>, to emphasize their commitment to privacy and secure communication channels.</em></p><p><em>However, the dark web also presents opportunities for misuse. This primer explores key reasons terrorists use the dark web, as well as its role in financing terrorist organizations and operations.</em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/subscribe?"><span>Subscribe now</span></a></p><h3><strong>Main Terrorist Uses of the Dark Web</strong></h3><h4><em><strong>Identity Protection and Secure Communication</strong></em></h4><p>One main reason terrorists use the dark web is to protect their identities and evade detection. By leveraging the anonymity mechanisms that the dark web offers, terrorists can explore, purchase, and communicate on websites without the risk of easy detection. For example, in August 2013, the <a href="https://www.wilsoncenter.org/sites/default/files/media/documents/publication/going_darker_challenge_of_dark_net_terrorism.pdf">US National Security Agency intercepted</a> encrypted communications between al-Qaeda leader Ayman Al-Zawahiri and Nasir Al-Wuhaysi, the head of Yemen-based al-Qaeda in the Arabian Peninsula. This intercept revealed that al-Qaeda had been using the dark web for regular communication between its leaders worldwide <a href="https://www.wilsoncenter.org/sites/default/files/media/documents/publication/going_darker_challenge_of_dark_net_terrorism.pdf">for a decade</a>. That said, secure messaging platforms like Telegram have emerged as more accessible alternatives for terrorists, bypassing the need for the technical knowledge required to navigate the web through the Tor browser.</p><h4><em><strong>Propaganda Repository and Presence Mirroring</strong></em></h4><p>Another use of the dark web by terrorists is as a repository for propaganda. Unlike surface websites, which are vulnerable to being removed by law enforcement or platform providers, the dark web offers <a href="https://podcast.techagainstterrorism.org/1684819/11485688-the-dark-web">more stability in hosting propaganda materials</a>. For instance, ISIL has turned to the dark web to post news and propaganda. Following the November 2015 attacks in Paris, the hacktivist group &#8216;Anonymous&#8217; <a href="https://www.wilsoncenter.org/sites/default/files/media/documents/publication/going_darker_challenge_of_dark_net_terrorism.pdf">launched an operation</a> that led to the takedown of hundreds of ISIL-associated websites. In response, ISIL's media outlet, Al-Hayat Media Center, pivoted to posting content on the dark web. The group also <a href="https://www.wilsoncenter.org/sites/default/files/media/documents/publication/going_darker_challenge_of_dark_net_terrorism.pdf">shared links and guides</a> on an ISIL-associated forum on how to access their new dark website.</p><p>Some terrorist organizations regularly post duplicate content on both the surface and dark web to <a href="https://podcast.techagainstterrorism.org/1684819/11485688-the-dark-web">serve as a backup</a> and ensure their online activities can continue even if their main websites are taken down. However, a direct dark web presence among terrorist groups is not overly common. A study <a href="https://podcast.techagainstterrorism.org/1684819/11485688-the-dark-web">tracking 200 terrorist domains</a> found that only 10 had a mirrored presence on the dark web. This suggests that although the dark web is used by terrorist groups for purposes such as securing communication channels and disseminating propaganda, it is not their primary means of establishing an online presence.</p><h3><strong>Financing Specific Uses</strong></h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!0TDp!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4bc0c3ed-f438-4157-b4d0-90afcd948413_732x488.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!0TDp!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4bc0c3ed-f438-4157-b4d0-90afcd948413_732x488.png 424w, https://substackcdn.com/image/fetch/$s_!0TDp!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4bc0c3ed-f438-4157-b4d0-90afcd948413_732x488.png 848w, https://substackcdn.com/image/fetch/$s_!0TDp!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4bc0c3ed-f438-4157-b4d0-90afcd948413_732x488.png 1272w, https://substackcdn.com/image/fetch/$s_!0TDp!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4bc0c3ed-f438-4157-b4d0-90afcd948413_732x488.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!0TDp!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4bc0c3ed-f438-4157-b4d0-90afcd948413_732x488.png" width="732" height="488" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4bc0c3ed-f438-4157-b4d0-90afcd948413_732x488.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:488,&quot;width&quot;:732,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:211320,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!0TDp!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4bc0c3ed-f438-4157-b4d0-90afcd948413_732x488.png 424w, https://substackcdn.com/image/fetch/$s_!0TDp!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4bc0c3ed-f438-4157-b4d0-90afcd948413_732x488.png 848w, https://substackcdn.com/image/fetch/$s_!0TDp!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4bc0c3ed-f438-4157-b4d0-90afcd948413_732x488.png 1272w, https://substackcdn.com/image/fetch/$s_!0TDp!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4bc0c3ed-f438-4157-b4d0-90afcd948413_732x488.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h4><em><strong>Soliciting Donations Through Cryptocurrency Transactions</strong></em></h4><p>Criminals often <a href="https://www.wilsoncenter.org/sites/default/files/media/documents/publication/going_darker_challenge_of_dark_net_terrorism.pdf">leverage the anonymity</a> that digital currencies such as Bitcoin, Monero, and other coins offer. These currencies are particularly appealing for conducting transactions on the dark web. Terrorist organizations have recognized this potential and increasingly turned to cryptocurrencies to solicit and receive donations discreetly.</p><p>In 2015, <a href="https://www.vice.com/en/article/evgk5z/new-bill-asks-homeland-security-to-investigate-whether-terrorists-use-bitcoin">IS posted its Bitcoin address on the dark web</a>, allowing sympathizers to send funds directly. The trend continued in November 2017, when the Akhbar al-Muslimin website, known for publishing news from IS, <a href="https://www.wilsoncenter.org/sites/default/files/media/documents/publication/going_darker_challenge_of_dark_net_terrorism.pdf">initiated an online fundraising campaign</a>. This campaign explicitly requested donations in Bitcoin, directing supporters to a dedicated donation page on <a href="https://www.wilsoncenter.org/sites/default/files/media/documents/publication/going_darker_challenge_of_dark_net_terrorism.pdf">CoinGate, a Bitcoin trading site</a>. Each article on the site was accompanied by a link encouraging donations, with a note advising not to use zakat funds.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://www.vice.com/en/article/evgk5z/new-bill-asks-homeland-security-to-investigate-whether-terrorists-use-bitcoin" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!BCLp!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b52d839-6f79-4d69-9a0d-1bc8605a8f32_1098x568.png 424w, https://substackcdn.com/image/fetch/$s_!BCLp!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b52d839-6f79-4d69-9a0d-1bc8605a8f32_1098x568.png 848w, https://substackcdn.com/image/fetch/$s_!BCLp!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b52d839-6f79-4d69-9a0d-1bc8605a8f32_1098x568.png 1272w, https://substackcdn.com/image/fetch/$s_!BCLp!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b52d839-6f79-4d69-9a0d-1bc8605a8f32_1098x568.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!BCLp!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b52d839-6f79-4d69-9a0d-1bc8605a8f32_1098x568.png" width="1098" height="568" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5b52d839-6f79-4d69-9a0d-1bc8605a8f32_1098x568.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:568,&quot;width&quot;:1098,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1124236,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://www.vice.com/en/article/evgk5z/new-bill-asks-homeland-security-to-investigate-whether-terrorists-use-bitcoin&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!BCLp!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b52d839-6f79-4d69-9a0d-1bc8605a8f32_1098x568.png 424w, https://substackcdn.com/image/fetch/$s_!BCLp!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b52d839-6f79-4d69-9a0d-1bc8605a8f32_1098x568.png 848w, https://substackcdn.com/image/fetch/$s_!BCLp!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b52d839-6f79-4d69-9a0d-1bc8605a8f32_1098x568.png 1272w, https://substackcdn.com/image/fetch/$s_!BCLp!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b52d839-6f79-4d69-9a0d-1bc8605a8f32_1098x568.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>Figure: <a href="https://www.vice.com/en/article/evgk5z/new-bill-asks-homeland-security-to-investigate-whether-terrorists-use-bitcoin">2015 IS Dark Web Bitcoin Donation Campaign Image</a></em></p><p>To facilitate the adoption of the dark web as a fundraising platform, specific instructional documents are often disseminated on the surface web. For example, a PDF document entitled &#8220;<a href="https://www.jstor.org/stable/26297596">Bitcoin and the Charity of Violent Physical Struggle</a>&#8221; was circulated in July 2014. Although the group affiliation of the document is unknown, it provided instructions on using the dark web to financially contribute to a campaign to support Jihad.</p><p>There are also <a href="https://www.fatf-gafi.org/content/dam/fatf-gafi/reports/Crowdfunding-Terrorism-Financing.pdf.coredownload.inline.pdf">anecdotal reports of crowdfunding platforms</a> on the dark web being explored as potential channels for other terrorist groups, potentially from the far-right, to finance their activities. However, concrete details and official information on this aspect remain limited, highlighting the challenges in monitoring and combating the use of digital currencies for illicit fundraising on the dark web.</p><h4><em><strong>Sale of Illicit Goods and Services</strong></em></h4><p>The dark web is infamous for its marketplaces where illegal goods and services can be bought and sold with a degree of anonymity. Terrorist groups have reportedly exploited the dark web to <a href="https://www.imf.org/en/Publications/fandd/issues/2019/09/the-truth-about-the-dark-web-kumar">sell drugs</a>, weapons, <a href="https://www.jstor.org/stable/26297596">human organs</a>, <a href="https://www.academia.edu/20813843/Dark_net_Social_Media_and_Extremism_Addressing_Indonesian_Counter_terrorism_on_the_Internet">looted antiquities</a>, <a href="https://www.jstor.org/stable/26297596">stolen oil</a>, and even <a href="https://www.imf.org/en/Publications/fandd/issues/2019/09/the-truth-about-the-dark-web-kumar">services such as hacking</a>. The marketplaces could also enable terrorist organizations to advertise recruitment incentives, such as salaries and benefits, to attract new members.</p><p>In addition to selling or advertising illicit goods, terrorists use the dark web to procure items crucial for their operations, ranging from <a href="https://henryjacksonsociety.org/wp-content/uploads/2018/04/Terror-in-the-Dark.pdf">instructional manuals and fraudulent documents, to firearms and their components</a>. For example, the perpetrator of the 2016 Munich Shooting executed the attack using <a href="https://www.wsj.com/articles/munich-shooter-bought-recommissioned-pistol-on-dark-net-1469366686">a weapon purchased from a dark web</a> marketplace. However, the trade in weapons on the dark web is not as common as for electronic products like stolen identities&#8212;due largely to the logistical challenges of smuggling physical items. Terrorists have instead shown interest in acquiring blueprints for <a href="https://podcast.techagainstterrorism.org/1684819/11485688-the-dark-web">3D-printed weapons</a> to circumvent some of the challenges associated with transporting conventional arms.</p><p>Although there are instances of terrorists both making sales and purchases on the dark web, it is <a href="https://henryjacksonsociety.org/wp-content/uploads/2018/04/Terror-in-the-Dark.pdf">challenging to verify the associated transactions</a>. An inability to establish the origin of illicit goods sold on the dark web adds another layer of complexity to the challenge of disrupting the activities.</p><h4><em><strong>Access to Money Laundering Techniques and Financial Facilitators</strong></em></h4><p>The dark web not only facilitates the sale and purchase of illicit goods and services but also acts as a hub for financial crimes, including money laundering. By offering both instructional resources and access to individuals skilled in obscuring the origins of illegally obtained money, the dark web has become a tool for terrorists looking to launder their funds.</p><p>One of the primary methods used for money laundering on the dark web involves cryptocurrency mixing and tumbling services. These services anonymize transactions by blending the digital currency of multiple users, making it difficult to trace the funds back to their source. This anonymity is particularly appealing to terrorists seeking to disguise the financial trails of their operations. In early 2023, the US Department of Justice took down ChipMixer, a dark web mixing service that processed over <a href="https://www.justice.gov/opa/pr/justice-department-investigation-leads-takedown-darknet-cryptocurrency-mixer-processed-over-3">$3 billion in unlawful transactions</a>, some of which could have been tied to terrorist activity.</p><p>Additionally, some dark web marketplaces <a href="https://www.darkreading.com/identity-access-management-security/dark-web-investigation-exposes-underground-marketplace-for-tls-ssl-certificates">sell fraudulent documentation</a> that can assist criminals in setting up shell companies, which can then be used to funnel illicit funds through seemingly legitimate businesses. Potential terrorist exploitation of the shell company resources complicates law enforcement efforts to track and intercept illicit financing.</p><p>Access to stolen identities is another crucial aspect of money laundering facilitated by the dark web. Terrorists can use these identities to create bank accounts or acquire financial products, further obfuscating the movement of funds. This tactic not only aids in laundering money but also contributes to a broader spectrum of financial crimes, including fraud and identity theft. For instance, a Jihadist group in Indonesia used the dark web to <a href="https://www.wilsoncenter.org/sites/default/files/media/documents/publication/going_darker_challenge_of_dark_net_terrorism.pdf">solicit donations in Bitcoins</a> from both national and international supporters. After leveraging a stolen identity obtained from the dark web, the group then hacked a foreign exchange. trading site to steal points from a member, ultimately amassing <a href="https://www.wilsoncenter.org/sites/default/files/media/documents/publication/going_darker_challenge_of_dark_net_terrorism.pdf">$600,000 for their operations</a>.</p><p>Although there is limited evidence available, the dark web could also act as a marketplace for hiring corrupt financial service providers. These individuals or entities could be willing to overlook legal requirements in exchange for compensation, providing services such as unauthorized bank transfers, false accounting, and other methods of laundering funds. Their expertise and willingness to participate in illegal activities would make them valuable for terrorists aiming to integrate their funds into the global financial system without detection.</p><h4><strong>Responses to Terrorist Use of the Dark Web</strong></h4><p>Efforts to dismantle terrorist operations on the dark web, such as taking down specific sites, often resemble a <a href="https://podcast.techagainstterrorism.org/1684819/11485688-the-dark-web">"whack-a-mole" exercise</a>&#8212;challenging and not necessarily effective in the long run as new replacements inevitably pop up. The Silk Road takedown, for example, highlighted the <a href="https://podcast.techagainstterrorism.org/1684819/11485688-the-dark-web">possibility of disrupting dark web activities</a> but also emphasized the difficulties in eradicating such platforms altogether.</p><p>Additionally, while the dark web offers some advantages for terrorist organizations, the <a href="https://podcast.techagainstterrorism.org/1684819/11485688-the-dark-web">lack of regular search capabilities and the technical expertise needed by users</a> can make it less appealing. Terrorists are more inclined to use tools such as VPNs to hide their identities while <a href="https://podcast.techagainstterrorism.org/1684819/11485688-the-dark-web">operating on the surface web</a>, where they can achieve greater visibility and impact. Consequently, counter-terrorism strategies focused more on the surface web, where terrorist propaganda, recruitment, and fundraising efforts have the potential to reach a far wider audience, are likely beneficial.</p><p>However, as technology progresses, creating tools and methods to track terrorist activities on the dark web remains necessary. Initiatives such as the Defense Advanced Research Projects Agency's <a href="https://www.wilsoncenter.org/sites/default/files/media/documents/publication/going_darker_challenge_of_dark_net_terrorism.pdf">MEMEX program</a>, designed to better index the deep web, and the European law enforcement's <a href="https://cordis.europa.eu/article/id/394987-scouring-the-dark-web-for-terrorist-activity">DANTE program</a>, which aims to identify and link various online actions to possible terrorist operations and fundraising activities, are important disruption efforts. These initiatives also emphasize the value of conducting further research to better understand and mitigate the terrorist use of the dark web for financing activities.</p><p><em>Did you find this post insightful? Share it with a colleague! </em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/p/exploiting-the-dark-web-for-terrorist?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/p/exploiting-the-dark-web-for-terrorist?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p>Don&#8217;t forget that our Terrorist Financing Analysis eLearning course is open for new enrolments. Learn more about how terrorists use various technologies for financing purposes by signing up today.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://insightthreatintelligence.thinkific.com/bundles/tf-analysis" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!dU_K!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8782aff-c9c3-4da5-a41b-acd2326801de.heic 424w, https://substackcdn.com/image/fetch/$s_!dU_K!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8782aff-c9c3-4da5-a41b-acd2326801de.heic 848w, https://substackcdn.com/image/fetch/$s_!dU_K!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8782aff-c9c3-4da5-a41b-acd2326801de.heic 1272w, https://substackcdn.com/image/fetch/$s_!dU_K!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8782aff-c9c3-4da5-a41b-acd2326801de.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!dU_K!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8782aff-c9c3-4da5-a41b-acd2326801de.heic" width="514" height="514" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b8782aff-c9c3-4da5-a41b-acd2326801de.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1080,&quot;width&quot;:1080,&quot;resizeWidth&quot;:514,&quot;bytes&quot;:204417,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:&quot;https://insightthreatintelligence.thinkific.com/bundles/tf-analysis&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!dU_K!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8782aff-c9c3-4da5-a41b-acd2326801de.heic 424w, https://substackcdn.com/image/fetch/$s_!dU_K!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8782aff-c9c3-4da5-a41b-acd2326801de.heic 848w, https://substackcdn.com/image/fetch/$s_!dU_K!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8782aff-c9c3-4da5-a41b-acd2326801de.heic 1272w, https://substackcdn.com/image/fetch/$s_!dU_K!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8782aff-c9c3-4da5-a41b-acd2326801de.heic 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>&#169; 2024 Insight Threat Intelligence Ltd. All Rights Reserved.<br><br>This newsletter and its contents are protected by Canadian copyright law. Except as otherwise provided for under Canadian copyright law, this newsletter and its contents may not be copied, published, distributed, downloaded or otherwise stored in a retrieval system, transmitted or converted, in any form or by any means, electronic or otherwise, without the prior written permission of the copyright owner.</em></p>]]></content:encoded></item><item><title><![CDATA[The Terrorist Financing Blueprint]]></title><description><![CDATA[Insight's model of terrorist financing]]></description><link>https://newsletter.insightthreatintel.com/p/the-terrorist-financing-blueprint</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/the-terrorist-financing-blueprint</guid><dc:creator><![CDATA[Elena Martynova]]></dc:creator><pubDate>Tue, 26 Mar 2024 13:00:36 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!XrLK!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38e346de-fd95-429a-8f33-8fb285403dc0.heic" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Hello <strong>Insight Monitor</strong> subscribers! Today we have something a bit different for you, based on a special request. We&#8217;re publishing an infographic of our terrorist financing blueprint. This is a one-page summary of how terrorists finance their activities. It&#8217;s a simple representation of what can often be very complex. I hope you find it useful, and we&#8217;re open to feedback, so let us know what you think! </em></p><p>~<em>Jess</em></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!XrLK!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38e346de-fd95-429a-8f33-8fb285403dc0.heic" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!XrLK!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38e346de-fd95-429a-8f33-8fb285403dc0.heic 424w, https://substackcdn.com/image/fetch/$s_!XrLK!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38e346de-fd95-429a-8f33-8fb285403dc0.heic 848w, https://substackcdn.com/image/fetch/$s_!XrLK!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38e346de-fd95-429a-8f33-8fb285403dc0.heic 1272w, https://substackcdn.com/image/fetch/$s_!XrLK!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38e346de-fd95-429a-8f33-8fb285403dc0.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!XrLK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38e346de-fd95-429a-8f33-8fb285403dc0.heic" width="432" height="432" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/38e346de-fd95-429a-8f33-8fb285403dc0.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:432,&quot;bytes&quot;:226816,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!XrLK!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38e346de-fd95-429a-8f33-8fb285403dc0.heic 424w, https://substackcdn.com/image/fetch/$s_!XrLK!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38e346de-fd95-429a-8f33-8fb285403dc0.heic 848w, https://substackcdn.com/image/fetch/$s_!XrLK!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38e346de-fd95-429a-8f33-8fb285403dc0.heic 1272w, https://substackcdn.com/image/fetch/$s_!XrLK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38e346de-fd95-429a-8f33-8fb285403dc0.heic 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Image created by Dall-E</figcaption></figure></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Insight Monitor is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!W9Eu!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F764bb31e-77e2-4a8c-bb6c-d9da2d13f03b_800x3358.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!W9Eu!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F764bb31e-77e2-4a8c-bb6c-d9da2d13f03b_800x3358.png 424w, https://substackcdn.com/image/fetch/$s_!W9Eu!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F764bb31e-77e2-4a8c-bb6c-d9da2d13f03b_800x3358.png 848w, https://substackcdn.com/image/fetch/$s_!W9Eu!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F764bb31e-77e2-4a8c-bb6c-d9da2d13f03b_800x3358.png 1272w, https://substackcdn.com/image/fetch/$s_!W9Eu!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F764bb31e-77e2-4a8c-bb6c-d9da2d13f03b_800x3358.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!W9Eu!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F764bb31e-77e2-4a8c-bb6c-d9da2d13f03b_800x3358.png" width="800" height="3358" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/764bb31e-77e2-4a8c-bb6c-d9da2d13f03b_800x3358.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:3358,&quot;width&quot;:800,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:583619,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!W9Eu!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F764bb31e-77e2-4a8c-bb6c-d9da2d13f03b_800x3358.png 424w, https://substackcdn.com/image/fetch/$s_!W9Eu!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F764bb31e-77e2-4a8c-bb6c-d9da2d13f03b_800x3358.png 848w, https://substackcdn.com/image/fetch/$s_!W9Eu!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F764bb31e-77e2-4a8c-bb6c-d9da2d13f03b_800x3358.png 1272w, https://substackcdn.com/image/fetch/$s_!W9Eu!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F764bb31e-77e2-4a8c-bb6c-d9da2d13f03b_800x3358.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>And if you want to learn more about terrorism financing, check out our course. It has everything you need to become an expert in analyzing terrorist financing trends, methods, and issues: </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://insightthreatintelligence.thinkific.com/bundles/tf-analysis" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!dU_K!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8782aff-c9c3-4da5-a41b-acd2326801de.heic 424w, https://substackcdn.com/image/fetch/$s_!dU_K!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8782aff-c9c3-4da5-a41b-acd2326801de.heic 848w, https://substackcdn.com/image/fetch/$s_!dU_K!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8782aff-c9c3-4da5-a41b-acd2326801de.heic 1272w, https://substackcdn.com/image/fetch/$s_!dU_K!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8782aff-c9c3-4da5-a41b-acd2326801de.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!dU_K!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8782aff-c9c3-4da5-a41b-acd2326801de.heic" width="514" height="514" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b8782aff-c9c3-4da5-a41b-acd2326801de.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1080,&quot;width&quot;:1080,&quot;resizeWidth&quot;:514,&quot;bytes&quot;:204417,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:&quot;https://insightthreatintelligence.thinkific.com/bundles/tf-analysis&quot;,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!dU_K!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8782aff-c9c3-4da5-a41b-acd2326801de.heic 424w, https://substackcdn.com/image/fetch/$s_!dU_K!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8782aff-c9c3-4da5-a41b-acd2326801de.heic 848w, https://substackcdn.com/image/fetch/$s_!dU_K!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8782aff-c9c3-4da5-a41b-acd2326801de.heic 1272w, https://substackcdn.com/image/fetch/$s_!dU_K!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8782aff-c9c3-4da5-a41b-acd2326801de.heic 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Our terrorist financing analysis course caters to researchers, intelligence, law enforcement, and compliance professionals to help them learn about terrorist financing, and analyze suspicious patterns and activities more effectively. Sign up today!</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/p/the-terrorist-financing-blueprint?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/p/the-terrorist-financing-blueprint?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p><em>&#169; 2024 Insight Threat Intelligence Ltd. All Rights Reserved.<br><br>This newsletter and its contents are protected by Canadian copyright law. Except as otherwise provided for under Canadian copyright law, this newsletter and its contents may not be copied, published, distributed, downloaded or otherwise stored in a retrieval system, transmitted or converted, in any form or by any means, electronic or otherwise, without the prior written permission of the copyright owner.</em></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Insight Monitor is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Unexplained Wealth Orders Come to Canada]]></title><description><![CDATA[Province of British Columbia the first to issue UWO in Canadian history]]></description><link>https://newsletter.insightthreatintel.com/p/unexplained-wealth-orders-come-to</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/unexplained-wealth-orders-come-to</guid><dc:creator><![CDATA[Jessica Davis, PhD]]></dc:creator><pubDate>Thu, 21 Dec 2023 14:00:48 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!7pMO!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fea355081-f455-4a8c-a9db-edc782772b42_774x470.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Welcome to our last newsletters of 2023. We&#8217;re going to take a short hiatus over the Christmas holiday and be back with a bang in January. We&#8217;ve got a great year of content lined up for you! As always, feel free to suggest topics that are of interest, and please share this with your network to help grow our community. But most of all, have a good holiday, and a great start to the new year! Thanks for caring about illicit finance. </em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/p/unexplained-wealth-orders-come-to?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/p/unexplained-wealth-orders-come-to?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p>In November, the province of British Columbia issued its <a href="https://news.gov.bc.ca/releases/2023PSSG0084-001876">first unexplained wealth order</a>, and the first unexplained wealth order in Canadian history. </p><p>The order targets <a href="https://www.vancouverisawesome.com/highlights/bc-files-first-unexplained-wealth-order-in-canada-for-gulf-island-home-7905548">two BC residents</a>, and requires that they explain how they got $1 million to buy a home on Salt Spring Island. The couple are believed to be beneficiaries of a major stock fraud scheme (a <a href="https://www.vancouverisawesome.com/highlights/bc-files-first-unexplained-wealth-order-in-canada-for-gulf-island-home-7905548">pump and dump arrangement</a> involving a Swiss firm that hid the beneficial owners of the companies). One of the subjects of the order <a href="https://www.vancouverisawesome.com/highlights/bc-files-first-unexplained-wealth-order-in-canada-for-gulf-island-home-7905548">bought the home for $1 million cash</a> in 2017, and listed her occupation as &#8220;home maker&#8221;.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Insight Monitor is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!7pMO!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fea355081-f455-4a8c-a9db-edc782772b42_774x470.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!7pMO!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fea355081-f455-4a8c-a9db-edc782772b42_774x470.png 424w, https://substackcdn.com/image/fetch/$s_!7pMO!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fea355081-f455-4a8c-a9db-edc782772b42_774x470.png 848w, https://substackcdn.com/image/fetch/$s_!7pMO!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fea355081-f455-4a8c-a9db-edc782772b42_774x470.png 1272w, https://substackcdn.com/image/fetch/$s_!7pMO!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fea355081-f455-4a8c-a9db-edc782772b42_774x470.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!7pMO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fea355081-f455-4a8c-a9db-edc782772b42_774x470.png" width="774" height="470" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ea355081-f455-4a8c-a9db-edc782772b42_774x470.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:470,&quot;width&quot;:774,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:720173,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!7pMO!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fea355081-f455-4a8c-a9db-edc782772b42_774x470.png 424w, https://substackcdn.com/image/fetch/$s_!7pMO!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fea355081-f455-4a8c-a9db-edc782772b42_774x470.png 848w, https://substackcdn.com/image/fetch/$s_!7pMO!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fea355081-f455-4a8c-a9db-edc782772b42_774x470.png 1272w, https://substackcdn.com/image/fetch/$s_!7pMO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fea355081-f455-4a8c-a9db-edc782772b42_774x470.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">The house in question, obtained from a realtor&#8217;s website. The listing has since been removed. </figcaption></figure></div><h3>Unexplained Wealth Orders, in Brief</h3><p>UWOs compel people to explain how they acquired their wealth in cases where there are suspicions that it came from criminal activity. UWOs do not require a criminal conviction in order for assets to be seized. In other jurisdictions, UWOs are sometimes&nbsp; <a href="https://rusi.org/explore-our-research/publications/commentary/unexplained-wealth-orders-uk-what-will-year-bring">viewed as an investigative tool</a> to help build evidence for a criminal case, because in responding to the UWOs, individuals might reveal additional information that can be useful for securing a conviction. </p><p>UWOs are seen as tools for addressing complex money laundering and professional money laundering networks, and might be particularly useful where there is (and will likely always be) insufficient evidence for a criminal conviction, such as in cases where international crime has occurred and the ability to get evidence is limited. </p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;e4af119b-5303-41fa-9012-841bc0f6c55e&quot;,&quot;caption&quot;:&quot;This week, Canada got its fall economic statement, included in which were a number of amendments to our anti-money laundering / counter-terrorist financing regime. Today, in our inaugural &#8220;primer&#8221;, we&#8217;re taking a look at professional money laundering networks. These primers are intended to explain illicit finance and intelligence issues to the broader p&#8230;&quot;,&quot;cta&quot;:null,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Professional Money Laundering Networks&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:33479672,&quot;name&quot;:&quot;Jessica Davis&quot;,&quot;bio&quot;:&quot;Jessica Davis is President of Insight Threat Intelligence and is the author of Women in Modern Terrorism: From Liberations Wars to Global Terrorism and the Islamic State (2017), and Illicit Money: Financing Terrorism in the 21st Century (2021).&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e312ae7c-114b-4e4f-9ce1-8bf50ddb7a27_2344x2049.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2023-11-23T14:00:41.465Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa252d452-2a22-474b-b9d9-24e8a28a1364_876x976.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/professional-money-laundering-networks&quot;,&quot;section_name&quot;:&quot;Primers&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:139055772,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:8,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F09b767fc-6dde-4336-90bb-7806e0822653_900x900.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>These orders compel people to explain how they acquired their wealth in cases where there are suspicions that it came from criminal activity. They can also target assets that are used to engage in unlawful activity, and where the property or a portion of the property was acquired or is maintained as a result of unlawful activity. </p><h3>Use in Canada</h3><p>In British Columbia, the Civil Forfeiture Act was amended to include legislation to allow for unexplained wealth orders. These orders target&nbsp; assets of <a href="https://www.bclaws.gov.bc.ca/civix/document/id/complete/statreg/00_05029_01#division_d1e1881">more than $75,000</a> and are meant to address some of the deficiencies identified in the Cullen Commission. </p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;fe661c71-83e2-45ee-ae96-25ba784bf924&quot;,&quot;caption&quot;:&quot;Welcome to a special (Friday!) edition of Insight Intelligence, brought to you by my annoyance with Canada&#8217;s anti-money laundering regime. This week, the Cullen Commission released its much-anticipated report on money laundering in British Columbia. The mandate of the commission was to look at a variety of different aspects of money laundering in the pr&#8230;&quot;,&quot;cta&quot;:null,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;A missed opportunity: Canada's Cullen Commission&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:33479672,&quot;name&quot;:&quot;Jessica Davis&quot;,&quot;bio&quot;:&quot;Jessica Davis is President of Insight Threat Intelligence and is the author of Women in Modern Terrorism: From Liberations Wars to Global Terrorism and the Islamic State (2017), and Illicit Money: Financing Terrorism in the 21st Century (2021).&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e312ae7c-114b-4e4f-9ce1-8bf50ddb7a27_2344x2049.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2022-06-17T13:00:46.704Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F00c3f1d5-cc44-473a-b633-64d6b0c4dc9a_1355x751.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/a-missed-opportunity-canadas-cullen&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:59754377,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:4,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F09b767fc-6dde-4336-90bb-7806e0822653_900x900.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p><a href="https://news.gov.mb.ca/news/index.html?item=60779&amp;posted=2023-11-17">Manitoba </a>might soon also introduce legislation to create unexplained wealth orders, likely also as part of its civil forfeiture act. </p><p>The use of UWOs in Canada are by no means settled law. There are significant civil liberties concerns, particularly whether they <a href="https://www.cbc.ca/news/canada/british-columbia/unexplained-wealth-orders-1.6661863#:~:text=In%20a%20statement%20released%20in,raise%20profound%20civil%20liberties%20implications.%22&amp;text=%22They%20erode%20privacy%20rights%2C%20undermine,and%20seizure%2C%22%20she%20said.">undermine the presumption of innocence and if they subvert the rights that shield people from unreasonable search and seizure</a>. </p><p>Whatever happens, these orders are likely to end up at the Supreme Court and will almost certainly undergo a challenge under the <a href="https://www.justice.gc.ca/eng/csj-sjc/rfc-dlc/ccrf-ccdl/cases.html">Canadian Charter of Rights and Freedoms. </a> My view is that these orders are an important tool, but are not a panacea for solving our problems with addressing money laundering, proceeds of crime, and financial crime in general. If they withstand the inevitable charter test, they will likely have to be used sparingly. Canada will need to continue to strengthen our existing financial crime framework and develop new tools for our toolbox to counter adaptive threats. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://insightthreatintelligence.thinkific.com/bundles/tf-analysis" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!dU_K!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8782aff-c9c3-4da5-a41b-acd2326801de.heic 424w, https://substackcdn.com/image/fetch/$s_!dU_K!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8782aff-c9c3-4da5-a41b-acd2326801de.heic 848w, https://substackcdn.com/image/fetch/$s_!dU_K!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8782aff-c9c3-4da5-a41b-acd2326801de.heic 1272w, https://substackcdn.com/image/fetch/$s_!dU_K!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8782aff-c9c3-4da5-a41b-acd2326801de.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!dU_K!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8782aff-c9c3-4da5-a41b-acd2326801de.heic" width="514" height="514" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b8782aff-c9c3-4da5-a41b-acd2326801de.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1080,&quot;width&quot;:1080,&quot;resizeWidth&quot;:514,&quot;bytes&quot;:204417,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:&quot;https://insightthreatintelligence.thinkific.com/bundles/tf-analysis&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!dU_K!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8782aff-c9c3-4da5-a41b-acd2326801de.heic 424w, https://substackcdn.com/image/fetch/$s_!dU_K!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8782aff-c9c3-4da5-a41b-acd2326801de.heic 848w, https://substackcdn.com/image/fetch/$s_!dU_K!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8782aff-c9c3-4da5-a41b-acd2326801de.heic 1272w, https://substackcdn.com/image/fetch/$s_!dU_K!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8782aff-c9c3-4da5-a41b-acd2326801de.heic 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Our terrorist financing analysis course is open for the next two months. In February, we&#8217;re going to close it to new registrations while we do an update, and re-open sometime in mid-2024. So sign up today if this is on your to-do list for 2023 or 2024! All current students maintain access to course content, forever. </p><p><em>&#169; 2023 Insight Threat Intelligence Ltd. All Rights Reserved.<br><br>This newsletter and its contents are protected by Canadian copyright law. Except as otherwise provided for under Canadian copyright law, this newsletter and its contents may not be copied, published, distributed, downloaded or otherwise stored in a retrieval system, transmitted or converted, in any form or by any means, electronic or otherwise, without the prior written permission of the copyright owner.</em></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Insight Monitor is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[RCMP Intelligence]]></title><description><![CDATA[Primer]]></description><link>https://newsletter.insightthreatintel.com/p/rcmp-intelligence</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/rcmp-intelligence</guid><dc:creator><![CDATA[Brett Williams]]></dc:creator><pubDate>Thu, 30 Nov 2023 14:00:46 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Odv1!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F91971196-0a9a-4ffc-8a7d-ecf71e4277cf_800x2000.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Welcome to our second Insight Monitor Primer. Today we&#8217;re welcoming a new author, ITI researcher Brett W! With the recent prosecution of Cameron Ortis, RCMP intelligence activities and the organizations' abilities to collaborate with other Canadian security agencies are in the news. This primer on the RCMP&#8217;s intelligence functions describes the activities and limitations of the organization in this domain.</em></p><h2>History</h2><p>The RCMP <a href="https://web.archive.org/web/20080421215951/http://www.cbc.ca/news/background/rcmp/">was formed in 1920 as the Federal police force in Canada</a>, merging two existing police forces with national security and intelligence as part of its mandate. In 1950, the RCMP Special Branch (along with a national security intelligence function) was created. Special Branch was restructured as the Directorate of Security and Intelligence in 1962, then renamed the Security Service in 1970. In 1984,&nbsp; <a href="https://web.archive.org/web/20070624182416/http://www.csis-scrs.gc.ca/en/about_us/history_artifacts/history/brf_csis_index.asp">many intelligence functions were transferred to the civilian Canadian Security Intelligence Service (CSIS)</a>.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/subscribe?"><span>Subscribe now</span></a></p><p>Throughout the 1920&#8217;s and 1930&#8217;s, the primary focus of RCMP intelligence was on Marxist, anarchist,&nbsp; labour and fascist individuals organizing inside Canada; as part of this policing activity, the RCMP often <a href="https://archive.org/details/spyingoncanadian0000keal">targeted people based on ethnicit</a>y. Following WWII, the RCMP returned to monitoring a broad range of leftist, <a href="https://www.mqup.ca/just-watch-us-products-9780773552821.php">feminist</a> , labour and Quebec separatist causes from the <a href="https://archive.org/details/spying101rcmpsse0000hewi">1950&#8217;s to the 1980&#8217;s</a> .</p><p>RCMP Intelligence collection regularly violated the law, and after <a href="https://publications.gc.ca/site/eng/472603/publication.html">a parliamentary inquiry in 1969</a> and very public intelligence failures (including <a href="https://www.vice.com/en/article/eva8da/story-of-how-canadian-police-committed-arson-to-stop-a-black-panther-meeting">burning down a barn</a>) the federal government launched the <a href="https://epe.lac-bac.gc.ca/100/200/301/pco-bcp/commissions-ef/mcdonald1979-81-eng/mcdonald1979-81-eng.htm">McDonald Commission </a>in 1981. The Commission recommended the creation of a civilian intelligence agency and many of the RCMP&#8217;s existing <a href="https://web.archive.org/web/20070624182416/http://www.csis-scrs.gc.ca/en/about_us/history_artifacts/history/brf_csis_index.asp">intelligence staff</a> and undercover <a href="https://thewalrus.ca/front-man/">agents</a> were transferred to the new CSIS in 1984.</p><p>The creation of CSIS did not remove policing functions related to national security from the RCMP. However, it did split responsibilities between CSIS and the RCMP; the resulting intelligence sharing issues created serious limitations, including the failure <a href="https://archive.org/details/lossoffaithhowai0000bola">detect and disrupt the Air India bombing</a>.</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;8e2e1a6c-6e2b-43c7-bb86-40066ea19f09&quot;,&quot;caption&quot;:&quot;On this day 37 years ago, a suitcase bomb planted by Canada-based Sikh militants on Air India Flight 182 exploded and killed all 329 people aboard. After departure from Toronto, the plane crashed off the coast of Ireland. Decades later, the bombing remains&quot;,&quot;cta&quot;:null,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Air India Flight 182: The Transactions leading to Terrorism&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:85208154,&quot;name&quot;:&quot;Elena Martynova&quot;,&quot;bio&quot;:&quot;Research Analyst &quot;,&quot;photo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/f22ef549-0c81-4b18-bf1f-e4d127287ef6_674x674.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2022-06-23T13:00:56.417Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc499147-1f3c-4275-9809-ae83102a31fe_2121x1414.jpeg&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/air-india-flight-182-the-transactions&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:60648710,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:0,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F09b767fc-6dde-4336-90bb-7806e0822653_900x900.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>Following the September 11th attacks in the United States, the Canadian Parliament expanded antiterrorism legislation and resources for both organizations. This added to the <a href="https://archive.org/details/insidecanadianin00hami">overlap between the RCMP's national security policing mandate and CSIS&#8217;s intelligence collection and dissemination mandate.</a>&nbsp;</p><p>&nbsp;In 2<a href="https://thewalrus.ca/the-rise-and-fall-of-a-double-agent/">015, the RCMP's intelligence functions were reorganized under the National Intelligence Coordination Centre</a> with the goal of&nbsp; improved information sharing and cooperation.&nbsp;</p><p>Understanding the history of the RCMP&#8217;s colonial policing roots, the abuses of mid-20th-century RCMP intelligence gathering, and the overlap of functions with CSIS helps explain many aspects of the Cameron Ortis trial including the persistent failures of <a href="https://globalnews.ca/news/7632988/senior-rcmp-officer-joins-lawsuit-ortis/">basic management oversight</a> and <a href="https://thewalrus.ca/the-rise-and-fall-of-a-double-agent/">the lack of standard controls</a> on intelligence material.</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;3c68aeb5-d6d1-424a-9b6d-72c7cbd15692&quot;,&quot;caption&quot;:&quot;Last week was week 1 of Cameron Ortis&#8217;s trial. He was arrested as part of Project Ace on 12 September, 2019. He was the Director General of the RCMP&#8217;s National Intelligence Co-ordination Centre at the time of his arrest, and is currently facing charges under the Security of Information Act relating to unauthorized disclosure of special operational information (specifically to criminal entities). This newsletter provides a short overview of what we learned during the first week of his trial.&quot;,&quot;cta&quot;:null,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Cameron Ortis Trial: Week 1 &quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:33479672,&quot;name&quot;:&quot;Jessica Davis&quot;,&quot;bio&quot;:&quot;Jessica Davis is President of Insight Threat Intelligence and is the author of Women in Modern Terrorism: From Liberations Wars to Global Terrorism and the Islamic State (2017), and Illicit Money: Financing Terrorism in the 21st Century (2021).&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e312ae7c-114b-4e4f-9ce1-8bf50ddb7a27_2344x2049.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2023-10-10T13:01:14.629Z&quot;,&quot;cover_image&quot;:&quot;https://images.unsplash.com/photo-1537498425277-c283d32ef9db?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw3fHxjb21wdXRlcnxlbnwwfHx8fDE2OTY4OTA5Mjd8MA&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/cameron-ortis-trial-week-1&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:137817580,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:0,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F09b767fc-6dde-4336-90bb-7806e0822653_900x900.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Odv1!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F91971196-0a9a-4ffc-8a7d-ecf71e4277cf_800x2000.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Odv1!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F91971196-0a9a-4ffc-8a7d-ecf71e4277cf_800x2000.png 424w, https://substackcdn.com/image/fetch/$s_!Odv1!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F91971196-0a9a-4ffc-8a7d-ecf71e4277cf_800x2000.png 848w, https://substackcdn.com/image/fetch/$s_!Odv1!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F91971196-0a9a-4ffc-8a7d-ecf71e4277cf_800x2000.png 1272w, https://substackcdn.com/image/fetch/$s_!Odv1!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F91971196-0a9a-4ffc-8a7d-ecf71e4277cf_800x2000.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Odv1!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F91971196-0a9a-4ffc-8a7d-ecf71e4277cf_800x2000.png" width="800" height="2000" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/91971196-0a9a-4ffc-8a7d-ecf71e4277cf_800x2000.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:2000,&quot;width&quot;:800,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:172565,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Odv1!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F91971196-0a9a-4ffc-8a7d-ecf71e4277cf_800x2000.png 424w, https://substackcdn.com/image/fetch/$s_!Odv1!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F91971196-0a9a-4ffc-8a7d-ecf71e4277cf_800x2000.png 848w, https://substackcdn.com/image/fetch/$s_!Odv1!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F91971196-0a9a-4ffc-8a7d-ecf71e4277cf_800x2000.png 1272w, https://substackcdn.com/image/fetch/$s_!Odv1!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F91971196-0a9a-4ffc-8a7d-ecf71e4277cf_800x2000.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2>RCMP Intelligence</h2><p>The RCMP&#8217;s direction and intelligence priorities are the responsibility of the Parliament of Canada, Parliamentary committees, and the Minister of Public Safety. The Government of Canada&#8217;s priorities are set through a five month process that begins with consultations with the intelligence community and concludes with cabinet approval and the issuance of ministerial directives by appropriate ministers.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a> Once the agenda has been set, detailed planning is directed by headquarters in Ottawa under the RCMP Commissioner.</p><p>The specific laws that authorize the RCMP to act are the <a href="https://laws-lois.justice.gc.ca/eng/acts/r-10/">Royal Canadian Mounted Police Act, 1985</a> and other<a href="https://www.rcmp-grc.gc.ca/en/list-acts"> public safety Acts</a>.&nbsp; Oversight of RCMP intelligence functions comes from the <a href="https://www.pm.gc.ca/en/cabinet-committee-mandate-and-membership#public-security">Cabinet Committee on Global Affairs and Public Security</a> and the <a href="https://www.ourcommons.ca/committees/en/SECU">Standing Committee on Public Safety and National Security</a> Direct supervision of the RCMP comes from the Minister of Public Safety and the RCMP Commissioner</p><h3>Planning</h3><p>RCMP national intelligence planning is centralized in Ottawa. The RCMP&#8217;s intelligence strategy is outlined for &#8216;<a href="https://rcmp.ca/en/federal-policing">Federal Policing</a>&#8217;, which covers national security policing, international policing, financial crime, protective operations, organized crime, &amp; cybercrime. Planning is also done for &#8216;<a href="https://www.rcmp-grc.gc.ca/sps/index-eng.htm">Specialized Policing Services&#8217;</a>, which covers criminal intelligence analysis and sensitive investigations.</p><p>The structural split between what the RCMP classifies as &#8216;Criminal Intelligence&#8217; and &#8216;National Security Intelligence&#8217; is a key point of ambiguity. The conflict over what is &#8216;National Security&#8217; and what is &#8216;Criminal&#8217; is what <a href="https://utorontopress.com/9781442662384/secret-service/">various</a> <a href="https://archive.org/details/spyingoncanadian0000keal">scholars</a> and the <a href="https://epe.lac-bac.gc.ca/100/200/301/pco-bcp/commissions-ef/mcdonald1979-81-eng/mcdonald1979-81-eng.htm">McDonald Commission report</a>&nbsp; identify as an example of the politicization of RCMP policing powers.&nbsp;</p><h3>Collection</h3><p>Collection of national security intelligence&nbsp;using signals intelligence against foreign nationals is the responsibility of the <a href="https://www.cse-cst.gc.ca/en">Communications Security Establishment </a>(CSE); intelligence from certain human sources is the responsibility of CSIS. The RCMP also collects criminal intelligence information, acts as an information broker between police forces within Canada, and collaborates with foreign police services / INTERPOL on prosecuting international criminal networks. The RCMP collects some human source criminal intelligence, but the distinction is ambiguous and can overlap with national security intelligence collection.&nbsp;</p><p>For domestic and transnational organized crime, the RCMP maintains the <a href="https://cisc-scrc.gc.ca/index-eng.htm">Criminal Intelligence Service Canada </a>(CISC) and for cybercrime the <a href="https://www.rcmp-grc.gc.ca/en/nc3">National Cybercrime Coordination Centre</a> (NC3). Some areas of concern with RCMP intelligence collection is the use of technologies like <a href="https://www.theglobeandmail.com/canada/british-columbia/article-rcmp-phone-tracking-continues-despite-privacy-concerns/">cell site simulators</a> and <a href="https://globalnews.ca/news/9097868/nuttall-and-korody-sue/">undercover agents</a> who use entrapment.</p><h3>Analysis</h3><p>Through the CISC and N3, the RCMP analyzes intelligence to produce&nbsp;<a href="https://open.canada.ca/en/search/ati/reference/e1723c36a4c53f7f21a4e0a1ad20e639">intelligence</a>&nbsp;<a href="https://open.canada.ca/en/search/ati/reference/e1723c36a4c53f7f21a4e0a1ad20e639">briefs</a>. National Security intelligence generally flows from CSE and CSIS to the RCMP through <a href="https://www.canada.ca/en/security-intelligence-service/corporate/transparency/csis-rcmp-framework-for-cooperation.html#toc1">Strategic Case Management (SCM) and Tactical Deconfliction (TD)</a>, processes that can involve meetings or written communication called Use Letters.&nbsp;</p><p>The <a href="https://en.wikipedia.org/wiki/National_Intelligence_Coordination_Centre">National Intelligence Coordination Centre </a>(NICC), located in RCMP headquarters, acts as a central information sharing location between CSIS, CSE, Financial Transactions and Reports Analysis Centre of Canada (FINTRAC), the <a href="https://en.wikipedia.org/wiki/Five_Eyes">Five Eyes</a> (a <a href="https://en.wikipedia.org/wiki/UKUSA_Agreement">formal intelligence sharing agreement</a> between Canada, the United States, the United Kingdom, Australia and New Zealand ),&nbsp;and RCMP leadership. The prosecution of the former director of the NICC, Cameron Ortis, is providing insight into what is usually a highly secretive analysis process.</p><p>Within the NICC , Operations Research was <a href="https://newsletter.insightthreatintel.com/p/cameron-ortis-trial-week-1?utm_source=%2Fsearch%2Fortis&amp;utm_medium=reader2">set up to integrate information to inform strategic and tactical responses </a>by the RCMP. The <a href="https://newsletter.insightthreatintel.com/p/canada-needs-damage-control-and-transparency?lli=1&amp;utm_source=%2Fsearch%2Fortis&amp;utm_medium=reader2">NICC has broad access </a>to operational RCMP case files, provincial police agency information, intelligence provided by Canadian intelligence agencies, intelligence provided by allies, and sensitive Canadian corporate cybersecurity and financial information. </p><h3>Dissemination</h3><p>Intelligence is primarily disseminated to the RCMP&#8217;s <a href="https://web.archive.org/web/20230710215800/https://www.rcmp-grc.gc.ca/nsci-ecsn/index-eng.htm">national security policing functions</a>. The materials come in the form of briefs from their own criminal intelligence organizations and Use Letters from other intelligence organizations. The RCMP also collaborates with local police forces, the Canadian Border Services Agency (CBSA) and other government departments in distributing intelligence products.&nbsp;Timely <a href="https://www.nsira-ossnr.gc.ca/review-of-the-csis-rcmp-relationship-in-a-region-of-canada-through-the-lens-of-an-ongoing-investigation">dissemination of intelligence </a>remains a major issue for the RCMP.</p><h3>Oversight</h3><p>RCMP oversight falls under many different institutions including:&nbsp;</p><ul><li><p><a href="https://www.priv.gc.ca/en/">Office of the Privacy Commissioner of Canada</a> (OPC) has investigated RCMP <a href="https://www.priv.gc.ca/en/opc-actions-and-decisions/investigations/investigations-into-federal-institutions/2016-17/pa_20170816_rcmp/">intelligence collection techniques</a> like cell site simulators and <a href="https://www.priv.gc.ca/en/opc-actions-and-decisions/ar_index/202021/sr_rcmp/">integration of new technology</a> like facial recognition.</p></li><li><p><a href="https://www.crcc-ccetp.gc.ca/">Civilian Review and Complaints Commission for the RCMP</a> (CRCC) is mandated to conduct reviews of RCMP national security operations, but does not have broad access to classified information. Those reviews can be blocked by the RCMP Commissioner, and an onerous process of review by a retired judge is required before the information can be viewed.</p></li><li><p><a href="https://nsira-ossnr.gc.ca/">National Security and Intelligence Review Agency</a> (NSIRA) was created in 2019 to review the activities of intelligence agencies in Canada, replacing the Security Intelligence Review Committee. NSIRA review of RCMP intelligence functions has included reports on the interaction between Immigration, Refugees and Citizenship Canada (IRCC), CBSA - RCMP <a href="https://nsira-ossnr.gc.ca/study-of-the-government-of-canadas-use-of-biometrics-in-the-border-continuum">biometrics collection and storage practices</a> and <a href="https://nsira-ossnr.gc.ca/review-of-the-csis-rcmp-relationship-in-a-region-of-canada-through-the-lens-of-an-ongoing-investigation">CSIS - RCMP information sharing</a>.</p></li><li><p><a href="https://www.nsicop-cpsnr.ca/index-en.html">National Security and Intelligence Committee of Parliamentarians</a> (NSICOP) has <a href="https://www.nsicop-cpsnr.ca/press-releases/pr-cp-2021-02-23/pr-cp-2021-02-23-en.html">announced a review of the RCMP intelligence functions</a>, but the report has not been released.</p></li></ul><h2>The Future of RCMP Intelligence</h2><p>Intelligence is a critical aspect of modern policing. Significant challenges have plagued the RCMP&#8217;s collection, analysis, and dissemination of that intelligence over the force&#8217;s history and many of those challenges have not been fully resolved. The Cameron Ortis trial has also shed light on serious breaches in the RCMP&#8217;s own internal security practices. As criminal and national security issues increasingly blur, the RCMP will face new challenges around using intelligence in its investigations (<a href="https://journals.library.ualberta.ca/themanitobalawjournal/index.php/mlj/article/view/1127/1114">the &#8220;intelligence to evidence&#8221; problem</a>) and in responding to international criminal organizations that increasingly play a role in national security issues.</p><p><em>Did you find this post insightful? Share it with a colleague!</em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/p/rcmp-intelligence?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/p/rcmp-intelligence?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://www.insightthreatintel.com/terrorist-financing-analysis-course" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!nMLe!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8d8e2be-e943-4233-956e-e886f738efce_1080x1080.png 424w, https://substackcdn.com/image/fetch/$s_!nMLe!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8d8e2be-e943-4233-956e-e886f738efce_1080x1080.png 848w, https://substackcdn.com/image/fetch/$s_!nMLe!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8d8e2be-e943-4233-956e-e886f738efce_1080x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!nMLe!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8d8e2be-e943-4233-956e-e886f738efce_1080x1080.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!nMLe!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8d8e2be-e943-4233-956e-e886f738efce_1080x1080.png" width="1080" height="1080" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f8d8e2be-e943-4233-956e-e886f738efce_1080x1080.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1080,&quot;width&quot;:1080,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:&quot;https://www.insightthreatintel.com/terrorist-financing-analysis-course&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!nMLe!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8d8e2be-e943-4233-956e-e886f738efce_1080x1080.png 424w, https://substackcdn.com/image/fetch/$s_!nMLe!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8d8e2be-e943-4233-956e-e886f738efce_1080x1080.png 848w, https://substackcdn.com/image/fetch/$s_!nMLe!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8d8e2be-e943-4233-956e-e886f738efce_1080x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!nMLe!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8d8e2be-e943-4233-956e-e886f738efce_1080x1080.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>&#169; 2023 Insight Threat Intelligence Ltd. All Rights Reserved.<br><br>This newsletter and its contents are protected by Canadian copyright law. Except as otherwise provided for under Canadian copyright law, this newsletter and its contents may not be copied, published, distributed, downloaded or otherwise stored in a retrieval system, transmitted or converted, in any form or by any means, electronic or otherwise, without the prior written permission of the copyright owner.</em></p><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-1" href="#footnote-anchor-1" class="footnote-number" contenteditable="false" target="_self">1</a><div class="footnote-content"><p>&#8220;Canadian Intelligence Prioritization&#8221; (Government of Canada Privy Council Office, January 2021).</p></div></div>]]></content:encoded></item><item><title><![CDATA[Professional Money Laundering Networks]]></title><description><![CDATA[What are they, and how serious a threat are they?]]></description><link>https://newsletter.insightthreatintel.com/p/professional-money-laundering-networks</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/professional-money-laundering-networks</guid><dc:creator><![CDATA[Jessica Davis, PhD]]></dc:creator><pubDate>Thu, 23 Nov 2023 14:00:41 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!4FUo!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa252d452-2a22-474b-b9d9-24e8a28a1364_876x976.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>This week, Canada got its fall economic statement, included in which were a number of amendments to our anti-money laundering / counter-terrorist financing regime. Today, in our inaugural &#8220;primer&#8221;, we&#8217;re taking a look at professional money laundering networks. These primers are intended to explain illicit finance and intelligence issues to the broader public, so will be freely available. We see this as part of our role in enhancing the public dialogue on these issues in Canada, and globally. If you find what you&#8217;re reading interesting, please share it with a colleague, and consider subscribing! </em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/subscribe?"><span>Subscribe now</span></a></p><h3>Professional Networks</h3><p>Professional money laundering networks are networks of individuals involved in the laundering of funds for criminals. This is a service provided for criminal entities &#8212; anyone who needs to illicit move funds or create the illusion of legitimacy.  The professional money launderers themselves are rarely involved in <a href="https://www.fatf-gafi.org/content/dam/fatf-gafi/reports/Professional-Money-Laundering-Executive-Summary.pdf">proceeds-generating criminal activity</a>. Instead, their criminal activity is the actual laundering of funds. Professional money laundering networks arose as an adaptation to anti-money laundering regulations. </p><p>While money launderers have been around a long time, they have professionalized their services and expanded them beyond a single client. Now, the relationship between money launderers and their clients is often market-based, rather than based on criminal organization. There is an absence of obligations between parities, other than the <a href="https://doi.org/10.1007/s12117-022-09475-w">fulfillment of the terms stipulated in their agreements</a>.</p><div class="pullquote"><p>Have you seen the TV show Ozark? The main character, Marty, is a money launderer for a cartel. But he&#8217;s not part of a professional money laundering network. At best, he&#8217;s working to establish his own. If you&#8217;ve seen the show, you know the limitations of being a solo-launderer, and can probably imagine why being part of a broader, professional network would be of interest. </p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/p/professional-money-laundering-networks?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/p/professional-money-laundering-networks?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p>The main purpose behind these networks is to solve the problem of &#8220;<a href="https://doi.org/10.1007/s12117-022-09475-w">cash bottlenecks</a>&#8221;. These bottlenecks arise because illicit economic transactions are often cash-based (think drug dealing). This leaves criminals with the problem of spending large amounts of cash. This can attract the attention of authorities, and because of existing anti-money laundering rules, it can make purchasing luxury goods with cash difficult, if not impossible. </p><p>The professionals involved in these activities are often accountants and bookkeepers (to fix the books), lawyers (the use of escrow accounts and forgeries are common services they provide), as well as bankers (trusted insiders who can avoid reporting transactions to authorities). Increasingly, business people in the <a href="https://fintrac-canafe.canada.ca/intel/operation/oai-ml-eng">trading business (import/export companies) and money service businesses</a> are used, often in combination. These businesses are often co-located, or might even be the same corporate entity.</p><p>The network aspect is important: no single money launderer can succeed for very long without partners. Think about things like the hawala system: you need individuals in other countries willing to do business with you and receive your funds. Without those important contacts and networks, you are unable to effectively move money, and your laundering methods are curtailed. </p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;4846de9f-e209-4e3f-861a-dfdc78a0e0a0&quot;,&quot;caption&quot;:&quot;Welcome to a regular edition of Insight Intelligence. Finally, after a two-week interruption brought to us by the Ottawa occupation, we are back to our regularly-scheduled programming. Today we&#8217;re looking at the intersection of hawalas and cryptocurrency, so prepare to get very nerdy. As always, a warm welcome to our new subscribers (we are approaching &#8230;&quot;,&quot;cta&quot;:null,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Cryptocurrency Meets Hawala&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:33479672,&quot;name&quot;:&quot;Jessica Davis&quot;,&quot;bio&quot;:&quot;Jessica Davis is President of Insight Threat Intelligence and is the author of Women in Modern Terrorism: From Liberations Wars to Global Terrorism and the Islamic State (2017), and Illicit Money: Financing Terrorism in the 21st Century (2021).&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e312ae7c-114b-4e4f-9ce1-8bf50ddb7a27_2344x2049.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2022-02-10T14:00:43.141Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Ffc62e0df-ebfa-4b6a-9814-f7278c479500_2121x1414.jpeg&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/cryptocurrency-meets-hawala&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:48434356,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:2,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F09b767fc-6dde-4336-90bb-7806e0822653_900x900.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><h3>Features</h3><p>Professional money laundering networks are transnational, and often involve people with different nationalities. (From a disruption perspective, this can complicate investigations as it requires international coordination.) Recently, a professional money laundering network was shut down in I<a href="https://www.europol.europa.eu/media-press/newsroom/news/33-arrested-global-money-laundering-service-shut-down">taly and Spain involving 33 people from Italy, Albania, Croatia, Morocco and Syria</a>. </p><p>These networks often use companies to launder funds. Money launderers prefer companies that deal in high-value goods, and small, high-value goods are even more preferred. For instance, electronics companies are often used as a front. </p><p>They use methods such as trade-based money laundering to clean the illicit funds. There are many different types of money laundering techniques, some of which involve real estate transactions, front companies, and even charities. One popular method is the black market peso exchange. In this drugs scheme, drug producers provide drugs to buyers (drug dealers) without payment (credit). The buyers/dealers then sell the drugs. The profits from these sales are picked up by brokers who introduce the cash into companies (the placement stage). Companies are used to order goods from China, and those goods are shipped to the United States and onward to Colombia, where the goods are sold on the open market. The profits from the sale of these goods are provide back to the drug producers. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!4FUo!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa252d452-2a22-474b-b9d9-24e8a28a1364_876x976.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!4FUo!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa252d452-2a22-474b-b9d9-24e8a28a1364_876x976.png 424w, https://substackcdn.com/image/fetch/$s_!4FUo!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa252d452-2a22-474b-b9d9-24e8a28a1364_876x976.png 848w, https://substackcdn.com/image/fetch/$s_!4FUo!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa252d452-2a22-474b-b9d9-24e8a28a1364_876x976.png 1272w, https://substackcdn.com/image/fetch/$s_!4FUo!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa252d452-2a22-474b-b9d9-24e8a28a1364_876x976.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!4FUo!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa252d452-2a22-474b-b9d9-24e8a28a1364_876x976.png" width="876" height="976" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a252d452-2a22-474b-b9d9-24e8a28a1364_876x976.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:976,&quot;width&quot;:876,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:183818,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!4FUo!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa252d452-2a22-474b-b9d9-24e8a28a1364_876x976.png 424w, https://substackcdn.com/image/fetch/$s_!4FUo!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa252d452-2a22-474b-b9d9-24e8a28a1364_876x976.png 848w, https://substackcdn.com/image/fetch/$s_!4FUo!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa252d452-2a22-474b-b9d9-24e8a28a1364_876x976.png 1272w, https://substackcdn.com/image/fetch/$s_!4FUo!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa252d452-2a22-474b-b9d9-24e8a28a1364_876x976.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>In this way, there is no international transfer of funds that might alert authorities to the activities, and the producers receive a clean source of funds for the drugs they produced. </p><h3>Tools</h3><p>Professional money laundering networks use a variety of tools: </p><ul><li><p><strong>Cryptocurrency:</strong> to move money internationally, as well as an investment. Crypto can also be used in the placement stage of money laundering by having smurfs (many individuals with only a minor role in the criminal activity) deposit funds at crypto ATMs, purchase different currencies, and then transfer the currency (or share account info) with the ultimate beneficiary</p></li><li><p><strong>Banks:</strong> cash can be placed in bank accounts through a similar smurfing process. Bank accounts are also useful in different jurisdictions because after a few transactions, the original source of funds is obscured </p></li><li><p><strong>Companies:</strong> front companies (and even real companies) are part of different money laundering schemes, providing cover for large cash deposits, trade-based transactions, and many other elements </p></li><li><p><strong><a href="https://www.fatf-gafi.org/content/dam/fatf-gafi/reports/Professional-Money-Laundering-Executive-Summary.pdf">Cash couriers</a></strong>: sometimes funds simply need to be moved across borders outside of the financial system, and cash couriers are used for this purpose. The couriers might use cash, or they might use high value goods (luxury goods), or even precious metals, or the password to a cryptocurrency wallet</p></li><li><p><strong>Real estate</strong>: real estate is a high value good that has a subjective value, which makes it useful for money laundering or transferring funds / value between different people. It&#8217;s also a place to live or conduct business, so it has multiple purposes</p></li><li><p><strong>Hawala / underground bankers</strong>: organized into networks, these professionals play a vital role in money laundering and moving funds into and out of the financial system, and internationally</p></li></ul><h3>The Crimes </h3><p>Any criminal activity can make use of professional money laundering networks. This can include kleptocracy, corruption, and other &#8220;white collar&#8221; crimes. Hiding the source and destination of funds is important for anyone who fears seizure. This also includes people trying to evade sanctions. Other criminal activity that makes use of these networks includes drug producers and traffickers,<a href="https://fintrac-canafe.canada.ca/intel/operation/oai-ml-eng"> organized crime and motorcycle gangs</a>, and other criminals who rely on these services to <a href="https://www.thetimes.co.uk/article/09ffd33b-016a-4ce6-b046-a5172cf48bed?shareToken=3bb75043224cf173a988e8bbe7423ce7">circumvent global anti-money laundering regulations.</a> </p><h3>Disrupting PMLs</h3><p>One of the main challenges in disrupting professional money laundering networks is the issue of the predicate offence. In some jurisdictions (perhaps many), the criminal activity has to be directly tied to the laundering of the funds in order for the latter to be a crime. Increasingly, states (including Canada) are seeking to amend their laws so that the simple act of laundering funds, even if we can&#8217;t prove a criminal offence, becomes a crime. This then opens the door to having to prove what constitutes money laundering, which some states have found challenging even when it&#8217;s tied to a clear predicate offence. </p><p>On the other hand, these networks provide important sources of intelligence, so if they can be infiltrated, either through technical or human means, they can yield a treasure trove of intelligence on the business activities of many different criminals. </p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/p/professional-money-laundering-networks?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/p/professional-money-laundering-networks?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p><em>Interested in learning more about terrorist and illicit financing? Our course on terrorist financing analysis is open now! It closes in early 2024, so don&#8217;t miss out on your opportunity to take this course! </em></p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;2e61eebd-9385-4ad3-adf5-1f64c3c92a47&quot;,&quot;caption&quot;:&quot;Hello Insight Monitor subscribers! I wanted to let you know that you have two more months to sign up for the terrorist financing analysis course offered by Insight Threat Intelligence. In February 2024, we&#8217;ll be closing the course to new students to give us time to do a few needed updates and re-vamps, and adding new features. (And yes, there will be a &#8230;&quot;,&quot;cta&quot;:null,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;lg&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Terrorist Financing Analysis Course: closing to new students in February 2024&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:33479672,&quot;name&quot;:&quot;Jessica Davis&quot;,&quot;bio&quot;:&quot;Jessica Davis is President of Insight Threat Intelligence and is the author of Women in Modern Terrorism: From Liberations Wars to Global Terrorism and the Islamic State (2017), and Illicit Money: Financing Terrorism in the 21st Century (2021).&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e312ae7c-114b-4e4f-9ce1-8bf50ddb7a27_2344x2049.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2023-11-22T14:01:30.101Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fca879941-4882-4473-86a3-96520e8f3f7e_1080x1080.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/terrorist-financing-analysis-course&quot;,&quot;section_name&quot;:&quot;News&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:139054447,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:0,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F09b767fc-6dde-4336-90bb-7806e0822653_900x900.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p><em>&#169; 2023 Insight Threat Intelligence Ltd. All Rights Reserved.<br><br>This newsletter and its contents are protected by Canadian copyright law. Except as otherwise provided for under Canadian copyright law, this newsletter and its contents may not be copied, published, distributed, downloaded or otherwise stored in a retrieval system, transmitted or converted, in any form or by any means, electronic or otherwise, without the prior written permission of the copyright owner.</em></p>]]></content:encoded></item><item><title><![CDATA[Financing Threats to International Security ]]></title><description><![CDATA[Espionage, terrorism, foreign influence, and more]]></description><link>https://newsletter.insightthreatintel.com/p/financing-threats-to-the-security</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/financing-threats-to-the-security</guid><dc:creator><![CDATA[Jessica Davis, PhD]]></dc:creator><pubDate>Thu, 25 May 2023 13:01:24 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!gYsl!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8012bcfd-6490-46a1-b322-e437ba44e9f6_5472x3648.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>When we talk about national security, we often talk about specific departments or agencies, their mandates, their activities (like espionage or counter-espionage), their intelligence collection capabilities like signals intelligence, human intelligence, or open source intelligence. We often try to tie this to threats to security &#8212; activities that threaten our economic prosperity, physical or cyber security, etc. But we rarely, if ever, talk about one thing that unites all these threats: money.</em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/subscribe?"><span>Subscribe now</span></a></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!gYsl!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8012bcfd-6490-46a1-b322-e437ba44e9f6_5472x3648.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!gYsl!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8012bcfd-6490-46a1-b322-e437ba44e9f6_5472x3648.jpeg 424w, https://substackcdn.com/image/fetch/$s_!gYsl!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8012bcfd-6490-46a1-b322-e437ba44e9f6_5472x3648.jpeg 848w, https://substackcdn.com/image/fetch/$s_!gYsl!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8012bcfd-6490-46a1-b322-e437ba44e9f6_5472x3648.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!gYsl!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8012bcfd-6490-46a1-b322-e437ba44e9f6_5472x3648.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!gYsl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8012bcfd-6490-46a1-b322-e437ba44e9f6_5472x3648.jpeg" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8012bcfd-6490-46a1-b322-e437ba44e9f6_5472x3648.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!gYsl!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8012bcfd-6490-46a1-b322-e437ba44e9f6_5472x3648.jpeg 424w, https://substackcdn.com/image/fetch/$s_!gYsl!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8012bcfd-6490-46a1-b322-e437ba44e9f6_5472x3648.jpeg 848w, https://substackcdn.com/image/fetch/$s_!gYsl!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8012bcfd-6490-46a1-b322-e437ba44e9f6_5472x3648.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!gYsl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8012bcfd-6490-46a1-b322-e437ba44e9f6_5472x3648.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Regardless of the threat, it&#8217;s financed in some way. For example, if we look at threats as defined in Canada&#8217;s CSIS Act, we can see this link:</p><ul><li><p><strong>Espionage</strong> requires money: often this is provided through state budgets, perhaps through embassies, in electronic funds transfers or in cash, but we are increasingly seeing espionage activities undertaken and financed through cryptocurrencies. States like Russia use espionage to undermine democratic principles and processes, and fund those activities directly from state coffers or through elaborate webs of companies, individuals, and accounts.</p></li><li><p><strong>Foreign influenced activities</strong> (aka <strong>foreign interference</strong>) are also financed in much the same way, but often using individuals as covers to provide payments to individuals or entities to help with things like the theft of intellectual property, to hide or obfuscate the true beneficial owner of a corporate acquisition (particularly in sensitive sectors like rare earth minerals,, aerospace, etc), or to simply pay individuals to undertake particular influence activities like intimidation of a diaspora community. Other examples include: Supporting the campaign of <a href="https://www.justice.gov/nsd-fara/recent-cases">particular politicians</a>, either through social media and influence campaigns, or in some cases through donations. These donations can be direct to the candidate, or might be received through third parties / proxies, in some cases in violation of election laws. States also pressure donors to give money to <a href="https://www.publicsafety.gc.ca/cnt/rsrcs/pblctns/2023-nhncng-frgn-nfluence/index-en.aspx">specific candidate</a>s.</p><p>They also use information operations and social media amplification to promote a particular policy objective.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a> They will also <a href="https://www.canada.ca/en/security-intelligence-service/corporate/publications/foreign-interference-threat-to-canadas-democratic-process.html">invest money, pay for advertisements, or sponsor investigative journalism or interviews</a> to promote their interests.</p></li><li><p><strong>Terrorist activity</strong> of course also requires financing: terrorist groups, cells, and individuals need to raise money for their propaganda and attacks, and they move it domestically and internationally using our existing banking infrastructure as well as new technologies like cryptocurrencies.</p></li></ul><p>There are also a number of other threats that have a financial component, like proliferation financing,<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-2" href="#footnote-2" target="_self">2</a> <a href="https://apple.news/AKIj0HEwtQpOD4roxc9y_BA">sanctions evasion (those sanctions might be imposed on terrorists, human rights violators, war criminals, etc</a>), and corruption &amp; kleptocracy. All of these are threats to global security, and have a financial component that can be detected, and ideally, disrupted.</p><p>States and non-state actors seek to evade our detection mechanisms and finance these threats. We respond in a number of ways, including through investigation and prosecution, and also by implementing sanctions such as terrorist listings, state designations, and restrictions on import/export and investments.</p><p>In Canada, we actually have a fairly comprehensive framework to address threat financing. The problem is we lack measures of effectiveness, any real understanding of outcomes, prosecutions for violators, and meaningful investigative capabilities. &nbsp;In many other countries (particularly outside of the five eyes), the concept of threat financing is developing, at best. </p><h3>What we know so far: </h3><p>Threat financing is a stable of threat activity, but metrics to describe it are limited. We know that there have been two successful terrorist financing prosecutions in Canada; this is far below the number from most other countries with similar counter-terrorist financing frameworks and capabilities. And there has been a financial component to every attack or thwarted plot in Canada, and FINTRAC told us in 2018 that Canada is a base for financing activities for a number of groups. But it&#8217;s unclear why Canada has so few terrorist financing prosecutions: is there a problem with the public prosecution service? Our investigative capabilities? Something in the legislation? Other countries have had more success in prosecuting terrorist financing; and while this is not the sole (or even best measure) of disruption, it&#8217;s often the most concrete, and a logical place to start. </p><p>In other types of threats, it&#8217;s the lack of data that tells the story. How many accounts have been frozen as a result of Canada&#8217;s terrorist listings? Unknown. How many Russian accounts / assets have been frozen as a result of sanctions? We don&#8217;t have a clear picture, but the RCMP <a href="https://www.rcmp-grc.gc.ca/en/news/2022/update-the-reporting-frozen-assets-the-special-economic-measures-act-russia-regulations-0">has started to tell us a bit more</a>, indicating that since February 2022, $135,671,223 in assets have been frozen in Canada, and $292,263,795 worth of transactions have been blocked. They also told us that $78,838 worth of assets in Canada have been frozen as a result of the Iran SEMA sanctions, and none under the Haiti regulations.</p><p>But there are more unknowns than known. Has Canada detected any efforts by Russia (or other state actors like the DPRK) to use Canada to evade sanctions? Unknown. But given Canada&#8217;s global connectivity, strong financial system, and technologically advanced economy, I&#8217;d estimate that there are some state and non-state actors seeking to use the Canadian financial system to their benefit. But we have little ability to detect and disrupt this activity, and almost no incentive for security and intelligence agencies to share any successes publicly.</p><p>When we look at this internationally, there are even fewer metrics. </p><p>On top of that, the diffuse nature of our system and framework for detecting and disrupting threat financing is part of the problem. We have a network of departments and agencies all with a small piece of the puzzle. Of course, attention often falls on FINTRAC, Canada&#8217;s financial intelligence unit. This is similar internationally - the financial intelligence unit is often thought to be the centre of financial issues. But in many cases, their role in threat financing is relatively limited, because they often don&#8217;t have an investigative mandate. They receive and disseminate reports, a critical function, but they are not the hub of detecting and disrupting threat financing. That role should fall to law enforcement and security services, but in practice, countering threat financing is not prioritized. </p><p>For instance, the RCMP has struggled to protect supposedly ring-fenced financial investigators and resources; instead, they have been assigned to &#8216;more pressing&#8217; investigations. While we can all understand the need to prevent threat to life activities like terrorist attacks, we also need to think about the long term. We can&#8217;t continue to allow, for example, <a href="https://fintrac-canafe.canada.ca/intel/assess/tfa-2018-eng">Hizballah, to run a financing network</a>; it enables their attacks and activities against our allies and threatens regional stability and by extension Canadian interests (not to mention the reputational damage that we suffer from allowing this to continue).</p><p>Of course, CSIS also has roles and responsibilities in combatting threat financing; and while their activities will always be less public, given how little information is dedicated to threat financing issues in their public reports, I have concerns about their ability to detect and disrupt this activity, and to prioritize it within their investigations.</p><p>There are several other key members of what I consider Canada&#8217;s threat financing regime: CBSA of course, CRA charities directorate, Global Affairs Canada, and many other consumers and producers of financial intelligence like CSE, Export Development Canada, the Privy Council Office, etc. This is truly a whole of government issue, but one that has received far too little attention. Internationally, all of these bodies and agencies need to be working together to combat threat financing. I can assure you that rarely happens. </p><h3>What we need to do</h3><p>If Canada and its allies want a robust economy, a safe and secure financial system, a more secure global community, and a good international reputation, we need to modernize how we approach threat financing. Detecting, analyzing, deterring or disrupting threat financing needs to be front and centre of our global security discussions. </p><p>What threats to global security don&#8217;t have a financial component? What happens if we get better at detecting and disrupting the financing of threats in Canada, and internationally? I would argue that we would step more firmly into &#8220;prevention&#8221; territory, rather than reacting to emerging or developing threats. We would have the ability to detect and disrupt threats as they emerge (or even before); preventing the next terrorist attack is obviously a key objective, but so should be preventing states from using Canada and other countries as a means to evade sanctions, hide the proceeds from their kleptocracy, and acquire companies and intellectual property in sensitive or strategic sectors. </p><p>Ignoring this issue will mean that some states become a safe haven for a variety of corrupt and illicit actors; and once they become entrenched, they will become the launching pad for a variety of international security threats. When we think about global security threats, we must consider the financial dealings that underpin these activities, and focus on detecting and disrupting the flow of money. </p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/p/financing-threats-to-the-security?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/p/financing-threats-to-the-security?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p><em>Want to read more about threat financing? Here are a few articles to get you started: </em></p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;6ce98baa-2c3c-4a61-ae43-57b4039eb827&quot;,&quot;caption&quot;:&quot;The DPRK uses a variety of schemes to circumvent sanctions and obtain the goods and services it requires. Recent reports reveal the details of one such procurement network in Malaysia. North Korean operatives abroad are known to engage in international trade in order to generate cash and obtain goods. Ri Jong Chol was one such operative. He is believed t&#8230;&quot;,&quot;cta&quot;:null,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;DPRK procurement network in Malaysia revealed&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:33479672,&quot;name&quot;:&quot;Jessica Davis&quot;,&quot;bio&quot;:&quot;Jessica Davis is President of Insight Threat Intelligence and is the author of Women in Modern Terrorism: From Liberations Wars to Global Terrorism and the Islamic State (2017), and Illicit Money: Financing Terrorism in the 21st Century (2021).&quot;,&quot;photo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/11fcd0f3-76fc-47c8-a059-847d6401465f_863x613.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2018-05-22T12:50:00.000Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F4c66f099-8576-46a5-9f42-0dbee85e6894_733x505.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/dprk-procurement-network-in-malaysia&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:37847263,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:0,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Insight Intelligence&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F09b767fc-6dde-4336-90bb-7806e0822653_900x900.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;212fd849-45cc-402e-9541-4a4f95685971&quot;,&quot;caption&quot;:&quot;Cryptocurrencies hold a lot of allure for people trying to move money surreptitiously, and states have seen this as a way to finance their espionage activities. While publicly-available evidence of this is limited to Russian intelligence, the DPRK also likely pays for some of its illicit activities through cryptocurrencies as well. However, cash still r&#8230;&quot;,&quot;cta&quot;:null,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Espionage Financing: Bitcoin, Cryptocurrencies, and Cash &quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:33479672,&quot;name&quot;:&quot;Jessica Davis&quot;,&quot;bio&quot;:&quot;Jessica Davis is President of Insight Threat Intelligence and is the author of Women in Modern Terrorism: From Liberations Wars to Global Terrorism and the Islamic State (2017), and Illicit Money: Financing Terrorism in the 21st Century (2021).&quot;,&quot;photo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/11fcd0f3-76fc-47c8-a059-847d6401465f_863x613.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2021-11-16T12:10:00.000Z&quot;,&quot;cover_image&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/c44c3e0d-ed0f-4a18-be55-37d56488629c_5520x3680.jpeg&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/espionage-financing-using-cryptocurrencies&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:36258916,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:1,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Insight Intelligence&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F09b767fc-6dde-4336-90bb-7806e0822653_900x900.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;3330f701-e6ad-4eff-85a7-e3fe899064fa&quot;,&quot;caption&quot;:&quot;2022 was a hot year for foreign interference, or at least media coverage / speculation about foreign interference. Let&#8217;s unpack what we learned last year, with a special emphasis on both known knowns and unknown unknowns, and how we can think about, analyze, and counter foreign interference.&quot;,&quot;cta&quot;:null,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Foreign Interference in Canada: Police Stations, the Convoy, and Electoral Interference &quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:33479672,&quot;name&quot;:&quot;Jessica Davis&quot;,&quot;bio&quot;:&quot;Jessica Davis is President of Insight Threat Intelligence and is the author of Women in Modern Terrorism: From Liberations Wars to Global Terrorism and the Islamic State (2017), and Illicit Money: Financing Terrorism in the 21st Century (2021).&quot;,&quot;photo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/11fcd0f3-76fc-47c8-a059-847d6401465f_863x613.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2023-01-10T14:01:16.505Z&quot;,&quot;cover_image&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/09b767fc-6dde-4336-90bb-7806e0822653_900x900.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/foreign-interference-in-canada-convoy&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:91201509,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:6,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Insight Intelligence&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F09b767fc-6dde-4336-90bb-7806e0822653_900x900.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-1" href="#footnote-anchor-1" class="footnote-number" contenteditable="false" target="_self">1</a><div class="footnote-content"><p>Caroline Orr Bueno, &#8220;Russia&#8217;s Role in the Far-Right Truck Convoy | The Journal of Intelligence, Conflict, and Warfare,&#8221; <em>The Journal of Intelligence, Conflict and Warfare</em> 5, no. 3 (January 31, 2023): Online.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-2" href="#footnote-anchor-2" class="footnote-number" contenteditable="false" target="_self">2</a><div class="footnote-content"><p>Security Intelligence Review Committee, &#8220;SIRC Review 2016-01 CSIS&#8217;s Investigation of Terrorist Financing&#8221; (Security Intelligence Review Committee, 2016), 1, Released under access to information request 3103(18/09)</p><p></p></div></div>]]></content:encoded></item><item><title><![CDATA[Enforcing Canadian Sanctions ]]></title><description><![CDATA[Special Economic Measures Act]]></description><link>https://newsletter.insightthreatintel.com/p/enforcing-canadian-sanctions</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/enforcing-canadian-sanctions</guid><dc:creator><![CDATA[Jessica Davis, PhD]]></dc:creator><pubDate>Thu, 09 Mar 2023 14:01:28 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!eEUq!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d6b0bc2-9fff-4ed0-b5fb-bc51ea1b24ca_2121x1414.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Welcome to a special edition of Insight Intelligence! Today&#8217;s newsletter is brought to you by a reader question about sanctions enforcement in Canada. Thanks for the question Douglas, and I hope this helps! </em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/subscribe?"><span>Subscribe now</span></a></p><p>There are a number of different sanctions regimes in Canada: there&#8217;s the Canadian terrorist listings process, the Special Economic Measures Act (SEMA), the Freezing Assets of Corrupt Foreign Officials Act, the Justice for Victims of Corrupt Foreign Officials Act and various other acts with other sanctioning powers / exclusions. The Special Economic Measures Act is Canada&#8217;s primary sanction tool &#8212; we use it extensively, and this is what creates our &#8220;Russia&#8221; sanctions. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!eEUq!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d6b0bc2-9fff-4ed0-b5fb-bc51ea1b24ca_2121x1414.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!eEUq!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d6b0bc2-9fff-4ed0-b5fb-bc51ea1b24ca_2121x1414.jpeg 424w, https://substackcdn.com/image/fetch/$s_!eEUq!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d6b0bc2-9fff-4ed0-b5fb-bc51ea1b24ca_2121x1414.jpeg 848w, https://substackcdn.com/image/fetch/$s_!eEUq!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d6b0bc2-9fff-4ed0-b5fb-bc51ea1b24ca_2121x1414.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!eEUq!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d6b0bc2-9fff-4ed0-b5fb-bc51ea1b24ca_2121x1414.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!eEUq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d6b0bc2-9fff-4ed0-b5fb-bc51ea1b24ca_2121x1414.jpeg" width="510" height="340.11675824175825" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7d6b0bc2-9fff-4ed0-b5fb-bc51ea1b24ca_2121x1414.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:510,&quot;bytes&quot;:2363551,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!eEUq!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d6b0bc2-9fff-4ed0-b5fb-bc51ea1b24ca_2121x1414.jpeg 424w, https://substackcdn.com/image/fetch/$s_!eEUq!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d6b0bc2-9fff-4ed0-b5fb-bc51ea1b24ca_2121x1414.jpeg 848w, https://substackcdn.com/image/fetch/$s_!eEUq!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d6b0bc2-9fff-4ed0-b5fb-bc51ea1b24ca_2121x1414.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!eEUq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d6b0bc2-9fff-4ed0-b5fb-bc51ea1b24ca_2121x1414.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>In sanctions, there are four primary mechanisms: targeting, implementation, monitoring, and enforcement. In Canada, enforcement is done by the RCMP, although other departments and agencies could play a role.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a>  (If you&#8217;re interested in reading more about the roles and responsibilities of departments and agencies with regards to SEMA, check out the article at the footnote by my friend Mike Saunders.) Targeting is done by Global Affairs Canada. They are responsible for creating the sanctions list, and responding to enquiries and providing information to the public through the department&#8217;s website. Critics of this process point out that Global Affairs has been reluctant to provide actual advice and guidance on the implementation of sanctions.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-2" href="#footnote-2" target="_self">2</a> That implementation is done by the private sector, such as banks and financial institutions (anyone required under law to implement the sanctions). So how many sanctions breaches have there been in Canada? </p><p>In terms of enforcement, there have only been two cases brought before the courts for violations of <em>SEMA</em>. In 2014, an Alberta-based company (Less Specialities Ltd) was charged with violating <em>SEMA</em> by attempting to export controlled goods (<a href="https://www.osler.com/en/resources/regulations/2014/canadian-government-steps-up-enforcement-of-econom">valued at $15</a>) to the Islamic Republic of Iran. The company pleaded guilty and agreed to pay a fine of $90,000. The company argued that issue was a &#8220;mail room mixup&#8221;; they had intended to send the goods to Dubai, but had accidentally sent them to Tehran. (As an aside, this is rather interesting, since Dubai is a <a href="https://carnegieendowment.org/files/dubai_iran.pdf">well-known</a> re-export hub for dual use goods to Iran.) </p><p>The second case involved an individual who was ultimately acquitted of sanctions violations relating to Syria. In 2020, Nader Kalai was accused of violating the Syria regulations by making a payment of $140,000 to a company called Syrialink in November 2013. When the trial opened, the prosecutor told the judge he would be calling no evidence. This might have been a result of an <a href="https://globalnews.ca/news/7509899/prosecution-economic-sanctions-paper-tigers/">intelligence-to-evidence </a>issue, with <a href="https://deliverypdf.ssrn.com/delivery.php?ID=552114115001089028011108122016082027046082018033091033077096121073113090107112080005034102023059043112038104095005109080095084053021092039027004085008005124109090004069013011125018086101085068097000081064025007016022088125109124095102072011068084123068&amp;EXT=pdf&amp;INDEX=TRUE">expert Michael Nesbitt</a> explaining that some of these cases are seeded by foreign intelligence agencies, and thus the lead or originating information cannot be introduced in court. </p><p>In another interesting development, in 2007-2008, FINTRAC reported a case of individuals suspected of circumventing Canadian export controls. While FINTRAC did not specify the country or the export controls involved, the Centre did indicate that the individuals were using companies operating in Canada and abroad to do so. &#8220;The individuals were shipping restricted materials in a manner designed to avoid detection and circumvent applicable laws.&#8221; The individuals and companies had been reported to FINTRAC through suspicious transaction reports; queries of FINTRAC&#8217;s database identified additional companies suspected to be associated with the same network. Electronic funds transfers were reported indicating monthly or bi-monthly funds transfers. The transfers were ordered through foreign banks by a company located in another country to the benefit of one of the Canadian companies reported to be involved in the purchase of industrial machinery. Between 2002 and 2007, the transactions totalled over $35 million.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-3" href="#footnote-3" target="_self">3</a> </p><h3>Canadians violating US sanctions</h3><p>While Canada hasn&#8217;t been particularly forceful in its enforcement of sanctions, the US has sentenced a number of Canadians for U.S. sanctions violations. </p><ul><li><p>In 2016, <a href="https://www.justice.gov/usao-sdny/pr/canadian-iranian-citizen-sentenced-manhattan-federal-court-three-years-prison">Ali Reza Parsa</a>, a Canadian-Iranian dual citizen and resident of Canada, was sentence to three years in prison for his participation in a conspiracy to violate the International Emergency Economic Powers Act (IEEPA) and the Iranian Transactions and Sanctions Regulations (ITSR). Between approximately 2009 and 2015, Parsa conspired to obtain high-tech electronic components from American companies for transshipment to Iran. Parsa used his Canadian company, Metal PM, to place orders with U.S. suppliers and typically had the parts shipped to him in Canada or to a freight forwarder located in the United Arab Emirates, and then transshipped from these locations to Iran or to the location of his Iranian company&#8217;s client.&nbsp;Parsa provided the U.S. companies with false destination and end-user information about the components in order to conceal the illegality of these transactions.</p></li><li><p>In 2017, <a href="https://www.justice.gov/usao-sdny/pr/canadian-iranian-citizen-sentenced-white-plains-federal-court-32-months-prison">Ali Soofi (a Canadian citizen) </a>was sentenced to 32 months in prison after he pleaded guilty to participating in a plot to violate U.S. weapons sanctions against Iran. Between 2014 and 2016, he exported military items for the US to Iran directly and through transshipment countries without a license.</p></li><li><p>In 2020, a Toronto export manager (Angelica O. Preto) for a <a href="https://nationalpost.com/news/canadian-exporter-sentenced-in-u-s-for-breaching-iran-embargo-by-secretly-exporting-oil-and-gas-equipment">Mississauga company</a> (UE Canada Inc) was sentenced to prison in the United States for illegally exporting gas turbine engine parts to Iran, in violation of long-standing U.S. embargo and trade sanctions. During Preti&#8217;s time as export operations manager, the company was involved in 47 shipments exported from the U.S. Of those shipments, 23 were destined for Iran.</p></li><li><p>In another case from 2020, Bahram Karimi was accused of bank fraud in an alleged money laundering and sanctions evasion scheme involving Iran&#8217;s government, a state-owned oil company in Venezuela, and a complex web of offshore accounts and shell companies (<a href="https://globalnews.ca/news/6509636/venezuela-project-canadian-man-charged-iranian-government-money-laundering/">the Venezuela project</a>).<sup> </sup> In June 2020, the case against him was dismissed because certain evidence was not disclosed to defense lawyers.&nbsp; The indictment indicates Karimi lives in Canada, but offers no details of whether he used a Canadian passport or businesses in the scheme.</p></li></ul><h3>Other measures of enforcement / implementation </h3><p>Aside from these attempted and successful prosecutions in Canada and the United States, we have few other metrics for how our sanctions are enforced. Recently, in relation to the Russia sanctions, the RCMP has <a href="https://www.rcmp-grc.gc.ca/en/news/2022/update-the-reporting-frozen-assets-the-special-economic-measures-act-russia-regulations-0">told us</a> that $292 million in financial transactions have been blocked and $122 million in assets have been frozen as a result of the SEMA Russia sanctions. </p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!1rch!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbaada544-b4d1-4f16-b7b8-fe55665480be_1300x118.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!1rch!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbaada544-b4d1-4f16-b7b8-fe55665480be_1300x118.png 424w, https://substackcdn.com/image/fetch/$s_!1rch!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbaada544-b4d1-4f16-b7b8-fe55665480be_1300x118.png 848w, https://substackcdn.com/image/fetch/$s_!1rch!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbaada544-b4d1-4f16-b7b8-fe55665480be_1300x118.png 1272w, https://substackcdn.com/image/fetch/$s_!1rch!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbaada544-b4d1-4f16-b7b8-fe55665480be_1300x118.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!1rch!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbaada544-b4d1-4f16-b7b8-fe55665480be_1300x118.png" width="1300" height="118" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/baada544-b4d1-4f16-b7b8-fe55665480be_1300x118.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:118,&quot;width&quot;:1300,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:39511,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!1rch!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbaada544-b4d1-4f16-b7b8-fe55665480be_1300x118.png 424w, https://substackcdn.com/image/fetch/$s_!1rch!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbaada544-b4d1-4f16-b7b8-fe55665480be_1300x118.png 848w, https://substackcdn.com/image/fetch/$s_!1rch!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbaada544-b4d1-4f16-b7b8-fe55665480be_1300x118.png 1272w, https://substackcdn.com/image/fetch/$s_!1rch!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbaada544-b4d1-4f16-b7b8-fe55665480be_1300x118.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p>They also said that for Iran and Haiti, the RCMP has received no disclosure on frozen assets. So I suppose we are meant to assume that our Iran and Haiti sanctions have not resulted in any frozen or blocked assets. Currently, Canada has sanctions in place against twenty-two countries. I find it hard to believe that there are no other frozen or blocked assets in Canada from any of these countries, or that there have been no attempts to evade these sanctions. Food for thought as we consider the utility and implementation of sanctions, and how to investigate and enforce potential breaches of sanctions in Canada.</p><p><em>Did you find this interesting? Share it with a friend, and don&#8217;t forget to subscribe! </em></p><p></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/p/enforcing-canadian-sanctions?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/p/enforcing-canadian-sanctions?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p> </p><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-1" href="#footnote-anchor-1" class="footnote-number" contenteditable="false" target="_self">1</a><div class="footnote-content"><p>Michael Saunders, &#8220;Capabilities and Gaps in the Canadian Special Economic Measures Act Regime,&#8221; <em>Canadian Foreign Policy Journal</em>, November 28, 2022, 1&#8211;17, <a href="https://doi.org/10.1080/11926422.2022.2145323">https://doi.org/10.1080/11926422.2022.2145323</a>.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-2" href="#footnote-anchor-2" class="footnote-number" contenteditable="false" target="_self">2</a><div class="footnote-content"><p>Government of Canada, &#8220;A Coherent and Effective Approach to Canada&#8217;s Sanctions Regimes&#8239;: Sergei Magnitsky and beyond / Hon. Robert D. Nault, Chair.: XC11-1/1-421-7E-PDF - Government of Canada Publications - Canada.Ca,&#8221; Report of the Standing Committee on Foreign Affairs and International Development&#8239;; 7th Report, 42nd Legislature, 1st Session (Ottawa, Canada, 2017), https://publications.gc.ca/site/eng/9.834916/publication.html.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-3" href="#footnote-anchor-3" class="footnote-number" contenteditable="false" target="_self">3</a><div class="footnote-content"><p>FINTRAC Annual report 2007-2008</p></div></div>]]></content:encoded></item><item><title><![CDATA[Safe Canadians, Secure Economy: FINTRAC’s 2020-2021 Annual Report]]></title><description><![CDATA[Recently, I read through every FINTRAC report looking for some clues as to the effectiveness of Canada&#8217;s counter-terrorist financing regime.]]></description><link>https://newsletter.insightthreatintel.com/p/safe-canadians-secure-economy-fintracs</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/safe-canadians-secure-economy-fintracs</guid><dc:creator><![CDATA[Jessica Davis, PhD]]></dc:creator><pubDate>Tue, 08 Mar 2022 14:00:52 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!fHmH!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F6a6924b0-1eb4-4962-80a6-6f3fa015eb43_1244x870.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Recently, I read through every FINTRAC report looking for some clues as to the effectiveness of Canada&#8217;s counter-terrorist financing regime. While the jury is still out on that question (which also happens to be the subject of my dissertation), the exercise allowed me to pull out some interesting data and points for comparison with this year&#8217;s report. This newsletter focuses on that report, but also includes some comparative analysis with prior years. I should note &#8211; since my focus is on terrorist financing, I&#8217;m largely ignoring a lot of the money laundering information (for now, anyway). Let&#8217;s get into it!</em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/subscribe?"><span>Subscribe now</span></a></p><h3><strong>Twenty-One Years of Reporting</strong></h3><p>Since its inception in 2000, FINTRAC has put out an annual report every year (except 2000-2001). Reading through twenty-one years of FINTRAC history is an exercise in and of itself, and re-reading the reports from my time there (2009-2013) brought back some very fond memories. It also provides some interesting data that we can use to start to answer the question about what FINTRAC&#8217;s role is in Canada&#8217;s counter-terrorist financing regime, how it goes about fulfilling it, and how effective it is in that role. While those are some big questions (and well beyond the scope of this newsletter, and probably FINTRAC&#8217;s annual report itself), let&#8217;s talk about some interesting data from these reports. First of all, there were far fewer disclosures made on terrorist financing / threats to the security of Canada, a level not seen since 2012. Does this mean there is less terrorist financing in Canada than in prior years? </p><p>The decrease in terrorism financing and threats disclosures was not due to a significant decrease in reporting to FINTRAC. Overall reports sent to FINTRAC remained about the same, although some pandemic effects were clearly visible in the reporting. For instance, there was a significant decrease in casino disbursement reports, as well as large cash transaction and cross-border currency (and seizure) reports. These types of reports are sensitive to pandemic effects: for instance, closed borders and less travel was a likely causal factor for the decrease in cross-border activity (these reports result from the seizure or declaration of cash in excess of $10,000).</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!fHmH!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F6a6924b0-1eb4-4962-80a6-6f3fa015eb43_1244x870.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!fHmH!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F6a6924b0-1eb4-4962-80a6-6f3fa015eb43_1244x870.png 424w, https://substackcdn.com/image/fetch/$s_!fHmH!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F6a6924b0-1eb4-4962-80a6-6f3fa015eb43_1244x870.png 848w, https://substackcdn.com/image/fetch/$s_!fHmH!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F6a6924b0-1eb4-4962-80a6-6f3fa015eb43_1244x870.png 1272w, https://substackcdn.com/image/fetch/$s_!fHmH!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F6a6924b0-1eb4-4962-80a6-6f3fa015eb43_1244x870.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!fHmH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F6a6924b0-1eb4-4962-80a6-6f3fa015eb43_1244x870.png" width="1244" height="870" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/6a6924b0-1eb4-4962-80a6-6f3fa015eb43_1244x870.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:870,&quot;width&quot;:1244,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:68812,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!fHmH!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F6a6924b0-1eb4-4962-80a6-6f3fa015eb43_1244x870.png 424w, https://substackcdn.com/image/fetch/$s_!fHmH!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F6a6924b0-1eb4-4962-80a6-6f3fa015eb43_1244x870.png 848w, https://substackcdn.com/image/fetch/$s_!fHmH!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F6a6924b0-1eb4-4962-80a6-6f3fa015eb43_1244x870.png 1272w, https://substackcdn.com/image/fetch/$s_!fHmH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F6a6924b0-1eb4-4962-80a6-6f3fa015eb43_1244x870.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">FINTRAC transaction reports, 2009-2021 (author&#8217;s data - derived from FINTRAC annual reports)</figcaption></figure></div><h3><strong>Far less reporting from casinos</strong></h3><p>Large cash transaction reports also likely experienced a serious pandemic effect with a general move away from cash in the economy (whether this persists in future years will be interesting to see), and of course the closure of casinos, which likely accounts for the majority of the very notable decrease in casino reports. (Casino disbursement reports involve any disbursement of $10,000 or more.) The volume of casino reports was down almost 86% from the year before; casinos were closed for a good part of the year. However, this decline is something that we should keep an eye on, particularly given the <a href="https://www.cbc.ca/news/canada/british-columbia/cullen-commission-extension-1.6263691">Cullen Commission</a> and the issues that were raised with regards to the detection and reporting of transactions from the casino sector.</p><p></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!-roq!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F7228edd7-54fd-46b9-b208-2542d6b341cd_1212x854.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!-roq!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F7228edd7-54fd-46b9-b208-2542d6b341cd_1212x854.png 424w, https://substackcdn.com/image/fetch/$s_!-roq!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F7228edd7-54fd-46b9-b208-2542d6b341cd_1212x854.png 848w, https://substackcdn.com/image/fetch/$s_!-roq!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F7228edd7-54fd-46b9-b208-2542d6b341cd_1212x854.png 1272w, https://substackcdn.com/image/fetch/$s_!-roq!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F7228edd7-54fd-46b9-b208-2542d6b341cd_1212x854.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!-roq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F7228edd7-54fd-46b9-b208-2542d6b341cd_1212x854.png" width="1212" height="854" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/7228edd7-54fd-46b9-b208-2542d6b341cd_1212x854.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:854,&quot;width&quot;:1212,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:86939,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!-roq!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F7228edd7-54fd-46b9-b208-2542d6b341cd_1212x854.png 424w, https://substackcdn.com/image/fetch/$s_!-roq!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F7228edd7-54fd-46b9-b208-2542d6b341cd_1212x854.png 848w, https://substackcdn.com/image/fetch/$s_!-roq!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F7228edd7-54fd-46b9-b208-2542d6b341cd_1212x854.png 1272w, https://substackcdn.com/image/fetch/$s_!-roq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F7228edd7-54fd-46b9-b208-2542d6b341cd_1212x854.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Number of casino disbursements reported to FINTRAC, 2009-2021</figcaption></figure></div><h3><strong>Less terrorism and fewer threats?</strong></h3><p>The decrease in disclosures relating to terrorist financing and threats to the security of Canada is one of the more interesting datapoints. This decrease suggests that the Centre is: </p><ul><li><p>receiving fewer financial transactions relating to these threats; and/or</p></li><li><p> receiving less information from partners in the form of voluntary information about threats (this information helps FINTRAC meet its grounds for disclosure); and/or</p></li><li><p>having greater difficulty meeting grounds for disclosure for other reasons.</p></li></ul><p>FINTRAC provides financial intelligence to law enforcement (usually the RCMP) when the Centre has reasonable grounds to suspect that the information would be relevant to a <a href="https://laws-lois.justice.gc.ca/eng/acts/P-24.501/page-9.html#docCont">terrorist activity financing investigation</a>. Disclosures relevant to foreign intelligence are disclosed to CSE when the information is relevant to the foreign intelligence (interference) aspect of CSE&#8217;s mandate, and disclosures are made to CSIS when that information would be relevant to <a href="https://laws-lois.justice.gc.ca/eng/acts/c-23/page-1.html#h-76161">threats to the security of Canada</a>. (Threats disclosures can also be made to law enforcement.)</p><p>Together, these types of disclosures are categorized in the annual report as &#8220;TF/TH&#8221; threats (in blue), and also are also categorized as &#8220;TF/TH/ML&#8221; disclosures (in brown) when there&#8217;s a money laundering component. Categorizing disclosures can be tricky: there are often multiple different activities at play.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ZUhc!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F588acec2-25a5-4e69-958a-369d318eb2ec_1458x844.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ZUhc!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F588acec2-25a5-4e69-958a-369d318eb2ec_1458x844.png 424w, https://substackcdn.com/image/fetch/$s_!ZUhc!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F588acec2-25a5-4e69-958a-369d318eb2ec_1458x844.png 848w, https://substackcdn.com/image/fetch/$s_!ZUhc!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F588acec2-25a5-4e69-958a-369d318eb2ec_1458x844.png 1272w, https://substackcdn.com/image/fetch/$s_!ZUhc!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F588acec2-25a5-4e69-958a-369d318eb2ec_1458x844.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ZUhc!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F588acec2-25a5-4e69-958a-369d318eb2ec_1458x844.png" width="1456" height="843" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/588acec2-25a5-4e69-958a-369d318eb2ec_1458x844.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:843,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:76671,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ZUhc!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F588acec2-25a5-4e69-958a-369d318eb2ec_1458x844.png 424w, https://substackcdn.com/image/fetch/$s_!ZUhc!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F588acec2-25a5-4e69-958a-369d318eb2ec_1458x844.png 848w, https://substackcdn.com/image/fetch/$s_!ZUhc!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F588acec2-25a5-4e69-958a-369d318eb2ec_1458x844.png 1272w, https://substackcdn.com/image/fetch/$s_!ZUhc!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F588acec2-25a5-4e69-958a-369d318eb2ec_1458x844.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>This year, disclosures relating to threats and terrorist financing are down almost 51% from the previous years. While these disclosures have been decreasing in recent years (starting in 2017-2018), this is the largest decrease to date. This might be due to a decreasing terrorism threat: <a href="https://www.lawfareblog.com/global-counterterrorism-and-after-pandemic">my research indicates</a> that terrorist attacks (one measure of levels of terrorism) are down notably, in part due to the pandemic. However, this decrease is curious, particularly in a world of evolving threats like ideologically motivated violent extremism. It makes me wonder whether FINTRAC&#8217;s mandate is allowing them to disclose on some of these newer threats, or if there might be a gap or mandate issue.</p><div class="embedded-post-wrap" data-attrs="{&quot;id&quot;:46660862,&quot;url&quot;:&quot;https://insightintel.substack.com/p/the-pandemic-effect-declining-levels&quot;,&quot;publication_id&quot;:329102,&quot;publication_name&quot;:&quot;Insight Intelligence&quot;,&quot;publication_logo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/09b767fc-6dde-4336-90bb-7806e0822653_900x900.png&quot;,&quot;title&quot;:&quot;The Pandemic Effect: Declining Levels of Terrorism&quot;,&quot;truncated_body_text&quot;:&quot;Welcome to our new subscribers! Our community is growing slowly but steadily, thanks to all your referrals and sharing of this newsletter. I appreciate it! In this analysis, I look at how terrorism has changed during the pandemic. I use the rates of female terrorist attacks worldwide to estimate levels of terrorism during the pandemic. I draw on a&quot;,&quot;date&quot;:&quot;2022-01-11T14:00:49.610Z&quot;,&quot;like_count&quot;:0,&quot;comment_count&quot;:0,&quot;bylines&quot;:[{&quot;id&quot;:33479672,&quot;name&quot;:&quot;Jessica Davis&quot;,&quot;photo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/11fcd0f3-76fc-47c8-a059-847d6401465f_863x613.jpeg&quot;,&quot;bio&quot;:&quot;President of Insight Threat Intelligence &quot;,&quot;profile_set_up_at&quot;:&quot;2021-04-18T17:51:34.758Z&quot;,&quot;publicationUsers&quot;:[{&quot;id&quot;:248164,&quot;user_id&quot;:33479672,&quot;publication_id&quot;:329102,&quot;role&quot;:&quot;admin&quot;,&quot;public&quot;:true,&quot;is_primary&quot;:false,&quot;publication&quot;:{&quot;id&quot;:329102,&quot;name&quot;:&quot;Insight Intelligence&quot;,&quot;subdomain&quot;:&quot;insightintel&quot;,&quot;custom_domain&quot;:null,&quot;custom_domain_optional&quot;:false,&quot;hero_text&quot;:&quot;Global security, terrorism, espionage and illicit financing -- news and analysis you won't find anywhere else! &quot;,&quot;logo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/09b767fc-6dde-4336-90bb-7806e0822653_900x900.png&quot;,&quot;author_id&quot;:33479672,&quot;theme_var_background_pop&quot;:&quot;#FF5CD7&quot;,&quot;created_at&quot;:&quot;2021-04-05T14:36:24.139Z&quot;,&quot;rss_website_url&quot;:null,&quot;email_from_name&quot;:&quot;Jessica Davis from Insight Threat Intelligence&quot;,&quot;copyright&quot;:&quot;Jessica Davis&quot;,&quot;founding_plan_name&quot;:&quot;Founding Member&quot;,&quot;community_enabled&quot;:true,&quot;invite_only&quot;:false}}],&quot;is_guest&quot;:false}],&quot;utm_campaign&quot;:null,&quot;belowTheFold&quot;:true,&quot;type&quot;:null,&quot;language&quot;:&quot;en&quot;}" data-component-name="EmbeddedPostToDOM"><a class="embedded-post" native="true" href="https://insightintel.substack.com/p/the-pandemic-effect-declining-levels?utm_source=substack&amp;utm_campaign=post_embed&amp;utm_medium=web"><div class="embedded-post-header"><img class="embedded-post-publication-logo" src="https://substackcdn.com/image/fetch/$s_!Ar7z!,w_56,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F09b767fc-6dde-4336-90bb-7806e0822653_900x900.png" loading="lazy"><span class="embedded-post-publication-name">Insight Intelligence</span></div><div class="embedded-post-title-wrapper"><div class="embedded-post-title">The Pandemic Effect: Declining Levels of Terrorism</div></div><div class="embedded-post-body">Welcome to our new subscribers! Our community is growing slowly but steadily, thanks to all your referrals and sharing of this newsletter. I appreciate it! In this analysis, I look at how terrorism has changed during the pandemic. I use the rates of female terrorist attacks worldwide to estimate levels of terrorism during the pandemic. I draw on a&#8230;</div><div class="embedded-post-cta-wrapper"><span class="embedded-post-cta">Read more</span></div><div class="embedded-post-meta">4 years ago &#183; Jessica Davis</div></a></div><p>It's also worth noting here that despite over 4,600 disclosures potentially relating to terrorist financing (this number includes threats disclosures as well), we have had two terrorist financing convictions in Canada. This despite the fact that FINTRAC has written clearly about the terrorist financing threat in Canada in its 2018 report, outlining the various groups that are active in Canada. There&#8217;s clearly a discrepancy here in terms of how FINTRAC sees terrorist activity financing and how police are investigating and prosecuting that activity.</p><p>For several years now, FINTRAC&#8217;s annual reports have emphasized the terrorist activity investigations where their financial intelligence has played a role. For instance, this year, the report noted their contribution to an investigation that resulted in a Toronto-area woman being charged with participation in activities of a terrorist group in Canada.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a> While not named specifically, this is likely the case of <a href="https://www.cbc.ca/news/canada/haleema-mustafa-bail-1.5970940">Haleema Mustafa</a>, who was charged with terrorism-related charges for travelling to Turkey to join the Islamic State &#8211; charges that were later stayed. While no details about FINTRAC&#8217;s contribution were provided, this could have included suspicious transaction reports (perhaps banks identifying any ATM use in Canada or overseas relevant to the investigative time-period) or international electronic funds transfers of $10,000 or more). This demonstrates that despite the lack of terrorist financing charges and convictions in Canada, FINTRAC&#8217;s intelligence is clearly useful for terrorism investigations. However, the full extent of that usefulness remains unclear. Does FINTRAC provide value for its budget in terms of helping to detect and disrupt terrorist financing and threats to the security of Canada? This remains an unanswered question. While we have some qualitative support for the role of the Centre in the form of testimonials from partner agencies, concrete examples of its role and quantitative data showing effects and outcomes remains sparse.</p><p><em>If you want to read about the 2021-2022 report, here you go: </em></p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;160b90e6-bd5b-4045-8471-1ca9b03a64e7&quot;,&quot;caption&quot;:&quot;It&#8217;s the most wonderful time of the year! FINTRAC&#8217;s annual report dropped last week. Okay, I&#8217;ll admit that I&#8217;m probably the only one that excited about this report. But for those of you who don&#8217;t know, this report is one of the most transparent descriptions of the activities of a department or agency in the Canadian security and intelligence service. And while I&#8217;m often annoyed about our lack of measurements in the anti-money laundering and counter-terrorist financing world, this report at least gives us ~some~ insight. Read to find out how Canada is doing in its fight against money laundering, terrorist financing, and other financial crimes!&quot;,&quot;cta&quot;:null,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Is Canada giving up on tackling terrorist financing? &quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:33479672,&quot;name&quot;:&quot;Jessica Davis&quot;,&quot;bio&quot;:&quot;Jessica Davis is President of Insight Threat Intelligence and is the author of Women in Modern Terrorism: From Liberations Wars to Global Terrorism and the Islamic State (2017), and Illicit Money: Financing Terrorism in the 21st Century (2021).&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e312ae7c-114b-4e4f-9ce1-8bf50ddb7a27_2344x2049.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2023-12-07T14:01:27.892Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F075f5c74-65d7-4d44-ae39-60c731086a4a_733x431.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://newsletter.insightthreatintel.com/p/is-canada-giving-up-on-tackling-terrorist&quot;,&quot;section_name&quot;:&quot;Commentary&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:139466621,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:4,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Insight Monitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F09b767fc-6dde-4336-90bb-7806e0822653_900x900.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/p/safe-canadians-secure-economy-fintracs?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/p/safe-canadians-secure-economy-fintracs?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p></p><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-1" href="#footnote-anchor-1" class="footnote-number" contenteditable="false" target="_self">1</a><div class="footnote-content"><p> FINTRAC, 9.</p><p></p></div></div>]]></content:encoded></item><item><title><![CDATA[Consequences of terrorist listings in Canada ]]></title><description><![CDATA[What this means for the Taliban AND ideologically-motivated violent extremists]]></description><link>https://newsletter.insightthreatintel.com/p/consequences-of-terrorist-listings</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/consequences-of-terrorist-listings</guid><dc:creator><![CDATA[Jessica Davis, PhD]]></dc:creator><pubDate>Tue, 07 Sep 2021 13:00:07 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!FSdS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8893280e-d335-44a1-87e0-8016fa761e43_1208x551.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>This post has been sitting as a draft for the last few months. In light of conversations about further sanctioning the Taliban (more on that later) and the takeover of Afghanistan by a listed terrorist entity, I thought it would be useful to go over the implications of being designated a terrorist entity in Canada, looking both at the Taliban and ideologically-motivated violent extremists such as the Proud Boys to illustrate the implications. </em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/p/consequences-of-terrorist-listings?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/p/consequences-of-terrorist-listings?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!FSdS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8893280e-d335-44a1-87e0-8016fa761e43_1208x551.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!FSdS!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8893280e-d335-44a1-87e0-8016fa761e43_1208x551.png 424w, https://substackcdn.com/image/fetch/$s_!FSdS!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8893280e-d335-44a1-87e0-8016fa761e43_1208x551.png 848w, https://substackcdn.com/image/fetch/$s_!FSdS!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8893280e-d335-44a1-87e0-8016fa761e43_1208x551.png 1272w, https://substackcdn.com/image/fetch/$s_!FSdS!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8893280e-d335-44a1-87e0-8016fa761e43_1208x551.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!FSdS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8893280e-d335-44a1-87e0-8016fa761e43_1208x551.png" width="1208" height="551" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/8893280e-d335-44a1-87e0-8016fa761e43_1208x551.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:551,&quot;width&quot;:1208,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:198809,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!FSdS!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8893280e-d335-44a1-87e0-8016fa761e43_1208x551.png 424w, https://substackcdn.com/image/fetch/$s_!FSdS!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8893280e-d335-44a1-87e0-8016fa761e43_1208x551.png 848w, https://substackcdn.com/image/fetch/$s_!FSdS!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8893280e-d335-44a1-87e0-8016fa761e43_1208x551.png 1272w, https://substackcdn.com/image/fetch/$s_!FSdS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8893280e-d335-44a1-87e0-8016fa761e43_1208x551.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3>Terrorist Listings and the Anti-Terrorism Act, 2001</h3><p>The Canadian listings process is brought to us by the <a href="https://www.justice.gc.ca/eng/cj-jp/ns-sn/act-loi.html">Anti-Terrorism Act of 2001</a>, and  is set out in section 83.05 of the Criminal Code. When it was written, this section was the subject of some controversy, and legal scholars note that the listings process might be &#8220;constitutionally suspect&#8221;.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a>  The listing regime first arose following the UN Security Council resolution 1267, which prohibited financial transactions with the Taliban (and Al Qaeda, later) affiliates listed by the Security Council, implemented under Canada&#8217;s <em>United Nations Act</em>.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-2" href="#footnote-2" target="_self">2</a></p><h3>So what&#8217;s an entity? </h3><p>Only &#8220;entities&#8221; can be listed as terrorists. An entity can be a person, group, trust, partnership, fund, or an unincorporated association or organization. Organizations are further defined as a public body, body corporate, society, company, firm, partnership, trade union, or municipality, association of persons created for a common purpose, that has an operational structure, and holds itself out to the public as an association of persons.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-3" href="#footnote-3" target="_self">3</a> So this means that both groups and individuals can be listed as terrorist entities. For instance, we have two individuals listed, <a href="https://www.publicsafety.gc.ca/cnt/ntnl-scrt/cntr-trrrsm/lstd-ntts/crrnt-lstd-ntts-en.aspx#23">Gulbudding Hekmatyar</a> and <a href="https://www.publicsafety.gc.ca/cnt/ntnl-scrt/cntr-trrrsm/lstd-ntts/crrnt-lstd-ntts-en.aspx#63">James Mason</a>, many groups that are commonly identifiable as terrorist groups (like ISIL, Al Qaeda, etc), as well as organizations like the <a href="https://www.publicsafety.gc.ca/cnt/ntnl-scrt/cntr-trrrsm/lstd-ntts/crrnt-lstd-ntts-en.aspx#55">World Tamil Movement</a> and the not-for-profit organization <a href="https://www.publicsafety.gc.ca/cnt/ntnl-scrt/cntr-trrrsm/lstd-ntts/crrnt-lstd-ntts-en.aspx#32">IRFAN</a>.</p><p>What remains to be seen is how the listing process evolves with the terrorism landscape. There are currently a number of movements that can be described as extremist in nature<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-4" href="#footnote-4" target="_self">4</a> and whose adherents have engaged in acts of violence motivated by politics, ideology, or religion. For instance, some Boogaloo,<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-5" href="#footnote-5" target="_self">5</a> QAnon<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-6" href="#footnote-6" target="_self">6</a> and <a href="https://www.bbc.com/news/world-us-canada-52733060">Incel</a> adherents have engaged in acts of violence that can be characterized as acts of terrorism. Will we see efforts to list some of these movements as terrorist entities? To my mind, they lack an operational structure. However, the listings process isn&#8217;t an entirely rational or a-political process, and it&#8217;s unclear if operational structures are a requirement. As such, we may see more listings rather than fewer in the coming months and years, particularly in the absence of any constitutional challenges that force a re-think of some (or all) of these provisions. </p><h3>Who decides if an entity should be listed? </h3><p>The ultimate decision to list an entity is the <a href="https://www.constitutionalstudies.ca/2019/07/governor-in-council/">Governor in Council</a>, but that decision is based on a recommendation from the Minister of Public Safety. In order to provide the Minister information upon which to base this recommendation, members of the Canadian security and intelligence community provide information as part of a listings package. This process is usually lead by CSIS or the RCMP, who are the &#8216;lead pen&#8217; on criminal or security intelligence reports. In some cases, they may draft the listings package based entirely on their own information, or may request or incorporate information from other departments and agencies in Canada, including FINTRAC, CSE, CBSA, <a href="https://www.osfi-bsif.gc.ca/Eng/fi-if/amlc-clrpc/Pages/dsninstr.aspx">Global Affairs Canada</a>, etc. </p><p>The threshold for listing is &#8220;reasonable grounds to believe&#8221; that: </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://laws-lois.justice.gc.ca/eng/acts/c-46/page-14.html" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!rNik!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5a36f97-7738-487b-94e3-012e2f3915c6_851x290.png 424w, https://substackcdn.com/image/fetch/$s_!rNik!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5a36f97-7738-487b-94e3-012e2f3915c6_851x290.png 848w, https://substackcdn.com/image/fetch/$s_!rNik!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5a36f97-7738-487b-94e3-012e2f3915c6_851x290.png 1272w, https://substackcdn.com/image/fetch/$s_!rNik!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5a36f97-7738-487b-94e3-012e2f3915c6_851x290.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!rNik!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5a36f97-7738-487b-94e3-012e2f3915c6_851x290.png" width="851" height="290" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/a5a36f97-7738-487b-94e3-012e2f3915c6_851x290.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:290,&quot;width&quot;:851,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:50000,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://laws-lois.justice.gc.ca/eng/acts/c-46/page-14.html&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!rNik!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5a36f97-7738-487b-94e3-012e2f3915c6_851x290.png 424w, https://substackcdn.com/image/fetch/$s_!rNik!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5a36f97-7738-487b-94e3-012e2f3915c6_851x290.png 848w, https://substackcdn.com/image/fetch/$s_!rNik!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5a36f97-7738-487b-94e3-012e2f3915c6_851x290.png 1272w, https://substackcdn.com/image/fetch/$s_!rNik!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5a36f97-7738-487b-94e3-012e2f3915c6_851x290.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Source: Criminal Code of Canada, 83.05</figcaption></figure></div><h3>Nomination to be listed</h3><p>Terrorist entities are nominated for listing in a number of ways. Traditionally, law enforcement and security services consult with the broader intelligence community to determine potential nominees; much of this involves ensuring that the list remains updated with the most recent iteration of a terrorist group&#8217;s naming convention. In more recent years, some listings might have come about because of a <a href="https://www.ctvnews.ca/politics/mps-agree-to-call-on-feds-to-declare-proud-boys-a-terrorist-entity-1.5281428">call for listing in the House of Commons</a> and/or at the direction of Public Safety Canada, which leads a coordinating committee. However, regardless of how they are nominated, evidence of their activities has to be obtained, and that evidence has to amount to reasonable grounds to believe that they have knowingly carried out, attempted, participated, or facilitated a terrorist activity, or knowingly acted on behalf of, at the direction of, or in association with an entity that engaged (or tried to engage) in terrorism. </p><p>For example, the Taliban has been a listed terrorist entity in Canada since <a href="https://www.publicsafety.gc.ca/cnt/ntnl-scrt/cntr-trrrsm/lstd-ntts/crrnt-lstd-ntts-en.aspx#53">2013</a>, but specific sanctions have also been in place under the <a href="https://laws-lois.justice.gc.ca/eng/acts/u-2/index.html">UN Act</a> (as part of Canada&#8217;s implementation of international sanctions against the Taliban) <a href="https://documents-dds-ny.un.org/doc/UNDOC/GEN/N99/300/44/PDF/N9930044.pdf?OpenElement">since 1999</a>. On the other hand, the <a href="https://www.publicsafety.gc.ca/cnt/ntnl-scrt/cntr-trrrsm/lstd-ntts/crrnt-lstd-ntts-en.aspx#510">Proud Boys</a> have only been a listed terrorist entity in Canada since 2021. There is a lot of variation in the reasons for listing between these two entities, including the specific use of violence by each group. </p><p>The information used for the listings process can be classified or unclassified, although an unclassified summary is always provided on Public Safety Canada&#8217;s website. However, the full package of information supporting the listings can be far longer than the public information suggests. </p><h3>What are the concrete impacts of listing?  </h3><p>When a group becomes a listed entity, the group itself isn&#8217;t outlawed, and it isn&#8217;t a crime to be a member of the group.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-7" href="#footnote-7" target="_self">7</a> For the Taliban and the Proud Boys, this means that it isn&#8217;t illegal to be a member of the group. However, if an individual&#8217;s membership in that group is a matter of public information, further issues might arise for that individual. (More on that in a minute.) </p><ul><li><p>However, it IS an offence to participate or contribute to a terrorist group, either directly or indirectly. <strong>BUT</strong> this is only an offence <a href="https://www.publicsafety.gc.ca/cnt/ntnl-scrt/cntr-trrrsm/lstd-ntts/index-en.aspx">if its purpose</a> is to enhance the ability of a terrorist group to facilitate or carry out a terrorist activity. </p></li></ul><p>The criminal code specifies that it&#8217;s a crime to provide property or financial services that could benefit a terrorist group. Basically this means you can&#8217;t finance a terrorist group but they don&#8217;t have to be listed for that prohibition to be in place. And you can&#8217;t finance other types of entities if the purpose of that financing is for terrorist activity, but you can provide funds for people or other types of entities for non-terrorist purposes. (This makes some sense - James Mason&#8217;s hypothetical employer isn&#8217;t financing terrorism by paying him, for example, and donors to a listed charitable organization aren&#8217;t financing terrorism unless that organization is a terrorist group, or if the purpose of those funds are for terrorist activity. Still a little fuzzy, I&#8217;m sure, and we haven&#8217;t even delved into the idea of self-nominating terrorist groups...<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-8" href="#footnote-8" target="_self">8</a>) </p><p>As Michael Nesbitt notes, the listing process circumnavigates the definition of terrorist activity somewhat with regards to financing a group. The listing process allows prosecutors to rely on the terrorist entity listing without reference to the definition of terrorist activity.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-9" href="#footnote-9" target="_self">9</a> </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Q-iR!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F554fe1ff-a2b7-4200-9dba-a0ac9afd6b21_1125x1544.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Q-iR!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F554fe1ff-a2b7-4200-9dba-a0ac9afd6b21_1125x1544.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Q-iR!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F554fe1ff-a2b7-4200-9dba-a0ac9afd6b21_1125x1544.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Q-iR!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F554fe1ff-a2b7-4200-9dba-a0ac9afd6b21_1125x1544.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Q-iR!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F554fe1ff-a2b7-4200-9dba-a0ac9afd6b21_1125x1544.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Q-iR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F554fe1ff-a2b7-4200-9dba-a0ac9afd6b21_1125x1544.jpeg" width="1125" height="1544" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/554fe1ff-a2b7-4200-9dba-a0ac9afd6b21_1125x1544.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1544,&quot;width&quot;:1125,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:336155,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Q-iR!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F554fe1ff-a2b7-4200-9dba-a0ac9afd6b21_1125x1544.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Q-iR!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F554fe1ff-a2b7-4200-9dba-a0ac9afd6b21_1125x1544.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Q-iR!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F554fe1ff-a2b7-4200-9dba-a0ac9afd6b21_1125x1544.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Q-iR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F554fe1ff-a2b7-4200-9dba-a0ac9afd6b21_1125x1544.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>Upon listing, an entity&#8217;s property can be seized, restrained, or forfeited. This means that any accounts held in the name of the Taliban in Canada can be seized, restrained, or forfeited. However, this is unlikely to occur because </p><ul><li><p>a) most terrorist groups don&#8217;t actually hold accounts in their names or the names of their leaders, and </p></li><li><p>b) this is particularly unlikely for groups that operate largely outside of Canada.</p><p><em>Where this has actually been more common is for the listing of organizations (including charitable or non-profit organizations) in Canada. Similarly, it&#8217;s unlikely (although not impossible) that the Proud Boys had any accounts at banks or financial institutions that could be seized, restrained or forfeited. The most likely scenario is that a regional chapter of the group might have had a small account at a local financial institution, but even this scenario is fairly unlikely.</em> </p><div class="embedded-post-wrap" data-attrs="{&quot;id&quot;:37092116,&quot;url&quot;:&quot;https://insightintel.substack.com/p/proud-boys-financing&quot;,&quot;publication_id&quot;:329102,&quot;publication_name&quot;:&quot;Insight Intelligence&quot;,&quot;publication_logo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/09b767fc-6dde-4336-90bb-7806e0822653_900x900.png&quot;,&quot;title&quot;:&quot;Proud Boys Financing &quot;,&quot;truncated_body_text&quot;:&quot;In February 2021, the Canadian government listed the Proud Boys as a terrorist entity under Canada&#8217;s Criminal Code. Despite this listing, a website associated with the group continues to operate and is accessible where people, including from Canadian IP addresses, can purchase merchandise and make donations to the group. Merchandise sales and donations &#8230;&quot;,&quot;date&quot;:&quot;2021-06-10T13:00:40.011Z&quot;,&quot;like_count&quot;:2,&quot;comment_count&quot;:0,&quot;bylines&quot;:[{&quot;id&quot;:33479672,&quot;name&quot;:&quot;Jessica Davis&quot;,&quot;photo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/11fcd0f3-76fc-47c8-a059-847d6401465f_863x613.jpeg&quot;,&quot;bio&quot;:&quot;President of Insight Threat Intelligence &quot;,&quot;profile_set_up_at&quot;:&quot;2021-04-18T17:51:34.758Z&quot;,&quot;tos_accepted_at&quot;:&quot;2021-04-05T14:35:27.575Z&quot;,&quot;publicationUsers&quot;:[{&quot;id&quot;:248164,&quot;user_id&quot;:33479672,&quot;role&quot;:&quot;admin&quot;,&quot;public&quot;:true,&quot;is_primary&quot;:false,&quot;publication&quot;:{&quot;id&quot;:329102,&quot;name&quot;:&quot;Insight Intelligence&quot;,&quot;subdomain&quot;:&quot;insightintel&quot;,&quot;custom_domain&quot;:null,&quot;custom_domain_optional&quot;:false,&quot;hero_text&quot;:&quot;All things global security, terrorism, espionage and illicit financing - we offer news and analysis you won't find anywhere else! &quot;,&quot;logo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/09b767fc-6dde-4336-90bb-7806e0822653_900x900.png&quot;,&quot;author_id&quot;:33479672,&quot;theme_var_background_pop&quot;:&quot;#FF5CD7&quot;,&quot;created_at&quot;:&quot;2021-04-05T14:36:24.139Z&quot;,&quot;rss_website_url&quot;:null,&quot;email_from_name&quot;:&quot;Jessica Davis from Insight Threat Intelligence&quot;,&quot;copyright&quot;:&quot;Jessica Davis&quot;,&quot;founding_plan_name&quot;:&quot;Founding Member&quot;,&quot;community_enabled&quot;:true,&quot;invite_only&quot;:false}}],&quot;is_guest&quot;:false}],&quot;utm_campaign&quot;:null,&quot;belowTheFold&quot;:true,&quot;type&quot;:null,&quot;language&quot;:&quot;en&quot;}" data-component-name="EmbeddedPostToDOM"><a class="embedded-post" native="true" href="https://insightintel.substack.com/p/proud-boys-financing?utm_source=substack&amp;utm_campaign=post_embed&amp;utm_medium=web"><div class="embedded-post-header"><img class="embedded-post-publication-logo" src="https://substackcdn.com/image/fetch/$s_!Ar7z!,w_56,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F09b767fc-6dde-4336-90bb-7806e0822653_900x900.png" loading="lazy"><span class="embedded-post-publication-name">Insight Intelligence</span></div><div class="embedded-post-title-wrapper"><div class="embedded-post-title">Proud Boys Financing </div></div><div class="embedded-post-body">In February 2021, the Canadian government listed the Proud Boys as a terrorist entity under Canada&#8217;s Criminal Code. Despite this listing, a website associated with the group continues to operate and is accessible where people, including from Canadian IP addresses, can purchase merchandise and make donations to the group. Merchandise sales and donations &#8230;</div><div class="embedded-post-cta-wrapper"><span class="embedded-post-cta">Read more</span></div><div class="embedded-post-meta">5 years ago &#183; 2 likes &#183; Jessica Davis</div></a></div></li></ul><p>At the same time, banks, brokerages, and other financial institutions / entities have to report that they hold terrorist property if they identify any accounts / property in the name of the group, and they can&#8217;t allow the entities to access the property. The financial institutions cannot dispose of the property - instead, they essentially have to freeze it. </p><p>The law applies to the listed entity, but practically speaking, it extends to individuals associated with it. For instance, if a financial institution like a bank has an account in the name of someone who has been publicly identified as a member of the Taliban, upon listing, they will freeze, seize, and restrain that account or property. Most financial institutions are very risk-averse, and will do this when they suspect that an individual may be a member of a terrorist group. That suspicion is usually based on public information that identifies the individual as a member of the group, and can be obtained through the financial entity&#8217;s own social and media monitoring, or through services like Refinitiv World Check / Accelus World Check One.</p><p>If individuals are identified as being <a href="https://www.fintrac-canafe.gc.ca/guidance-directives/transaction-operation/Guide5/5-eng#s2">&#8220;associated with&#8221;</a> a terrorist group, financial institutions must report any property that they hold to the RCMP, CSIS, and FINTRAC, Canada&#8217;s financial intelligence unit, in a terrorist property report. </p><p>For the Taliban, it is unlikely that the group had named, publicly-identified members in Canada. For the Proud Boys, the situation is different. There are dozens of individuals in Canada who have been publicly identified as &#8220;associated&#8221; with the Proud Boys, through attending their protests and rallies, or through social media activity. This means that anyone publicly associated with the group may have been reported to FINTRAC, most likely through suspicious transaction reports. In fact, this is one of the tangible benefits of the listing process. Without being a listed terrorist entity, reporting entities might have insufficient grounds to report a client&#8217;s transactions. However, if they become aware of their client&#8217;s confirmed or potential association<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-10" href="#footnote-10" target="_self">10</a> with a listed terrorist entity, this usually meets their threshold for reporting. </p><p>Concurrently, most banks and financial entities, when confronted with the idea that they may have business dealings with someone associated with a listed terrorist entity, will choose to exit (or &#8220;de-risk&#8221;) that business relationship. Some of my banking sources tell me that in the case of the Proud Boys, this happened within hours of the listing being made public. This effectively means that they had their accounts frozen, and were instructed to find alternative banking arrangements. </p><h3>National Security Implications of Listings </h3><p>For national security and intelligence agencies, the listing process doesn&#8217;t do all that much. For investigative agencies, it changes little in their activities. Both CSIS and the RCMP have a mandate to investigate potential terrorist activity regardless of whether the entity the activity associated with is a listed entity. For other agencies, like those primarily involved in analysis or collection (like FINTRAC), but without a broad investigative mandate, this can enable further research, analysis, and dissemination of intelligence, including financial intelligence. The listing process establishes that there are reasonable grounds to believe that an entity is involved (or has been involved in) terrorist activity, allowing some of these organizations more operational space. </p><div class="embedded-post-wrap" data-attrs="{&quot;id&quot;:39407647,&quot;url&quot;:&quot;https://insightintel.substack.com/p/financial-intelligence-a-primer&quot;,&quot;publication_id&quot;:329102,&quot;publication_name&quot;:&quot;Insight Intelligence&quot;,&quot;publication_logo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/09b767fc-6dde-4336-90bb-7806e0822653_900x900.png&quot;,&quot;title&quot;:&quot;Financial Intelligence: A Primer&quot;,&quot;truncated_body_text&quot;:&quot;Welcome to the new subscribers to Insight Intelligence this week - thanks for joining the hundreds of people who are already part of our community. If you think someone you know would be interested in joining us, please share this post! Today I want to talk to you about a little-studied &#8220;int&#8221; in the intelligence community: financial intelligence. This t&#8230;&quot;,&quot;date&quot;:&quot;2021-08-18T13:00:43.391Z&quot;,&quot;like_count&quot;:3,&quot;comment_count&quot;:0,&quot;bylines&quot;:[{&quot;id&quot;:33479672,&quot;name&quot;:&quot;Jessica Davis&quot;,&quot;photo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/11fcd0f3-76fc-47c8-a059-847d6401465f_863x613.jpeg&quot;,&quot;bio&quot;:&quot;President of Insight Threat Intelligence &quot;,&quot;profile_set_up_at&quot;:&quot;2021-04-18T17:51:34.758Z&quot;,&quot;tos_accepted_at&quot;:&quot;2021-04-05T14:35:27.575Z&quot;,&quot;publicationUsers&quot;:[{&quot;id&quot;:248164,&quot;user_id&quot;:33479672,&quot;role&quot;:&quot;admin&quot;,&quot;public&quot;:true,&quot;is_primary&quot;:false,&quot;publication&quot;:{&quot;id&quot;:329102,&quot;name&quot;:&quot;Insight Intelligence&quot;,&quot;subdomain&quot;:&quot;insightintel&quot;,&quot;custom_domain&quot;:null,&quot;custom_domain_optional&quot;:false,&quot;hero_text&quot;:&quot;All things global security, terrorism, espionage and illicit financing - we offer news and analysis you won't find anywhere else! &quot;,&quot;logo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/09b767fc-6dde-4336-90bb-7806e0822653_900x900.png&quot;,&quot;author_id&quot;:33479672,&quot;theme_var_background_pop&quot;:&quot;#FF5CD7&quot;,&quot;created_at&quot;:&quot;2021-04-05T14:36:24.139Z&quot;,&quot;rss_website_url&quot;:null,&quot;email_from_name&quot;:&quot;Jessica Davis from Insight Threat Intelligence&quot;,&quot;copyright&quot;:&quot;Jessica Davis&quot;,&quot;founding_plan_name&quot;:&quot;Founding Member&quot;,&quot;community_enabled&quot;:true,&quot;invite_only&quot;:false}}],&quot;is_guest&quot;:false}],&quot;utm_campaign&quot;:null,&quot;belowTheFold&quot;:true,&quot;type&quot;:null,&quot;language&quot;:&quot;en&quot;}" data-component-name="EmbeddedPostToDOM"><a class="embedded-post" native="true" href="https://insightintel.substack.com/p/financial-intelligence-a-primer?utm_source=substack&amp;utm_campaign=post_embed&amp;utm_medium=web"><div class="embedded-post-header"><img class="embedded-post-publication-logo" src="https://substackcdn.com/image/fetch/$s_!Ar7z!,w_56,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F09b767fc-6dde-4336-90bb-7806e0822653_900x900.png" loading="lazy"><span class="embedded-post-publication-name">Insight Intelligence</span></div><div class="embedded-post-title-wrapper"><div class="embedded-post-title">Financial Intelligence: A Primer</div></div><div class="embedded-post-body">Welcome to the new subscribers to Insight Intelligence this week - thanks for joining the hundreds of people who are already part of our community. If you think someone you know would be interested in joining us, please share this post! Today I want to talk to you about a little-studied &#8220;int&#8221; in the intelligence community: financial intelligence. This t&#8230;</div><div class="embedded-post-cta-wrapper"><span class="embedded-post-cta">Read more</span></div><div class="embedded-post-meta">5 years ago &#183; 3 likes &#183; Jessica Davis</div></a></div><p>In some cases, the listing process may unlock additional resources for investigations, although this is not guaranteed. Further, listings are not required for this - political will is. </p><p>The listings process is about trying to ensure that the Canadian financial system isn&#8217;t being used by terrorists, but it&#8217;s hard to say if that&#8217;s actually what&#8217;s happening.  Financial tradecraft, third parties, proxies, shell companies, and lack of investigative resources assigned to investigate terrorist activity financing all work against this goal.</p><h3>The Delisting Process</h3><p>The delisting process is full of mysteries. There is no precise standard of evidence for delisting; instead, it happens on the recommendation of the Minister.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-11" href="#footnote-11" target="_self">11</a>  Historically, only one group (that I recall) has been de-listed, and that&#8217;s the <a href="https://www.cbc.ca/news/politics/canada-drops-iranian-group-mek-from-terror-list-1.1239066">Mujahedin-e-Khalq </a>(MEK). When the group was de-listed, the government offered no explanation, but was following the lead of the United States and the European Union who de-listed the group shortly before. </p><p>Entities can petition for delisting, but in Canada there has been no successful petition to date. In the case of this process, however, the government could face disclosure implications depending on the type of information that they relied on, and whether it was classified or unclassified, and if classified, if it included only Canadian or allied reporting. </p><p>Unfortunately, a lot of information about the listings process is excluded from disclosure through <a href="https://laws-lois.justice.gc.ca/eng/acts/a-1/page-13.html#docCont">access to information requests</a> due to its categorization as &#8220;confidence of the privy council&#8221; or as advice or recommendation to the Cabinet or the Minister, as I found out following an access request I placed on the listing of the Proud Boys.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-12" href="#footnote-12" target="_self">12</a> </p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/subscribe?"><span>Subscribe now</span></a></p><h3>Other Implications</h3><p>As noted before, the listings process may be on uncertain ground constitutionally. Further, the listings process can effectively de-bank Canadians; this would happen through Canadian financial institutions identifying a potential association between an individual and a terrorist organization, and refusing them financial services. If all the banks and financial entities in Canada did this, the hypothetical, terrorist-associated individual could effectively be de-banked from the Canadian financial system. However, Canadians have a right to open a <a href="https://www.canada.ca/en/financial-consumer-agency/services/rights-responsibilities/rights-banking/accounts-rights-responsibilities.html">personal bank account</a> at a bank (with some exceptions / limitations). It&#8217;s unclear how this would work or how an individual could get recourse. I asked the Financial Consumer Agency of Canada for clarification, and they pointed me to the Access to <a href="https://laws-lois.justice.gc.ca/eng/regulations/sor-2003-184/page-1.html">Basic Banking Services Regulations</a>, part of the bank act. In order to refuse to open an account, banks need to have reasonable grounds to believe (note the high threshold of belief) that the account will be used for illegal or fraudulent purposes. </p><p><strong><code>Still have questions about the listings process? Leave a comment and I&#8217;ll do my best to update this summary with more information! </code></strong><em><strong><code><br></code></strong></em></p><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-1" href="#footnote-anchor-1" class="footnote-number" contenteditable="false" target="_self">1</a><div class="footnote-content"><p>Craig Forcese and Leah West,&nbsp;<em>National Security Law, Second Edition</em>&nbsp;(Irwin Law Inc., 2020),&nbsp;<a href="https://irwinlaw.com/product/national-security-law-2-e/">https://irwinlaw.com/product/national-security-law-2-e/</a>, 221.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-2" href="#footnote-anchor-2" class="footnote-number" contenteditable="false" target="_self">2</a><div class="footnote-content"><p>Craig Forcese and Kent Roach, &#8220;Yesterday&#8217;s Law: Terrorist Group Listing in Canada,&#8221; <em>Terrorism and Political Violence</em>30, no. 2 (March 4, 2018): 259&#8211;77, <a href="https://doi.org/10.1080/09546553.2018.1432211">https://doi.org/10.1080/09546553.2018.1432211</a>.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-3" href="#footnote-anchor-3" class="footnote-number" contenteditable="false" target="_self">3</a><div class="footnote-content"><p>Ibid, 216</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-4" href="#footnote-anchor-4" class="footnote-number" contenteditable="false" target="_self">4</a><div class="footnote-content"><p>Stephanie Carvin,&nbsp;<em>Stand on Guard: Reassessing Threats to Canada&#8217;s National Security</em>&nbsp;(Toronto&#8239;; Buffalo&#8239;; London: University of Toronto Press, Scholarly Publishing Division, 2021)., 38</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-5" href="#footnote-anchor-5" class="footnote-number" contenteditable="false" target="_self">5</a><div class="footnote-content"><p>ITAC, &#8220;Uniformed Personnel and Ideologically Motivated Violent Extremism&#8221; (CSIS, 17 2020). Access to information request courtesy of Stewart Bell. </p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-6" href="#footnote-anchor-6" class="footnote-number" contenteditable="false" target="_self">6</a><div class="footnote-content"><p>Ibid</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-7" href="#footnote-anchor-7" class="footnote-number" contenteditable="false" target="_self">7</a><div class="footnote-content"><p>Craig Forcese and Kent Roach, &#8220;Yesterday&#8217;s Law: Terrorist Group Listing in Canada,&#8221; <em>Terrorism and Political Violence</em>30, no. 2 (March 4, 2018): 259&#8211;77, <a href="https://doi.org/10.1080/09546553.2018.1432211">https://doi.org/10.1080/09546553.2018.1432211</a>.</p><p></p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-8" href="#footnote-anchor-8" class="footnote-number" contenteditable="false" target="_self">8</a><div class="footnote-content"><p>Craig Forcese and Leah West,&nbsp;<em>National Security Law, Second Edition</em>&nbsp;(Irwin Law Inc., 2020),&nbsp;<a href="https://irwinlaw.com/product/national-security-law-2-e/">https://irwinlaw.com/product/national-security-law-2-e/</a>,</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-9" href="#footnote-anchor-9" class="footnote-number" contenteditable="false" target="_self">9</a><div class="footnote-content"><p>Michael Nesbitt and Dana Hagg, &#8220;An Empirical Study of Terrorism Prosecutions in Canada: Elucidating The Elements of the Offences,&#8221; <em>Alberta Law Review Society</em> 57, no. 3 (2020), p.23</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-10" href="#footnote-anchor-10" class="footnote-number" contenteditable="false" target="_self">10</a><div class="footnote-content"><p>The term &#8220;association&#8221; is specifically vague; most financial entities require little in the way of association with a terrorist entity before they decide to de-risk or de-bank a client. </p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-11" href="#footnote-anchor-11" class="footnote-number" contenteditable="false" target="_self">11</a><div class="footnote-content"><p>Craig Forcese and Leah West,&nbsp;<em>National Security Law, Second Edition</em>&nbsp;(Irwin Law Inc., 2020),&nbsp;<a href="https://irwinlaw.com/product/national-security-law-2-e/">https://irwinlaw.com/product/national-security-law-2-e/</a>, 218.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-12" href="#footnote-anchor-12" class="footnote-number" contenteditable="false" target="_self">12</a><div class="footnote-content"><p>ATIP 117-2020-S94</p></div></div>]]></content:encoded></item><item><title><![CDATA[Financial Intelligence: A Primer]]></title><description><![CDATA[What you need to know to be a good financial intelligence analyst]]></description><link>https://newsletter.insightthreatintel.com/p/financial-intelligence-a-primer</link><guid isPermaLink="false">https://newsletter.insightthreatintel.com/p/financial-intelligence-a-primer</guid><dc:creator><![CDATA[Jessica Davis, PhD]]></dc:creator><pubDate>Wed, 18 Aug 2021 13:00:43 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Q0KM!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F0709afff-2874-47b1-b9b1-d44741f6bdc7_6000x4200.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Welcome to the new subscribers to Insight Intelligence this week - thanks for joining the hundreds of people who are already part of our community. If you think someone you know would be interested in joining us, please share this post! </em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/subscribe?"><span>Subscribe now</span></a></p><p>Today I want to talk to you about a little-studied &#8220;int&#8221; in the intelligence community: financial intelligence. This type of intelligence is generally considered to be the domain of financial intelligence units, but as I wrote about <a href="https://www.lawfareblog.com/rethinking-global-counterterrorist-financing">here</a>, lots of other types of collection generate financial intelligence (or FININT, for short). I also talk about the use (and abuse) of FININT in my new book, <em>Illicit Money: Financing Terrorism in the 21st Century. </em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.rienner.com/title/Illicit_Money_Financing_Terrorism_in_the_Twenty_First_Century&quot;,&quot;text&quot;:&quot;Purchase: Illicit Money&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.rienner.com/title/Illicit_Money_Financing_Terrorism_in_the_Twenty_First_Century"><span>Purchase: Illicit Money</span></a></p><p>So who generates FININT? Well, banks, financial institutions, money service businesses like MoneyGram, WesternUnion, and many others, all generate financial data. But in my view, that data doesn&#8217;t actually become intelligence until it&#8217;s combined with other sources of information and contextualized. </p><p>This is part of the problem in the counter-terrorist financing, anti-money laundering, and sanctions evasion world. Most reporting entities (as banks and other financial bodies are called when they are required to report transactions to financial intelligence units) don&#8217;t actually generate financial intelligence. They generate financial data. In some cases, they&#8217;re able to contextualize their reporting (usually through suspicious transaction reports), coming close to providing intelligence, but mandatory reporting fall squarely in the realm of financial data, not intelligence. It&#8217;s up to the financial intelligence units (FIU), law enforcement agencies, and security services, to turn that into FININT. </p><p>So how do they do it? Well, banks and other entities report suspicious transactions, and in some jurisdictions, they report other mandatory transactions. (For instance: in Canada, any international transfer of funds of $10,000 or more is required to be reported to FINTRAC, Canada&#8217;s FIU. Regulations vary by country.) These transactions are reported to the FIU which in turn discloses relevant information to law enforcement and security services. (Again, there&#8217;s a lot of variation in how this happens, and in some countries, the FIU IS a law enforcement entity.) This information is then combined with other information holdings - often human intelligence, police reports, or, in some cases, signals intelligence, to determine the relevance of the transaction to an investigation. </p><p>But this is not the only source of financial intelligence. FININT can actually be derived from a lot of other reporting mechanisms. For instance, human sources can (and do!) report on subjects of investigation and their financial situation, transactions, and relationships. Pocket litter and refuse collection can also provide financial intelligence. All of these types of collection can fall into the category of FININT. FININT can also be obtained directly from banks and other financial institutions, through SIGINT collection, and lots of other collection platforms. With the advent of the blockchain and social media platforms, some FININT can now also be obtained through open source collection methods.</p><p></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Q0KM!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F0709afff-2874-47b1-b9b1-d44741f6bdc7_6000x4200.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Q0KM!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F0709afff-2874-47b1-b9b1-d44741f6bdc7_6000x4200.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Q0KM!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F0709afff-2874-47b1-b9b1-d44741f6bdc7_6000x4200.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Q0KM!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F0709afff-2874-47b1-b9b1-d44741f6bdc7_6000x4200.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Q0KM!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F0709afff-2874-47b1-b9b1-d44741f6bdc7_6000x4200.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Q0KM!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F0709afff-2874-47b1-b9b1-d44741f6bdc7_6000x4200.jpeg" width="1456" height="1019" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/0709afff-2874-47b1-b9b1-d44741f6bdc7_6000x4200.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1019,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:21146705,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Q0KM!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F0709afff-2874-47b1-b9b1-d44741f6bdc7_6000x4200.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Q0KM!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F0709afff-2874-47b1-b9b1-d44741f6bdc7_6000x4200.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Q0KM!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F0709afff-2874-47b1-b9b1-d44741f6bdc7_6000x4200.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Q0KM!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F0709afff-2874-47b1-b9b1-d44741f6bdc7_6000x4200.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>Like most other &#8220;ints&#8221;, there is expertise required to analyze and assess FININT. Analysts need to understand the source of the information - is it being generated by mandatory or suspicious reporting? What are the grounds of suspicion? Is the information being reported as a form of defensive reporting, or are the grounds of suspicion well-established? Does the source have direct knowledge to the information? Is their access well-understood, established, and trustworthy? </p><p>A particular challenge comes in dealing with FININT reporting derived from human sources or by listening to a conversation. People often talk about future activities - things they will or want to do. I&#8217;ve often seen this reported as a completed transaction, which it&#8217;s not. And in some cases, that information is being shared to influence the recipient of the information - potentially also including intelligence agencies. </p><p>Aside from these fairly standard concerns about source information, financial intelligence also requires a facility with technical information. Analysts need to know what the various types of SWIFT reports mean, for instance, and often need to understand corporate structures, reporting requirements in particular countries, and many other things. Analysts also need to establish a pattern of life for subjects of investigation - something that can become quite complicated if that extends to corporate structures. Establishing a corporate history or pattern of practice can involve looking over years worth of information - a time consuming, and often unsatisfying - endeavour. </p><p>Financial intelligence analysts also have to have a real interest in personal finance. Lots of people I talk to have no interest in their own finances, let alone those of other people. To do this work properly, you have to be really nosy, and willing to dig deep to understand the purpose of a transaction. </p><p>FININT is a powerful source of information. It can shed light on the capabilities, planning and preparations of a subject of investigation - this of course applies to <a href="https://insightintel.substack.com/p/financing-lone-actor-or-self-activating">counter-terrorism investigations</a>, but also extends to other threats to national and international security, such as sanctions evasion, proliferation activities, <a href="https://insightintel.substack.com/p/espionage-financing-using-cryptocurrencies">espionage</a>, influence activities, etc. </p><h3>Making use of FININT</h3><p>Financial intelligence is an under-used, and poorly-understood type of intelligence. Part of this is because financial intelligence analysts have failed to contextualize the information properly. In some cases, it&#8217;s because they have made logical leaps trying to establish a link to threat activity that is poorly articulated or non-existent, failing to accurately describe the relationship or association between entities or individuals. In other cases, the fault lies with investigations and a disinterest / inability to assimilate financial intelligence. Yes, you are probably going to have to use a spreadsheet, and probably advanced analytic visualizations that are available in programs like Tableau. Globally, states are required to generate and use financial intelligence - and they have to dedicate serious resources to doing that. So I&#8217;m on a mission to improve intelligence analysis of FININT, encourage its exploitation, while also keeping an eye on the misuses of this type of intelligence collection. </p><p>At the same time, it&#8217;s important to remember that FININT (as with other types of intelligence) can be used by repressive regimes to <a href="https://www.lawfareblog.com/international-security-implications-central-bank-digital-currencies">enhance their surveillance capabilities</a>. But FININT is unique globally in that the development and exploitation of financial intelligence is an international requirement. Unfortunately, the international community has yet to fully come to grips with the mis-use of financial intelligence and the implications for human rights and lawful protest.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.insightthreatintel.com/p/financial-intelligence-a-primer?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.insightthreatintel.com/p/financial-intelligence-a-primer?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p>]]></content:encoded></item></channel></rss>