Search results

1 – 10 of 236
Article
Publication date: 2 January 2018

Patrick J. O’Halloran, Christian Leuprecht, Ali Ghanbar Pour Dizboni, Alexandra Green and David Adelstein

This paper aims to examine whether the money laundering/terrorist financing (ML/TF) model excludes important aspects of terrorist resourcing and whether the terrorist resourcing

Abstract

Purpose

This paper aims to examine whether the money laundering/terrorist financing (ML/TF) model excludes important aspects of terrorist resourcing and whether the terrorist resourcing model (TRM) provides a more comprehensive framework for analysis.

Design/methodology/approach

Research consisted of case studies of resourcing activities of four listed terrorist organizations between 2001 and 2015: the Liberation Tigers of Tamil Eelam (LTTE), Hamas, a grouping of Al Qaeda-inspired individuals and entities under the heading “Al Qaeda inspired” and Hezbollah.

Findings

The most prevalent resourcing actors observed were non-profit organizations/associations, and the most prevalent form of resourcing was fundraising that targeted individual cash donations of small amounts. Funds were pooled, often passed through layers of charitable organizations and transmitted through chartered banks. The TRM is indeed found to provide a more comprehensive framework for identifying sources of resourcing and points of intervention. However, it does not in itself recommend effective means of response but it has implications for counter-resourcing strategies because it identifies resourcing actors and nodes where counter-resourcing could occur.

Originality/value

This paper advances the state of knowledge of terrorist resourcing activities in Canada and about the value of doing so through the analytical lens of the TRM as opposed to the predominant ML/TF model.

Details

Journal of Money Laundering Control, vol. 21 no. 1
Type: Research Article
ISSN: 1368-5201

Keywords

Article
Publication date: 5 January 2015

Hamed Tofangsaz

– This paper aims to examine whether from a factual standpoint, it is sufficiently reasonable to address the suppression of terrorist financing by analogy with money laundering.

5242

Abstract

Purpose

This paper aims to examine whether from a factual standpoint, it is sufficiently reasonable to address the suppression of terrorist financing by analogy with money laundering.

Design/methodology/approach

The process of terrorist financing will be examined in regard to the funding requirements of terrorists and the methods and tools that terrorists use to raise, move and store their funds. The process of money laundering will be compared with terrorist financing. The role of money laundering in terrorist financing will be discussed. In the core part of this paper, the assumptions justifying the inclusion of anti-money laundering measures to terrorist financing will be challenged.

Findings

What terrorist financing and money laundering share in common is money. However, there are fundamental differences between them with regard to the sources of funds and the direction of financial flows. None of the elements –“accumulation” and “legitimization”– involved in money laundering are necessarily engaged in the process of terrorist financing. This questions the authenticity of the assumptions which underlie the adopted approach. It also requires further investigation on the effectiveness of the integrated counter-terrorist regime, which will not be covered by this paper.

Originality/value

This paper provides a comprehensive introduction for those dealing with the greater question of whether the terrorist financing can and should be tackled by anti-money laundering measures.

Details

Journal of Money Laundering Control, vol. 18 no. 1
Type: Research Article
ISSN: 1368-5201

Keywords

Book part
Publication date: 21 June 2014

Giampiero Giacomello

This chapter examines the phenomenon of cyberterrorism, which is a form of terrorism that could be potentially devastating as terrorists could, through computer networks, wreak…

Abstract

Purpose

This chapter examines the phenomenon of cyberterrorism, which is a form of terrorism that could be potentially devastating as terrorists could, through computer networks, wreak havoc in the critical infrastructure of an advanced country.

Methodology/approach

Review of relevant literature.

Findings

The chapter argues that there are actually two types of cyberterrorism: “Hard-Rock” and “Lite.” Both are potential “force multiplier” for terrorists. The former relies on attacking a country’s infrastructures via computer networks and blocking the working of critical functions like water and energy distribution and the like. Because of its complexity and costs, this type of cyberterrorism is far from frequent and actually almost non-existent. The latter type (Lite) is much more commonplace and is the capability by terrorist organizations to use the Web (and the Internet) to communicate with their affiliates, recruit new elements and, most importantly, publicize their deeds.

Research limitations/implications

Because the use of the Web and the Internet by terrorists give intelligence agencies more opportunities to actually monitor them, this form of terrorism is much more a “double-edged sword” than regular terrorism.

Originality/value of the chapter

The chapter tries to better classify and compare the two forms of cyberterrorism; it also shows how remote the prospect of Hard-Rock Cyberterrorism still is.

Article
Publication date: 1 April 2002

GORDON WOO

Traditionally, terrorism risk has been priced based exclusively on the relationship between supply and demand in the insurance market, with no basis in actuarial principles. This…

4713

Abstract

Traditionally, terrorism risk has been priced based exclusively on the relationship between supply and demand in the insurance market, with no basis in actuarial principles. This article discusses how the tragic events of September 11, 2001, have irrevocably changed the market for terrorism insurance, since terrorism has become a U.S. catastrophe risk. The author states that since insurers seek to quantify risk distributed over several months (versus a period of only a few days), quantitative assessment of terrorism risk may be achievable. The article proceeds to address the challenge of quantifying terrorism risk, and ultimately suggests that developing quantitative terrorism risk models may provide a foundation for securitizing and trading terrorism risk. The author introduces three examples of potential alternative risk transfer instruments for terrorism risk: 1) a catastrophe bond triggered by workers' compensation claims from extreme terrorism‐related events; 2) a catastrophe bond to cover life insurers from losses related to an attack employing a weapon of mass destruction; and 3) a contingent financing instrument triggered by a terrorism event whose natural buyers are financial short‐sellers.

Details

The Journal of Risk Finance, vol. 4 no. 1
Type: Research Article
ISSN: 1526-5943

Article
Publication date: 4 May 2018

Mark A. Sulzer

As part of a larger global phenomenon, the election of Donald Trump in the USA represents a crucial moment for the (re)conceptualization of digital literacies. The purpose of this…

Abstract

Purpose

As part of a larger global phenomenon, the election of Donald Trump in the USA represents a crucial moment for the (re)conceptualization of digital literacies. The purpose of this paper is to build theory with respect to what this moment means for English education.

Design/methodology/approach

This teacher reflection focuses on what digital literacies meant for my teaching before and after the 2016 election. Using a before-and-after format, I argue that the before conceptualization of digital literacies, while still relevant and useful for introducing many important ideas to English educators, was missing a direct treatment of political power. The after conceptualization takes up this topic.

Findings

Themes taken up in the before section involve a parallel between digital literacies and disciplinary literacies and a distinction between Web 1.0 and Web 2.0 interfaces. Themes in the after section address the propensity for governments and other well-resourced groups to occupy Web 2.0 environments for their own ends. Methods for accomplishing these ends involve restricting, surveilling and targeting flows of information and enacting three populist practices via internet trolling: aggregating the unmet demands of disparate groups, establishing popular subjectivity and dichotomizing the social space through the persistent construction of the enemy.

Research limitations/implications

A critically conscious approach to digital literacies must consider the ways in which political entities occupy digital environments.

Practical implications

Further research should be done in English education classrooms to understand the ways in which individual online meaning making becomes entangled within a nexus of political activity. Further research should investigate how online meaning making intersects with political power.

Originality/value

The role of political entities is often downplayed or ignored in discussions of digital literacies. In an age of alternative facts, fake news and echo chambers, it is important to foreground the interplay between the social, the political and the digital in contemporary meaning making. This contribution offers concepts that can be taken up and expanded, as well as a set of questions for English educators to use in framing a critically conscious conversation about digital literacies.

Details

English Teaching: Practice & Critique, vol. 17 no. 2
Type: Research Article
ISSN: 1175-8708

Keywords

Article
Publication date: 5 October 2012

Hamed Tofangsaz

The purpose of this paper is to re‐discover the nature of the crime of terrorist financing in order to challenge the assumption which requires the criminalization of terrorist

Abstract

Purpose

The purpose of this paper is to re‐discover the nature of the crime of terrorist financing in order to challenge the assumption which requires the criminalization of terrorist financing as a predicate crime to money laundering.

Design/methodology/approach

Illustrating the nature of the crime of terrorist financing and money laundering, the necessity of the criminalization of terrorist financing as an inchoate crime in accordance with the principles of Islamic criminal law will be examined.

Findings

While the criminalization of money laundering in Islam is based on the illegality of crimes already happened, impermissibility of terrorist financing needs to be forward‐looking, concentrating on the destination of the crime of terrorist financing. This requires criminalization of terrorist financing as an inchoate offence which is compatible with the principles of Islamic criminal law.

Originality/value

The paper provides new insight into the criminalization of terrorist financing.

Details

Journal of Money Laundering Control, vol. 15 no. 4
Type: Research Article
ISSN: 1368-5201

Keywords

Article
Publication date: 8 January 2024

Milind Tiwari, Jamie Ferrill and Douglas M.C. Allan

This paper aims to offer the first known synthesis of peer-reviewed literature on trade-based money laundering (TBML). Given the topic is in its nascent stage yet gaining…

Abstract

Purpose

This paper aims to offer the first known synthesis of peer-reviewed literature on trade-based money laundering (TBML). Given the topic is in its nascent stage yet gaining prominence across scholarship and practice, this foundation is pertinent for future TBML research.

Design/methodology/approach

A systematic literature review was undertaken with a formulaic search string. Both qualitative (thematic) and quantitative (meta) analysis methods were used to illustrate the findings.

Findings

The systematic literature review, using qualitative and quantitative synthesis, led to a thematic categorization of extant TBML literature into four categories: TBML risk assessment, TBML detection, the role of professionals and understanding of TBML. Due to the limited number of studies, insights that can be drawn from the extant literature on the best way to combat TBML are also limited.

Originality/value

As the first systematic literature review on TBML, this study identified that the existing TBML literature has focused on increasing the understanding of the phenomenon in terms of its definition and mechanisms, detection, linkage with other crimes, such as organized crime and terrorism financing, and risk assessment frameworks. The originality of these findings lies in identifying areas future researchers might explore to broaden the academic literature.

Details

Journal of Accounting Literature, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0737-4607

Keywords

Open Access
Article
Publication date: 19 September 2022

Christian Leuprecht, Caitlyn Jenkins and Rhianna Hamilton

This study aims to explain how cryptocurrency is leveraged for illicit purposes across the global financial system. Specifically, it establishes how cryptocurrency has been…

3914

Abstract

Purpose

This study aims to explain how cryptocurrency is leveraged for illicit purposes across the global financial system. Specifically, it establishes how cryptocurrency has been changing the nature of transnational and domestic money laundering (ML). It then assesses the effectiveness of conventional anti-money laundering (AML) policy and legislation against the proliferation of crypto laundering, using Canada as a critical case study.

Design/methodology/approach

Data was collected from court cases and secondary sources to build cross-case trends of cryptocurrency use in ML. Illicit International Political Economy forms the theoretical foundation for this study, whose contribution is situated in the current literature on crypto-ML.

Findings

This study finds that Bitcoin is common among crypto-money launderers, though most also use some form of alt-coin, and that the use of third-party currency exchanges is a prevalent method to create illicit funds and conceal proceeds of crime. The findings validate two hypotheses that illicit use of crypto is prevalent in the first two stages of ML, and that crypto is most often used in conjunction with other fiat currencies. Although law enforcement is improving on monitoring and understanding popular cryptocurrencies such as Bitcoin, alt-coins pose a significant challenge for criminal intelligence. New regulations for third-party currency exchanges are having a positive impact on curtailing crypto-laundering but are shown to be insufficient per se to contain the use of crypto in criminal activity.

Originality/value

This study contributes to a more robust understanding of the use of virtual currency in transnational and domestic ML. It contributes to an emerging body of literature on the role of technological change in enabling the global flow of illicit funds. It also informs public policy on virtual currency in general, and on AML regulation in Canada in particular.

Details

Journal of Financial Crime, vol. 30 no. 4
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 14 September 2015

John Michael Schmidt

The purpose of this paper is to propose a low-cost, high return model for implementing a programmatic foresight function that is collaboratively integrated with the organization’s…

2474

Abstract

Purpose

The purpose of this paper is to propose a low-cost, high return model for implementing a programmatic foresight function that is collaboratively integrated with the organization’s existing policy, planning and intelligence (or policy research) functions. Focusing on government agencies, especially those supporting liberal democratic governments, the purpose of the current paper is to propose a new, practical, low-cost and high-return model for implementing a programmatic strategic foresight function that is collaboratively integrated with the organization’s existing policy, planning and intelligence functions. The paper describes the relevant organizational considerations and options for structural adjustments, and suggests how the proposed model can maximize decision-making effectiveness without disrupting pre-existing structures, operations and products. The paper further discusses the necessity and involvement of a central government foresight agency and a non-hierarchical distributed network linking the foresight units.

Design/methodology/approach

Possible solutions are considered with respect to costs of development and implementation, risk (likelihood, consequence and uncertainty) of the new function’s failure, direct negative or positive effect on the performance of existing functions, the level of cross-organizational involvement in or collaboration with the new function, the level of cross-organization tangible benefits and the level of vertical involvement, especially at the executive level.

Findings

With few exceptions, the implementation of foresight by governments has not been at all methodical, but has followed many different paths, where it has occurred at all. The approach proposed in this paper – establishing a central foresight agency, propagating individual agency-based small programmatic foresight units and virtual teams and creating a non-hierarchical distributed network to link all of them – appears to best meet the success criteria set out in the paper.

Research limitations/implications

Governments, especially liberal democratic ones, and their agencies that have previously shied away from methodically implementing strategic foresight or that have attempted to do so without real success now have an approach that is likely to produce the desired results.

Practical implications

The paper creates a sound framework for governments, especially liberal democratic ones, and their agencies to consider and proceed with the implementation of foresight functions and networks to support them.

Originality/value

The proposed approach is entirely new and generally challenges current practices.

Details

Foresight, vol. 17 no. 5
Type: Research Article
ISSN: 1463-6689

Keywords

Article
Publication date: 2 August 2011

Ian Somerville and Andy Purcell

The purpose of this paper is to examine the public relations strategies of the IRA (Irish Republican Army) and their political wing Sinn Féin, throughout the historical period…

2401

Abstract

Purpose

The purpose of this paper is to examine the public relations strategies of the IRA (Irish Republican Army) and their political wing Sinn Féin, throughout the historical period known as the Northern Ireland “Troubles”.

Design/methodology/approach

This study uses semi‐structured élite interviews as its primary data. The study structures a historical account of the development of republican public relations around three main phases: the “propaganda of the deed” phase; the development of political public relations phase; and the peace process phase.

Findings

Much previous research traces a common trajectory for terrorist organisations, where they begin with large‐scale “propaganda of the deed” activities, and then move toward more typical PR activities when their “message” begins to be heard. The findings suggest that this is only partially true for the republican movement. Previous research also claims that peace settlements virtually never acknowledge the demands of terrorist groups. However, the findings indicate that the republican movement, via the use of skilful public relations techniques and disciplined internal organisational communication, pushed itself to the forefront and remained central in the efforts to develop a peace process.

Research limitations/implications

The study draws on interview data with a small group (six) of republican strategists, all of whom where involved in some capacity in public relations activities. While it is not claimed that they represent the views of the whole republican movement on the issues discussed, they do arguably represent the views of a “dominant coalition”. Future research could usefully investigate the public relations of power sharing since the Good Friday Agreement.

Originality/value

Previous approaches to analysing the subject of public relations and terrorism have tended to regard it as an activity engaged in by psychopaths or criminals. This paper's starting‐point is to problematise this definition of “terrorism” and at the same time widen the application of the term to include State actors. In this regard, it is in opposition to much current Western media, governmental and academic usage of the term. This research also differs from most other studies of terrorism in the public relations literature, in that it uses élite interviews as its primary source of data.

Details

Journal of Communication Management, vol. 15 no. 3
Type: Research Article
ISSN: 1363-254X

Keywords

1 – 10 of 236