Abstract
PurposeThe purpose of this paper is to illustrate how intelligent terrorist financiers avoid detection when acquiring and subsequently transferring financial assets to finance terrorism. Particular emphasis is placed on cryptocurrency.Design/methodology/approachA qualitative content analysis of 30 semi-standardised expert interviews with both criminals and prevention experts led to the identification of means for the circumvention of current combat the financing of terrorism (CFT) measures with a focus on cryptocurrency.FindingsThe findings illustrate, for the benefit of law enforcement agencies, investigators, regulating authorities and legislators, the specific low-risk methods that terrorist financiers use to generate and transfer assets. These findings help to develop more effective prevention methods.Research limitations/implicationsQualitative findings from the analysis of semi-standardised interviews are limited to the 30 interviewees’ perspectives.Practical implicationsIdentification of gaps in existing CFT mechanisms provides compliance officers, law enforcement agencies and legislators with valuable insights into how criminals operate.Originality/valueThe existing literature focuses on organisations that combat terrorist financing and the improvement of CFT measures. This article outlines how terrorist financiers avoid detection. Both preventative and criminal perspectives are considered.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.