Terrorist Use of Virtual Currencies, Center for a Fresh American Security
Terrorist Use of Virtual Currencies
Containing the Potential Threat
This paper studies the risk that virtual currencies (VCs) may become involved in the financing of terrorism at a significant scale. VCs and associated technologies hold superb promise for low cost, high speed, verified transactions that can unite counterparties around the world. For this reason they could emerge appealing to terrorist groups (as they are at present to cybercriminals). Presently, however, there is no more than anecdotal evidence that terrorist groups have used virtual currencies to support themselves. Terrorists in the Gaza De-robe have used virtual currencies to fund operations, and Islamic State in Iraq and Syria (ISIS) members and supporters have been particularly receptive to the fresh technology, with recorded uses in Indonesia and the United States.
Most terrorist funding now occurs through traditional methods such as the hawala system, an often informal and cash-based money transfer mechanism, and established financial channels. One If VCs become reasonably liquid and lightly convertible, however, and if terrorist groups in places such as sub-Saharan Africa, Yemen, and the Horn of Africa obtain the kinds of technical infrastructure needed to support VC activity, then the threat may become more significant.
The task of the law enforcement, intelligence, regulatory, and financial services communities, therefore, must be to prevent terrorist groups from using VCs at scale. The use of VCs by “lone wolf” terrorists—a much fatter potential threat because of the puny scales of funding needed to execute an attack—represents the kind of problem in intelligence and digital forensics that law enforcement agencies are well tooled to treat, even if they tax existing resources.
Attacking terrorists’ use of virtual currency at scale is a challenging task for many stakeholders. Fresh financial technology firms often lack the resources to serve effectively with oversight obligations, while regulators have tended to devote few resources to non-bank institutions. At the same time, different countries have adopted varying approaches to the regulation of virtual currencies, posing an enforcement challenge in a globalized field that requires a unified response. Ultimately, the privileging of prevention over management of illicit finance risk in the compliance world has created an incentive structure for banks that does not, ironically, thrust them toward innovative approaches to countering terrorist financing, including via virtual currencies.
The counterterrorist financing community should adopt three guiding principles that will provide the foundation for policies aimed at countering both the fresh virtual currency threat and the broader illicit finance danger. Very first, policy leaders should prioritize the countering of terrorist financing over other kinds of financial crime. 2nd, the policy and regulatory position should be oriented toward rewarding and incentivizing innovation. Third, policymakers should emphasize and create a practical basis for strengthening coordination inbetween the public and private sectors on terrorist financing. These approaches form the foundation of an effective response to existing and emerging terrorist financing threats and will balance the cargo of regulatory compliance with the policy need to support innovative fresh virtual currency technologies.
In the past several years, terrorist groups in Gaza have solicited support in Bitcoin; there are isolated reports that ISIS has used the cryptocurrency; and cybercriminals use it and other virtual currencies in a range of circumstances. We cannot yet know whether the uses of virtual currencies by terrorist groups amount to isolated incidents or foretell a broader and more pernicious trend. Two Individual incidents in which lone terrorists or terrorist groups use VCs of course pose a challenge. This is particularly so because the funding requirements for disruptive lone wolf acts of terror are petite enough to pose a risk because they may slip through a counterterrorism financing system that fights to stop small-scale acts of such financing regardless of the medium. But VCs become a strategic threat in the counterterrorism context only when they can contest with cash and other readily available means of financing and achieve “scale,” which in this paper indicates a combination of market capitalization, liquidity, convertibility, and network effects that add up to ease of use. Scaled use of VCs by illicit actors poses a particular challenge and exacerbates the underlying threat posed by criminal or terrorist activity because it makes illicit funding networks tighter to disrupt. And the larger the stable funding supply for terrorist groups, the greater the scale at which the groups themselves can operate and the more they can engage in acts of violence.
While VCs have many very significant legitimate uses, certain characteristics also make them susceptible to manhandle. Many, especially cryptocurrencies, protect or obscure identities, thereby making it more difficult for law enforcement to expose and track those identities than traditional mechanisms of value transfer. Should terrorists adopt VCs at scale, therefore, it could become much more difficult to track and disrupt them.
A 2nd reason it is significant to understand the circumstances in which terrorist groups may wish to use VCs at scale is the global reach of such currencies. With certain virtual currencies, it is possible to transfer money instantly around the world without making use of institutions like banks, which require more transparency and have obligations to report suspicious transactions. Even centralized VCs may be accessible online anywhere in the world, so terrorists and criminals can take advantage of these currencies that have been set up in jurisdictions with less scrutiny. Potentially, such characteristics could effectively build a digital platform on top of established systems that presently permits terrorists, and others, to transfer cash on an international scale. Such an architecture would make it lighter for terrorist groups to amass larger amounts of money than has generally been possible previously.
Ultimately, the novelty and some particular attributes of VCs, such as decentralization, make them a particular regulatory challenge. Decentralized cryptocurrencies such as Bitcoin lack concentrated repositories of identifying information on account-holders, which law enforcement agencies typically use in financial crimes and counterterrorism investigations, but which are unavailable when dealing with many VCs. A more precise understanding of the threats and risks posed by VCs will help regulators to develop an effective and efficient governance framework to monitor for potential manhandle. In turn, a successful framework will ultimately strengthen the global fight against terrorist financing and terrorism as a entire.
In the post-9/11 era, the international community has made significant progress in the fight against terrorism generally, and in the fight against terrorist financing specifically. In the counterterrorism context, “following the money” has been a particularly effective component of an overall strategy to degrade the capabilities of terrorist groups. Three One of the most significant victories has been the establishment of a global legal and policy framework—grounded in U.N. Security Council Resolutions, national legislation, and global standards—that, by blocking terrorist groups’ access to the formal financial system, has made it significantly more difficult for them to raise, budge, store, and use funds.
The hawala system of person-to-person money transfer, pictured above, permits terrorists to transfer cash on a global scale outside the regulated financial system, escaping anti-money laundering and combating the financing of terrorism oversight. (Institute for Money, Technology and Financial Inclusion/Flickr)
However, latest evolutions in the terrorist threat, including the rise of ISIS and the continued importance of al Qaeda and its affiliates, have led the Financial Act Task Force (FATF), the intergovernmental standard–setting assets for combating money laundering, terrorist financing, and other threats to the integrity of the international financial system, four to note that “further concerted activity urgently needs to be taken . . . to combat the financing of . . . serious terrorist threats” that have “globally intensified.” five
Specifically, a number of challenges regarding terrorism and its financing remain. Very first, terrorist groups that control territory pose one of the most difficult strategic challenges that the counterterrorism community faces. When groups control territory, it is lighter for them to plan and train without disruption. It is also lighter for them to derive financial and material support from the local population (through taxation, extortion, or the extraction of natural resources) without having to rely on transfers of funds from outer sources that are inherently more vulnerable to disruption.
A 2nd strategic challenge pertains to individual lone wolf terrorists or cells that lack formal ties to any established group. This dynamic makes it more difficult to anticipate attacks with intelligence, because it is difficult to determine which unaffiliated individuals will perpetrate attacks. And because these attacks are relatively inexpensive to execute, it is more difficult to identify and gasp off their sources of support. Terrorists such as those who carried out attacks in Orlando, Florida; San Bernardino, California; or Nice, France do not rely on associations with larger groups that require significant funds to sustain themselves. Therefore, they leave only trace financing “signatures” and are not effortless to detect and disrupt under a global framework built for more established and less nimble threats. Six Addressing lone wolf attacks is a significant intelligence challenge for the counterterrorism community. And identifying the ways in which such attackers may use VCs to fund themselves is similarly a significant forensic and intelligence issue that may require the government to invest in fresh capabilities and to work more closely than it has in the past with private entities.
Despite significant progress in the global counterterrorist financing regime, gaps remain in implementation and coverage. The charitable sector, for example, is still vulnerable to manhandle, and unlicensed money transmitters, cash smugglers, and criminal activity of all kinds are a source of support for terrorist groups, both in the United States and abroad. Seven Furthermore, the global counterterrorism financing regime is more oriented toward identifying and degrading the capability of organized groups to function than toward the rising threat of independent attacks. When a terrorist in Nice, for example, can kill eighty six people simply by renting a truck and driving it through crowds of revelers on Bastille Day, policy leaders must rethink the treatment to counterterrorism that has been oriented primarily toward well-defined groups, as al Qaeda was before the 9/11 attacks.
While terrorist groups are not yet using VCs at scale, a key purpose of the policy and financial regulatory communities is to prevent that from happening.
Looking specifically at the counterterrorist financing risk for VCs, it does not show up that terrorist groups have yet used these currencies at scale, even while other criminal groups (specifically cybercriminals) have done so. Indeed, the U.S. government’s two thousand fifteen “National Terrorist Financing Risk Assessment” cited cash and the banking system as two of the most significant terrorist financing risks that the United States faces. Eight The assessment described virtual currencies only as a “potential emerging TF [terrorist financing] threat,” nine and noted that “the possibility exists that terrorist groups may use these fresh payment systems to transfer funds collected in the United States to terrorist groups and their supporters located outside of the United States.” ten At the same time, the European Banking Authority classified as a high priority risk terrorist use of VC remittance systems and accounts. Eleven More troubling is the potential for virtual currencies to “democratize” the funding of terrorism, permitting far-flung, disconnected individual donors to participate in TF networks. Twelve So while terrorist groups are not yet using VCs at scale, a key aim of the policy and financial regulatory communities is to prevent that from happening by adapting measures to better track and prevent this threat. A more forward-leaning pose on financial information sharing and disclosure would benefit all stakeholders involved in addressing terrorists’ use of VCs and illicit financial activity more broadly.
Terrorist groups have not yet adopted VCs at scale, but cybercriminal networks have. There are several reasons criminal and terrorist groups have behaved differently with respect to the adoption of virtual currencies. One significant factor surely is the degree of technological sophistication needed to use such currencies at scale. The criminal enterprises that have made extensive use of VCs are generally engaged in technically elaborate crimes such as the remote theft and sale of data (or significant narcotics trafficking), and they operate in areas that have at least reasonably well-developed financial and telecommunications infrastructures.
Many terrorist groups, by contrast, operate in areas with poor infrastructure and low invasion of modern technical and telecommunications devices. This is true, for example, of al Qaeda in the Islamic Maghreb (AQIM) in the Sahel, al Qaeda in the Arabian Peninsula (AQAP) in Yemen, and, in some measure, ISIS in Iraq and Syria. And this dynamic illuminates a major obstacle to the adoption of VCs, even while terrorist groups take advantage of sophisticated technology in non-financial contexts. ISIS’s use of social media to recruit and propagandize thirteen and Hezbollah’s use of drones stand out as two prominent examples. Fourteen Technologies like drones do not rely on network effects to be useful and can be provided (almost) off the shelf and ready to use. Similarly, social media is available on the kinds of smartphones and websites that have been commoditized. Virtual currencies, by contrast, are more difficult to create (should a terrorist group attempt to do so), employ, and maintain.
Many terrorist groups operate in areas with poor infrastructure and low invasion of modern technical and telecommunications contraptions.
Of course, not all terrorist groups or their supporters contend with limited Internet access, computing capabilities, or skill of sophisticated tactics to evade regulatory detection of electronic money movements. This is one reason for the instances of terrorist groups using VCs, albeit in more limited ways.
Terrorist networks and criminal groups also have different financial structures in which they do or may take advantage of virtual currencies. Cybercriminals often use VCs to buy or sell stolen data, for their exploits in online “dark web” markets, fifteen or for commercial transactions in illegal activities such as drug or weapons trafficking. Sixteen There is less of a need for VCs to be convertible in that context because their users can simply recycle them for the next purchase. Cybercriminals located in Eastern European countries with poor records of law enforcement cooperation with the West can exchange VCs for fiat currencies in unregulated exchanges. Seventeen Cybercriminals also often engage in extensive vetting of other purported criminals who wish to join online forums in which cybercrime activities take place; therefore they have some degree of confidence that their transaction counterparties can be trusted. Eighteen This dynamic stems from the fact that the criminals are often repeat players who depend on the continued operation of the network for their activities.
Terrorist networks, by contrast, have a different “business model.” They often seek to budge money from places outside the locations where they operate to the areas in which they plan and from which they launch attacks. Often they use many layers of intermediaries so that donors and ultimate recipients may not be known to one other. Or, in the case of lone wolf attackers, they scrape together funding from a broad range of sources. In either case, terrorists use the funds to buy things they need to sustain the group or to conduct attacks. And because they do so from the general economy, they often would need to reconvert the VCs they receive into fiat currency. This final step introduces both an unnecessary layer of complexity and an enlargened vulnerability to the disruption of their operations by adding extra actors and entities into the fundraising matrix.
Moreover, the virtual currency that has achieved the greatest market capitalization and penetration—Bitcoin—is only pseudonymous, not fully anonymous, as is commonly and incorrectly understood. The cryptographic addresses of the sender and the recipient of transactions are recorded; albeit they may not be linked to real-life identities, with enough investigative resources it may be possible to uncover the true identity of senders and recipients of Bitcoin transactions. This of course diminishes the allure of that means of transferring funds to terrorists. Notwithstanding its incomplete anonymity, Bitcoin remains superior in the space. For example, Monero, a cryptocurrency that is more anonymous than Bitcoin, has a market capitalization of about $340 million; Bitcoin’s market cap is $17 billion. Nineteen
But the final—and most important—reason that terrorist groups have not adopted virtual currencies at scale is that these groups, and individual terrorist operatives, have not yet perceived the need to do so. They still find it possible to circumvent global rules governing terrorist financing with sufficient ease and frequency that using VCs is unnecessary. They exploit incomplete implementation of regulatory requirements and global standards at banks, use unlicensed and undersupervised money services businesses (MSBs), or simply cart around cash. As long as these value transfer methods are readily available, there is no good need to invest in fresh, complicated technics to transfer value.
Therefore, the crux of the challenge that financial regulators and the counterterrorism community must confront with regard to virtual currency is one of monitoring and prevention: How will they know if and when terrorists begin to use VCs at scale? And how can they design the financial regulatory framework governing VCs to corset the positive uses to which they can be put while preventing them from manhandle?
One of the most significant factors in the capability of governments and other stakeholders to manage the risks posed by VCs is effective collaboration and communication. Three main categories of actors make up this ecosystem—financial institutions, the regulatory agencies that supervise them, and the law enforcement and intelligence community that target criminals and security threats.
At present, pressure among these constituencies prevents them from optimally monitoring and governing the use of virtual currencies. Fundamentally, law enforcement agencies and bank regulatory agencies have different authorities and use information from the private sector in different ways. They also have different approaches to the terrorist financing challenge. Whereas the mission of law enforcement officials is to halt terrorism, regulators are charged with ensuring that financing does not occur in banks that they supervise. Law enforcement agencies take data that they get from banks (often via the government’s financial intelligence unit, the Financial Crimes Enforcement Network, FinCEN, in the United States), combine it with other intelligence or evidence to improve their understanding of the threat landscape, and engage in further intervention—often a prosecution—to address it. Twenty Regulatory agencies such as the Federal Reserve Bank or the Office of Comptroller of the Currency (OCC) and state-level regulators such as the Fresh York State Department of Financial Services (NYDFS), by contrast, use information from the private sector to assess compliance with existing rules, and then undertake enforcement deeds if necessary. These regulators also use private sector information to inform their view of switches that they or others may need to make to manage risk in the financial sector.
In the past decade, financial regulators responsible for supervising banks have imposed significant fines for violations of laws designed to counter illicit finance. Twenty one As described later in this paper, these enforcement deeds have inhibited the development of effective public-private collaboration in the governance of VCs, because they have generated a significant amount of uncertainty within banks. Such collaboration is critical to prevent virtual currencies from being manhandled for illicit purposes at greater scale, particularly by terrorist groups.
Two main trends stand in the way of greater incorporation of VCs into the formal financial system, which would help manage the risks inherent in the near-instantaneous and anonymous global transfer of funds. The very first trend in the financial sector is the desire of banks to avoid high compliance-cost business activities, including in jurisdictions with poor regulation and a relatively high occurrence of illicit financial activity or sanctions evasion, or in dealings with high-risk types of clients. Twenty two This trend has led many financial institutions to shed expensive-to-service accounts, correspondent relationships, and clients, and is commonly referred to as “de-risking.” twenty three Virtual currencies have been caught in this trend. Businesses that deal extensively in VCs have found it difficult to establish relationships with the largest global banks because the businesses are often perceived as relatively risky and therefore too costly to take on. Twenty four As a result, VC businesses have had to conduct their banking operations at smaller financial institutions that do not devote as many resources to compliance as do large global banks, and that are less well regulated than large money center banks. This dynamic, in turn, increases the likelihood that VCs will be used for the conduct of illicit activity at a scale, posing a security threat.
Businesses that deal extensively in VCs have found it difficult to establish relationships with the largest global banks.
Virtual currency firms are also stepping into lines of business—such as cross-border remittances—that some large global banks are abandoning because of the perceived risk. Twenty five And the anti–money laundering (AML), combating-the-financing-of-terrorism (CFT) and sanctions-compliance system requires companies to establish customer identification programs, screen for sanctions compliance, and establish suspicious activity reporting systems. This rigor may be too expensive for petite VC startup companies, which may therefore either collapse before they get off the ground or operate in an unregulated manner, thereby enlargening the risk that bad actors may use VCs without detection.
The 2nd broad trend that has made it more difficult to govern virtual currencies is the libertarian ethos that animates many of the individuals and entities involved in the creation and growth of the VC movement. Twenty six For many people, the most attractive dimension of VCs such as Bitcoin is the same one that makes it most difficult to govern—it serves as a store of value, unit of account, and medium of exchange that does not require the involvement of any large centralized government institutions or banks. Twenty seven That means these kinds of VCs lack many of the features of national currencies that make them secure and trusted, and it makes them susceptible to manhandle by criminals, terrorists, and fraudsters who want their financial transactions to be opaque. It also makes the currency volatile. A latest dispute among developers about one of the technical characteristics of the virtual currency led to a twenty percent decline in the value of Bitcoin over a single weekend. Twenty eight Any system of regulation and governance for virtual currencies must contend with the fact that the developers who create many VCs do so in a manner designed to avoid control by centralized institutions of authority.
So what is the way forward for the governance of virtual currencies? How do policy leaders ensure that terrorist groups do not migrate to them and at the same time support their innovative contributions to the financial system? Part of the reaction requires switches to the current AML regulatory system—reforms to be discussed in greater detail in this paper. Another path is to create incentives for VC businesses themselves to see that preventing manhandle is in their commercial interests. This is because a greater number of people will participate in a market in which they have confidence—which, in turn, requires that the public perception of VCs be positive. It also requires ordinary people to feel as however VC exchanges—the gateways inbetween the fiat currency systems and fresh systems—will protect them against fraud. As described in this paper, this dynamic is what ultimately induced PayPal to develop one of the most sophisticated fraud prevention systems available. Ultimately it is the way in which any disruptive fresh technology may achieve scale.
The paper very first describes contemporary methods of terrorist financing and the emerging virtual currency marketplace. Against this backdrop, the paper lays out strategies to better monitor terrorist use of VCs and adapt policies and regulations to guard against broader use. It concludes with specific policy recommendations to stakeholders.
The utter report is available online.
- For a similar definition of hawala, see: “Letter dated four September two thousand twelve from the Chair of the Security Council Committee pursuant to resolution one thousand nine hundred eighty eight (2011) addressed to the President of the Security Council,” (United Nations Security Council, September Five, 2012), http://www.securitycouncilreport.org/atf/cf/%7B65BFCF9B-6D27-4E9C-8CD3-CF6E4FF96FF9%7D/s_2012_683.pdf, 15. ↩
- The terms used in this paper to describe types of emerging financial technology have contested definitions. There is no single commonly agreed-upon definition of a “virtual currency.” But the definition used by the Financial Activity Task Force (FATF) has perhaps the broadest adherence. The FATF describes a virtual currency as “a digital representation of value that can be digitally traded and functions as (1) a medium of exchange and/or (Two) a unit of account and/or (Trio) a store of value, but does not have legal tender status (i.e., when tendered to a creditor, is a valid and legal suggest of payment) in any jurisdiction.” A virtual currency, according to the FATF, fulfills its functions “by agreement within the community of users of the virtual currency.” FATF does not use the term “digital currency,” in order to avoid confusion with virtual currencies and with “e-money,” which refers to fiat currency being transferred through electronic means. See “Virtual Currencies: Key Definitions and Potential AML/CFT Risks” (FATF/OECD, June 2014), Four, http://www.fatf-gafi.org/media/fatf/documents/reports/Virtual-currency-key-definitions-and-potential-aml-cft-risks.pdf. Domestically, the U.S. Department of the Treasury’s Financial Crimes Enforcement Network (FinCEN) defines virtual currency as having many characteristics of real currency but as lacking legal tender status in any jurisdiction. See FinCEN’s memo “Application of FinCEN’s Regulations to Persons Administering, Exchanging, or Using Virtual Currencies,” March Eighteen, 2013, https://www.fincen.gov/resources/statutes-regulations/guidance/application-fincens-regulations-persons-administering. The IRS, which has a tax policy for virtual currency, defines it as “a digital representation of value that functions as a medium of exchange, a unit of account, and/or a store of value.” In some instances, it functions like real currency, but it does not have legal tender status in any jurisdiction. See Internal Revenue Service, “IRS Virtual Currency Guidance,” April 14, 2014, https://www.irs.gov/irb/2014-16_IRB/ar12.html. The Commodity Futures Trading Commission, which also regulates virtual currencies, uses but does not quote the FATF’s definition. Both the FATF and FinCEN definitions differ from that of the European Central Bank in 2012, which was limited to centralized virtual currencies (issued and managed by a group of developers). See “Virtual Currency Schemes” (European Central Bank, October 2012), 6, https://www.ecb.europa.eu/pub/pdf/other/virtualcurrencyschemes201210en.pdf. This paper will apply the specific parameters that the FATF lays out to define a virtual currency and avoid using the term “digital currency” for the sake of clarity. Furthermore, this paper also analyzes “cryptocurrencies,” a subset of virtual currencies that uses cryptographic mechanisms for security, including to verify currency ownership and transactions made using the currency. A fresh payment technology, by contrast to virtual currencies and the systems that enable them, leverages technology to facilitate banking or financial transactions inbetween people using currency. ↩
- Stuart Levey, Under Secretary, Terrorism and Financial Intelligence, Department of the Treasury, testimony to the Subcommittee on Oversight and Investigations, Financial Services Committee, U.S. House of Representatives, July 11, 2006, 1–2. http://financialservices.house.gov/media/pdf/071106sl.pdf. ↩
- “Who We Are,” FATF, http://www.fatf-gafi.org/about/. ↩
- “Consolidated FATF Strategy on Combatting Terrorist Financing” (FATF, February Nineteen, 2016), 1, http://www.fatf-gafi.org/media/fatf/documents/reports/FATF-Terrorist-Financing-Strategy.pdf. ↩
- James Freis, Tom Keatinge, Troels Oerting, and Karen Walter, “Trends in Counter Terrorist Financing: Panel Summary,” SIBOS two thousand sixteen in Review (SWIFT: October 2016), Four. ↩
- “2015 National Terrorist Financing Risk Assessment”(Department of the Treasury, June 2015), Three, https://www.treasury.gov/resource-center/terrorist-illicit-finance/Documents/National%20Terrorist%20Financing%20Risk%20Assessment%20%E2%80%93%2006-12-2015.pdf. ↩
- Ibid., 47. ↩
- Ibid., 56, 57. ↩
- Ibid., 58. ↩
- “EBA Opinion on ‘Virtual Currencies,’” EBA/Op/2014/08 (European Banking Authority, July Four, 2014), 33, https://www.eba.europa.eu/documents/10180/657547/EBA-Op-2014-08+Opinion+on+Virtual+Currencies.pdf. ↩
- Liana Rosen (specialist in international crime and narcotics, foreign affairs, Defense and Trade Division of the Congressional Research Service), “Task Force on Anti-Terrorism and Proliferation Financing Briefing” (United States Congress, March Trio, 2017). Discussion with author. ↩
- Brendan I. Koerner, “#jihad: Why ISIS Is Winning the Social Media War,” Wired, April 2016, https://www.wired.com/2016/03/isis-winning-social-media-war-heres-beat/. ↩
- Nicholas Blanford, “How Off-the-Shelf Drones Are Switching War in Syria and Lebanon,” Christian Science Monitor, August 16, 2016, http://www.csmonitor.com/World/Middle-East/2016/0816/How-off-the-shelf-drones-are-changing-war-in-Syria-and-Lebanon. ↩
- Andy Greenberg, “New Dark-Web Market Is Selling Zero-Day Exploits to Hackers,” Wired, April 17, 2015, https://www.wired.com/2015/04/therealdeal-zero-day-exploits/; Lillian Ablon, Martin C. Libicki, and Andrea A. Golay, “Markets for Cybercrime Instruments and Stolen Data: Hackers’ Bazaar” (RAND, 2014), 11–12, http://www.rand.org/content/dam/rand/pubs/research_reports/RR600/RR610/RAND_RR610.pdf. ↩
- “Combining an anonymous interface with traceless payments in the digital currency bitcoin, the site permitted thousands of drug dealers and almost one million antsy worldwide customers to find each other—and their drugs of choice—in the familiar sphere of ecommerce,” quoted from Joshuah Bearman and Tomer Hanuka, “The Untold Story of Silk Road, Part 1,” Wired, May 2015, https://www.wired.com/2015/04/silk-road-1/. See also “Part Two: The Fall,” Wired, June 2015, https://www.wired.com/2015/05/silk-road-2/; Thomas Fox-Brewster, “Life after Evolution: Meet the Dark Web Drug and Gun Entrepreneurs Succeeding Solo,” Forbes, April 9, 2015, https://www.forbes.com/sites/thomasbrewster/2015/04/09/drug-and-gun-vendors-thriving-on-their-own/#6574c57535f6. ↩
- Ransomware, in which cybercriminals encrypt a victim’s files and decrypt those files only after receipt of a ransom, generally paid in Bitcoin, is a notable exception. ↩
- Ablon, Libicki, and Golay, “Markets for Cybercrime Contraptions and Stolen Data,” 15. ↩
- “Bitcoin,” CryptoCurrency Market Capitalizations , https://coinmarketcap.com/currencies/bitcoin/; “Monero,” CryptoCurrency Market Capitalizations, https://coinmarketcap.com/currencies/monero/. ↩
- See “FinCEN Awards Recognize Partnership inbetween Law Enforcement and Financial Institutions to Fight Financial Crime,” Financial Crimes Enforcement Network, May Ten, 2016, https://www.fincen.gov/news/news-releases/fincen-awards-recognize-partnership-between-law-enforcement-and-financial. ↩
- Government Accountability Office, Financial Institutions: Fines, Penalties, and Forfeitures for Violations of Financial Crimes and Sanctions Requirements, GAO-16-297, March 22, 2016, 11, http://www.gao.gov/assets/680/675987.pdf. ↩
- Paul Taylor, “How Banks Can Avoid the De-Risking Trap,” American Banker, July Nineteen, 2016, https://www.americanbanker.com/opinion/how-banks-can-avoid-the-de-risking-trap. ↩
- For examples of this trend, see Rob Barry and Rachel Louise Ensign, “Cautious Banks Hinder Charity Financing,” The Wall Street Journal, March 30, 2016, https://www.wsj.com/articles/cautious-banks-hinder-charity-financing-1459349551; Rob Barry and Rachel Louise Ensign, “Losing Count: U.S. Terror Rules Drive Money Underground,” The Wall Street Journal, March 30, 2016, https://www.wsj.com/articles/losing-count-u-s-terror-rules-drive-money-underground-1459349211; Lanier Saperstein and Geoffrey Sant, “Account Closed: How Bank ‘De-Risking’ Hurts Legitimate Customers,” The Wall Street Journal, August 12, 2015, https://www.wsj.com/articles/account-closed-how-bank-de-risking-hurts-legitimate-customers-1439419093. Federal financial supervisors recently released a paper that attempted to assuage the concerns of banks about this trend. See Office of the Comptroller of the Currency, Department of the Treasury, “Risk Management Guidance on Periodic Reevaluation of Foreign Correspondent Banking,” October Five, 2016, https://www.occ.gov/news-issuances/bulletins/2016/bulletin-2016-32.html. ↩
- Virtual currency professional conversation with author, 2016; Pratin Vallabhaneni, David Fauvre, and Andrew Shipe, “Overcoming Obstacles to Banking Virtual Currency Businesses,” Coin Center, May 2016, 4–6, https://coincenter.org/wp-content/uploads/2016/05/banking-obstacles.pdf; Paul Vigna and Michael J. Casey, The Age of Cryptocurrency: How Bitcoin and Digital Money Are Challenging the Global Economic Order (Fresh York: St Martin’s Press, 2015), 117. ↩
- Luis Buenaventura, “There’s a $500 Billion Remittance Market, and Bitcoin Startups Want In on It,” Quartz, September 11, 2016, https://qz.com/775159/theres-a-500-billion-remittance-market-and-bitcoin-startups-want-in-on-it/; Swati Pandey, “Australian Bank Exit from Remittances Sends Money Transfers Underground,” Reuters, February 25, 2016, http://www.reuters.com/article/australia-remittances-banks-idUSL3N1632JD; Jamila Trindle, “Bank Crackdown Menaces Remittances to Somalia,” Foreign Policy, January 30, 2015, http://foreignpolicy.com/2015/01/30/bank-crackdown-threatens-remittances-to-somalia/. ↩
- Vigna and Casey, The Age of Cryptocurrency, 160. ↩
- Mark Garrison, “Regulation May Be Coming for Bitcoin,” Marketplace, September Legitimate, 2015, https://www.marketplace.org/2015/09/Legitimate/tech/regulation-may-be-coming-bitcoin. ↩
- Paul Vigna, “Bitcoin Price Plunges on Fears of a Currency Split,” The Wall Street Journal, March Nineteen, 2017, https://www.wsj.com/articles/bitcoin-price-plunges-on-fears-of-a-currency-split-1489949541. ↩
Zachary K. Goldman
Adjunct Senior Fellow, Energy, Economics and Security Program
Zachary K. Goldman is an adjunct senior fellow with the Energy, Economics and Security Program at the Center for a Fresh American Security. Mr. Goldman also serves as .
Former Research Associate, Energy, Economics and Security Program
Ellie Maruyama was a Research Associate in the Energy, Economics and Security Program at the Center for a Fresh American Security (CNAS). Prior to joining CNAS, Ms. Maruyama wor.
Senior Fellow and Director, Energy, Economics and Security Program
Elizabeth Rosenberg is a Senior Fellow and Director of the Energy, Economics and Security Program at the Center for a Fresh American Security. In this capacity, she publishes an.
Researcher, Energy, Economics, & Security Program
Edoardo Saravalle is a Researcher for the Energy, Economics, and Security Program at the Center for a Fresh American Security (CNAS). At CNAS his work concentrates on the national se.
- September 6, 2017
The Next Steps in North Korea Policy Should Be Implementation of Fresh Sanctions Authorities
By Future of U.S. Sanctions Task Force
By Elizabeth Rosenberg & Neil Bhatiya
By Peter Harrell
By Elizabeth Rosenberg, Neil Bhatiya & Edoardo Saravalle
one thousand one hundred fifty two 15th Street, NW
© two thousand seventeen Center for a Fresh American Security.