Skip to main content Accessibility help
×
Hostname: page-component-68c7f8b79f-fnvtc Total loading time: 0 Render date: 2026-01-02T15:03:40.964Z Has data issue: false hasContentIssue false

Bibliography

Published online by Cambridge University Press:  18 December 2025

Jason Blazakis
Affiliation:
Middlebury Institute of International Studies
Get access

Information

Type
Chapter
Information
Terror Disrupted
Countering the Financing of Terrorism
, pp. 220 - 238
Publisher: Cambridge University Press
Print publication year: 2026

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

Book purchase

Temporarily unavailable

References

Primary Sources

Blazakis, J. Far-right online financing and how to counter It. Global Center. August 2022. https://globalcenter.org/resource/far-right-online-financing-and-how-to-counter-it/.Google Scholar
Furtell, R., Simi, P., & Gottschalk, S. (2006). Understanding music in movements: The white power music scene. The Sociological Quarterly, 47(4), 465494.Google Scholar
Hamm, M. S. (2005). Crimes committed by terrorist groups: Theory, research, and prevention (Final report). U.S. Department of Justice. www.ojp.gov/pdffiles1/nij/grants/211203.pdf.Google Scholar
Jamshidi, M. (2022). The world of private terrorism litigation. Michigan Journal of Race & Law. University of Florida Levin College of Law Research Paper No. 22-25. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4138659.Google Scholar
Lormel, D. M. (2008, March). Combating terrorist financing at the agency and interagency levels. Combating Terrorism Center at West Point, 1(4), 57. https://ctc.westpoint.edu/combating-terrorist-financing-at-the-agency-and-interagency-levels/.Google Scholar
National Commission on Terrorist Attacks upon the United States. (2004). Monograph on terrorist financing. https://9-11commission.gov/staff_statements/911_TerrFin_Monograph.pdf.Google Scholar
Roul, A. (2024, October 4). The rise of Monero: ISKP’s preferred cryptocurrency for terror financing. Global Network on Extremism and Technology. https://gnet-research.org/2024/10/04/the-rise-of-monero-iskps-preferred-cryptocurrency-for-terror-financing/.Google Scholar
Sanford, M. (2020). “This is a game”: A history of the Foreign Terrorist Organization and State Sponsors of Terrorism lists and their applications. History in the Making, 13(1), Article 10. https://web.archive.org/web/20220619225117/https:/scholarworks.lib.csusb.edu/cgi/viewcontent.cgi?article=1140&context=history-in-the-making.Google Scholar

Secondary Sources

Adams, J. (1986). The financing of terror (pp. 135187). Simon and Schuster.Google Scholar
Biersteker, T. J., & Eckert, S. T. (2008). Countering the financing of terrorism (1st ed.). Routledge.Google Scholar
Blazakis, J. (2019). White supremacy extremism: The transnational rise of the violent white supremacist movement. The Soufan Center.Google Scholar
Blazakis, J., & Rennebaum, M. (2022, July). Deterrence and denial: The impact of sanctions and designations on violent far-right groups: Comparing violent far-right terrorist designations among Five Eyes countries. The Soufan Center.Google Scholar
Byman, D. (2005). Deadly connections: States that sponsor terrorism (pp. 259273). Cambridge University Press.CrossRefGoogle Scholar
Chaliand, G., & Blin, A. (2007). The history of terrorism: From antiquity to al Qaeda (1st ed.). University of California Press.Google Scholar
Douglas, F. (2004). Blood from Stones: The Secret Financial Network of Terror. Broadway Books.Google Scholar
Greenberg, A. (2022). Tracers in the dark: The global hunt for the crime lords of cryptocurrency. Doubleday.Google Scholar
Gretchen, P. (2012, July). Haqqani Network financing: The evolution of an industry. Combating Terrorism Center at West Point.Google Scholar
Hoffman, B. (2017). Inside terrorism. Columbia University Press.CrossRefGoogle Scholar
Keatinge, T., & Izenman, K. (2019, May). Fundraising for right-wing extremist movements. Royal United Services Institute.Google Scholar
Laqueur, W. (1977). A history of terrorism (1st ed.). Little, Brown and Company.Google Scholar
Melzer, R., & Serafin, S. (Eds.). (2013). Right-wing extremism in Europe: Country analyses, counter-strategies and labor-market oriented exit strategies (p. 194). Friedrich-Ebert-Stiftung. https://library.fes.de/pdf-files/dialog/10031.pdfGoogle Scholar
Miller-Idriss, C. (2020). Hate in the homeland: The new global far right (1st ed.). Princeton University Press.Google Scholar
Worley, M., & Copsey, N. (2007). White youth. In: Copsey, Nigel and Worley, Matthew eds., Tomorrow belongs to us: The British far right since 1967 (pp. 112131). Routledge.Google Scholar
Yarmolinsky, A. (1962). Road to revolution: A century of Russian radicalism. Collier Books.Google Scholar
Bender’s Immigration and Nationality Act Pamphlet. (2011). Immigration and Nationality Act, at Section 219(a)(1).Google Scholar
Blocking property and prohibiting transactions with persons who commit, threaten to commit, or support terrorism; 66, Fed. Reg. 186. (2001, September 23). www.gpo.gov/fdsys/pkg/FR-2001-09-25/pdf/01-24205.pdfGoogle Scholar
Financial Action Task Force. (2013, October). The Role of Hawala and Other Similar Service Providers in Money Laundering and Terrorist Financing. FATF. Page 9. www.fatf-gafi.org/en/publications/Methodsandtrends/Role-hawalas-in-ml-tf.html.Google Scholar
Financial Action Task Force. (2013, June). International Best Practices: Targeted Financial Sanctions Related to Terrorism and Terrorist Financing (Recommendation 6). Page 7. www.fatf-gafi.org/en/publications/Fatfrecommendations/Bpp-finsanctions-tf-r6.html#:~:text=FATF%20Recommendation%206%20requires%20countries,accordance%20with%20the%20relevant%20UNSCRs.Google Scholar
U.S. Department of Justice. (2023, May 5). Virginia man charged with sending money to ISIS women overseas. The Washington Post. www.washingtonpost.com/dc-md-va/2023/05/05/va-man-charged-isis-al-hol/.Google Scholar
U.S. Department of Justice. (2017, July 20). AlphaBay, the Largest Online “Dark Market,” Shut Down. DOJ Archives. www.justice.gov/archives/opa/pr/alphabay-largest-online-dark-market-shut-down.Google Scholar
U.S. Immigration and Customs Enforcement. (2015, May 29). Ross Ulbricht, aka Dread Pirate Roberts, sentenced to life in federal prison for creating, operating “Silk Road” website. U.S. Immigration and Customs Enforcement. www.ice.gov/news/releases/ross-ulbricht-aka-dread-pirate-roberts-sentenced-life-federal-prison-creating.Google Scholar
United Nations. (2024, July 22). Letter Dated 19 July 2024 from the Chair of the Security Council Committee Pursuant to Resolutions 1267 (1999), 1989 (2011), and 2253 (2015) Concerning Islamic State in Iraq and the Levant (Da’esh), Al-Qaida and Associated Individuals, Groups, Undertakings and Entities Addressed to the President of the Security Council. https://docs.un.org/en/S/2024/556Google Scholar
United Nations. (2024, June 10). Resolution 2734 (2024) Adopted by the Security Council at Its 9649th Meeting. https://docs.un.org/en/S/RES/2734(2024)Google Scholar
United Nations. (2001, September 28). Resolution 1373 (2001) Adopted by the Security Council at Its 4385th Meeting (p. 2). www.unodc.org/pdf/crime/terrorism/res_1373_english.pdfGoogle Scholar
United Nations. (1999, October 15). Security Council Meeting Record S/PV.4051. https://docs.un.org/en/S/PV.4051Google Scholar
United States V. Tawhedi. (2025, October 8). W. D. of Okla., United States District Court. Criminal Complaint (p. 21).Google Scholar
Blazakis Interview of John Jeffries. February 4, 2025.Google Scholar
Jason Blazakis Personal Interview of Shaun McLeary interview February 20, 2025.CrossRefGoogle Scholar
Jason Blazakis Personal Interview with Shaun McLeary, former Scotland Yard financial investigator. February 20, 2025.Google Scholar
Artingstall, D., & Maxwell, N. (2017, October 17). The role of financial information-sharing partnerships in the disruption of crime. RUSI. https://rusi.org/publication/occasional-papers/role-financial-information-sharing-partnerships-disruption-crime.Google Scholar
ASEAN Regional Forum. (2024). Work plan for counter terrorism and transnational crime 2024–2026. Page 13. https://aseanregionalforum.asean.org/wp-content/uploads/2024/07/6.-ARF-2024-2026-CTTC-Work-Plan_26-July_FINAL-CONSENSUS.pdf.Google Scholar
Asia-Pacific Economic Cooperation (APEC). (2014). Secure finance workshop on countering the financing of terrorism with new payment systems. https://aimp2.apec.org/sites/PDB/Lists/Proposals/DispForm.aspx?ID=1525.Google Scholar
Blazakis, J. M. (2022, January 26). U.S. has taken FARC off its terrorist list, giving insight into Biden’s foreign policy. The Conversation. https://theconversation.com/us-has-taken-farc-off-its-terrorist-list-giving-insight-into-bidens-foreign-policy-174667.CrossRefGoogle Scholar
Blazakis, J. M. (2020, May 31). Using a terrorism list to squeeze Cuba and Venezuela. Lawfare. www.lawfaremedia.org/article/using-terrorism-list-squeeze-cuba-and-venezuela.Google Scholar
Blazakis, J. M., & Tankel, S. (2020, June 4). The growing irrelevance of State’s list of countries not cooperating on counterterrorism. Just Security. www.justsecurity.org/70529/the-growing-irrelevance-of-of-states-list-of-countries-not-cooperating-on-counterterrorism/.Google Scholar
Borges, E. (2024, June 24). What is open source intelligence (OSINT)? Recorded Future. www.recordedfuture.com/blog/open-source-intelligence-definition.Google Scholar
Chainalysis Team. (2023). Crypto crime trends: Illicit cryptocurrency volumes reach all-time highs amid surge in sanctions designations and hacking. www.chainalysis.com/blog/2023-crypto-crime-report-introduction/.Google Scholar
Christian, R. World’s 6 largest stablecoins: Top cryptocurrencies that maintain a stable price. www.bankrate.com/investing/worlds-largest-stablecoins/.Google Scholar
CoinDesk. Top cryptocurrency prices and market cap. www.coindesk.com/price.Google Scholar
de Candia, A. (2020, November 23). CipherTrace: Two patents for tracking Monero (XMR). Cryptonomist, https://en.cryptonomist.ch/2020/11/23/ciphertrace-patents-tracking-monero-xmr/.Google Scholar
Dodge, W. S. (2016, September 30). Does JASTA violate international law? Just Security. www.justsecurity.org/33325/jasta-violate-international-law-2/.Google Scholar
Egmont Group of Financial Intelligence Units. (n.d.). About the Egmont Group. https://egmontgroup.org/about/.Google Scholar
Egmont Group of Financial Intelligence Units. (n.d.). IEWG – Information exchange working group. https://egmontgroup.org/working-groups/iewg/.Google Scholar
Elliptic. (2023, March 17). How the Russia-Ukraine war led to the growth of NFT fundraising. www.elliptic.co/blog/analysis/how-the-russia-ukraine-war-led-to-the-growth-of-nft-fundraising.Google Scholar
Financial Action Task Force. (2024, April). Private sector consultative forum. www.fatf-gafi.org/en/publications/Fatfgeneral/private-sector-consultative-forum-April-2024.html.Google Scholar
Financial Action Task Force. (2025, February). International standards on combating money laundering and the financing of terrorism & proliferation, 2012–2025. www.fatf-gafi.org/en/publications/Fatfrecommendations/Fatf-recommendations.html.Google Scholar
Financial Action Task Force. (2025, January 25). Countries under FATF’s Black and Grey Lists. www.fatf-gafi.org/en/countries/black-and-grey-lists.html.Google Scholar
Financial Action Task Force. (2024, October). Call for action: High-risk and other monitored Jurisdictions. www.fatf-gafi.org/en/publications/High-risk-and-other-monitored-jurisdictions/Call-for-action-october-2024.html.Google Scholar
Financial Action Task Force. (2021, October 21). Public Statement on Pandora Papers. www.fatf-gafi.org/en/publications/Fatfgeneral/Pandora-papers.html.Google Scholar
Financial Action Task Force. Revisions to recommendation 24 and its interpretive note – Public Consultation. www.fatf-gafi.org/en/publications/Fatfrecommendations/Public-consultation-r24.html.Google Scholar
FinCEN Files reporting team. (2020, September 22). FinCEN Files: UK bank may have moved money “linked to terror activity.” BBC News. www.bbc.com/news/world-middle-east-54235202.Google Scholar
Garside, J., Pegg, D., Watt, H., & Bengtsson, H. (2016, April 6). Mossack Fonseca worked with oil firms owned by Iranian state despite sanctions. The Guardian. www.theguardian.com/news/2016/apr/06/mossack-fonseca-oil-firms-petropars-iranian-state-sanctions-panama-papers.Google Scholar
Global Center on Cooperative Security. (2022, June 28). Global Center on cooperative security: June 28, 2022. https://x.com/GlobalCtr/status/1541758566440255496.Google Scholar
Hardy, P. D., & Danch, S. (2024, June 10). FinCEN releases year-in-review for FY 2023: SARs, CTRs, and information sharing. Ballard Spahr LLP. www.moneylaunderingnews.com/2024/06/fincen-releases-year-in-review-for-fy-2023-sars-ctrs-and-information-sharing/#:~:text=Collectively%2C%20they%20filed%20during%20FY,received%20in%20a%20trade%20or.Google Scholar
Hayes, A. (2024, December 22). What happens to Bitcoin after all 21 million are mined? Investopedia. www.investopedia.com/tech/what-happens-bitcoin-after-21-million-mined/.Google Scholar
Jamshidi, M. (2023, July 24). Iran’s ICJ case against Canada tests the terrorism exception to sovereign immunity. Just Security. www.justsecurity.org/87357/irans-icj-case-against-canada-tests-the-terrorism-exception-to-sovereign-immunity/.Google Scholar
Keatinge, T. (2017, December 1). Public–private partnerships and financial crime: Advancing an inclusive model. RUSI. www.rusi.org/explore-our-research/publications/commentary/public-private-partnerships-and-financial-crime-advancing-inclusive-model.Google Scholar
Kraken. Top Stablecoins Coins by Carket cap. Kraken. www.kraken.com/categories/stablecoins.Google Scholar
Levitt, M. (2015, March 24). The Islamic State’s backdoor banking. The Washington Institute for Near East Policy. www.washingtoninstitute.org/policy-analysis/islamic-states-backdoor-banking.Google Scholar
Lormel, D. M. (2002, February 12). Financing patterns associated with al-Qaeda and global terrorist networks. Federal Bureau of Investigation, before the House Committee on Financial Services, Subcommittee on Oversight and Investigations, Washington, DC. https://archives.fbi.gov/archives/news/testimony/financing-patterns-associated-with-al-qaeda-and-global-terrorist-networks.Google Scholar
Maltego Team. (2024, June 18). OSINT cybercrime investigations investigator know-how: Everything about social media intelligence (SOCMINT) and investigations. Maltego. www.maltego.com/blog/everything-about-social-media-intelligence-socmint-and-investigations/.Google Scholar
Meierriiks, D., & Auer, D. (2024). Bribes and bombs: The effect of corruption on terrorism. American Political Science Review. https://doi.org/10.1017/S0003055424000418.CrossRefGoogle Scholar
Miller, G. (2021, October 3). While his country struggles, Jordan’s King Abdullah secretly splurges. The Washington Post. www.washingtonpost.com/world/interactive/2021/jordan-abdullah-shell-companies-luxury-homes/?itid=lk_inline_manual_8.Google Scholar
Monero Space (2020, August 31). CipherTrace’s Monero Tracing Tool – Chat with Dave Jevans, Dr. Sarang Noether, and Justin Ehrenhofer. www.youtube.com/watch?v=w5rtd3md11g.Google Scholar
Navera, T. (2025, February 10). Trump suggests corporate transparency act tweaks amid support. Bloomberg Tax. https://news.bloombergtax.com/daily-tax-report/trump-suggests-corporate-transparency-act-tweaks-amid-support.Google Scholar
Organization for Security and Co-operation in Europe (OSCE). (2024). The role of the OSCE in countering the financing of terrorism. www.osce.org/secretariat/482445.Google Scholar
Pasquali, V. (2021, August 30). Exclusive: Fall of Afghanistan finds FBI without terrorist financing section. ACAMS Money. Laundering.com. www.moneylaundering.com/news/exclusive-fall-of-afghanistan-finds-fbi-without-terrorist-financing-section/.Google Scholar
Pegg, D. (2016, December 1). Panama Papers: Europol links 3,500 names to suspected criminals. The Guardian. www.theguardian.com/news/2016/dec/01/panama-papers-europol-links-3500-names-to-suspected-criminals.Google Scholar
Roggio, B. (2013, July 17). AQAP confirms deputy emir killed in US drone strike. FDD’s Long War Journal. www.longwarjournal.org/archives/2013/07/aqap_confirms_deputy.php 7.Google Scholar
Roth, J., Greenburg, D., & Wille, S. B. (2004, August 21). Monograph on terrorist financing, National Commission on terrorist attacks upon the United States, Staff Report to the Commission. Page 30. https://govinfo.library.unt.edu/911/staff_statements/911_TerrFin_Monograph.pdf.Google Scholar
Roth, J., Greenburg, D., & Wille, S. B. (2004, August 21). Monograph on terrorist financing: Staff Report to the Commission, National Commission on terrorist attacks upon the United States. Page 10. https://govinfo.library.unt.edu/911/staff_statements/911_TerrFin_Monograph.pdf.Google Scholar
Roth, J., Greenburg, D., & Wille, S. B. (2004). Monograph on terrorist financing: Staff Report to the Commission, National Commission on terrorist attacks upon the United States. Page 13.Google Scholar
Sacks, D. (2025, February 5). David Sacks on creating regulatory clarity for crypto. YouTube. www.youtube.com/watch?v=pAiBxfFunbE.Google Scholar
Schanzer, J. (2019, March 22). Why the U.S. still designates terrorist groups. Foreign Policy. https://foreignpolicy.com/2019/03/22/why-the-u-s-still-designates-terrorist-groups/.Google Scholar
Sheff, D. (2014, April 1). Nigeria’s Boko Haram: A new terrorist group. The Atlantic. www.theatlantic.com/international/archive/2014/04/nigerias-boko-haram-a-new-terrorist-group/359337/.Google Scholar
Sossman, N. A short history of terrorist designations. National Security Archive. https://nsarchive.gwu.edu/briefing-book/terrorism/2020-01-09/short-history-terrorist-designations.Google Scholar
The Daily Show with Trevor Noah. (2016, July 21). Boko Haram RNC viewing party. www.cc.com/video-clips/ewuqz6/the-daily-show-with-trevor-noah-boko-haram-rnc-viewing-party.Google Scholar
The Lawfare Institute. (2017, January 13). Designating terrorists and terrorist groups. Lawfare. www.lawfaremedia.org/article/designating-terrorists-and-terrorist-groups.Google Scholar
Transparency International. Corruption perceptions index. www.transparency.org/en/cpi/2024/index/cod.Google Scholar
TRM Labs. (2024, October). The rise of Monero: Traceability, challenges, and research review. TRM Labs. www.trmlabs.com/resources/blog/the-rise-of-monero-traceability-challenges-and-research-review.Google Scholar
TRM Labs. (2023, July). TRM finds mounting evidence of crypto use by ISIS and its supporters in Asia. TRM Labs. www.trmlabs.com/post/trm-finds-mounting-evidence-of-crypto-use-by-isis-and-its-supporters-in-asia.Google Scholar
United Nations Office of Counter-Terrorism. (2024, June 25). Soft Launch of the GoFintel Software. www.un.org/counterterrorism/events/soft-launch-gofintel-software.Google Scholar
United Nations Office of Counter-Terrorism. (2022). New avenues to address terrorist financing. UN Counter-Terrorism Centre (UNCCT). www.un.org/counterterrorism/cct/countering-the-financing-of-terrorism.Google Scholar
United Nations Office on Drugs and Crime. (2024). UNODC Supports Jordan to Implement UN Security Council Sanctions. www.unodc.org/unodc/en/terrorism/latest-news/2024_unodc_-unodc-supports-jordan-to-implement-un-security-council-sanctions.html.Google Scholar
United Nations Security Council Counter-Terrorism Committee Executive Directorate (CTED). (2024, November). Trends tracker: Evolving trends in the financing of foreign terrorist fighters’ activity: 2014–2024. www.un.org/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/cted_trends_tracker_evolving_trends_in_the_financing_of_foreign_terrorist_fighters_activity_2014_-_2024.pdf.Google Scholar
Bacon, T., & Doctor, A. C. (2023, March 2). The death of Bilal al-Sudani and its impact on Islamic State operations. George Washington University. https://extremism.gwu.edu/death-of-bilal-al-sudani.Google Scholar
BBC News. (2017, May 8). Nigeria Chibok abductions: What we know. BBC News. www.bbc.com/news/world-africa-32299943.Google Scholar
Bell, B., & Kirby, P. (2023, February 1). Vienna murders: Four guilty of helping jihadist in terror attack. BBC News. www.bbc.com/news/world-europe-64482080.Google Scholar
Bladt, C., Kaufman, K., & Mahtani, M. (2024, August 1). Trump’s big cryptocurrency bet. CBS News. www.cbsnews.com/news/trump-cryptocurrency-campaign-nashville/.Google Scholar
Blazakis, J. M. (2018, December 3). Labeling Venezuela a terror-supporting state doesn’t fit. The Hill. https://thehill.com/opinion/international/418984-labeling-venezuela-a-terror-supporting-state-doesnt-fit.Google Scholar
Blazakis, J. M. (2025, February 19). The case against designating cartels as terrorists: It risks diluting the term into meaninglessness while proving little or no benefit to law enforcement. The Wall Street Journal. www.wsj.com/opinion/the-case-against-designating-cartels-as-terrorists-90c6c44f.Google Scholar
Bond, G., Thompson, A. C., & Winston, A. (2017, October 19). Racist, violent, unpunished: A white hate group’s campaign of menace. ProPublica. www.propublica.org/article/white-hate-group-campaign-of-menace-rise-above-movement.Google Scholar
CipherTrace. (2021, August). Cryptocurrency crime and anti-money laundering report. Cryptocurrency Intelligence. Pages 28–30. https://info.ciphertrace.com/hubfs/CAML%20Reports/Cryptocurrency%20Crime%20and%20Anti-Money%20Laundering%20Report%2C%20August%202021.pdf.Google Scholar
Connor, T., & Arkin, D. (2017, July 8). Hobby Lobby has bought tons of antiquities. Where do they come from? NBC News. www.nbcnews.com/news/us-news/spotlight-hobby-lobby-s-biblical-collection-after-smuggle-case-n780286.Google Scholar
Farivar, C. (2020, August 13). Feds announce largest seizure of cryptocurrency connected to terrorism. NBC News. www.nbcnews.com/tech/tech-news/feds-announce-largest-seizure-cryptocurrency-connected-terrorism-n1236610.Google Scholar
Fintech Futures. (2024, October 31). Global RegTech Business Report 2024–2029: Key trends, recent launches, partnerships and collaborations influencing the rapidly growing multi-billion dollar market. Globe Newswire. www.globenewswire.com/news-release/2024/10/31/2357344/0/en/Global-RegTech-Business-Report-2024-2029-Key-Trends-Recent-Launches-Partnerships-and-Collaborations-Influencing-the-Rapidly-Growing-Multi-Billion-Dollar-Market.html.Google Scholar
Fitzgibbon, W., Díaz-Struck, E., & Hudson, M. (2017, February 11). Founders of Panama Papers law firm arrested on money laundering charges. International Consortium of Investigative Journalists. www.icij.org/investigations/panama-papers/20170210-mossfon-panama-arrests/.Google Scholar
Gomez, E. (2024, October 7). Supreme Court clears path for US to sell $4.4 billion in seized Silk Road Bitcoin. Crypto Briefing. https://cryptobriefing.com/supreme-court-silk-road-bitcoin/.Google Scholar
Gartenstein-Ross, D. (2010, November 23). Death by a thousand cuts. Foreign Policy. https://foreignpolicy.com/2010/11/23/death-by-a-thousand-cuts-2/.Google Scholar
Gordon, M. R. (2015, November 17). U.S. strikes Syria oil fields used by ISIS. The New York Times. www.nytimes.com/2015/11/17/world/middleeast/us-strikes-syria-oil.html.Google Scholar
Greenberg, A. (2022, April 7). Inside the Bitcoin Bust That Took Down the Web’s Biggest Child Abuse Site. Wired. www.wired.com/story/tracers-in-the-dark-welcome-to-video-crypto-anonymity-myth/.Google Scholar
Hosenball, M., & Shiffman, J. (2012, May 17). U.S. Justice Dept urges terror label for Nigerian militants. Chicago Tribune. http://articles.chicagotribune.com/2012-05-17/news/sns-rt-us-usa-security-bokoharambre84h01i-20120517_1_haqqani-network-militant-group-terrorist-group.Google Scholar
Houreld, K., Chason, R., George, S., & Salim, M. (2025, February 16). Trump’s global funding freeze leaves anti-terror programs in Limbo. The Washington Post. www.washingtonpost.com/world/2025/02/16/trump-funding-freeze-terrorism-africa/.Google Scholar
Ilyushina, M. (2025, February 12). Who is Alexander Vinnik, the Russian cybercriminal swapped for Marc Fogel? The Washington Post. www.washingtonpost.com/world/2025/02/12/alexander-vinnik-crypto-marc-fogel-exchange/.Google Scholar
International Consortium of Investigative Journalists (ICIJ). (2017, January 31). Explore the Panama Papers key figures. www.icij.org/investigations/panama-papers/explore-panama-papers-key-figures/.Google Scholar
Kerry, J. (2014, September 22). Remarks at threats to cultural heritage in Iraq and Syria event. U.S. Department of State. https://2009-2017.state.gov/secretary/remarks/2014/09/231992.htm.Google Scholar
Kessler, G. (2014, May 18). “Boko Haram”: Inside the State Department debate over the ‘terrorist’ label. The Washington Post. www.washingtonpost.com/world/national-security/boko-haram-inside-the-state-department-debate-over-the-terrorist-label/2014/05/18/2fe89778-dbf6-11e3-9f37-7b1a11b5b3a1_story.html.Google Scholar
King, W. (1985, April 12). Indictment of 24 neo-Nazis expected under U.S. racketeering law. The New York Times. www.nytimes.com/1985/04/12/us/indictment-of-24-neo-nazis-expected-under-u-s-racketeering-law.html.Google Scholar
King, W. (1985, September 29). 1983 arrest an elusive clue to neo-Nazi group’s plans. The New York Times. www.nytimes.com/1985/09/29/us/1983-arrest-an-elusive-clue-to-neo-nazi-group-s-plans.html.Google Scholar
Macaulay, C. (2023, January 27). Bilal al-Sudani: U.S. forces kill Islamic State Somalia leader in cave complex. BBC News. www.bbc.com/news/world-africa-64423598.Google Scholar
Macnair, L. (2023, June 28). Understanding Fashwave: The alt-right’s ever-evolving media strategy. GNET. https://gnet-research.org/2023/06/28/understanding-fashwave-the-alt-rights-ever-evolving-media-strategy/.Google Scholar
Madruga, I. (2024, April 12). An incel’s fantasy: Into the world of tradwives. The Johns Hopkins News-Letter. www.jhunewsletter.com/article/2024/04/an-incels-fantasy-into-the-world-of-tradwives.Google Scholar
Mason, J., & Nichols, M. (2025, February 4). Trump says UN has to ‘Get Its Act Together,’ UN Pushes Back. Reuters. www.reuters.com/world/us/trump-signs-orders-iran-withdrawing-us-un-human-rights-council-unrwa-2025-02-04/.Google Scholar
Mazzetti, M. (2013, January 24). No. 2 leader of Al Qaeda in Yemen is killed. The New York Times. www.nytimes.com/2013/01/25/world/middleeast/said-ali-al-shihri-qaeda-leader-in-yemen-is-dead.html.Google Scholar
Minder, R. (2018, May 2). Basque group ETA disbands, after terrorist campaign spanning generations. The New York Times. www.nytimes.com/2018/05/02/world/europe/spain-eta-disbands-basque.html.Google Scholar
Murray, S., & Nossiter, A. (2011, August 26). Suicide bomber attacks U.N. bomber in Nigeria. The New York Times. www.nytimes.com/2011/08/27/world/africa/27nigeria.html.Google Scholar
Otis, J. (2016, September 24). The American diplomat who helped bring an end to Colombia’s war. NPR Parallels (Audio). www.npr.org/sections/parallels/2016/09/24/495185560/the-american-diplomat-who-helped-bring-an-end-to-colombias-war.Google Scholar
Raymond, N. (2025, January 22). Trump pardons Silk Road founder Ross Ulbricht for online drug scheme. Reuters. www.reuters.com/world/us/trump-pardons-silk-road-founder-ulbricht-online-drug-scheme-2025-01-22/Google Scholar
Reilly, K. (2016, July 22). Read Chris Christie’s convention speech attacking Hillary Clinton. TIME. http://time.com/4419974/chris-christie-republican-convention-speech/.Google Scholar
Rosenberg, M., & Weiser, M. (2021, September 5). How a Nazi rally in Whitefish led to a deadly attack in Charlottesville. The New York Times. www.nytimes.com/2021/09/05/us/politics/nazi-whitefish-charlottesville.html.Google Scholar
Sahimi, M. (2009, October 22). Who supports Jundallah? PBS (KQED). www.pbs.org/wgbh/pages/frontline/tehranbureau/2009/10/jundallah.html.Google Scholar
Shear, M. D., & Sanger, D. E. (2017, November 20). Trump returns North Korea to list of state sponsors of terrorism. The New York Times. www.nytimes.com/2017/11/20/us/politics/north-korea-trump-terror.html.Google Scholar
Talley, I. (2022, September 6). Islamic State turns to NFTs to spread terror message. The Wall Street Journal. www.wsj.com/articles/islamic-state-turns-to-nfts-to-spread-terror-message-11662292800.Google Scholar
Taylor, M. (2011, July 25). Norway gunman claims he had nine-year plan to finance attacks. The Guardian. www.theguardian.com/world/2011/jul/25/norway-gunman-attack-funding-claim.Google Scholar
Taylor, M., & Wainwright, M. (2010, August 28). English Defence League supporters attack police at Bradford rally. The Guardian. www.theguardian.com/uk/2010/aug/28/english-defence-league-bradford-demonstrations.Google Scholar
The Associated Press. (2011, August 31). Pakistani fertilizer fuels Afghan bombs. Dawn News. www.dawn.com/news/655920/pakistani-fertilizer-fuels-afghan-bombs.Google Scholar
U.S. Department of Justice. (2020, August 13). Global disruption of three terror finance cyber-enabled campaigns. DOJ Archives. www.justice.gov/archives/opa/pr/global-disruption-three-terror-finance-cyber-enabled-campaigns.Google Scholar
U.S. Department of Justice. (2020, August 5). United States’ verified complaint for Forfeiture in Rem. DOJ Archives. www.justice.gov/archives/opa/pr/global-disruption-three-terror-finance-cyber-enabled-campaigns.Google Scholar
U.S. Department of Justice. (2024, December 16). Virginia man convicted for crypto financing scheme to ISIS. DOJ Archives. www.justice.gov/archives/opa/pr/virginia-man-convicted-crypto-financing-scheme-isis.Google Scholar
U.S. Department of the Treasury. (2023, October 18). Following terrorist attack on Israel, treasury sanctions Hamas operatives and financial facilitators. https://home.treasury.gov/news/press-releases/jy1816.Google Scholar
Wamsley, L. (2017, December 26). Trump administration touts a smaller U.N. budget (and takes credit for it). NPR. www.npr.org/sections/thetwo-way/2017/12/26/573483336/trump-administration-touts-a-smaller-u-n-budget-and-takes-credit-for-it.Google Scholar
Weiner, R., & Silverman, E. (2017, October 27). He joined the Islamic State, then fled. Now, he’s been sentenced to prison for 20 years. The Washington Post. www.washingtonpost.com/local/public-safety/he-joined-the-islamic-state--then-fled-now-he-will-go-to-prison-for-20-years/2017/10/27/9c8a34c2-b813-11e7-9e58-e6288544af98_story.html?noredirect=on&utm_term=.4230c93b9aa1.Google Scholar
CJTF-OIR Public Affairs. (2018, March 26). Coalition forces kill ISIS financial facilitator. Combined Joint Task Force – Operation Inherent Resolve. www.inherentresolve.mil/NEWSROOM/News-Releases/Article/1227052/coalition-forces-kill-isis-financial-facilitator/.Google Scholar
Department of Justice. (2016, November 18). Illinois man sentenced to 40 months in federal prison attempting to provide material support to ISIL. Justice News, Office of Public Affairs. www.justice.gov/opa/pr/illinois-man-sentenced-40-months-federal-prison-attempting-provide-material-support-isil.Google Scholar
Department of the Treasury, Financial Crimes Enforcement Network. (2024, December 5). Bank Secrecy Act Advisory Group; Solicitation of Application for Membership. Federal Register. www.federalregister.gov/documents/2024/12/05/2024-28451/bank-secrecy-act-advisory-group-solicitation-of-application-for-membership#:~:text=The%20BSAAG%20is%20the%20means,information%20they%20provide%20is%20used.Google Scholar
DeVille, D. (2017, July 18). Testimony of Mr. Duncan DeVille, Global Head of Financial Crimes Compliance & US BSA Officer, The Western Union Company. United States House of Representatives, Financial Services Subcommittee on Terrorism and Illicit Finance. www.congress.gov/115/meeting/house/106297/witnesses/HHRG-115-BA01-Wstate-DeVilleD-20170718.pdf.Google Scholar
European Commission. (2022, November 11). Report from the Commission to the European Parliament and the Council on the joint review of the implementation of the Agreement between the European Union and the United States of America on the processing and transfer of financial messaging data from the European Union to the United States for the purposes of the Terrorist Finance Tracking Program. European Commission. https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:52022DC0585.Google Scholar
Executive Order 13224. (2001, September 23). Blocking property and prohibiting transactions with persons who commit, threaten to commit, or support terrorism; 66, Fed. Reg. 186. U.S. Government Printing Office. www.gpo.gov/fdsys/pkg/FR-2001-09-25/pdf/01-24205.pdf.Google Scholar
FATF. (2001, October). FATF IX Special Recommendations. FATF. www.fatf-gafi.org.Google Scholar
FATF. (2015, February). Financing of the Terrorist Organisation Islamic State in Iraq and the Levant (ISIL). FATF. www.fatf-gafi.org.Google Scholar
FATF. (2016). Anti-money Laundering and Counter-Terrorist Financing Measures – United States, Fourth Round Mutual Evaluation Report. FATF, Paris. www.fatf-gafi.org/publications/mutualevaluations/documents/mer-united-states-2016.html.Google Scholar
FATF. (2021). Ethnically or racially motivated terrorism financing. FATF. www.fatf-gafi.org.Google Scholar
FATF. (2024, November 20). Treasury imposes sanctions on a Hawala and two individuals linked to the Taliban. U.S. Department of the Treasury. https://home.treasury.gov/news/press-releases/tg1777.Google Scholar
Federal Bureau of Investigation. (n.d.). How we investigate: Intelligence. Federal Bureau of Investigation. www.fbi.gov/how-we-investigate/intelligence.Google Scholar
Federal Bureau of Investigation. (n.d.). Joe Pistone: Undercover agent. Federal Bureau of Investigation. www.fbi.gov/history/famous-cases/joe-pistone-undercover-agent.Google Scholar
Federal Bureau of Investigation. Asset forfeiture. Federal Bureau of Investigations. www.fbi.gov/investigate/white-collar-crime/asset-forfeiture.Google Scholar
Federal Deposit Insurance Corporation. (2007). Connecting the dots: The importance of timely and effective suspicious activity reports. Federal Deposit Insurance Corporation. www.fdic.gov/bank-examinations/connecting-dotsthe-importance-timely-and-effective-suspicious-activity-reports.Google Scholar
Federal Ministry of Finance. (2025, February 13). Ministerial conference on counter-terrorism financing. www.bundesfinanzministerium.de/Content/EN/Downloads/Financial-Markets/no-money-for-terror-chairs-summary.pdf?__blob=publicationFile&v=6.Google Scholar
Financial Crimes Enforcement Network (FinCEN). (2019, May 9). Application of FinCEN’s regulations to certain business models involving convertible virtual currencies. www.fincen.gov/sites/default/files/2019-05/FinCEN%20Guidance%20on%20Virtual%20Currencies%20May%209%202019.pdf.Google Scholar
Financial Crimes Enforcement Network. (2005, April 8). Suspicious activity report initiates material support investigation. U.S. Department of the Treasury. www.fincen.gov/resources/law-enforcement/case-examples/suspicious-activity-report-initiates-material-support.Google Scholar
Financial Crimes Enforcement Network (FinCEN). (2024, October 10). FinCEN assesses record $1.3 billion penalty against TD Bank. www.fincen.gov/news/news-releases/fincen-assesses-record-13-billion-penalty-against-td-bank.Google Scholar
HM Revenue & Customs. (2019, September 4). Money sender fined record £7.8 million in money laundering crackdown. Gov.UK. www.gov.uk/government/news/money-sender-fined-record-78-million-in-money-laundering-crackdown.Google Scholar
Home Office. (2017, October 17). Joint Fraud Taskforce. Gov.UK. www.gov.uk/government/collections/joint-fraud-taskforce.Google Scholar
IMF. Anti-money Laundering/Combatting the Financing of Terrorism (AML/CFT). IMF. www.imf.org/external/np/leg/amlcft/eng/aml1.htm.Google Scholar
Intelligence and Security Committee. Could 7/7 have been prevented? Review of the intelligence on the London terrorist attacks on 7 July 2005. UK Parliament. https://fas.org/irp/world/uk/july7review.pdf.Google Scholar
Klein, A. (2020, November 19). Statement by Chairman Adam Klein on the Terrorist Finance Tracking Program. U.S. Privacy and Civil Liberties Oversight Board. https://documents.pclob.gov/prod/DynamicImages/Generic/e426b076-928d-4a79-ac0c-9ed9efe9e4cf/TFTP%20Chairman%20Statement%2011_19_20.pdf.Google Scholar
National Economic Crime Centre. Improving the UK’s response to economic crime. National Economic Crime Centre. National Crime Agency. www.nationalcrimeagency.gov.uk/what-we-do/national-economic-crime-centre.Google Scholar
Office of the Director of National Intelligence. (n.d.). Counterterrorism guide: Terrorist groups. Office of the Director of National Intelligence. www.dni.gov/nctc/groups.html#:~:text=To%20designate%20a%20country%20as%20a%20State%20Sponsor,designation%20is%20rescinded%20in%20accordance%20with%20statutory%20criteria.Google Scholar
Office of the Press Secretary. (2001, September 24). President freezes terrorists’ assets. George W. Bush Whitehouse Archives. https://georgewbush-whitehouse.archives.gov/news/releases/2001/09/text/20010924-4.html.Google Scholar
Pistole, J. S. (2003, September 24). Testimony before the House Committee on Financial Services Subcommittee on Oversight and Investigations. Federal Bureau of Investigation. https://archives.fbi.gov/archives/news/testimony/the-terrorist-financing-operations-section.Google Scholar
Roth, J., Greenburg, D., & Wille, S. B. (2004). Monograph on terrorist financing: Staff report to the Commission. National Commission on Terrorist Attacks upon the United States. https://9-11commission.gov/staff_statements/.Google Scholar
Temple, C. (2005, July 28). Financing of insurgency operations in Iraq. House Armed Services Subcommittee on Terrorism, Unconventional Threats, and Capabilities and House Financial Services Subcommittee on Oversight and Investigations (p. 2). https://financialservices.house.gov/media/pdf/072805ct.pdf.Google Scholar
The Commission on the Intelligence Capabilities of the United States Regarding Weapons of Mass Destruction. (2005, March 31). Report to the President of the United States (pp. 378–379). www.govinfo.gov/content/pkg/GPO-WMD/pdf/GPO-WMD.pdfGoogle Scholar
The White House. (2025, January 20). Designating cartels and other organizations as foreign terrorist organizations and specially designated global terrorists. www.whitehouse.gov/presidential-actions/2025/01/designating-cartels-and-other-organizations-as-foreign-terrorist-organizations-and-specially-designated-global-terrorists/.Google Scholar
The White House. (2016, September 23). Veto message from the president – S.2040. Office of the Press Secretary. https://obamawhitehouse.archives.gov/the-press-office/2016/09/23/veto-message-president-s2040.Google Scholar
U.S. Department of Homeland Security. (2009, July 9). Morning roundup. www.dhs.gov/archive/news/2009/07/09/morning-roundup-july-9th.Google Scholar
U.S. Department of Justice. (2020, March 13). Long Island woman sentenced to 13 years’ imprisonment for providing material support to ISIS. U.S. Department of Justice. www.justice.gov/usao-edny/pr/long-island-woman-sentenced-13-years-imprisonment-providing-material-support-isis.Google Scholar
U.S. Department of Justice. (2012, November 9). Moneygram International Inc. Admits Anti-Money Laundering and Wire Fraud Violations, Forfeits $100 Million in Deferred Prosecution. www.justice.gov/archives/opa/pr/moneygram-international-inc-admits-anti-money-laundering-and-wire-fraud-violations-forfeits#:~:text=In%20addition%20to%20forfeiting%20%24100,regularly%20to%20the%20Justice%20Department.%E2%80%9D.Google Scholar
U.S. Department of Justice. (2010, September 1). Pakistani Taliban leader charged in terrorism conspiracy resulting in murder of seven Americans in Afghanistan. FBI. https://archives.fbi.gov/archives/washingtondc/press-releases/2010/wfo090110.htm.Google Scholar
U.S. Department of State. (2022). AML/CFT Capacity Building in the Federal Republic of Nigeria. Winter. www.grants.gov/search-results-detail/341352.Google Scholar
U.S. Department of State. (2021). Country reports on terrorism. Bureau of Counterterrorism. www.state.gov/reports/country-reports-on-terrorism-2021/.Google Scholar
U.S. Department of State. (2017, January 10). State Department terrorist designation of Alexanda Amon Kotey. Bureau of Counterterrorism and Countering Violent Extremism. www.state.gov/j/ct/rls/other/des/266771.htm.Google Scholar
U.S. Department of State. (2016, December 28). Amendment to the terrorist designations of Lashkar e-Tayyiba. Bureau of Counterterrorism and Countering Violent Extremism. www.state.gov/j/ct/rls/other/des/266629.htm.Google Scholar
U.S. Department of State. (2013, November 13). Terrorist designations of Boko Haram and Ansaru. Bureau of Counterterrorism and Countering Violent Extremism. www.state.gov/j/ct/rls/other/des/266565.htm.Google Scholar
U.S. Department of State. (2012, September 28). Delisting of the Mujahedin-e Khalq. Bureau of Counterterrorism and Countering Violent Extremism. www.state.gov/j/ct/rls/other/des/266607.htm.Google Scholar
U.S. Department of State. (2012, September 21). Department of State: Public notice 8050; 77, Fed. Reg. 193. U.S. Government Printing Office. www.gpo.gov/fdsys/pkg/FR-2012-10-04/pdf/2012-24505.pdf.Google Scholar
U.S. Department of State. (2011, March 24). Department of State’s terrorist designation of Ibrahim Hassan Tali Al-Asiri. Bureau of Counterterrorism and Countering Violent Extremism. www.state.gov/j/ct/rls/other/des/266641.htm.Google Scholar
U.S. Department of State. (2011, October 4). Terrorist designation of Ibrahim Awwad Ibrahim Ali al-Badri. Bureau of Counterterrorism and Countering Violent Extremism. www.state.gov/j/ct/rls/other/des/266629.htm.Google Scholar
U.S. Department of State. (2010, November 3). Secretary of State’s terrorist designation of Jundallah. Bureau of Counterterrorism and Countering Violent Extremism. www.state.gov/j/ct/rls/other/des/266649.htm.Google Scholar
U.S. Department of State. (2010, September 1). Designations of Tehrik-e Taliban Pakistan and two senior leaders. Bureau of Counterterrorism and Countering Violent Extremism. www.state.gov/j/ct/rls/other/des/266652.htm.Google Scholar
U.S. Department of State. (n.d.). Individuals and entities designated by the State Department under E.O. 13224. Bureau of Counterterrorism and Countering Violent Extremism. www.state.gov/j/ct/rls/other/des/143210.htm.Google Scholar
U.S. Department of the Treasury. (2025, March 2). Treasury department announces suspension of enforcement of Corporate Transparency Act against U.S. citizens and domestic reporting companies. US Treasury. https://home.treasury.gov/news/press-releases/sb0038.Google Scholar
U.S. Department of the Treasury. (2024, February 27). Counter ISIS Finance Group Leaders Issue Joint Statement. U.S. Department of the Treasury. https://home.treasury.gov/news/press-releases/jy2131.Google Scholar
U.S. Department of the Treasury. (2024, February). 2024 National terrorist financing risk assessment. U.S. Department of the Treasury. https://home.treasury.gov/system/files/136/2024-National-Terrorist-Financing-Risk-Assessment.pdf.Google Scholar
U.S. Department of the Treasury. (2024, March 11). Treasury designates transnational Al-Shabaab money laundering network. U.S. Department of the Treasury. https://home.treasury.gov/news/press-releases/jy2168.Google Scholar
U.S. Department of the Treasury. (2022, August 8). U.S. Treasury Sanctions Notorious Virtual Currency Mixer Tornado Cash. https://home.treasury.gov/news/press-releases/jy0916#:~:text=Treasury%20will%20continue%20to%20aggressively,BSA)%20and%20its%20implementing%20regulations.Google Scholar
U.S. Department of the Treasury. (2021, February 10). Treasury targets designations on terrorist networks. U.S. Department of the Treasury. https://home.treasury.gov/news/press-releases/jy0012.Google Scholar
U.S. Department of the Treasury. (2021, November 22). Treasury designates key financial facilitator for the Islamic State’s Afghanistan Branch. https://home.treasury.gov/news/press-releases/jy0502.Google Scholar
U.S. Department of the Treasury. (2019, September 10). Treasury targets wide range of terrorists and their supporters using enhanced counterterrorism sanctions authorities. https://home.treasury.gov/news/press-releases/sm772.Google Scholar
U.S. Department of the Treasury. (2016). Terrorist assets report: Calendar year 2016. Office of Foreign Assets Control. www.treasury.gov/resource-center/sanctions/Programs/Documents/tar2016.pdf.Google Scholar
U.S. Department of the Treasury. (2014, August 6). Treasury designates three key supporters of terrorists in Syria and Iraq. U.S. Department of the Treasury. https://home.treasury.gov/news/press-releases/jl2605.Google Scholar
U.S. Department of the Treasury. (2011, February 10). Treasury identifies Lebanese Canadian Bank Sal as a ‘Primary Money Laundering Concern.’ https://home.treasury.gov/news/press-releases/tg1057.Google Scholar
U.S. Department of the Treasury. (2005, July 28). Testimony of Acting A/S Glaser on financing for the Iraqi insurgency. U.S. Department of the Treasury. https://home.treasury.gov/news/press-releases/js2658.Google Scholar
U.S. Department of the Treasury. (n.d.). Terrorist finance tracking program: Questions and answers. U.S. Department of the Treasury. https://home.treasury.gov/system/files/246/Terrorist-Finance-Tracking-Program-Questions-and-Answers.pdf.Google Scholar
U.S. Department of the Treasury. (n.d.). Terrorist finance tracking program (TFTP). U.S. Department of the Treasury. https://home.treasury.gov/policy-issues/terrorism-and-illicit-finance/terrorist-finance-tracking-program-tftp.Google Scholar
U.S. Department of the Treasury. Financial Action Task Force highlights treasury’s efforts to counter illicit finance. https://home.treasury.gov/news/press-releases/jy2208.Google Scholar
U.S. Government Accountability Office. (2016, August). Report to Congressional Requesters (pp. 7–8). www.gao.gov/assets/gao-16-673.pdf.Google Scholar
U.S. House Committee on Financial Services. (2025, February 6). Meuser: The Biden administration’s Operation Choke Point 2.0 was carried out by the prudential regulators to target and debank the digital asset ecosystem. Financial Services. House.Gov. https://financialservices.house.gov/news/documentsingle.aspx?DocumentID=409457#:~:text=Meuser%3A%20The%20Biden%20Administration’s%20Operation,Asset%20Ecosystem%20%7C%20Financial%20Services%20Committee.Google Scholar
U.S. Immigration and Customs Enforcement. (2011, September 11). 3 plead guilty to conspiracy to provide support to the Pakistani Taliban. ICE Newsroom. www.ice.gov/news/releases/3-plead-guilty-conspiracy-provide-material-support-pakistani-taliban.Google Scholar
United Nations Office on Drugs and Crime. Combating Terrorist Financing. UNODC. www.unodc.org/unodc/en/terrorism/expertise/combating-terrorist-financing.html.Google Scholar
United Nations Security Council. (2017, December 11). Hajjaj bin Fahd al-Ajmi. United Nations. main.un.org/securitycouncil/en/sanctions/1267/aq_sanctions_list/summaries/individual/hajjaj-bin-fahd-al-ajmi.Google Scholar
UN Security Council. (2017, July 20). Security Council ISIL (Da’esh) and Al-Qaida sanctions committee adds two names to its sanctions list. UN Security Council. www.un.org/press/en/2017/sc12919.doc.htm.Google Scholar

Accessibility standard: WCAG 2.0 A

Why this information is here

This section outlines the accessibility features of this content - including support for screen readers, full keyboard navigation and high-contrast display options. This may not be relevant for you.

Accessibility Information

The PDF of this book conforms to version 2.0 of the Web Content Accessibility Guidelines (WCAG), ensuring core accessibility principles are addressed and meets the basic (A) level of WCAG compliance, addressing essential accessibility barriers.

Content Navigation

Table of contents navigation
Allows you to navigate directly to chapters, sections, or non‐text items through a linked table of contents, reducing the need for extensive scrolling.
Index navigation
Provides an interactive index, letting you go straight to where a term or subject appears in the text without manual searching.

Reading Order & Textual Equivalents

Single logical reading order
You will encounter all content (including footnotes, captions, etc.) in a clear, sequential flow, making it easier to follow with assistive tools like screen readers.
Short alternative textual descriptions
You get concise descriptions (for images, charts, or media clips), ensuring you do not miss crucial information when visual or audio elements are not accessible.
Full alternative textual descriptions
You get more than just short alt text: you have comprehensive text equivalents, transcripts, captions, or audio descriptions for substantial non‐text content, which is especially helpful for complex visuals or multimedia.

Structural and Technical Features

ARIA roles provided
You gain clarity from ARIA (Accessible Rich Internet Applications) roles and attributes, as they help assistive technologies interpret how each part of the content functions.

Save book to Kindle

To save this book to your Kindle, first ensure no-reply@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

  • Bibliography
  • Jason Blazakis, Middlebury Institute of International Studies
  • Book: Terror Disrupted
  • Online publication: 18 December 2025
  • Chapter DOI: https://doi.org/10.1017/9781009232838.013
Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

  • Bibliography
  • Jason Blazakis, Middlebury Institute of International Studies
  • Book: Terror Disrupted
  • Online publication: 18 December 2025
  • Chapter DOI: https://doi.org/10.1017/9781009232838.013
Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

  • Bibliography
  • Jason Blazakis, Middlebury Institute of International Studies
  • Book: Terror Disrupted
  • Online publication: 18 December 2025
  • Chapter DOI: https://doi.org/10.1017/9781009232838.013
Available formats
×