You are on page 1of 22

Terrorist Use of

Cryptocurrencies
A Blockchain Compliance White Paper
Simone D. Casadei Bernardi April 2019
Terrorist Use of Cryptocurrencies
is published by
Blockchain ConsultUs Ltd.
Kemp House, 160 City Road
London EC1V 2NX, United Kingdom
Company number 11595594
www.blockchainconsultus.io

© Blockchain ConsultUs Ltd, 2019

This document is protected by law. This representation of Blockchain ConsultUs’ intellectual property is provided for non-com-
mercial use only. This document can be freely distributed, provided no changes are introduced hereto. Any amendments or
changes hereto, as well as this document’s distribu­tion for profit ­making, are allowed only upon written consent by Blockchain
ConsultUs Ltd. For information, please email contact@blockchainconsultus.io.
Cover image: © luckybusiness/Adobe Stock. Image on page 8: © chagpg/Adobe Stock.
Terrorist Use of Cryptocurrencies

Cryptocurrencies are easy to use, secure,


and if used correctly can hide your iden-
tity. That would explain why increasing
news reports claim that terrorists are us-
ing them to fund their actions.
Is that claim true, and if so, to what ex-
tent? And are there any real-world exam-
ples to draw on?

What Makes Cryptocurrencies Appealing to Terrorists? 4

Terrorism and the Online Age 8

Examples of Cryptocurrency’s Use in Terrorism 10

Did ISIS Use Bitcoin and Other Cryptocurrencies? 13

The Limitations of Cryptocurrency 15

Whilst every effort has been made to ensure the accuracy of information presented, the author and the editor disclaim
all responsibility for and accept no liability for any errors or losses caused by any inaccuracies in this publication or the
consequences of any person acting or refraining from acting or otherwise relying on such information. They do not
assume any liability for the information contained herein, its interpretation or for any reliance on it. This white paper
should not be construed as a recommendation, endorsement, opinion or approval of any kind. It has been produced
for information only and should not be relied on for legal purposes. Professional advice should always be sought before
taking action based on the information provided.

blockchainconsultus.io
Terrorist Use of Cryptocurrencies

What Makes
Cryptocurrencies
Appealing to Terrorists?

Cryptocurrency is an area of great Ease of Use


promise, and not just for those inter-
ested in privacy or investing. The fact For the purpose of online transac-
that it makes online payment not only tions, cryptocurrencies are becom-
quick, but secure, means that crypto ing increasingly easy to use. Years
is of appeal to criminals too. While it’s ago, Bitcoin and other coins were
incorrect to claim that cryptocurrency the domain of those in the know.
is only or mostly used for fraudulent Today, Bitcoin’s dramatic rise and fall
or illegal purposes, it is by some, in value have made it a worldwide
nonetheless. household name, and the flourish-
ing of a number of exchanges make
There are several reasons why crimi- it easier than ever to use, especially
nals generally, and terrorists specifi- when such platforms are based in
cally, would want to use cryptocur- off-shore jurisdictions or fail to meet
rency as a payment method. minimum standards when it comes to
the contrast of money laundering and
terrorist financing.
The Online Revolution
Praiseworthy efforts are made by
At the heart of the need for crypto- national and international banks
currency is the terrorists’ need to to impede transfers of fraudulent
operate online. funds—whether that be from fraud,
tax evasion or other crimes. A terror
Today’s violent political actors still group can’t use bank accounts like we
make their statements in the real can, as records are kept, transactions
world, with attacks and kidnappings. are easily traceable and access to
This aspect of terror will likely never funds could be revoked at any time.
change.
Cash will always be the easiest form
But like in every other section of so- of currency to use. But there are
ciety, the internet has revolutionised several caveats to be aware of. Cash
how we do what we do. Through so- can be lost, stolen or destroyed; and
cial media terrorists can reach thou- in the case of local currencies, may be
sands, millions, through the power of just as volatile as cryptocurrencies.
just one post. Through creating online
content, they can broaden their reach As such, cryptocurrency is easier for
and sow the seeds of their ideology groups like these to use, encouraging
further than before. uptake.

blockchainconsultus.io
4
Terrorist Use of Cryptocurrencies

Crime and Privacy been used for this purpose in the


past. The idea is simply to use dirty
Bitcoin and other coins provide high money to buy Bitcoin, through one
levels of security when used correctly. exchange or another, and transfer it
Moreover, Bitcoin is pseudonymous. to a clean wallet.
While not completely private, your
unique address is publicly available— Depending on the complexity of the
and any transactions from it can scheme—and the amount of money
be tracked. However, the identities involved—there are then two ways to
behind these accounts aren’t revealed get the money back.
unless the person identifies them- The first is to simply withdraw it from
selves, for example by asking publicly the new account, relying on the ‘priva-
for donations. cy’ of cryptocurrency. This brute force
method is ineffective, as the trans-
Meanwhile, terror groups rely on action between the two wallets can
privacy. As a terrorist purchasing be easily discovered, hence why this
bomb-making equipment and sup- method isn’t used by most criminals.
plies for an attack, it’s vital that your
movements and actions aren’t traced. The more effective method is to keep
While there is no evidence as of yet the money in the clean wallet, gradu-
that cryptocurrencies have been used ally ‘sipping’ it from that account to
in this way, it’s clear that they could yet another. This method is better
be. since relatively minor transactions
over a longer period of time are less
noticeable. This was the method used
Cryptocurrencies Can Be by the cyberterrorists behind the May
Laundered 2017 worldwide cyberattack by the
WannaCry ransomware cryptoworm,
As it disguises ill-gotten funds, mak- and similar criminal acts.
ing them appear legitimate, money
laundering is of central importance to Better yet for a criminal is a tumbler
any criminal operation. To simply put service. Accessible through the deep
one’s fraudulent proceeds into a bank web, these third-party services mix
account would be to raise suspicion; your coins with those of others, be-
and to carry around ever-increasing fore transferring yours on to a third
amounts of cash would be unwise. account, in varying small amounts.
While these transactions are still
Bitcoin and other currencies have recorded in the blockchain, it’s impos-

blockchainconsultus.io
5
Terrorist Use of Cryptocurrencies

sible to tell whose money is whose— these issues. They allow you to send
dirty money is made clean. money internationally without making
your identity known to anybody. Pro-
vided that the person or group uses a
International Reach pseudonym on an exchange, and the
transaction wasn’t publicly solicited,
Terror groups have relied on for- then their identity isn’t public.
eign funding for years. The IRA, for
example, was funded by Irish herit-
age associations in the U.S. from the Shifting Model of Terrorist
early 20th century onwards. ISIS and Funding
similar groups are funded by dona-
tions, too, whether from the Syrian or Besides these advantages, the way
Iraqi diaspora or from sympathisers that terrorists raise funds is changing.
in other countries, in the region or far Groups intent on violent political ac-
from it. tion have historically been funded by
government sources—foreign govern-
The issue with sending payments ments, that is. Hezbollah were trained
internationally is that they are easily and funded by Iran’s Islamic Revolu-
traceable. There is no way to anony- tionary Guard Corps. Iran have also
mously send a payment through a been accused of funding Shia militias
bank, for example. Even global mon- in Iraq.
ey transfer companies often involved
in scams, like Western Union, require But state-sponsored terrorism is
your identity before they send your far from the only kind. Other terror
money onwards. groups rely almost exclusively on
donations. Al-Qaeda was formed in
Shipping physical cash internationally 1988, and bankrolled by Osama bin
is anonymous. But the risks involved Laden. But with increased exposure
are too great—at any point between on the world stage, they grew to rely
the sender and the recipient, the on donations to keep afloat. The CIA
package could go missing, or customs estimated that prior to the 9/11 at-
authorities could confiscate it; in oth- tacks, al-Qaeda had an annual budget
er words, there’s more than a chance of $30 million, and that the majority
that the cash inside never reaches its of this was brought in through dona-
destination. tion.
Cryptocurrencies neatly sidestep ISIS, too, diversified the way that they

blockchainconsultus.io
6
Terrorist Use of Cryptocurrencies

received funds. While they did receive


cash from sympathetic regimes near-
by, that wasn’t the sole source of their
income. They used theft, kidnapping,
extortion and more to raise money.
Soliciting donations, either online or
off, is just one piece of the puzzle.

But every little helps, after all. And


even more importantly, terrorists are
increasingly taking their fight online.

blockchainconsultus.io
7
Terrorist Use of Cryptocurrencies

Terrorism
and the Online Age

Terrorists seek change in the real terror groups rely on propaganda—


world, yet today, need to spread their but unlike the posters, murals and
message online. This dichotomy cre- signs that historical terror groups
ates a dual demand: a terrorist needs used, today’s groups spread their
secure funds for online transactions, message online.
and cash for everyday expenses.
This change is necessitated because
First and foremost, a terror organisa- increasingly, terror groups have failed
tion needs to fund its physical ac- to instigate actual political change.
tions. The logistical needs of a terror But what they have succeeded in
group are just as real as those of doing is encouraging others to their
a business. Funds are required for cause, both in their host countries
transport: cars, motorbikes and pet- and abroad.
rol. Bomb-making equipment, and
the ingredients of each bomb, cost Al-Qaeda were the first to do so. They
money. gained not just notoriety for their
propaganda, but a following too. The
Besides that, there are the basic costs idea of proselytising online fits with
of food, shelter and general supplies. their mission, as al-Qaeda view them-
As of yet, there is no evidence that selves as a global movement, one
terror groups use cryptocurrencies to which relies on a global communica-
meet these needs. Cash is still king: tions network to function. Their goal
in the former territories of ISIS, for is not just to spread ‘terror’, but to
example, the group attempted to cre- spread their message to the world-
ate their own currency. The only thing wide Muslim diaspora.
that stopped them was that people
preferred to do their business in sta- More recently, ISIS became famous
ble U.S. dollars. for their violent and horrific propa-
ganda. The idea grew beyond simply
But while terror groups do much the ‘spreading a message’, and became
same things in the real world as they about recruitment. ISIS’ videos were
always have—bombing, extortion and responsible for drawing in fighters
kidnap—spreading the message on- from across the world, from Indone-
line has become a core part of mod- sia to the United Kingdom.
ern terrorism.
All of this is to say that terror is as
much an online phenomenon as
Terrorism and Social a physical one. And thinking more
Propaganda: the Context broadly, some ‘terror groups’ ex-
ist solely online—Russian bot farms
Modern terror has evolved. Today’s and Chinese-government sponsored
hacking teams, for example, push the

blockchainconsultus.io
8
Terrorist Use of Cryptocurrencies

boundaries of the answer to what is a


terrorist?

Why Cryptocurrency?
To be clear, there’s no absolute need
to use cryptocurrency in order to
do so. Anybody with an account can
spread their message on Facebook or
Twitter, and receive many followers.
However, there are suggestions that
terror groups use cryptocurrencies to
purchase website domains, for exam-
ple.

In the same way, one could ask why


social media? While it is possible for
terror groups to reach like-minded
people through real-world means,
their use of social media is more
broadly dictated by the general trend
towards it. More people use social
media, more people use cryptocur-
rency, and more people spread politi-
cal messages online—on both sides
of the spectrum.

Overall, the use of cryptocurrencies


should be seen as part of a general
shift towards online terrorism.

Given that this is happening, one


would expect to see a slow but steady
uptake of cryptocurrency and money
laundering methods among terror-
ists—and that was exactly what we
saw.

blockchainconsultus.io
9
Terrorist Use of Cryptocurrencies

Examples of
Cryptocurrency’s
Use in Terrorism

Terrorist funding is an important wolves by financially backing


topic—one which receives a large them.
amount of media and government • Large groups that hold terri-
attention. As such, we can state with tory, ISIS being the primary ex-
reasonable certainty the extent to ample. These groups manage
which terror groups actually use cryp- large amount of land, and large
tocurrency. amounts of money. Cryptocurren-
cy could be an easy way to do so.

Risk Factors: Who Might Use But how do these risks bear out in
Cryptocurrencies? reality? Have terrorist groups actually
taken up cryptocurrency, or have we
Modern terror is decentralised. While yet to see them make full use of it?
large groups still exist, most networks The truth is a lot more piecemeal and
are spread thinly—with one or two haphazard than you might imagine.
leaders forming a web of sorts, and
their individual followers spread out
across the country. Cryptocurrency Origins
could be used at any of these levels.
Perhaps the first example of cryp-
Risk factors with regards to cryptocur- tocurrency funding terrorists was in
rency include: the Gaza Strip—and was unrelated
to ISIS. The group involved was the
• Lone wolf attackers. At the lowest Mujahideen Shura Council (MSC),
level, these actors typically only founded in 2012.
have one or two connections with
a terror group, and solely online. The organisation has used both im-
These attackers can use cryptocur- provised explosive devices (IEDs) and
rency to securely buy terror sup- rocket attacks against Israel since
plies. then, and had an effective social me-
• Small terror cells located away dia presence until their account was
from the main group. These cells closed by Facebook.
aim to recruit on a local level,
while maintaining links with the The Ibn Taymiyyah Media Center,
larger group in their host country. or ITMC, is their propaganda unit.
The group could either receive It seeks first to raise donations, but
cryptocurrencies securely from also to raise awareness of what the
the central group, or assist lone MSC does and how. Their Facebook

blockchainconsultus.io
11
Terrorist Use of Cryptocurrencies

account was closed, and their Twitter Spread


accounts are inactive as of 2019. They
released dozens of videos in 2016 Malhama Tactical, private contractors
and prior. that trained Syrian fighters, was one
of the next groups to raise funds on
Many of their videos and posts are Twitter. A small group, their empha-
instructional. One from May 2016 sis is on training rather than fight-
shows how to make ricin, a deadly ing: they run what they call a ‘virtual
poison, and suggested several ways university’ for battlefield operations.
to use it. But more to the point in July They published their videos online
2015, they set up a fundraising social and shared them directly with follow-
media campaign on Telegram. ers through social media.
The campaign was named ‘Jahezona’, Their channels on Facebook, Twitter,
meaning ‘Equip Us’, and the aim was Telegram, VK.com and YouTube are
to raise $2500 per jihadist fighter. popular—and the group sought to
Their slogan was ‘from you money, leverage their popularity with a dona-
and from us our blood’, making clear tion drive.
that they relied on the donations of
people as opposed to government Again, the campaign was ineffective—
sources. they raised less than $100.
Their adverts contained a QR code to But that hasn’t put them off. Accord-
make donating Bitcoin easy, along ing to Memri Cyber & Jihad Lab, the
with the message ‘Donate to the mu- group are still active online, and are
jahideen’. still posting videos asking for dona-
tions. One of their more recent vide-
This was perhaps the first instance of os, from 2019, shows the group train-
a terrorist group using such means ing, firing guns, manoeuvring through
to raise money. In total, they received a forest in tactical gear.
around $540-worth of Bitcoin in total.
These transactions were publicly vis- The video ends with a plea: ‘Support
ible on the blockchain. However, it Us’, and a Bitcoin address.
was less the success of the individual
campaign and more what it heralded It’s unclear as of yet how much the
that was important. group are making with each video;
but whatever the case, it appears that
the group take an ‘every little helps’

blockchainconsultus.io
12
Terrorist Use of Cryptocurrencies

approach. • Donations or material support


from the fighters that travelled to
join them.
Flourishing
Much of ISIS financial strength came
Most peoples’ conception of modern from their control of oil wells. Accord-
terrorism is based on ISIS, and it is ing to an FATF Report, ISIS sold crude
abundantly clear that ISIS utilised so- oil for cash at significantly discounted
cial media and propaganda to further prices. But even at low prices—$20-35
their reach. One might, therefore, per barrel, far under the $60-100
assume that they, too, sought to raise average for the time—the group
money online through cryptocur- were able to fund their activities. The
rency. best estimate is that they would sell
50,000 barrels per day at these prices.
ISIS are unique. By force, they sought
not just to remove a government, As is clear, this is a far more lucra-
but to take land for themselves—and tive operation than raising money
become a state. To do so requires far through social media. Only 5% of ISIS’
more than a campaign or two that budget relied on outside donations,
raises $100, or $540. Rather, they both through social media and other-
had their eyes on larger prizes which wise. Rather, they operated almost as
could only be gained through captur- a government, albeit through fraud:
ing and keeping territory. Their fund- local cells in Iraq and Syria were re-
ing sources included: quired to send 20% of their income
on to regional leadership groups.
• Proceeds made, or more accu- These funds were then redistributed
rately stolen, from their occupied wherever they were needed.
territory. This includes funds taken
from banks, money made from oil
reserves, taxation and extortion.
This was the main source of ISIS’
financial strength.
• Kidnapping and ransom.
• Donations originating from Saudi
Arabia and the Gulf states, either
from supporters of ISIS or under
the guise of supposed humanitar-
ian aid.

blockchainconsultus.io
13
Terrorist Use of Cryptocurrencies

Did ISIS Use Bitcoin and


Other Cryptocurrencies?

Bitcoin and other cryptocurrencies purchasing terror supplies like bomb-


were used to fund ISIS—to an extent. making kits is thin. However, there
And interestingly, the money wasn’t are suggestions. In 2018, a pro-Islam-
always sent directly online; Bitcoin ic State tech group published a Q&A
and other coins were used in several on social media on several topics.
ways. Here’s how. One of the questions that a follower
asked pertained to using Bitcoin for
online purchases—ones that they
Cryptocurrency would prefer authorities not to track.
Money-Laundering
The group answered that while Bit-
In 2017, a woman was indicted for coin has a ‘high level’ of secrecy,
attempting to send ISIS financial sup- it doesn’t guarantee anonymity.
port through Bitcoin and other cur- Instead, the group recommended
rencies. She fraudulently obtained Zcash—a digital currency that uses
credit cards, using them to purchase cryptography to ensure transactions
cryptocurrency online, totalling more remain private.
than $50,000. Some of the funds were
also generated through a fraudulently This isn’t evidence in itself of terror-
obtained loan. ists using cryptocurrency; but it does
suggest that lone wolf attackers are at
However, she didn’t then send the least encouraged to try it.
money directly. Converting the cash
into cryptocurrency was a money
laundering operation, as she then Direct Donations
withdrew the money and attempted
to send it via four banks—American The evidence of direct donations, too,
Express Bank, Chase Bank, Discover is thin. In 2018, Europol, the Euro-
Bank and TD Bank. The money was pean Union Agency for Law Enforce-
wired successfully to shell companies ment Cooperation, released a report
in Pakistan, China and Turkey. indicating that ISIS had received small
donations through Zcash and Bitcoin.
It was only when the woman attempt- In their report, they state that they
ed to travel to Syria and join ISIS in had requested donations in both cur-
person that she was stopped, and her rencies.
scam identified.
However, the use of these funds was
limited. Rather than directly fund
Direct Purchases terrorist action, the donations were
supposedly used to purchase web-
Evidence for the use of Bitcoin in site domains. The report also sought

blockchainconsultus.io
14
Terrorist Use of Cryptocurrencies

to clarify that ISIS had not directly


funded individual terrorist attacks in
Europe using cryptocurrency. Did Cryptocurrency Use
Rather than being a cornerstone of Merit Media Attention?
their strategy, it seems that crypto-
currency was a useful but limited tool The cases summarised in this
that the group could use on occasion. chapter, in and of themselves,
are interesting. But they hardly
merited the media attention they
received.

In part, this was due to the flour-


ishing of crypto as a medium. As
Bitcoin’s value soared, the main-
stream media fell in love—in part
because of the incredible returns
that some people saw, as well as
its novelty. The added dimension
of cryptocurrency being used to
fund crime and terror only in-
creased its media profile.

But in terms of actual document-


ed use in funding terror, crypto-
currency was a very small part of
the puzzle. ISIS found only a very
small fraction of their funding
in cryptocurrencies, both before
and after their explosion in value.

More than anything, that was


due to the very real limitations of
cryptocurrency.

blockchainconsultus.io
15
Terrorist Use of Cryptocurrencies

The Limitations of
Cryptocurrency

Despite much fanfare over terrorist with cash often in areas with weak
organisations using novel means of technology infrastructure.”
acquiring funding, uptake is still lim-
ited. In part, this is a reflection of the The Middle East’s data network cov-
generally still limited scope of crypto- erage isn’t as complete or as fast as
currencies, even after Bitcoin shot to that in the West. And even where it
fame. But it’s also due to the nature may have been—for example in large
of cryptocurrency, as an online, tech- cities—this infrastructure is itself one
heavy and volatile way of sending or of the first targets for terrorists. For
receiving funds. groups operating out of rural areas,
the situation is even more difficult.
So, what are the limitations of crypto- Cash and bank transfers offer no
currencies? And for what reasons do such limitations.
they discourage terrorist groups?

Lack of Security Skills and


Lack of Technological Knowledge Among Terrorists
Infrastructure in Third-World
Countries Cryptocurrency and blockchain might
appear complicated. Blockchain
On 7th September 2018, the U.S. especially is opaque to a newcomer,
Subcommittee on Terrorism and Illicit so despite being a real and concrete
Finance met to discuss how modern idea, the term is increasingly used
terror groups find funding. Attack as jargon—diluting its meaning. For
their funding, they claimed, and you anybody interested in learning about
attack the terror groups by proxy. As cryptocurrencies, coming to under-
such, identifying their funding sourc- stand the blockchain is therefore
es is of vital importance to security. without a doubt the most complicat-
ed part.
The Subcommittee admitted that
many reports had emerged on the This hinders how a terrorist group
terrorist use of crypto platforms. can use cryptocurrency. While it
However, they sought to clarify that might work for small ad campaigns,
there were still limitations on the good for a few hundred dollars, the
adoption of alternative currencies. steep learning curve means that man-
Chief among these was the technol- aging more money over a longer time
ogy available to terrorists in certain is too difficult.
parts of the world. To quote the Sub-
committee, cryptocurrency is a “poor Even worse, Bitcoin can still be stolen,
form of money for jihadists because either through fraud or through copy-
they usually need to purchase goods ing the key to your wallet. Any group

blockchainconsultus.io
16
Terrorist Use of Cryptocurrencies

intent on keeping most of their mon- damaged, or the group may have to
ey in Bitcoin would become aware of abandon them.
this issue, and could therefore decide
against it. This also prevents terrorists from
being able to mine coins. A terror
There’s no such learning curve related group’s hideout is likely to be raided
to the use of cash or electronic mon- or destroyed, and given that mining
ey bank transfers. While these meth- operations are exceptionally expen-
ods of acquiring funding have their sive since Bitcoin’s boom, this kind of
drawbacks too, they’re at least easy to investment is unappealing to groups
understand. And while online security like these—even if they can access
is difficult to maintain, keeping cash the required tech.
securely is simple too, provided that
you have access to weapons.

Cryptocurrency Volatility
Lack of Access to Required Whatever your opinion on investing,
Tech it’s true that cryptocurrency has a
reputation for volatility. Price fluc-
Without technology, there’s no cryp- tuations, both up and down, make it
tocurrency. Without access to tech- equal parts attractive and dangerous.
nology, there’s no access to your Whatever organisation you look to
wallet. As noted above, many areas fund, be they legal or not, they will
where terrorists operate lack the in- need a steady and secure form of in-
frastructure necessary to support an come. Cryptocurrency doesn’t fit that
always-online means of funding. bill as of yet.

A terrorist group may also lack access As such, asking for donations in
to the necessary technology itself. Bitcoin or another cryptocurrency
While it is possible to manage crypto- may be a good idea for short-term
currency on a smartphone, the lack campaigns. It allows terror groups
of consistent network signal makes to reach more people, and leverage
doing so difficult; but at the same their online following. But as a long-
time, consistent access to a desktop term solution to funding, it makes a
or laptop computer isn’t a given. And poor choice.
even if a group does have access to
actual computers, they may become Consider the needs of a large group

blockchainconsultus.io
17
Terrorist Use of Cryptocurrencies

like ISIS. On the one hand, they do for a terrorist group. Movements of
need to fund lone wolves working money can be tracked when dona-
abroad—cryptocurrency allows them tions are solicited through public
to do that. But in terms of money advertisements. This allows law en-
management, ISIS’ budget stretched forcement officers to identify the wal-
into the millions or perhaps billions, let belonging to that particular group.
and dollars or gold are preferable be- They can then track the amount of
cause of their stability for such large money they receive, and when they
amounts of money. spend it. This information could be
used to predict upcoming terror
threats.
The Blockchain
Furthermore, through tracking the
While deposits to a wallet are anony- payments made from the terrorists’
mous, the technology behind Bitcoin wallet, investigators could incrimi-
and other cryptocurrencies is none- nate the wallets they regularly send
theless disruptive. The blockchain is payments to. If the security services
public, and while the founding ideal have identified a number of groups’
behind cryptocurrencies is their ano- addresses, they could unearth previ-
nymity, it is possible to figure out who ously unknown links between terror-
a wallet belongs to. ist groups.

It’s already being done. Private com-


panies like Chainalysis use proprie- Difficulties Withdrawing
tary blockchain analysis software and Money
public clues to identify the people
behind wallets involved in fraud or Crypto can be used for various online
other criminal behaviours. applications, but ultimately, terror-
ists are interested in enacting political
The most famous use of their soft- change in the real world by violence.
ware was related to a court case, in To do so, they need to work with cash
which they helped the FBI discover or bank funds.
the identities of two fraudsters. The
pair had been stealing Bitcoins from Cryptocurrency is still useful for
the wallet of a Silk Road drug dealer. online transactions. But to buy weap-
Another company, CipherTrace, does ons, supplies, food and everyday
much the same work as Chainalysis. items they still need cash. Withdraw-
This presents an important problem ing Bitcoin from an exchange leaves

blockchainconsultus.io
18
Terrorist Use of Cryptocurrencies

traces, which terrorist groups natu- cryptocurrency. It’s that any terror-
rally seek to avoid. And withdrawing ist group can make far more money
through peer-to-peer leaves them through alternative means. ISIS, as we
open to fraud. saw above, sought funds through a
variety of manners.
Whatever the case, turning cryptocur-
rency into cash is much more difficult But whatever donations they may or
than using regular currency. may not receive, nothing came close
to the money they made from com-
modities.
The Heat
Their stranglehold on the region’s
Besides each of these reasons, one oil production was the driver behind
far more simple limits the use of cryp- their success. The Washington Post
tocurrency by terrorists: the weather. estimated that ISIS were generating
While the media were happy to drum $20 million per month from oil alone.
up reports that ISIS had taken small Aside from oil, ISIS requisitioned cash
donations in Bitcoin, it would have and gold from banks in occupied
been difficult-to-impossible for them regions.
to actually mine cryptocurrencies.
According to the U.K.-based Syr-
Put simply, the region is too hot. ian Observatory for Human Rights
Mining cryptocurrencies to a mean- (SOHR), ISIS reportedly hoarded 40
ingful extent requires a large volume tonnes of gold bars in Syria. These
of high-quality equipment, but that’s had mostly been stolen from the
not all that’s needed. To mine effec- Bank of Mosul, but there were many
tively requires cooling systems, as the more banks besides in occupied re-
necessary hardware quickly heats up. gions.
Keeping that hardware cool is difficult
enough in a regular environment; in Once Mosul was recaptured, 50
hotter parts of the world, it’s practi- tonnes—ten tonnes more than esti-
cally impossible. mated—were found by U.S. forces. In
context, the bars were worth at least
But none of these are the most im- $2.1 billion in total. The U.S. suppos-
portant reason why terrorists don’t edly cut a deal with the terror group,
use cryptocurrency. There’s one such that hundreds of field leaders
key-reason that terrorists have yet to were allowed safe passage from their
rely on Bitcoin, or any other form of stronghold in Deir Ezzor, in exchange

blockchainconsultus.io
19
Terrorist Use of Cryptocurrencies

for information on where the gold


was hidden.
Political games aside, one thing is
clear from this episode. What little
donations ISIS could have taken were
dwarfed by many orders of magni-
tude by what the group made from
theft alone.

blockchainconsultus.io
20
Providing Pan-European
Legal, Compliance and
Strategy Advice
on Blockchain Projects

Your goals + Our expertise + Where you are + Where you want to be + Getting you there

Legal & There are Blockchain consulting companies.


Compliance
And there’s Blockchain ConsultUs!
> Selection of the jurisdiction
of the company We are a boutique consulting firm who specialises in
> Company formation helping blockchain and decentralised ledger technology
> Preparation of compliance
measures projects/organisations keep compliant and reach their
> Drafting of documents for the goals in an ever-changing digital landscape.
AML/KYC procedures
> Elaboration of the optimal legal
concept of tokens We assist companies across the European continent, so
> Privacy and GDPR if you run or have in mind a Blockchain-related project,
> Preparation of agreements with
investors and user agreements we can help you. Wherever you are based.
> Dealing with competent
regulatory authority and
self-regulatory organisations Our team of specialists use their legal, compliance, tax,
> Opening of accounts with banks and strategic knowledge to better assist you in the
and payment institutions
> Escrow services
management of complex projects every step of the way.

Strategy
Consultus (/kon’sul.tus/).
> Investor relations Perfect passive participle of cōnsulō:
> Business planning
> Road mapping to find the right
“I consult, reflect, take counsel,
go-to-market partnerships consider, or deliberate”
> Marketing and PR in the
crypto industry
> Risk assessment and
sustainability analysis
> Brand creation

Technology Blockchain ConsultUs Ltd. blockchainconsultus.io


Kemp House, 160 High Road
London EC1V 2NX, England linkedin.com/company/blockchain-consultus
contact@blockchainconsultus.io t.me/blockchaincompliance
> ICO/STO/crowdsale ready-made +44 (0)20 8798 0253
platforms
> Recruiting of technical specialists
> Drafting of technical tasks Business Meetings in Lugano (CH), Frankfurt (DE), Tallinn (EE), Amsterdam (NL), Milan (IT)
Disclaimers and Copyright Statement.
No reproduction or translation of this
publication may be made without prior
written permission. Applications for
such permission, for all or part of this
publication, should be made to:

Blockchain ConsultUs Ltd.


Kemp House, 160 High Road
London EC1V 2NX, England.
bulletin@blockchainconsultus.io

For further information,


please contact:
bulletin@blockchainconsultus.io

You might also like