Five myths about cryptoterrorism
understanding trends and modus operandi of terrorism financing through cryptoassets
DOI:
https://doi.org/10.5752/P.1809-6182.2024v21n1p51-68Palavras-chave:
Cryptocurrency, Crypto terrorism, Terrorism financingResumo
Cryptocurrencies have emerged as a potential tool for terrorism financing, presenting new challenges in the fight against extremism. This article explores five prevalent myths surrounding crypto terrorism to provide a clearer understanding of how terrorists exploit digital assets. While there is evidence of terrorist groups using cryptocurrencies, such as Da'esh (ISIL) and Al-Qaida affiliates in Syria and Asia, the adoption of cryptoassets for terrorism financing remains limited compared to traditional methods. Estimates suggest that only a small portion of the illicit crypto asset ecosystem is used for terrorism financing, with the share of all crypto transaction volumes associated with illicit activity remaining at 0.34% in 2023. Despite media reports claiming that terror groups have raised over $130 million in cryptocurrencies, blockchain analysis companies contest these figures. The article emphasizes the importance of criminalizing the misuse of cryptoassets rather than the assets themselves, as they can be exploited in the same way as the official financial system. While advancements in AI and blockchain analysis have provided more precise information on terrorist use of cryptoassets, the data is retrospective and subject to change as more attributions are made in future investigations.
Downloads
Referências
CHAINANALYSIS. 2020. Terrorism Financing in Early Stages with Cryptocurrency But Advancing
Quickly. Available at https://www.chainalysis.com/blog/terrorism-financing-cryptocurrency-
2019/ accessed 5/Aug/2024.
CHAINANALYSIS. 2023a. Correcting the Record: Inaccurate Methodologies for Estimating
Cryptocurrency’s Role in Terrorism Financing. Available at
https://www.chainalysis.com/blog/cryptocurrency-terrorism-financing-accuracy-check/
accessed in 5/Aug/2024.
CHAINANALYSIS. 2023b. Hamas’ Al-Qassam Brigades Announces End of Cryptocurrency
Donation Efforts. Available at https://www.chainalysis.com/blog/hamas-al-qassam-brigades-
cryptocurrency-donations-shutdown/ accessed 5/Aug/2023.
CHAINANALYSIS 2024. The 2024 Crypto Crime Report: The latest trends in ransomware, scams,
hacking, and more. Chainanalysis: S.l..
CTED 2024. CTED hosts Insight Briefing on “Latest trends in the use of cryptocurrency by
terrorist groups and their supporters”. Security Council Counter-Terrorism Committee, Counter-
Terrorism Committee Executive Directorate: New York. Available at
https://www.un.org/securitycouncil/ctc/news/cted-hosts-insight-briefing-%E2%80%9Clatest-
trends-use-cryptocurrency-terrorist-groups-and-their accessed 5/Aug/2023.
DA’ESH. S.d. Jihad with Wealth. Voice of Khurasan. Islamic State Khurasan Province: s.l..
DoT 2024. Illicit Finance Risk Assessment of Non-Fungible Tokens. US Department of Treasure:
Washington.
FATF. 2015. Emerging Terrorist Financing Risks. Financial Action Task Force: Paris.
FATF. 2021. Updated Guidance for a Risk-Based Approach: Virtual Assets and Virtual Asset
Service Providers. Financial Action Task Force: Paris.
HOWCROFT, E.; WILSON, T.. 2023. Tether Freezes Crypto Linked To 'Terrorism and Warfare' in
Israel and Ukraine. Reuters, October 17, 2023. Available at
https://www.reuters.com/technology/tether-freezes-873000-crypto-linked-terrorism-warfare-
israel-ukraine-2023-10-16/#:~:text=Press%20Releases-
,Tether%20freezes%20crypto%20linked%20to%20'terrorism,warfare'%20in%20Israel%20and%
20Ukraine&text=LONDON%2C%20Oct%2016%20(Reuters),the%20company%20said%20on%20
Monday Accessed 5/Aug/2024.
LASMAR, Jorge M. 2019. As Dinâmicas Financeiras do Terrorismo in FAGUNDES, C.F.F.; LASMAR,
J.M.; CHUY, J. F. M. “Perspectivas do Terrorismo Contemporâneo”. Arraes: Belo Horizonte.
NCoTA. 2024. The 9/11 Commission Report. The National Commission on Terrorist Attacks:
Washington.
NOCERA, Joe; LIVNI, Ephrat. 2023. Is Crypto Financing Terrorism? In The New York Times, 28
October, 2023. Avaliable at https://www.nytimes.com/2023/10/28/business/dealbook/is-
crypto-financing-terrorism.html accessed 5/Aug/2024.
OFAC. 2023. Counter Terrorism Designations: Specially Designated National List Update,
10/18/2023. U.S. Department of The Treasury, Office of Foreign Assets Control: Washington.
Available at https://ofac.treasury.gov/recent-actions/20231018 accessed 5/Aug/2024.
PHILLIPS, Daniel. 2023. How can Cryptocurrencies be Frozen on a Blockchain? Crypto Basics.
Available at https://coinmarketcap.com/academy/article/how-can-cryptocurrencies-be-frozen-
on-a-blockchain accessed in 5/Aug/2024.
SHARMA, Toshendra K. 2024. Security Tokens Vs. Utility Tokens: A Concise Guide. Blockchain
Council. Available at https://www.blockchain-council.org/blockchain/security-tokens-vs-utility-
tokens-a-concise-guide/ accessed in 5/Aug/2024.
TRM. 2022. New Evidence Confirms ISIS Affiliate in Afghanistan Accepting Cryptocurrency
Donations. TRM Labs. Available at https://www.trmlabs.com/post/new-evidence-confirms-isis-
affiliate-in-afghanistan-accepting-cryptocurrency-donations accessed in 5/Aug/2024.
TRM. 2023. Illicit Crypto Ecosystem Report. TRM Labs.
TRM. 2024. Detecting the Invisible: The Power of TRM Labs' Signatures™ in Blockchain
Investigations. TRM Labs.
Downloads
Publicado
Versões
- 2025-04-02 (3)
- 2025-03-23 (2)
- 2025-03-15 (1)
Como Citar
Edição
Seção
Licença
Autores que publicam nesta revista concordam com os seguintes termos:
1. Autores mantém os direitos autorais e concedem à revista o direito de primeira publicação, com o trabalho simultaneamente licenciado sob a Licença Creative Commons Attribution que permite o compartilhamento do trabalho com reconhecimento da autoria e publicação inicial nesta revista.
2.Autores têm autorização para assumir contratos adicionais separadamente, para distribuição não-exclusiva da versão do trabalho publicada nesta revista (ex.: publicar em repositório institucional ou como capítulo de livro), com reconhecimento de autoria e publicação inicial nesta revista.
3.Autores têm permissão e são estimulados a publicar e distribuir seu trabalho online (ex.: em repositórios institucionais ou na sua página pessoal) a qualquer ponto antes ou durante o processo editorial, já que isso pode gerar alterações produtivas, bem como aumentar o impacto e a citação do trabalho publicado (Veja O Efeito do Acesso Livre).