FIVE MYTHS ABOUT CRYPTOTERRORSIM
UNDERSTANDING TRENDS AND MODUS OPERANDI OF TERRORISM FINANCING THROUGH CRYPTOASSETS
DOI:
https://doi.org/10.5752/P.1809-6182.2024v21n1p51-68Keywords:
Crypto assets;, Cryptocurrency;, Crypto terrorism;, Terrorism financing;, TerrorismAbstract
Cryptocurrencies have emerged as a potential tool for terrorism financing, presenting new challenges in the fight against extremism. This article explores five prevalent myths surrounding crypto terrorism to provide a clearer understanding of how terrorists exploit digital assets. While there is evidence of terrorist groups using cryptocurrencies, such as Da'esh (ISIL) and Al-Qaida affiliates in Syria and Asia, the adoption of cryptoassets for terrorism financing remains limited compared to traditional methods. Estimates suggest that only a small portion of the illicit crypto asset ecosystem is used for terrorism financing, with the share of all crypto transaction volumes associated with illicit activity remaining at 0.34% in 2023. Despite media reports claiming that terror groups have raised over $130 million in cryptocurrencies, blockchain analysis companies contest these figures. The article emphasizes the importance of criminalizing the misuse of cryptoassets rather than the assets themselves, as they can be exploited in the same way as the official financial system. While advancements in AI and blockchain analysis have provided more precise information on terrorist use of cryptoassets, the data is retrospective and subject to change as more attributions are made in future investigations.
Downloads
References
Quickly. Available at https://www.chainalysis.com/blog/terrorism-financing-cryptocurrency-
2019/ accessed 5/Aug/2024.
CHAINANALYSIS. 2023a. Correcting the Record: Inaccurate Methodologies for Estimating
Cryptocurrency’s Role in Terrorism Financing. Available at
https://www.chainalysis.com/blog/cryptocurrency-terrorism-financing-accuracy-check/
accessed in 5/Aug/2024.
CHAINANALYSIS. 2023b. Hamas’ Al-Qassam Brigades Announces End of Cryptocurrency
Donation Efforts. Available at https://www.chainalysis.com/blog/hamas-al-qassam-brigades-
cryptocurrency-donations-shutdown/ accessed 5/Aug/2023.
CHAINANALYSIS 2024. The 2024 Crypto Crime Report: The latest trends in ransomware, scams,
hacking, and more. Chainanalysis: S.l..
CTED 2024. CTED hosts Insight Briefing on “Latest trends in the use of cryptocurrency by
terrorist groups and their supporters”. Security Council Counter-Terrorism Committee, Counter-
Terrorism Committee Executive Directorate: New York. Available at
https://www.un.org/securitycouncil/ctc/news/cted-hosts-insight-briefing-%E2%80%9Clatest-
trends-use-cryptocurrency-terrorist-groups-and-their accessed 5/Aug/2023.
DA’ESH. S.d. Jihad with Wealth. Voice of Khurasan. Islamic State Khurasan Province: s.l..
DoT 2024. Illicit Finance Risk Assessment of Non-Fungible Tokens. US Department of Treasure:
Washington.
FATF. 2015. Emerging Terrorist Financing Risks. Financial Action Task Force: Paris.
FATF. 2021. Updated Guidance for a Risk-Based Approach: Virtual Assets and Virtual Asset
Service Providers. Financial Action Task Force: Paris.
HOWCROFT, E.; WILSON, T.. 2023. Tether Freezes Crypto Linked To 'Terrorism and Warfare' in
Israel and Ukraine. Reuters, October 17, 2023. Available at
https://www.reuters.com/technology/tether-freezes-873000-crypto-linked-terrorism-warfare-
israel-ukraine-2023-10-16/#:~:text=Press%20Releases-
,Tether%20freezes%20crypto%20linked%20to%20'terrorism,warfare'%20in%20Israel%20and%
20Ukraine&text=LONDON%2C%20Oct%2016%20(Reuters),the%20company%20said%20on%20
Monday Accessed 5/Aug/2024.
LASMAR, Jorge M. 2019. As Dinâmicas Financeiras do Terrorismo in FAGUNDES, C.F.F.; LASMAR,
J.M.; CHUY, J. F. M. “Perspectivas do Terrorismo Contemporâneo”. Arraes: Belo Horizonte.
NCoTA. 2024. The 9/11 Commission Report. The National Commission on Terrorist Attacks:
Washington.
NOCERA, Joe; LIVNI, Ephrat. 2023. Is Crypto Financing Terrorism? In The New York Times, 28
October, 2023. Avaliable at https://www.nytimes.com/2023/10/28/business/dealbook/is-
crypto-financing-terrorism.html accessed 5/Aug/2024.
OFAC. 2023. Counter Terrorism Designations: Specially Designated National List Update,
10/18/2023. U.S. Department of The Treasury, Office of Foreign Assets Control: Washington.
Available at https://ofac.treasury.gov/recent-actions/20231018 accessed 5/Aug/2024.
PHILLIPS, Daniel. 2023. How can Cryptocurrencies be Frozen on a Blockchain? Crypto Basics.
Available at https://coinmarketcap.com/academy/article/how-can-cryptocurrencies-be-frozen-
on-a-blockchain accessed in 5/Aug/2024.
SHARMA, Toshendra K. 2024. Security Tokens Vs. Utility Tokens: A Concise Guide. Blockchain
Council. Available at https://www.blockchain-council.org/blockchain/security-tokens-vs-utility-
tokens-a-concise-guide/ accessed in 5/Aug/2024.
TRM. 2022. New Evidence Confirms ISIS Affiliate in Afghanistan Accepting Cryptocurrency
Donations. TRM Labs. Available at https://www.trmlabs.com/post/new-evidence-confirms-isis-
affiliate-in-afghanistan-accepting-cryptocurrency-donations accessed in 5/Aug/2024.
TRM. 2023. Illicit Crypto Ecosystem Report. TRM Labs.
TRM. 2024. Detecting the Invisible: The Power of TRM Labs' Signatures™ in Blockchain
Investigations. TRM Labs.
Published
Versions
- 2025-04-02 (3)
- 2025-03-23 (2)
- 2025-03-15 (1)
How to Cite
Issue
Section
License
Authors who publish with this journal agree to the following terms:
a.Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
b.Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
c.Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).