<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Between the Lines]]></title><description><![CDATA[Between the Lines decodes global conflict, illicit finance, and emerging technologies to reveal the hidden infrastructures shaping our world. Independent analysis for those who want to see beyond headlines and narratives.
]]></description><link>https://www.btl-research.com</link><image><url>https://substackcdn.com/image/fetch/$s_!-B99!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb2b8d0f-7f85-4d51-aa5d-160c09a2114e_605x605.png</url><title>Between the Lines</title><link>https://www.btl-research.com</link></image><generator>Substack</generator><lastBuildDate>Fri, 01 May 2026 11:31:35 GMT</lastBuildDate><atom:link href="https://www.btl-research.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Adam Rousselle]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[betweenthelines@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[betweenthelines@substack.com]]></itunes:email><itunes:name><![CDATA[Adam Rousselle]]></itunes:name></itunes:owner><itunes:author><![CDATA[Adam Rousselle]]></itunes:author><googleplay:owner><![CDATA[betweenthelines@substack.com]]></googleplay:owner><googleplay:email><![CDATA[betweenthelines@substack.com]]></googleplay:email><googleplay:author><![CDATA[Adam Rousselle]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[From Propaganda to Finance: My Briefing at the United Nations CTED]]></title><description><![CDATA[A summary of my latest talk at United Nations Counter-Terrorism Committee Executive Directorate (CTED)]]></description><link>https://www.btl-research.com/p/from-propaganda-to-finance-my-briefing</link><guid isPermaLink="false">https://www.btl-research.com/p/from-propaganda-to-finance-my-briefing</guid><dc:creator><![CDATA[Adam Rousselle]]></dc:creator><pubDate>Thu, 30 Apr 2026 14:19:08 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!CppS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F694e3a0e-df1d-484d-9ea8-36e82434e3c1_1490x840.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!kVKk!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0999fbb5-cba5-4aef-841d-1fd1bac761ab_700x232.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!kVKk!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0999fbb5-cba5-4aef-841d-1fd1bac761ab_700x232.png 424w, https://substackcdn.com/image/fetch/$s_!kVKk!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0999fbb5-cba5-4aef-841d-1fd1bac761ab_700x232.png 848w, https://substackcdn.com/image/fetch/$s_!kVKk!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0999fbb5-cba5-4aef-841d-1fd1bac761ab_700x232.png 1272w, https://substackcdn.com/image/fetch/$s_!kVKk!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0999fbb5-cba5-4aef-841d-1fd1bac761ab_700x232.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!kVKk!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0999fbb5-cba5-4aef-841d-1fd1bac761ab_700x232.png" width="700" height="232" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0999fbb5-cba5-4aef-841d-1fd1bac761ab_700x232.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:232,&quot;width&quot;:700,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:54322,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.btl-research.com/i/195993729?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0999fbb5-cba5-4aef-841d-1fd1bac761ab_700x232.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!kVKk!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0999fbb5-cba5-4aef-841d-1fd1bac761ab_700x232.png 424w, https://substackcdn.com/image/fetch/$s_!kVKk!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0999fbb5-cba5-4aef-841d-1fd1bac761ab_700x232.png 848w, https://substackcdn.com/image/fetch/$s_!kVKk!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0999fbb5-cba5-4aef-841d-1fd1bac761ab_700x232.png 1272w, https://substackcdn.com/image/fetch/$s_!kVKk!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0999fbb5-cba5-4aef-841d-1fd1bac761ab_700x232.png 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a></figure></div><p><a href="https://www.un.org/securitycouncil/ctc/news/cted-hosts-insight-briefing-how-propaganda-ecosystems-enable-terrorist-financing">Press briefing</a></p><p>On April 22, I delivered an Insight Briefing to the United Nations Counter-Terrorism Committee Executive Directorate (CTED) on something I&#8217;ve been developing for a while: the idea that propaganda ecosystems don&#8217;t just spread ideology, but function as <a href="https://www.btl-research.com/p/terrorist-propaganda-as-financial">financial infrastructure</a>.</p><p>The session was titled <em>Trust Networks and Parallel Financial Systems: How Propaganda Ecosystems Enable Terrorist Financing</em>. The core argument was simple, and largely overlooked. </p><p>Terrorist financing begins with trust before a single transaction occurs.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!CppS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F694e3a0e-df1d-484d-9ea8-36e82434e3c1_1490x840.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!CppS!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F694e3a0e-df1d-484d-9ea8-36e82434e3c1_1490x840.png 424w, https://substackcdn.com/image/fetch/$s_!CppS!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F694e3a0e-df1d-484d-9ea8-36e82434e3c1_1490x840.png 848w, https://substackcdn.com/image/fetch/$s_!CppS!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F694e3a0e-df1d-484d-9ea8-36e82434e3c1_1490x840.png 1272w, https://substackcdn.com/image/fetch/$s_!CppS!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F694e3a0e-df1d-484d-9ea8-36e82434e3c1_1490x840.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!CppS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F694e3a0e-df1d-484d-9ea8-36e82434e3c1_1490x840.png" width="1456" height="821" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/694e3a0e-df1d-484d-9ea8-36e82434e3c1_1490x840.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:821,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1096389,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.btl-research.com/i/195993729?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F694e3a0e-df1d-484d-9ea8-36e82434e3c1_1490x840.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!CppS!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F694e3a0e-df1d-484d-9ea8-36e82434e3c1_1490x840.png 424w, https://substackcdn.com/image/fetch/$s_!CppS!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F694e3a0e-df1d-484d-9ea8-36e82434e3c1_1490x840.png 848w, https://substackcdn.com/image/fetch/$s_!CppS!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F694e3a0e-df1d-484d-9ea8-36e82434e3c1_1490x840.png 1272w, https://substackcdn.com/image/fetch/$s_!CppS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F694e3a0e-df1d-484d-9ea8-36e82434e3c1_1490x840.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2><strong>The Missing Layer</strong></h2><p>Counter-terrorism finance has been built around transactions. Bank transfers. Crypto flows. Suspicious activity reports. Flag the movement, freeze the asset, disrupt the network.</p><p>The problem: by the time money moves, networks have already hardened into place. </p><p>Extremist propaganda ecosystems operate as trust infrastructure &#8212; authentication systems for intermediaries, coordination layers for decentralized finance. They allow geographically and ethnically dispersed actors to validate who receives money, coordinate without direct contact, and maintain financial continuity under sustained pressure.</p><p>This is why groups affiliated with the Islamic State and al-Qaeda keep functioning even when their formal financial access is systematically restricted. While transactions get disrupted, the underlying trust that makes them possible does not.</p><h2><strong>What Happens When You Apply Pressure</strong></h2><p>Most disruption frameworks assume financial systems behave like centralized structures. They don&#8217;t &#8212; and the distinction matters.</p><p>In a centralized system, authority enforces coordination. Remove a node, the system degrades. That&#8217;s the model most enforcement tools are built for.</p><p>In a distributed, trust-based system, something different happens. Apply pressure, and the network doesn&#8217;t collapse &#8212; it fragments, then reorganizes. Trusted intermediaries still exist. Validation pathways remain intact. Coordination resumes without central control.</p><p>Financial pressure produces temporary disruption, not systemic collapse. As long as the trust architecture endures, the system regenerates.</p><p>That shift &#8212; from centralized to distributed &#8212; is exactly where current disruption strategies fail.</p><h2><strong>What the Current Tools Miss</strong></h2><p>Existing frameworks are built to detect transactions, wallets, and known actors. But these are interchangeable tools. Rather, the system depends on the underlying trust layer &#8212; one that is mostly invisible to transaction-based detection models.</p><p>Moving upstream changes the picture. Identifying trust nodes. Mapping cross-platform validation patterns. Linking behavioral signals to financial emergence before coordination hardens into infrastructure.</p><p>Done correctly, this means surfacing high-risk intermediaries before they receive funds, identifying coordination hubs that never appear in transaction data, and anticipating how networks reconstitute after disruption &#8212; rather than rediscovering them afterward.</p><h3><strong>The Distinction That Determines Outcomes</strong></h3><p>Most systems are built to follow money. Very few are built to identify the trust systems that determine where that money can move.</p><p>That distinction is the difference between tracking activity and disrupting the system that produces it. This is the gap I presented to CTED &#8212; and one most current frameworks have yet to close.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!9Cs3!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9cabdc2b-d5c3-4b93-8263-0d765fc0db28_1888x712.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!9Cs3!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9cabdc2b-d5c3-4b93-8263-0d765fc0db28_1888x712.png 424w, https://substackcdn.com/image/fetch/$s_!9Cs3!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9cabdc2b-d5c3-4b93-8263-0d765fc0db28_1888x712.png 848w, https://substackcdn.com/image/fetch/$s_!9Cs3!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9cabdc2b-d5c3-4b93-8263-0d765fc0db28_1888x712.png 1272w, https://substackcdn.com/image/fetch/$s_!9Cs3!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9cabdc2b-d5c3-4b93-8263-0d765fc0db28_1888x712.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!9Cs3!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9cabdc2b-d5c3-4b93-8263-0d765fc0db28_1888x712.png" width="1456" height="549" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9cabdc2b-d5c3-4b93-8263-0d765fc0db28_1888x712.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:549,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1873826,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.btl-research.com/i/195993729?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9cabdc2b-d5c3-4b93-8263-0d765fc0db28_1888x712.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!9Cs3!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9cabdc2b-d5c3-4b93-8263-0d765fc0db28_1888x712.png 424w, https://substackcdn.com/image/fetch/$s_!9Cs3!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9cabdc2b-d5c3-4b93-8263-0d765fc0db28_1888x712.png 848w, https://substackcdn.com/image/fetch/$s_!9Cs3!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9cabdc2b-d5c3-4b93-8263-0d765fc0db28_1888x712.png 1272w, https://substackcdn.com/image/fetch/$s_!9Cs3!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9cabdc2b-d5c3-4b93-8263-0d765fc0db28_1888x712.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3>Video Recording</h3><p><em>Because the session included sensitive propaganda examples, CTED has kept the recording private. To request access, contact <a href="mailto:info@btl-research.com">info@btl-research.com</a>.</em></p>]]></content:encoded></item><item><title><![CDATA[Interview: Crime Beat Conversations @ New Lines Institute]]></title><description><![CDATA[A discussion of my recent work on cartel finance]]></description><link>https://www.btl-research.com/p/interview-crime-beat-conversations</link><guid isPermaLink="false">https://www.btl-research.com/p/interview-crime-beat-conversations</guid><dc:creator><![CDATA[Adam Rousselle]]></dc:creator><pubDate>Thu, 09 Apr 2026 17:55:34 GMT</pubDate><enclosure url="https://substackcdn.com/image/youtube/w_728,c_limit/cHbyMgaMqmU" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>On February 16, I joined Rafaella Lipschitz at the New Lines Institute to discuss my article, <em>&#8220;China&#8211;Cartel Nexus: The Liquidity Architecture Transforming the Global Drug Economy.&#8221;</em> We focused on how Chinese capital flight and cartel cash are converging into a parallel liquidity system that conventional enforcement struggles to reach.</p><div id="youtube2-cHbyMgaMqmU" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;cHbyMgaMqmU&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/cHbyMgaMqmU?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;8b18fbe6-86b5-4882-a056-3189b48404c2&quot;,&quot;caption&quot;:&quot;This article was published in conjunction with the New Lines Institute. You can find the original link here.&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;lg&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;China&#8211;Cartel Nexus: The Liquidity Architecture Transforming the Global Drug Economy&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:51046878,&quot;name&quot;:&quot;Adam Rousselle&quot;,&quot;bio&quot;:&quot;Editor-in-Chief and Principal Analyst at Between the Lines Research.&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/63c08aa3-3b25-4ef2-9653-620da15140c9_1024x1024.png&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2025-12-19T13:33:20.090Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!PPlc!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45c3bab3-a41d-4ab3-9bca-15a156499fe1_1041x586.jpeg&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.btl-research.com/p/chinacartel-nexus-the-liquidity-architecture&quot;,&quot;section_name&quot;:&quot;Shaping the Conversation&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:182083325,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:6,&quot;comment_count&quot;:0,&quot;publication_id&quot;:1709097,&quot;publication_name&quot;:&quot;Between the Lines&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!-B99!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb2b8d0f-7f85-4d51-aa5d-160c09a2114e_605x605.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>^ Link to original article </p>]]></content:encoded></item><item><title><![CDATA[Terrorist Propaganda as Financial Infrastructure ]]></title><description><![CDATA[How Islamic State and al-Qaeda Media Ecosystems Enable Terrorist Finance]]></description><link>https://www.btl-research.com/p/terrorist-propaganda-as-financial</link><guid isPermaLink="false">https://www.btl-research.com/p/terrorist-propaganda-as-financial</guid><dc:creator><![CDATA[Adam Rousselle]]></dc:creator><pubDate>Tue, 07 Apr 2026 12:10:19 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!u_1k!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff0fa603f-7d2a-4013-bae1-a906d3075342_1168x440.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!L_Is!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!L_Is!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png 424w, https://substackcdn.com/image/fetch/$s_!L_Is!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png 848w, https://substackcdn.com/image/fetch/$s_!L_Is!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png 1272w, https://substackcdn.com/image/fetch/$s_!L_Is!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!L_Is!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png" width="676" height="188" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:188,&quot;width&quot;:676,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:32791,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:&quot;&quot;,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!L_Is!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png 424w, https://substackcdn.com/image/fetch/$s_!L_Is!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png 848w, https://substackcdn.com/image/fetch/$s_!L_Is!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png 1272w, https://substackcdn.com/image/fetch/$s_!L_Is!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a></figure></div><p><strong>This is an article I recently wrote for the Global Network of Extremism and Technology (GNET). You can find the original link <a href="https://gnet-research.org/2026/04/07/propaganda-as-financial-infrastructure-how-islamic-state-and-al-qaeda-media-ecosystems-enable-terrorist-finance/">here</a>.</strong></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!u_1k!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff0fa603f-7d2a-4013-bae1-a906d3075342_1168x440.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!u_1k!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff0fa603f-7d2a-4013-bae1-a906d3075342_1168x440.jpeg 424w, https://substackcdn.com/image/fetch/$s_!u_1k!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff0fa603f-7d2a-4013-bae1-a906d3075342_1168x440.jpeg 848w, https://substackcdn.com/image/fetch/$s_!u_1k!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff0fa603f-7d2a-4013-bae1-a906d3075342_1168x440.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!u_1k!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff0fa603f-7d2a-4013-bae1-a906d3075342_1168x440.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!u_1k!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff0fa603f-7d2a-4013-bae1-a906d3075342_1168x440.jpeg" width="1168" height="440" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f0fa603f-7d2a-4013-bae1-a906d3075342_1168x440.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:440,&quot;width&quot;:1168,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Reassessing the Financing of Terrorism in 2025 | Royal United Services  Institute&quot;,&quot;title&quot;:&quot;Reassessing the Financing of Terrorism in 2025 | Royal United Services  Institute&quot;,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Reassessing the Financing of Terrorism in 2025 | Royal United Services  Institute" title="Reassessing the Financing of Terrorism in 2025 | Royal United Services  Institute" srcset="https://substackcdn.com/image/fetch/$s_!u_1k!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff0fa603f-7d2a-4013-bae1-a906d3075342_1168x440.jpeg 424w, https://substackcdn.com/image/fetch/$s_!u_1k!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff0fa603f-7d2a-4013-bae1-a906d3075342_1168x440.jpeg 848w, https://substackcdn.com/image/fetch/$s_!u_1k!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff0fa603f-7d2a-4013-bae1-a906d3075342_1168x440.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!u_1k!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff0fa603f-7d2a-4013-bae1-a906d3075342_1168x440.jpeg 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Propaganda ecosystems function as <em>parallel trust infrastructures</em>, enabling extremist organisations to coordinate financial activity outside formal financial systems. While extremist propaganda is typically studied as a tool for recruitment or ideological dissemination, these ecosystems also perform a critical financial function as generators of the reputational legitimacy and interpersonal trust necessary for decentralised financial networks to operate.</p><p>Over the past decade, violent extremist groups&#8212;particularly those affiliated with <a href="https://gnet-research.org/combating-islamic-state-finance/">the Islamic State </a>and al-Qaeda&#8212;have leveraged digital propaganda ecosystems to construct increasingly sophisticated parallel financial systems. Through repeated messaging, reputational signalling, and networked communication, these ecosystems enable dispersed actors to authenticate intermediaries, coordinate fundraising, and move resources across geographically fragmented spaces.</p><p>This Insight argues that extremist propaganda ecosystems function as <em>trust infrastructures</em> that enable decentralised terrorist financing systems to operate outside formal financial institutions. If propaganda ecosystems generate the trust required for decentralised financial coordination, then disrupting these <em>trust nodes</em> may offer earlier intervention points than traditional transaction-level counter-terrorist financing measures.</p><p><strong>The Role of Trust in Institutional and Extremist Financial Systems</strong></p><p>Across economic theory, there is <a href="https://socialsciencelibrary.org/frontier-issues-in-economic-thought/volume-3-human-well-being-and-economic-goals/trust-as-a-commodity/">broad agreement</a> that financial systems depend on trust. Whereas formal financial systems rely on institutional trust generated by legal frameworks and regulatory institutions that govern banks and financial intermediaries, extremist networks are formally excluded from these channels. This exclusion has forced terrorist groups to build parallel systems that generate trust, enabling the financial coordination required to sustain operations&#8212;beginning with propaganda ecosystems.</p><p>From a financial perspective, these trust-generating ecosystems enable groups to <a href="https://gnet-research.org/2024/12/12/soliciting-terror-iskp-digital-communications-and-financing-tactics-through-voice-of-khurasan/">solicit funds</a> directly while identifying supporters with fundraising potential or financial expertise. At the same time, the rapid expansion of financial technologies&#8212;including cryptocurrencies and other fintech tools&#8212;has reduced the friction associated with transferring funds across informal networks, allowing extremist actors to mobilise financial resources more rapidly across geographically dispersed stakeholders. Finally, the shared narratives and reputational trust generated within these propaganda ecosystems allow larger organisations to both co-opt local militant groups with independent revenue streams and coordinate financially across otherwise fragmented networks.</p><p>To these ends, extremists leverage network-based trust as a substitute for formal institutional trust, enabling financial coordination across informal systems.</p><p><strong>Case Studies: Propaganda-Enabled Financial Systems</strong></p><p>The following cases illustrate how extremist propaganda ecosystems have contributed to the rise of parallel financial infrastructures used by terrorist groups. While these examples are limited to IS- and AQ-affiliated groups, they are not exhaustive.</p><p>Islamic State: Global Financial Facilitation Networks</p><p>Although IS affiliates lost the <a href="https://ctc.westpoint.edu/the-financial-future-of-the-islamic-state/">vast majority</a> of their territorial holdings and operational revenue between 2014 and 2019, the broader global organisation has remained resilient in large part due to the continued dissemination of online propaganda. Safe havens such as Afghanistan allowed the organisation&#8217;s <a href="https://techagainstterrorism.org/in-the-news/iskp-intensifying-online-propaganda-targeting-russia-and-central-asia">most active branch</a>&#8212;the Islamic State Khorasan Province (ISKP)&#8212;to <a href="https://gnet-research.org/2025/08/04/the-shadow-war-in-balochistan-iskp-weaponises-digital-land-to-gain-influence/">produce and distribute</a> videos, press releases, and its monthly magazine <em>The Voice of Khorasan</em> across platforms including Telegram, Rocket.Chat, <a href="https://gnet-research.org/2025/12/03/have-any-change-to-spare-how-the-islamic-state-leverages-instagram-for-fundraising/">Instagram</a>, <a href="https://gnet-research.org/2023/04/21/wilayat-facebook-and-instagram-an-exploration-of-pro-is-activities-on-mainstream-platforms/">Facebook</a>, <a href="https://gnet-research.org/2022/11/18/islamic-state-supporters-on-twitter-how-is-new-twitter-handling-an-old-problem/">X</a>, and <a href="https://gnet-research.org/2026/02/16/extremist-content-curation-moderation-challenges-on-pinterest-and-means-to-move-forward/">Pinterest</a>.</p><p>Beyond ideological messaging, these propaganda ecosystems play a critical role in <a href="https://gnet-research.org/2025/03/13/free-the-captives-islamic-state-central-asian-fundraising-networks-in-support-of-is-families-in-syria-and-iraq/">generating trust</a> across geographically dispersed supporters and operatives. Repeated messaging, shared narratives, and reputational signalling help establish a sense of <a href="https://gnet-research.org/2026/02/04/shock-and-awe-geopolitical-disruption-and-terrorist-narrative-opportunism-online/">authenticity and legitimacy</a> within the network. In the absence of formal financial institutions, this reputational infrastructure reduces uncertainty about potential intermediaries and collaborators across geographically vast networks.</p><p>With these trust networks in place, the Islamic State organisation has been able to construct sophisticated <a href="https://gnet-research.org/2025/02/17/combating-the-islamic-state-finance-somalia-and-the-pan-african-nexus/">cross-border financial systems</a> that sustain its global operations. Many of these financial activities were centred in the Cal Miskaad mountain range of Puntland, Somalia, where the group&#8217;s al-Karrar office coordinated fundraising and financial transfers across Africa and Asia before a 2025 series of U.S. <a href="https://www.longwarjournal.org/archives/2025/07/us-ground-raid-captures-islamic-state-leader-in-northern-somalia.php">airstrikes and local military operations</a> disrupted the hub. Arrests of financial operatives in <a href="https://www.dw.com/en/german-police-swoop-on-islamic-state-finance-network/a-65776588">Europe</a> and the <a href="https://www.justice.gov/opa/pr/man-sentenced-over-30-years-prison-crypto-terror-financing-scheme">United States</a> suggest elements of this architecture were already operating across multiple jurisdictions, suggesting a move toward a more decentralised model of interconnected trust nodes.</p><p>Islamic State propaganda ecosystems support these parallel financial systems in three primary ways. The first is direct fundraising, with outlets such as <em>The Voice of Khorasan</em> and individual operatives <a href="https://gnet-research.org/2025/02/19/combating-islamic-state-finance-central-asia-and-around-the-world/">soliciting donations</a> directly from supporters, often through QR codes linked to cryptocurrency transfers. Because these appeals circulate within trusted propaganda communities, potential donors face fewer informational barriers when deciding whether to contribute. Evidence shows that financial and propaganda roles intertwine: for example, French police <a href="https://www.lemonde.fr/en/france/article/2025/11/01/france-arrests-afghan-with-suspected-links-to-islamic-state-offshoot_6746996_7.html">arrested a man</a> in November 2025 in relation to financing and disseminating propaganda for the ISKP.</p><p>The second function is coordination and network formation. Cryptocurrency transfers and hawala transactions are frequently arranged through encrypted messaging platforms such as <a href="https://www.counterterrorism.police.uk/four-jailed-for-sharing-terrorism-propaganda-and-supporting-terrorist-funding-activities/">WhatsApp</a> by operatives who likely <a href="https://www.apgml.org/sites/default/files/documents/APG-MENAFATF_Typologies_Report_Social_Media_and_TF.pdf">initially connected </a>through propaganda communities on other social media platforms. In this sense, propaganda ecosystems act as authenticators, helping participants identify trusted intermediaries and facilitating financial coordination across dispersed networks.</p><p>The third function is integration, with the broader organisation inspiring local jihadist groups with independent revenue streams to join and contribute. Examples include the Islamic State Southeast Asia Province (<a href="https://www.hudson.org/terrorism/history-evolution-islamic-state-southeast-asia">ISEAP</a>) in the Philippines and <a href="https://acleddata.com/report/ransom-gold-and-spoils-war-islamic-state-mozambiques-new-cash-flow">Islamic State&#8211;Mozambique</a>, both of which operate locally embedded revenue systems while maintaining ties to the broader Islamic State network. In such cases, joining broader financial networks allows these groups to receive funds to expand their attacks or revenue generation, and contribute back to the larger organisation.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!a-GC!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90a6aa06-c840-4425-a8d0-318562858e5e_1070x930.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!a-GC!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90a6aa06-c840-4425-a8d0-318562858e5e_1070x930.png 424w, https://substackcdn.com/image/fetch/$s_!a-GC!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90a6aa06-c840-4425-a8d0-318562858e5e_1070x930.png 848w, https://substackcdn.com/image/fetch/$s_!a-GC!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90a6aa06-c840-4425-a8d0-318562858e5e_1070x930.png 1272w, https://substackcdn.com/image/fetch/$s_!a-GC!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90a6aa06-c840-4425-a8d0-318562858e5e_1070x930.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!a-GC!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90a6aa06-c840-4425-a8d0-318562858e5e_1070x930.png" width="1070" height="930" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/90a6aa06-c840-4425-a8d0-318562858e5e_1070x930.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:930,&quot;width&quot;:1070,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1410580,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.btl-research.com/i/193456814?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90a6aa06-c840-4425-a8d0-318562858e5e_1070x930.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!a-GC!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90a6aa06-c840-4425-a8d0-318562858e5e_1070x930.png 424w, https://substackcdn.com/image/fetch/$s_!a-GC!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90a6aa06-c840-4425-a8d0-318562858e5e_1070x930.png 848w, https://substackcdn.com/image/fetch/$s_!a-GC!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90a6aa06-c840-4425-a8d0-318562858e5e_1070x930.png 1272w, https://substackcdn.com/image/fetch/$s_!a-GC!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90a6aa06-c840-4425-a8d0-318562858e5e_1070x930.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>Figure 1: Image from the ISKP&#8217;s Voice of Khorasan magazine soliciting crypto donations in Monero</em></p><p><strong>Al-Qaeda: Legitimacy, Trust, and Decentralised Finance</strong></p><p>Al-Qaeda&#8217;s (AQ) global propaganda ecosystem provides the ideological legitimacy and reputational signalling necessary to sustain parallel financial systems across geographically dispersed affiliates. Unlike the Islamic State&#8217;s more centralised attempts to coordinate global operations, AQ&#8217;s model relies heavily on regional trust nodes that maintain operational autonomy while benefiting from the broader legitimacy of the organisational banner and its propaganda channels. This structure allows locally embedded militant groups to generate revenue independently while remaining integrated into a wider transnational network.</p><p>Jama&#8217;at Nusrat al-Islam wal-Muslimin (JNIM), an AQ affiliate formed in 2017 through the consolidation of several militant factions operating across the Sahel, illustrates how this model co-opts disparate groups with multiple revenue streams under a parallel financial system. JNIM operates a patchwork of revenue-generating activities tied to illicit <a href="https://gnet-research.org/2024/11/25/from-trees-to-terror-jnims-use-of-online-rosewood-sales-to-fuel-expansion/">timber extraction</a>, artisanal <a href="https://gnet-research.org/2025/04/29/malis-environmental-crisis-the-link-between-climate-change-and-jnims-rapid-expansion/">gold smuggling</a>, <a href="https://globalinitiative.net/analysis/cattle-rustling-and-insecurity-in-the-triborder-area-between-burkina-faso-cte-divoire-and-ghana/">cattle rustling</a>, taxation of local populations, and narcotics trafficking.</p><p>These revenue streams are largely decentralised and embedded in local economies. However, the broader al-Qaeda <a href="https://gnet-research.org/2020/10/27/digital-dunes-and-shrublands-a-comparative-introduction-to-the-sahelian-jihadi-propaganda-ecosystem/">narrative ecosystem</a> provides legitimacy and cohesion across geographically dispersed factions, allowing multiple militant groups and revenue systems to operate under a shared organisational framework that enables its expansion as a single entity. This combination of <a href="https://acleddata.com/report/jamaat-nusrat-al-islam-wal-muslimin-jnim">propaganda</a>-based legitimacy and locally embedded <a href="https://issafrica.org/iss-today/timber-logging-drives-jnim-s-expansion-in-mali">revenue streams</a> has contributed to JNIM&#8217;s rapid expansion across the Sahel.</p><p>Open-source evidence demonstrates <a href="https://adf-magazine.com/2025/09/terror-groups-diversify-to-find-steady-flow-of-illicit-financing/">decentralised revenue generation</a> under a shared JNIM/al-Qaeda framework. Rather than relying on a centralised treasury, these networks operate through a distributed network anchored by the broader al-Qaeda <a href="https://pt.icct.nl/sites/default/files/2024-06/Research%20article_Lakomy.pdf">propaganda ecosystem</a>. Through shared narratives, ideological legitimacy, and reputational signalling, this propaganda infrastructure allows geographically dispersed factions to generate and deploy revenue locally while remaining integrated within a wider militant network under the direction of key trust nodes.</p><p>JNIM&#8217;s decentralised structure resembles the <a href="https://insightcrime.org/investigations/cocaine-brokers-flexible-backbone-ndrangheta-trafficking-empire/">model employed</a> by the Italian &#8217;Ndrangheta criminal network, in which semi-autonomous local groups generate <a href="https://www.occrp.org/en/project/the-ndrangheta">large-scale revenue</a> independently while remaining connected through shared structures rather than centralised financial control &#8211; allowing them to largely evade global enforcement for decades. While the scale of JNIM&#8217;s finances is far smaller, the comparison highlights how decentralised networks built on trusted intermediaries can sustain resilient financial ecosystems without centralised treasury structures.</p><p>A more centralised version of this model can be observed in Somalia through al-Shabaab (AS), <a href="https://www.congress.gov/crs_external_products/IF/HTML/IF10170.web.html#:~:text=After%20expressions%20of%20allegiance%20to,agenda%2C%20the%20group%20operates%20independently.">which joined</a> AQ in 2012 and generates approximately US $100 million in <a href="https://home.treasury.gov/news/press-releases/jy2168#:~:text=Al%2DShabaab%20generates%20over%20$100,discord%20and%20undermine%20good%20governance.">annual revenue</a>, making it the wealthiest affiliate in the AQ network. AS has developed a structured financial system built around <a href="https://africacenter.org/spotlight/reclaiming-al-shabaabs-revenue/">taxation</a>, illicit <a href="https://www.theguardian.com/global-development/2022/aug/08/somalia-deforestation-charcoal-farmers-logging-al-shabaab">charcoal trading</a>, diaspora remittances, and intermediaries operating in <a href="https://home.treasury.gov/news/press-releases/sb0084">Gulf financial corridors</a>, East Africa, and <a href="https://www.reuters.com/article/world/iran-is-new-transit-point-for-somali-charcoal-in-illict-trade-taxed-by-militants-idUSKCN1MJ158/">Iran</a>.</p><p>Despite stronger internal governance than many AQ affiliates, AS&#8217;s financial resilience still depends on trust networks reinforced through propaganda and reputational legitimacy. These networks facilitate revenue generation &#8211; particularly through <a href="https://www.fmreview.org/sipus/">diaspora remittances</a> &#8211; while evidence also indicates AS reinvests a portion of proceeds into propaganda dissemination. In effect, propaganda functions not only as a communication tool but as a financial infrastructure, sustaining trust, reinforcing legitimacy, and enabling continued resource mobilisation across the broader AQ ecosystem.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!OPoL!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2fd14e2b-af13-4727-8493-74c9148a12c6_1742x1144.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!OPoL!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2fd14e2b-af13-4727-8493-74c9148a12c6_1742x1144.png 424w, https://substackcdn.com/image/fetch/$s_!OPoL!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2fd14e2b-af13-4727-8493-74c9148a12c6_1742x1144.png 848w, https://substackcdn.com/image/fetch/$s_!OPoL!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2fd14e2b-af13-4727-8493-74c9148a12c6_1742x1144.png 1272w, https://substackcdn.com/image/fetch/$s_!OPoL!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2fd14e2b-af13-4727-8493-74c9148a12c6_1742x1144.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!OPoL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2fd14e2b-af13-4727-8493-74c9148a12c6_1742x1144.png" width="1456" height="956" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2fd14e2b-af13-4727-8493-74c9148a12c6_1742x1144.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:956,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:3092267,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.btl-research.com/i/193456814?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2fd14e2b-af13-4727-8493-74c9148a12c6_1742x1144.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!OPoL!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2fd14e2b-af13-4727-8493-74c9148a12c6_1742x1144.png 424w, https://substackcdn.com/image/fetch/$s_!OPoL!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2fd14e2b-af13-4727-8493-74c9148a12c6_1742x1144.png 848w, https://substackcdn.com/image/fetch/$s_!OPoL!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2fd14e2b-af13-4727-8493-74c9148a12c6_1742x1144.png 1272w, https://substackcdn.com/image/fetch/$s_!OPoL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2fd14e2b-af13-4727-8493-74c9148a12c6_1742x1144.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>Figure 3: AQ-aligned JNIM (red) has expanded rapidly since its 2017 formation, controlling more territory in the Sahel than all other militant groups in the region combined.</em></p><p><strong>The Role of Propaganda-Based Trust in Parallel Financial Systems</strong></p><p>Across these cases, propaganda ecosystems function as reputational infrastructures that allow decentralised financial systems to operate beyond formal institutions. While windfall events such as <a href="https://adf-magazine.com/2025/12/jnim-targets-wealthy-foreigners-for-ransoms/">ransom payments</a> or major criminal operations can produce large short-term inflows, these funds likely disperse rapidly due to corruption, competition, and operational fragmentation. By contrast, trust-based financial systems built around propaganda-generated legitimacy rely on repeated small transactions and trusted intermediaries. Although these flows may be lower in individual transaction volume, they often produce greater long-term financial resilience by sustaining continuous revenue streams across distributed networks. In these systems, propaganda does not merely support recruitment or ideological messaging; it also provides the reputational infrastructure that enables financial coordination across decentralised trust nodes.</p><p>That these groups&#8217; propaganda frequently emulates the visual and stylistic conventions of mainstream media &#8211; videos with news-style watermarks and tickers, press releases, and glossy magazines &#8211; is not coincidental. Just as news organisations and commercial brands use such formats to signal legitimacy, extremist organisations deploy them to generate reputational trust among dispersed audiences. These audiences, in turn, form trust nodes that link media channels, influencers, and intermediaries, validating financial flows and enabling coordination across decentralised networks.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!yFab!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d53d184-9407-4e64-9acf-d45d4d09c80b_1124x888.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!yFab!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d53d184-9407-4e64-9acf-d45d4d09c80b_1124x888.png 424w, https://substackcdn.com/image/fetch/$s_!yFab!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d53d184-9407-4e64-9acf-d45d4d09c80b_1124x888.png 848w, https://substackcdn.com/image/fetch/$s_!yFab!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d53d184-9407-4e64-9acf-d45d4d09c80b_1124x888.png 1272w, https://substackcdn.com/image/fetch/$s_!yFab!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d53d184-9407-4e64-9acf-d45d4d09c80b_1124x888.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!yFab!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d53d184-9407-4e64-9acf-d45d4d09c80b_1124x888.png" width="1124" height="888" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2d53d184-9407-4e64-9acf-d45d4d09c80b_1124x888.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:888,&quot;width&quot;:1124,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!yFab!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d53d184-9407-4e64-9acf-d45d4d09c80b_1124x888.png 424w, https://substackcdn.com/image/fetch/$s_!yFab!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d53d184-9407-4e64-9acf-d45d4d09c80b_1124x888.png 848w, https://substackcdn.com/image/fetch/$s_!yFab!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d53d184-9407-4e64-9acf-d45d4d09c80b_1124x888.png 1272w, https://substackcdn.com/image/fetch/$s_!yFab!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d53d184-9407-4e64-9acf-d45d4d09c80b_1124x888.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Figure 4: Proposed typology breakdown of trust node categories across IS and AQ propaganda ecosystems/financial networks.</p><p><strong>Implications for Counter-Terrorist Financing: Targeting Trust Nodes</strong></p><p>Current counter-terrorist financing strategies focus primarily on transaction-level disruption, including sanctions, asset freezes, blockchain tracing, and financial surveillance. While these approaches remain essential, they largely target late-stage financial activity after financial coordination has already occurred. The deeper structural vulnerability in many extremist financial systems may lie earlier in the lifecycle of these networks&#8212;within the trust relationships that enable <em>decentralised actors to coordinate</em> financial activity across dispersed environments.</p><p>Viewed through this lens, propaganda ecosystems function not only as ideological or recruitment platforms but also as trust infrastructures that authenticate intermediaries and enable financial coordination. Within these ecosystems, certain actors, channels, or accounts serve as trust nodes&#8212;points within the network that signal legitimacy, validate intermediaries, and facilitate coordination among otherwise disconnected participants. Recent assessments by the Financial Action Task Force (FATF) reinforce this dynamic, noting that groups such as ISKP <a href="https://www.fatf-gafi.org/en/publications/Methodsandtrends/comprehensive-update-terrorist-financing-risks-2025.html">increasingly embed</a> crowdfunding appeals directly within propaganda ecosystems, including encrypted messaging channels targeting diaspora communities.</p><p>Recent research also highlights how emerging <a href="https://gnet-research.org/2025/10/24/closing-the-enforcement-gap-ai-illicit-liquidity-and-the-next-phase-of-counter-terrorist-finance/">financial technologies</a> are reshaping the landscape of terrorist financing. Digital assets, encrypted messaging platforms, and decentralised payment rails have created parallel financial infrastructures operating largely outside traditional regulatory oversight. Artificial intelligence tools are increasingly capable of clustering cryptocurrency wallets, identifying laundering typologies, and mapping financial networks that span multiple platforms and jurisdictions. Rather than simply tracing individual transactions, these technologies allow investigators to analyse financial ecosystems as interconnected systems of intermediaries and facilitators.</p><p>Amid the emergence of vast illicit financial service ecosystems&#8212;as highlighted in a February 2026 <a href="https://www.fatf-gafi.org/content/dam/fatf-gafi/reports/Cyber-Enabled-Fraud%E2%80%93Digitalisation-and-ML-TF-PF-Risks.pdf.coredownload.inline.pdf">FATF report</a>&#8212;the longer-term risk may lie in the convergence of decentralised extremist financial networks with these larger criminal service economies, underscoring the need to disrupt the trust infrastructures that sustain them earlier.</p><p>When combined with analysis of extremist propaganda ecosystems, AI-enhanced tracing and mapping capabilities may help investigators identify the <em>trust nodes</em> that anchor decentralised financial networks. Wallet addresses, donation links, and financial intermediaries that circulate repeatedly within propaganda communities can serve as indicators of trusted actors within these ecosystems. By linking online behavioural signals with blockchain analytics and financial intelligence, investigators may be able to map the financial networks that emerge from these trust nodes.</p><p>This perspective suggests an opportunity for greater collaboration between platforms and national financial intelligence units (FIUs), and financial intelligence tools like blockchain analytics. Social media platforms and messaging services are often the earliest environments where trust nodes emerge, as accounts that repeatedly disseminate propaganda, authenticate intermediaries, or promote fundraising campaigns gain reputational legitimacy within extremist ecosystems. Rather than focusing solely on content removal, platforms could prioritise identifying accounts and channels that function as trust nodes and sharing associated financial indicators&#8212;such as wallet addresses, donation links, or payment identifiers&#8212;with relevant investigative bodies.</p><p>Investigators and researchers may therefore benefit from prioritising several analytical questions:</p><ul><li><p>Where are the trust nodes within extremist propaganda ecosystems?</p></li><li><p>Which actors authenticate financial intermediaries within these networks?</p></li><li><p>And how do trusted propaganda channels enable decentralised financial coordination across geographically dispersed actors?</p></li></ul><p>Integrating insights from propaganda analysis, platform data, and financial intelligence may allow investigators to map financial networks emerging from these trust nodes and identify earlier intervention points within decentralised extremist financing systems.</p>]]></content:encoded></item><item><title><![CDATA[The TD Bank Money Laundering Case: Anatomy of a Compliance Failure]]></title><description><![CDATA[Industrial-Scale Laundering and the Limits of Anomaly-Based Supervision]]></description><link>https://www.btl-research.com/p/the-td-bank-money-laundering-case</link><guid isPermaLink="false">https://www.btl-research.com/p/the-td-bank-money-laundering-case</guid><dc:creator><![CDATA[Adam Rousselle]]></dc:creator><pubDate>Mon, 23 Feb 2026 21:05:46 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Zjv9!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F58f6e527-42c4-4ee6-9b0e-45798983f35c_1400x800.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Zjv9!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F58f6e527-42c4-4ee6-9b0e-45798983f35c_1400x800.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Zjv9!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F58f6e527-42c4-4ee6-9b0e-45798983f35c_1400x800.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Zjv9!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F58f6e527-42c4-4ee6-9b0e-45798983f35c_1400x800.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Zjv9!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F58f6e527-42c4-4ee6-9b0e-45798983f35c_1400x800.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Zjv9!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F58f6e527-42c4-4ee6-9b0e-45798983f35c_1400x800.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Zjv9!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F58f6e527-42c4-4ee6-9b0e-45798983f35c_1400x800.jpeg" width="1400" height="800" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/58f6e527-42c4-4ee6-9b0e-45798983f35c_1400x800.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:800,&quot;width&quot;:1400,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;The anti-money-laundering lever that regulators have never used | American  Banker&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="The anti-money-laundering lever that regulators have never used | American  Banker" title="The anti-money-laundering lever that regulators have never used | American  Banker" srcset="https://substackcdn.com/image/fetch/$s_!Zjv9!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F58f6e527-42c4-4ee6-9b0e-45798983f35c_1400x800.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Zjv9!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F58f6e527-42c4-4ee6-9b0e-45798983f35c_1400x800.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Zjv9!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F58f6e527-42c4-4ee6-9b0e-45798983f35c_1400x800.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Zjv9!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F58f6e527-42c4-4ee6-9b0e-45798983f35c_1400x800.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em><a href="https://www.americanbanker.com/news/the-anti-money-laundering-lever-that-regulators-have-never-used">Image source</a></em></p><p>On October 10, 2024, Toronto-Dominion (TD) Bank agreed to pay approximately US $3.09 billion to U.S. regulators &#8211; the single <a href="https://www.cbc.ca/news/business/td-bank-penalties-1.7348819">largest penalty</a> ever imposed under the Bank Secrecy Act (BSA). The financial consequences extended beyond the headline figure: compliance overhauls, independent monitors, legal expenses, and operational restrictions materially affected the bank&#8217;s U.S. business. Senior executives departed, compensation was reduced, and branch-level employees now face criminal charges.</p><p>According to the U.S. Department of Justice, between January 2018 and April 2024, TD&#8217;s transaction monitoring program <a href="https://www.justice.gov/archives/opa/pr/td-bank-pleads-guilty-bank-secrecy-act-and-money-laundering-conspiracy-violations-18b">failed to review</a> approximately 92% of its transactions &#8212; representing activity collectively valued at more than $18 trillion. Within that same period, three criminal networks with ties to drug trafficking organizations transferred over $670 million in illicit funds through TD accounts.</p><p>But the magnitude of the penalty &#8212; and <a href="https://thefinancialcrimenews.com/td-bank-usa-aml-fines-amp-penalties-a-deep-dive/">its ramifications</a> for TD and the broader banking sector &#8212; underscores something more unsettling. If criminal networks were able to move over half a billion dollars through a major financial institution over multiple years &#8211; despite the presence of formal monitoring systems &#8211; the underlying laundering infrastructure was not opportunistic. It was operationally mature.</p><p>While the TD case represents a particularly egregious breach of a major financial institution by bad actors, the vast demand to enter these systems by an expanding global criminal services market makes it a powerful warning of the dangers posed by a lack of action amid a global surge in parallel financial activity.</p><h2><strong>Investigation and findings</strong></h2><p>Federal authorities began investigating cartel-linked laundering activity in the New York tri-state area in the early 2020s. In one instance, agents reportedly tailed a box truck transporting <a href="https://www.bradley.com/insights/publications/2024/11/3-billion-td-bank-aml-settlement-is-a-wake-up-call-for-all-banks">bags of bulk cash</a> that were deposited across multiple bank branches, with TD locations featuring prominently. The ringleader of these activities was Da Ying (&#8220;David&#8221;) Sze, a Chinese-born resident of Queens, New York. According to court filings, Sze&#8217;s network laundered approximately $653 million, roughly $470 million of which moved through TD Bank. A subsequent <a href="https://www.congress.gov/crs-product/R48786">congressional report</a> noted the network moved funds to thousands of individuals and entities across the United States, China, Hong Kong, and other jurisdictions.</p><p>The Sze network did not rely on large-scale corruption to operate within TD. According to court documents, the organization provided approximately $57,000 in retail gift cards to multiple bank employees over a three-year period. In exchange for these gift cards, employees repeatedly <a href="https://www.comsuregroup.com/news/gift-cards-insider-risk-and-hundreds-of-millions-laundered-lessons-learnt/">ignored reporting</a> standards, issuing official bank checks for accounts mostly filled with underreported cash. According to charging documents, one <a href="https://www.nytimes.com/2024/10/10/business/td-bank-fine.html?unlocked_article_code=1.RU4.pbFX.JUDDsZpAfAS8&amp;smid=url-share">branch employee</a> asked another &#8220;how is that not money laundering?&#8221; after a customer was permitted to buy more than $1 million in bank checks with cash. &#8220;Oh, it 100 percent is,&#8221; replied the second employee.</p><p>While multiple insiders were charged in connection with related laundering schemes, the only publicly detailed case tied to the Sze network is that of <a href="https://www.amlintelligence.com/2026/01/latest-former-td-bank-insider-pleads-guilty-to-474m-money-laundering-scheme/#:~:text=A%20former%20TD%20Bank%20employee,%E2%80%9Cconductor%E2%80%9D%20on%20those%20reports.">Wilfredo Aquino</a>, an assistant store manager at a Midtown Manhattan TD branch. Aquino accepted more than $11,000 in gift cards between 2019 and 2021. In the context of a mid-level retail banking salary in Manhattan, and given <a href="https://www.amlintelligence.com/2026/01/latest-former-td-bank-insider-pleads-guilty-to-474m-money-laundering-scheme/#:~:text=A%20former%20TD%20Bank%20employee,%E2%80%9Cconductor%E2%80%9D%20on%20those%20reports.">Aquino had processed</a> some 1,680 checks worth over $92 million, the inducements were modest &#8212; suggesting that the network&#8217;s strategy depended less on dramatic bribery than on sustained, low-friction facilitation at key review points.</p><p>At $57,000 in gift cards, total known inducements amounted to roughly 0.01 percent of the funds Sze passed through TD-linked accounts &#8212; a negligible input cost for a network operating at industrial scale. The vulnerability was not expensive corruption, but calibrated pressure applied to the right choke points.</p><p>While global financial institutions continue to struggle to improve their compliance systems, what is clear is that demand to inject illicit cash into capital markets via legitimate institutions has reached an unprecedented scale and scope.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!G5ck!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88cbc14c-e8dc-4b84-b9bf-ad9049b8a504_700x394.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!G5ck!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88cbc14c-e8dc-4b84-b9bf-ad9049b8a504_700x394.jpeg 424w, https://substackcdn.com/image/fetch/$s_!G5ck!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88cbc14c-e8dc-4b84-b9bf-ad9049b8a504_700x394.jpeg 848w, https://substackcdn.com/image/fetch/$s_!G5ck!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88cbc14c-e8dc-4b84-b9bf-ad9049b8a504_700x394.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!G5ck!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88cbc14c-e8dc-4b84-b9bf-ad9049b8a504_700x394.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!G5ck!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88cbc14c-e8dc-4b84-b9bf-ad9049b8a504_700x394.jpeg" width="700" height="394" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/88cbc14c-e8dc-4b84-b9bf-ad9049b8a504_700x394.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:394,&quot;width&quot;:700,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:41401,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.btl-research.com/i/188949112?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88cbc14c-e8dc-4b84-b9bf-ad9049b8a504_700x394.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!G5ck!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88cbc14c-e8dc-4b84-b9bf-ad9049b8a504_700x394.jpeg 424w, https://substackcdn.com/image/fetch/$s_!G5ck!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88cbc14c-e8dc-4b84-b9bf-ad9049b8a504_700x394.jpeg 848w, https://substackcdn.com/image/fetch/$s_!G5ck!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88cbc14c-e8dc-4b84-b9bf-ad9049b8a504_700x394.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!G5ck!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88cbc14c-e8dc-4b84-b9bf-ad9049b8a504_700x394.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>Da Ying (&#8220;David&#8221;) Sze depositing bulk cash at a NYC-area TD branch. <a href="https://www.amlintelligence.com/2026/01/latest-former-td-bank-insider-pleads-guilty-to-474m-money-laundering-scheme/#:~:text=A%20former%20TD%20Bank%20employee,%E2%80%9Cconductor%E2%80%9D%20on%20those%20reports.">Image source</a></em></p><h2><strong>Supply and Demand &#8212; Laundering as a Service Market</strong></h2><p>Service-based alternative clearing networks have emerged amid unprecedented capital mobility, digitized payment velocity, and increasing geopolitical fragmentation. Over the past decade, <a href="https://www.btl-research.com/p/western-banks-and-the-rise-of-parallel">these systems</a> have expanded in ways that bypass and place strain on formal regulatory frameworks. They reflect a convergence of three structural forces: capital flight from high-pressure jurisdictions such as China, the steady supply of bulk cash generated by large transnational criminal enterprises, and the acceleration of cross-border value transfer enabled by fintech and digital assets.</p><p>Operationally, these <a href="https://newlinesinstitute.org/global-security-mil-priorities/china-cartel-nexus-the-liquidity-architecture-transforming-the-global-drug-economy/">networks integrate</a> bulk cash collection, offshore credit balancing, digital asset conversion, and trade-based value settlement into a continuous clearing cycle. The result is a service-layered market for laundering and liquidity conversion, scaled by the sheer volume of capital seeking movement across jurisdictions. The objective is not merely concealment, but transformation &#8212; converting trapped or illicit value into <a href="https://www.btl-research.com/p/understanding-unregulated-capital">deployable capital</a> within stable financial systems.</p><p>Recent enforcement actions and reporting demonstrate the scale and operational capacity of this underground services market. In Southeast Asia, the Huione Chinese language marketplace and corporate networks associated with Prince Group have been identified as providing services used by criminal actors tied to scam compounds and gambling rings. According to Chainalysis, Huione-linked <a href="https://www.chainalysis.com/blog/2025-crypto-crime-report-introduction/">addresses processed</a> more than $70 billion in crypto-denominated transactions between 2021 and 2025. In October 2024, the U.S. Department of Justice announced a <a href="https://www.trmlabs.com/resources/blog/operation-prince-inside-the-global-effort-that-led-to-the-largest-forfeiture-in-us-history">civil forfeiture</a> action involving over $15 billion in bitcoin connected to activity tied to Prince Group&#8211;associated entities &#8212; the largest digital asset seizure in history. In North America, FinCEN reporting has identified Chinese money laundering networks (CMLNs) as key facilitators of bulk cash clearing. Suspicious Activity Reports referencing such networks reflected approximately $312 billion in <a href="https://newlinesinstitute.org/global-security-mil-priorities/china-cartel-nexus-the-liquidity-architecture-transforming-the-global-drug-economy/">flagged transactions</a> between 2020 and 2024. The Da Ying Sze network likely represented only one operational node within this broader clearing architecture.</p><p>These figures illustrate that the networks in question are not marginal or episodic; they are structured, capitalized, and globally integrated. Their continued operation depends not on remaining entirely outside the formal financial system, but on accessing it selectively at key integration points. This is where regulated financial institutions enter the equation.</p><p><strong>Banks as Entry Points for Illicit Capital</strong></p><p>Banks sit at the final integration point between parallel financial systems and formal capital markets. At its core, this is a supply-and-demand equilibrium: illicit or trapped capital seeks conversion; regulated capital markets offer <a href="https://www.btl-research.com/p/western-banks-and-the-rise-of-parallel">absorption capacity</a> and safety; intermediaries profit from the spread. As enforcement actions over the past decade demonstrate, financial institutions exposed to these flows face escalating compliance, reputational, and sanctions-related risks.</p><p>Court documents reveal the extent to which TD Bank&#8217;s compliance team failed to monitor suspicious transactions and the Department of Justice cited systemic weaknesses in the bank&#8217;s AML infrastructure, including gaps in transaction monitoring coverage and risk escalation. But while the TD example may be extreme in scope, the bank is not alone.</p><p>Over the past several years, major financial institutions &#8212; from <a href="https://www.investopedia.com/stock-analysis/2013/investing-news-for-jan-29-hsbcs-money-laundering-scandal-hbc-scbff-ing-cs-rbs0129.aspx">HSBC</a> to <a href="https://www.justice.gov/archives/opa/pr/danske-bank-pleads-guilty-fraud-us-banks-multi-billion-dollar-scheme-access-us-financial">Danske Bank</a> &#8212; have faced significant penalties tied to AML deficiencies valued in the billions of dollars. In less extreme cases &#8211; such as <a href="https://www.fincen.gov/news/news-releases/fincen-announces-390000000-enforcement-action-against-capital-one-national">Capital One</a> or <a href="USAA%20Federal%20Savings%20Bank">USAA Federal Savings Bank</a> &#8211; penalties have still reached hundreds of millions of dollars. The recurrence of multi-billion-dollar penalties across traditional banks and <a href="https://www.justice.gov/archives/opa/pr/binance-and-ceo-plead-guilty-federal-charges-4b-resolution">digital asset platforms</a> underscores a systemic compliance lag rather than isolated institutional failure. Industry analyses and regulatory reports <a href="https://www.sanctions.io/blog/why-companies-fail-on-aml-compliance">repeatedly warn</a> that compliance systems often lag behind transaction complexity and adversary adaptation. The recurring pattern is not episodic misconduct, but structural misalignment between institutional monitoring models and industrial-scale laundering services.</p><p>As banks increasingly integrate digital assets into their payment and settlement systems, risk exposure expands rather than contracts. Beyond retail deposits and digital asset channels, trade finance instruments and correspondent banking relationships provide additional integration pathways between shadow liquidity networks and formal capital markets.</p><p>Existing AML <a href="https://www.fatf-gafi.org/content/dam/fatf-gafi/guidance/Guidance-Risk-Based-Supervision.pdf">evaluation frameworks</a> primarily assess compliance with reporting and supervisory standards; they are less equipped to measure institutional resilience against coordinated, service-based clearing models. As parallel liquidity systems scale, institutions calibrated to detect isolated transactional anomalies &#8212; rather than sustained throughput facilitated by dispersed nodes within otherwise profitable client relationships &#8212; will remain structurally exposed.</p><p>Recalibrating compliance from anomaly detection toward throughput risk management may become one of the banking sector&#8217;s defining challenges in the years ahead. National supervisory regimes remain fragmented, while clearing networks operate transnationally, exploiting jurisdictional seams faster than coordination mechanisms can align. In this environment, the question is no longer whether parallel clearing systems can penetrate formal institutions, but whether supervisory models can evolve quickly enough to recognize that they already have.</p><p><strong>Conclusion</strong></p><p>The TD enforcement action highlights more than episodic compliance breakdown. It reflects the growing sophistication of parallel clearing systems that now function as service-based liquidity providers, capable of sustained access to regulated institutions. These networks do not depend on dramatic corruption, but instead rely on consistent access to friction points &#8212; human, procedural, or technological &#8212; where transaction flow can continue with minimal interruption.</p><p>As illicit and constrained capital continues to seek conversion into stable financial markets, pressure on these integration nodes will increase. Monitoring systems calibrated to detect irregular spikes may struggle to identify persistent throughput dispersed across routine activity. The resulting vulnerability lies less in individual misconduct than in structural misalignment between institutional oversight models and industrial-scale clearing operations. Reorienting supervision toward throughput risk &#8212; rather than isolated anomaly detection &#8212; may become essential as shadow liquidity systems continue expanding alongside formal capital markets.</p>]]></content:encoded></item><item><title><![CDATA[Western Banks and the Rise of Parallel Financial Systems]]></title><description><![CDATA[The growing risk of illicit and sanctions-evasive liquidity embedding Into global capital markets]]></description><link>https://www.btl-research.com/p/western-banks-and-the-rise-of-parallel</link><guid isPermaLink="false">https://www.btl-research.com/p/western-banks-and-the-rise-of-parallel</guid><dc:creator><![CDATA[Adam Rousselle]]></dc:creator><pubDate>Thu, 05 Feb 2026 16:50:15 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Qnxz!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c515543-46b0-4c4f-a8df-fdeac6fd5ba5_4000x2660.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Qnxz!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c515543-46b0-4c4f-a8df-fdeac6fd5ba5_4000x2660.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Qnxz!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c515543-46b0-4c4f-a8df-fdeac6fd5ba5_4000x2660.webp 424w, https://substackcdn.com/image/fetch/$s_!Qnxz!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c515543-46b0-4c4f-a8df-fdeac6fd5ba5_4000x2660.webp 848w, https://substackcdn.com/image/fetch/$s_!Qnxz!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c515543-46b0-4c4f-a8df-fdeac6fd5ba5_4000x2660.webp 1272w, https://substackcdn.com/image/fetch/$s_!Qnxz!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c515543-46b0-4c4f-a8df-fdeac6fd5ba5_4000x2660.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Qnxz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c515543-46b0-4c4f-a8df-fdeac6fd5ba5_4000x2660.webp" width="1456" height="968" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0c515543-46b0-4c4f-a8df-fdeac6fd5ba5_4000x2660.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:968,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Deutsche Bank Police Raid Adds to Risk Control Concern - Bloomberg&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Deutsche Bank Police Raid Adds to Risk Control Concern - Bloomberg" title="Deutsche Bank Police Raid Adds to Risk Control Concern - Bloomberg" srcset="https://substackcdn.com/image/fetch/$s_!Qnxz!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c515543-46b0-4c4f-a8df-fdeac6fd5ba5_4000x2660.webp 424w, https://substackcdn.com/image/fetch/$s_!Qnxz!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c515543-46b0-4c4f-a8df-fdeac6fd5ba5_4000x2660.webp 848w, https://substackcdn.com/image/fetch/$s_!Qnxz!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c515543-46b0-4c4f-a8df-fdeac6fd5ba5_4000x2660.webp 1272w, https://substackcdn.com/image/fetch/$s_!Qnxz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c515543-46b0-4c4f-a8df-fdeac6fd5ba5_4000x2660.webp 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>Image from a previous <a href="https://www.bloomberg.com/opinion/articles/2018-11-29/deutsche-bank-police-raid-adds-to-risk-control-concern">police raid </a>on Deutsche Bank that occurred in 2018</em><br><br>On January 28, German police prosecutors raided the Berlin and Frankfurt offices of Deutsche Bank, the largest financial institution in the country. The surprise raid came just one day before the company was set to release its 2025 earnings report, causing <a href="https://www.marketwatch.com/livecoverage/stock-market-today-sp500-7000-dow-nasdaq-up-tech-boost-meta-microsoft-tesla-fed-dollar-gold-record/card/deutsche-bank-stock-slumps-on-reports-of-raid-over-money-laundering-allegations-S6TI6mIJzwoK1EiGlJ6F?gaa_at=eafs&amp;gaa_n=AWEtsqdDrfTn015e_cK2m-T6ftqYcWcppPhfYvYtg7a7jD_UpFFqLO3NuHCzYNRZP-g%3D&amp;gaa_ts=697bee6d&amp;gaa_sig=VBxke9ePRH3yrERqJoCg35sB62IkTjHjakDYFlqYGEgp3oBYC_1XR30TjsJe5qv_d6z3F5lb8frkyv8lEzu2kw%3D%3D">share prices</a> to immediately plummet by around 3%. At least 30 plainclothes investigators entered the offices around 10am local time, targeting a &#8220;yet unknown&#8221; number of employees. According to prosecutors, their investigation surrounds companies suspected of <a href="https://www.dw.com/en/germany-news-deutsche-bank-raided-in-money-laundering-probe/live-75687631">money laundering</a> on behalf of entities tied to sanctioned Russian oligarch, Roman Abramovich.</p><p>This raid is illustrative of a much broader trend.</p><p>The last few years have delivered a steady slew of headlines about major law enforcement actions against banks suspected of money laundering and falling prey to criminal influence. Last year, the U.S. Treasury made the <a href="https://home.treasury.gov/news/press-releases/sb0179">unprecedented move</a> of sanctioning three Mexican banks as a primary money laundering concerns in connection with opioid trafficking. In 2024, Canada&#8217;s TD Bank agreed to pay a record <a href="https://www.fincen.gov/news/news-releases/fincen-assesses-record-13-billion-penalty-against-td-bank">$3 billion</a> in fines in connection with money laundering for the Sinaloa and other Mexican drug cartels; Canada&#8217; FINTRAC imposed nearly $10 million in <a href="https://fintrac-canafe.canada.ca/pen/amps/pen-2024-05-02-eng">additional fines</a> against the bank. Crypto exchanges are at the front lines of such punitive measures, with Binance agreeing to pay a $4.3 billion in fines and restitution in a <a href="https://www.forbes.com/sites/tylerroush/2024/02/23/judge-approves-binances-43-billion-settlement-for-anti-money-laundering-sanctions-violations/">2023 deal</a> with US regulators enforcement. Last year, FINTRAC <a href="https://www.acams.org/en/news/canadas-new-normal-record-aml-penalties">imposed a record </a>$177 million in fines against crypto exchange Xeltox in connection with darknet markets, child abuse, fraud, and ransomware.</p><p>These are not compliance failures, but failures of perception. Institutions are operating with risk models built for a world in which illicit finance was episodic, traceable, and external to core liquidity systems. That world no longer exists.</p><p>While laundering techniques evolve incrementally, detection regimes evolve retroactively. Capital that clears today under acceptable assumptions is increasingly reclassified tomorrow as sanctionable, tainted, or facilitative. Institutions that do not adapt in advance are not merely exposed &#8212; they are accumulating latent enforcement risk they cannot unwind. Evidence suggests the consequences are increasingly unaffordable, prompting the need for proactive measures.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!kSZk!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f0ec059-6dfe-4565-bee8-b2363fcfbdfd_1024x576.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!kSZk!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f0ec059-6dfe-4565-bee8-b2363fcfbdfd_1024x576.jpeg 424w, https://substackcdn.com/image/fetch/$s_!kSZk!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f0ec059-6dfe-4565-bee8-b2363fcfbdfd_1024x576.jpeg 848w, https://substackcdn.com/image/fetch/$s_!kSZk!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f0ec059-6dfe-4565-bee8-b2363fcfbdfd_1024x576.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!kSZk!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f0ec059-6dfe-4565-bee8-b2363fcfbdfd_1024x576.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!kSZk!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f0ec059-6dfe-4565-bee8-b2363fcfbdfd_1024x576.jpeg" width="1024" height="576" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1f0ec059-6dfe-4565-bee8-b2363fcfbdfd_1024x576.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:576,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Myanmar's Shwe Kokko: Inside a city 'built on scams' - BBC News&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Myanmar's Shwe Kokko: Inside a city 'built on scams' - BBC News" title="Myanmar's Shwe Kokko: Inside a city 'built on scams' - BBC News" srcset="https://substackcdn.com/image/fetch/$s_!kSZk!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f0ec059-6dfe-4565-bee8-b2363fcfbdfd_1024x576.jpeg 424w, https://substackcdn.com/image/fetch/$s_!kSZk!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f0ec059-6dfe-4565-bee8-b2363fcfbdfd_1024x576.jpeg 848w, https://substackcdn.com/image/fetch/$s_!kSZk!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f0ec059-6dfe-4565-bee8-b2363fcfbdfd_1024x576.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!kSZk!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f0ec059-6dfe-4565-bee8-b2363fcfbdfd_1024x576.jpeg 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>Shwe Kokko, Myanmar: built in a civil war and financed through Chinese state investment, the multi-billion-dollar militant-backed city now serves as a notorious hub for cyber scammers. </em></p><h2><strong>Parallel financial infrastructures</strong></h2><p>Massive, parallel liquidity architectures now operate alongside regulated global financial markets. These systems emerged to serve actors excluded from the formal financial system and have proliferated amid rapid fintech innovation, tightening sanctions regimes, and rising geopolitical polarization.</p><p>Strict capital controls, combined with sustained political and economic instability, have generated large and unregulated capital outflows from high-stress jurisdictions such as <a href="https://www.brookings.edu/articles/chinas-achilles-heel-capital-flight/">China</a>, <a href="https://www.theguardian.com/world/2023/oct/31/russia-capital-controls-rouble-vladimir-putin">Russia</a>, and <a href="https://www.euronews.com/business/2026/01/09/irans-revolutionary-guard-control-the-economy-heres-why-the-currency-suffers">Iran</a>. These outflows create primary demand for parallel financial infrastructure, supplying the early liquidity needed to establish and scale shell companies, grey-market digital exchanges, trade-based money laundering mechanisms, and over-the-counter (OTC) crypto brokerage networks. Under sanctions pressure, state-linked actors within these jurisdictions also rely on such channels to export goods and procure restricted or <a href="https://www.btl-research.com/p/deepseek-deep-dive-what-role-did?utm_source=publication-search">dual-use technologies</a> beyond formal oversight.</p><p>These parallel architectures are not used exclusively by state-linked elites or individuals engaged in capital flight. Organized criminal groups&#8212;including Latin America <a href="https://www.btl-research.com/p/chinacartel-nexus-the-liquidity-architecture">drug cartels</a>, Chinese-run <a href="https://www.btl-research.com/p/chinese-shadow-liquidity-and-the">scam syndicates</a> operating across Southeast Asia and Africa, and European networks such as the <a href="https://decode39.com/6663/ndrangheta-china-shadow-banks/">&#8217;Ndrangheta</a>&#8212;exploit the same ungoverned financial rails to move and launder proceeds.</p><p>The systemic risk lies not in any single actor, but in the laundering capacity of these parallel systems themselves. Although designed to operate outside regulatory oversight, these infrastructures ultimately interface with&#8212;and depend upon&#8212;safe, well-regulated <a href="https://www.btl-research.com/p/understanding-unregulated-capital">financial markets</a>. Capital originating in capital flight, sanctions evasion, and organized crime frequently converges at the same intermediaries and settlement points before being absorbed into Western asset markets.</p><p>For example, <a href="https://newlinesinstitute.org/global-security-mil-priorities/china-cartel-nexus-the-liquidity-architecture-transforming-the-global-drug-economy/">Chinese money laundering networks</a> (CMLNs) facilitate the laundering of bulk cash generated by Mexican drug cartels, with funds ultimately settling into U.S. asset portfolios held by wealthy Chinese households seeking capital externalization. Similarly, <a href="https://newlinesinstitute.org/global-security-mil-priorities/chinese-shadow-liquidity-and-the-scam-economy/">infrastructure projects</a> financed under the Chinese state-run Belt and Road Initiative have, in certain jurisdictions, contributed to permissive governance environments that organized criminal groups exploit to establish large-scale cyber-scam operations, ultimately moving wealth out of the country and into private hands elsewhere. Once laundered through the region&#8217;s vast ecosystem of casino gambling hubs and international shell corporations, these funds may be invested in Western markets like <a href="https://www.btl-research.com/p/australian-watchdog-sounds-alarm">Australia</a> or the United States.</p><p>Elsewhere, Iranian regime-linked elites have accumulated extensive international <a href="https://www.ft.com/content/c28d7274-6bba-49c7-bddb-4a4bb100ef97">property portfolios</a> in Western countries using <a href="https://www.btl-research.com/p/from-resilience-to-extraction-how">shadow financial</a> infrastructure associated with the Islamic Revolutionary Guard Corps and its affiliated networks. In Europe, criminal organizations such as the &#8217;Ndrangheta <a href="https://nordicmonitor.com/2025/10/german-report-warns-turkeys-narco-authoritarianism-is-fueling-organized-crime-across-europe/#:~:text=The%20report%20also%20examines%20the,culture%20of%20impunity%20remains%20unchanged.">rely on the same</a> real-estate-based laundering channels in Turkey and offshore banking access points in Cyprus that have long been used by Russian elites to externalize wealth and sustain financial activity under sanctions pressure. Recent evidence also indicates that Russian state-owned factories <a href="https://eualive.net/russian-arms-fueling-italian-mafia-a-growing-security-threat/">increasingly supply</a> Italian mafia groups with unmarked weapons via shadow fleet vessels, demonstrating that these informal networks can produce violent consequences.</p><p>Across these cases, the common denominator is not coordination between actors, but the repeated reuse of resilient parallel financial infrastructure that channels capital back into regulated Western markets. Funds associated with criminal or terrorist activity are placed through multiple layers&#8212;including casinos, online gaming platforms, real estate, and front companies&#8212;before being progressively cleaned and integrated. The result is not a segregated illicit economy, but deep structural integration between unaccountable liquidity systems and the global financial core.</p><h2><strong>Exposure</strong></h2><p>The three-tiered architecture clarifies the exposure to Western banks and other institutions:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!UkIB!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F82f44a0d-f19c-4c71-8119-71a91c4cd04f_1148x572.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!UkIB!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F82f44a0d-f19c-4c71-8119-71a91c4cd04f_1148x572.png 424w, https://substackcdn.com/image/fetch/$s_!UkIB!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F82f44a0d-f19c-4c71-8119-71a91c4cd04f_1148x572.png 848w, https://substackcdn.com/image/fetch/$s_!UkIB!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F82f44a0d-f19c-4c71-8119-71a91c4cd04f_1148x572.png 1272w, https://substackcdn.com/image/fetch/$s_!UkIB!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F82f44a0d-f19c-4c71-8119-71a91c4cd04f_1148x572.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!UkIB!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F82f44a0d-f19c-4c71-8119-71a91c4cd04f_1148x572.png" width="1148" height="572" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/82f44a0d-f19c-4c71-8119-71a91c4cd04f_1148x572.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:572,&quot;width&quot;:1148,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;A diagram of a business\n\nAI-generated content may be incorrect.&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="A diagram of a business

AI-generated content may be incorrect." title="A diagram of a business

AI-generated content may be incorrect." srcset="https://substackcdn.com/image/fetch/$s_!UkIB!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F82f44a0d-f19c-4c71-8119-71a91c4cd04f_1148x572.png 424w, https://substackcdn.com/image/fetch/$s_!UkIB!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F82f44a0d-f19c-4c71-8119-71a91c4cd04f_1148x572.png 848w, https://substackcdn.com/image/fetch/$s_!UkIB!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F82f44a0d-f19c-4c71-8119-71a91c4cd04f_1148x572.png 1272w, https://substackcdn.com/image/fetch/$s_!UkIB!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F82f44a0d-f19c-4c71-8119-71a91c4cd04f_1148x572.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>Figure 1 illustrates a three-tier liquidity architecture showing how parallel financial systems interact with regulated Western capital markets.</em></p><ul><li><p><strong>Tier 1</strong> captures upstream capital outflows from high-stress jurisdictions shaped by capital controls, sanctions pressure, and regime instability. Driven primarily by elite asset externalization and state-linked value movement, these outflows provide much of the initial liquidity that seeds parallel financial systems due to the volume of demand they represent.</p></li><li><p><strong>Tier 2</strong> represents the midstream laundering infrastructure that enables these flows to move and settle outside formal regulatory oversight. This layer includes OTC brokers, trade-based money laundering, shell companies, grey-market digital exchanges, and related facilitators that function as shared financial rails used by state-linked elites, criminal networks, and sanctioned actors alike.</p></li><li><p><strong>Tier 3</strong> encompasses downstream threat actors. Including organized crime groups, militant organizations, and terrorist networks. These groups frequently exploit the same infrastructure to move and launder illicit proceeds.</p></li></ul><p>The diagram highlights the <strong>bidirectional interaction between tiers</strong>, reflecting how upstream capital flight sustains laundering infrastructure while downstream criminal activity reinforces its profitability and resilience.</p><p><strong>The right-hand node</strong> illustrates the final stage of the cycle: <em>integration into Western capital markets</em>. Despite originating in parallel systems designed to evade oversight, laundered capital ultimately seeks stability and legal protection within regulated financial systems, creating systemic exposure for financial institutions, real estate markets, and investment products.</p><p>The core risk lies not in any single actor, but in the durable infrastructure that links capital flight, illicit finance, and regulated markets into a continuous financial circuit. Most importantly, as global sanctions regimes increasingly target state-linked actors at Tier 1 and non-state actors at Tier 3, exposure concentrates in Western capital markets where funds moving through this infrastructure are ultimately integrated.</p><h2><strong>Global enforcement vigilance</strong></h2><p>Global regulators and law enforcement agencies are under accelerating pressure to <strong>identify, disrupt, and prosecute</strong> financial activity linked to illicit finance. This pressure is no longer cyclical or reputational; it is structural and driven by two converging forces.</p><h4><strong>First, geopolitical escalation and sanctions enforcement</strong></h4><p>In an increasingly polarized international environment, illicit financial channels used by adversarial states to bypass export controls and procure restricted or dual-use goods are now treated as matters of national security rather than compliance oversight. As sanctions regimes expand in scope and severity, enforcement agencies are increasingly compelled to pursue not only upstream actors but also the financial institutions through which such activity ultimately settles.</p><p><em>Examples include Russia&#8217;s sanctioned war economy, Iran&#8217;s shadow banking networks, and China&#8217;s underground procurement of restricted military and dual-use technologies.</em></p><h4><strong>Second, the trans-nationalization of organized crime</strong></h4><p>Modern criminal networks are increasingly post-sovereign, operating across jurisdictions and establishing parallel financial systems that erode state authority and undermine global governance. These systems are no longer peripheral; they intersect directly with regulated markets.</p><p><em>Examples include militarized Mexican cartels such as Sinaloa and CJNG, as well as large-scale scam-center enclaves in Myanmar and Cambodia.</em></p><p>Across all domains, political tolerance for inaction is collapsing. Regulatory and law enforcement agencies are increasingly expected to demonstrate tangible results, often through high-profile investigations, raids, and retroactive enforcement actions. In the United States, recent sanctions guidance has materially expanded this exposure: the Treasury Department&#8217;s Office of Foreign Assets Control now applies a ten-year <a href="https://ofac.treasury.gov/media/933056/download?inline">enforcement lookback</a>, extending liability to conduct that cleared under acceptable assumptions years earlier. Parallel developments are underway in Europe, where the European Union has moved to <a href="https://www.skadden.com/insights/publications/2024/11/eu-aims-for-harmonized-sanctions">harmonize criminal penalties</a> for sanctions violations across member states, signaling a broader shift toward more aggressive and coordinated enforcement.</p><p>Because Western banks and capital markets represent the terminal integration point for most large-scale laundering activity, they are not incidental to this process, <em>structurally exposed</em> to it. Capital that once cleared under acceptable assumptions is increasingly reclassified as sanctionable, tainted, or facilitative. Institutions that treat these dynamics as external threats rather than embedded risks are not merely vulnerable to future scrutiny; they are accumulating enforcement exposure that cannot be unwound once political thresholds are crossed.</p><h2><strong>Technological advances risk further investigatory disruption</strong></h2><p>Technological advances in <a href="https://www.btl-research.com/p/closing-the-enforcement-gap-ai-illicit">machine learning and artificial intelligence</a> are rapidly expanding investigators&#8217; ability to retroactively identify illicit financial networks after they have already entered Western capital markets. While global organized crime syndicates adopted crypto early to bypass traditional regulatory controls, the underlying structure of blockchain systems &#8212; which preserve immutable transaction records on public ledgers &#8212; has paradoxically made illicit liquidity more traceable over time. As a result, capital that once appeared safely integrated can later be reconstructed, mapped, and reclassified. Blockchain analytics platforms are already deploying advanced AI-driven pattern detection, and DARPA&#8217;s <a href="https://www.darpa.mil/research/programs/a3ml-anticipatory-adaptive">A3ML program</a> aims to make large-scale money laundering economically unviable by disrupting these networks at scale.</p><p>At scale, AI adoption favors actors with capital depth, institutional expertise, and the protection of the rule of law. While criminals may experiment with tactical obfuscation, these advantages compound over time in favor of investigators rather than illicit networks. Banks and other financial institutions should therefore assume that today&#8217;s undetected exposure may become tomorrow&#8217;s enforceable liability, rather than relying on money launderers&#8217; ability to permanently conceal financial activity.</p><h2><strong>Conclusion</strong></h2><p>The dynamics described here are not temporary distortions or episodic compliance challenges. They reflect a structural shift in how illicit, gray, and state-linked capital moves, settles, and ultimately integrates into the global financial system. Parallel financial infrastructures have matured into durable liquidity systems that operate continuously alongside regulated markets, not at their margins.</p><p>Western banks and asset markets sit downstream of these systems. They are not incidental endpoints but the terminal nodes where capital originating in sanctions evasion, and criminal enterprise ultimately seeks stability, legal protection, and yield. As enforcement priorities expand from reputational misconduct to national security risk, and as sanctions regimes increasingly target both state and non-state actors across this spectrum, exposure concentrates precisely where this capital is absorbed.</p><p>Crucially, enforcement is no longer prospective. Detection, attribution, and liability are increasingly retroactive, enabled by improved data integration, cross-border coordination, and advancing analytical technologies. Capital that cleared under acceptable assumptions in the past is now subject to reclassification, scrutiny, and enforcement years later. Once political thresholds are crossed, this exposure cannot be unwound.</p><p>Institutions that continue to treat illicit finance as an external threat, rather than an embedded feature of modern liquidity systems, are not merely vulnerable to future action. They are accumulating latent enforcement risk that will surface on timelines and terms they do not control. In this environment, resilience depends less on incremental compliance improvements than on a fundamental reassessment&#8212;at the board, supervisory, and enterprise-risk level&#8212;of how parallel financial infrastructures intersect with regulated markets and where, within that system, exposure is truly accumulating.</p><p><strong>This problem is not cyclical, but structural. Western financial markets sit downstream of parallel liquidity systems that are already embedded. Enforcement is increasingly retroactive, not preventive. Institutions that fail to adapt now are not merely exposed to future scrutiny &#8212; they are accumulating liabilities that cannot be unwound once political thresholds are crossed.</strong></p>]]></content:encoded></item><item><title><![CDATA[Podcast Interview: Access Hub]]></title><description><![CDATA[My latest appearance on the Access Hub podcast to the world of illicit finance and the growing global threat it poses]]></description><link>https://www.btl-research.com/p/podcast-interview-access-hub</link><guid isPermaLink="false">https://www.btl-research.com/p/podcast-interview-access-hub</guid><dc:creator><![CDATA[Adam Rousselle]]></dc:creator><pubDate>Wed, 04 Feb 2026 16:53:35 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!a_yd!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d25fb2b-b802-46c0-a6bf-95c89792c382_1106x1104.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>I recently appeared on the <a href="https://www.accesshub.space/">Access Hub</a> podcast to talk about my recent work. Thanks again to Omkar Nikam for reaching out. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!a_yd!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d25fb2b-b802-46c0-a6bf-95c89792c382_1106x1104.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!a_yd!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d25fb2b-b802-46c0-a6bf-95c89792c382_1106x1104.png 424w, https://substackcdn.com/image/fetch/$s_!a_yd!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d25fb2b-b802-46c0-a6bf-95c89792c382_1106x1104.png 848w, https://substackcdn.com/image/fetch/$s_!a_yd!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d25fb2b-b802-46c0-a6bf-95c89792c382_1106x1104.png 1272w, https://substackcdn.com/image/fetch/$s_!a_yd!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d25fb2b-b802-46c0-a6bf-95c89792c382_1106x1104.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!a_yd!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d25fb2b-b802-46c0-a6bf-95c89792c382_1106x1104.png" width="1106" height="1104" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7d25fb2b-b802-46c0-a6bf-95c89792c382_1106x1104.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1104,&quot;width&quot;:1106,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1036754,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.btl-research.com/i/186878628?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d25fb2b-b802-46c0-a6bf-95c89792c382_1106x1104.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!a_yd!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d25fb2b-b802-46c0-a6bf-95c89792c382_1106x1104.png 424w, https://substackcdn.com/image/fetch/$s_!a_yd!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d25fb2b-b802-46c0-a6bf-95c89792c382_1106x1104.png 848w, https://substackcdn.com/image/fetch/$s_!a_yd!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d25fb2b-b802-46c0-a6bf-95c89792c382_1106x1104.png 1272w, https://substackcdn.com/image/fetch/$s_!a_yd!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d25fb2b-b802-46c0-a6bf-95c89792c382_1106x1104.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>Part I:</strong> </p><div id="youtube2-Cgacz25opXs" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;Cgacz25opXs&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/Cgacz25opXs?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p><strong>Part II:</strong> </p><div id="youtube2-SPztw6ynZGs" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;SPztw6ynZGs&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/SPztw6ynZGs?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div>]]></content:encoded></item><item><title><![CDATA[Understanding Unregulated Capital Outflows Is Essential in Predicting Tomorrow's Threats]]></title><description><![CDATA[The Financial Mechanics Behind the Modern Threat Landscape]]></description><link>https://www.btl-research.com/p/understanding-unregulated-capital</link><guid isPermaLink="false">https://www.btl-research.com/p/understanding-unregulated-capital</guid><dc:creator><![CDATA[Adam Rousselle]]></dc:creator><pubDate>Tue, 27 Jan 2026 19:50:53 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Krmp!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb08c3f8-cec8-4b8f-9a02-fdd1a3b1e8bb_1750x984.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Author&#8217;s Note: </p><blockquote><p><em>This piece is more technical than much of my prior work. It is intended as a conceptual and analytical framework rather than a narrative essay, and is written for readers interested in understanding the structural mechanics of unregulated capital flows and their downstream security implications.</em></p><p><em>I am publishing it openly in the belief that clearer analytical tools are necessary if institutions are to anticipate and disrupt emerging threats more effectively. Readers who find this work useful, or who are working on related problems, are welcome to contact me directly at info@btl-research.com.</em></p></blockquote><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Krmp!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb08c3f8-cec8-4b8f-9a02-fdd1a3b1e8bb_1750x984.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Krmp!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb08c3f8-cec8-4b8f-9a02-fdd1a3b1e8bb_1750x984.png 424w, https://substackcdn.com/image/fetch/$s_!Krmp!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb08c3f8-cec8-4b8f-9a02-fdd1a3b1e8bb_1750x984.png 848w, https://substackcdn.com/image/fetch/$s_!Krmp!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb08c3f8-cec8-4b8f-9a02-fdd1a3b1e8bb_1750x984.png 1272w, https://substackcdn.com/image/fetch/$s_!Krmp!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb08c3f8-cec8-4b8f-9a02-fdd1a3b1e8bb_1750x984.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Krmp!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb08c3f8-cec8-4b8f-9a02-fdd1a3b1e8bb_1750x984.png" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/bb08c3f8-cec8-4b8f-9a02-fdd1a3b1e8bb_1750x984.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:937309,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.btl-research.com/i/185993083?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb08c3f8-cec8-4b8f-9a02-fdd1a3b1e8bb_1750x984.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Krmp!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb08c3f8-cec8-4b8f-9a02-fdd1a3b1e8bb_1750x984.png 424w, https://substackcdn.com/image/fetch/$s_!Krmp!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb08c3f8-cec8-4b8f-9a02-fdd1a3b1e8bb_1750x984.png 848w, https://substackcdn.com/image/fetch/$s_!Krmp!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb08c3f8-cec8-4b8f-9a02-fdd1a3b1e8bb_1750x984.png 1272w, https://substackcdn.com/image/fetch/$s_!Krmp!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb08c3f8-cec8-4b8f-9a02-fdd1a3b1e8bb_1750x984.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>In work published over the past several months, I have emphasized that unregulated capital flows I term &#8220;shadow liquidity&#8221; consistently manifest as powerful downstream threats. Whether terrorist groups in Sub-Saharan Africa leveraging illicit networks to smuggle resources and procure weapons, or scam centers and drug cartels exploiting complex liquidity architectures, the global shadow financial ecosystem has become markedly more dangerous.</p><p>I developed a three-tier framework to explain how these parallel financial architectures operate and why they generate persistent downstream harm. Tier 2 consists of a vast layer of globally connected financial intermediaries that move value outside formal legal and regulatory oversight. <strong>Tier 3</strong> sits downstream of these flows and includes criminal organizations, militant groups, and terrorist networks that exploit Tier 2 infrastructure to finance operations and project predation and violence.</p><p>Tier 1 is where the threat ultimately originates. At this level, large pools of wealth&#8212;often held by corrupt officials, politically exposed persons, and other elites in tightly controlled capital markets&#8212;seek to externalize assets to safer jurisdictions. This demand for offshore mobility creates the economic foundation for Tier 2 networks, which are then leveraged by Tier 3 actors, with or without direct state involvement.</p><p>These dynamics likely involve <strong>hundreds of billions of dollars annually</strong>, much of which fuels instability, entrenches criminal economies, and contributes to the impoverishment and coercion of millions of people worldwide. In recent work for the New Lines Institute, I documented how militarized <a href="https://newlinesinstitute.org/global-security-mil-priorities/chinese-shadow-liquidity-and-the-scam-economy/">scam syndicates </a>in Southeast Asia and Latin American <a href="https://newlinesinstitute.org/global-security-mil-priorities/china-cartel-nexus-the-liquidity-architecture-transforming-the-global-drug-economy/">drug cartels</a> (Tier 3) tap into Tier 2 infrastructure that moves billions of dollars annually in response to Tier 1 demand originating in the tightly controlled Chinese capital market. My most recent work for <em>Between the Lines</em> shows how <a href="https://www.btl-research.com/p/from-resilience-to-extraction-how">Iran leverages</a> a similar three-tiered structure to finance its proxy networks and externalize elite wealth.</p><p>Each of these systems is <strong>inherently destabilizing</strong>, not only for downstream societies targeted by criminal and militant activity, but also for the states at the origin point, where capital flight erodes economic resilience and governance over time. For this reason, understanding the origin of unregulated capital flows at Tier 1 is imperative for global security.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!j5m8!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88f20b90-4197-442a-b45c-1e48154cb028_1094x1054.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!j5m8!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88f20b90-4197-442a-b45c-1e48154cb028_1094x1054.png 424w, https://substackcdn.com/image/fetch/$s_!j5m8!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88f20b90-4197-442a-b45c-1e48154cb028_1094x1054.png 848w, https://substackcdn.com/image/fetch/$s_!j5m8!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88f20b90-4197-442a-b45c-1e48154cb028_1094x1054.png 1272w, https://substackcdn.com/image/fetch/$s_!j5m8!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88f20b90-4197-442a-b45c-1e48154cb028_1094x1054.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!j5m8!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88f20b90-4197-442a-b45c-1e48154cb028_1094x1054.png" width="1094" height="1054" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/88f20b90-4197-442a-b45c-1e48154cb028_1094x1054.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1054,&quot;width&quot;:1094,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:224744,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.btl-research.com/i/185993083?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88f20b90-4197-442a-b45c-1e48154cb028_1094x1054.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!j5m8!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88f20b90-4197-442a-b45c-1e48154cb028_1094x1054.png 424w, https://substackcdn.com/image/fetch/$s_!j5m8!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88f20b90-4197-442a-b45c-1e48154cb028_1094x1054.png 848w, https://substackcdn.com/image/fetch/$s_!j5m8!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88f20b90-4197-442a-b45c-1e48154cb028_1094x1054.png 1272w, https://substackcdn.com/image/fetch/$s_!j5m8!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88f20b90-4197-442a-b45c-1e48154cb028_1094x1054.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>The three-tier framework illustrates how unregulated capital flight and its facilitators at Tier 1 and Tier 2 translate into downstream criminal and militant threats at Tier 3.</em></p><h2>Unprecedented Speed</h2><p>This danger is magnified by the unprecedented speed at which unregulated wealth now moves. Since the collapse of Bretton Woods in the early 1970s, global finance has become increasingly interconnected, with cross-jurisdictional transfers occurring in hours&#8212;or seconds&#8212;rather than days or weeks. Compliance and enforcement frameworks remain largely reactive, disproportionately focused on individual transactional disruption rather than sustained action against underlying networks, ownership, and control structures. The proliferation of shell corporations and offshore banking has further obscured attribution and accountability, while crypto-based decentralized financial systems introduce parallel liquidity channels that operate largely outside the regulatory assumptions underpinning the modern financial order.</p><p>Over the past decade, the consequences of these dynamics have become severe and self-reinforcing. Armed militant groups sustained by global shadow liquidity from <a href="https://thediplomat.com/2024/11/chinese-demand-for-rosewood-empowers-some-of-africas-deadliest-terrorist-groups/">resource theft</a> and <a href="https://www.atlanticcouncil.org/blogs/africasource/the-sahel-is-now-an-epicenter-of-drug-smuggling-that-is-terrible-news-for-everyone/">drug trafficking</a> have destabilized large swaths of the Sahel. Industrial-scale scam operations in Southeast Asia and parts of Africa rely on coerced labor, embedding vulnerable populations in criminal economies that <a href="https://www.fdd.org/analysis/2026/01/14/made-in-china-paid-by-seniors-stopping-the-surge-of-international-scams/">prey disproportionately</a> on the elderly in aging industrial societies. Other multinational laundering networks sustain transnational cartels that <a href="https://newlinesinstitute.org/global-security-mil-priorities/china-cartel-nexus-the-liquidity-architecture-transforming-the-global-drug-economy/">distribute lethal products</a> while recycling billions in illicit proceeds.</p><p>In both underregulated jurisdictions and advanced economies, the downstream effects are increasingly visible: criminalized local ecosystems, degraded infrastructure, housing market distortion, and the erosion of demographic resilience essential to long-term social stability.</p><p>If left unchecked, these illicit flows have the power to destabilize and degrade modern life at a systemic level. For this reason, network-level disruption&#8212;not merely transactional interdiction&#8212;is imperative.</p><h2><strong>Toward Networked Disruption</strong></h2><p>Regulators and enforcement professionals are beginning to grapple with the scope of the challenge. Financial institutions, insurers, manufacturers, and other exposed sectors have devoted increasing resources to understanding global financial risk, giving rise to specialized internal teams and a growing ecosystem of external advisory firms of uneven quality. Enforcement authorities have also come to rely more heavily on the emerging blockchain analytics sector, but often as a partial substitute for deeper structural investigation. </p><p>For criminal organizations and malign state actors, blockchain has proven to be a double-edged sword. While it enables near-instantaneous, low-friction value transfer across jurisdictions, the permanent recording of transactions on public ledgers creates cumulative exposure once investigators begin reconstructing networks. Advances in machine learning and artificial intelligence &#8211; as I chronicled for an <a href="https://gnet-research.org/2025/10/24/closing-the-enforcement-gap-ai-illicit-liquidity-and-the-next-phase-of-counter-terrorist-finance/">October article</a> at GNET &#8211; have further accelerated the ability to cluster, trace, and contextualize these datapoints at scale, offering meaningful advantages over traditional investigative methods.</p><p>Regulatory efforts to bring key enablers&#8212;such as <a href="https://www.congress.gov/bill/119th-congress/senate-bill/1582/text">stablecoins</a>&#8212;more fully within existing compliance frameworks are a necessary step forward. But transactional visibility and downstream disruption alone are insufficient. Achieving durable, network-level impact in a way that meaningfully improves global security requires a deeper understanding of how unregulated capital forms, aggregates, and moves at its source&#8212;before it is laundered, weaponized, or embedded into resilient criminal and state-aligned illicit infrastructures.</p><h2><strong>Why Timing Capital Outflows Is Essential</strong></h2><p>Understanding why timing matters requires close examination of where unregulated capital flows originate. In an increasingly polarized global financial environment, states seeking to operate outside the dollar-denominated system&#8212;often due to sanctions or anticipation of future sanctions&#8212;have enabled parallel financial architectures to sustain economic activity.</p><p>When these systems function as intended, they pull liquidity inward toward core institutions &#8211; especially central banks &#8211; reinforcing local currencies and supporting essential state functions under stress conditions such as wartime sanctions. As long as confidence holds, capital movement within these systems remains predominantly centripetal, stabilizing rather than eroding the domestic financial base.</p><p>But opacity of these parallel systems is both a feature and a fault. Because they are unaccountable by design&#8212;even to the states that authorize them&#8212;these systems enable insiders to quietly extract and offshore wealth. When confidence begins to fracture, elite incentives shift rapidly. Pressure to externalize capital compounds, transforming inward-facing financial mechanisms into outward-facing extraction channels. At this inflection point, operators increasingly seek offshore liquidity through any available means, including partnerships with transnational criminal networks and, in some cases, the financing of terrorism. When the financing of other states or proxy groups through these opaque networks becomes a state directive, the rate of elite pilfering often accelerates, as illicit capital movement is shielded by national security justifications and subjected to even less internal oversight.</p><p>Importantly, Tier 2 capacity is not unlimited. As unregulated capital outflows accelerate, intermediary networks can become congested, creating observable bottlenecks before capital fully disperses downstream. In several recent cases, unusually large pools of digital assets appear to have stalled within intermediary structures rather than being rapidly laundered onward, suggesting constraints in conversion, layering, or off-ramping capacity.</p><p>One widely reported example involves Prince Group, which has been linked in open-source reporting to the custody of a <a href="http://google.com/search?q=prince+group+seizure&amp;rlz=1C5CHFA_enCA1038CA1039&amp;oq=prince+group+seizu&amp;gs_lcrp=EgZjaHJvbWUqCggAEAAYxwMYgAQyCggAEAAYxwMYgAQyBggBEEUYQDIGCAIQRRg5MgoIAxAAGIAEGKIEMgoIBBAAGIAEGKIEMgcIBRAAGO8FMgoIBhAAGIAEGKIEMgoIBxAAGIAEGKIE0gEIMjY3NWowajmoAgGwAgHxBSF3k8V84jSc&amp;sourceid=chrome&amp;ie=UTF-8">multibillion-dollar </a>bitcoin balance. Regardless of ultimate attribution or intent, the scale and persistence of such holdings are difficult to explain by benign delay alone. More plausibly, they reflect saturation at the Tier 2 level&#8212;where capital has exited its origin environment but cannot yet be safely or efficiently absorbed into downstream structures.</p><p>Such congestion is analytically significant. It indicates that Tier 1 outflows are already stressing intermediary networks, even before full centrifugal dynamics take hold. For analysts and enforcement bodies, these stalled pools may therefore function as early warning indicators of impending cascade behavior rather than isolated anomalies.</p><p>This dynamic is already visible across multiple jurisdictions. Unregulated capital outflows from China are enabling multibillion-dollar transnational scam networks, casino-based laundering nodes, and drug trafficking organizations. Opaque outflows from Iran provide direct financial services to proxy groups and, indirectly, to terrorist organizations operating beyond Tehran&#8217;s stated strategic interests, including al-Qaeda-aligned actors in Somalia. Russia, meanwhile, relies on opaque financial channels to source physical gold and sanctioned inputs through criminal facilitators and private military companies operating abroad, sustaining its war effort under mounting external pressure.</p><p>When systemic trust in these environments deteriorates, capital outflow pressures compound. Iran&#8217;s parallel systems have already shifted into a centrifugal phase of capital flight, one likely to generate escalating downstream threats as stress persists. Russia continues to attract liquidity inward, but sustained trade contraction and reserve drawdowns increase the risk of a similar inflection. China, while still appearing stable on paper, has experienced persistent capital leakage for several years&#8212;producing some of the most severe downstream criminal and security effects observed to date.</p><p>These systems are inherently brittle. The strategic question is not whether they will fracture, but when. Once that threshold is crossed, vast pools of liquidity move rapidly through opaque channels that intersect with criminal and militant actors, producing destabilizing effects that are difficult to reverse. Understanding when these outflows are likely to accelerate&#8212;and at what scale&#8212;is therefore essential to planning any form of pre-emptive, network-level disruption of illicit liquidity systems.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!VEyG!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38e4d497-7c20-4161-9388-1101a6adf2f5_1688x1276.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!VEyG!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38e4d497-7c20-4161-9388-1101a6adf2f5_1688x1276.png 424w, https://substackcdn.com/image/fetch/$s_!VEyG!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38e4d497-7c20-4161-9388-1101a6adf2f5_1688x1276.png 848w, https://substackcdn.com/image/fetch/$s_!VEyG!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38e4d497-7c20-4161-9388-1101a6adf2f5_1688x1276.png 1272w, https://substackcdn.com/image/fetch/$s_!VEyG!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38e4d497-7c20-4161-9388-1101a6adf2f5_1688x1276.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!VEyG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38e4d497-7c20-4161-9388-1101a6adf2f5_1688x1276.png" width="1456" height="1101" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/38e4d497-7c20-4161-9388-1101a6adf2f5_1688x1276.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1101,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:131194,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.btl-research.com/i/185993083?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38e4d497-7c20-4161-9388-1101a6adf2f5_1688x1276.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!VEyG!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38e4d497-7c20-4161-9388-1101a6adf2f5_1688x1276.png 424w, https://substackcdn.com/image/fetch/$s_!VEyG!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38e4d497-7c20-4161-9388-1101a6adf2f5_1688x1276.png 848w, https://substackcdn.com/image/fetch/$s_!VEyG!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38e4d497-7c20-4161-9388-1101a6adf2f5_1688x1276.png 1272w, https://substackcdn.com/image/fetch/$s_!VEyG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38e4d497-7c20-4161-9388-1101a6adf2f5_1688x1276.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>A simplified diagram of centripetal vs. centrifugal liquidity flows through unregulated Tier 2 channels. </em></p><h2><strong>Understanding Capital Logic</strong></h2><p>In a post&#8211;Bretton Woods system, dollar-denominated capital tends to concentrate in jurisdictions that offer:</p><ul><li><p>Credible protection of property rights through predictable legal and regulatory institutions</p></li><li><p>Stable, transparent, and non-punitive tax regimes</p></li><li><p>Deep, liquid, and internationally integrated financial systems</p></li><li><p>Political and currency stability sufficient to preserve real value</p></li><li><p>Credible exit optionality, allowing capital to move without arbitrary restriction or penalty</p></li><li><p>Broad-based asset appreciation that rewards passive capital over time</p></li></ul><p>These conditions largely explain why, over the past fifty years, global wealth has been reinvested disproportionately into Western financial markets&#8212;particularly the <a href="https://www.institutionalinvestor.com/article/2dx6hsx6ifqynskb7oav4/corner-office/most-of-the-worlds-assets-continue-to-flow-to-north-america">United States</a>, which combines deep capital markets with unmatched legal and currency credibility.</p><p>In highly controlled jurisdictions with adversarial or semi-adversarial relationships to Washington&#8212;such as China, Russia, and Iran&#8212;capital behavior is governed by a different logic. In these systems, <em>jurisdictional prudence</em> becomes a critical X-factor shaping whether capital remains onshore or seeks exit.</p><p>In such environments, capital can rationally remain domestic despite restrictive controls if two conditions hold:</p><ul><li><p>The domestic economy continues to offer returns that exceed the cumulative cost and risk of outward transfer</p></li><li><p>Regime behavior remains bounded and predictable, such that capital faces managed exposure rather than sudden or arbitrary appropriation</p></li></ul><p>Where these conditions are met, capital inertia is often the rational outcome&#8212;even in jurisdictions that lack many of the features typically associated with capital-attracting environments. But when these conditions go away, typically as a feature of economic downturns borne of deep structural flaws, capital takes flight, even at enormous cost to its owners. However, the adoption of cryptocurrencies, including central bank digital currencies, reduces the cost and increases the speed of capital mobility, reducing the time it takes for downstream threats to manifest.</p><p>There is no universal formula for precisely timing or quantifying Tier 1 capital outflows. What is increasingly clear, however, is that the velocity of modern unregulated finance causes downstream threat formation to accelerate rapidly once cascading dynamics are triggered. Conventional country risk frameworks have consistently misread these systems as more stable than they are by ignoring the behavior of elite capital under stress. Effective security intervention therefore depends on identifying and disrupting Tier 1 outflows before they metastasize into downstream criminal and militant activity.</p><h2><strong>A mathematical simplification</strong></h2><p>I have formalized this logic into a simple decision rule governing capital outflows from tightly controlled jurisdictions. The formulation builds on John T. Cuddington&#8217;s 1986 treatment of capital flight as a <a href="https://ies.princeton.edu/pdf/S58.pdf">portfolio response</a>, updated to reflect the substantially lower costs and reduced barriers to entry created by contemporary Tier 2 facilitators. </p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!O69C!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7dd82b4-f2bb-4d29-8d96-ec402a9af21a_584x218.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!O69C!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7dd82b4-f2bb-4d29-8d96-ec402a9af21a_584x218.png 424w, https://substackcdn.com/image/fetch/$s_!O69C!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7dd82b4-f2bb-4d29-8d96-ec402a9af21a_584x218.png 848w, https://substackcdn.com/image/fetch/$s_!O69C!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7dd82b4-f2bb-4d29-8d96-ec402a9af21a_584x218.png 1272w, https://substackcdn.com/image/fetch/$s_!O69C!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7dd82b4-f2bb-4d29-8d96-ec402a9af21a_584x218.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!O69C!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7dd82b4-f2bb-4d29-8d96-ec402a9af21a_584x218.png" width="584" height="218" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b7dd82b4-f2bb-4d29-8d96-ec402a9af21a_584x218.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:218,&quot;width&quot;:584,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;A black text on a white background\n\nAI-generated content may be incorrect.&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="A black text on a white background

AI-generated content may be incorrect." title="A black text on a white background

AI-generated content may be incorrect." srcset="https://substackcdn.com/image/fetch/$s_!O69C!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7dd82b4-f2bb-4d29-8d96-ec402a9af21a_584x218.png 424w, https://substackcdn.com/image/fetch/$s_!O69C!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7dd82b4-f2bb-4d29-8d96-ec402a9af21a_584x218.png 848w, https://substackcdn.com/image/fetch/$s_!O69C!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7dd82b4-f2bb-4d29-8d96-ec402a9af21a_584x218.png 1272w, https://substackcdn.com/image/fetch/$s_!O69C!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7dd82b4-f2bb-4d29-8d96-ec402a9af21a_584x218.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p>In this formulation, <strong>Rd</strong> denotes the expected return on domestic assets, adjusted for political and regime risk. This adjustment, <strong>A</strong>, captures the probability and severity of arbitrary state intervention, expropriation, capital freezes, or discretionary enforcement that reduces the effective value of onshore wealth.</p><p><strong>Ro</strong> denotes the expected return available in offshore jurisdictions, reflecting both asset performance and institutional credibility abroad. The term <strong>C</strong> represents the cumulative cost of externalization, including capital controls, transaction and intermediary fees, time delays, enforcement exposure, and operational risk associated with moving capital across borders.</p><p>Capital remains onshore when the risk-adjusted domestic return (<strong>Rd minus A</strong>) exceeds the offshore alternative net of externalization costs (<strong>Ro minus C</strong>). Capital flight becomes the rational outcome once this inequality reverses.</p><p>Technologies that reduce transfer friction&#8212;most notably cryptocurrencies and related settlement infrastructures&#8212;operate by lowering <strong>C</strong>, thereby compressing the time between deteriorating domestic conditions and large-scale capital outflows and accelerating the emergence of downstream threats.</p><h2><strong>Bridging the siloes</strong></h2><p>One of the primary reasons these dynamics continue to be misread is that the systems responsible for monitoring finance, trade, sanctions, and security risk remain analytically siloed. Capital flight is treated as a macroeconomic concern. Trade distortions are assessed separately from illicit finance. Criminal and militant threats are examined downstream, long after the financial conditions that enable them have already taken shape.</p><p>This fragmentation obscures the timing problem at the center of modern illicit liquidity. By the time financial and/or political instability registers in conventional economic indicators&#8212;or downstream threats become visible to security services&#8212;the critical window for upstream intervention has often already closed as Tier 2 intermediaries have scaled. Capital has dispersed. Criminal and militant actors have embedded themselves into resilient networks that are costly and difficult to unwind.</p><p>Bridging these siloes is therefore not a matter of institutional reorganization, but of analytical integration. Understanding when and how Tier 1 capital begins to externalize&#8212;across financial, trade, and geopolitical domains simultaneously&#8212;is essential to disrupting Tier 2 networks before they mature and preventing downstream threats from metastasizing at scale.</p><h2><strong>Conclusion</strong></h2><p>Modern illicit liquidity systems move faster than the frameworks built to monitor them. As capital mobility accelerates and parallel financial architectures grow more opaque, downstream threats will continue to emerge faster than reactive enforcement can contain them.</p><p>The central challenge is no longer attribution after the fact, but anticipation. Identifying when Tier 1 capital begins to externalize&#8212;how quickly it moves, where it encounters friction, and when intermediary capacity begins to saturate&#8212;has become the decisive variable in preventing the downstream consolidation of criminal and militant power.</p><p>Meeting this challenge requires analytical integration across finance, trade, sanctions, and security domains. Without that integration, institutions will continue to misread stability, intervene too late, and confront threats only after they have embedded themselves into resilient networks.</p>]]></content:encoded></item><item><title><![CDATA[From Resilience to Extraction: How Iran’s Shadow Financial Systems Are Hollowing Out the State]]></title><description><![CDATA[A Three-Tier Model of Sanctions Resilience and Capital Flight]]></description><link>https://www.btl-research.com/p/from-resilience-to-extraction-how</link><guid isPermaLink="false">https://www.btl-research.com/p/from-resilience-to-extraction-how</guid><dc:creator><![CDATA[Adam Rousselle]]></dc:creator><pubDate>Fri, 09 Jan 2026 20:56:54 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!PySj!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09402ebf-c07c-4647-bb4c-fbe5c19310f8_677x451.avif" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!PySj!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09402ebf-c07c-4647-bb4c-fbe5c19310f8_677x451.avif" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!PySj!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09402ebf-c07c-4647-bb4c-fbe5c19310f8_677x451.avif 424w, https://substackcdn.com/image/fetch/$s_!PySj!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09402ebf-c07c-4647-bb4c-fbe5c19310f8_677x451.avif 848w, https://substackcdn.com/image/fetch/$s_!PySj!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09402ebf-c07c-4647-bb4c-fbe5c19310f8_677x451.avif 1272w, https://substackcdn.com/image/fetch/$s_!PySj!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09402ebf-c07c-4647-bb4c-fbe5c19310f8_677x451.avif 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!PySj!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09402ebf-c07c-4647-bb4c-fbe5c19310f8_677x451.avif" width="677" height="451" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/09402ebf-c07c-4647-bb4c-fbe5c19310f8_677x451.avif&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:451,&quot;width&quot;:677,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:22046,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/avif&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.btl-research.com/i/184063318?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09402ebf-c07c-4647-bb4c-fbe5c19310f8_677x451.avif&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!PySj!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09402ebf-c07c-4647-bb4c-fbe5c19310f8_677x451.avif 424w, https://substackcdn.com/image/fetch/$s_!PySj!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09402ebf-c07c-4647-bb4c-fbe5c19310f8_677x451.avif 848w, https://substackcdn.com/image/fetch/$s_!PySj!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09402ebf-c07c-4647-bb4c-fbe5c19310f8_677x451.avif 1272w, https://substackcdn.com/image/fetch/$s_!PySj!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09402ebf-c07c-4647-bb4c-fbe5c19310f8_677x451.avif 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Protests have erupted across multiple Iranian cities, with demonstrators chanting &#8220;death to the dictator.&#8221; Such unrest is not new: major waves occurred in 2009, 2017&#8211;2018, and 2022&#8211;2023. What appears different in the current cycle is its socioeconomic base. Reporting suggests mobilization began in poorer and working-class communities that have historically provided key regime support, before extending into more familiar youth dissident ranks. This pattern points to economic stress as the primary catalyst for the current wave of unrest.</p><p>Iran&#8217;s economic deterioration has sharpened the underlying drivers of these ongoing protests. Inflation and currency depreciation have eroded purchasing power, while chronic underinvestment has compounded basic-service failures, including acute <a href="https://e360.yale.edu/features/iran-water-drought-dams-qanats">water stress</a>. With limited fiscal room to stabilize living conditions at scale, the state has increasingly relied on coercive containment&#8212;reinforcing incentives for households and elites alike to externalize wealth.</p><p>Iran&#8217;s accelerating economic crisis is not solely the product of sanctions or mismanagement. It is increasingly driven by capital flight embedded within the same networks initially developed to foster state resilience&#8212;networks that now operate beyond effective control. Under pressure, opaque networks built for sanctions resilience and regional power projection now function as conduits for capital flight.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.btl-research.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.btl-research.com/subscribe?"><span>Subscribe now</span></a></p><h2><strong>A siege economy overseen by a multidimensional security actor</strong></h2><p>Iran is among the world&#8217;s most <a href="https://www.state.gov/iran-sanctions">heavily sanctioned</a> states, and has been for nearly five decades, severely constraining its access to formal financial systems and conventional trade finance. To function, the Iranian state and economy rely on a fragmented but resilient ecosystem of informal, semi-formal, and illicit channels to sustain trade, preserve value, and maintain currency stability.</p><p>Within this environment, the <a href="https://www.csis.org/analysis/irans-revolutionary-guards-al-quds-force-and-other-intelligence-and-paramilitary-forces">Islamic Revolutionary Guard Corps</a> (IRGC)&#8212;a multiservice institution with paramilitary, intelligence, and economic roles&#8212;has emerged as a central coordinating actor. While not the sole driver of sanctions evasion, the IRGC plays a critical role in <a href="https://home.treasury.gov/news/press-releases/sb0248#:~:text=13224%2C%20as%20amended%2C%20and%20marks,and%20other%20sanctioned%20Iranian%20entities.">overseeing and stabilizing</a> the networks that enable Iran to operate under prolonged economic pressure. The Quds Force, IRGC&#8217;s elite external operations arm, oversees these foreign facing networks.</p><p>These networks include <a href="https://home.treasury.gov/news/press-releases/sb0341">shadow tanker</a> fleets moving discounted Iranian crude to global markets, procurement channels sourcing dual-use components for domestic <a href="https://home.treasury.gov/news/press-releases/sb0270">weapons production</a>, and <a href="https://www.ifmat.org/03/09/shipping-companies-regional/">trade and logistics</a> firms facilitating the movement of high-value commodities such as <a href="https://www.iranintl.com/en/202212124467">physical gold</a>, and <a href="https://www.fincen.gov/news/news-releases/fincen-identifies-9-billion-iranian-shadow-banking-activity-2024">informal financial</a> institutions. In several cases, Iranian proxy organizations participate directly in these systems, often in exchange for financing, logistical support, or political backing facilitated by the IRGC.</p><p>For example, Hezbollah-linked networks in Venezuela have participated in <a href="https://www.iranintl.com/en/202212124467">gold smuggling</a> operations connected to Venezuelan supply chains, while <a href="https://home.treasury.gov/news/press-releases/sb0174">Houthi-linked</a> facilitators have played roles in brokering oil shipments to <a href="https://www.state.gov/sanctioning-entities-purchasing-and-transporting-iranian-oil-to-further-impose-maximum-pressure-on-iran">independent refiners</a> in China. Across these pathways, IRGC-affiliated actors frequently provide coordination, protection, or logistical oversight, giving them visibility into &#8212; and influence over &#8212; critical flows of capital and goods.</p><p>By anchoring these networks, the Quds Force does not merely facilitate sanctions evasion; it effectively underwrites the movement of value into and out of the Iranian economy. This role has helped sustain economic functionality under extreme external pressure &#8211; driving export revenue and necessary imports while arming regional proxies &#8211; but it has also enabled significant capital outflows. In this sense, the Quds Force operates not only as a military or intelligence institution, but as a central node in Iran&#8217;s siege-economy infrastructure &#8212; one that governs access, risk, and continuity across otherwise fragmented financial and trade networks. Because these networks operate through opaque and compartmentalized channels, and because the IRGC ultimately answers only to the Supreme Leader - an 86-year-old man who frequently avoids the spotlight amid health speculations - they are structurally vulnerable to elite capture and internal rent-seeking.</p><p>Within Iran, the broader IRGC organization has consolidated control over much of the domestic economy. Companies such as <a href="https://www.janes.com/osint-insights/defence-and-national-security-analysis/the-sources-of-iran-irgc-financial-empire-and-their-sustainability-in-the-medium-to-long-term">Khatam al-Anbiya</a>, an IRGC-linked engineering firm, have vast interests across the Iranian economy ranging from fuels and hydrocarbons to agriculture, mining, real estate, and infrastructure. IRGC functionaries have even <a href="https://www.washingtonpost.com/world/2025/08/06/iran-economy-irgc-divar-armandehi/">intervened to prevent</a> a major tech company from going public last year, presumably as a means of managing control over it. Major defense contractors such as <a href="https://home.treasury.gov/news/press-releases/jy1104">Shahed Aviation</a> &#8211; responsible for Iran&#8217;s Shahed drone program &#8211; also fall under the control of the IRGC&#8217;s vast portfolio of domestic assets.</p><p>The IRGC also captures a large share of state spending through defense and infrastructure procurement. Estimates suggest it receives roughly 34% of total <a href="https://www.fdd.org/analysis/op_eds/2024/10/29/irans-military-budget-is-growing-what-does-that-mean-for-the-middle-east/#:~:text=Iran%20has%20increased%20its%20defense,set%20to%20reach%20$16.7b.">military expenditure</a>, which rose sharply in 2025 (to <a href="https://iranopendata.org/en/article/iran-defense-budget-2025-soars-35-percent/">an estimated</a> $23.1 billion). Given the IRGC&#8217;s influence over key suppliers and contractors, a significant portion of this spending flows into opaque channels it controls.</p><p>Taken together, these dynamics form the architecture of a vertically integrated siege economy. The broader IRGC consolidates and captures liquidity domestically through control of procurement, infrastructure, defense production, and budgetary flows, while the Quds Force manages the external channels that move value across borders, absorb sanctions risk, and interface with deniable networks. Under conditions of sustained pressure, this division of labor preserves regime functionality but also facilitates capital flight, as assets accumulated within the domestic system are routed outward through opaque, compartmentalized pathways beyond effective oversight.</p><h1><strong>Stress Test Conditions</strong></h1><p>Iran&#8217;s economic system is undergoing a sustained stress test shaped by three converging pressures: intensifying sanctions, escalating regional conflict with Israel, and accelerating capital flight. The latter of these has been enabled by informal financial mechanisms and weak regulatory enforcement, and comes in response to the former two. Together, these forces are pushing the country beyond episodic economic strain and toward a deeper crisis of economic governance, resulting in widespread capital flight and the erosion of monetary stability.</p><h3><em><strong>Regional Conflict, Military Costs, and Collapsing Revenue</strong></em></h3><p>The financial burden of Iran&#8217;s expanding regional confrontation has grown sharply. Analysts estimate that the country&#8217;s <a href="https://www.trtworld.com/article/334e2e1ae7a3">direct and indirect costs</a> from its recent 12-day conflict with Israel alone were $24 - $35 billion, a figure that does not account for the ongoing and open-ended costs of proxy warfare across Lebanon, Iraq, Syria, and Yemen. Even conservatively assessed, this level of expenditure represents a meaningful share of national output&#8212;exceeding 6% of GDP&#8212;at a time when Iran&#8217;s economy is <a href="https://www.iranintl.com/en/202601059822">already contracting</a> under sanctions pressure.</p><p>These military outlays are colliding with mounting stress on the state&#8217;s primary revenue base. Petroleum and mineral fuel exports&#8212;historically comprising over 30% of <a href="https://caspianpost.com/iran/iran-hits-new-oil-export-high-despite-sanctions-war#:~:text=Despite%20the%20introduction%20of%2014,same%20period%20a%20year%20earlier.">government revenue</a>, and some 80% of <a href="https://globaledge.msu.edu/countries/iran/economy">export earnings</a>&#8212;have come under increasing strain. Demand for Iranian crude has softened as <a href="https://www.reuters.com/business/energy/us-sanctions-china-refiners-over-iran-oil-disrupt-operations-sources-say-2025-05-08/">Chinese buyers</a> grow more cautious amid escalating foreign pressure and enforcement risk. Moreover, the discounted oil market became more saturated after 2022 as sanctioned Russian crude expanded supply, compressing margins.</p><p>Compounding these pressures, recent seizures of oil tankers linked to sanctioned networks&#8212;particularly off the Venezuelan coast&#8212;have cast doubt on the long-term viability of shadow tanker fleets. While <a href="https://www.iranintl.com/en/202601076231">some speculate</a> that Chinese buyers will purchase Iranian crude to make up for their recently disrupted Venezuelan supplies, this ongoing enforcement against shadow tanker fleets could further impact these shipments. With a Russian-flagged <a href="https://www.npr.org/2026/01/07/nx-s1-5669384/u-s-seizes-russian-flagged-oil-tanker-with-ties-to-venezuela">tanker seized</a> by US forces in the Atlantic on January 7, ship owners and crews may become unwilling to transport sanctioned oil supplies, especially amid questions of whether Chinese and Russian <a href="https://www.kpler.com/zh-sg/blog/maritime-compliance-landscape-shifting-reactive-predictive-2026">state-owned and shell company</a> insurers will cover losses from vessel seizures. These developments raise concerns that Iran could face a sharp disruption in export capacity as early as 2026, undermining one of the last remaining pillars of fiscal stability.</p><h3><em><strong>Weaponized Fintech: Digitalizing the Siege Economy</strong></em></h3><p>Under prolonged sanctions, Iran emerged as an early adopter of crypto and alternative <a href="https://www.reuters.com/business/finance/iran-makes-first-import-order-using-cryptocurrency-tasnim-2022-08-09/">digital payment systems</a> designed to bypass formal banking channels. What initially functioned as a tool of sanctions resilience has increasingly devolved into a dual-use financial infrastructure&#8212;supporting both <a href="https://www.coindesk.com/policy/2026/01/02/iran-accepts-cryptocurrency-as-payment-for-advanced-weapons">state procurement</a> and large-scale <a href="https://www.msn.com/en-us/money/economy/iran-s-currency-collapse-shows-why-bitcoin-is-seen-as-an-exit-option/ar-AA1TGhNO">capital outflows</a>. While crypto does not replace trade-based channels in volume, it compresses settlement time, reduces visibility, and lowers exit friction for elite capital flight.</p><p>Iran&#8217;s largest domestic exchange, Nobitex, illustrates this dynamic. Investigations by blockchain analytics firms have linked the platform to wallet clusters and transaction patterns consistent with <a href="https://www.elliptic.co/blog/inside-nobitex-how-irans-largest-crypto-exchange-fuels-sanctions-evasion-and-illicit-finance">IRGC-aligned</a> financial activity, suggesting that it functions not merely as a commercial exchange, but as a critical node within Iran&#8217;s cross-border sanctions-evasion architecture. These channels have reportedly been used to facilitate procurement of dual-use components for Iran&#8217;s drone and weapons programs, particularly where conventional trade finance is unavailable.</p><p>At the same time, this infrastructure has facilitated massive capital flight. Transaction data indicate that crypto outflows surged sharply during periods of heightened geopolitical tension&#8212;including a reported <a href="https://www.trmlabs.com/resources/blog/irans-crypto-economy-in-2025-declining-volumes-rising-tensions-and-shifting-trust">150 percent spike</a> in mid-2025 amid escalating confrontation with Israel&#8212;highlighting how digital financial tools simultaneously enhance regime resilience and accelerate elite asset externalization.</p><p>In this sense, fintech is the digital extension of Iran&#8217;s siege economy&#8212;one that further erodes state visibility, weakens monetary control, and compresses the boundary between sanctions evasion and private capital flight. As pressure on physical export channels has intensified, Iran&#8217;s reliance on non-physical and digitally mediated settlement mechanisms has increased in parallel. Without regulatory accountability, these digital channels give elites an unprecedented opportunity to hollow out the Iranian economy while their assets come under stress.</p><h3><em><strong>Capital Flight and Monetary Erosion</strong></em></h3><p>At the same time, capital flight has accelerated through informal channels operating beyond effective state oversight. In 2024, Iranian <a href="https://www.iranintl.com/en/202511078141">capital outflows</a> reached $20.7 billion, triple what they were in 2020: estimates for 2025 could place these at $36 billion, roughly 10% of GDP. These movements reflect not only popular distrust in the rial, but also growing elite efforts to externalize wealth amid political uncertainty, inflation, and deteriorating public services. Iran&#8217;s widespread adoption of crypto has become a dual-use enabler, allowing the regime to purchase critical components outside sanctions controls, but also permitting wealth to flow out of the country with minimal restriction &#8211; all through loosely regulated IRGC-managed channels.</p><p>The monetary and social consequences have been severe. Central bank assets have <a href="https://www.iranintl.com/en/202601061682">continued to decline</a> as the government increasingly relies on monetary expansion to cover rising debts and budget shortfalls created by falling export revenue. This dynamic has accelerated the <a href="https://www.iranintl.com/en/202601061682">depreciation of the rial</a>, fueled persistent inflation, and eroded household purchasing power.  Rising living costs&#8212;combined with structural stresses such as <a href="https://e360.yale.edu/features/iran-water-drought-dams-qanats">water mismanagement</a> and <a href="https://www.fdd.org/analysis/2025/11/10/tehrans-crisis-is-irans-reckoning/">infrastructure decay</a>&#8212;have triggered repeated <a href="https://www.cfr.org/expert-brief/unpacking-irans-protests-and-trumps-threats">protest waves</a>, further reinforcing elite incentives to offshore capital rather than reinvest domestically.</p><h3><em><strong>A Governance Crisis, Not a Liquidity Shock</strong></em></h3><p>What is emerging is not a temporary liquidity squeeze, but a deeper crisis of financial governance. The Iranian state increasingly struggles to manage the very systems it once used to project power, enforce political control, and buffer external pressure. Informal mechanisms that once enhanced resilience&#8212;shadow trade, opaque financial channels, and coercive enforcement&#8212;are now amplifying instability by enabling capital flight, weakening fiscal discipline, and reducing the state&#8217;s visibility over its own economic base.</p><p>Under these stress-test conditions, Iran&#8217;s economic challenge is no longer simply sanctions survival. It is the erosion of the state&#8217;s capacity to govern liquidity, allocate resources, and retain elite confidence&#8212;an imbalance that becomes progressively harder to correct the longer it persists.</p><h1><strong>Three-Tier Financial Architecture</strong></h1><p>Understanding Iran&#8217;s capital flight dynamics requires moving beyond linear models that separate state finance, sanctions evasion, and proxy activity into discrete domains. In practice, these functions are integrated through a three-tier financial architecture that deliberately separates control, mobility, and utilization of capital. This structure has enhanced Iran&#8217;s resilience under sanctions, but it has also accelerated elite capital flight. These factors externalize financial risk onto regional and global markets, and security risk into the broader global community.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!vW7c!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F653d9d14-efff-4845-b849-773e7b0ace96_1212x1080.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!vW7c!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F653d9d14-efff-4845-b849-773e7b0ace96_1212x1080.png 424w, https://substackcdn.com/image/fetch/$s_!vW7c!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F653d9d14-efff-4845-b849-773e7b0ace96_1212x1080.png 848w, https://substackcdn.com/image/fetch/$s_!vW7c!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F653d9d14-efff-4845-b849-773e7b0ace96_1212x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!vW7c!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F653d9d14-efff-4845-b849-773e7b0ace96_1212x1080.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!vW7c!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F653d9d14-efff-4845-b849-773e7b0ace96_1212x1080.png" width="1212" height="1080" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/653d9d14-efff-4845-b849-773e7b0ace96_1212x1080.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1080,&quot;width&quot;:1212,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:205656,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.btl-research.com/i/184063318?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F653d9d14-efff-4845-b849-773e7b0ace96_1212x1080.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!vW7c!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F653d9d14-efff-4845-b849-773e7b0ace96_1212x1080.png 424w, https://substackcdn.com/image/fetch/$s_!vW7c!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F653d9d14-efff-4845-b849-773e7b0ace96_1212x1080.png 848w, https://substackcdn.com/image/fetch/$s_!vW7c!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F653d9d14-efff-4845-b849-773e7b0ace96_1212x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!vW7c!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F653d9d14-efff-4845-b849-773e7b0ace96_1212x1080.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>A model of the three-tiered framework applied to Iran</em></p><h3><em><strong>Tier 1: Iran</strong></em></h3><p>At the apex of this system sits Tier 1, composed of state and private institutions, politically connected elites, and intermediaries who generate, authorize, or appropriate economic value. This tier includes state-linked corporations, import&#8211;export firms, and wealthy individuals with preferential access to foreign exchange, trade licenses, and protected commercial channels &#8211; all increasingly under the influence of the broader IRGC organization. Under sustained sanctions pressure, Tier 1 actors have increasingly <a href="https://ca.finance.yahoo.com/news/june-war-israel-iranians-seek-053014927.html?guccounter=1&amp;guce_referrer=aHR0cHM6Ly93d3cuZ29vZ2xlLmNvbS8&amp;guce_referrer_sig=AQAAAI7rW13coSNx0GqrS1cyGb3_5-6DoPdbdIf5v_6olbOxvSRKY6O_EElk9BkiNDoG5ULvLjQQhjmAQ2aQSH8un2kX-i7cRwnTDdClTAmFCOES9TEB5uR47tv8l1S_UuzxtGocOizPS45LOc4anbzLXcze2pyNOE2hwmCCoe7c7uZc">prioritized wealth preservation</a> over domestic reinvestment. Rather than functioning as anchors of economic stability, many now behave as rational extractors, externalizing capital while maintaining nominal alignment with the system.</p><p>Loosely regulated and opaque by design, this tier leaks much more liquidity out of the country than is sustainable under current stress conditions. This leakage creates downstream threats at the Tier 3 level. Importantly, this tier does not move capital efficiently on its own. It depends on Tier 2 intermediaries capable of operating in opaque environments where formal institutions cannot function.</p><h3><em><strong>Tier 2: IRGC-Quds Force-linked Networks</strong></em></h3><p>That intermediary role is fulfilled by Tier 2, the facilitation and mobility layer. This tier converts domestically constrained or politically sensitive value into mobile, sanctions-resilient capital. It encompasses logistics firms, ports, trade companies, crypto exchanges, and financial intermediaries that operate at the boundary between legality and informality. Within this layer, the IRGC-Quds Force plays a central structural role. Rather than acting as a universal operator, it functions as a guarantor of enforcement, protection, and continuity. Through its influence over logistics corridors, customs chokepoints, and security arrangements, it underwrites the reliability of transactions that would otherwise be too risky to sustain. As a result, Tier 2 infrastructure processes state funds, elite capital, and proxy-generated revenue through the same channels, blurring distinctions that once separated these streams.</p><p>Although not the sole agent, the Quds Force serves as the operational backbone of this layer, underwriting vast networks linked to domestic institutions such as logistics and trading firms as well as exchanges such as Nobitex. This shadow banking system extends to foreign brokers in places such as the <a href="https://home.treasury.gov/news/press-releases/sb0159">Persian Gulf</a> and <a href="https://home.treasury.gov/news/press-releases/sb0191">Hong Kong</a>: some of these run over the counter (OTC) crypto trading desks and many more are nodes in vast informal <a href="https://www.iranintl.com/en/202511273867">hawala networks</a> &#8211; all operating outside formal and regulated banking channels.</p><h3><em><strong>Tier 3: Proxies and other downstream threats</strong></em></h3><p>At the downstream end of the architecture sits Tier 3, composed of Iran&#8217;s proxies and other threat actors. Often mischaracterized as passive recipients of state financing, many of these groups now operate as semi-autonomous financial entities, enabled by Tier 2 facilitators. Through trade, logistics, smuggling, construction, and real estate activity, they circulate capital across regional markets and embed themselves within local commercial ecosystems.</p><p>Several proxies have diversified beyond reliance on Tehran&#8217;s fiscal health, reducing exposure to Iran&#8217;s domestic instability while increasing financial independence from the state. Examples include the Houthis&#8217; use of Southeast Asia&#8217;s <a href="https://gnet-research.org/2025/05/14/cash-flow-breaking-down-the-houthis-multibillion-dollar-financial-networks/">gray finance</a> networks and Iraqi militias&#8217; <a href="https://www.jpost.com/middle-east/iran-news/article-856259">manipulation of local cash</a> economies. Proxy revenues, however, are not fully externalized. Capital is frequently cycled back through Tier 2 infrastructure, where IRGC-linked facilitators provide conversion, protection, and partial normalization under state cover. Once processed, these funds are redeployed into longer-term assets, particularly high-end real estate and commercial investments in Iraq and the Gulf. This circular flow collapses traditional distinctions between state finance, proxy finance, and private capital flight.</p><p>The risks extend beyond Iranian proxies themselves. Tier 3 networks are opaque by design and difficult to control, generating spillover effects. The Houthis <a href="https://issafrica.org/iss-today/houthis-in-somalia-friends-with-technological-benefits">maintain ties</a> with Somalia&#8217;s al-Shabaab, which sells <a href="https://globalinitiative.net/analysis/somalia_untocwatch/">illegally exported</a> charcoal through Iranian-linked ports and logistics firms. Al-Qaeda retains a residual presence inside Iran under nominal state protection, while the Taliban <a href="https://home.treasury.gov/news/featured-stories/treasury-and-the-terrorist-financing-targeting-center-partners-sanction">launder funds</a> through Iranian Tier 2 channels. In one example, an Iranian official in the pharmaceutical industry warned that <a href="https://www.afintl.com/en/202512238921">underground exports</a> of Iranian medicine to Taliban-controlled Afghanistan could lead to critical shortages at home.</p><p>Together, these linkages illustrate how Tier 3 actors increasingly function as connective tissue between sanctioned states and transnational militant economies, amplifying risk well beyond Tehran&#8217;s nominal strategic intent.</p><h2><strong>Implications: Why the three-tiered model matters</strong></h2><p>This three-tier structure explains why Iran&#8217;s economic stress manifests not as sudden collapse, but as progressive governance erosion:</p><blockquote><p>&#8226; <strong>Tier 1</strong> extracts value faster than it reinvests.</p><p>&#8226; <strong>Tier 2</strong> optimizes mobility rather than oversight.</p><p>&#8226; <strong>Tier 3</strong> diversifies and entrenches capital beyond the state&#8217;s reach.</p></blockquote><p>The architecture that once enhanced sanctions resilience now amplifies capital flight, reduces monetary visibility, and exports financial and security risk into neighboring markets. Over time, the state shifts from governor of liquidity to one participant among many&#8212;struggling to reassert control over systems it helped build but can no longer fully supervise.</p><p>China&#8217;s role as the primary buyer of smuggled Iranian oil extends this architecture beyond Iran&#8217;s control space. Revenue routed through Tier 2 facilitators returns to state-linked channels, with evidence that portions leak into proxy finance. If Houthi-linked oil sales and the subsequent movement of at least $39 million through the Chinese-language <a href="https://gnet-research.org/2025/05/14/cash-flow-breaking-down-the-houthis-multibillion-dollar-financial-networks/">Huione platform</a> in Cambodia are connected to Iranian oil revenue streams, they suggest that Tier 2 infrastructure enables not only cross-tier proxy funding but also intra-tier diversion of state-linked proceeds.</p><p>Crucially, this infrastructure is not exclusively used by Iranian proxies. The same Tier 2 channels that facilitate proxy finance also provide liquidity, laundering, and settlement pathways for non-proxy militant actors operating in proximity to Iranian networks. Taliban-linked actors have laundered funds through Iranian facilitation channels, while residual al-Qaeda networks have exploited Iran-based logistics, transit, and financial intermediaries under varying degrees of state tolerance. These interactions need not reflect unified strategic intent to generate risk: they emerge from the availability of deniable, sanctions-resilient infrastructure operating beyond effective oversight.</p><p>The cumulative effect is the emergence of shadow financial systems that are increasingly more resilient than the state structures that enabled them. These networks adapt quickly, move capital efficiently, and operate across jurisdictions with minimal accountability&#8212;shaping regional security dynamics regardless of regime outcomes and, in some cases, <a href="https://www.tandfonline.com/doi/full/10.1080/09592318.2025.2555583">enabling coercive</a> or violent activity well beyond Iran&#8217;s nominal strategic priorities.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!31M0!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab5fa65d-7924-45c7-96d5-a778f405cf78_1686x842.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!31M0!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab5fa65d-7924-45c7-96d5-a778f405cf78_1686x842.png 424w, https://substackcdn.com/image/fetch/$s_!31M0!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab5fa65d-7924-45c7-96d5-a778f405cf78_1686x842.png 848w, https://substackcdn.com/image/fetch/$s_!31M0!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab5fa65d-7924-45c7-96d5-a778f405cf78_1686x842.png 1272w, https://substackcdn.com/image/fetch/$s_!31M0!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab5fa65d-7924-45c7-96d5-a778f405cf78_1686x842.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!31M0!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab5fa65d-7924-45c7-96d5-a778f405cf78_1686x842.png" width="1456" height="727" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ab5fa65d-7924-45c7-96d5-a778f405cf78_1686x842.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:727,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:86602,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.btl-research.com/i/184063318?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab5fa65d-7924-45c7-96d5-a778f405cf78_1686x842.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!31M0!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab5fa65d-7924-45c7-96d5-a778f405cf78_1686x842.png 424w, https://substackcdn.com/image/fetch/$s_!31M0!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab5fa65d-7924-45c7-96d5-a778f405cf78_1686x842.png 848w, https://substackcdn.com/image/fetch/$s_!31M0!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab5fa65d-7924-45c7-96d5-a778f405cf78_1686x842.png 1272w, https://substackcdn.com/image/fetch/$s_!31M0!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab5fa65d-7924-45c7-96d5-a778f405cf78_1686x842.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>A model of how Tier 1 Iranian oil smuggling indirectly facilitates Tier 3 proxy funding through Tier 2 facilitators.</em></p><p><strong>Conclusion</strong></p><p>Capital outflows are not the sole cause of Iran&#8217;s economic crisis, but they serve as a critical accelerant. By weakening monetary stability, empowering unaccountable actors, and eroding institutional authority, they deepen systemic fragility. What remains is an economy increasingly governed by survival logic rather than policy, where financial power resides not within the state but within the shadow structures that have grown around it.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.btl-research.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Between the Lines is a reader-supported publication. To receive new posts and support my work, consider becoming a paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[China–Cartel Nexus: The Liquidity Architecture Transforming the Global Drug Economy]]></title><description><![CDATA[Latin American cartels now harness the vast power of China&#8217;s underground financial sector. The operational center of gravity may be shifting toward the underground bankers who make this possible.]]></description><link>https://www.btl-research.com/p/chinacartel-nexus-the-liquidity-architecture</link><guid isPermaLink="false">https://www.btl-research.com/p/chinacartel-nexus-the-liquidity-architecture</guid><dc:creator><![CDATA[Adam Rousselle]]></dc:creator><pubDate>Fri, 19 Dec 2025 13:33:20 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!PPlc!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45c3bab3-a41d-4ab3-9bca-15a156499fe1_1041x586.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!6Gt1!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F932f0174-fe62-4bae-95d7-27252bf4e80b_310x60.svg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!6Gt1!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F932f0174-fe62-4bae-95d7-27252bf4e80b_310x60.svg 424w, https://substackcdn.com/image/fetch/$s_!6Gt1!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F932f0174-fe62-4bae-95d7-27252bf4e80b_310x60.svg 848w, https://substackcdn.com/image/fetch/$s_!6Gt1!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F932f0174-fe62-4bae-95d7-27252bf4e80b_310x60.svg 1272w, https://substackcdn.com/image/fetch/$s_!6Gt1!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F932f0174-fe62-4bae-95d7-27252bf4e80b_310x60.svg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!6Gt1!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F932f0174-fe62-4bae-95d7-27252bf4e80b_310x60.svg" width="310" height="60" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/932f0174-fe62-4bae-95d7-27252bf4e80b_310x60.svg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:60,&quot;width&quot;:310,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Logo&quot;,&quot;title&quot;:&quot;Logo&quot;,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Logo" title="Logo" srcset="https://substackcdn.com/image/fetch/$s_!6Gt1!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F932f0174-fe62-4bae-95d7-27252bf4e80b_310x60.svg 424w, https://substackcdn.com/image/fetch/$s_!6Gt1!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F932f0174-fe62-4bae-95d7-27252bf4e80b_310x60.svg 848w, https://substackcdn.com/image/fetch/$s_!6Gt1!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F932f0174-fe62-4bae-95d7-27252bf4e80b_310x60.svg 1272w, https://substackcdn.com/image/fetch/$s_!6Gt1!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F932f0174-fe62-4bae-95d7-27252bf4e80b_310x60.svg 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a></figure></div><p><em>This article was published in conjunction with the New Lines Institute. You can find the original link <a href="https://newlinesinstitute.org/state-resilience-fragility/china-cartel-nexus-the-liquidity-architecture-transforming-the-global-drug-economy/">here</a>.</em></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!PPlc!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45c3bab3-a41d-4ab3-9bca-15a156499fe1_1041x586.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!PPlc!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45c3bab3-a41d-4ab3-9bca-15a156499fe1_1041x586.jpeg 424w, https://substackcdn.com/image/fetch/$s_!PPlc!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45c3bab3-a41d-4ab3-9bca-15a156499fe1_1041x586.jpeg 848w, https://substackcdn.com/image/fetch/$s_!PPlc!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45c3bab3-a41d-4ab3-9bca-15a156499fe1_1041x586.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!PPlc!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45c3bab3-a41d-4ab3-9bca-15a156499fe1_1041x586.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!PPlc!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45c3bab3-a41d-4ab3-9bca-15a156499fe1_1041x586.jpeg" width="1041" height="586" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/45c3bab3-a41d-4ab3-9bca-15a156499fe1_1041x586.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:586,&quot;width&quot;:1041,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;How Chinese gamblers created a secret pipeline for illicit cash through Las  Vegas' biggest casino | CNN&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="How Chinese gamblers created a secret pipeline for illicit cash through Las  Vegas' biggest casino | CNN" title="How Chinese gamblers created a secret pipeline for illicit cash through Las  Vegas' biggest casino | CNN" srcset="https://substackcdn.com/image/fetch/$s_!PPlc!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45c3bab3-a41d-4ab3-9bca-15a156499fe1_1041x586.jpeg 424w, https://substackcdn.com/image/fetch/$s_!PPlc!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45c3bab3-a41d-4ab3-9bca-15a156499fe1_1041x586.jpeg 848w, https://substackcdn.com/image/fetch/$s_!PPlc!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45c3bab3-a41d-4ab3-9bca-15a156499fe1_1041x586.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!PPlc!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45c3bab3-a41d-4ab3-9bca-15a156499fe1_1041x586.jpeg 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Chinese money-laundering networks (CMLNs) have quietly become the financial engine of Latin America&#8217;s drug cartels. What once appeared as isolated headlines &#8211; Chinese <a href="https://www.cnn.com/2025/11/18/us/chinese-gambling-wynn-casinos-cash-middlemen-invs-vis">gambling junkets</a> washing millions through U.S. casinos, luxury <a href="https://www.kharon.com/brief/chinese-money-laundering-cartels-treasury-department-fincen">real-estate</a> loops, suspicious <a href="https://www.wsj.com/finance/regulation/chinese-money-launders-are-moving-billions-through-u-s-banks-cf617283">bulk cash</a> deposits at West Coast banks &#8211; now forms a single system linking Chinese capital flight to cartel profit cycles.</p><p>Regulators continue to grapple with the scale. In late 2024, the U.S. Treasury&#8217;s Financial Crimes Enforcement Network (FinCEN) issued a record <a href="https://www.wsj.com/finance/regulation/chinese-money-launders-are-moving-billions-through-u-s-banks-cf617283">$3 billion</a> penalty against TD Bank for failures tied to cartel-linked laundering. Less than a year later, in August 2025, FinCEN followed with a <a href="https://www.fincen.gov/news/news-releases/fincen-issues-advisory-and-financial-trend-analysis-chinese-money-laundering">national advisory</a> flagging $312 billion in suspected CMLN-related transactions tied to Mexican cartels between 2020 and 2024 &#8211; a figure that suggests the headlines are only the surface of a much deeper architecture.</p><p>Cartel money laundering through Chinese networks is not an isolated phenomenon. While public attention often centers on downstream effects of cartel operations such as violence and addiction, these impacts are structurally enabled by China&#8217;s internal demand to move capital offshore &#8211; a demand amplified by digital technologies that now move value faster than any regulatory system can track. The same financial and political dynamics driving Chinese elites to expatriate wealth have also produced the infrastructure powering Southeast Asia&#8217;s <a href="https://newlinesinstitute.org/state-resilience-fragility/chinese-shadow-liquidity-and-the-scam-economy/">scam compounds</a>, <a href="https://smallwarsjournal.com/2025/07/24/illicit-liquidity-as-battlespace-rethinking-finance-in-asymmetric-conflict/">regional insurgencies</a>, and a shadow digital economy that increasingly behaves like a self-reinforcing network. Taken together, China&#8217;s internal financial pressures have produced a shadow liquidity architecture that connects its domestic financial instability to the expansion of criminal and insurgent activity worldwide.</p><p>In the Americas, that architecture has taken on a new shape, giving Mexican cartels access to Chinese capital-outflow mechanisms perfectly adapted to their needs. These mechanisms provide criminal groups the means to expand their operations and legitimize illicit gains by tapping into the financial reach of the world&#8217;s second-largest economy. From fentanyl precursors and pill presses to consumer goods sold through semilegitimate front companies, China&#8217;s industrial machine empowers the criminal-paramilitary networks driving insecurity and mass violence across much of the Americas. Meanwhile, CMLNs legitimize the profits of a multibillion-dollar addiction problem in a way that contributes to inflated prices in an increasingly unaffordable housing market.</p><p>The result is a shared financial ecosystem linking capital flight from China to fentanyl profits on either side of the U.S.-Mexican border. It is a convergence that transforms a domestic Chinese financial problem into a global security threat with the potential to upend the traditional power structure behind the North American drug trade, putting globalized CMLNs at its center. Traditional enforcement models were not designed to address this level of complexity, forcing the emergence of a new generation artificial intelligence and machine learning-enabled tools to combat global illicit finance. With criminal actors evolving in parallel, the world is entering a technological contest between shadow capital and the institutions charged with constraining it.</p><h2><strong>The Liquidity Cascade</strong></h2><p>CMLNs transform bulk U.S. dollars from narcotics sales into both onshore renminbi purchasing power in China and offshore dollar liquidity for Chinese clients seeking capital flight. Through shadow banking, mirror swaps, crypto-settlement, and cash laundering businesses, these networks have created a financial architecture that allows cartel proceeds to fuse seamlessly into China&#8217;s capital-flight mechanisms. What appears from the outside as cartel money laundering is, in reality, the downstream face of a much larger imbalance: the accelerating pressure among Chinese elites to move wealth beyond the reach of domestic controls.</p><p>Advances in digital technology underpin this new paradigm: a parallel architecture that operates independently of the SWIFT financial payments system, formal banks, or Western oversight. <a href="https://www.sanctionscanner.com/knowledge-base/what-is-mirror-transaction-822">Mirror transfers</a> (&#23545;&#25970; <em>du&#236;qi&#257;o</em>), over-the-counter <a href="https://www.trmlabs.com/resources/blog/fincen-targets-three-mexico-based-financial-institutions-for-laundering-opioid-proceeds">cryptocurrency brokers</a>, and gray-market <a href="https://www.wired.com/story/xinbi-guarantee-crypto-scam-hub/">crypto exchangers</a> link Chinese elites, intermediaries, and transnational criminal syndicates into a single global liquidity ecosystem. Cartels have tapped into this infrastructure because it gives them what traditional laundering cannot: frictionless conversion, instant settlement, and access to the world&#8217;s largest industrial economy.</p><p>Mirror transfers are the primary way Chinese capital outflows are operationalized into cartel laundering infrastructure. The process works thusly:</p><ul><li><p>Cartels deposit bulk <a href="https://oversight.house.gov/wp-content/uploads/2023/04/Hearing-on-Chinese-Money-Laundering-Mavrellis-Written-Testimony-4.26.2023-FINAL.pdf">drug cash</a> with Chinese brokers in the Americas, who launder the physical notes locally through cash-intensive businesses such as <a href="https://edition.cnn.com/2025/11/18/us/chinese-gambling-wynn-casinos-cash-middlemen-invs-vis">casinos</a> and <a href="https://www.jdsupra.com/legalnews/how-chinese-money-laundering-networks-6166410/">massage parlors</a>. These funds pass between <a href="https://home.treasury.gov/news/press-releases/sb0231">shell companies</a> and nominee entities through multiple transactions that obscure their origin.</p></li></ul><ul><li><p>U.S.-based brokers then <a href="https://www.fincen.gov/system/files/2025-08/4000-10-INV-144549-S3F6L-FTA-CMLN-508.pdf">pay Chinese clients</a> in dollars and dollar-denominated assets using laundered funds, thus satisfying their need for offshore funds.</p></li></ul><ul><li><p>Simultaneously, China-side brokers settle the other half of the swap by using renminbi pools &#8211; paid in by Chinese clients seeking capital flight &#8211; to generate export credits or payments for cartel-linked importers in Mexico.</p></li></ul><p>In this arrangement, value moves, but no formal cross-border transfer ever occurs. Because the literature tends to isolate individual pieces, the full architecture is best understood through a three-tiered framework that traces how elite wealth in China becomes operational fuel for fentanyl networks in Mexico and the United States.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!zTsj!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa85f6535-5ead-490b-95ec-49f3ece1c4df_1776x1002.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!zTsj!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa85f6535-5ead-490b-95ec-49f3ece1c4df_1776x1002.png 424w, https://substackcdn.com/image/fetch/$s_!zTsj!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa85f6535-5ead-490b-95ec-49f3ece1c4df_1776x1002.png 848w, https://substackcdn.com/image/fetch/$s_!zTsj!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa85f6535-5ead-490b-95ec-49f3ece1c4df_1776x1002.png 1272w, https://substackcdn.com/image/fetch/$s_!zTsj!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa85f6535-5ead-490b-95ec-49f3ece1c4df_1776x1002.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!zTsj!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa85f6535-5ead-490b-95ec-49f3ece1c4df_1776x1002.png" width="1456" height="821" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a85f6535-5ead-490b-95ec-49f3ece1c4df_1776x1002.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:821,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:214380,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.btl-research.com/i/182083325?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa85f6535-5ead-490b-95ec-49f3ece1c4df_1776x1002.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!zTsj!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa85f6535-5ead-490b-95ec-49f3ece1c4df_1776x1002.png 424w, https://substackcdn.com/image/fetch/$s_!zTsj!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa85f6535-5ead-490b-95ec-49f3ece1c4df_1776x1002.png 848w, https://substackcdn.com/image/fetch/$s_!zTsj!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa85f6535-5ead-490b-95ec-49f3ece1c4df_1776x1002.png 1272w, https://substackcdn.com/image/fetch/$s_!zTsj!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa85f6535-5ead-490b-95ec-49f3ece1c4df_1776x1002.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h4><em>Tier 1: Capital Flight Reservoirs in China</em></h4><p>The CMLN&#8211;cartel relationship begins inside China. For decades, the rise of the world&#8217;s largest <a href="https://www.icis.com/chemicals-and-the-economy/2025/02/chinas-property-crash-has-already-destroyed-18tn-of-household-wealth-where-next/">property bubble</a> created a demand for credit that state-owned banks could not satisfy, fueling the expansion of a vast, <a href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3485213&amp;utm">unregulated financial sector</a>. At the same time, strict <a href="https://www.china-briefing.com/doing-business-guide/china/taxation-and-accounting/transfer-pricing-and-foreign-currency-controls-in-china">capital controls</a> and political pressure drove elite Chinese households to move money offshore &#8211; a dynamic that intensified dramatically after the property bubble&#8217;s <a href="https://www.reuters.com/world/china/chinas-new-home-prices-fall-fastest-pace-11-months-2025-10-20/">2020 deflation</a>. The convergence of these forces produced enormous capital flight pressure, creating vast renminbi pools among China&#8217;s <a href="https://www.trmlabs.com/reports-and-whitepapers/shadow-bankers#:~:text=According%20to%20TRM%2C%20Chinese%20underground,as%20a%20global%20crime%20enabler.">underground financiers</a>, waiting to be converted into offshore dollars &#8211; a domestic imbalance upon which the entire CMLN system rests.</p><p>In this way, Beijing&#8217;s failure to regulate its property market not only inflated the bubble but also facilitated the rise of a pervasive parallel financial system.</p><h4><em>Tier 2 &#8211; CMLNs as Liquidity Infrastructure</em></h4><p>Tier 2 is where China&#8217;s internal capital-flight pressures are transformed into a global facilitation system. CMLNs sit at the operational middle of mirror-transfer swaps, which allow value to move offshore without ever crossing a border. Operating out of hubs such as <a href="https://www.justice.gov/archives/opa/pr/federal-indictment-alleges-alliance-between-sinaloa-cartel-and-money-launderers-linked">Los Angeles</a>; <a href="https://themobmuseum.org/blog/chinese-triads-launder-billions-through-vancouver-buying-luxury-real-estate-cars/">Vancouver</a>, British Columbia; and <a href="https://www.justice.gov/opa/pr/drug-trafficker-zhi-dong-zhang-aka-brother-wang-returned-mexico-face-international-narcotics">Mexico City</a>, brokers rely on loosely connected networks of cash-intensive front businesses to launder cartel bulk currency and convert it into clean dollars. Their China-side counterparts in Tier 1 settle the mirrored leg of the transfer using renminbi accumulated from elites seeking to offshore wealth, bypassing both China&#8217;s formal banking system and SWIFT entirely. Brokers use laundered cash <a href="https://www.wsj.com/finance/regulation/chinese-money-launders-are-moving-billions-through-u-s-banks-cf617283">ATM deposits</a>, and increasingly <a href="https://www.trmlabs.com/resources/blog/understanding-the-use-of-cryptocurrencies-by-cartels">stablecoins</a> and shell company <a href="https://www.dea.gov/press-releases/2025/05/01/three-members-prolific-chinese-money-laundering-organization-plead-guilty">real estate</a> purchases, to make Chinese clients whole in offshore dollars &#8211; often with the help of <a href="https://thehill.com/opinion/international/5491035-fentanyl-drug-trade-china/">Chinese students</a> enrolled in Western universities working on behalf of family members and associates back home.</p><p>For cartels, the same mechanism delivers renminbi-denominated purchasing power inside China. Early iterations relied partly on gray-market <em>daigou</em> arbitrage &#8211; purchasing <a href="https://finintegrity.org/laundering-luxury/">luxury goods</a> in the United States and reselling them inside China through informal retail channels &#8211; but this vector has been constrained by <a href="https://www.istitutomarangoni.com/en/maze35/industry/china-luxury-slowdown">slowing demand</a> and Beijing&#8217;s <a href="https://jingdaily.com/posts/the-price-of-duty-free-hainan-grapples-daigou-dilemma">crackdowns</a> to protect domestic consumption and control capital flows. Fortuitously for cartels, rising pressure among Chinese elites to move wealth offshore has created large renminbi reservoirs within the underground banking system, more than meeting the China-side obligations of the mirror-transfer process.</p><p>By servicing both Tier 1 Chinese clients and Tier 3 cartels, Tier 2 CMLNs collect enormous fees and have become the structural hinge of the entire system &#8211; the brokers who connect global criminal economies to the industrial and financial power of China.</p><h4><em>Tier 3 &#8211; Cartels as End Users</em></h4><p>Tier 3 is where cartels receive value from the system, not in renminbi itself but in the purchasing power it represents. By depositing bulk cash with Tier 2 brokers, cartels gain access to <a href="https://www.fincen.gov/system/files/2025-08/FinCEN-Advisory-CMLN-508.pdf">renminbi-denominated</a> value inside China&#8217;s commercial ecosystem, allowing them to <a href="https://www.nbclosangeles.com/news/local/mexican-cartels-chinese-nationals-los-angeles-launder-drug-money/3439504/">buy the inputs</a> that scale their operations &#8211; fentanyl precursors and pill presses to resell in North America for dirty cash and <a href="https://www.reuters.com/world/asia-pacific/special-report-burner-phones-banking-apps-meet-chinese-brokers-laundering-2020-12-03/">electronics</a> and other goods for clean liquidity. Trade-based money-laundering (TBML) pipelines and <a href="https://www.propublica.org/article/china-cartels-xizhi-li-money-laundering">front companies</a> provide the commercial cover that turns mirrored value into export credits and legitimate invoices. In effect, CMLNs give cartels a backdoor into China&#8217;s industrial economy, enabling them to convert drug proceeds into operational power, hard assets, and legitimacy that would otherwise be inaccessible.</p><p>Cartels are not the architects of this system, but they are destructive end users, empowered by a financial architecture built thousands of miles away and far beyond the reach of traditional enforcement.</p><h2><strong>Upstream Architecture vs. Downstream Effects</strong></h2><p>The choke point in this system is the CMLN operators at Tier 2 &#8211; brokers who convert, settle, and transport value across gray-market channels that long predate cartel involvement. North American banks and payment platforms are not willing participants; they are intrusion targets exploited through shell companies, falsified invoices, identity-laundering tactics, and mule accounts used to <a href="https://www.scotiabank.com/ca/en/personal/advice-plus/features/posts.money-mule-scams-are-gaining-in-popularity.html">obfuscate the origin</a> of illicit funds moving through them. Laundering occurs before funds interact with the formal financial system, which is why Tier 2 remains the operational center of gravity.</p><p>This is not the only global threat vector stemming from Chinese capital flight. Although the immediate focus here is the Americas, underground renminbi reservoirs in China anchor an entirely separate but structurally similar ecosystem across Southeast Asia&#8217;s scam compounds, gray-market gaming hubs, and illicit digital-finance corridors. There, too, a <a href="https://www.btl-research.com/p/the-liquidity-framework">three-tiered cascade</a> links onshore Chinese RMB pools to offshore facilitators and downstream criminal end users &#8211; a parallel architecture that mirrors the CMLN-cartel system. This broader pattern underscores the core point: China&#8217;s shadow-finance engine generates global liquidity structures whose downstream expressions differ by region but whose underlying mechanics remain consistent. These dynamics set the conditions for global threats to manifest.</p><p>Despite rising public attention on <a href="https://www.cnn.com/2025/08/18/americas/mexico-killings-sinaloa-cartel-kingpin-latam-intl">cartel violence</a> and <a href="https://www.who.int/news-room/fact-sheets/detail/opioid-overdose">fentanyl overdoses</a>, enforcement agencies and much of the media continue to misdiagnose the architecture behind cartel liquidity. Tier 2 CMLNs are still described as if they were auxiliary <a href="https://www.fincen.gov/news/news-releases/fincen-issues-advisory-and-financial-trend-analysis-chinese-money-laundering">cartel partners</a> or offshore laundering boutiques. In reality, they are the globalized expression of China&#8217;s internal financial disorder, and the cartels are simply the most dangerous beneficiaries of a system that predates them.</p><p>This misdiagnosis has consequences. Policy responses remain locked on downstream symptoms &#8211; bulk <a href="https://www.trmlabs.com/resources/blog/dea-and-federal-prosecutors-seize-5-5-million-in-usdt-linked-to-international-cartel-money-laundering-scheme">cash seizures</a>, courier networks, transactions structured to evade reporting thresholds, front companies &#8211; while the upstream liquidity cascade stemming from inside China regenerates unabated. Each high-profile enforcement win removes a node, but not the system. The architecture adapts, reroutes, and strengthens, precisely because the underlying demand signal does not come from cartels at all.</p><p>Four factors become impossible to ignore:</p><ul><li><p><strong>Chinese elites are the primary liquidity source</strong>, driving the demand for offshore dollars that fuels CMLN operations. Cartel cash is a convenient supply, not the engine of the system.</p></li><li><p><strong>Cartel integration is opportunistic</strong>, not foundational. Cartels inserted themselves into a pre-existing outflow network designed for capital flight, not criminal finance, because it is more efficient than legacy laundering methods.</p></li><li><p><strong>Cartels are downstream clients</strong>. CMLN infrastructure does more than launder cartel cash &#8211; it supplies the purchasing power that underpins their business model, giving them access to industrial-scale chemical precursors and equipment inside China. With these synthetic drugs now far <a href="https://www.dw.com/en/in-latin-america-synthetic-drugs-becoming-more-popular-than-cocaine-and-marijuana/a-62633710#:~:text=Drug%20cartels%20in%20Latin%20America,for%2C%20like%20cocaine%20and%20marijuana.&amp;text=In%20early%20February%20this%20year,export%20for%20Mexican%20drug%20cartels.">more profitable</a> than cocaine or cannabis produced in the Americas, this dynamic risks shifting the operational center of gravity toward CMLNs themselves, much as it once shifted from <a href="https://www.cfr.org/backgrounder/mexicos-long-war-drugs-crime-and-cartels">Colombian cartels</a> as exporters to Mexican cartels as global distributors.</p></li><li><p><strong>Enforcement wins remain tactically impressive but strategically insufficient.</strong> Seizing accounts or shutting down front companies rarely touches the structural incentives that bind Chinese capital flight to cartel proceeds. The architecture is left intact, and the system improves through adaptation.</p></li></ul><p>The strategic blind spot is not a lack of enforcement capacity. It is the persistent belief that cartel laundering is a cartel-led enterprise, when in fact the cartels are downstream actors plugged into an ecosystem shaped by a much larger set of financial pressures. Until policymakers treat CMLNs as part of a global capital-flight infrastructure &#8211; not a narco-adjacent novelty &#8211; the enduring three-tiered cascade will continue to reproduce itself faster than it can be disrupted.</p><h2><strong>Strategic Implications</strong></h2><p>What emerges from this architecture is not a cartel-finance anomaly but another iteration of an emerging global liquidity order. An interconnected and globalized ecosystem of tech-enabled shadow banks, cryptocurrency intermediaries, and laundering networks &#8211; operating across mainland China, Hong Kong, and the Americas &#8211; now functions as an informal central bank for illicit and gray-market capital. Their balance sheets are vast, opaque, and fed by the constant demand for offshore dollars among wealthy elites under tight capital controls.</p><p>China&#8217;s domestic weakness is the system&#8217;s strength. As long as elite capital-flight pressures persist, CMLNs will remain stable, adaptive, and indispensable. Because renminbi pools inside China feed multiple downstream economies &#8211; militant-backed <a href="https://newlinesinstitute.org/state-resilience-fragility/chinese-shadow-liquidity-and-the-scam-economy/">scam compounds</a> in Southeast Asia and <a href="https://www.btl-research.com/p/mexican-cartels-how-the-worlds-most">militarized drug cartels</a> in the Americas &#8211; the threat becomes increasingly globalized.</p><p>For Beijing, CMLN mirror transfers represent a deeply problematic, structurally persistent, and critically under examined vector of <a href="https://www.cnbc.com/2025/10/03/foreign-investors-eye-chinese-tech-again-but-capital-controls-policy-risks-weigh.html">capital flight</a>. Although renminbi never formally leaves the country, the <em>value</em> of that money exits China through offshore dollar pools controlled by brokers. Exporters are paid in renminbi with no dollars entering the Chinese banking system, depriving the state of foreign-currency inflows and undermining capital-control integrity. The result is a silent erosion of China&#8217;s foreign exchange management architecture &#8211; a slow hollowing-out effect similar to other forms of elite capital exfiltration, but with even higher opacity and fewer policy levers available for Beijing to control.</p><p>For North America, the implications are severe. CMLNs form the financial spine of a system that channels cartel drug proceeds into the offshore renminbi pools used by Chinese elites seeking dollar access. This fusion of cartel cash and capital-flight demand pushes billions of dollars into Western real estate, luxury assets, and private-market vehicles &#8211; particularly in <a href="https://www.canadianfinancialcrimeacademy.ca/financial-crime-articles/money-laundering-in-canadas-real-estate-sector-ongoing-risks-and-reform-efforts">Canada</a> and key <a href="https://www.npr.org/2024/03/21/1239854106/how-the-chinese-mafia-came-to-control-much-of-the-illicit-marijuana-trade-in-the">U.S. cities</a> &#8211; at a time of record unaffordability. The same liquidity architecture that fuels fentanyl-linked deaths in the United States and Canada, and enables escalating <a href="https://www.visionofhumanity.org/organised-crime-and-institutional-deterioration-mexicos-challenges-in-2025">cartel violence</a> in Mexico, also accelerates opaque trans-Pacific capital inflows that distort markets and weaken financial governance.</p><p>For enforcement agencies, the asymmetry is structural. Downstream interventions, no matter how aggressive, cannot meaningfully disrupt a system whose incentives are upstream and whose architecture is distributed. The persistent enforcement gap is not a failure of policing but a failure of framing: the problem is liquidity infrastructure, not individual criminal actors.</p><h2><strong>Moving Beyond Human Enforcement Capacity</strong></h2><p>Technology has rewritten the physics of money. What once required suitcases, offshore accounts, and months of coordination can now move through encrypted chats, offshore OTC desks, and digital payment platforms in minutes. Liquidity has slipped out of state control and into networks never meant to wield it, producing a technologically accelerated destabilization that can only be countered with tools operating on the same scale.</p><p>Criminal actors grasped this new paradigm before policymakers could react. Bulk cash, once a liability, can now be converted into purchasing power inside China through networks that merge capital flight with cartel liquidity needs. What appears to be a laundering service is, in fact, shared financial infrastructure.</p><p>Chinese money-laundering networks sit at the center of that infrastructure. They are not peripheral fixers but the architecture linking China&#8217;s internal financial pressures to the expansion of cartel power. They endure because the incentives that produced them remain intact, and because enforcement continues to target the edges rather than the structure itself.</p><p>At the structure&#8217;s core is liquidity. The ability to move value faster than states can detect has become a force of sovereignty &#8211; determining who can project power, absorb shocks, outlast pressure, and operate within the blind spots of the global system. Cartels did not defeat states through ideology or insurgency, but by mastering liquidity, building a financial nervous system more adaptive than the one meant to contain them.</p><p>Until CMLNs are recognized not as peripheral laundering boutiques but as the infrastructure of a new liquidity order, the gap between state capacity and illicit capability will only widen. At this point, the limits of human enforcement become unavoidable. Task forces can seize cash, shutter front companies, and arrest intermediaries &#8211; but humans can only see snapshots of a system that evolves in real time. A liquidity network built on mirror swaps, diaspora brokers, synthetic trade chains, and offshore renminbi reservoirs cannot be mapped manually. Its architecture is too distributed, too adaptive, too fast.</p><p>The shift on the enforcement side has already begun. As recent analysis shows, blockchain-analytics firms and financial-intelligence units are quietly layering <a href="https://gnet-research.org/2025/10/24/closing-the-enforcement-gap-ai-illicit-liquidity-and-the-next-phase-of-counter-terrorist-finance/">machine-learning models</a> into their detection systems &#8211; clustering wallets, mapping laundering networks, and identifying anomalies across stablecoin flows, escrow logs, and commercial-invoice patterns. These are prototype architecture-level tools, the first enforcement systems designed not to chase criminals but to map the infrastructure that makes crime possible. The most advanced of these models already operates across jurisdictions and asset classes, revealing relationships that traditional investigative methods could never uncover.</p><p>Artificial intelligence is not an adjunct to enforcement; it is the first form of enforcement capable of operating upstream. Only systems that learn as quickly as the networks they track can identify the structure beneath the transactions &#8211; the neural architecture of shadow liquidity itself. In a world where liquidity behaves like a distributed neural network, enforcement will require its own neural network in response, guided by humans who can see the system at a structural level.</p><p>This is not futurism. It is the logical extension of the world we already inhabit. The liquidity order described above will not be disrupted by more seizures, more arrests, or more border checks. It will only be countered by humans wielding tools capable of recognizing the system for what it is: distributed, multilayered, resilient, and evolving faster than traditional governance can respond.</p>]]></content:encoded></item><item><title><![CDATA[Australian Watchdog Sounds Alarm on Illicit Financial Networks]]></title><description><![CDATA[The promise of frictionless money has matured into something far more consequential: a liquidity system powerful enough to reorder economies, and elusive enough to escape the laws meant to govern it.]]></description><link>https://www.btl-research.com/p/australian-watchdog-sounds-alarm</link><guid isPermaLink="false">https://www.btl-research.com/p/australian-watchdog-sounds-alarm</guid><dc:creator><![CDATA[Adam Rousselle]]></dc:creator><pubDate>Mon, 15 Dec 2025 13:32:26 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!FZyx!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5bc28de2-62ee-4176-b3c9-cc91a100fce8_1892x1041.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!FZyx!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5bc28de2-62ee-4176-b3c9-cc91a100fce8_1892x1041.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!FZyx!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5bc28de2-62ee-4176-b3c9-cc91a100fce8_1892x1041.jpeg 424w, https://substackcdn.com/image/fetch/$s_!FZyx!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5bc28de2-62ee-4176-b3c9-cc91a100fce8_1892x1041.jpeg 848w, https://substackcdn.com/image/fetch/$s_!FZyx!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5bc28de2-62ee-4176-b3c9-cc91a100fce8_1892x1041.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!FZyx!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5bc28de2-62ee-4176-b3c9-cc91a100fce8_1892x1041.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!FZyx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5bc28de2-62ee-4176-b3c9-cc91a100fce8_1892x1041.jpeg" width="1456" height="801" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5bc28de2-62ee-4176-b3c9-cc91a100fce8_1892x1041.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:801,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:285975,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.btl-research.com/i/181682728?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5bc28de2-62ee-4176-b3c9-cc91a100fce8_1892x1041.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!FZyx!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5bc28de2-62ee-4176-b3c9-cc91a100fce8_1892x1041.jpeg 424w, https://substackcdn.com/image/fetch/$s_!FZyx!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5bc28de2-62ee-4176-b3c9-cc91a100fce8_1892x1041.jpeg 848w, https://substackcdn.com/image/fetch/$s_!FZyx!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5bc28de2-62ee-4176-b3c9-cc91a100fce8_1892x1041.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!FZyx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5bc28de2-62ee-4176-b3c9-cc91a100fce8_1892x1041.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!FOdi!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31d0ba57-67fb-47fa-9d8c-4a13e6aae7c4_354x83.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!FOdi!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31d0ba57-67fb-47fa-9d8c-4a13e6aae7c4_354x83.png 424w, https://substackcdn.com/image/fetch/$s_!FOdi!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31d0ba57-67fb-47fa-9d8c-4a13e6aae7c4_354x83.png 848w, https://substackcdn.com/image/fetch/$s_!FOdi!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31d0ba57-67fb-47fa-9d8c-4a13e6aae7c4_354x83.png 1272w, https://substackcdn.com/image/fetch/$s_!FOdi!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31d0ba57-67fb-47fa-9d8c-4a13e6aae7c4_354x83.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!FOdi!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31d0ba57-67fb-47fa-9d8c-4a13e6aae7c4_354x83.png" width="354" height="83" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/31d0ba57-67fb-47fa-9d8c-4a13e6aae7c4_354x83.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:83,&quot;width&quot;:354,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!FOdi!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31d0ba57-67fb-47fa-9d8c-4a13e6aae7c4_354x83.png 424w, https://substackcdn.com/image/fetch/$s_!FOdi!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31d0ba57-67fb-47fa-9d8c-4a13e6aae7c4_354x83.png 848w, https://substackcdn.com/image/fetch/$s_!FOdi!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31d0ba57-67fb-47fa-9d8c-4a13e6aae7c4_354x83.png 1272w, https://substackcdn.com/image/fetch/$s_!FOdi!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31d0ba57-67fb-47fa-9d8c-4a13e6aae7c4_354x83.png 1456w" sizes="100vw"></picture><div></div></div></a></figure></div><p><em>This is an article I recently wrote for The Diplomat with the help of Brett Erickson - who aided immensely in reaching out to and interviewing the AUSTRAC CEO Brendan Thomas. You can find the original link <a href="https://thediplomat.com/2025/12/australian-watchdog-sounds-alarm-on-illicit-financial-networks/">here</a>. </em></p><p>Australia&#8217;s top financial-crime official has sounded the alarm on the worrying transformation of his country&#8217;s economy. Behind the rhetoric of fintech innovation lies an expanding shadow liquidity network linking Canberra&#8217;s financial sector to the grey market capital circuits of Asia and Latin America &#8211; a system now testing the limits of regulatory sovereignty itself.</p><p>What began as a permissive environment for digital experimentation has quietly evolved into a regional clearinghouse for unregulated money.</p><p>&#8220;Digital-currency transactions are major financial-crime risks in Australia,&#8221; said Brendan Thomas, chief executive of the Australian Transaction Reports and Analysis Centre (AUSTRAC). &#8220;We currently have around 450 digital-currency exchanges and a sector characterized by rapid growth and very poor AML [Anti-Money Laundering] compliance.&#8221;</p><p>Today, Australia has hundreds of registered <a href="https://www.austrac.gov.au/sites/default/files/2024-07/2024%20AUSTRAC%20Money%20Laundering%20NRA.pdf?utm_source=chatgpt.com">digital-currency exchanges</a> and crypto-related operators, many of which, regulators say, are at increasing risk of exploitation for money laundering, scams and fraud, offering the potential for large value flows between criminal syndicates, grey market actors, and legitimate institutions. Stablecoins and over-the-counter (OTC) desks offer frictionless dollar exposure to actors evading capital controls and sanctions, while trade-based laundering networks now tie Sydney and Melbourne directly to illicit and semi-licit actors across Latin America, Hong Kong, and Southeast Asia.</p><p>This architecture hides in plain sight. Crypto exchanges double as proxy banks for offshore wealth; illicit proceeds from online fraud and cartel operations mingle with speculative inflows; and regulators struggle to distinguish legitimate liquidity from laundered funds. What appears to be fragmented compliance failure is, in fact, the emergence of a parallel financial infrastructure &#8211; one eroding the boundary between licit and illicit capital and exposing Australia to systemic risk on a global scale.</p><p>The evidence of that erosion is already visible. The same digital corridors that once promised innovation now facilitate narcotics finance, illicit tobacco syndicates, and Southeast Asian scam networks. In the space of a decade, the promise of frictionless money has matured into something far more consequential: a liquidity system powerful enough to reorder economies, and elusive enough to escape the laws meant to govern it.</p><h2><strong>Drugs, Cigarettes, and Digital Liquidity</strong></h2><p>Australia is more flush with illicit substances than ever before. A recent study by the Australian Criminal Intelligence Commission (ACIC) found that <a href="https://www.aljazeera.com/news/2025/8/15/australia-finds-record-meth-cocaine-heroin-use-in-wastewater-analysis">Australians consumed</a> over 22 tonnes of methamphetamine, cocaine, and MDMA between August 2023 and August 2024, up 34 percent compared to the previous year&#8217;s findings. These drugs had an estimated combined street value of US$7.5 billion &#8211; making Australia a high-value market for global drug cartels. Meanwhile, Australia&#8217;s record high tobacco excise has created an <a href="https://www.tobaccoasia.com/news/australia%E2%80%99s-tobacco-black-market-surges/">unprecedented surge</a> in demand for underground alternatives, with industry data finding that illegal tobacco sales account for 64 percent of total consumption and 82 percent of total nicotine use.</p><p>Mexico&#8217;s Sinaloa and Jalisco New Generation (CJNG) cartels have become central suppliers in this ecosystem, embedding themselves through high-volume methamphetamine and cocaine routes that link Latin American production hubs to Australia&#8217;s premium end-market.</p><p>&#8220;Australians pay quite high prices globally for drugs&#8230; there is an increasing cocaine problem, especially in Sydney. This indicates significant supply links with cartels in South America, possibly linked through Asian-based money-laundering organizations,&#8221; said Thomas.</p><p>Indeed, <a href="https://www.acic.gov.au/sites/default/files/2023-08/submission_-_australias_illicit_drug_problem_challenges_and_opportunities_for_law_enforcement.pdf?utm_source=chatgpt.com">significant overlap</a> exists between cartel operations and entrenched Chinese and Southeast Asian syndicates that dominate the region&#8217;s chemical precursors, laundering networks, and scam-derived liquidity &#8211; suggesting that cartel drug profits blend with these systems before being injected into Australia&#8217;s capital markets at &#8220;clean&#8221; investments. AUSTRAC has previously noted how laundered funds often intersect with Australia&#8217;s high value <a href="https://www.reiq.com/articles/agency-practice/real-estate-a-prime-target-for-money-laundering">property market</a>, contributing to <a href="https://www.abc.net.au/news/2025-11-02/real-estate-property-market-first-home-buyers-schemes/105941822">unaffordable prices</a> for citizens across the country.</p><p>These growing illicit trades have facilitated the rise of an illegitimate financial ecosystem to service them.</p><p>&#8220;The narcotics and underground tobacco trades trade are the largest drivers of illicit finance in this country,&#8221; said Thomas. He also noted that important role digital currencies play in this financial system. &#8220;We have a (digital currency) market that isn&#8217;t regulated prudentially and therefore exposed to significant risk,&#8221; he added.</p><p>Thomas also noted that these illicit trades are not distinct criminal issues, but symptomatic of a maturing underground financial system.</p><p>&#8220;We believe the illicit tobacco and narcotics markets are controlled by the same entities,&#8221; he said.</p><p>Recent cases already show how digital currencies underpin the same financial circuits that move narcotics and illicit tobacco profits in Australia. In August 2021, Victoria Police seized AU$8.5 million in cryptocurrency from an online drug syndicate &#8212; the largest <a href="https://www.9news.com.au/national/victoria-police-seize-85m-in-cryptocurrency-from-dark-web-drug-syndicate/403f229c-6f3b-47ec-a7cd-a681068bd465?utm_source=chatgpt.com">crypto-asset seizure</a> in Australian history at the time &#8212; while AUSTRAC later documented a 2022 conviction in which an offender <a href="https://www.trmlabs.com/resources/blog/crypto-related-crime-in-australia-what-court-records-tell-us-and-what-lies-ahead">used cryptocurrency</a> to purchase, import, and resell illicit drugs via dark-web markets.</p><p>What emerges is a hybrid criminal order: a system in which Latin American supply chains, Asian liquidity networks, and Australian demand converge into a single adaptive organism that mirrors the complexity of the licit economy while feeding off its infrastructure. Illicit proceeds move through offshore businesses and digital corridors before re-entering legitimate markets as investment capital. These convergent flows inflate asset prices &#8212; from <a href="https://www.austrac.gov.au/sites/default/files/2024-07/2024_Impact_of_money_laundering_and_terrorism_financing.pdf">property to logistics</a> &#8211; and distort <a href="https://www.austrac.gov.au/sites/default/files/2024-07/2024%20AUSTRAC%20Money%20Laundering%20NRA.pdf">trade data</a> once seen as reliable economic indicators.</p><p>The boundary between organized crime and legitimate enterprise is dissolving. What appears to be foreign investment may conceal criminal liquidity seeking legitimacy &#8211; embedding transnational finance and organized crime within the same bloodstream of the Australian economy.</p><p>This financial metabolism doesn&#8217;t end with narcotics. The same infrastructure now powers the region&#8217;s fastest-growing criminal enterprise: Southeast Asian scam centers.</p><h2><strong>On Australia&#8217;s Doorstep: Scam Centers and Massive Capital Outflows</strong></h2><p>Australia stands at the geographic doorstep of one of the world&#8217;s most pressing financial and humanitarian disasters: the vast Southeast Asian scam-industrial complex. As detailed in Rousselle&#8217;s recent article for The New Lines Institute, these compounds form part of a <a href="https://newlinesinstitute.org/state-resilience-fragility/chinese-shadow-liquidity-and-the-scam-economy/">broader ecosystem</a> primarily driven by Chinese organized crime &#8211; often state-linked &#8211; and built on capital outflows from China and neighboring economies. In countries such as Cambodia, Laos, Myanmar, and others, illicit and semi-licit funds are recycled through offshore financial hubs, cryptocurrencies, and digital payment infrastructure.</p><p>What began as a fringe phenomenon tied to telecom fraud and online gambling has evolved into a region-wide industry generating tens of billions of dollars annually, intertwined with human trafficking, narcotics proceeds, state-aligned shell corporations, and even <a href="https://smallwarsjournal.com/2025/07/24/illicit-liquidity-as-battlespace-rethinking-finance-in-asymmetric-conflict/">armed militants</a> and designated terror groups such as the Houthis.</p><p>Australia&#8217;s exposure to this ecosystem is twofold: as a lucrative victim market and as a destination for laundered funds. In 2024 alone, Australians reported nearly 495,000 scam incidents and losses exceeding AU$2 billion, according to the Australian National Anti-Scam Centre (NASC). These are not isolated acts of cybercrime but components of a regional financial system that drains consumer capital from high-income economies and reintroduces it into legitimate sectors via offshore layering and crypto-enabled laundering.</p><p>&#8220;We see crypto used as a source of major narcotic transaction and the source of much scam activity. The scam centers operating in South East Asia are also a major laundering risk for the Australian economy,&#8221; Thomas observed.</p><p>Australia&#8217;s role in this shadow network extends beyond consumer losses. The same digital corridors that move narcotics profits and scam proceeds now intersect with domestic financial infrastructure. As Thomas warned, &#8220;These illicit funds are entering the legitimate economy in a number of places and we need coordinated effort to shut that out. We also need coordination to stop the flow of recruitment of people into these centers and block their labor supply &#8211; targeting those human trafficking networks would be of great benefit.&#8221;</p><p>The nexus between financial exploitation and forced labor underscores the human cost of this liquidity system: victims in Australia are connected, through layers of deception and capital transfer, to victims across Southeast Asia whose exploitation sustains the machinery of fraud.</p><p>From Cambodia&#8217;s scam compounds to Australia&#8217;s financial sector, the circuit is closed by liquidity &#8211; money stripped of origin, nationality, and moral judgement. What appears as digital crime at the consumer level is, in practice, an extension of the same transnational financial order that Rousselle described: a shadow ecosystem born of unchecked capital outflows, institutional capture, and the global failure to distinguish dirty liquidity from economic vitality.</p><h2><strong>Coordination, Capacity, and the Enforcement Gap</strong></h2><p>Australia&#8217;s current regulatory architecture was built for an earlier generation of financial crime. The country&#8217;s first AML/CTF framework &#8211; <a href="https://www.qls.com.au/news-media-advocacy/history-of-aml-in-australia">Tranche 1</a>, enacted under the Anti-Money Laundering and Counter-Terrorism Financing Act 2006 and implemented in 2007 &#8211; was revolutionary at the time. It brought banks, remitters, casinos, and bullion dealers under AUSTRAC&#8217;s supervision, embedding risk-based compliance into the financial sector.</p><p>Yet nearly two decades later, that framework has atrophied. Successive governments have failed to deliver the long-promised Tranche 2 reforms that would extend AML/CTF obligations to lawyers, accountants, real-estate agents, and company service providers. These extensions are essential: although digital assets such as cryptocurrencies have been regulated since 2018, the professional intermediaries who help conceal these flows remain largely outside enforcement. Tranche 2 is designed to close that gap, but years of delay have allowed those channels to become the principal on-ramps for illicit digital capital.</p><p>The rollout of Tranche 2 &#8212; which would bring these professional facilitators under the AML/CTF compliance regime &#8212; has been repeatedly delayed amid <a href="https://www.austrac.gov.au/business/consultation-industry/second-public-consultation-new-amlctf-rules">prolonged consultation</a> and <a href="https://www.sanctions.io/blog/understanding-tranche-2-of-the-aml-ctf-reform">industry resistance</a>, creating structural blind spots that now serve as conduits for illicit liquidity. The result is a bifurcated system: highly regulated financial institutions on one side, and semi-formal professional networks on the other, precisely the spaces through which scam proceeds, narcotics profits, and offshore capital outflows can be re-routed into legitimate assets.</p><p>The current regulatory gap will not close until July 2026, when Tranche 2 entities are scheduled to come under full compliance. Until then, most are only beginning to familiarize themselves with their new AML/CTF obligations.</p><p>As Thomas noted, &#8220;They are understanding the law and their legal obligations but still don&#8217;t properly understand money laundering &#8211; how people actually do it through law firms and accounting practices in particular.&#8221;</p><p>AUSTRAC and partner agencies are now preparing extensive case studies to build that operational literacy, but the knowledge gap remains profound.</p><p>Australia&#8217;s enforcement landscape compounds the challenge. AUSTRAC, Australian Securities and Investment Commission (ASIC), the Australian Federal Police (AFP), and state police each bring essential capabilities to the country&#8217;s financial-crime architecture, yet their mandates often intersect across complex and rapidly evolving typologies. Coordination has improved through initiatives such as the Fintel Alliance, but information sharing remains largely case-driven rather than systemic. The protracted rollout of Tranche 2 represents a strategic vulnerability, leaving key professional channels open to exploitation in the meantime.</p><p>When the reforms finally take effect in mid-2026, they will bring long-excluded gatekeepers into the AML/CTF regime and expand the country&#8217;s capacity to trace illicit flows through professional channels that have so far escaped scrutiny. But timing is everything. Every month of delay allows shadow liquidity to entrench itself further within Australia&#8217;s legitimate economy, laundered through legal practices, escrow accounts, property holdings, and offshore intermediaries. The effectiveness of Tranche 2 will depend not only on its legislation, but on whether the institutions charged with enforcing it can move from static compliance to dynamic intelligence, matching the speed and adaptability of the networks they seek to contain.</p><h2><strong>Conclusion</strong></h2><p>Blockchain analytics and AI-assisted transaction mapping have <a href="https://gnet-research.org/2025/10/24/closing-the-enforcement-gap-ai-illicit-liquidity-and-the-next-phase-of-counter-terrorist-finance/">stripped away</a> much of the mystery that once surrounded digitized illicit finance. The problem is no longer invisibility but inertia. Regulators and enforcement agencies now possess unprecedented data on cross-border fund movements, stable-coin settlements, and the interlocking wallets and shell entities that sustain shadow liquidity. The question is whether they can move fast enough to act on it.</p><p>Other jurisdictions already are. Europe&#8217;s MiCA framework, Hong Kong&#8217;s virtual-asset licensing regime, and the proposed U.S. GENIUS Act each signal a shift from reactive compliance to proactive financial-infrastructure defense. By contrast, Australia&#8217;s reforms remain stalled between consultation papers and industry pushback. Every month of delay leaves the country more deeply embedded in the regional circuits of criminal capital that its own analytics can now trace in real time.</p><p>Australia&#8217;s challenge is therefore strategic, not technical. The data exist; the patterns are visible. What remains undecided is whether the nation will use its visibility to close the enforcement gap &#8211; or continue to serve as the Indo-Pacific&#8217;s liquidity sink and laundering hub for offshore criminal finance.</p>]]></content:encoded></item><item><title><![CDATA[Beyond Compliance: Enabling the Next Generation of AI Technology to Dismantle Illicit Liquidity Networks]]></title><description><![CDATA[Inside the Shadow Architecture That Shapes Modern Conflict]]></description><link>https://www.btl-research.com/p/beyond-compliance-enabling-the-next</link><guid isPermaLink="false">https://www.btl-research.com/p/beyond-compliance-enabling-the-next</guid><dc:creator><![CDATA[Adam Rousselle]]></dc:creator><pubDate>Sun, 23 Nov 2025 19:52:11 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Qwz9!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F00b264d5-064b-48f4-a5c0-71d13f270880_1260x720.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Qwz9!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F00b264d5-064b-48f4-a5c0-71d13f270880_1260x720.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Qwz9!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F00b264d5-064b-48f4-a5c0-71d13f270880_1260x720.png 424w, https://substackcdn.com/image/fetch/$s_!Qwz9!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F00b264d5-064b-48f4-a5c0-71d13f270880_1260x720.png 848w, https://substackcdn.com/image/fetch/$s_!Qwz9!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F00b264d5-064b-48f4-a5c0-71d13f270880_1260x720.png 1272w, https://substackcdn.com/image/fetch/$s_!Qwz9!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F00b264d5-064b-48f4-a5c0-71d13f270880_1260x720.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Qwz9!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F00b264d5-064b-48f4-a5c0-71d13f270880_1260x720.png" width="1260" height="720" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/00b264d5-064b-48f4-a5c0-71d13f270880_1260x720.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:720,&quot;width&quot;:1260,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Qwz9!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F00b264d5-064b-48f4-a5c0-71d13f270880_1260x720.png 424w, https://substackcdn.com/image/fetch/$s_!Qwz9!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F00b264d5-064b-48f4-a5c0-71d13f270880_1260x720.png 848w, https://substackcdn.com/image/fetch/$s_!Qwz9!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F00b264d5-064b-48f4-a5c0-71d13f270880_1260x720.png 1272w, https://substackcdn.com/image/fetch/$s_!Qwz9!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F00b264d5-064b-48f4-a5c0-71d13f270880_1260x720.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2><em><strong>Primer: How This Piece Got Here</strong></em></h2><p><em>This essay has already lived a small life of its own.</em></p><p><em>Since July, it circulated through several major legacy outlets. Some passed quickly and professionally; others expressed enthusiasm, requested time-consuming revisions, and ultimately stepped back for reasons that were never fully articulated. The responses varied, but the pattern was clear: uncertainty around unfamiliar frameworks, discomfort with material that sits outside conventional editorial lanes, and a broader hesitancy to publish work that challenges inherited assumptions.</em></p><p><em>The experience reinforced something that is only now beginning to shift. As recently as this past summer, traditional media still treated illicit liquidity as a peripheral issue. But the field is finally catching up. The traction my newer work has gained&#8212;across policy, enforcement, and analytical circles&#8212;reflects a broader recognition that liquidity is central terrain, not an auxiliary concern. The industry is evolving, even if the legacy editorial machinery has been slower to recognize the shift.</em></p><p><em>This piece was written to explain that evolution&#8212;how illicit liquidity systems now outlast militaries, sanctions regimes, and enforcement architecture itself&#8212;and why understanding this shift is no longer optional. Its publication journey ended up mirroring its own thesis: frameworks built for a previous era often struggle to accommodate the realities of the present one.</em></p><p><em>Since writing it, I&#8217;ve expanded and refined many of the concepts it introduced, but this remains the originating document. I am publishing it here in the form it was meant to take&#8212;not diluted, not retrofitted to an older template, and not reshaped to fit the boundaries of legacy formats. If those outlets revisit this space later, they can. My readers don&#8217;t need them to recognize the stakes.</em></p><p><em>Below is the full piece, unchanged except for minor clarity edits&#8212;the version that wasn&#8217;t designed to make anyone comfortable, but to make the problem clear.</em></p><div><hr></div><p><br>In May 2025, FinCEN designated <a href="https://www.fincen.gov/news/news-releases/fincen-finds-cambodia-based-huione-group-be-primary-money-laundering-concern">Huione Group</a> and Huione Pay as a &#8220;primary money laundering concern&#8221;, citing $4 billion in proceeds tied to scams, human trafficking, and North Korean hackers. Despite global scrutiny, Huione <a href="https://www.chainalysis.com/blog/huione-guarantee-still-active-despite-shutdown/">remains operational</a>.</p><p>This outcome is a strategic warning.</p><p>Huione&#8217;s resilience typifies a new global architecture of shadow liquidity that sustains conflict, corruption, and authoritarian influence from Southeast Asia to West Africa and beyond. These networks do not survive because they evade detection but because enforcement strategies continue to treat financial infrastructure as peripheral rather than primary terrain.</p><p>While U.S. and allied responses have prioritized <a href="https://bidenwhitehouse.archives.gov/briefing-room/presidential-actions/2023/02/23/memorandum-on-united-states-conventional-arms-transfer-policy/?utm_source=chatgpt.com">weapons transfers</a>, <a href="https://www.whitehouse.gov/presidential-actions/2025/01/clarifying-the-militarys-role-in-protecting-the-territorial-integrity-of-the-united-states/?utm_source=chatgpt.com">territorial control</a>, and traditional <a href="https://warontherocks.com/2023/07/what-allies-want-delivering-the-u-s-national-defense-strategys-ambition-on-allies-and-partners/?utm_source=chatgpt.com">alliance-building</a>, adversaries have quietly focused on what actually sustains power: value mobility. The real vulnerability is our failure to treat financial infrastructure as battlespace&#8212;one that sustains adversaries and keeps them resilient against sanctions and other enforcement measures.</p><p>If adversaries can move value with speed, deniability, and scale, they do not need air superiority or territorial control. They can fund insurgency, project influence, and exploit crises faster than formal systems can adapt. The longer this architecture remains intact, the greater the threat to global stability.</p><p>To remain effective, national security thinking must evolve to treat financial infrastructure as core battlespace. This includes conceptualizing the purpose of tools currently under development, such as DARPA&#8217;s Advanced Analysis of Multinational Money Laundering (<a href="https://www.darpa.mil/research/programs/a3ml-anticipatory-adaptive">A3ML</a>) initiative&#8212;not merely as forensic engines, but as platforms for pre-emptive disruption of shadow liquidity networks.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.btl-research.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Between the Lines is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2><strong>Defining the Battlespace</strong></h2><p><a href="https://newlinesinstitute.org/state-resilience-fragility/chinese-shadow-liquidity-and-the-scam-economy/">Shadow liquidity</a> is a distinct category of capital movement&#8212;decentralized, broker-mediated, and designed for cross-jurisdictional convertibility beyond banking oversight. These networks&#8212;operating through <a href="https://fuze.finance/blog/otc-crypto-trading-in-2025/#:~:text=OTC%20(Over%2Dthe%2DCounter,discreetly%20without%20moving%20market%20prices.">over-the-counter</a> (OTC) crypto brokers, <a href="https://media-publications.bcg.com/Stablecoins-five-killer-tests-to-gauge-their-potential.pdf">stablecoin</a> corridors, <a href="https://www.investopedia.com/terms/h/hawala.asp">hawala-style</a> settlement systems, and gray-market payment platforms like <a href="https://www.bloomberg.com/news/features/2025-08-01/huione-s-24-billion-hub-for-cybercrime-is-an-amazon-for-criminals">Huione</a>&#8212;form a parallel liquidity architecture outside formal regulation. Shadow liquidity spans both licit and illicit nodes; Illicit Liquidity Networks (ILNs) are its subset devoted specifically to illegal flows.</p><p>Persistence makes shadow liquidity strategically significant. Traditional threat finance has generally been <a href="https://www.bronid.com/post/what-are-the-typologies-of-money-laundering-and-terrorist-financing?utm_source=chatgpt.com">treated as episodic</a>: discrete flows tied to specific actors, transactions, or events, which can be traced, disrupted, and prosecuted. Shadow liquidity systems, by contrast, <a href="https://smallwarsjournal.com/2025/07/24/illicit-liquidity-as-battlespace-rethinking-finance-in-asymmetric-conflict/">behave like infrastructure</a>. They are not pipelines serving a single organization or network but adaptive, self-reinforcing ecosystems that outlast individual actors.</p><p>The convergence of these systems with crypto rails has accelerated their reach and resilience. OTC brokers link fiat currencies to <a href="https://vancelian.com/en/news/hong-kong-targets-over-the-counter-otc-crypto-services-in-regulatory-clampdown">dollar-denominated</a> stablecoins, serving not just as technical facilitators, but essential nodes in an informal financial network where <a href="https://www.fatf-gafi.org/content/dam/fatf-gafi/reports/Trade-Based-Money-Laundering-Trends-and-Developments.pdf?utm_source=chatgpt.com">trade settlement</a>, <a href="https://www.fatf-gafi.org/content/dam/fatf-gafi/reports/Professional-Money-Laundering.pdf?utm_source=chatgpt.com">investment flows</a>, and other illicit capital flows blend into the same liquidity pools.</p><p>Treating shadow liquidity as just another typology of illicit finance misses its structural role: it is not a symptom of criminal activity but an <a href="https://smallwarsjournal.com/2025/07/24/illicit-liquidity-as-battlespace-rethinking-finance-in-asymmetric-conflict/">enabler</a> of hybrid state and non&#8209;state operations. Whether used to sustain sanctioned economies, move capital into gray&#8209;zone <a href="https://www.tearline.mil/public_page/cambodia?utm_source=chatgpt.com">investment projects</a>, or provide working liquidity to transnational criminal or <a href="https://gnet-research.org/2025/05/14/cash-flow-breaking-down-the-houthis-multibillion-dollar-financial-networks/">militant networks</a>, these systems create strategic depth for actors who would otherwise be constrained by formal financial architectures.</p><p>Understanding modern threat finance requires a shift from seeing illicit flows as isolated events to mapping the living infrastructure that sustains them. Shadow liquidity is not the side effect of a globalized economy; it is the battlespace in which financial sovereignty, hybrid conflict, and criminal enterprise now converge.</p><h2><strong>Case study cluster:</strong></h2><p>The following cases illustrate how shadow liquidity manifests across regions and conflict theaters, showing both its adaptability and its strategic impact. Taken together, these cases illustrate a convergence: shadow liquidity networks evolve into semi-sovereign systems once they achieve scale. Whether scam economies in Southeast Asia, Iran&#8217;s proxy liquidity, or Russia&#8217;s mercenary finance, the pattern is the same &#8212; financial autonomy emerges faster than enforcement adapts. This comparative view highlights why treating flows as isolated typologies misses the structural threat.</p><h2><strong>Southeast Asia &#8211; China&#8217;s Shadow Finance Ecosystem</strong></h2><p>Southeast Asia has become the epicenter of China&#8217;s offshore liquidity blowback.<strong> </strong>What began as state-managed capital outflows&#8212;meant to <a href="https://ipdefenseforum.com/2025/02/shadow-networks-shell-companies-help-prc-russia-evade-sanctions-export-controls/?utm_source=chatgpt.com">bypass controls</a> and evade sanctions&#8212;has evolved into a parasitic financial ecosystem: <a href="https://www.uscc.gov/research/chinas-exploitation-scam-centers-southeast-asia">scam compounds</a>, <a href="https://www.bbc.com/news/world-asia-67471138">gray casinos</a>, and informal <a href="https://www.trmlabs.com/resources/blog/how-telegrams-ban-on-huione-and-xinbi-has-reshaped-the-guarantee-services-landscape">payment rails</a> now operate beyond Beijing&#8217;s reach while draining billions from China&#8217;s <a href="https://theconversation.com/pig-butchering-scams-have-stolen-billions-from-people-around-the-world-heres-what-you-need-to-know-252774">own economy</a>.</p><p>Across Cambodia, Laos, and Myanmar, Huione Pay and networks like it anchor <a href="https://theinternationalriskpodcast.com/the-international-risks-of-china-s-belt-and-road-initiative-philanthropy-or-a-hidden-pathway-to-crime/#:~:text=China's%20Yunnan%20province%20and%20its,as%20well%20as%20financial%20crime">scam hubs</a> tied to Chinese-funded <a href="https://www.business-humanrights.org/en/latest-news/southeast-asia-special-economic-zones-in-mekong-region-become-hub-for-scam-operations-and-human-trafficking-as-organised-crime-groups-grow/?utm_source=chatgpt.com">Special Economic Zones</a> (SEZs) and <a href="https://smallwarsjournal.com/2025/07/24/illicit-liquidity-as-battlespace-rethinking-finance-in-asymmetric-conflict/">armed actors</a>. This reach extends beyond the region, as evidenced by the <a href="https://gnet-research.org/2025/05/14/cash-flow-breaking-down-the-houthis-multibillion-dollar-financial-networks/">Houthis&#8217; use of Huione</a> as a money laundering service, underscoring how Southeast Asia&#8217;s shadow finance now fuels conflicts beyond the region. China&#8217;s offshore shadow finance systems are no longer just a laundering problem but a crisis of sovereignty. These systems persist not through evasion, but through structural autonomy.</p><h2><strong>Iran &#8211; Liquidity Proxies and Strategic Autonomy</strong></h2><p>Iran&#8217;s proxy liquidity system has become semi-sovereign&#8212;sustaining regional influence while eroding domestic control.</p><p>Groups like <a href="https://gnet-research.org/2025/07/21/hezbollahs-latin-american-networks-stablecoins-smuggling-and-sanctions-evasion/">Hezbollah</a> and the <a href="https://gnet-research.org/2025/05/14/cash-flow-breaking-down-the-houthis-multibillion-dollar-financial-networks/">Houthis</a> now operate independent financial architectures, built on regional taxation, smuggling, and crypto-mediated commodity sales. Stablecoins and hawala networks stretching from <a href="https://www.elliptic.co/blog/ofac-sanctions-eight-ansarallah-the-houthis-crypto-addresses">Cambodia</a> to <a href="https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/the-maduro-hezbollah-nexus-how-iran-backed-networks-prop-up-the-venezuelan-regime/">Venezuela</a> allow these proxies to generate and deploy funds without central disbursement&#8212;blurring the line between state-backed operations and autonomous liquidity regimes.</p><p>Tehran&#8217;s leverage is now negotiated, not commanded. Even Iraqi militias once firmly under Iranian Revolutionary Guard Corps (IRGC) influence increasingly pursue <a href="https://ecfr.eu/publication/proxy-battles-iraq-iran-and-the-turmoil-in-the-middle-east/#:~:text=Iran%20faces%20a%20challenging%20balancing,and%20dialogue%20in%20the%20region.">self-financing</a> agendas. Meanwhile, the IRGC has <a href="https://www.ncr-iran.org/en/news/economy/iran-news-chainalysis-report-exposes-regimes-deepening-reliance-on-crypto-amid-economic-collapse/">offshored vast capital</a> through front companies, creating a shadow reserve system that sustains proxy operations but hollows out Iran&#8217;s monetary base.</p><p>Phantom <a href="https://www.aljazeera.com/news/2021/5/5/iran-ex-central-bank-boss-faces-indictment-over-mismanagement">gold accounting</a> and <a href="https://www.calcalistech.com/ctechnews/article/5en9hq25s?utm_source=chatgpt.com">offshore accounts</a> conceal a liquidity collapse. The rial&#8217;s <a href="https://www.ft.com/content/6968b018-b04d-4389-85da-d4ebe91e927e">redenomination</a>&#8212;slashing four zeros&#8212;signals a potential regime-induced currency failure. Sanctions that target banks or known intermediaries miss the mark; the true threat is not just the actors, but the parallel financial architecture sustaining them.</p><h2><strong>Russia &#8211; Mercenary Liquidity Infrastructure</strong></h2><p>The resilience of Wagner and its successor, the Africa Corps, reveals how deeply embedded shadow liquidity systems are in Russia&#8217;s expeditionary strategy. These networks bypass Moscow&#8217;s formal financial system, instead relying on <a href="https://icct.nl/publication/understanding-us-designation-wagner-group-transnational-criminal-organisation">resource smuggling</a>, gold and diamond flows <a href="https://www.npr.org/2023/12/27/1221318890/russia-ukraine-wagner-group-putin-africa-blood-gold">laundered through Dubai</a>, and opaque third-party facilitators. Non-bank intermediaries and commodity traders provide both mobility and deniability, with indications that <a href="https://www.ft.com/content/741f67e2-ff00-4395-98bb-608083ce3432?utm_source=chatgpt.com">stablecoin rails</a> bridge African resource wealth to operational accounts abroad.</p><p>Russian mercenary operations in Africa reveal how shadow liquidity enables sanctions evasion and strategic divergence. These networks can outgrow state control, making local deals that <a href="https://ctc.westpoint.edu/africa-corps-has-russia-hit-a-ceiling-in-africa/?utm_source=chatgpt.com">contradict</a> official policy. The enforcement lesson is structural: targeting individuals fails when the network is modular, adaptive, and partially sovereign. Wagner&#8217;s liquidity architecture shows how private and state power converge through shadow finance</p><h2><strong>Synthesis:</strong></h2><p>Liquidity systems built for strategic depth have mutated into semi-autonomous infrastructures. Across Southeast Asia&#8217;s scam-finance belt, Iran&#8217;s proxy networks, and Russia&#8217;s mercenary plunder, a common feature emerges&#8212;adaptability and persistence. These are not episodic money trails but living financial architectures. Disrupting them requires more than transaction monitoring; it demands ecosystem-level mapping and structural interventions.</p><h2><strong>Institutional Blind Spots</strong></h2><p>Despite advances in threat finance, global security systems remain misaligned. The core challenge is conceptual inertia. National security and regulatory frameworks still treat illicit finance as a transactional problem despite shifting circumstances. The greatest threats now move not through isolated bank accounts or criminal actors, but through decentralized liquidity networks&#8212;adaptive, hybrid financial ecosystems that function beyond the reach of conventional enforcement.</p><p>These networks are not invisible. They are partially observed, persistently flagged, and yet structurally misunderstood. Financial surveillance <a href="https://www.occ.treas.gov/topics/supervision-and-examination/bank-operations/financial-crime/suspicious-activity-reports/index-suspicious-activity-reports.html">tracks anomalies</a> inside banks but misses liquidity outside them. What it cannot see, let alone disrupt, is the architecture of liquidity that exists outside its perimeter.</p><p>Today&#8217;s adversarial liquidity flows increasingly blend stablecoin corridors, over-the-counter (OTC) brokers, <a href="https://www.investopedia.com/terms/s/shellcorporation.asp">shell companies</a>, <a href="https://bitmarkets.academy/en/crypto-for-professionals/what-are-nested-exchanges">nested exchanges</a>, and informal value transfer systems like hawala. They straddle legality, often making use of mainstream platforms and payment rails while remaining structurally opaque. These flows do not behave like traditional laundering transactions, but rather like sovereign financial systems in miniature, operating under their own rules and norms. Current tools were built to find bad actors, not to identify financial sovereignty.</p><p>This actor-centric paradigm enables profound blind spots. Compliance tools detect transactions but fail to contextualize liquidity patterns across jurisdictions and asset types. As a result, regulators and intelligence agencies see fragments&#8212;but no infrastructure. The network remains intact, quietly evolving.</p><p>Legal constraints further widen the gap. Jurisdictional <a href="https://globalnetworkinitiative.org/wp-content/uploads/GNI-MLAT-Report.pdf?utm_source=chatgpt.com">silos</a>, lengthy mutual legal assistance treaty (<a href="https://globalnetworkinitiative.org/wp-content/uploads/GNI-MLAT-Report.pdf?utm_source=chatgpt.com">MLAT</a>) procedures, and fragmented <a href="https://www.moneylaunderingnews.com/2023/07/leveraging-aml-measures-to-combat-tax-crimes-a-guest-blog/?utm_source=chatgpt.com">beneficial ownership</a> laws delay or block enforcement. Meanwhile, regulatory frameworks remain chronically outdated. Cryptocurrency policy is <a href="https://www.mheducation.com/highered/blog/2025/03/cryptocurrency-regulations-are-changing-across-the-globe.html">inconsistent</a> across the U.S., EU, and Asia. Platforms offering liquidity-as-a-service&#8212;such as peer-to-peer (<a href="https://www.elluminatiinc.com/how-p2p-crypto-exchange-works/#:~:text=your%20questions%20answered.-,Peer%20To%20Peer%20(P2P)%20Crypto%20Exchange%20%E2%80%93%20Defined,software%20typically%20makes%20it%20possible.">P2P</a>) exchanges, <a href="https://www.mckinsey.com/industries/financial-services/our-insights/the-stable-door-opens-how-tokenized-cash-enables-next-gen-payments">stablecoin escrow</a> markets, and anonymous <a href="https://hyperverge.co/blog/anonymous-crypto-wallets/">crypto wallets</a>&#8212;often fall through the cracks. Many operate in legal gray zones or under <a href="https://www3.weforum.org/docs/WEF_Pathways_to_the_Regulation_of_Crypto_Assets_2023.pdf">regulatory arbitrage</a>, where no single state has oversight, and with little incentive to close the gap.</p><p>The result is not a lack of information, but an inability to act on what is already visible. Shadow liquidity does not thrive in darkness. It thrives in disconnection&#8212;between agencies, between legal systems, and between the visible and the actionable. This disjointedness is no longer an anomaly. It is the terrain upon which adversarial financial networks are built.</p><h2><strong>From Designation to Disruption: the Legal Infrastructure for Liquidity Warfare and A3ML</strong></h2><p>The proposed Anticipatory and Adaptive Anti-Money Laundering (A3ML) framework is designed to identify, designate, and dismantle illicit liquidity systems. Unlike traditional tools focused on compliance and anomalies, A3ML can become an AI-driven <a href="https://hackernoon.com/darpas-bold-ai-plan-to-stop-money-laundering-in-its-tracks?utm_source=chatgpt.com">infrastructure mapping system</a>. To be effective, it must be trained on deep, pattern-based financial research and empowered by cross-jurisdictional legal reform. Its targeting must focus not only on bad actors, but on the systemic architecture that sustains them.</p><p>The American legal architecture built to combat organized crime offers a blueprint for confronting today&#8217;s most urgent financial threat: illicit liquidity networks. The Racketeer Influenced and Corrupt Organizations Act (<a href="https://www.ojp.gov/ncjrs/virtual-library/abstracts/rico-racketeer-influenced-and-corrupt-organizations-act-statute">RICO</a>) succeeded not by prosecuting criminals one by one, but by treating entire criminal enterprises as unified entities. It marked a doctrinal shift&#8212;from targeting individuals to dismantling infrastructure.</p><p>Illicit finance in 2025 demands a similar evolution of thought. What we face today are not merely networks of bad actors but global, adaptive liquidity ecosystems that serve as the financial backbone of transnational crime, proxy warfare, and authoritarian statecraft. These systems are durable, decentralized, and increasingly indistinguishable from legitimate financial activity. We must understand them not as criminal anomalies, but as sovereign financial organisms enabled by adaptive cross-jurisdictional infrastructure.</p><p>This is not about policing bad actors. It is about mapping and disabling the systems that allow bad actors to regenerate faster than enforcement can respond.</p><h2><strong>Civil Asset Forfeiture as Strategic Weapon</strong></h2><p>Time is the decisive variable in liquidity warfare. Prosecutions remain too slow to neutralize networks moving billions in real time. A3ML must therefore expand the civil asset forfeiture logic pioneered under RICO across global jurisdictions. Unlike criminal cases, civil forfeiture permits freezing assets on a preponderance of the very evidence A3ML is built to track in real time.</p><p>Civil forfeiture enables <a href="https://www.law.cornell.edu/wex/civil_forfeiture">pre-emptive action</a> against identified liquidity networks&#8212;especially when paired with new legal definitions that treat financial networks, not just individuals, as targets. This mechanism already exists. What is missing is the conceptual shift that elevates illicit liquidity to the level of strategic infrastructure.</p><p>To operate globally, this tool must be accompanied by jurisdictional harmonization. While A3ML does not currently establish mutual recognition protocols, its framework could build on existing international precedents&#8212;such as the <a href="https://www.coe.int/en/web/cdpc/pc-rac#:~:text=The%20Council%20of%20Europe%20has,and%20the%20financing%20of%20terrorism.">Strasbourg</a> and <a href="https://www.coe.int/en/web/cop198">Warsaw</a> Conventions&#8212;to enable partner states to enforce each other&#8217;s forfeiture orders against designated liquidity networks. The goal is speed: convert intelligence into disruption within days, not years.</p><h2><strong>Jurisdictional Leverage and Legal Hooks</strong></h2><p>The United States already has the legal foundation to operationalize A3ML. Statutes such as Section 311 of the <a href="https://www.fincen.gov/resources/statutes-and-regulations/usa-patriot-act">USA PATRIOT</a> Act and the <a href="https://www.occ.treas.gov/topics/supervision-and-examination/bsa/index-bsa.html#:~:text=The%20Bank%20Secrecy%20Act%20(BSA,and%20agencies%20of%20foreign%20banks.">Bank Secrecy Act</a> provide hooks for systemic disruption, especially when combined with U.S. control over dollar clearing and correspondent <a href="https://ofac.treasury.gov/faqs/946">banking access</a>. A3ML&#8217;s contribution is not legal but conceptual: it unifies these authorities into a framework for targeting liquidity networks rather than isolated actors&#8212;and at speeds much faster than human analysis.</p><p>Global coordination is not just possible&#8212;it is already taking shape. The Financial Action Task Force (FATF), long the international standard-setter for AML/CFT compliance, has begun to acknowledge the complexity of illicit financial infrastructures beyond formal institutions. Initiatives like Operation Grafos&#8212;which targeted professional money laundering networks as coherent entities&#8212;represent a significant step toward structural thinking. Grafos &#8211; highlighted in the <a href="https://www.fatf-gafi.org/en/publications/Methodsandtrends/comprehensive-update-terrorist-financing-risks-2025.html">FATF&#8217;s 2025 report</a> on terrorist finance - showed that the global community is starting to move from transactional enforcement to enterprise-level disruption.</p><p>But FATF&#8217;s core recommendations still focus primarily on institutional behavior: due diligence, beneficial ownership, and recordkeeping. They stop short of mapping or designating networked liquidity systems, and they lack the enforcement mandates required to neutralize them.</p><p>This is where A3ML fits&#8212;not as a competitor to established frameworks, but as their architectural complement and enforcer. It provides the conceptual framing and enforcement logic needed to extend current compliance standards into a cross-jurisdictional, structural response to liquidity-based threats. By aggregating and processing data in real time, A3ML can reframe illicit finance not as a series of reporting failures, but as a systematized battlespace&#8212;one that demands structural tools to navigate and dismantle. It must be trained on real data and paired with cross-border reform.</p><h2><strong>Defining the Target: Illicit Liquidity Networks</strong></h2><p>Illicit Liquidity Networks (ILNs) are the unlawful subset of shadow liquidity&#8212;persistent financial structures, whether criminal, corporate, or state-aligned, through which value moves beyond sovereign control. Where shadow liquidity describes the broader architecture, ILNs identify the specifically illicit nodes that A3ML is designed to dismantle.</p><p>A3ML could designate ILNs as systemic threats rather than fragmented cases. Phase I would map ILNs through public&#8211;private partnerships. Phase II would build on emerging stablecoin oversight to close gray intermediaries. Phase III would disable them through forfeiture, cutoffs, and coordinated sanctions. Implementing these phases would require no new agency, only integration of existing authorities. A3ML is not a silver bullet but a structural correction. Without it, security architecture will remain reactive&#8212;outpaced by networks that understand one truth: control liquidity, and you control survival. Operational success will depend on embedding liquidity mapping into existing security frameworks and building analytic partnerships capable of predictive disruption beyond the banking system.</p><h1><strong>Conclusion &#8211; Sovereignty and Strategy in the Age of Hybrid Liquidity</strong></h1><p>Sovereignty today is no longer defined by borders, flags, or deterrence, but by the ability to control the flow of capital&#8212;licit and illicit, digital and analog, state and shadow. In this battlespace, liquidity itself is sovereignty. Without tools to secure the circulatory system of finance, every alliance, sanction, and military asset is vulnerable to erosion by this new paradigm.</p><p>Illicit liquidity networks enable proxy wars, hollow out regulatory regimes, and entrench criminal ecosystems that feed on institutional weakness. And they do it faster than conventional enforcement can react. Treating financial architectures as an auxiliary domain of national security is no longer tenable. What A3ML offers is not just a legal instrument&#8212;it is a strategic reorientation. One that recognizes that power now flows through networks, not just weapons; through escrow chains and stablecoins, not just supply chains and ships.</p><p>If we fail to respond, we invite encroachment&#8212;not by military forces, but by liquidity systems we ignored. The choice is clear: keep reacting in fragments, or build the architecture to defeat liquidity insurgency systemically.</p>]]></content:encoded></item><item><title><![CDATA[Podcast Interview: The China Global South Project]]></title><description><![CDATA[My latest appearance on the CGSP podcast to discuss illicit finance in Africa]]></description><link>https://www.btl-research.com/p/podcast-interview-the-china-global</link><guid isPermaLink="false">https://www.btl-research.com/p/podcast-interview-the-china-global</guid><dc:creator><![CDATA[Adam Rousselle]]></dc:creator><pubDate>Fri, 21 Nov 2025 19:10:33 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!UbeK!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8d322c73-ff1a-4979-81f8-07dd6f6f0c90_1906x1084.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>I recently appeared on the China Global South Project (CGSP) podcast, where I discussed my <a href="https://www.btl-research.com/p/illicit-prc-linked-finance-enables">recent article</a> for the Jamestown China Brief. There was much to unpack as that article was very dense and meant to spark exactly this sort of conversation. <br><br>Thanks to Geroud and the rest of the team at CGSP for reaching out.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!UbeK!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8d322c73-ff1a-4979-81f8-07dd6f6f0c90_1906x1084.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!UbeK!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8d322c73-ff1a-4979-81f8-07dd6f6f0c90_1906x1084.png 424w, https://substackcdn.com/image/fetch/$s_!UbeK!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8d322c73-ff1a-4979-81f8-07dd6f6f0c90_1906x1084.png 848w, https://substackcdn.com/image/fetch/$s_!UbeK!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8d322c73-ff1a-4979-81f8-07dd6f6f0c90_1906x1084.png 1272w, https://substackcdn.com/image/fetch/$s_!UbeK!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8d322c73-ff1a-4979-81f8-07dd6f6f0c90_1906x1084.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!UbeK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8d322c73-ff1a-4979-81f8-07dd6f6f0c90_1906x1084.png" width="1456" height="828" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8d322c73-ff1a-4979-81f8-07dd6f6f0c90_1906x1084.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:828,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2892559,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.btl-research.com/i/179584109?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8d322c73-ff1a-4979-81f8-07dd6f6f0c90_1906x1084.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!UbeK!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8d322c73-ff1a-4979-81f8-07dd6f6f0c90_1906x1084.png 424w, https://substackcdn.com/image/fetch/$s_!UbeK!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8d322c73-ff1a-4979-81f8-07dd6f6f0c90_1906x1084.png 848w, https://substackcdn.com/image/fetch/$s_!UbeK!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8d322c73-ff1a-4979-81f8-07dd6f6f0c90_1906x1084.png 1272w, https://substackcdn.com/image/fetch/$s_!UbeK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8d322c73-ff1a-4979-81f8-07dd6f6f0c90_1906x1084.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div id="youtube2-eePUvmq2i9M" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;eePUvmq2i9M&quot;,&quot;startTime&quot;:&quot;2593s&quot;,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/eePUvmq2i9M?start=2593s&amp;rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div>]]></content:encoded></item><item><title><![CDATA[Illicit PRC-linked Finance Enables Arms Diversion in Africa]]></title><description><![CDATA[A recent piece I wrote as a follow up to an article I wrote for China Brief last year, which was cited in a U.S. Senate Report.]]></description><link>https://www.btl-research.com/p/illicit-prc-linked-finance-enables</link><guid isPermaLink="false">https://www.btl-research.com/p/illicit-prc-linked-finance-enables</guid><dc:creator><![CDATA[Adam Rousselle]]></dc:creator><pubDate>Fri, 31 Oct 2025 15:47:00 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!4fFZ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e2495e8-e13c-4228-acb6-875a21b79109_1024x1024.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!4fFZ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e2495e8-e13c-4228-acb6-875a21b79109_1024x1024.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!4fFZ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e2495e8-e13c-4228-acb6-875a21b79109_1024x1024.jpeg 424w, https://substackcdn.com/image/fetch/$s_!4fFZ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e2495e8-e13c-4228-acb6-875a21b79109_1024x1024.jpeg 848w, https://substackcdn.com/image/fetch/$s_!4fFZ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e2495e8-e13c-4228-acb6-875a21b79109_1024x1024.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!4fFZ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e2495e8-e13c-4228-acb6-875a21b79109_1024x1024.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!4fFZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e2495e8-e13c-4228-acb6-875a21b79109_1024x1024.jpeg" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6e2495e8-e13c-4228-acb6-875a21b79109_1024x1024.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!4fFZ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e2495e8-e13c-4228-acb6-875a21b79109_1024x1024.jpeg 424w, https://substackcdn.com/image/fetch/$s_!4fFZ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e2495e8-e13c-4228-acb6-875a21b79109_1024x1024.jpeg 848w, https://substackcdn.com/image/fetch/$s_!4fFZ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e2495e8-e13c-4228-acb6-875a21b79109_1024x1024.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!4fFZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e2495e8-e13c-4228-acb6-875a21b79109_1024x1024.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><a href="https://medium.com/war-is-boring/chinese-anti-aircraft-missiles-appear-in-south-sudan-ce7c4e99470f">Image source</a></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!KzSh!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9afd89fd-1ff4-4359-8c85-d3c8cf8a8842_6250x1875.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!KzSh!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9afd89fd-1ff4-4359-8c85-d3c8cf8a8842_6250x1875.png 424w, https://substackcdn.com/image/fetch/$s_!KzSh!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9afd89fd-1ff4-4359-8c85-d3c8cf8a8842_6250x1875.png 848w, https://substackcdn.com/image/fetch/$s_!KzSh!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9afd89fd-1ff4-4359-8c85-d3c8cf8a8842_6250x1875.png 1272w, https://substackcdn.com/image/fetch/$s_!KzSh!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9afd89fd-1ff4-4359-8c85-d3c8cf8a8842_6250x1875.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!KzSh!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9afd89fd-1ff4-4359-8c85-d3c8cf8a8842_6250x1875.png" width="1456" height="437" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9afd89fd-1ff4-4359-8c85-d3c8cf8a8842_6250x1875.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:437,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!KzSh!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9afd89fd-1ff4-4359-8c85-d3c8cf8a8842_6250x1875.png 424w, https://substackcdn.com/image/fetch/$s_!KzSh!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9afd89fd-1ff4-4359-8c85-d3c8cf8a8842_6250x1875.png 848w, https://substackcdn.com/image/fetch/$s_!KzSh!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9afd89fd-1ff4-4359-8c85-d3c8cf8a8842_6250x1875.png 1272w, https://substackcdn.com/image/fetch/$s_!KzSh!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9afd89fd-1ff4-4359-8c85-d3c8cf8a8842_6250x1875.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><blockquote><p><em>This is an article I recently published with the Jamestown Foundation China Brief Notes. It comes as a follow up to <a href="https://www.btl-research.com/p/prc-manufactured-weapons-abound-among">an article</a> I wrote for China Brief last year, which was cited in a 2025 report by the U.S. Senate Foreign Relations Committee. You can find the link to the latest article <a href="https://jamestown.org/program/illicit-prc-linked-finance-enables-arms-diversion-in-africa/">here</a>. </em></p></blockquote><h3><strong>Executive Summary:</strong></h3><ul><li><p>Judicial cases in the Democratic Republic of the Congo and in Nigeria confirm that citizens from the People&#8217;s Republic of China (PRC) are active in both resource extraction and digital offshore laundering networks, connecting illicit resource economies and stablecoin settlement into value chains that sustain conflict.</p></li><li><p>Gold, timber, and crypto flows move through the same corridors that carry PRC-manufactured weapons into embargoed zones. This integration creates a shadow liquidity system in which capital and material reinforce one another, allowing African militant economies to become self-financing and resilient to external pressure.</p></li><li><p>Existing regimes treat arms diversion and money laundering as separate issues. They are not. Addressing this challenge requires collapsing the divide between arms embargo enforcement and financial crime intelligence into a single operational continuum.</p></li></ul><div><hr></div><p>The circulation of weapons manufactured in the People&#8217;s Republic of China (PRC) has become an increasingly visible feature of African conflicts. Earlier research by this author traced how Chinese small arms and light weapons appear in the hands of militant groups across the continent, often in ways that reveal the fragility of existing control mechanisms (<a href="https://jamestown.org/program/prc-manufactured-weapons-abound-among-african-militant-groups/">China Brief</a>, November 1, 2024; <a href="https://www.foreign.senate.gov/imo/media/doc/abridged_china_report.pdf">U.S. Senate</a>, July 2025). That research underscored the scale of material leakage from licit trade into irregular markets. Since then, more evidence has come to light to suggest that the story does not end with the physical movement of arms.</p><p>Alongside weapons, Chinese illicit finance networks are spreading across Africa&#8217;s conflict zones and beyond. These networks have the capacity to enable militant actors to not only acquire weapons but also to sustain self-financing economies of violence and extraction. They tie the diversion of arms to capital flows that are deliberately routed through opaque offshore structures, informal value transfer systems, and state-aligned facilitators.</p><p>Illicit finance is not a peripheral concern. It is a structural enabler of militant economies and arms transfers. Understanding the fusion of financial and material supply chains is therefore essential for grasping how African conflicts are evolving, and how external actors shape them.</p><h3><strong>Chinese Criminals Embedded in Conflict Economies</strong></h3><p>In January, a court in Bukavu, a war-torn community in the eastern Democratic Republic of the Congo, handed down a rare and decisive judgment against three PRC nationals involved in illicit extractive activity. The defendants were convicted for operating illegal mining concessions and laundering proceeds through both cash and precious metals (<a href="https://www.scmp.com/news/world/africa/article/3294788/3-chinese-citizens-sentenced-7-years-illegal-mining-dr-congo">South China Morning Post [SCMP]</a>, January 15). Authorities seized more than $400,000 in hard currency alongside a quantity of gold bars, establishing a direct evidentiary trail from resource extraction to illicit financial flows (<a href="https://centralnews.co.za/dr-congo-sentences-chinese-nationals-to-seven-years-for-illegal-mining-activities/">Central News</a>, January 16). Because this conviction was adjudicated in court, it created a judicially verified record of PRC actors engaging in illicit commerce within a conflict zone. The absence of PRC media coverage of this case is telling.</p><p>The defendants did not operate in a vacuum. The PRC maintains a visible commercial footprint across eastern Congo&#8217;s extractives economy, including Chinese-owned buying houses, traders, and small-scale gold operations in war-torn South Kivu (<a href="https://www.ecofinagency.com/mining/3012-46281-africas-mining-nations-stand-against-illegal-chinese-miners">ECOFIN</a>, December 30, 2024). PRC state media has even warned PRC nationals of the legal and security risks of doing such business in the war-torn region, explicitly mentioning mining activities (<a href="http://www.news.cn/world/20250728/c5c99a670034454c92f1a536f3e59173/c.html">Xinhua</a>; <a href="http://www.news.cn/world/20250728/c5c99a670034454c92f1a536f3e59173/c.html">Consular Express WeChat Official Account</a>, July 28). Congolese officials and local communities have repeatedly objected to illicit practices attributed to Chinese operators (<a href="https://acp.cd/province/sud-kivu-lexploitation-anarchique-et-illegale-des-minerais-a-ngando-mwenga-denoncee/">ACP</a>, November 15; <a href="https://www.radiookapi.net/2025/01/08/emissions/dialogue-entre-congolais/exploitation-illegale-des-minerais-au-sud-kivu">Radio Okapi</a>, August 8).</p><p>The Bukavu convictions confirm that Chinese illicit financiers are present inside eastern Congo&#8217;s conflict zones. A panel of UN experts reported to the press that minerals extracted from areas in eastern Congo controlled by the Congolese Rwandan-backed rebel paramilitary group M23 are being smuggled through Rwanda and Uganda before entering global markets (<a href="https://www.africanews.com/2024/10/01/m23-rebel-group-generates-approximately-300000-a-month-from-mining-un/">AfricaNews</a>, January 10; <a href="https://www.aljazeera.com/news/2025/7/18/un-experts-cast-blame-on-rwanda-and-uganda-what-are-they-doing-in-drc">Al-Jazeera</a>, July 18). At the same time, M23 rebels have been documented with significant stocks of PRC-manufactured weapons and equipment, consistent with supply via their Rwandan and Ugandan backers (<a href="https://jamestown.org/program/prc-manufactured-weapons-abound-among-african-militant-groups/">China Brief</a>, November 1, 2024). The PRC is the world&#8217;s dominant processor of the ore coltan, gold, and other Congolese exports, and both Rwanda and Uganda ship far more of these minerals than they produce (<a href="https://enact-africa.s3.amazonaws.com/site/uploads/2022-05-03-research-paper-29-rev.pdf?">Enact</a>, May 3, 2022; <a href="https://pdf.dfcfw.com/pdf/H3_AP202304241585731241_1.pdf?">Haitong</a>, April 23, 2023; <a href="https://xyfz.ajcass.com/UploadFile/Issue/202111080001/2024/3/20240311061440WU_FILE_0.pdf?">CASS West Asia and Africa Research Institute</a>, March 2024; <a href="https://allafrica.com/stories/202412180293.html">AllAfrica</a>, December 18, 2024). Taken together, these facts make PRC end-use not speculative but structurally inevitable: illicit finance on the ground, smuggling through neighbors, and end-user demand in the PRC form a single chain that helps sustain this conflict economy.</p><p>These dynamics are not confined to eastern Congo. Across Africa, PRC nationals are embedded in commodity corridors that move value and provide logistics. In 2022, roughly 435 tonnes of gold were smuggled out of Africa, 93 percent of it bound for the United Arab Emirates (UAE), with PRC buyers active at both ends of the chain (<a href="https://www.scmp.com/business/commodities/article/3241706/going-gold-hong-kong-ousts-dubai-biggest-hub-russian-bullion-trade?">SCMP</a>, November 16, 2023; <a href="https://www.swissaid.ch/en/articles/on-the-trail-of-african-gold/">Swissaid</a>, May 30, 2024; <a href="https://www.theafricareport.com/365790/east-drc-plays-tough-with-chinese-gold-mining-firms/">Africa Report</a>, October 24, 2024). PRC-linked syndicates also dominate timber and rosewood exports from the Sahel, Central, and East Africa, often sourcing directly from insurgent-affected areas (<a href="https://www.afdb.org/sites/default/files/documents/publications/illicit_timber_trade_report.pdf?">African Development Bank</a>, 2021). These gold and timber corridors easily provide the financial and logistical backbone for broader illicit trade, establishing flows of capital and transport capacity that could be redirected toward arms procurement or militant financing.</p><h3><strong>Chinese Criminals Laundering Crypto</strong></h3><p>In July, a federal court in Lagos, Nigeria ordered the forfeiture of approximately 223,000 Tether ($223,000)&#8212;the U.S. dollar-pegged stablecoin&#8212;from two PRC nationals convicted of fraud and money laundering (<a href="https://www.efcc.gov.ng/efcc/news-and-information/news-release/11284-court-orders-final-forfeiture-of-222-729-86usdt-recovered-from-chinese-in-lagos">EFCC</a>, July 21). The case was notable not only for the scale of the seizure but also for its judicial confirmation that PRC nationals were operating through crypto networks in Nigeria. It followed an earlier wave of enforcement in December 2024, when Nigeria&#8217;s Economic and Financial Crimes Commission (EFCC) carried out mass raids that led to the arrest of 792 suspects. Among those implicated were 148 PRC nationals accused of participating in coordinated crypto fraud and laundering schemes (<a href="https://www.toutiao.com/article/7497859024205955594/?wid=1759163166644">Toutiao</a>, April 27; <a href="https://theafricanmirror.africa/news/massive-crackdown-nigeria-arrests-792-in-global-cybercrime-takedown/">African Mirror</a>, December 19, 2024). Together, these cases establish a pattern of sustained involvement by PRC nationals in illicit digital finance across West Africa.</p><p>The pattern is clear: PRC illicit finance networks have embedded themselves into West African stablecoin rails. These rails enable frictionless cross-border settlement that can be directed toward extractive rents, arms procurement, or conventional fraud. Stablecoin rails in West Africa now provide the same frictionless settlement capacity increasingly favored by PRC-linked financiers in Southeast Asia (<a href="https://finance.sina.com.cn/money/fund/jjzl/2025-05-26/doc-inexwtaz7803987.shtml">Sina Finance</a>, May 26). In effect, stablecoins have become a structural enabler of transnational illicit finance tied to PRC nationals, providing cross-border transfer capacities beyond the reach of current regulatory controls.</p><h3><strong>Weapons Trafficking Completes the Supply Chain</strong></h3><p>In May, Amnesty International verified the presence of PRC-manufactured weapons in both Khartoum and Darfur, despite a standing United Nations arms embargo on Sudan. The investigation traced the weapons&#8217; path through the UAE, confirming that PRC-manufactured weapons had been re-exported into an active conflict zone (<a href="https://www.amnesty.org/en/latest/news/2025/05/sudan-advanced-chinese-weaponry-provided-by-uae-identified-in-breach-of-arms-embargo-new-investigation/">Amnesty International</a>, May 8; <a href="https://www.scmp.com/news/world/africa/article/3309655/uae-supplying-sudan-paramilitaries-chinese-made-weapons-amnesty">SCMP</a>, May 9). The UAE&#8212;already identified as a primary destination for smuggled African gold and a key entrep&#244;t for trafficked resources such as timber and wildlife&#8212;is now linked to weapons leakage into embargoed territories. A 2023 report by the PRC&#8217;s Ministry of Commerce (MOFCOM) highlights the country&#8217;s central role as a commodity logistics hub, while international investigations document its function as a distribution point for illicit flows ultimately bound for the PRC (<a href="https://thesentry.org/wp-content/uploads/2021/02/ConflictGoldResponsibleGold-TheSentry-Feb2021.pdf">The Sentry</a>, February 2021; <a href="https://globalinitiative.net/wp-content/uploads/2022/12/Trade-and-transit-Dubais-role-in-illicit-environmental-supply-chains-GI-TOC-2022.pdf">GITOC</a>, December 2022; <a href="https://fdi.mofcom.gov.cn/resource/pdf/2025/01/23/0ffa413a929b484c97a0175831c30f2a.pdf">MOFCOM</a>, 2023).</p><p>Extractive commodities and arms flows are not separate streams but parts of a single transnational infrastructural system. Gold and timber exports provide the financial base, often routed through opaque networks tied to PRC buyers. Stablecoin rails in West Africa supply frictionless cross-border digital settlement, as increasingly favored by PRC-linked illicit financiers in Southeast Asia (<a href="https://finance.sina.com.cn/money/fund/jjzl/2025-05-26/doc-inexwtaz7803987.shtml">Sina Finance</a>, May 26). The re-export of weapons through commodity hubs completes the circuit, bringing material support back into conflict zones. The convergence is the critical risk: financial, logistical, and military flows run along the same corridors, reinforcing each other and expanding the resilience of militant economies.</p><p>This configuration functions as a shadow liquidity system. Value extracted from African resources is continuously re-expressed as kinetic capability, ensuring that liquidity itself becomes a weaponized asset class. Each transaction in this system, whether a gold shipment, stablecoin transfer, or weapons re-export, amplifies the others, producing a feedback loop that stabilizes illicit power structures where governance fails.</p><h3><strong>Conclusion</strong></h3><p>The evidence now available establishes that the illicit involvement of PRC nationals in African conflict economies is neither incidental nor peripheral. Judicial convictions in Bukavu and Lagos confirm the presence of criminal actors from the PRC engaged in both extractive laundering and stablecoin-based fraud, while reporting from Sudan illustrates how weapons manufactured in the PRC reappear in embargoed theaters.</p><p>These cases reveal a common pattern. Illicit finance and logistics linked to PRC nationals run through the same corridors that sustain militant supply chains. Gold, timber, digital assets, and arms move along overlapping routes, creating a resilient system in which capital and material flows reinforce one another.</p><p>Recognizing this convergence is essential. The challenge is not simply weapons leakage or financial opacity in isolation but the way disparate supply chains combine to strengthen insurgent and criminal economies. PRC end-user demand and facilitation give the system scale and durability, tying local extraction and digital laundering directly to global markets. Addressing this challenge requires collapsing the divide between arms embargo enforcement and financial crime intelligence; and treating both as elements of one integrated system.</p>]]></content:encoded></item><item><title><![CDATA[Closing the Enforcement Gap: AI, Illicit Liquidity, and the Next Phase of Counter-Terrorist Finance]]></title><description><![CDATA[This Insight is published to coincide with Global Media and Information Literacy Week to highlight positive interventionist technology tools in the P/CVE sphere.]]></description><link>https://www.btl-research.com/p/closing-the-enforcement-gap-ai-illicit</link><guid isPermaLink="false">https://www.btl-research.com/p/closing-the-enforcement-gap-ai-illicit</guid><dc:creator><![CDATA[Adam Rousselle]]></dc:creator><pubDate>Fri, 24 Oct 2025 16:35:45 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!s6Vd!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14aa2e06-0a97-4810-a2f7-157b4fc97881_2048x1155.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!L_Is!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!L_Is!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png 424w, https://substackcdn.com/image/fetch/$s_!L_Is!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png 848w, https://substackcdn.com/image/fetch/$s_!L_Is!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png 1272w, https://substackcdn.com/image/fetch/$s_!L_Is!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!L_Is!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png" width="676" height="188" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:188,&quot;width&quot;:676,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:32791,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:&quot;&quot;,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!L_Is!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png 424w, https://substackcdn.com/image/fetch/$s_!L_Is!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png 848w, https://substackcdn.com/image/fetch/$s_!L_Is!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png 1272w, https://substackcdn.com/image/fetch/$s_!L_Is!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a></figure></div><p><strong>This is an article I recently wrote for the Global Network of Extremism and Technology (GNET). You can find the original link <a href="https://gnet-research.org/2025/10/24/closing-the-enforcement-gap-ai-illicit-liquidity-and-the-next-phase-of-counter-terrorist-finance">here</a>.</strong></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!s6Vd!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14aa2e06-0a97-4810-a2f7-157b4fc97881_2048x1155.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!s6Vd!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14aa2e06-0a97-4810-a2f7-157b4fc97881_2048x1155.jpeg 424w, https://substackcdn.com/image/fetch/$s_!s6Vd!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14aa2e06-0a97-4810-a2f7-157b4fc97881_2048x1155.jpeg 848w, https://substackcdn.com/image/fetch/$s_!s6Vd!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14aa2e06-0a97-4810-a2f7-157b4fc97881_2048x1155.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!s6Vd!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14aa2e06-0a97-4810-a2f7-157b4fc97881_2048x1155.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!s6Vd!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14aa2e06-0a97-4810-a2f7-157b4fc97881_2048x1155.jpeg" width="1456" height="821" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/14aa2e06-0a97-4810-a2f7-157b4fc97881_2048x1155.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:821,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Blockchain Use Cases and Applications by Industry&#65372;Learn about Technology  with TDK&#65372;Bridging the Past, Present, and Future of Tech&#65372;Learn about  Technology with TDK&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Blockchain Use Cases and Applications by Industry&#65372;Learn about Technology  with TDK&#65372;Bridging the Past, Present, and Future of Tech&#65372;Learn about  Technology with TDK" title="Blockchain Use Cases and Applications by Industry&#65372;Learn about Technology  with TDK&#65372;Bridging the Past, Present, and Future of Tech&#65372;Learn about  Technology with TDK" srcset="https://substackcdn.com/image/fetch/$s_!s6Vd!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14aa2e06-0a97-4810-a2f7-157b4fc97881_2048x1155.jpeg 424w, https://substackcdn.com/image/fetch/$s_!s6Vd!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14aa2e06-0a97-4810-a2f7-157b4fc97881_2048x1155.jpeg 848w, https://substackcdn.com/image/fetch/$s_!s6Vd!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14aa2e06-0a97-4810-a2f7-157b4fc97881_2048x1155.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!s6Vd!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14aa2e06-0a97-4810-a2f7-157b4fc97881_2048x1155.jpeg 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Terrorist groups are increasingly using digital assets to <a href="https://gnet-research.org/2025/07/21/hezbollahs-latin-american-networks-stablecoins-smuggling-and-sanctions-evasion/">move money outside traditional financial oversight</a>. These same channels &#8211; blockchain networks, stablecoins, and encrypted apps &#8211; now underpin a wider illicit economy that spans cybercrime, sanctions evasion, and elite capital movement. Together, they form a shadow financial infrastructure that operates at a scale and velocity traditional enforcement cannot match.</p><p>As regulators struggle to keep pace, artificial intelligence (AI) is emerging as a force multiplier. From clustering wallets and detecting laundering networks to automating early detection, AI is transforming how investigators detect, map, and disrupt illicit flows. Yet technology alone cannot solve the problem. Effective countermeasures require human analysis and strategic framing &#8211; linking the rise of digital liquidity systems to the broader financial ecosystems that sustain both criminal and terrorist actors. This Insight will explore emerging regulatory and technological trends aimed at closing the global enforcement gap &#8211; showing how AI-enabled enforcement, systemic liquidity mapping, and multi-domain synthesis can shift counter-terrorist financing from reactive disruption toward proactive resilience.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!RC1x!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa6047bd7-8e75-425a-a750-0915c4489e2e_871x1030.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!RC1x!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa6047bd7-8e75-425a-a750-0915c4489e2e_871x1030.png 424w, https://substackcdn.com/image/fetch/$s_!RC1x!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa6047bd7-8e75-425a-a750-0915c4489e2e_871x1030.png 848w, https://substackcdn.com/image/fetch/$s_!RC1x!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa6047bd7-8e75-425a-a750-0915c4489e2e_871x1030.png 1272w, https://substackcdn.com/image/fetch/$s_!RC1x!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa6047bd7-8e75-425a-a750-0915c4489e2e_871x1030.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!RC1x!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa6047bd7-8e75-425a-a750-0915c4489e2e_871x1030.png" width="871" height="1030" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a6047bd7-8e75-425a-a750-0915c4489e2e_871x1030.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1030,&quot;width&quot;:871,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!RC1x!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa6047bd7-8e75-425a-a750-0915c4489e2e_871x1030.png 424w, https://substackcdn.com/image/fetch/$s_!RC1x!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa6047bd7-8e75-425a-a750-0915c4489e2e_871x1030.png 848w, https://substackcdn.com/image/fetch/$s_!RC1x!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa6047bd7-8e75-425a-a750-0915c4489e2e_871x1030.png 1272w, https://substackcdn.com/image/fetch/$s_!RC1x!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa6047bd7-8e75-425a-a750-0915c4489e2e_871x1030.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Figure 1: The three-tiered liquidity framework.</p><p><strong>Understanding the Problem: A Three-Tiered Approach</strong></p><p>The challenge today is not simply that terrorists seek money beyond <a href="https://www.rand.org/pubs/research_reports/RR3026.html">regulatory and enforcement</a> oversight, but that the methods they use to mobilise funds converge with a broader set of illicit and semi-licit flows. The rise of blockchain and <a href="https://link.springer.com/chapter/10.1007/978-3-031-59547-9_9">digital currency</a> ecosystems has provided bad actors with faster, cheaper, and less traceable means of moving value globally. These value transfer mechanisms, combined with <a href="https://ctc.westpoint.edu/the-digital-terror-financing-of-central-asian-jihadis">encrypted messaging</a> apps, offer the ability to move vast sums outside the global banking system, thus representing a structural alternative to it.</p><p>Terrorists are not alone. A much larger global criminal ecosystem &#8211; spanning cyber fraud, state-linked sanctions evasion, and elite capital flight &#8211; exploits the same digital corridors. On 14 October, U.S. <a href="https://www.chainalysis.com/blog/southeast-asia-crypto-scam-network-mining-pig-butchering-october-2025/">authorities seized</a> over $14 billion USD worth of Bitcoin tied to Cambodia-based and Hong Kong-registered Prince Group, which provided laundering services to Southeast Asia&#8217;s vast <a href="https://home.treasury.gov/news/press-releases/sb0278">cybercrime industrial complex</a>. It was the <a href="https://www.bbc.co.uk/news/articles/c70jw436n0yo">largest Bitcoin seizure</a> in history, underscoring the scope of these illicit systems. These systems represent a financial substrate where actors with varied goals and ideological motives can rely on the same facilitators, which become more pervasive with each transaction.</p><p>The three-tiered <a href="https://www.btl-research.com/p/the-liquidity-framework">liquidity framework</a> explains this new paradigm. At the top, Tier 1 captures elite flows &#8211; shadow banks, high-net-worth individuals, and state-adjacent funds that seed the system &#8211; generally manifesting as capital outflows, although at times taking the form of strategic inflows in <a href="https://home.treasury.gov/news/press-releases/jy1581#:~:text=WASHINGTON%20%E2%80%94%20Today%2C%20the%20Department%20of,Central%20African%20Republic%20and%20Mali.">specific contexts</a>. Tier 2 is the facilitation layer, comprising over-the-counter (OTC) brokers, underregulated exchanges, and laundering platforms that have grown from Tier 1 flows. These entities now rent their services to anyone with the means to access them. Tier 3 is where threats surface, as extremists and criminal groups exploit the same intermediaries to move money through unregulated corridors. By mapping this cascade, we see how funds that leave states at the top can ultimately end up financing terrorism and criminality at the bottom &#8211; with Tier 2 serving as the connective tissue with none of the accountability of regulated financial systems.</p><p>Tier 2 intermediaries take many forms, but Huione Guarantee in Cambodia, Garantex in Russia/Dubai, and Iran&#8217;s Derakhshan/ Alivand shadow banking network all show how digital asset facilitators operate at the intersection of offshore capital and terrorist finance. Huione&#8217;s illicit marketplace evolved into a laundering channel for ethnic Chinese <a href="https://www.elliptic.co/blog/cyber-scam-marketplace">criminal networks</a> across Southeast Asia, with clear <a href="https://blog.bitrace.io/crypto-laundering-by-student-southeast-asian-crime-networks-penetrate-hong-kong/?utm_source=chatgpt.com">evidence of participation</a> by Hong Kong facilitators &#8211; strongly suggesting its use by Chinese elites to evade domestic capital controls. U.S. authorities also flagged Huione for <a href="https://gnet-research.org/2025/05/14/cash-flow-breaking-down-the-houthis-multibillion-dollar-financial-networks/">laundering $39 million USD</a> tied to the Houthis, a clear example of terrorist financial usage. Evidence also suggests that Myanmar-based <a href="https://smallwarsjournal.com/2025/07/24/illicit-liquidity-as-battlespace-rethinking-finance-in-asymmetric-conflict/">militant groups</a> have accessed Huione and comparable networks, further illustrating how such financial ecosystems enable militant and terrorist funding structures.</p><p>Meanwhile, U.S. and European regulators sanctioned the Moscow-based crypto exchange Garantex for enabling Russian sanctions evasion and <a href="https://www.elliptic.co/blog/elliptic-in-action-garantex?utm_">elite capital flows</a>, as well as for <a href="https://www.wsj.com/finance/currencies/garantex-russian-crypto-hamas-crime-sanctions-a3648357">processing transactions</a> linked to Palestinian Islamic Jihad. Further analysis has also revealed that funds from Garantex flowed into <a href="https://icsve.org/islamic-states-global-financial-networks-cryptocurrency-and-european-bank-transfers-fund-detained-is-women-and-incarcerated-is-fighters-in-syria-furthering-militant-objectives">wallets controlled</a> by the Islamic State Khorasan Province (ISKP). Finally, in Iran, the Derakhshan/ Alivand shadow banking network operated as a crypto-enabled extension of the regime&#8217;s <a href="https://www.chainalysis.com/blog/ofac-sanctions-iranian-shadow-crypto-banking-network-september-2025/?utm_">sanctions evasion</a> architecture, moving billions through front companies and exchange houses. U.S. Treasury designations also show the network <a href="https://home.treasury.gov/news/press-releases/sb0248">provided financial services</a> to Hezbollah funding corridors, again demonstrating a clear cascade between Tier 1, 2, and 3 flows.</p><p>While the three-tiered framework currently captures only some terrorist organisations, groups such as those associated with the <a href="https://gnet-research.org/2025/02/17/combating-the-islamic-state-finance-somalia-and-the-pan-african-nexus/">Islamic State</a> and <a href="https://www.elliptic.co/blog/how-terrorist-organizations-are-exploiting-crypto-to-raise-funds-and-evade-detection">al-Qaeda</a> also rely on intermediaries to move and launder funds on the blockchain. As these networks become more digitally sophisticated and financially liquid through their exploitation of high-value trades &#8211; including commodities such as <a href="https://gnet-research.org/2025/04/29/malis-environmental-crisis-the-link-between-climate-change-and-jnims-rapid-expansion/">gold</a> and <a href="https://thediplomat.com/2024/11/chinese-demand-for-rosewood-empowers-some-of-africas-deadliest-terrorist-groups/">timber</a> as well as <a href="https://www.atlanticcouncil.org/blogs/africasource/the-sahel-is-now-an-epicenter-of-drug-smuggling-that-is-terrible-news-for-everyone/">narcotics trafficking</a> &#8211; it is likely that they too will engage Tier 2 facilitators, further expanding their global financial reach and resilience.</p><p>Disrupting only the Tier 3 terrorist groups is insufficient, as these actors are symptomatic of broader systems. The real leverage lies in targeting the Tier 2 facilitators who profit from servicing everyone &#8211; oligarchs, sanctioned states, and militant/ terrorist groups alike. A strategy of networked disruption must therefore neutralise the brokers, platforms, and exchanges that systematically connect these flows. By constraining Tier 2, regulators and investigators can structurally disrupt the cascade before funds reach Tier 3, cutting off not just individual plots, but the infrastructure that makes global illicit liquidity possible. Although this challenge remains enormous in scope, new regulatory and technology-based solutions have begun to tip the scales in favour of global enforcement.</p><p><strong>Regulatory Reforms and AI Advances</strong></p><p>Emerging regulatory frameworks are bringing digital assets under formal oversight. In the U.S., the <a href="https://www.whitehouse.gov/fact-sheets/2025/07/fact-sheet-president-donald-j-trump-signs-genius-act-into-law/">GENIUS Act</a> would pull the issuers of and intermediaries behind stablecoins &#8211; the current lifeblood of large-scale <a href="https://www.chainalysis.com/blog/stablecoin-security-risks/">illicit financial flows</a> &#8211; into the existing anti-money laundering and combating the financing of terrorism (AML/CFT) system. In the European Union, the Markets in Crypto-Assets regulation (<a href="https://www.esma.europa.eu/esmas-activities/digital-finance-and-innovation/markets-crypto-assets-regulation-mica">MiCA</a>) sets harmonised standards for licensing and disclosure across the bloc. Financial hubs such as <a href="https://www.sfc.hk/en/Welcome-to-the-Fintech-Contact-Point/Virtual-assets/Virtual-asset-trading-platforms-operators">Hong Kong</a> and <a href="https://charltonsquantum.com/singapore-virtual-assets-regulation/">Singapore</a>, as well as Southeast Asian jurisdictions such as the <a href="https://insightplus.bakermckenzie.com/bm/technology-media-telecommunications_1/philippines-sec-issues-rules-and-guidelines-on-crypto-asset-service-providers-casp">Philippines</a>, are also moving to regulate exchanges, OTC brokers, and other intermediaries. Together, these measures mark a decisive shift: digital assets are no longer a lawless frontier, with governments actively working to close the gaps that criminals, sanctioned states, and violent extremists exploit.</p><p>However, <a href="https://www.trmlabs.com/reports-and-whitepapers/2025-crypto-crime-report">tens of billions</a> of dollars move each year through the informal systems described above, and human analysts alone <a href="https://www.researchgate.net/publication/391950456_Leveraging_Machine_Learning_in_Anti-Money_Laundering_Strengthening_US_Financial_Defenses_Against_Financial_Crimes">cannot keep pace</a> with flows of this magnitude and velocity. Without advanced tools and coordinated enforcement, new regulatory frameworks risk becoming outmanoeuvred by the actors they seek to constrain. Recent AI advances increasingly address this enforcement gap &#8211; not by replacing human analysis, but by amplifying it through pattern recognition at scale. Leading blockchain analytics firms have <a href="https://www.coinbase.com/en-ca/public-policy/advocacy/documents/blockchain-and-ai?utm_">already begun</a> layering AI into their products in ways that concretely boost detection, attribution, and investigation speed.</p><p>Blockchain analytics platforms currently use <a href="https://arxiv.org/html/2404.18251v1?utm_">machine learning</a> to cluster addresses that belong to the same actor, trace funds that are deliberately split and rerouted to hide their origin, and flag unusual transaction patterns that suggest illicit flows. Some systems go further, <a href="https://www.chainalysis.com/blog/rapid-ai-powered-crypto-triage-investigations/">automating the first level</a> of triage, presenting investigators with likely leads rather than raw data. Others use advanced models to sift through vast webs of wallet interactions and <a href="https://arxiv.org/pdf/2404.19109">highlight networks</a> that resemble known money-laundering structures. While private analytics firms rarely disclose which AI modules are employed in specific investigations, recent rollouts of <a href="https://www.chainalysis.com/product/rapid/">AI-enabled triage</a>, <a href="https://www.trmlabs.com/resources/blog/detecting-the-invisible-the-power-of-trm-labs-signatures-tm-in-blockchain-investigations">clustering</a>, and <a href="https://www.elliptic.co/blog/our-new-research-enhancing-blockchain-analytics-through-ai">typology-detection tools</a> suggest that such technologies are increasingly embedded in live enforcement workflows.</p><p>The effect on investigations is simple: machines take on the role of scanning and sorting, allowing human investigators to focus on context, judgment, and strategy. The combination makes it increasingly possible to confront illicit flows at volumes that have long <a href="https://arxiv.org/html/2503.09165v1?">exceeded the limits</a> of manual enforcement. But the technology is still developing, coverage remains uneven, and determined actors continue to find ways to <a href="https://arxiv.org/html/2503.09165v1#S5">exploit the gaps</a>. What AI offers today is not a finished solution, but an evolving opportunity to narrow the enforcement gap at the scale currently required.</p><p>Advances in AI disruption do not end with the private sector. The U.S. Military&#8217;s Defense Advanced Research Projects Agency (DARPA) has been developing a <a href="https://www.darpa.mil/research/programs/a3ml-anticipatory-adaptive">new programme</a> called Anticipatory and Adaptive Anti-Money Laundering (A3ML). According to DARPA, the programme seeks to transform anti-money laundering from &#8220;manual, reactive, and expensive analytic practices&#8221; into a system that can proactively identify illicit financial activity by analysing transaction data at machine speed. The initiative aims to build adaptive models capable of detecting complex laundering behaviours and evolving with new threat patterns across global financial networks. In a <a href="https://regulationinnovation.org/podcast/financial-crime-and-national-security-darpas-a3ml-program-making-money-laundering-too-expensive-to-exist/">recent interview</a>, A3ML programme manager David Dewhurst claimed the goal of the project is to &#8220;raise the cost of money laundering so high that it becomes unsustainable.&#8221;</p><p>If realised, A3ML would represent a significant step toward closing the enforcement gap that today&#8217;s regulators and investigators struggle to manage in the realm of terrorist and illicit finance. Given DARPA&#8217;s 60-year <a href="https://www.openaccessgovernment.org/darpa-60-years-of-ground-breaking-artificial-intelligence-research/100807/?utm_">track record</a> of pioneering AI technology, as well as the <a href="https://www.darpa.mil/node/2092">core technologies</a> behind the Internet itself, the fact that the agency is promoting A3ML publicly signals its potential as an emerging game-changer in countering terrorist finance and illicit liquidity networks as a whole.</p><p><strong>Recommendations: Building Human&#8211;Machine Fusion Across the Enforcement Chain</strong></p><p>Artificial intelligence will not replace human financial investigators; it will demand a new generation of them. As enforcement agencies integrate AI tools into financial investigations, the limiting factor will not be processing power but strategic judgment &#8211; the ability to interpret machine-generated signals in context. AI excels at pattern recognition, but it cannot discern intent, geopolitical linkage, or systemic consequence. These require human synthesis based on deep contextual understanding.</p><p>Three priorities follow from this reality:</p><p><strong>1. Invest in human-machine fusion:</strong> Regulators, tech firms, and research institutions should prioritise training analysts who can interpret algorithmic outputs, question model assumptions, and integrate AI findings into broader geopolitical and financial-systems analysis.</p><p><strong>2. Expand interdisciplinary research:</strong> The convergence of digital assets, sanctions evasion, and terrorist finance demands a research agenda that unites data science, economics, finance, criminology, strategic studies, and more. Understanding illicit liquidity networks at scale requires systems-level mapping and cross-domain synthesis, not siloed expertise.</p><p><strong>3. Institutionalise feedback loops:</strong> AI detection models improve only when informed by real investigative experience and extensive research. Private firms and research institutions should create channels for case-based learning and publication, ensuring that enforcement outcomes continuously refine analytical models.</p><p>Additional priorities for technology platforms to consider:</p><p><strong>4. Integrate financial signal detection into trust and safety operations:</strong> Social media, messaging, and other platforms are uniquely positioned to identify the early stages of extremist financing. Embedding financial intelligence cues such as patterns of wallet sharing, donation link reuse, or coordinated in-app transfers into existing moderation systems would enable early intervention without compromising privacy.</p><p><strong>5. Create secure interoperability between financial and content-moderation ecosystems:</strong> Platforms can pilot controlled data-exchange frameworks that allow vetted enforcement partners and blockchain analytics firms to cross-reference on-chain data with online behavioural indicators. This would help surface the connective tissue between propaganda distribution, recruitment, and funding pipelines that rely on digital payment rails.</p><p><strong>6. Promote collaboration on typology discovery:</strong> Major platforms can co-fund shared typology libraries that describe emerging laundering and fundraising behaviours across digital ecosystems. Building upon the precedent set by <a href="https://gifct.org/hsdb/">GIFCT&#8217;s hash-sharing database </a>and other collaborative frameworks, as well as existing typology reporting by FATF and the Egmont Group, a complementary repository for financial signals could integrate structured input from public and private stakeholders, including blockchain analytics firms at the forefront of these trends. This would create a unified typology framework &#8211; linking regulatory, platform, and investigative perspectives &#8211; and provide a common analytical language for identifying new threats while ensuring that emerging AI models across companies learn from consistent signal categories.</p><p>AI is reshaping financial intelligence, but its success will depend on the people who wield it &#8211; analysts capable of seeing the system, not just individual outcomes. For the technology companies that host, route, and monetise digital interactions, this means examining how digital economies can be co-opted by illicit liquidity systems and disrupting them when possible. The next frontier in counter-terrorist finance will belong to those who can bridge the gap between computation and comprehension &#8211; between safeguarding platforms and preserving the integrity of the digital economy.</p>]]></content:encoded></item><item><title><![CDATA[Illicit Crypto Isn’t Uncontrollable: Why I’m Cautiously Optimistic]]></title><description><![CDATA[What the next phase of countering illicit finance will look like]]></description><link>https://www.btl-research.com/p/illicit-crypto-isnt-uncontrollable</link><guid isPermaLink="false">https://www.btl-research.com/p/illicit-crypto-isnt-uncontrollable</guid><dc:creator><![CDATA[Adam Rousselle]]></dc:creator><pubDate>Thu, 18 Sep 2025 09:00:45 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!n2Fp!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F937d73f1-ab78-4aab-9248-f9e828ab5bd4_810x524.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!n2Fp!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F937d73f1-ab78-4aab-9248-f9e828ab5bd4_810x524.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!n2Fp!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F937d73f1-ab78-4aab-9248-f9e828ab5bd4_810x524.jpeg 424w, https://substackcdn.com/image/fetch/$s_!n2Fp!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F937d73f1-ab78-4aab-9248-f9e828ab5bd4_810x524.jpeg 848w, https://substackcdn.com/image/fetch/$s_!n2Fp!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F937d73f1-ab78-4aab-9248-f9e828ab5bd4_810x524.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!n2Fp!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F937d73f1-ab78-4aab-9248-f9e828ab5bd4_810x524.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!n2Fp!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F937d73f1-ab78-4aab-9248-f9e828ab5bd4_810x524.jpeg" width="810" height="524" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/937d73f1-ab78-4aab-9248-f9e828ab5bd4_810x524.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:524,&quot;width&quot;:810,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Same risks, same rules&#8221;: The SEC's selective approach to crypto regulation  - Ledger Insights - blockchain for enterprise&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Same risks, same rules&#8221;: The SEC's selective approach to crypto regulation  - Ledger Insights - blockchain for enterprise" title="Same risks, same rules&#8221;: The SEC's selective approach to crypto regulation  - Ledger Insights - blockchain for enterprise" srcset="https://substackcdn.com/image/fetch/$s_!n2Fp!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F937d73f1-ab78-4aab-9248-f9e828ab5bd4_810x524.jpeg 424w, https://substackcdn.com/image/fetch/$s_!n2Fp!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F937d73f1-ab78-4aab-9248-f9e828ab5bd4_810x524.jpeg 848w, https://substackcdn.com/image/fetch/$s_!n2Fp!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F937d73f1-ab78-4aab-9248-f9e828ab5bd4_810x524.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!n2Fp!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F937d73f1-ab78-4aab-9248-f9e828ab5bd4_810x524.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>No one has ever accused me of being an optimist &#8212; especially if they&#8217;ve read <em>Between the Lines.</em></p><p>However, today I&#8217;m staking out a position of cautious optimism on one of the hardest problems in financial intelligence: getting a handle on illicit crypto flows, especially when it comes to designated terrorist groups. </p><p>To be clear: nothing in this field will ever be perfect. Threat finance is adaptive by design. But after tracking this space for years, I&#8217;m convinced the scales are tipping in ways that make overwhelming pessimism harder to sustain.</p><p>Here&#8217;s why.</p><p><strong>Data aggregation</strong></p><p>Every crypto transaction leaves a digital trace. Even if pseudonymous, it&#8217;s still a ledger entry &#8212; vastly different from the opaque networks of hawala or bulk cash smuggling.</p><p>The <a href="https://www.ccn.com/news/crypto/japans-police-monero-track-scam-ringleader/">successful takedown</a> of illicit Monero transactions by Japanese National Police is proof that anonymity tech can be pierced when regulators and enforcement pair data with persistence. Practitioners in the blockchain analysis space have told me that anonymous tokens are not as anonymous as some would have you believe. </p><p>The problem right now is that it takes a lot of people to find and process the data needed to track illicit flows and the industry struggles to keep up. That&#8217;s where AI comes in &#8212; to turn the overwhelming volume of raw data into actionable detection.</p><p><strong>AI development</strong></p><p>Several blockchain analytics firms are already layering machine learning into their platforms &#8212; using AI to catch anomalies humans miss. But they are not the only ones.</p><p>The Defense Advanced Research Projects Agency (DARPA) is currently developing a programme called Anticipatory &amp; Adaptive Anti&#8211;Money Laundering (A3ML). In a recent podcast, the A3ML project lead commented his team&#8217;s goal is to make money laundering &#8220;too expensive&#8221; by dramatically increasing the effectiveness, speed, and scale of detection using artificial intelligence (AI). Because money laundering is defined by scale, speed, and complexity &#8212; exactly the domains where human investigators are outmatched and algorithmic detection excels &#8212; AI could be a genuine gamechanger.</p><p>DARPA has been quietly promoting A3ML for months, meaning it is well past the idea stage. With leading analytics firms already incorporating AI into their products, the use of AI in this field is no longer hypothetical. Given the rapid speed of advancement in current AI technologies, the efficacy of these products is likely to improve dramatically in the coming months and years.</p><p><strong>Regulatory reform</strong></p><p>The European Union&#8217;s <a href="https://www.esma.europa.eu/esmas-activities/digital-finance-and-innovation/markets-crypto-assets-regulation-mica">MiCA</a> regime, the U.S. <a href="https://www.whitehouse.gov/fact-sheets/2025/07/fact-sheet-president-donald-j-trump-signs-genius-act-into-law/">GENIUS</a> Act, and Hong Kong&#8217;s <a href="https://www.hkma.gov.hk/eng/key-functions/international-financial-centre/stablecoin-issuers/">stablecoin ordinance</a> all point to a growing global consensus that crypto markets can and must be regulated. The traction my recent articles on unregulated crypto regimes have gained underscores that this isn&#8217;t just a policy shift &#8212; there&#8217;s real appetite across the field to understand and address these risks.</p><p>I believe enforcement will continue moving toward a preponderance standard &#8212; acting whenever aggregated signals indicate illicit activity is more likely than not, rather than waiting for airtight proof. In practice, that standard favors systems that can aggregate patterns, spot anomalies, and connect disparate signals faster than any manual investigation &#8212; exactly the kind of connective tissue that AI-driven systems can surface better than human investigators. Yes, gray jurisdictions will still exist, but in a world where dollar clearing still reigns supreme, the preponderance model will leave them increasingly isolated and deprived for non-compliance. </p><p><strong>Terrorist finance:  tip of the spear</strong></p><p>Terrorist finance is likely to feel the impact of this enforcement shift before other domains. The reason is twofold. First, national security considerations ensure that counter-terrorism receives the highest priority for resources, political will, and legal innovation. Governments simply cannot afford to take a passive stance when designated groups are exploiting new technologies. </p><p>Second, counter-terrorism already has over two-decades-worth of laws, regulations, and intelligence cooperation to build upon &#8212; from FATF standards and UN Security Council resolutions to domestic tools like the U.S. Patriot Act and equivalent frameworks worldwide. That foundation makes terrorist finance the most immediate proving ground for applying aggregated data and AI-enabled detection under a preponderance standard, before those same methods expand into broader areas of illicit finance.</p><p><strong>Conclusion</strong></p><p>Progress in this field isn&#8217;t measured by perfection &#8212; it&#8217;s measured by whether the system gets harder for bad actors to exploit. And by every sign &#8212; data aggregation, AI adoption, and regulatory convergence &#8212; we&#8217;re moving in that direction.</p><p>Caution is still warranted; threat finance adapts. But the fatalism that says this space is uncontrollable no longer matches reality. There is much work to be done in mapping these systems moving forward, but on this issue at least, I am cautiously optimistic.</p><blockquote><p><em>Note: This article is in part a preview of a bigger piece I&#8217;m currently working out. Also, stay tuned for the long-awaited Part II of my China military series.</em></p></blockquote><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.btl-research.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Between the Lines is a reader-supported publication. To receive new posts and support my work, become a paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Chinese Shadow Liquidity and the Scam Economy]]></title><description><![CDATA[Chinese shadow liquidity networks, built to shield against external pressure, have mutated into a force of global instability.]]></description><link>https://www.btl-research.com/p/chinese-shadow-liquidity-and-the</link><guid isPermaLink="false">https://www.btl-research.com/p/chinese-shadow-liquidity-and-the</guid><dc:creator><![CDATA[Adam Rousselle]]></dc:creator><pubDate>Wed, 03 Sep 2025 11:56:27 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!zPHX!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85dcaf6a-977c-4ad5-a55b-11d1ae02cce5_1920x1280.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!6Gt1!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F932f0174-fe62-4bae-95d7-27252bf4e80b_310x60.svg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!6Gt1!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F932f0174-fe62-4bae-95d7-27252bf4e80b_310x60.svg 424w, https://substackcdn.com/image/fetch/$s_!6Gt1!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F932f0174-fe62-4bae-95d7-27252bf4e80b_310x60.svg 848w, https://substackcdn.com/image/fetch/$s_!6Gt1!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F932f0174-fe62-4bae-95d7-27252bf4e80b_310x60.svg 1272w, https://substackcdn.com/image/fetch/$s_!6Gt1!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F932f0174-fe62-4bae-95d7-27252bf4e80b_310x60.svg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!6Gt1!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F932f0174-fe62-4bae-95d7-27252bf4e80b_310x60.svg" width="310" height="60" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/932f0174-fe62-4bae-95d7-27252bf4e80b_310x60.svg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:60,&quot;width&quot;:310,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Logo&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Logo" title="Logo" srcset="https://substackcdn.com/image/fetch/$s_!6Gt1!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F932f0174-fe62-4bae-95d7-27252bf4e80b_310x60.svg 424w, https://substackcdn.com/image/fetch/$s_!6Gt1!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F932f0174-fe62-4bae-95d7-27252bf4e80b_310x60.svg 848w, https://substackcdn.com/image/fetch/$s_!6Gt1!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F932f0174-fe62-4bae-95d7-27252bf4e80b_310x60.svg 1272w, https://substackcdn.com/image/fetch/$s_!6Gt1!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F932f0174-fe62-4bae-95d7-27252bf4e80b_310x60.svg 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a></figure></div><blockquote><p><strong>Author&#8217;s Note:</strong> This article was originally written for the New Lines Institute (<a href="https://newlinesinstitute.org/global-security-mil-priorities/chinese-shadow-liquidity-and-the-scam-economy/">link</a>).</p><p>The analysis was cited by Coinbase in an October 2025 Request for Comment submitted to the U.S. Treasury Department (<a href="https://assets.ctfassets.net/sygt3q11s4a9/2JiDDSZgdu1zwNlwkLgE24/12b9465b1b96198a702288555713dbd3/Coinbase_Response_to_Treasury_RFC_on_Innovative_Methods_To_Detect_Illicit_Activity_Involving_Digital_Assets__1_.pdf">link</a>). </p></blockquote><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!zPHX!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85dcaf6a-977c-4ad5-a55b-11d1ae02cce5_1920x1280.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!zPHX!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85dcaf6a-977c-4ad5-a55b-11d1ae02cce5_1920x1280.jpeg 424w, https://substackcdn.com/image/fetch/$s_!zPHX!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85dcaf6a-977c-4ad5-a55b-11d1ae02cce5_1920x1280.jpeg 848w, https://substackcdn.com/image/fetch/$s_!zPHX!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85dcaf6a-977c-4ad5-a55b-11d1ae02cce5_1920x1280.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!zPHX!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85dcaf6a-977c-4ad5-a55b-11d1ae02cce5_1920x1280.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!zPHX!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85dcaf6a-977c-4ad5-a55b-11d1ae02cce5_1920x1280.jpeg" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/85dcaf6a-977c-4ad5-a55b-11d1ae02cce5_1920x1280.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Philippines Authorities Raid Scam Hub&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Philippines Authorities Raid Scam Hub" title="Philippines Authorities Raid Scam Hub" srcset="https://substackcdn.com/image/fetch/$s_!zPHX!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85dcaf6a-977c-4ad5-a55b-11d1ae02cce5_1920x1280.jpeg 424w, https://substackcdn.com/image/fetch/$s_!zPHX!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85dcaf6a-977c-4ad5-a55b-11d1ae02cce5_1920x1280.jpeg 848w, https://substackcdn.com/image/fetch/$s_!zPHX!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85dcaf6a-977c-4ad5-a55b-11d1ae02cce5_1920x1280.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!zPHX!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85dcaf6a-977c-4ad5-a55b-11d1ae02cce5_1920x1280.jpeg 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>A soldier stands guard as workers cover their faces while authorities raid the offices of Central One, an alleged scam hub masquerading as a call center company, on Oct. 31, 2024, in Bagac, Philippines. (Photo by Ezra Acayan/Getty Images)</em></p><p>The explosive rise of Southeast Asia-based scam networks targeting victims globally is no accident; it is the byproduct of China&#8217;s vast offshore shadow liquidity systems. Scammers from the region have increasingly targeted victims in the United States, who lost at least $5 billion to <a href="https://www.newsweek.com/china-online-scam-centers-us-victims-2102123">such scams</a> in 2024 alone. Scam hubs, some of which comprise <a href="https://www.bbc.com/news/articles/c04nx1vnw17o">entire cities</a> built using offshored Chinese wealth, threaten stability across Asia by draining middle-class savings into a self-perpetuating parasitic ecosystem. These criminal enterprises are now actively expanding their operations in <a href="https://www.asahi.com/ajw/articles/15719980">Africa and Latin America</a>, positioning themselves closer to Western societies where aging populations are especially vulnerable to <a href="https://www.ncoa.org/article/what-are-the-top-online-scams-targeting-older-adults/">sophisticated cybercrimes</a>. These systems also threaten regional stability, with recent military clashes between Thailand and Cambodia underpinned by rising <a href="https://www.theregister.com/2025/07/31/thai_cambodia_war_cyberscam_links/">scam activity</a> and capital flows to the Cambodian side of their disputed border.</p><p>Over the past decade, China built a secret offshore capital reservoir to shield itself from an increasingly hostile outside world. That reservoir, combined with massive capital outflows, has spawned a vast criminal ecosystem that threatens social and economic interests the world over. Moreover, the networks constituting this ecosystem now serve their own ends, not merely those of Beijing. In the absence of safeguards, this pooled liquidity has fueled criminality that now threatens China despite Beijing&#8217;s ongoing efforts to reassert control over it. This offshored criminal ecosystem demonstrates a fundamental truth by its very existence: liquidity systems, once externalized beyond state oversight, become self-reinforcing, corrosive infrastructures.</p><p>In Southeast Asia, sprawling scam hubs now siphon an estimated tens of billions of dollars or more annually, turning a defensive buffer into a <a href="https://therecord.media/southeast-asian-scam-syndicates-stealing-billions-annually">parasitic financial ecosystem</a> threatening regional and global stability. This criminal ecosystem exposes a significant contradiction at the heart of China&#8217;s model: a regime built on centralized control increasingly entangled with systems it can neither regulate nor contain. These networks &#8211; once designed to strengthen China&#8217;s financial sovereignty &#8211; now threaten it, eroding domestic stability and undermining the very narrative of control the ruling Communist Party depends on to maintain legitimacy.</p><h2><strong>What Is Shadow Liquidity?</strong></h2><p>Shadow liquidity is a mobile layer of capital that exists outside standard regulatory frameworks. Unlike traditional illicit finance, which is explicitly criminal, it occupies a gray zone &#8211; part statecraft tool, part private escape valve, part opportunistic exploitation. Its core function is not to hide individual transactions but to maintain a resilient flow of value that can shift jurisdictions, instruments, or ownership structures as conditions demand.</p><p>China&#8217;s offshore liquidity systems emerged as a response to external pressures, including <a href="https://harris-sliwoski.com/chinalawblog/why-following-your-chinese-suppliers-tariff-advice-could-land-you-in-jail/">tariffs</a> and <a href="https://ipdefenseforum.com/2025/02/shadow-networks-shell-companies-help-prc-russia-evade-sanctions-export-controls/?utm_source=chatgpt.com">sanctions</a>. Initially structured as discreet channels to support trade and investment, these reserves evolved into conduits for elite capital flight and informal influence operations. A clear example is the $900&#8239;billion in offshore <a href="https://thechinaproject.com/2023/06/29/shadow-reserves-how-china-hides-trillions-of-dollars-of-hard-currency/#:~:text=The%20policy%20banks%20initially%20weren,China%2DLAC%20Cooperation%20Fund).">foreign currency assets</a> held by China&#8217;s state commercial banks, funded by deposits made by state-owned enterprises and outside the official People&#8217;s Bank of China (PBoC) balance sheet. Designed as a buffer against external shocks, these pools of liquidity coincide with the rise of <a href="https://www.uscc.gov/research/chinas-exploitation-scam-centers-southeast-asia#:~:text=Key%20Findings%3A,trade%20in%20scale%20and%20sophistication.">informal networks</a> beyond Beijing&#8217;s direct control.</p><p>DeepSeek, an artificial intelligence product developed in <a href="https://www.btl-research.com/p/deepseek-deep-dive-what-role-did">close proximity</a> to China&#8217;s state-owned military and defense sector, provided a striking example of how offshore liquidity pools serve Chinese state interests. In June&#8239;2025, U.S. officials accused DeepSeek&#8217;s parent company of using <a href="https://www.reuters.com/world/china/deepseek-aids-chinas-military-evaded-export-controls-us-official-says-2025-06-23/">shell corporations</a> in Southeast Asia to acquire banned Nvidia H100 chips &#8211; critical for training advanced AI models &#8211; thereby bypassing sanctions aimed at curbing Beijing&#8217;s military AI ambitions. Recent cases also show that Chinese firms leverage <a href="https://www.washingtonpost.com/business/2025/07/27/us-trade-policy-china-transshipment/?utm_source=chatgpt.com">offshore entities</a> to evade recently escalated U.S. tariffs. In this way, these networks created a parallel reservoir of liquidity designed to move outside Beijing&#8217;s formal financial architecture while remaining at least partly aligned with state objectives.</p><p>However, by unleashing vast sums of liquidity into loosely regulated financial systems, Beijing seeded a landscape where state-linked capital, private wealth, and criminal enterprise converge. According to a July 2025 report from the U.S.&#8211;China Economic and Security Review Commission (USCC), Chinese <a href="https://www.uscc.gov/sites/default/files/2025-07/Chinas_Exploitation_of_Scam_Centers_in_Southeast_Asia.pdf?utm_source=chatgpt.com">criminal networks</a> in Southeast Asia &#8220;have built ties &#8211; some overt, some deniable &#8211; to the Chinese government by embracing patriotic rhetoric and supporting China&#8217;s Belt and Road Initiative (BRI).&#8221; The report further notes that &#8220;Chinese crime syndicates have expanded across the region with, at a minimum, implicit financial and political backing from elements of the Chinese government.&#8221; Murky state-linked investments in now-notorious scam hubs like the <a href="https://carnegieendowment.org/research/2023/12/the-mekong-region-is-a-test-of-chinas-global-development-and-security-model?lang=en">Golden Triangle Special Economic Zone</a> (SEZ) in Laos and Myanmar&#8217;s <a href="https://www.irrawaddy.com/news/burma/new-city-thai-myanmar-border-part-bri-despite-chinas-denials-developer-claims.html">Shwe Kokko SEZ</a> are just some examples. What was meant to be a controlled instrument of resilience has instead become a porous, adaptive ecosystem &#8211; one increasingly beyond Beijing&#8217;s ability to discipline without destabilizing the very flows it relies on.</p><p>In China&#8217;s case, offshored &#8220;shadow reserves&#8221; have become a <a href="https://warontherocks.com/2024/08/shadow-reserves-chinas-key-to-parry-u-s-financial-sanctions/?utm_source=chatgpt.com">critical funding source</a> for BRI projects, with state commercial banks channeling offshore foreign currency assets &#8211; often absent from official PBoC reporting &#8211; into overseas infrastructure. BRI has become the most visible expression of how shadow liquidity can be weaponized as both an economic and geopolitical instrument.</p><p>Because liquidity is inherently dynamic, these networks behave less like pipelines and more like living infrastructure. They adapt under enforcement pressure, migrate during crises, and often move faster than <a href="https://www.regulationtomorrow.com/asia/hong-kong-stablecoins-sprint-historic-bill-passes-draft-licensee-guidelines-released-and-aml-cft-consultation-begins/">formal financial reforms</a> can catch them. For China, this networked capital is both a pillar of external influence and a source of internal fragility: a system built to shield the state from outside constraint that has instead created an informal architecture of power &#8211; one Beijing now depends on but cannot fully control. Simultaneously, this informal architecture has proved resilient against Chinese and other global crackdowns, likely at least in part due to its entrenchment in Chinese elite power structures.</p><h2><strong>The Southeast Asia Inflection Point</strong></h2><p>In Southeast Asia, China&#8217;s shadow liquidity strategy has mutated into something far more volatile. <a href="https://globalinitiative.net/analysis/compound-crime-cyber-scam-operations-in-southeast-asia/">Scam compounds</a> in Cambodia, Laos, and Myanmar, sprawling online <a href="https://www.abc.net.au/news/2024-07-26/philippine-offshore-gaming-operators-pogo-workers-leaving/104147866">gambling hubs</a> in the Philippines, and a dense web of informal <a href="https://www.unodc.org/roseap/uploads/documents/Publications/2025/Inflection_Point_2025.pdf?utm_source=chatgpt.com">crypto-asset brokers</a> now act as powerful magnets for Chinese capital outflows. Funds slip past Beijing&#8217;s <a href="https://www.businesstimes.com.sg/companies-markets/banking-finance/chinas-shadowy-crypto-brokers-lure-us75-billion-economy-toils?utm_source=chatgpt.com">formal controls</a> through domestic <a href="https://www.wsj.com/world/china/china-economy-capital-flight-2ba6391b?utm_source=chatgpt.com">underground banking</a> networks, gray-market over-the-counter (OTC) brokers based in Hong Kong, and payment platforms such as Huione and other similar <a href="https://smallwarsjournal.com/2025/07/24/illicit-liquidity-as-battlespace-rethinking-finance-in-asymmetric-conflict/">underground systems</a>. These actors often facilitate <a href="https://www.lawfaremedia.org/article/the-world-s-underground-bankers">capital flight</a> disguised as trade settlement or investment outflows, converging powerfully with state-led outflows.</p><p>Investigations have tracked billions of dollars flowing through OTC desks in <a href="https://protos.com/was-ftx-funded-by-chinese-capital-flight__trashed/">Bangkok</a> and <a href="https://en.sggp.org.vn/chinese-fraud-ring-busted-in-hcmc-for-scamming-japanese-victims-post117281.html?utm_source=chatgpt.com">Ho Chi Minh City</a> into scam operations and laundering networks. What began as pass-throughs for capital flight is now self-reinforcing.<em> </em>Reports indicate that Chinese middle-class investors have lost tens of billions of dollars to newer forms of crypto fraud &#8211; particularly <a href="https://theconversation.com/pig-butchering-scams-have-stolen-billions-from-people-around-the-world-heres-what-you-need-to-know-252774">pig-butchering scams</a> &#8211; often facilitated by border OTC networks in Southeast Asia. According to Wired, <a href="https://www.wired.com/story/pig-butchering-scam-invasion/?utm_source=chatgpt.com">global losses</a> due to scam operations exceeded $75&#8239;billion in 2023, with China-origin capital feeding scam compounds and high-risk gambling zones in Cambodia, Laos, Myanmar, and beyond. These systems no longer route funds back into China; they feed their own expansion, siphoning ever-larger volumes of <a href="https://www.usip.org/sites/default/files/2024-05/ssg_transnational-crime-southeast-asia.pdf?utm_source=chatgpt.com">Chinese wealth</a> to sustain illicit economies.</p><p>This dynamic has created a parasitic financial architecture. Chinese liquidity designed to circumvent external constraints is now trapped in feedback loops, comingling with and empowering nonstate actors and criminal organizations. For example, the Yemen-based al-Houthi rebel group has used Huione to transfer $39 million in illicit proceeds. Militant groups in Myanmar have been linked to <a href="https://smallwarsjournal.com/2025/07/24/illicit-liquidity-as-battlespace-rethinking-finance-in-asymmetric-conflict/">similar funding</a> schemes. These networks have proven resilient in the face of global pressure, such as recent revelations that Huione remains operational despite its <a href="https://www.chainalysis.com/blog/huione-guarantee-still-active-despite-shutdown/">formal shutdown</a> in the wake of U.S. sanctions.</p><p>Scam centers now threaten regional stability in Southeast Asia, draining middle-class savings while embedding themselves into the broader gray-zone economy. For example, ethnic Chinese-run <a href="https://www.aljazeera.com/news/2022/4/13/in-thailand-chinese-gangs-recruit-the-desperate-into-phone-scams">scam centers</a> in Cambodia routinely target middle-class victims in <a href="https://www.straitstimes.com/asia/se-asia/thailand-targets-cambodian-scam-centres-as-border-dispute-rages">neighboring Thailand</a>. Thai authorities report that since 2022, <a href="https://www.reuters.com/world/asia-pacific/thailand-arrests-100-people-operating-border-scam-centre-2025-03-05/">these operations</a> have defrauded domestic investors of roughly 80&#8239;billion baht (about $2.5 billion), while regional estimates variably suggest the industry now generates nearly tens of billions of dollars annually. These scam centers became an important <a href="https://time.com/7305413/thailand-cambodia-border-war-hun-sen-manet-paetongtarn-thaksin-shinawatra/">point of tension</a> between Thailand and Cambodia in the months leading up to the July border clashes between the two countries that killed at least 35 people and displaced more than 260,000.</p><p>The result of China&#8217;s shadow liquidity outflows is a network that serves state, private, and criminal interests simultaneously &#8211; but answers fully to none. In this Southeast Asian crucible, China&#8217;s shadow liquidity has crossed an inflection point: from strategic tool to autonomous ecosystem, eroding the very stability it was meant to secure.</p><h2><strong>How It Backfires on China</strong></h2><p>The explosion of scam-driven liquidity drains in Southeast Asia produces visible social and economic consequences inside China. Hundreds of thousands &#8211; possibly millions &#8211; of Chinese citizens have <a href="https://onlinelibrary.wiley.com/doi/full/10.1111/rego.70007">lost savings</a> to cross-border fraud schemes linked to scam compounds and gray-market payment platforms. While reliable data on those losses is scarce, early <a href="https://arxiv.org/abs/2412.15423?utm_source=chatgpt.com">documented cases</a> point to hundreds of millions of dollars stolen through pigbutchering scams &#8211; long con frauds where perpetrators groom victims online before convincing them to hand over large sums of money. Today, estimates claim <a href="https://fortune.com/article/asian-scam-operations-united-nations-un-warning-cybersecurity/">scam compounds</a> generate tens of billions of dollars annually, most extracted from Chinese households &#8211; an ongoing bleed of domestic savings that represents a vastly underestimated long-term erosion of national capital.</p><p>This state-facilitated ecosystem has bred distrust within China&#8217;s middle class &#8211; the demographic Beijing relies on most for social stability. Recent unemployment and failed investments have fueled <a href="https://x.com/garnettime6/status/1948506226414813244">unrest</a> and <a href="https://www.newsweek.com/china-news-downplays-mass-killing-1985624">rising violence</a> &#8211; potential harbingers of things to come as scam losses mount. The scale of loss from cross-border scams is not merely individual but systemic. As illicit networks siphon billions annually, they erode China&#8217;s internal capital coherence &#8211; the ability of the state to direct domestic savings into strategic investment. Instead of reinforcing national resilience, these shadow channels are diverting household wealth into offshore criminal ecosystems that recycle capital outside Beijing&#8217;s control.</p><p>Although Chinese authorities have made efforts at <a href="https://www.nytimes.com/2025/02/27/world/asia/scam-centers-myanmar-thailand-china.html">cross-border crackdowns</a>, Southeast Asia&#8217;s scam economy continues to flourish. It is likely that Beijing cannot fully disavow these operations due to how embedded they have become within elite circles. For example, organized crime figures such as the 14K Triad&#8217;s Wan Kuok Koi (aka &#8220;Broken Tooth&#8221;) reportedly hold close political ties to the Chinese Communist Party (CCP), with Wan <a href="https://www.dw.com/en/how-chinese-mafia-are-running-a-scam-factory-in-myanmar/a-68113480">allegedly stating</a> that although he used to fight for the cartels, he now fights for the CCP. In 2018, Wan launched the World Hongmen History and Cultural Association, an entity U.S. authorities <a href="https://home.treasury.gov/news/press-releases/sm1206">sanctioned</a> two years later for its alleged criminal activity, including <a href="https://timesofindia.indiatimes.com/world/china/chinese-mafia-scam-factory-inside-asias-brutal-scam-compound/articleshow/107255572.cms">close ties</a> to Southeast Asian scam operations. Washington also claims that Wan is a senior member of the <a href="https://www.occrp.org/en/investigation/pacific-gambit-inside-the-chinese-communist-party-and-triad-push-into-palau">Chinese government</a>, holding a position on the Chinese People&#8217;s Political Consultative Conference &#8211; an assertion <a href="https://www.reuters.com/article/usa-china-sanctions-wan-idUSB9N2GP010/">Beijing denies</a>.</p><p>Another Chinese gangster, Zhao Wei, has benefited from extensive <a href="https://thediplomat.com/2021/05/boten-the-renaissance-of-laoss-golden-city/">BRI investment</a> in his Laos-based Golden Triangle SEZ, where he <a href="https://home.treasury.gov/news/press-releases/sm0272">owns and operates</a> the infamous Kings Romans Casino, which allegedly maintains extensive ties to <a href="https://www.business-humanrights.org/en/latest-news/laos-two-africans-allegedly-recruited-to-work-in-cyber-scam-compounds-in-sez-with-passports-taken-away-and-work-up-to-17-hours/">scam operations</a> in the SEZ. Such cases indicate that the Chinese regime maintains deep ties to the very scam operations that consistently undermine its public image despite attempts to rein them in. As ensuring <a href="https://www.brookings.edu/articles/chinas-achilles-heel-capital-flight/">capital outflows</a> likely plays a key role in maintaining loyalty within the CCP&#8217;s opaque <a href="https://asiasociety.org/policy-institute/decoding-chinese-politics/introduction-black-box-chinese-policy">patronage networks</a>, these scam operations may benefit from protection by the very officials meant to regulate them.</p><p>This dynamic sharply inverts the original aim of China&#8217;s offshore liquidity systems. What began as an effort to secure financial sovereignty and shield the economy from external shocks has instead produced an internal liquidity leak. It undermines the narrative of centralized control &#8211; the cornerstone of party legitimacy &#8211; as the population sees their own savings flow into unregulated, foreign-run criminal networks backed by state-led investments. In this way, the social cost of shadow liquidity is not just economic dislocation but also the corrosion of the trust Beijing needs to sustain its model of governance.</p><h2><strong>Policy and Security Implications</strong></h2><p>Current anti-money laundering and counter-terrorist financing frameworks focus on shadow liquidity as a <a href="https://www.researchgate.net/publication/389869404_Rule-Based_Systems_in_AML">criminal threat</a> on a case-by-case basis rather than a systemic one. Compliance systems emphasize wallet-level monitoring and red-flag thresholds, but as the Financial Action Task Force (FATF) warns, the <a href="https://www.fatf-gafi.org/en/publications/Methodsandtrends/comprehensive-update-terrorist-financing-risks-2025.html">decentralization</a> of financial operations &#8220;may further complicate efforts to disrupt larger financial networks.&#8221;</p><p>There is a clear imperative for disrupting and dismantling these shadow liquidity systems. The human cost is already visible &#8211; from <a href="https://www.pbs.org/wgbh/frontline/article/scam-centers-trafficking-myanmar/">human trafficking</a> rings sustaining scam operations to the <a href="https://www.newsweek.com/china-online-scam-centers-us-victims-2102123">growing number</a> of victims in the United States and globally whose wealth is funneled into opaque offshore corridors. With Western populations aging, Chinese illicit <a href="https://www.wsj.com/us-news/china-mexico-drug-money-laundering-banks-907f35f8">financial infrastructure</a> already embedded within Western societies, and <a href="https://www.interpol.int/en/News-and-Events/News/2025/INTERPOL-releases-new-information-on-globalization-of-scam-centres#:~:text=However%2C%20online%20scam%20centres%20have,from%20South%20America%20or%20Africa.">scam centers expanding</a> into geographically, linguistically, and culturally proximate regions such as Africa and Latin America, the risk of a structurally entrenched global scam economy is rising. Evidence that these same corridors are exploited by <a href="https://smallwarsjournal.com/2025/07/24/illicit-liquidity-as-battlespace-rethinking-finance-in-asymmetric-conflict/">terrorist and militant groups</a> such as the Houthis to launder and transfer funds beyond the reach of traditional enforcement only underscores the urgency for decisive action.</p><p>At the state level, China&#8217;s BRI has become a dual-use platform &#8211; advancing Beijing&#8217;s geopolitical objectives while quietly facilitating elite capital flight and enabling shadow liquidity systems under the cover of infrastructure investment. In this way, BRI simultaneously spreads and undermines Beijing&#8217;s influence globally but doubly harms U.S. and other global interests by simultaneously furthering Chinese military expansionism while enabling parasitic organized criminal infrastructure. Until Beijing demonstrates a genuine commitment to dismantling these offshore shadow liquidity networks, global regulators and enforcement agencies should treat its financial initiatives with maximum caution.</p><p>Scam compounds, OTC desks, and gray-market payment networks are no longer discrete criminal enterprises; they are embedded in shadow capital infrastructure originally tied to Chinese state objectives. Treating them as isolated criminal enterprises misses their role as autonomous reservoirs of capital capable of sustaining <a href="https://smallwarsjournal.com/2025/07/24/illicit-liquidity-as-battlespace-rethinking-finance-in-asymmetric-conflict/">proxy influence</a> and destabilizing economies.</p><p>Addressing this requires ecosystem-level targeting. FATF&#8217;s <a href="https://www.fatf-gafi.org/content/dam/fatf-gafi/publications/Comprehensive-Update-on-Terrorist-Financing-Risks-2025.pdf.coredownload.inline.pdf">2025 report</a> highlight &#8220;Operation Grafos,&#8221; where real-time intelligence sharing, blockchain analysis, and cross-jurisdictional coordination was employed to disrupt a virtual asset-based terrorism finance network. Those methods must become standard practice, not isolated cases.</p><p>Hybrid threat frameworks must integrate liquidity analysis alongside kinetic and cyber domains. The Basel Framework&#8217;s <a href="https://www.bis.org/basel_framework/">network-based supervision</a> and the Organization for Economic Cooperation and Development&#8217;s <a href="https://www.oecd.org/content/dam/oecd/en/networks/global-forum-tax-transparency/effective-beneficial-ownership-frameworks-toolkit-en.pdf">beneficial ownership</a> models offer practical templates for this. Pressure on Southeast Asian jurisdictions hosting scam enclaves must also escalate. Cambodia, Laos, Myanmar, and the Philippines are now structural nodes; carrot-and-stick approaches could force structural change.</p><p>Stablecoin and OTC-specific controls are essential. Hong Kong&#8217;s virtual asset service provider OTC regime and International Monetary Fund guidance on stablecoin flows provide blueprints for containing these pipelines. The recent announcement that stablecoin issuer Tether will <a href="https://www.coindesk.com/policy/2025/07/18/tether-ceo-says-he-ll-comply-with-genius-to-come-to-u-s-circle-says-it-s-set-now">fully comply</a> with Washington&#8217;s Guiding and Establishing National Innovation for U.S. Stablecoins (GENIUS) Act over a period of 36 months is a positive step in this direction. Without systemic measures to regulate and contain these flows, shadow liquidity will continue to metastasize beyond state control, embedding itself as a structural layer of global capital flows. Given the primacy of U.S. regulatory and enforcement bodies in the global financial system, Washington will have to anchor any serious effort to contain these high-risk and unregulated flows.</p><p>By mapping these flows as an ecosystem rather than isolated incidents, enforcement bodies can identify structural chokepoints where targeted interventions may have disproportionate disruptive impact.</p><h2><strong>Conclusion</strong></h2><p>Shadow liquidity is more than a byproduct of illicit finance; it is a strategic architecture. China&#8217;s experience shows how systems built to project resilience can evolve into autonomous networks draining wealth and feeding actors beyond state control.</p><p>This is the central warning: once liquidity is externalized into unregulated systems, it no longer necessarily serves the state or actor that created it. Financial sovereignty is not just reserves; it depends on controlling the conduits of trust &#8211; the pathways through which value moves. Without discipline over these flows, even the most carefully engineered financial architecture can become a vector of decay, eroding the very stability it was built to secure. The real question is whether these systems can be contained in time &#8211; before they permanently erode the foundations of the global financial order.</p>]]></content:encoded></item><item><title><![CDATA[FinCEN Names the Game: Chinese Shadow Liquidity in Action]]></title><description><![CDATA[FinCEN&#8217;s latest advisory exposes $312 billion in flows, but the real danger is a parallel financial system evolving faster than enforcement.]]></description><link>https://www.btl-research.com/p/fincen-finally-names-the-game-chinese</link><guid isPermaLink="false">https://www.btl-research.com/p/fincen-finally-names-the-game-chinese</guid><dc:creator><![CDATA[Adam Rousselle]]></dc:creator><pubDate>Fri, 29 Aug 2025 17:22:46 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!vdtL!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9a4b2d6f-a201-4715-bef7-78c18fb63c53_1480x833.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!vdtL!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9a4b2d6f-a201-4715-bef7-78c18fb63c53_1480x833.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!vdtL!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9a4b2d6f-a201-4715-bef7-78c18fb63c53_1480x833.jpeg 424w, https://substackcdn.com/image/fetch/$s_!vdtL!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9a4b2d6f-a201-4715-bef7-78c18fb63c53_1480x833.jpeg 848w, https://substackcdn.com/image/fetch/$s_!vdtL!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9a4b2d6f-a201-4715-bef7-78c18fb63c53_1480x833.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!vdtL!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9a4b2d6f-a201-4715-bef7-78c18fb63c53_1480x833.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!vdtL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9a4b2d6f-a201-4715-bef7-78c18fb63c53_1480x833.jpeg" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9a4b2d6f-a201-4715-bef7-78c18fb63c53_1480x833.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;20241406-chinese-money-laundering-crackdown-gfx.jpg&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="20241406-chinese-money-laundering-crackdown-gfx.jpg" title="20241406-chinese-money-laundering-crackdown-gfx.jpg" srcset="https://substackcdn.com/image/fetch/$s_!vdtL!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9a4b2d6f-a201-4715-bef7-78c18fb63c53_1480x833.jpeg 424w, https://substackcdn.com/image/fetch/$s_!vdtL!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9a4b2d6f-a201-4715-bef7-78c18fb63c53_1480x833.jpeg 848w, https://substackcdn.com/image/fetch/$s_!vdtL!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9a4b2d6f-a201-4715-bef7-78c18fb63c53_1480x833.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!vdtL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9a4b2d6f-a201-4715-bef7-78c18fb63c53_1480x833.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em><a href="https://www.cnn.com/2024/06/18/politics/us-chinese-money-launderers-drug-cartels">Image source</a></em></p><p>FinCEN&#8217;s <a href="https://www.fincen.gov/news/news-releases/fincen-issues-advisory-and-financial-trend-analysis-chinese-money-laundering">new advisory</a> on Chinese Money Laundering Networks (CMLNs) underscores a truth often missed in enforcement reporting: these are not isolated laundering schemes but components of a parallel financial architecture, a shadow liquidity system now entrenched across the Americas and around the world. </p><p>The advisory contains staggering numbers: over 137,000 suspicious activity reports (SARs), $312 billion in suspicious flows, and the same trade-based, over-the-counter (OTC), and insider-driven mechanisms. The underlying systems that set off these alerts are the connective tissue that allow sanctioned states, cartels, and elites to thrive despite formal financial controls.</p><p>FinCEN frames this as &#8220;Chinese money laundering.&#8221; And when it comes to cartel finance, Chinese enablers are indeed the most visible. Yet they are only part of a parallel financial architecture &#8212; a global ecosystem where Chinese actors are central, but not alone. Other state and non-state players drive and exploit these flows as well. Until regulators and analysts treat shadow liquidity as infrastructure, rather than a collection of anomalous SARs, enforcement will remain reactive while the networks evolve faster than the tools meant to stop them.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.btl-research.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.btl-research.com/subscribe?"><span>Subscribe now</span></a></p><h2><strong>Bigger than you think, and more chaotic</strong></h2><p><br>These laundering networks are diffuse, but global. They service multi-billion-dollar <a href="https://www.btl-research.com/p/beneath-the-border-scam-centers-and">scam operations</a> in Southeast Asia, terrorist groups like <a href="https://gnet-research.org/2025/05/14/cash-flow-breaking-down-the-houthis-multibillion-dollar-financial-networks/">the Houthis</a>, and emerging criminal enclaves in <a href="https://www.btl-research.com/p/from-asia-to-the-world-how-global">Africa and Latin America.</a> The FinCEN advisory highlights just some of their embeddedness in Western societies, underscoring the scope of this problem.</p><p>The sort of networks FinCEN highlights aren&#8217;t just laundering for cartels &#8212; they&#8217;re tapping into a much larger reservoir of Chinese shadow capital. Crypto-enabled, OTC-driven liquidity rails emerged first to move elite wealth offshore, but over the past decade they&#8217;ve evolved into a parallel financial architecture. These flows <a href="https://www.btl-research.com/p/the-hidden-threat-of-chinas-offshore">no longer sit</a> neatly under Beijing&#8217;s command; they form a sprawling ecosystem of brokers, gray banks, scam centers, and informal clearinghouses that operate beyond the reach of both Western enforcement and the Communist Party itself.</p><p>This is what makes the threat so destabilizing: it&#8217;s not simply &#8220;Chinese laundering,&#8221; but a decentralized liquidity system born from state and elite outflows that now finances everything from fentanyl supply chains to dual-use tech procurement. In other words, what started as controlled leakage has become a global shadow infrastructure &#8212; chaotic, adaptive, and only partially answerable to any state.</p><p>Drug cartels, scammers, and terrorists are just the visible tip of this hidden architecture. They set off SARs and grab headlines, but they are a symptom, not the disease. To understand how we got here, <em>Between the Lines</em> has developed a three-tiered model that tracks the money cascade from its source.</p><p><strong>The Three-Tiered Liquidity Approach</strong></p><p>Drug cartels, scammers, and terrorists are the visible tip of this hidden architecture. They set off SARs and grab headlines, but they&#8217;re only the final chapter in a much longer story. To understand how we got here, <em>Between the Lines</em> has developed a three-tiered model that tracks the money cascade from its source.</p><ul><li><p><strong>Tier 1: The Seed Money.</strong> Vast capital outflows from countries like China, Russia, and Iran fund alternative criminal ecosystems outside global jurisdictions. The true danger of these countries lies not in their strength, but in their weakness &#8212; an inability to stem elite graft and offshore leakage that fuels shadow economies worldwide. Although these governments rely on offshored liquidity, they cannot control it once it&#8217;s outside the country - leaving them ultimately vulnerable. </p><p></p></li><li><p><strong>Tier 2: The Enablers.</strong> Operating in a legal gray zone, these brokers and businesses aren&#8217;t quite illegal enough to shut down without hard evidence. They thrive in lax regulatory environments, running OTC crypto desks, gray exchanges, and shell firms. They provide the escape valves for Tier 1 elites, and the laundering services that Tier 3 bad actors depend on.</p><p></p></li><li><p><strong>Tier 3: The Headline Grabbers.</strong> These are the actors you see in FinCEN advisories and blockchain analytics reports. Southeast Asian scammers, Iranian proxies, Mexican cartels &#8212; all exploit this ecosystem. Some build entire operations on Tier 1 outflows; others simply tap it for laundering. They kill, rob, and enslave, but remain only the tip of the iceberg. Authorities shut down one operator, while the deeper pool of shadow liquidity ensures they always resurface somewhere new.</p><ul><li><p>Some Tier 3 operators, like Southeast Asian scammers were built directly on Tier 1 capital outflows enabled by Tier 2 operators.</p></li><li><p>Others, like Mexican cartels, came to the game later, accessing Tier 2 channels to legitimize their ill-gotten gains.</p></li><li><p>What they all have in common is that they are the dirtiest players in the game: terrorists, drug traffickers, slavers, and thieves on a massive scale. </p></li></ul></li></ul><p>Reports highlighting <a href="https://www.justice.gov/usao-dc/pr/largest-ever-seizure-funds-related-crypto-confidence-scams">asset seizures</a> are comforting. So are those on the shutdown of gray exchanges like <a href="https://www.chainalysis.com/blog/russian-exchange-garantex-dismantled/">Russia&#8217;s Garantex</a>. But in every case, the real operators reconstitute somewhere else with impunity. Until we find a way to go after these cascades systematically, the cycle will continue unabated, threatening global security on practically every level.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!GuUr!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ce3cdb7-2dbb-4c18-aa29-7aceb75ab7bd_336x504.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!GuUr!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ce3cdb7-2dbb-4c18-aa29-7aceb75ab7bd_336x504.png 424w, https://substackcdn.com/image/fetch/$s_!GuUr!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ce3cdb7-2dbb-4c18-aa29-7aceb75ab7bd_336x504.png 848w, https://substackcdn.com/image/fetch/$s_!GuUr!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ce3cdb7-2dbb-4c18-aa29-7aceb75ab7bd_336x504.png 1272w, https://substackcdn.com/image/fetch/$s_!GuUr!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ce3cdb7-2dbb-4c18-aa29-7aceb75ab7bd_336x504.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!GuUr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ce3cdb7-2dbb-4c18-aa29-7aceb75ab7bd_336x504.png" width="584" height="876" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0ce3cdb7-2dbb-4c18-aa29-7aceb75ab7bd_336x504.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:504,&quot;width&quot;:336,&quot;resizeWidth&quot;:584,&quot;bytes&quot;:260288,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.btl-research.com/i/171975993?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ce3cdb7-2dbb-4c18-aa29-7aceb75ab7bd_336x504.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!GuUr!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ce3cdb7-2dbb-4c18-aa29-7aceb75ab7bd_336x504.png 424w, https://substackcdn.com/image/fetch/$s_!GuUr!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ce3cdb7-2dbb-4c18-aa29-7aceb75ab7bd_336x504.png 848w, https://substackcdn.com/image/fetch/$s_!GuUr!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ce3cdb7-2dbb-4c18-aa29-7aceb75ab7bd_336x504.png 1272w, https://substackcdn.com/image/fetch/$s_!GuUr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ce3cdb7-2dbb-4c18-aa29-7aceb75ab7bd_336x504.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!5_iw!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7821da0-4883-4329-9d03-992c3395c31e_504x504.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!5_iw!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7821da0-4883-4329-9d03-992c3395c31e_504x504.png 424w, https://substackcdn.com/image/fetch/$s_!5_iw!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7821da0-4883-4329-9d03-992c3395c31e_504x504.png 848w, https://substackcdn.com/image/fetch/$s_!5_iw!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7821da0-4883-4329-9d03-992c3395c31e_504x504.png 1272w, https://substackcdn.com/image/fetch/$s_!5_iw!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7821da0-4883-4329-9d03-992c3395c31e_504x504.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!5_iw!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7821da0-4883-4329-9d03-992c3395c31e_504x504.png" width="632" height="632" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b7821da0-4883-4329-9d03-992c3395c31e_504x504.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:504,&quot;width&quot;:504,&quot;resizeWidth&quot;:632,&quot;bytes&quot;:366519,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.btl-research.com/i/171975993?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7821da0-4883-4329-9d03-992c3395c31e_504x504.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!5_iw!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7821da0-4883-4329-9d03-992c3395c31e_504x504.png 424w, https://substackcdn.com/image/fetch/$s_!5_iw!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7821da0-4883-4329-9d03-992c3395c31e_504x504.png 848w, https://substackcdn.com/image/fetch/$s_!5_iw!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7821da0-4883-4329-9d03-992c3395c31e_504x504.png 1272w, https://substackcdn.com/image/fetch/$s_!5_iw!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7821da0-4883-4329-9d03-992c3395c31e_504x504.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>Between the Lines&#8217; proprietary Predictive Intelligence Pipeline</em></p><h2><strong>What Between the Lines Offers</strong></h2><p>Before we can disrupt these networks, we need to understand them. <em>Between the Lines</em> exists to map the shadow liquidity systems that underpin global crime, state corruption, and geopolitical instability.</p><p>Where others focus on symptoms &#8212; the cartels, the scams, the terror groups &#8212; we dig into the architecture: the hidden financial scaffolding that sustains them. Our analysis blends geopolitics, macroeconomics, open-source intelligence, and financial investigation with years of institutional memory tracing capital outflows from Beijing, Moscow, and Tehran to scam compounds in Southeast Asia and fentanyl traffickers in Mexico. Beyond mapping the networks, Between the Lines is developing models to anticipate and time these flows with as much precision as possible.</p><p>We share the doctrine publicly &#8212; models like the three-tiered liquidity approach that explain how capital moves, why enforcement fails, and where interventions could succeed. But we can&#8217;t afford to give it all away for free. The real value lies in tailoring this framework to specific risks: a bank&#8217;s exposure to shadow liquidity, a government&#8217;s vulnerability to illicit flows, or a regulator&#8217;s blind spots in enforcement. Those require <strong>bespoke reports and private briefings</strong>, built to solve problems no generic red flag can.</p><p>For policymakers, compliance officers, and investigators, <em>Between the Lines</em> provides more than headlines &#8212; it delivers the clarity and strategy needed to actually disrupt these networks. For readers, it offers a rare vantage point on the hidden infrastructure reshaping global security and finance.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.btl-research.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Between the Lines is a reader-supported publication. To receive new posts and support my work, become a paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[PRC-Manufactured Weapons Abound Among African Militant Groups]]></title><description><![CDATA[Original work cited by the United States Senate]]></description><link>https://www.btl-research.com/p/prc-manufactured-weapons-abound-among</link><guid isPermaLink="false">https://www.btl-research.com/p/prc-manufactured-weapons-abound-among</guid><dc:creator><![CDATA[Adam Rousselle]]></dc:creator><pubDate>Wed, 27 Aug 2025 02:32:44 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Q8fm!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9eeac514-f12f-4a49-9884-98e6d52b81f9_633x422.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<ul><li><p></p></li></ul><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Q8fm!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9eeac514-f12f-4a49-9884-98e6d52b81f9_633x422.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Q8fm!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9eeac514-f12f-4a49-9884-98e6d52b81f9_633x422.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Q8fm!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9eeac514-f12f-4a49-9884-98e6d52b81f9_633x422.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Q8fm!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9eeac514-f12f-4a49-9884-98e6d52b81f9_633x422.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Q8fm!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9eeac514-f12f-4a49-9884-98e6d52b81f9_633x422.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Q8fm!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9eeac514-f12f-4a49-9884-98e6d52b81f9_633x422.jpeg" width="633" height="422" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9eeac514-f12f-4a49-9884-98e6d52b81f9_633x422.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:422,&quot;width&quot;:633,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:&quot;&quot;,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!Q8fm!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9eeac514-f12f-4a49-9884-98e6d52b81f9_633x422.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Q8fm!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9eeac514-f12f-4a49-9884-98e6d52b81f9_633x422.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Q8fm!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9eeac514-f12f-4a49-9884-98e6d52b81f9_633x422.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Q8fm!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9eeac514-f12f-4a49-9884-98e6d52b81f9_633x422.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>A screenshot from the movie Hotel Rwanda, in which a Hutu warlord shows off his PRC-made machete. (Source: Douban)</em></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!KzSh!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9afd89fd-1ff4-4359-8c85-d3c8cf8a8842_6250x1875.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!KzSh!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9afd89fd-1ff4-4359-8c85-d3c8cf8a8842_6250x1875.png 424w, https://substackcdn.com/image/fetch/$s_!KzSh!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9afd89fd-1ff4-4359-8c85-d3c8cf8a8842_6250x1875.png 848w, https://substackcdn.com/image/fetch/$s_!KzSh!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9afd89fd-1ff4-4359-8c85-d3c8cf8a8842_6250x1875.png 1272w, https://substackcdn.com/image/fetch/$s_!KzSh!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9afd89fd-1ff4-4359-8c85-d3c8cf8a8842_6250x1875.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!KzSh!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9afd89fd-1ff4-4359-8c85-d3c8cf8a8842_6250x1875.png" width="1456" height="437" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9afd89fd-1ff4-4359-8c85-d3c8cf8a8842_6250x1875.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:437,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!KzSh!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9afd89fd-1ff4-4359-8c85-d3c8cf8a8842_6250x1875.png 424w, https://substackcdn.com/image/fetch/$s_!KzSh!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9afd89fd-1ff4-4359-8c85-d3c8cf8a8842_6250x1875.png 848w, https://substackcdn.com/image/fetch/$s_!KzSh!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9afd89fd-1ff4-4359-8c85-d3c8cf8a8842_6250x1875.png 1272w, https://substackcdn.com/image/fetch/$s_!KzSh!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9afd89fd-1ff4-4359-8c85-d3c8cf8a8842_6250x1875.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><blockquote><p><em>This article was published on November 1, 2024 in the Jamestown Foundation China Brief. It has since been cited in a <a href="https://www.foreign.senate.gov/imo/media/doc/abridged_china_report.pdf">July 2025 report</a> by the U.S. Senate Committee on Foreign Relations. You can find the original article <a href="https://jamestown.org/program/prc-manufactured-weapons-abound-among-african-militant-groups/">here</a>. </em></p></blockquote><p><strong>Executive Summary:</strong></p><ul><li><p>Weapons manufactured in the People&#8217;s Republic of China (PRC) are increasingly falling into the hands of militant groups across Africa, with key contributors being state-owned defense contractors like Norinco. However, it is unclear how the weapons reach these groups.</p></li><li><p>Militant groups such as Mali-based JNIM and the Democratic Republic of Congo&#8217;s M23 are employing PRC-manufactured arms in their operations, with evidence suggesting the potential involvement of Chinese criminal syndicates and corruption within PRC defense firms and African militaries.</p></li><li><p>Extensive access to PRC-manufactured weapons by countries like Rwanda and Uganda, both of which support rebel groups, underscores the growing influence of PRC defense contractors in Africa, potentially contributing to regional conflicts.</p></li><li><p>Beijing&#8217;s experience in Myanmar, where it supports both the government and rebel groups, may offer insights into its role in African conflicts, raising concerns about how escalating conflicts could strain Beijing&#8217;s partnerships and jeopardize its regional investments.</p></li></ul><p>Weapons manufactured in the People&#8217;s Republic of China (PRC) are increasingly falling into the hands of militant groups across Africa as PRC defense contractors expand their influence in the region. Many African governments have signed arms deals with Beijing, with the PRC becoming the continent&#8217;s leading supplier of weapons this year. It is unclear how weapons are falling into the hands of militants, though corruption is likely playing a part in the influx of PRC-manufactured arms on the continent. Corruption has been rampant in recent years within the PRC&#8217;s military-industrial complex, reaching right to the top of the system. At the same time, the likelihood of corrupt activities by PRC arms companies in Africa&#8212;that operate far from regulatory oversight by Beijing&#8212;is high, as is the involvement of Chinese criminal groups that are also active in the region.</p><p>In late September, the Mali-based, al-Qaeda-affiliated Jama&#8217;at Nasr al-Islam wal Muslimin (JNIM) continued to escalate its presence in Africa&#8217;s Sahel region, executing attacks that claimed over 70 lives in Bamako (Xinhua, <a href="http://www.news.cn/world/20240918/69c11d7e7bee4c0ca64d4cad3bed92d9/c.html">September 18</a>; <a href="http://www.news.cn/20240920/0097fa33adce4ddc81a8540025db3a67/c.html">September 20</a>). JNIM has access to large numbers of PRC-manufactured weapons. This is one of several instances of non-state actors having access to substantial quantities of PRC military equipment&#8212;Myanmar constitutes another prominent case.</p><p><strong>Mali-based Terrorist Group Maintains Extensive Arsenal of PRC Weapons</strong></p><p>Propaganda videos and footage released by the Malian military reveal substantial stockpiles of weapons produced by PRC state-owned defense contractor Norinco (&#20013;&#22269;&#20853;&#22120;&#24037;&#19994;&#38598;&#22242;; &#21271;&#26041;&#24037;&#19994;), including a Type 80 machine gun, a Type 81-1 assault rifle, and at least two Type 69 rocket-propelled grenade (RPG) launchers equipped with high-explosive anti-tank projectiles (<a href="https://www.militantwire.com/p/jnim-al-qaeda-attacks-international">Militant Wire</a>, September 22). While the images also display weapons from other countries such as Russia, Romania, and older Soviet Union models, most of the arms pictured are of PRC origin.</p><p>Norinco has increasingly expanded its role in supplying militaries throughout the Sahel, particularly in Mali. A video released last summer shows Malian special forces outfitted with a broad array of PRC-manufactured weapons and equipment, including Norinco-produced CS/VP11 Lynx all-terrain vehicles equipped with W85 anti-aircraft machine guns, as well as JS 9mm submachine guns produced by Jianshe Industries (&#20113;&#21335;&#24314;&#35774;&#24037;&#19994;&#38598;&#22242;) (<a href="https://www.bilibili.com/video/BV15F411k7m5/">BiliBili</a>, August 27, 2023). Last month, during the Forum on China&#8211;Africa Cooperation (FOCAC) in Beijing, Mali secured another contract with Norinco to provide additional weapons to its military (<a href="http://in.china-embassy.gov.cn/eng/zgxw/202409/t20240902_11483337.htm">Embassy of the PRC in India</a>, September 2; <a href="https://www.military.africa/2024/09/malian-transitional-president-visits-norinco-ahead-of-china-africa-forum/#:~:text=Mali%20receives%20Norinco%20VP11%20MRAP,in%20the%20fight%20against%20insurgency">Military Africa</a>, September 3).</p><p>In recent years, JNIM has funded much of its expansion by running a protection racket associated with the illicit harvesting and trade of southern Malian rosewood, a highly valued tropical hardwood prized for its distinctive color and durability (<a href="https://issafrica.org/iss-today/timber-logging-drives-jnim-s-expansion-in-mali">ISS Africa</a>, June 19). In 2018, Malian whistleblower Amadou Traor&#233; exposed the extensive deforestation and criminal activities tied to Mali&#8217;s rosewood trade, prompting several international investigations (<a href="https://www.corruptionanonymous.org/a-consortium-of-senegalese-journalists-led-by-pplaaf-confirms-whistleblowers-disclosures-on-massive-plunder/">Corruption Anonymous</a>, September 13, 2023). Reports suggest that most of Mali&#8217;s exported rosewood ends up in the PRC, with PRC criminal syndicates operating in Mali and Senegal playing essential roles in the trade (<em><a href="https://www.scmp.com/news/china/diplomacy/article/3178591/malis-rosewood-crisis-not-happening-vacuum-and-china-key-buyer">South China Morning Post</a></em>, May 22, 2022; <a href="https://www.pplaaf.org/2023/09/11/new-investigations-on-rosewood-trafficking-between-mali-and-senegal.html">PPLAAF</a>, September 11, 2023). In the PRC, the trade of illegally exported Malian wood is so widespread that several online retailers sell it on Aicaigu (&#29233;&#37319;&#36141;), a business-to-business platform operated by PRC tech giant Baidu (<a href="https://b2b.baidu.com/ss?q=%E9%A9%AC%E9%87%8C%E7%BA%A2%E6%9C%A8&amp;from=b2b_straight&amp;srcid=5103&amp;from_restype=product&amp;pi=baidu.b2b_straight.title">Aicaigou</a>, October 10). However, the origin of JNIM&#8217;s vast cache of PRC-manufactured weapons and the group&#8217;s relationship with PRC criminal syndicates remains unclear. Although villagers in southern Mali have reported that local PRC crime syndicates pay protection money to JNIM, these reports remain unsubstantiated (<a href="https://issafrica.s3.amazonaws.com/site/uploads/ocwar-t-report-13-eng.pdf">ECOWAS</a>, November 2023). Such factors call for further investigation.</p><p><strong>PRC Defense Contractors Benefit From Worsening Conflict in the Eastern DRC</strong></p><p>In the eastern Democratic Republic of Congo (DRC), the March 23 Movement (M23), predominantly composed of Tutsi rebel forces, continues to devastate the region using PRC-manufactured weapons, including an assault on the provincial capital of Goma and the plundering of vast quantities of minerals (<a href="https://press.un.org/en/2024/sc15596.doc.htm">United Nations</a>, February 20; <a href="https://adf-magazine.com/2024/03/m23s-tech-might-outgun-sadc-force-peacekeepers-in-drc/">Africa Defense Forum</a>, March 5). Photos of seized M23 weapons and equipment released by the Congolese military underscore the PRC origin of these extensive supplies, particularly from Norinco and Xinxing (&#20013;&#22269;&#26032;&#20852;&#36827;&#20986;&#21475;&#26377;&#38480;&#36131;&#20219;&#20844;&#21496;), a firm specializing in military uniforms and tactical gear. In an interview with a local news outlet, Congolese-Belgian defense analyst Jean-Jacques Wondo Omanyundu noted, &#8220;the M23 weapons seized by the FARDC [the Congolese military] are almost all Chinese-made&#8221; (<a href="https://chinaglobalsouth.com/2022/07/12/chinese-weapons-and-military-equipment-are-showing-up-on-the-battlefields-of-the-eastern-dr-congo/">China Global South Project</a>, July 12, 2022).</p><p>A recent UN Security Council report concludes that M23 receives substantial financial and material support from neighboring Rwanda and Uganda, both of which have acquired significant quantities of PRC-manufactured weapons (<a href="https://documents.un.org/doc/undoc/gen/n24/118/80/pdf/n2411880.pdf">United Nations</a>; <a href="https://reliefweb.int/report/democratic-republic-congo/final-report-group-experts-democratic-republic-congo-s2024432-enarruzh">ReliefWeb</a>, June 4). In recent years, Rwanda has made large purchases of artillery systems and other arms produced by Norinco and other firms. A Shanghai-based firm called Deekon Group even uses images of the Rwandan military uniforms it produces for promotional purposes on its website (<a href="https://www.deekongroup.com/rwanda-military-uniform-bdu-286.html">Deekon Group</a>, October 8). The PRC and Rwanda also maintain close military and defense ties, with Beijing deploying an official defense attach&#233; to Rwanda earlier this year (<a href="http://rw.china-embassy.gov.cn/eng/xwdt/202402/t20240221_11248065.htm">Embassy of the PRC in Rwanda</a>, February 21). Uganda&#8217;s military, meanwhile, has purchased arms from Norinco and another Chinese firm, Poly Technologies (&#20445;&#21033;&#31185;&#25216;&#26377;&#38480;&#20844;&#21496;; &#20445;&#21033;&#31185;&#25216;), according to a 2021 investigation by a Ugandan journalist (<em><a href="https://www.independent.co.ug/uganda-buys-chinese-arms-for-war-on-adf/">The Independent [Uganda]</a></em>, December 19, 2021). In November last year, Norinco partnered with the Ugandan military to establish a research center focused on unmanned aerial vehicles (UAVs) in the country (<a href="https://www.modva.go.ug/diplomatic-partnership/updf-and-norinco-to-establish-uav-workshop-in-uganda/">MODVA</a>, November 29, 2023). The extensive access of Rwanda and Uganda to PRC-manufactured weapons, along with their support for the M23 movement, highlight the likely source of the rebel group&#8217;s large PRC-made arsenal.</p><p>To counter the escalating threat from M23, the DRC military has also turned to the PRC defense industry, purchasing its first batch of three CH-4 attack drone systems from China Aerospace and Technology Corporation (CASC; &#20013;&#22269;&#33322;&#22825;) last year (<a href="https://www.africaintelligence.com/central-africa/2023/05/22/kinshasa-receives-first-batch-of-three-chinese-attack-drones,109976363-bre">Africa Intelligence</a>, May 22, 2023). Later that year, Norinco became embroiled in controversy in the DRC when its subsidiary, Norin Mining, attempted to acquire cobalt and copper mines outside Lubumbashi, in the Katanga province, south of the M23-led insurgency in North Kivu province. The DRC state-owned mining conglomerate, G&#233;camines, moved to block the sale, claiming it had not been properly informed of the decision (<a href="https://www.africa-confidential.com/article/id/15050/State_miner_opposes_new_China_sale">Africa Confidential</a>, October 11). Although Lubumbashi is approximately 900 miles south of M23-controlled territory in North Kivu, the group conducted extensive attacks in the city during its 2014 offensive (<a href="https://www.bbc.com/news/world-africa-25645434">BBC</a>, January 7, 2014).</p><p><strong>Corruption at Defense Contractors and the Myanmar Example Raise Further Questions</strong></p><p>The PRC&#8217;s defense contractors are increasingly flocking to African markets, with the PRC surpassing Russia as the continent&#8217;s largest weapons supplier this year (<a href="https://adf-magazine.com/2024/07/china-becomes-africas-top-weapons-supplier-but-motive-and-quality-stir-debate/">ADF</a>, July 23). Norinco, which manufactures a wide range of weapons from handguns to tanks, has been at the forefront of this expansion, operating offices in over 70 countries. Its latest expansion into Dakar, Senegal, signals growth intentions in the West African market (<a href="http://en.norincogroup.com.cn/col/col432/index.html">Norinco</a>, October 8; <em><a href="https://www.scmp.com/news/china/diplomacy/article/3231408/chinese-weapons-supplier-norinco-expands-influence-west-africa-challenging-russia-and-france">SCMP</a></em>, August 21, 2023). According to its website, Norinco controls mining sites across Africa (including gold, cobalt, and palladium mines), is deeply involved in the regional copper trade, and plans further expansion (<a href="http://en.norinco.cn/col/col6501/index.html">Norinco</a>, October 8). Although there is insufficient evidence directly linking these companies to the militant groups who are using their weapons, recent developments within the PRC shed more light on these companies&#8217; practices.</p><p>Beijing has taken punitive actions against at least two senior Norinco executives since 2021 in response to corruption charges. In October 2021, PRC authorities charged former Norinco Chairman Yin Jiaxu (&#23609;&#23478;&#32490;) with bribery and seeking illegal profits for relatives and friends (<em><a href="https://peoplesdaily.pdnews.cn/china/er/30001412346">People&#8217;s Daily</a></em>, October 25, 2021). According to an official readout, Yin received &#8220;huge sums&#8221; of money and gifts, and held top positions at the company from 2002 until his 2018 retirement (<em><a href="https://www.globaltimes.cn/page/202104/1220190.shtml">Global Times</a></em>, April 4, 2021; <a href="http://m.ccdi.gov.cn/content/45/c2/82570.html">CCDI</a>, September 30, 2021). Last December, authorities removed then-Norinco Chairman Liu Shiquan (&#21016;&#30707;&#27849;) from the 14th National Committee of the Chinese People&#8217;s Political Consultative Conference amid an anti-corruption investigation into the defense and aerospace sector (<em><a href="https://jamestown.org/program/pla-personnel-shakeups-and-their-implications/">China Brief</a></em>, February 2; <em><a href="https://www.globaltimes.cn/page/202403/1308052.shtml">Global Times</a></em>, March 3). Liu had previously held senior roles at the state-owned China Aerospace Science and Industry Corporation (CASIC; &#20013;&#22269;&#33322;&#22825;&#31185;&#24037;).</p><p>These high-level disciplinary actions highlight the prominence of corruption within some of the PRC&#8217;s top defense contracting firms. Given the distance between operations in African countries and oversight by Beijing authorities, corrupt backchannels may be funneling the transfer of PRC-manufactured weapons to African militant groups for personal gain. Coupled with the involvement of Chinese criminal elements in Africa and the potential for internal corruption within the militaries of affected nations, this situation merits further investigation as a possible source of these weapons (<a href="https://www.occrp.org/en/news/report-chinas-rosewood-trade-with-mali-rigged-with-illegalities">OCCRP</a>, May 25, 2022; Africa Report, <a href="https://x.com/TheAfricaReport/status/1822905866187891029">August 12</a>; <a href="https://www.theafricareport.com/347687/in-zambia-concerns-about-growing-chinese-criminality/">May 14</a>).</p><p>The PRC&#8217;s experience in Myanmar may offer insights into this involvement in internal African conflicts, such as those in Mali and the DRC. For decades, Beijing has supported Myanmar&#8217;s ruling government while simultaneously providing material and financial backing to various armed resistance groups (<em><a href="https://jamestown.org/program/how-china-prolongs-myanmars-endless-internal-conflicts/">China Brief</a></em>, March 17, 2023; <a href="https://jamestown.org/program/peng-daxun-mndaa-leader-in-myanmar-retakes-kokang-with-chinese-assistance/">MLM</a>, July 31; <em><a href="https://www.scmp.com/news/china/diplomacy/article/3275762/does-china-risk-losing-it-all-it-plays-both-sides-myanmars-lengthy-civil-war">South China Morning Post</a></em>, August 25). Both JNIM in Mali and M23 in the DRC hold significant value for the PRC due to their access to rare and high-value resources. It is plausible that Beijing may unofficially support one or both groups to secure its continued resource access. However, if such claims are substantiated, they could damage the PRC&#8217;s reputation in Africa. Moreover, as seen in Myanmar, further conflict escalation could endanger Chinese investments and those of other nations. Moreover, JNIM&#8217;s prolonged conflict with Wagner mercenaries fighting for the Malian junta&#8212;coupled with the group&#8217;s use of PRC-manufactured weaponry&#8212;may strain the PRC&#8217;s &#8220;no limits&#8221; partnership with Moscow, particularly regarding African matters (<a href="http://www.xinhuanet.com/world/2021-01/02/c_1126937927.htm">Xinhua</a>, January 2, 2021).</p><p><strong>Conclusion</strong></p><p>The expanding presence of PRC defense contractors in Africa and the increasing use of PRC-manufactured weapons by militant groups warrant deeper investigation. However, such inquiries will likely prove challenging due to the frequently opaque nature of business dealings in these regions. What remains clear is that the growing prevalence of PRC-manufactured weapons among powerful militant groups in Africa has considerable implications as Beijing moves to dominate the African arms market. These implications include regional security, as non-state actors gain further access to advanced PRC weaponry and equipment, and geo-strategic concerns, as resource-based conflicts can potentially disrupt global supply chains. Given current trends, these threats will likely intensify as PRC defense contractors seek greater access to the continent&#8217;s arms markets.</p>]]></content:encoded></item><item><title><![CDATA[The Liquidity Framework ]]></title><description><![CDATA[Targeting the Multi-Billion-Dollar Infrastructure behind 21st Century Threat Finance]]></description><link>https://www.btl-research.com/p/the-liquidity-framework</link><guid isPermaLink="false">https://www.btl-research.com/p/the-liquidity-framework</guid><dc:creator><![CDATA[Adam Rousselle]]></dc:creator><pubDate>Tue, 26 Aug 2025 15:01:28 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!T2WR!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5fad3b7c-8645-4257-ba0c-e5dcfbd64e8a_1024x512.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!T2WR!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5fad3b7c-8645-4257-ba0c-e5dcfbd64e8a_1024x512.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!T2WR!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5fad3b7c-8645-4257-ba0c-e5dcfbd64e8a_1024x512.jpeg 424w, https://substackcdn.com/image/fetch/$s_!T2WR!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5fad3b7c-8645-4257-ba0c-e5dcfbd64e8a_1024x512.jpeg 848w, https://substackcdn.com/image/fetch/$s_!T2WR!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5fad3b7c-8645-4257-ba0c-e5dcfbd64e8a_1024x512.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!T2WR!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5fad3b7c-8645-4257-ba0c-e5dcfbd64e8a_1024x512.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!T2WR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5fad3b7c-8645-4257-ba0c-e5dcfbd64e8a_1024x512.jpeg" width="1024" height="512" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5fad3b7c-8645-4257-ba0c-e5dcfbd64e8a_1024x512.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:512,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Liquidity: Meaning, Types &amp; How to Measure It&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Liquidity: Meaning, Types &amp; How to Measure It" title="Liquidity: Meaning, Types &amp; How to Measure It" srcset="https://substackcdn.com/image/fetch/$s_!T2WR!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5fad3b7c-8645-4257-ba0c-e5dcfbd64e8a_1024x512.jpeg 424w, https://substackcdn.com/image/fetch/$s_!T2WR!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5fad3b7c-8645-4257-ba0c-e5dcfbd64e8a_1024x512.jpeg 848w, https://substackcdn.com/image/fetch/$s_!T2WR!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5fad3b7c-8645-4257-ba0c-e5dcfbd64e8a_1024x512.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!T2WR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5fad3b7c-8645-4257-ba0c-e5dcfbd64e8a_1024x512.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Illicit finance is no longer episodic crime. It has matured into <a href="https://smallwarsjournal.com/2025/07/24/illicit-liquidity-as-battlespace-rethinking-finance-in-asymmetric-conflict/">shadow liquidity systems</a>: parallel infrastructures where state actors, cartels, mercenary groups, and cybercriminals pool and regenerate capital. These systems &#8211; empowered by digital currencies and vast capital outflows &#8211; function as underground financial institutions, enabling adversaries to outlast sanctions, rebuild after seizures, and finance operations at scale.</p><p>Global institutions still treat illicit finance as a series of anomalies &#8212; bad transactions, rogue exchanges, isolated scams. This fragmented view leaves the circulatory system itself untouched. The result: adversaries adapt faster than regulators, and global security erodes while enforcement chases symptoms.</p><h2><strong>Why It Matters</strong></h2><ul><li><p><strong>National Security:</strong> Shadow liquidity sustains proxy wars, sanctions evasion, cyber operations, and militant logistics. It is the bloodstream of <a href="https://gnet-research.org/2025/05/14/cash-flow-breaking-down-the-houthis-multibillion-dollar-financial-networks/">hybrid conflict</a>.</p></li><li><p><strong>Economic Integrity:</strong> These systems siphon billions from households and corporations alike. They play a destabilizing role in across whole regions, as <a href="https://www.thaienquirer.com/58027/thai-police-launch-international-war-room-to-crack-down-on-scam-centers-exclude-cambodia-over-data-risks/">witnessed recently</a> in Southeast Asia.</p></li><li><p><strong>Beyond Control:</strong> These systems feed off capital outflows (especially from China) but answer to no one &#8212; even the countries that <a href="https://www.dw.com/en/why-is-china-clamping-down-on-scammers-in-southeast-asia/a-71456569">spawned them</a>.</p></li><li><p><strong>Real World Threats:</strong> Iran-backed proxies and Southeast Asian militant groups use these networks. So do multi-billion-dollar global scam operations. The threat is real and it&#8217;s already here.</p></li><li><p><strong>Strategic Leverage:</strong> Whoever maps and disrupts these infrastructures doesn&#8217;t just fight crime &#8212; they control adversaries&#8217; capacity to project power.</p></li></ul><h2><strong>The Gap</strong></h2><ul><li><p><strong>Tools are reactive:</strong> Blockchain analytics, anti-money laundering (AML) compliance, and sanctions designations find anomalies but not architectures.</p></li><li><p><strong>Regulation is fragmented:</strong> National silos and outdated legal frameworks make systemic action impossible.</p></li></ul><h2><strong>The BTL Framework</strong></h2><p>Between the Lines Research has developed a framework to analyze illicit finance as <strong>infrastructure</strong> rather than incident. Key components:</p><ul><li><p><strong>Primary Liquidity:</strong> Capital outflows &#8212; fast, mobile fuel.</p></li><li><p><strong>Secondary Liquidity:</strong> Informal systems (hawala, OTC desks, trade credit) that enable gray exchange.</p></li><li><p><strong>Tertiary Liquidity:</strong> Long-term reservoirs (real estate, commodities, criminal operations [ex: scam centers], militant/ terrorist groups) that can be mobilized in crisis.</p></li></ul><p>By tracking conversion between these tiers, we expose the stress points adversaries use to survive and regenerate.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ksp_!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6960c124-7815-4075-b677-61855c96332b_1536x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ksp_!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6960c124-7815-4075-b677-61855c96332b_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!ksp_!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6960c124-7815-4075-b677-61855c96332b_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!ksp_!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6960c124-7815-4075-b677-61855c96332b_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!ksp_!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6960c124-7815-4075-b677-61855c96332b_1536x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ksp_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6960c124-7815-4075-b677-61855c96332b_1536x1024.png" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6960c124-7815-4075-b677-61855c96332b_1536x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2099226,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.btl-research.com/i/171975993?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6960c124-7815-4075-b677-61855c96332b_1536x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ksp_!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6960c124-7815-4075-b677-61855c96332b_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!ksp_!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6960c124-7815-4075-b677-61855c96332b_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!ksp_!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6960c124-7815-4075-b677-61855c96332b_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!ksp_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6960c124-7815-4075-b677-61855c96332b_1536x1024.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!5_iw!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7821da0-4883-4329-9d03-992c3395c31e_504x504.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!5_iw!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7821da0-4883-4329-9d03-992c3395c31e_504x504.png 424w, https://substackcdn.com/image/fetch/$s_!5_iw!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7821da0-4883-4329-9d03-992c3395c31e_504x504.png 848w, https://substackcdn.com/image/fetch/$s_!5_iw!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7821da0-4883-4329-9d03-992c3395c31e_504x504.png 1272w, https://substackcdn.com/image/fetch/$s_!5_iw!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7821da0-4883-4329-9d03-992c3395c31e_504x504.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!5_iw!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7821da0-4883-4329-9d03-992c3395c31e_504x504.png" width="632" height="632" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b7821da0-4883-4329-9d03-992c3395c31e_504x504.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:504,&quot;width&quot;:504,&quot;resizeWidth&quot;:632,&quot;bytes&quot;:366519,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.btl-research.com/i/171975993?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7821da0-4883-4329-9d03-992c3395c31e_504x504.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!5_iw!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7821da0-4883-4329-9d03-992c3395c31e_504x504.png 424w, https://substackcdn.com/image/fetch/$s_!5_iw!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7821da0-4883-4329-9d03-992c3395c31e_504x504.png 848w, https://substackcdn.com/image/fetch/$s_!5_iw!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7821da0-4883-4329-9d03-992c3395c31e_504x504.png 1272w, https://substackcdn.com/image/fetch/$s_!5_iw!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7821da0-4883-4329-9d03-992c3395c31e_504x504.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>Between the Lines&#8217; proprietary Three-Tiered Framework and Predictive Intelligence Pipeline</em></p><p><strong>Applications</strong></p><ul><li><p><strong>National Security:</strong> Identify and pre-empt liquidity corridors sustaining adversary militaries and proxies.</p></li><li><p><strong>Financial Sector:</strong> Develop financial intelligence (FININT) products that move beyond anomaly detection into systemic mapping.</p></li><li><p><strong>Tech &amp; Cyber:</strong> Integrate liquidity mapping with cyber threat intel to close the gap between digital intrusions and financial outcomes.</p></li></ul><p><strong>Case Study: Chinese Capital Outflows and Scam-Backed Militias</strong></p><p>The rapid outflow of Chinese capital, driven by elite flight and tightening domestic controls, has created offshore liquidity pools across Southeast Asia. These flows illustrate how shadow liquidity systems evolve from simple capital escape into infrastructures that finance armed groups and destabilize regional economies.</p><ul><li><p><strong>Capital Outflows (Primary):</strong> Wealthy elites and mid-tier operators move funds offshore to evade Beijing&#8217;s capital controls. Much of this first moves through cash, stablecoins, and front companies in border economies.</p></li><li><p><strong>Infrastructure Formation (Secondary):</strong> These outflows feed into OTC desks, casinos, and unregulated payment processors, which become regional hubs for laundering and reinvestment for tertiary actors.</p></li><li><p><strong>Tertiary Parasitism and Destabilization:</strong> At the highest tier, the threat becomes acute.</p><ul><li><p>Scam compounds siphon billions annually through trafficked labor.</p></li><li><p>Armed groups and private militias provide protection for these hubs, turning them into semi-sovereign enclaves in Cambodia and Myanmar.</p></li><li><p>Platforms like Huione facilitate <a href="https://gnet-research.org/2025/05/14/cash-flow-breaking-down-the-houthis-multibillion-dollar-financial-networks/">laundering at scale</a>, enabling actors such as the Houthis to exploit the same corridors.</p></li><li><p>The fact that <a href="https://www.chainalysis.com/blog/huione-guarantee-still-active-despite-shutdown/">Huione remains active</a> despite sanctions and a nominal shutdown shows that these systems are networked, not episodic &#8212; requiring a systemic approach.</p></li></ul></li></ul><p>This cycle shows how a single driver &#8212; Chinese capital flight &#8212; cascades into a shadow liquidity architecture that finances militancy, erodes sovereignty, and extracts value from legitimate economies. Episodic enforcement actions like sanctions strike at symptoms in the tertiary tier, but the real threat lies in the multi-tiered networks that remain resilient and regenerative.</p><h2><strong>What Between the Lines Provides</strong></h2><p>Between the Lines translates this framework into actionable outputs: tailored briefings, case studies, and strategic advisory designed to help institutions understand and anticipate how shadow liquidity shapes their risk environment. Whether the need is regulatory foresight, adversary mapping, or integration into existing threat intelligence, BTL brings the concepts down to ground level &#8212; where they can guide decisions, not just analysis.</p><p></p>]]></content:encoded></item><item><title><![CDATA[China’s Military Power Part I: Image vs. Reality]]></title><description><![CDATA[How the PLA&#8217;s Image of Power Masks Deep Structural Flaws]]></description><link>https://www.btl-research.com/p/chinas-military-power-image-vs-reality</link><guid isPermaLink="false">https://www.btl-research.com/p/chinas-military-power-image-vs-reality</guid><dc:creator><![CDATA[Adam Rousselle]]></dc:creator><pubDate>Thu, 21 Aug 2025 09:02:11 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!EODr!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ca45c54-9b52-44ff-bcd9-851b38f03f93_700x400.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!EODr!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ca45c54-9b52-44ff-bcd9-851b38f03f93_700x400.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!EODr!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ca45c54-9b52-44ff-bcd9-851b38f03f93_700x400.jpeg 424w, https://substackcdn.com/image/fetch/$s_!EODr!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ca45c54-9b52-44ff-bcd9-851b38f03f93_700x400.jpeg 848w, https://substackcdn.com/image/fetch/$s_!EODr!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ca45c54-9b52-44ff-bcd9-851b38f03f93_700x400.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!EODr!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ca45c54-9b52-44ff-bcd9-851b38f03f93_700x400.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!EODr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ca45c54-9b52-44ff-bcd9-851b38f03f93_700x400.jpeg" width="700" height="400" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9ca45c54-9b52-44ff-bcd9-851b38f03f93_700x400.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:400,&quot;width&quot;:700,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;A Chinese navy warship and a coast guard vessel collided in the South China Sea&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="A Chinese navy warship and a coast guard vessel collided in the South China Sea" title="A Chinese navy warship and a coast guard vessel collided in the South China Sea" srcset="https://substackcdn.com/image/fetch/$s_!EODr!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ca45c54-9b52-44ff-bcd9-851b38f03f93_700x400.jpeg 424w, https://substackcdn.com/image/fetch/$s_!EODr!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ca45c54-9b52-44ff-bcd9-851b38f03f93_700x400.jpeg 848w, https://substackcdn.com/image/fetch/$s_!EODr!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ca45c54-9b52-44ff-bcd9-851b38f03f93_700x400.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!EODr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ca45c54-9b52-44ff-bcd9-851b38f03f93_700x400.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Last week, a China Coast Guard cutter collided with a People&#8217;s Liberation Army Navy (PLAN) vessel during a confrontation off the Philippine coast. It wasn&#8217;t an accident of navigation but the result of aggressive, unprofessional maneuvering &#8212; the kind of chest-thumping that Beijing now deploys as routine statecraft in disputed territories. Reports show the vessel sustained serious damage and it remains unclear whether any China coast guard personnel were killed or injured in the collision. Reports indicate that the PLAN vessel continued in its pursuit of the Philippine vessel after the collision rather than aid in the rescue of its Coast Guard counterpart. </p><p>The incident captured something important: the gap between image and reality in China&#8217;s military posture. On paper, the PLA looks formidable, with the world&#8217;s largest navy in terms of vessel count and personnel, fields of J-20 stealth fighters, and hypersonic missiles on parade. The numbers impress and intimidate. The technical threat is real: Chinese hypersonic missiles can strike U.S. military installations as far off as Guam. Moreover, as we explored in a <a href="https://www.btl-research.com/p/how-a-single-engagement-reframed?utm_source=publication-search">recent series</a>, Chinese integrated air systems can outperform more technically advanced but less integrated counterparts.</p><p>But military power does not rest on platforms alone. It depends on people &#8212; their training, discipline, and ability to fight together under stress. By those metrics, the PLA likely falls short in myriad ways. It&#8217;s time to reassess China&#8217;s military capabilities not by just in terms of hardware, but by what would happen under real-world conditions. That is where strength is measured &#8212; and where China&#8217;s weakness is most exposed.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.btl-research.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Between the Lines is a reader-supported publication. To receive new posts and support my work, become a paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>
      <p>
          <a href="https://www.btl-research.com/p/chinas-military-power-image-vs-reality">
              Read more
          </a>
      </p>
   ]]></content:encoded></item></channel></rss>