<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Between the Lines: Shaping the Conversation]]></title><description><![CDATA[These articles have appeared in major think tanks and media outlets, many have been cited by top global policy and regulatory bodies. ]]></description><link>https://www.btl-research.com/s/shaping-the-conversation</link><image><url>https://substackcdn.com/image/fetch/$s_!-B99!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb2b8d0f-7f85-4d51-aa5d-160c09a2114e_605x605.png</url><title>Between the Lines: Shaping the Conversation</title><link>https://www.btl-research.com/s/shaping-the-conversation</link></image><generator>Substack</generator><lastBuildDate>Sun, 19 Apr 2026 16:12:28 GMT</lastBuildDate><atom:link href="https://www.btl-research.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Adam Rousselle]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[betweenthelines@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[betweenthelines@substack.com]]></itunes:email><itunes:name><![CDATA[Adam Rousselle]]></itunes:name></itunes:owner><itunes:author><![CDATA[Adam Rousselle]]></itunes:author><googleplay:owner><![CDATA[betweenthelines@substack.com]]></googleplay:owner><googleplay:email><![CDATA[betweenthelines@substack.com]]></googleplay:email><googleplay:author><![CDATA[Adam Rousselle]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Interview: Crime Beat Conversations @ New Lines Institute]]></title><description><![CDATA[A discussion of my recent work on cartel finance]]></description><link>https://www.btl-research.com/p/interview-crime-beat-conversations</link><guid isPermaLink="false">https://www.btl-research.com/p/interview-crime-beat-conversations</guid><dc:creator><![CDATA[Adam Rousselle]]></dc:creator><pubDate>Thu, 09 Apr 2026 17:55:34 GMT</pubDate><enclosure url="https://substackcdn.com/image/youtube/w_728,c_limit/cHbyMgaMqmU" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>On February 16, I joined Rafaella Lipschitz at the New Lines Institute to discuss my article, <em>&#8220;China&#8211;Cartel Nexus: The Liquidity Architecture Transforming the Global Drug Economy.&#8221;</em> We focused on how Chinese capital flight and cartel cash are converging into a parallel liquidity system that conventional enforcement struggles to reach.</p><div id="youtube2-cHbyMgaMqmU" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;cHbyMgaMqmU&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/cHbyMgaMqmU?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;8b18fbe6-86b5-4882-a056-3189b48404c2&quot;,&quot;caption&quot;:&quot;This article was published in conjunction with the New Lines Institute. You can find the original link here.&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;lg&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;China&#8211;Cartel Nexus: The Liquidity Architecture Transforming the Global Drug Economy&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:51046878,&quot;name&quot;:&quot;Adam Rousselle&quot;,&quot;bio&quot;:&quot;Editor-in-Chief and Principal Analyst at Between the Lines Research.&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/63c08aa3-3b25-4ef2-9653-620da15140c9_1024x1024.png&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2025-12-19T13:33:20.090Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!PPlc!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45c3bab3-a41d-4ab3-9bca-15a156499fe1_1041x586.jpeg&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.btl-research.com/p/chinacartel-nexus-the-liquidity-architecture&quot;,&quot;section_name&quot;:&quot;Shaping the Conversation&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:182083325,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:6,&quot;comment_count&quot;:0,&quot;publication_id&quot;:1709097,&quot;publication_name&quot;:&quot;Between the Lines&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!-B99!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb2b8d0f-7f85-4d51-aa5d-160c09a2114e_605x605.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>^ Link to original article </p>]]></content:encoded></item><item><title><![CDATA[Terrorist Propaganda as Financial Infrastructure ]]></title><description><![CDATA[How Islamic State and al-Qaeda Media Ecosystems Enable Terrorist Finance]]></description><link>https://www.btl-research.com/p/terrorist-propaganda-as-financial</link><guid isPermaLink="false">https://www.btl-research.com/p/terrorist-propaganda-as-financial</guid><dc:creator><![CDATA[Adam Rousselle]]></dc:creator><pubDate>Tue, 07 Apr 2026 12:10:19 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!u_1k!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff0fa603f-7d2a-4013-bae1-a906d3075342_1168x440.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!L_Is!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!L_Is!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png 424w, https://substackcdn.com/image/fetch/$s_!L_Is!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png 848w, https://substackcdn.com/image/fetch/$s_!L_Is!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png 1272w, https://substackcdn.com/image/fetch/$s_!L_Is!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!L_Is!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png" width="676" height="188" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:188,&quot;width&quot;:676,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:32791,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:&quot;&quot;,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!L_Is!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png 424w, https://substackcdn.com/image/fetch/$s_!L_Is!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png 848w, https://substackcdn.com/image/fetch/$s_!L_Is!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png 1272w, https://substackcdn.com/image/fetch/$s_!L_Is!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a></figure></div><p><strong>This is an article I recently wrote for the Global Network of Extremism and Technology (GNET). You can find the original link <a href="https://gnet-research.org/2026/04/07/propaganda-as-financial-infrastructure-how-islamic-state-and-al-qaeda-media-ecosystems-enable-terrorist-finance/">here</a>.</strong></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!u_1k!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff0fa603f-7d2a-4013-bae1-a906d3075342_1168x440.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!u_1k!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff0fa603f-7d2a-4013-bae1-a906d3075342_1168x440.jpeg 424w, https://substackcdn.com/image/fetch/$s_!u_1k!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff0fa603f-7d2a-4013-bae1-a906d3075342_1168x440.jpeg 848w, https://substackcdn.com/image/fetch/$s_!u_1k!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff0fa603f-7d2a-4013-bae1-a906d3075342_1168x440.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!u_1k!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff0fa603f-7d2a-4013-bae1-a906d3075342_1168x440.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!u_1k!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff0fa603f-7d2a-4013-bae1-a906d3075342_1168x440.jpeg" width="1168" height="440" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f0fa603f-7d2a-4013-bae1-a906d3075342_1168x440.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:440,&quot;width&quot;:1168,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Reassessing the Financing of Terrorism in 2025 | Royal United Services  Institute&quot;,&quot;title&quot;:&quot;Reassessing the Financing of Terrorism in 2025 | Royal United Services  Institute&quot;,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Reassessing the Financing of Terrorism in 2025 | Royal United Services  Institute" title="Reassessing the Financing of Terrorism in 2025 | Royal United Services  Institute" srcset="https://substackcdn.com/image/fetch/$s_!u_1k!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff0fa603f-7d2a-4013-bae1-a906d3075342_1168x440.jpeg 424w, https://substackcdn.com/image/fetch/$s_!u_1k!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff0fa603f-7d2a-4013-bae1-a906d3075342_1168x440.jpeg 848w, https://substackcdn.com/image/fetch/$s_!u_1k!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff0fa603f-7d2a-4013-bae1-a906d3075342_1168x440.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!u_1k!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff0fa603f-7d2a-4013-bae1-a906d3075342_1168x440.jpeg 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Propaganda ecosystems function as <em>parallel trust infrastructures</em>, enabling extremist organisations to coordinate financial activity outside formal financial systems. While extremist propaganda is typically studied as a tool for recruitment or ideological dissemination, these ecosystems also perform a critical financial function as generators of the reputational legitimacy and interpersonal trust necessary for decentralised financial networks to operate.</p><p>Over the past decade, violent extremist groups&#8212;particularly those affiliated with <a href="https://gnet-research.org/combating-islamic-state-finance/">the Islamic State </a>and al-Qaeda&#8212;have leveraged digital propaganda ecosystems to construct increasingly sophisticated parallel financial systems. Through repeated messaging, reputational signalling, and networked communication, these ecosystems enable dispersed actors to authenticate intermediaries, coordinate fundraising, and move resources across geographically fragmented spaces.</p><p>This Insight argues that extremist propaganda ecosystems function as <em>trust infrastructures</em> that enable decentralised terrorist financing systems to operate outside formal financial institutions. If propaganda ecosystems generate the trust required for decentralised financial coordination, then disrupting these <em>trust nodes</em> may offer earlier intervention points than traditional transaction-level counter-terrorist financing measures.</p><p><strong>The Role of Trust in Institutional and Extremist Financial Systems</strong></p><p>Across economic theory, there is <a href="https://socialsciencelibrary.org/frontier-issues-in-economic-thought/volume-3-human-well-being-and-economic-goals/trust-as-a-commodity/">broad agreement</a> that financial systems depend on trust. Whereas formal financial systems rely on institutional trust generated by legal frameworks and regulatory institutions that govern banks and financial intermediaries, extremist networks are formally excluded from these channels. This exclusion has forced terrorist groups to build parallel systems that generate trust, enabling the financial coordination required to sustain operations&#8212;beginning with propaganda ecosystems.</p><p>From a financial perspective, these trust-generating ecosystems enable groups to <a href="https://gnet-research.org/2024/12/12/soliciting-terror-iskp-digital-communications-and-financing-tactics-through-voice-of-khurasan/">solicit funds</a> directly while identifying supporters with fundraising potential or financial expertise. At the same time, the rapid expansion of financial technologies&#8212;including cryptocurrencies and other fintech tools&#8212;has reduced the friction associated with transferring funds across informal networks, allowing extremist actors to mobilise financial resources more rapidly across geographically dispersed stakeholders. Finally, the shared narratives and reputational trust generated within these propaganda ecosystems allow larger organisations to both co-opt local militant groups with independent revenue streams and coordinate financially across otherwise fragmented networks.</p><p>To these ends, extremists leverage network-based trust as a substitute for formal institutional trust, enabling financial coordination across informal systems.</p><p><strong>Case Studies: Propaganda-Enabled Financial Systems</strong></p><p>The following cases illustrate how extremist propaganda ecosystems have contributed to the rise of parallel financial infrastructures used by terrorist groups. While these examples are limited to IS- and AQ-affiliated groups, they are not exhaustive.</p><p>Islamic State: Global Financial Facilitation Networks</p><p>Although IS affiliates lost the <a href="https://ctc.westpoint.edu/the-financial-future-of-the-islamic-state/">vast majority</a> of their territorial holdings and operational revenue between 2014 and 2019, the broader global organisation has remained resilient in large part due to the continued dissemination of online propaganda. Safe havens such as Afghanistan allowed the organisation&#8217;s <a href="https://techagainstterrorism.org/in-the-news/iskp-intensifying-online-propaganda-targeting-russia-and-central-asia">most active branch</a>&#8212;the Islamic State Khorasan Province (ISKP)&#8212;to <a href="https://gnet-research.org/2025/08/04/the-shadow-war-in-balochistan-iskp-weaponises-digital-land-to-gain-influence/">produce and distribute</a> videos, press releases, and its monthly magazine <em>The Voice of Khorasan</em> across platforms including Telegram, Rocket.Chat, <a href="https://gnet-research.org/2025/12/03/have-any-change-to-spare-how-the-islamic-state-leverages-instagram-for-fundraising/">Instagram</a>, <a href="https://gnet-research.org/2023/04/21/wilayat-facebook-and-instagram-an-exploration-of-pro-is-activities-on-mainstream-platforms/">Facebook</a>, <a href="https://gnet-research.org/2022/11/18/islamic-state-supporters-on-twitter-how-is-new-twitter-handling-an-old-problem/">X</a>, and <a href="https://gnet-research.org/2026/02/16/extremist-content-curation-moderation-challenges-on-pinterest-and-means-to-move-forward/">Pinterest</a>.</p><p>Beyond ideological messaging, these propaganda ecosystems play a critical role in <a href="https://gnet-research.org/2025/03/13/free-the-captives-islamic-state-central-asian-fundraising-networks-in-support-of-is-families-in-syria-and-iraq/">generating trust</a> across geographically dispersed supporters and operatives. Repeated messaging, shared narratives, and reputational signalling help establish a sense of <a href="https://gnet-research.org/2026/02/04/shock-and-awe-geopolitical-disruption-and-terrorist-narrative-opportunism-online/">authenticity and legitimacy</a> within the network. In the absence of formal financial institutions, this reputational infrastructure reduces uncertainty about potential intermediaries and collaborators across geographically vast networks.</p><p>With these trust networks in place, the Islamic State organisation has been able to construct sophisticated <a href="https://gnet-research.org/2025/02/17/combating-the-islamic-state-finance-somalia-and-the-pan-african-nexus/">cross-border financial systems</a> that sustain its global operations. Many of these financial activities were centred in the Cal Miskaad mountain range of Puntland, Somalia, where the group&#8217;s al-Karrar office coordinated fundraising and financial transfers across Africa and Asia before a 2025 series of U.S. <a href="https://www.longwarjournal.org/archives/2025/07/us-ground-raid-captures-islamic-state-leader-in-northern-somalia.php">airstrikes and local military operations</a> disrupted the hub. Arrests of financial operatives in <a href="https://www.dw.com/en/german-police-swoop-on-islamic-state-finance-network/a-65776588">Europe</a> and the <a href="https://www.justice.gov/opa/pr/man-sentenced-over-30-years-prison-crypto-terror-financing-scheme">United States</a> suggest elements of this architecture were already operating across multiple jurisdictions, suggesting a move toward a more decentralised model of interconnected trust nodes.</p><p>Islamic State propaganda ecosystems support these parallel financial systems in three primary ways. The first is direct fundraising, with outlets such as <em>The Voice of Khorasan</em> and individual operatives <a href="https://gnet-research.org/2025/02/19/combating-islamic-state-finance-central-asia-and-around-the-world/">soliciting donations</a> directly from supporters, often through QR codes linked to cryptocurrency transfers. Because these appeals circulate within trusted propaganda communities, potential donors face fewer informational barriers when deciding whether to contribute. Evidence shows that financial and propaganda roles intertwine: for example, French police <a href="https://www.lemonde.fr/en/france/article/2025/11/01/france-arrests-afghan-with-suspected-links-to-islamic-state-offshoot_6746996_7.html">arrested a man</a> in November 2025 in relation to financing and disseminating propaganda for the ISKP.</p><p>The second function is coordination and network formation. Cryptocurrency transfers and hawala transactions are frequently arranged through encrypted messaging platforms such as <a href="https://www.counterterrorism.police.uk/four-jailed-for-sharing-terrorism-propaganda-and-supporting-terrorist-funding-activities/">WhatsApp</a> by operatives who likely <a href="https://www.apgml.org/sites/default/files/documents/APG-MENAFATF_Typologies_Report_Social_Media_and_TF.pdf">initially connected </a>through propaganda communities on other social media platforms. In this sense, propaganda ecosystems act as authenticators, helping participants identify trusted intermediaries and facilitating financial coordination across dispersed networks.</p><p>The third function is integration, with the broader organisation inspiring local jihadist groups with independent revenue streams to join and contribute. Examples include the Islamic State Southeast Asia Province (<a href="https://www.hudson.org/terrorism/history-evolution-islamic-state-southeast-asia">ISEAP</a>) in the Philippines and <a href="https://acleddata.com/report/ransom-gold-and-spoils-war-islamic-state-mozambiques-new-cash-flow">Islamic State&#8211;Mozambique</a>, both of which operate locally embedded revenue systems while maintaining ties to the broader Islamic State network. In such cases, joining broader financial networks allows these groups to receive funds to expand their attacks or revenue generation, and contribute back to the larger organisation.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!a-GC!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90a6aa06-c840-4425-a8d0-318562858e5e_1070x930.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!a-GC!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90a6aa06-c840-4425-a8d0-318562858e5e_1070x930.png 424w, https://substackcdn.com/image/fetch/$s_!a-GC!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90a6aa06-c840-4425-a8d0-318562858e5e_1070x930.png 848w, https://substackcdn.com/image/fetch/$s_!a-GC!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90a6aa06-c840-4425-a8d0-318562858e5e_1070x930.png 1272w, https://substackcdn.com/image/fetch/$s_!a-GC!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90a6aa06-c840-4425-a8d0-318562858e5e_1070x930.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!a-GC!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90a6aa06-c840-4425-a8d0-318562858e5e_1070x930.png" width="1070" height="930" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/90a6aa06-c840-4425-a8d0-318562858e5e_1070x930.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:930,&quot;width&quot;:1070,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1410580,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.btl-research.com/i/193456814?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90a6aa06-c840-4425-a8d0-318562858e5e_1070x930.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!a-GC!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90a6aa06-c840-4425-a8d0-318562858e5e_1070x930.png 424w, https://substackcdn.com/image/fetch/$s_!a-GC!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90a6aa06-c840-4425-a8d0-318562858e5e_1070x930.png 848w, https://substackcdn.com/image/fetch/$s_!a-GC!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90a6aa06-c840-4425-a8d0-318562858e5e_1070x930.png 1272w, https://substackcdn.com/image/fetch/$s_!a-GC!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90a6aa06-c840-4425-a8d0-318562858e5e_1070x930.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>Figure 1: Image from the ISKP&#8217;s Voice of Khorasan magazine soliciting crypto donations in Monero</em></p><p><strong>Al-Qaeda: Legitimacy, Trust, and Decentralised Finance</strong></p><p>Al-Qaeda&#8217;s (AQ) global propaganda ecosystem provides the ideological legitimacy and reputational signalling necessary to sustain parallel financial systems across geographically dispersed affiliates. Unlike the Islamic State&#8217;s more centralised attempts to coordinate global operations, AQ&#8217;s model relies heavily on regional trust nodes that maintain operational autonomy while benefiting from the broader legitimacy of the organisational banner and its propaganda channels. This structure allows locally embedded militant groups to generate revenue independently while remaining integrated into a wider transnational network.</p><p>Jama&#8217;at Nusrat al-Islam wal-Muslimin (JNIM), an AQ affiliate formed in 2017 through the consolidation of several militant factions operating across the Sahel, illustrates how this model co-opts disparate groups with multiple revenue streams under a parallel financial system. JNIM operates a patchwork of revenue-generating activities tied to illicit <a href="https://gnet-research.org/2024/11/25/from-trees-to-terror-jnims-use-of-online-rosewood-sales-to-fuel-expansion/">timber extraction</a>, artisanal <a href="https://gnet-research.org/2025/04/29/malis-environmental-crisis-the-link-between-climate-change-and-jnims-rapid-expansion/">gold smuggling</a>, <a href="https://globalinitiative.net/analysis/cattle-rustling-and-insecurity-in-the-triborder-area-between-burkina-faso-cte-divoire-and-ghana/">cattle rustling</a>, taxation of local populations, and narcotics trafficking.</p><p>These revenue streams are largely decentralised and embedded in local economies. However, the broader al-Qaeda <a href="https://gnet-research.org/2020/10/27/digital-dunes-and-shrublands-a-comparative-introduction-to-the-sahelian-jihadi-propaganda-ecosystem/">narrative ecosystem</a> provides legitimacy and cohesion across geographically dispersed factions, allowing multiple militant groups and revenue systems to operate under a shared organisational framework that enables its expansion as a single entity. This combination of <a href="https://acleddata.com/report/jamaat-nusrat-al-islam-wal-muslimin-jnim">propaganda</a>-based legitimacy and locally embedded <a href="https://issafrica.org/iss-today/timber-logging-drives-jnim-s-expansion-in-mali">revenue streams</a> has contributed to JNIM&#8217;s rapid expansion across the Sahel.</p><p>Open-source evidence demonstrates <a href="https://adf-magazine.com/2025/09/terror-groups-diversify-to-find-steady-flow-of-illicit-financing/">decentralised revenue generation</a> under a shared JNIM/al-Qaeda framework. Rather than relying on a centralised treasury, these networks operate through a distributed network anchored by the broader al-Qaeda <a href="https://pt.icct.nl/sites/default/files/2024-06/Research%20article_Lakomy.pdf">propaganda ecosystem</a>. Through shared narratives, ideological legitimacy, and reputational signalling, this propaganda infrastructure allows geographically dispersed factions to generate and deploy revenue locally while remaining integrated within a wider militant network under the direction of key trust nodes.</p><p>JNIM&#8217;s decentralised structure resembles the <a href="https://insightcrime.org/investigations/cocaine-brokers-flexible-backbone-ndrangheta-trafficking-empire/">model employed</a> by the Italian &#8217;Ndrangheta criminal network, in which semi-autonomous local groups generate <a href="https://www.occrp.org/en/project/the-ndrangheta">large-scale revenue</a> independently while remaining connected through shared structures rather than centralised financial control &#8211; allowing them to largely evade global enforcement for decades. While the scale of JNIM&#8217;s finances is far smaller, the comparison highlights how decentralised networks built on trusted intermediaries can sustain resilient financial ecosystems without centralised treasury structures.</p><p>A more centralised version of this model can be observed in Somalia through al-Shabaab (AS), <a href="https://www.congress.gov/crs_external_products/IF/HTML/IF10170.web.html#:~:text=After%20expressions%20of%20allegiance%20to,agenda%2C%20the%20group%20operates%20independently.">which joined</a> AQ in 2012 and generates approximately US $100 million in <a href="https://home.treasury.gov/news/press-releases/jy2168#:~:text=Al%2DShabaab%20generates%20over%20$100,discord%20and%20undermine%20good%20governance.">annual revenue</a>, making it the wealthiest affiliate in the AQ network. AS has developed a structured financial system built around <a href="https://africacenter.org/spotlight/reclaiming-al-shabaabs-revenue/">taxation</a>, illicit <a href="https://www.theguardian.com/global-development/2022/aug/08/somalia-deforestation-charcoal-farmers-logging-al-shabaab">charcoal trading</a>, diaspora remittances, and intermediaries operating in <a href="https://home.treasury.gov/news/press-releases/sb0084">Gulf financial corridors</a>, East Africa, and <a href="https://www.reuters.com/article/world/iran-is-new-transit-point-for-somali-charcoal-in-illict-trade-taxed-by-militants-idUSKCN1MJ158/">Iran</a>.</p><p>Despite stronger internal governance than many AQ affiliates, AS&#8217;s financial resilience still depends on trust networks reinforced through propaganda and reputational legitimacy. These networks facilitate revenue generation &#8211; particularly through <a href="https://www.fmreview.org/sipus/">diaspora remittances</a> &#8211; while evidence also indicates AS reinvests a portion of proceeds into propaganda dissemination. In effect, propaganda functions not only as a communication tool but as a financial infrastructure, sustaining trust, reinforcing legitimacy, and enabling continued resource mobilisation across the broader AQ ecosystem.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!OPoL!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2fd14e2b-af13-4727-8493-74c9148a12c6_1742x1144.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!OPoL!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2fd14e2b-af13-4727-8493-74c9148a12c6_1742x1144.png 424w, https://substackcdn.com/image/fetch/$s_!OPoL!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2fd14e2b-af13-4727-8493-74c9148a12c6_1742x1144.png 848w, https://substackcdn.com/image/fetch/$s_!OPoL!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2fd14e2b-af13-4727-8493-74c9148a12c6_1742x1144.png 1272w, https://substackcdn.com/image/fetch/$s_!OPoL!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2fd14e2b-af13-4727-8493-74c9148a12c6_1742x1144.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!OPoL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2fd14e2b-af13-4727-8493-74c9148a12c6_1742x1144.png" width="1456" height="956" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2fd14e2b-af13-4727-8493-74c9148a12c6_1742x1144.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:956,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:3092267,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.btl-research.com/i/193456814?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2fd14e2b-af13-4727-8493-74c9148a12c6_1742x1144.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!OPoL!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2fd14e2b-af13-4727-8493-74c9148a12c6_1742x1144.png 424w, https://substackcdn.com/image/fetch/$s_!OPoL!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2fd14e2b-af13-4727-8493-74c9148a12c6_1742x1144.png 848w, https://substackcdn.com/image/fetch/$s_!OPoL!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2fd14e2b-af13-4727-8493-74c9148a12c6_1742x1144.png 1272w, https://substackcdn.com/image/fetch/$s_!OPoL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2fd14e2b-af13-4727-8493-74c9148a12c6_1742x1144.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>Figure 3: AQ-aligned JNIM (red) has expanded rapidly since its 2017 formation, controlling more territory in the Sahel than all other militant groups in the region combined.</em></p><p><strong>The Role of Propaganda-Based Trust in Parallel Financial Systems</strong></p><p>Across these cases, propaganda ecosystems function as reputational infrastructures that allow decentralised financial systems to operate beyond formal institutions. While windfall events such as <a href="https://adf-magazine.com/2025/12/jnim-targets-wealthy-foreigners-for-ransoms/">ransom payments</a> or major criminal operations can produce large short-term inflows, these funds likely disperse rapidly due to corruption, competition, and operational fragmentation. By contrast, trust-based financial systems built around propaganda-generated legitimacy rely on repeated small transactions and trusted intermediaries. Although these flows may be lower in individual transaction volume, they often produce greater long-term financial resilience by sustaining continuous revenue streams across distributed networks. In these systems, propaganda does not merely support recruitment or ideological messaging; it also provides the reputational infrastructure that enables financial coordination across decentralised trust nodes.</p><p>That these groups&#8217; propaganda frequently emulates the visual and stylistic conventions of mainstream media &#8211; videos with news-style watermarks and tickers, press releases, and glossy magazines &#8211; is not coincidental. Just as news organisations and commercial brands use such formats to signal legitimacy, extremist organisations deploy them to generate reputational trust among dispersed audiences. These audiences, in turn, form trust nodes that link media channels, influencers, and intermediaries, validating financial flows and enabling coordination across decentralised networks.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!yFab!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d53d184-9407-4e64-9acf-d45d4d09c80b_1124x888.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!yFab!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d53d184-9407-4e64-9acf-d45d4d09c80b_1124x888.png 424w, https://substackcdn.com/image/fetch/$s_!yFab!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d53d184-9407-4e64-9acf-d45d4d09c80b_1124x888.png 848w, https://substackcdn.com/image/fetch/$s_!yFab!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d53d184-9407-4e64-9acf-d45d4d09c80b_1124x888.png 1272w, https://substackcdn.com/image/fetch/$s_!yFab!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d53d184-9407-4e64-9acf-d45d4d09c80b_1124x888.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!yFab!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d53d184-9407-4e64-9acf-d45d4d09c80b_1124x888.png" width="1124" height="888" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2d53d184-9407-4e64-9acf-d45d4d09c80b_1124x888.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:888,&quot;width&quot;:1124,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!yFab!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d53d184-9407-4e64-9acf-d45d4d09c80b_1124x888.png 424w, https://substackcdn.com/image/fetch/$s_!yFab!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d53d184-9407-4e64-9acf-d45d4d09c80b_1124x888.png 848w, https://substackcdn.com/image/fetch/$s_!yFab!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d53d184-9407-4e64-9acf-d45d4d09c80b_1124x888.png 1272w, https://substackcdn.com/image/fetch/$s_!yFab!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d53d184-9407-4e64-9acf-d45d4d09c80b_1124x888.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Figure 4: Proposed typology breakdown of trust node categories across IS and AQ propaganda ecosystems/financial networks.</p><p><strong>Implications for Counter-Terrorist Financing: Targeting Trust Nodes</strong></p><p>Current counter-terrorist financing strategies focus primarily on transaction-level disruption, including sanctions, asset freezes, blockchain tracing, and financial surveillance. While these approaches remain essential, they largely target late-stage financial activity after financial coordination has already occurred. The deeper structural vulnerability in many extremist financial systems may lie earlier in the lifecycle of these networks&#8212;within the trust relationships that enable <em>decentralised actors to coordinate</em> financial activity across dispersed environments.</p><p>Viewed through this lens, propaganda ecosystems function not only as ideological or recruitment platforms but also as trust infrastructures that authenticate intermediaries and enable financial coordination. Within these ecosystems, certain actors, channels, or accounts serve as trust nodes&#8212;points within the network that signal legitimacy, validate intermediaries, and facilitate coordination among otherwise disconnected participants. Recent assessments by the Financial Action Task Force (FATF) reinforce this dynamic, noting that groups such as ISKP <a href="https://www.fatf-gafi.org/en/publications/Methodsandtrends/comprehensive-update-terrorist-financing-risks-2025.html">increasingly embed</a> crowdfunding appeals directly within propaganda ecosystems, including encrypted messaging channels targeting diaspora communities.</p><p>Recent research also highlights how emerging <a href="https://gnet-research.org/2025/10/24/closing-the-enforcement-gap-ai-illicit-liquidity-and-the-next-phase-of-counter-terrorist-finance/">financial technologies</a> are reshaping the landscape of terrorist financing. Digital assets, encrypted messaging platforms, and decentralised payment rails have created parallel financial infrastructures operating largely outside traditional regulatory oversight. Artificial intelligence tools are increasingly capable of clustering cryptocurrency wallets, identifying laundering typologies, and mapping financial networks that span multiple platforms and jurisdictions. Rather than simply tracing individual transactions, these technologies allow investigators to analyse financial ecosystems as interconnected systems of intermediaries and facilitators.</p><p>Amid the emergence of vast illicit financial service ecosystems&#8212;as highlighted in a February 2026 <a href="https://www.fatf-gafi.org/content/dam/fatf-gafi/reports/Cyber-Enabled-Fraud%E2%80%93Digitalisation-and-ML-TF-PF-Risks.pdf.coredownload.inline.pdf">FATF report</a>&#8212;the longer-term risk may lie in the convergence of decentralised extremist financial networks with these larger criminal service economies, underscoring the need to disrupt the trust infrastructures that sustain them earlier.</p><p>When combined with analysis of extremist propaganda ecosystems, AI-enhanced tracing and mapping capabilities may help investigators identify the <em>trust nodes</em> that anchor decentralised financial networks. Wallet addresses, donation links, and financial intermediaries that circulate repeatedly within propaganda communities can serve as indicators of trusted actors within these ecosystems. By linking online behavioural signals with blockchain analytics and financial intelligence, investigators may be able to map the financial networks that emerge from these trust nodes.</p><p>This perspective suggests an opportunity for greater collaboration between platforms and national financial intelligence units (FIUs), and financial intelligence tools like blockchain analytics. Social media platforms and messaging services are often the earliest environments where trust nodes emerge, as accounts that repeatedly disseminate propaganda, authenticate intermediaries, or promote fundraising campaigns gain reputational legitimacy within extremist ecosystems. Rather than focusing solely on content removal, platforms could prioritise identifying accounts and channels that function as trust nodes and sharing associated financial indicators&#8212;such as wallet addresses, donation links, or payment identifiers&#8212;with relevant investigative bodies.</p><p>Investigators and researchers may therefore benefit from prioritising several analytical questions:</p><ul><li><p>Where are the trust nodes within extremist propaganda ecosystems?</p></li><li><p>Which actors authenticate financial intermediaries within these networks?</p></li><li><p>And how do trusted propaganda channels enable decentralised financial coordination across geographically dispersed actors?</p></li></ul><p>Integrating insights from propaganda analysis, platform data, and financial intelligence may allow investigators to map financial networks emerging from these trust nodes and identify earlier intervention points within decentralised extremist financing systems.</p>]]></content:encoded></item><item><title><![CDATA[China–Cartel Nexus: The Liquidity Architecture Transforming the Global Drug Economy]]></title><description><![CDATA[Latin American cartels now harness the vast power of China&#8217;s underground financial sector. The operational center of gravity may be shifting toward the underground bankers who make this possible.]]></description><link>https://www.btl-research.com/p/chinacartel-nexus-the-liquidity-architecture</link><guid isPermaLink="false">https://www.btl-research.com/p/chinacartel-nexus-the-liquidity-architecture</guid><dc:creator><![CDATA[Adam Rousselle]]></dc:creator><pubDate>Fri, 19 Dec 2025 13:33:20 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!PPlc!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45c3bab3-a41d-4ab3-9bca-15a156499fe1_1041x586.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!6Gt1!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F932f0174-fe62-4bae-95d7-27252bf4e80b_310x60.svg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!6Gt1!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F932f0174-fe62-4bae-95d7-27252bf4e80b_310x60.svg 424w, https://substackcdn.com/image/fetch/$s_!6Gt1!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F932f0174-fe62-4bae-95d7-27252bf4e80b_310x60.svg 848w, https://substackcdn.com/image/fetch/$s_!6Gt1!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F932f0174-fe62-4bae-95d7-27252bf4e80b_310x60.svg 1272w, https://substackcdn.com/image/fetch/$s_!6Gt1!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F932f0174-fe62-4bae-95d7-27252bf4e80b_310x60.svg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!6Gt1!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F932f0174-fe62-4bae-95d7-27252bf4e80b_310x60.svg" width="310" height="60" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/932f0174-fe62-4bae-95d7-27252bf4e80b_310x60.svg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:60,&quot;width&quot;:310,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Logo&quot;,&quot;title&quot;:&quot;Logo&quot;,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Logo" title="Logo" srcset="https://substackcdn.com/image/fetch/$s_!6Gt1!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F932f0174-fe62-4bae-95d7-27252bf4e80b_310x60.svg 424w, https://substackcdn.com/image/fetch/$s_!6Gt1!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F932f0174-fe62-4bae-95d7-27252bf4e80b_310x60.svg 848w, https://substackcdn.com/image/fetch/$s_!6Gt1!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F932f0174-fe62-4bae-95d7-27252bf4e80b_310x60.svg 1272w, https://substackcdn.com/image/fetch/$s_!6Gt1!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F932f0174-fe62-4bae-95d7-27252bf4e80b_310x60.svg 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a></figure></div><p><em>This article was published in conjunction with the New Lines Institute. You can find the original link <a href="https://newlinesinstitute.org/state-resilience-fragility/china-cartel-nexus-the-liquidity-architecture-transforming-the-global-drug-economy/">here</a>.</em></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!PPlc!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45c3bab3-a41d-4ab3-9bca-15a156499fe1_1041x586.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!PPlc!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45c3bab3-a41d-4ab3-9bca-15a156499fe1_1041x586.jpeg 424w, https://substackcdn.com/image/fetch/$s_!PPlc!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45c3bab3-a41d-4ab3-9bca-15a156499fe1_1041x586.jpeg 848w, https://substackcdn.com/image/fetch/$s_!PPlc!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45c3bab3-a41d-4ab3-9bca-15a156499fe1_1041x586.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!PPlc!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45c3bab3-a41d-4ab3-9bca-15a156499fe1_1041x586.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!PPlc!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45c3bab3-a41d-4ab3-9bca-15a156499fe1_1041x586.jpeg" width="1041" height="586" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/45c3bab3-a41d-4ab3-9bca-15a156499fe1_1041x586.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:586,&quot;width&quot;:1041,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;How Chinese gamblers created a secret pipeline for illicit cash through Las  Vegas' biggest casino | CNN&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="How Chinese gamblers created a secret pipeline for illicit cash through Las  Vegas' biggest casino | CNN" title="How Chinese gamblers created a secret pipeline for illicit cash through Las  Vegas' biggest casino | CNN" srcset="https://substackcdn.com/image/fetch/$s_!PPlc!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45c3bab3-a41d-4ab3-9bca-15a156499fe1_1041x586.jpeg 424w, https://substackcdn.com/image/fetch/$s_!PPlc!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45c3bab3-a41d-4ab3-9bca-15a156499fe1_1041x586.jpeg 848w, https://substackcdn.com/image/fetch/$s_!PPlc!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45c3bab3-a41d-4ab3-9bca-15a156499fe1_1041x586.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!PPlc!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45c3bab3-a41d-4ab3-9bca-15a156499fe1_1041x586.jpeg 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Chinese money-laundering networks (CMLNs) have quietly become the financial engine of Latin America&#8217;s drug cartels. What once appeared as isolated headlines &#8211; Chinese <a href="https://www.cnn.com/2025/11/18/us/chinese-gambling-wynn-casinos-cash-middlemen-invs-vis">gambling junkets</a> washing millions through U.S. casinos, luxury <a href="https://www.kharon.com/brief/chinese-money-laundering-cartels-treasury-department-fincen">real-estate</a> loops, suspicious <a href="https://www.wsj.com/finance/regulation/chinese-money-launders-are-moving-billions-through-u-s-banks-cf617283">bulk cash</a> deposits at West Coast banks &#8211; now forms a single system linking Chinese capital flight to cartel profit cycles.</p><p>Regulators continue to grapple with the scale. In late 2024, the U.S. Treasury&#8217;s Financial Crimes Enforcement Network (FinCEN) issued a record <a href="https://www.wsj.com/finance/regulation/chinese-money-launders-are-moving-billions-through-u-s-banks-cf617283">$3 billion</a> penalty against TD Bank for failures tied to cartel-linked laundering. Less than a year later, in August 2025, FinCEN followed with a <a href="https://www.fincen.gov/news/news-releases/fincen-issues-advisory-and-financial-trend-analysis-chinese-money-laundering">national advisory</a> flagging $312 billion in suspected CMLN-related transactions tied to Mexican cartels between 2020 and 2024 &#8211; a figure that suggests the headlines are only the surface of a much deeper architecture.</p><p>Cartel money laundering through Chinese networks is not an isolated phenomenon. While public attention often centers on downstream effects of cartel operations such as violence and addiction, these impacts are structurally enabled by China&#8217;s internal demand to move capital offshore &#8211; a demand amplified by digital technologies that now move value faster than any regulatory system can track. The same financial and political dynamics driving Chinese elites to expatriate wealth have also produced the infrastructure powering Southeast Asia&#8217;s <a href="https://newlinesinstitute.org/state-resilience-fragility/chinese-shadow-liquidity-and-the-scam-economy/">scam compounds</a>, <a href="https://smallwarsjournal.com/2025/07/24/illicit-liquidity-as-battlespace-rethinking-finance-in-asymmetric-conflict/">regional insurgencies</a>, and a shadow digital economy that increasingly behaves like a self-reinforcing network. Taken together, China&#8217;s internal financial pressures have produced a shadow liquidity architecture that connects its domestic financial instability to the expansion of criminal and insurgent activity worldwide.</p><p>In the Americas, that architecture has taken on a new shape, giving Mexican cartels access to Chinese capital-outflow mechanisms perfectly adapted to their needs. These mechanisms provide criminal groups the means to expand their operations and legitimize illicit gains by tapping into the financial reach of the world&#8217;s second-largest economy. From fentanyl precursors and pill presses to consumer goods sold through semilegitimate front companies, China&#8217;s industrial machine empowers the criminal-paramilitary networks driving insecurity and mass violence across much of the Americas. Meanwhile, CMLNs legitimize the profits of a multibillion-dollar addiction problem in a way that contributes to inflated prices in an increasingly unaffordable housing market.</p><p>The result is a shared financial ecosystem linking capital flight from China to fentanyl profits on either side of the U.S.-Mexican border. It is a convergence that transforms a domestic Chinese financial problem into a global security threat with the potential to upend the traditional power structure behind the North American drug trade, putting globalized CMLNs at its center. Traditional enforcement models were not designed to address this level of complexity, forcing the emergence of a new generation artificial intelligence and machine learning-enabled tools to combat global illicit finance. With criminal actors evolving in parallel, the world is entering a technological contest between shadow capital and the institutions charged with constraining it.</p><h2><strong>The Liquidity Cascade</strong></h2><p>CMLNs transform bulk U.S. dollars from narcotics sales into both onshore renminbi purchasing power in China and offshore dollar liquidity for Chinese clients seeking capital flight. Through shadow banking, mirror swaps, crypto-settlement, and cash laundering businesses, these networks have created a financial architecture that allows cartel proceeds to fuse seamlessly into China&#8217;s capital-flight mechanisms. What appears from the outside as cartel money laundering is, in reality, the downstream face of a much larger imbalance: the accelerating pressure among Chinese elites to move wealth beyond the reach of domestic controls.</p><p>Advances in digital technology underpin this new paradigm: a parallel architecture that operates independently of the SWIFT financial payments system, formal banks, or Western oversight. <a href="https://www.sanctionscanner.com/knowledge-base/what-is-mirror-transaction-822">Mirror transfers</a> (&#23545;&#25970; <em>du&#236;qi&#257;o</em>), over-the-counter <a href="https://www.trmlabs.com/resources/blog/fincen-targets-three-mexico-based-financial-institutions-for-laundering-opioid-proceeds">cryptocurrency brokers</a>, and gray-market <a href="https://www.wired.com/story/xinbi-guarantee-crypto-scam-hub/">crypto exchangers</a> link Chinese elites, intermediaries, and transnational criminal syndicates into a single global liquidity ecosystem. Cartels have tapped into this infrastructure because it gives them what traditional laundering cannot: frictionless conversion, instant settlement, and access to the world&#8217;s largest industrial economy.</p><p>Mirror transfers are the primary way Chinese capital outflows are operationalized into cartel laundering infrastructure. The process works thusly:</p><ul><li><p>Cartels deposit bulk <a href="https://oversight.house.gov/wp-content/uploads/2023/04/Hearing-on-Chinese-Money-Laundering-Mavrellis-Written-Testimony-4.26.2023-FINAL.pdf">drug cash</a> with Chinese brokers in the Americas, who launder the physical notes locally through cash-intensive businesses such as <a href="https://edition.cnn.com/2025/11/18/us/chinese-gambling-wynn-casinos-cash-middlemen-invs-vis">casinos</a> and <a href="https://www.jdsupra.com/legalnews/how-chinese-money-laundering-networks-6166410/">massage parlors</a>. These funds pass between <a href="https://home.treasury.gov/news/press-releases/sb0231">shell companies</a> and nominee entities through multiple transactions that obscure their origin.</p></li></ul><ul><li><p>U.S.-based brokers then <a href="https://www.fincen.gov/system/files/2025-08/4000-10-INV-144549-S3F6L-FTA-CMLN-508.pdf">pay Chinese clients</a> in dollars and dollar-denominated assets using laundered funds, thus satisfying their need for offshore funds.</p></li></ul><ul><li><p>Simultaneously, China-side brokers settle the other half of the swap by using renminbi pools &#8211; paid in by Chinese clients seeking capital flight &#8211; to generate export credits or payments for cartel-linked importers in Mexico.</p></li></ul><p>In this arrangement, value moves, but no formal cross-border transfer ever occurs. Because the literature tends to isolate individual pieces, the full architecture is best understood through a three-tiered framework that traces how elite wealth in China becomes operational fuel for fentanyl networks in Mexico and the United States.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!zTsj!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa85f6535-5ead-490b-95ec-49f3ece1c4df_1776x1002.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!zTsj!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa85f6535-5ead-490b-95ec-49f3ece1c4df_1776x1002.png 424w, https://substackcdn.com/image/fetch/$s_!zTsj!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa85f6535-5ead-490b-95ec-49f3ece1c4df_1776x1002.png 848w, https://substackcdn.com/image/fetch/$s_!zTsj!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa85f6535-5ead-490b-95ec-49f3ece1c4df_1776x1002.png 1272w, https://substackcdn.com/image/fetch/$s_!zTsj!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa85f6535-5ead-490b-95ec-49f3ece1c4df_1776x1002.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!zTsj!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa85f6535-5ead-490b-95ec-49f3ece1c4df_1776x1002.png" width="1456" height="821" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a85f6535-5ead-490b-95ec-49f3ece1c4df_1776x1002.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:821,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:214380,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.btl-research.com/i/182083325?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa85f6535-5ead-490b-95ec-49f3ece1c4df_1776x1002.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!zTsj!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa85f6535-5ead-490b-95ec-49f3ece1c4df_1776x1002.png 424w, https://substackcdn.com/image/fetch/$s_!zTsj!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa85f6535-5ead-490b-95ec-49f3ece1c4df_1776x1002.png 848w, https://substackcdn.com/image/fetch/$s_!zTsj!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa85f6535-5ead-490b-95ec-49f3ece1c4df_1776x1002.png 1272w, https://substackcdn.com/image/fetch/$s_!zTsj!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa85f6535-5ead-490b-95ec-49f3ece1c4df_1776x1002.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h4><em>Tier 1: Capital Flight Reservoirs in China</em></h4><p>The CMLN&#8211;cartel relationship begins inside China. For decades, the rise of the world&#8217;s largest <a href="https://www.icis.com/chemicals-and-the-economy/2025/02/chinas-property-crash-has-already-destroyed-18tn-of-household-wealth-where-next/">property bubble</a> created a demand for credit that state-owned banks could not satisfy, fueling the expansion of a vast, <a href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3485213&amp;utm">unregulated financial sector</a>. At the same time, strict <a href="https://www.china-briefing.com/doing-business-guide/china/taxation-and-accounting/transfer-pricing-and-foreign-currency-controls-in-china">capital controls</a> and political pressure drove elite Chinese households to move money offshore &#8211; a dynamic that intensified dramatically after the property bubble&#8217;s <a href="https://www.reuters.com/world/china/chinas-new-home-prices-fall-fastest-pace-11-months-2025-10-20/">2020 deflation</a>. The convergence of these forces produced enormous capital flight pressure, creating vast renminbi pools among China&#8217;s <a href="https://www.trmlabs.com/reports-and-whitepapers/shadow-bankers#:~:text=According%20to%20TRM%2C%20Chinese%20underground,as%20a%20global%20crime%20enabler.">underground financiers</a>, waiting to be converted into offshore dollars &#8211; a domestic imbalance upon which the entire CMLN system rests.</p><p>In this way, Beijing&#8217;s failure to regulate its property market not only inflated the bubble but also facilitated the rise of a pervasive parallel financial system.</p><h4><em>Tier 2 &#8211; CMLNs as Liquidity Infrastructure</em></h4><p>Tier 2 is where China&#8217;s internal capital-flight pressures are transformed into a global facilitation system. CMLNs sit at the operational middle of mirror-transfer swaps, which allow value to move offshore without ever crossing a border. Operating out of hubs such as <a href="https://www.justice.gov/archives/opa/pr/federal-indictment-alleges-alliance-between-sinaloa-cartel-and-money-launderers-linked">Los Angeles</a>; <a href="https://themobmuseum.org/blog/chinese-triads-launder-billions-through-vancouver-buying-luxury-real-estate-cars/">Vancouver</a>, British Columbia; and <a href="https://www.justice.gov/opa/pr/drug-trafficker-zhi-dong-zhang-aka-brother-wang-returned-mexico-face-international-narcotics">Mexico City</a>, brokers rely on loosely connected networks of cash-intensive front businesses to launder cartel bulk currency and convert it into clean dollars. Their China-side counterparts in Tier 1 settle the mirrored leg of the transfer using renminbi accumulated from elites seeking to offshore wealth, bypassing both China&#8217;s formal banking system and SWIFT entirely. Brokers use laundered cash <a href="https://www.wsj.com/finance/regulation/chinese-money-launders-are-moving-billions-through-u-s-banks-cf617283">ATM deposits</a>, and increasingly <a href="https://www.trmlabs.com/resources/blog/understanding-the-use-of-cryptocurrencies-by-cartels">stablecoins</a> and shell company <a href="https://www.dea.gov/press-releases/2025/05/01/three-members-prolific-chinese-money-laundering-organization-plead-guilty">real estate</a> purchases, to make Chinese clients whole in offshore dollars &#8211; often with the help of <a href="https://thehill.com/opinion/international/5491035-fentanyl-drug-trade-china/">Chinese students</a> enrolled in Western universities working on behalf of family members and associates back home.</p><p>For cartels, the same mechanism delivers renminbi-denominated purchasing power inside China. Early iterations relied partly on gray-market <em>daigou</em> arbitrage &#8211; purchasing <a href="https://finintegrity.org/laundering-luxury/">luxury goods</a> in the United States and reselling them inside China through informal retail channels &#8211; but this vector has been constrained by <a href="https://www.istitutomarangoni.com/en/maze35/industry/china-luxury-slowdown">slowing demand</a> and Beijing&#8217;s <a href="https://jingdaily.com/posts/the-price-of-duty-free-hainan-grapples-daigou-dilemma">crackdowns</a> to protect domestic consumption and control capital flows. Fortuitously for cartels, rising pressure among Chinese elites to move wealth offshore has created large renminbi reservoirs within the underground banking system, more than meeting the China-side obligations of the mirror-transfer process.</p><p>By servicing both Tier 1 Chinese clients and Tier 3 cartels, Tier 2 CMLNs collect enormous fees and have become the structural hinge of the entire system &#8211; the brokers who connect global criminal economies to the industrial and financial power of China.</p><h4><em>Tier 3 &#8211; Cartels as End Users</em></h4><p>Tier 3 is where cartels receive value from the system, not in renminbi itself but in the purchasing power it represents. By depositing bulk cash with Tier 2 brokers, cartels gain access to <a href="https://www.fincen.gov/system/files/2025-08/FinCEN-Advisory-CMLN-508.pdf">renminbi-denominated</a> value inside China&#8217;s commercial ecosystem, allowing them to <a href="https://www.nbclosangeles.com/news/local/mexican-cartels-chinese-nationals-los-angeles-launder-drug-money/3439504/">buy the inputs</a> that scale their operations &#8211; fentanyl precursors and pill presses to resell in North America for dirty cash and <a href="https://www.reuters.com/world/asia-pacific/special-report-burner-phones-banking-apps-meet-chinese-brokers-laundering-2020-12-03/">electronics</a> and other goods for clean liquidity. Trade-based money-laundering (TBML) pipelines and <a href="https://www.propublica.org/article/china-cartels-xizhi-li-money-laundering">front companies</a> provide the commercial cover that turns mirrored value into export credits and legitimate invoices. In effect, CMLNs give cartels a backdoor into China&#8217;s industrial economy, enabling them to convert drug proceeds into operational power, hard assets, and legitimacy that would otherwise be inaccessible.</p><p>Cartels are not the architects of this system, but they are destructive end users, empowered by a financial architecture built thousands of miles away and far beyond the reach of traditional enforcement.</p><h2><strong>Upstream Architecture vs. Downstream Effects</strong></h2><p>The choke point in this system is the CMLN operators at Tier 2 &#8211; brokers who convert, settle, and transport value across gray-market channels that long predate cartel involvement. North American banks and payment platforms are not willing participants; they are intrusion targets exploited through shell companies, falsified invoices, identity-laundering tactics, and mule accounts used to <a href="https://www.scotiabank.com/ca/en/personal/advice-plus/features/posts.money-mule-scams-are-gaining-in-popularity.html">obfuscate the origin</a> of illicit funds moving through them. Laundering occurs before funds interact with the formal financial system, which is why Tier 2 remains the operational center of gravity.</p><p>This is not the only global threat vector stemming from Chinese capital flight. Although the immediate focus here is the Americas, underground renminbi reservoirs in China anchor an entirely separate but structurally similar ecosystem across Southeast Asia&#8217;s scam compounds, gray-market gaming hubs, and illicit digital-finance corridors. There, too, a <a href="https://www.btl-research.com/p/the-liquidity-framework">three-tiered cascade</a> links onshore Chinese RMB pools to offshore facilitators and downstream criminal end users &#8211; a parallel architecture that mirrors the CMLN-cartel system. This broader pattern underscores the core point: China&#8217;s shadow-finance engine generates global liquidity structures whose downstream expressions differ by region but whose underlying mechanics remain consistent. These dynamics set the conditions for global threats to manifest.</p><p>Despite rising public attention on <a href="https://www.cnn.com/2025/08/18/americas/mexico-killings-sinaloa-cartel-kingpin-latam-intl">cartel violence</a> and <a href="https://www.who.int/news-room/fact-sheets/detail/opioid-overdose">fentanyl overdoses</a>, enforcement agencies and much of the media continue to misdiagnose the architecture behind cartel liquidity. Tier 2 CMLNs are still described as if they were auxiliary <a href="https://www.fincen.gov/news/news-releases/fincen-issues-advisory-and-financial-trend-analysis-chinese-money-laundering">cartel partners</a> or offshore laundering boutiques. In reality, they are the globalized expression of China&#8217;s internal financial disorder, and the cartels are simply the most dangerous beneficiaries of a system that predates them.</p><p>This misdiagnosis has consequences. Policy responses remain locked on downstream symptoms &#8211; bulk <a href="https://www.trmlabs.com/resources/blog/dea-and-federal-prosecutors-seize-5-5-million-in-usdt-linked-to-international-cartel-money-laundering-scheme">cash seizures</a>, courier networks, transactions structured to evade reporting thresholds, front companies &#8211; while the upstream liquidity cascade stemming from inside China regenerates unabated. Each high-profile enforcement win removes a node, but not the system. The architecture adapts, reroutes, and strengthens, precisely because the underlying demand signal does not come from cartels at all.</p><p>Four factors become impossible to ignore:</p><ul><li><p><strong>Chinese elites are the primary liquidity source</strong>, driving the demand for offshore dollars that fuels CMLN operations. Cartel cash is a convenient supply, not the engine of the system.</p></li><li><p><strong>Cartel integration is opportunistic</strong>, not foundational. Cartels inserted themselves into a pre-existing outflow network designed for capital flight, not criminal finance, because it is more efficient than legacy laundering methods.</p></li><li><p><strong>Cartels are downstream clients</strong>. CMLN infrastructure does more than launder cartel cash &#8211; it supplies the purchasing power that underpins their business model, giving them access to industrial-scale chemical precursors and equipment inside China. With these synthetic drugs now far <a href="https://www.dw.com/en/in-latin-america-synthetic-drugs-becoming-more-popular-than-cocaine-and-marijuana/a-62633710#:~:text=Drug%20cartels%20in%20Latin%20America,for%2C%20like%20cocaine%20and%20marijuana.&amp;text=In%20early%20February%20this%20year,export%20for%20Mexican%20drug%20cartels.">more profitable</a> than cocaine or cannabis produced in the Americas, this dynamic risks shifting the operational center of gravity toward CMLNs themselves, much as it once shifted from <a href="https://www.cfr.org/backgrounder/mexicos-long-war-drugs-crime-and-cartels">Colombian cartels</a> as exporters to Mexican cartels as global distributors.</p></li><li><p><strong>Enforcement wins remain tactically impressive but strategically insufficient.</strong> Seizing accounts or shutting down front companies rarely touches the structural incentives that bind Chinese capital flight to cartel proceeds. The architecture is left intact, and the system improves through adaptation.</p></li></ul><p>The strategic blind spot is not a lack of enforcement capacity. It is the persistent belief that cartel laundering is a cartel-led enterprise, when in fact the cartels are downstream actors plugged into an ecosystem shaped by a much larger set of financial pressures. Until policymakers treat CMLNs as part of a global capital-flight infrastructure &#8211; not a narco-adjacent novelty &#8211; the enduring three-tiered cascade will continue to reproduce itself faster than it can be disrupted.</p><h2><strong>Strategic Implications</strong></h2><p>What emerges from this architecture is not a cartel-finance anomaly but another iteration of an emerging global liquidity order. An interconnected and globalized ecosystem of tech-enabled shadow banks, cryptocurrency intermediaries, and laundering networks &#8211; operating across mainland China, Hong Kong, and the Americas &#8211; now functions as an informal central bank for illicit and gray-market capital. Their balance sheets are vast, opaque, and fed by the constant demand for offshore dollars among wealthy elites under tight capital controls.</p><p>China&#8217;s domestic weakness is the system&#8217;s strength. As long as elite capital-flight pressures persist, CMLNs will remain stable, adaptive, and indispensable. Because renminbi pools inside China feed multiple downstream economies &#8211; militant-backed <a href="https://newlinesinstitute.org/state-resilience-fragility/chinese-shadow-liquidity-and-the-scam-economy/">scam compounds</a> in Southeast Asia and <a href="https://www.btl-research.com/p/mexican-cartels-how-the-worlds-most">militarized drug cartels</a> in the Americas &#8211; the threat becomes increasingly globalized.</p><p>For Beijing, CMLN mirror transfers represent a deeply problematic, structurally persistent, and critically under examined vector of <a href="https://www.cnbc.com/2025/10/03/foreign-investors-eye-chinese-tech-again-but-capital-controls-policy-risks-weigh.html">capital flight</a>. Although renminbi never formally leaves the country, the <em>value</em> of that money exits China through offshore dollar pools controlled by brokers. Exporters are paid in renminbi with no dollars entering the Chinese banking system, depriving the state of foreign-currency inflows and undermining capital-control integrity. The result is a silent erosion of China&#8217;s foreign exchange management architecture &#8211; a slow hollowing-out effect similar to other forms of elite capital exfiltration, but with even higher opacity and fewer policy levers available for Beijing to control.</p><p>For North America, the implications are severe. CMLNs form the financial spine of a system that channels cartel drug proceeds into the offshore renminbi pools used by Chinese elites seeking dollar access. This fusion of cartel cash and capital-flight demand pushes billions of dollars into Western real estate, luxury assets, and private-market vehicles &#8211; particularly in <a href="https://www.canadianfinancialcrimeacademy.ca/financial-crime-articles/money-laundering-in-canadas-real-estate-sector-ongoing-risks-and-reform-efforts">Canada</a> and key <a href="https://www.npr.org/2024/03/21/1239854106/how-the-chinese-mafia-came-to-control-much-of-the-illicit-marijuana-trade-in-the">U.S. cities</a> &#8211; at a time of record unaffordability. The same liquidity architecture that fuels fentanyl-linked deaths in the United States and Canada, and enables escalating <a href="https://www.visionofhumanity.org/organised-crime-and-institutional-deterioration-mexicos-challenges-in-2025">cartel violence</a> in Mexico, also accelerates opaque trans-Pacific capital inflows that distort markets and weaken financial governance.</p><p>For enforcement agencies, the asymmetry is structural. Downstream interventions, no matter how aggressive, cannot meaningfully disrupt a system whose incentives are upstream and whose architecture is distributed. The persistent enforcement gap is not a failure of policing but a failure of framing: the problem is liquidity infrastructure, not individual criminal actors.</p><h2><strong>Moving Beyond Human Enforcement Capacity</strong></h2><p>Technology has rewritten the physics of money. What once required suitcases, offshore accounts, and months of coordination can now move through encrypted chats, offshore OTC desks, and digital payment platforms in minutes. Liquidity has slipped out of state control and into networks never meant to wield it, producing a technologically accelerated destabilization that can only be countered with tools operating on the same scale.</p><p>Criminal actors grasped this new paradigm before policymakers could react. Bulk cash, once a liability, can now be converted into purchasing power inside China through networks that merge capital flight with cartel liquidity needs. What appears to be a laundering service is, in fact, shared financial infrastructure.</p><p>Chinese money-laundering networks sit at the center of that infrastructure. They are not peripheral fixers but the architecture linking China&#8217;s internal financial pressures to the expansion of cartel power. They endure because the incentives that produced them remain intact, and because enforcement continues to target the edges rather than the structure itself.</p><p>At the structure&#8217;s core is liquidity. The ability to move value faster than states can detect has become a force of sovereignty &#8211; determining who can project power, absorb shocks, outlast pressure, and operate within the blind spots of the global system. Cartels did not defeat states through ideology or insurgency, but by mastering liquidity, building a financial nervous system more adaptive than the one meant to contain them.</p><p>Until CMLNs are recognized not as peripheral laundering boutiques but as the infrastructure of a new liquidity order, the gap between state capacity and illicit capability will only widen. At this point, the limits of human enforcement become unavoidable. Task forces can seize cash, shutter front companies, and arrest intermediaries &#8211; but humans can only see snapshots of a system that evolves in real time. A liquidity network built on mirror swaps, diaspora brokers, synthetic trade chains, and offshore renminbi reservoirs cannot be mapped manually. Its architecture is too distributed, too adaptive, too fast.</p><p>The shift on the enforcement side has already begun. As recent analysis shows, blockchain-analytics firms and financial-intelligence units are quietly layering <a href="https://gnet-research.org/2025/10/24/closing-the-enforcement-gap-ai-illicit-liquidity-and-the-next-phase-of-counter-terrorist-finance/">machine-learning models</a> into their detection systems &#8211; clustering wallets, mapping laundering networks, and identifying anomalies across stablecoin flows, escrow logs, and commercial-invoice patterns. These are prototype architecture-level tools, the first enforcement systems designed not to chase criminals but to map the infrastructure that makes crime possible. The most advanced of these models already operates across jurisdictions and asset classes, revealing relationships that traditional investigative methods could never uncover.</p><p>Artificial intelligence is not an adjunct to enforcement; it is the first form of enforcement capable of operating upstream. Only systems that learn as quickly as the networks they track can identify the structure beneath the transactions &#8211; the neural architecture of shadow liquidity itself. In a world where liquidity behaves like a distributed neural network, enforcement will require its own neural network in response, guided by humans who can see the system at a structural level.</p><p>This is not futurism. It is the logical extension of the world we already inhabit. The liquidity order described above will not be disrupted by more seizures, more arrests, or more border checks. It will only be countered by humans wielding tools capable of recognizing the system for what it is: distributed, multilayered, resilient, and evolving faster than traditional governance can respond.</p>]]></content:encoded></item><item><title><![CDATA[Australian Watchdog Sounds Alarm on Illicit Financial Networks]]></title><description><![CDATA[The promise of frictionless money has matured into something far more consequential: a liquidity system powerful enough to reorder economies, and elusive enough to escape the laws meant to govern it.]]></description><link>https://www.btl-research.com/p/australian-watchdog-sounds-alarm</link><guid isPermaLink="false">https://www.btl-research.com/p/australian-watchdog-sounds-alarm</guid><dc:creator><![CDATA[Adam Rousselle]]></dc:creator><pubDate>Mon, 15 Dec 2025 13:32:26 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!FZyx!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5bc28de2-62ee-4176-b3c9-cc91a100fce8_1892x1041.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!FZyx!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5bc28de2-62ee-4176-b3c9-cc91a100fce8_1892x1041.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!FZyx!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5bc28de2-62ee-4176-b3c9-cc91a100fce8_1892x1041.jpeg 424w, https://substackcdn.com/image/fetch/$s_!FZyx!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5bc28de2-62ee-4176-b3c9-cc91a100fce8_1892x1041.jpeg 848w, https://substackcdn.com/image/fetch/$s_!FZyx!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5bc28de2-62ee-4176-b3c9-cc91a100fce8_1892x1041.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!FZyx!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5bc28de2-62ee-4176-b3c9-cc91a100fce8_1892x1041.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!FZyx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5bc28de2-62ee-4176-b3c9-cc91a100fce8_1892x1041.jpeg" width="1456" height="801" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5bc28de2-62ee-4176-b3c9-cc91a100fce8_1892x1041.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:801,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:285975,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.btl-research.com/i/181682728?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5bc28de2-62ee-4176-b3c9-cc91a100fce8_1892x1041.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!FZyx!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5bc28de2-62ee-4176-b3c9-cc91a100fce8_1892x1041.jpeg 424w, https://substackcdn.com/image/fetch/$s_!FZyx!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5bc28de2-62ee-4176-b3c9-cc91a100fce8_1892x1041.jpeg 848w, https://substackcdn.com/image/fetch/$s_!FZyx!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5bc28de2-62ee-4176-b3c9-cc91a100fce8_1892x1041.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!FZyx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5bc28de2-62ee-4176-b3c9-cc91a100fce8_1892x1041.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!FOdi!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31d0ba57-67fb-47fa-9d8c-4a13e6aae7c4_354x83.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!FOdi!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31d0ba57-67fb-47fa-9d8c-4a13e6aae7c4_354x83.png 424w, https://substackcdn.com/image/fetch/$s_!FOdi!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31d0ba57-67fb-47fa-9d8c-4a13e6aae7c4_354x83.png 848w, https://substackcdn.com/image/fetch/$s_!FOdi!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31d0ba57-67fb-47fa-9d8c-4a13e6aae7c4_354x83.png 1272w, https://substackcdn.com/image/fetch/$s_!FOdi!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31d0ba57-67fb-47fa-9d8c-4a13e6aae7c4_354x83.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!FOdi!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31d0ba57-67fb-47fa-9d8c-4a13e6aae7c4_354x83.png" width="354" height="83" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/31d0ba57-67fb-47fa-9d8c-4a13e6aae7c4_354x83.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:83,&quot;width&quot;:354,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!FOdi!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31d0ba57-67fb-47fa-9d8c-4a13e6aae7c4_354x83.png 424w, https://substackcdn.com/image/fetch/$s_!FOdi!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31d0ba57-67fb-47fa-9d8c-4a13e6aae7c4_354x83.png 848w, https://substackcdn.com/image/fetch/$s_!FOdi!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31d0ba57-67fb-47fa-9d8c-4a13e6aae7c4_354x83.png 1272w, https://substackcdn.com/image/fetch/$s_!FOdi!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31d0ba57-67fb-47fa-9d8c-4a13e6aae7c4_354x83.png 1456w" sizes="100vw"></picture><div></div></div></a></figure></div><p><em>This is an article I recently wrote for The Diplomat with the help of Brett Erickson - who aided immensely in reaching out to and interviewing the AUSTRAC CEO Brendan Thomas. You can find the original link <a href="https://thediplomat.com/2025/12/australian-watchdog-sounds-alarm-on-illicit-financial-networks/">here</a>. </em></p><p>Australia&#8217;s top financial-crime official has sounded the alarm on the worrying transformation of his country&#8217;s economy. Behind the rhetoric of fintech innovation lies an expanding shadow liquidity network linking Canberra&#8217;s financial sector to the grey market capital circuits of Asia and Latin America &#8211; a system now testing the limits of regulatory sovereignty itself.</p><p>What began as a permissive environment for digital experimentation has quietly evolved into a regional clearinghouse for unregulated money.</p><p>&#8220;Digital-currency transactions are major financial-crime risks in Australia,&#8221; said Brendan Thomas, chief executive of the Australian Transaction Reports and Analysis Centre (AUSTRAC). &#8220;We currently have around 450 digital-currency exchanges and a sector characterized by rapid growth and very poor AML [Anti-Money Laundering] compliance.&#8221;</p><p>Today, Australia has hundreds of registered <a href="https://www.austrac.gov.au/sites/default/files/2024-07/2024%20AUSTRAC%20Money%20Laundering%20NRA.pdf?utm_source=chatgpt.com">digital-currency exchanges</a> and crypto-related operators, many of which, regulators say, are at increasing risk of exploitation for money laundering, scams and fraud, offering the potential for large value flows between criminal syndicates, grey market actors, and legitimate institutions. Stablecoins and over-the-counter (OTC) desks offer frictionless dollar exposure to actors evading capital controls and sanctions, while trade-based laundering networks now tie Sydney and Melbourne directly to illicit and semi-licit actors across Latin America, Hong Kong, and Southeast Asia.</p><p>This architecture hides in plain sight. Crypto exchanges double as proxy banks for offshore wealth; illicit proceeds from online fraud and cartel operations mingle with speculative inflows; and regulators struggle to distinguish legitimate liquidity from laundered funds. What appears to be fragmented compliance failure is, in fact, the emergence of a parallel financial infrastructure &#8211; one eroding the boundary between licit and illicit capital and exposing Australia to systemic risk on a global scale.</p><p>The evidence of that erosion is already visible. The same digital corridors that once promised innovation now facilitate narcotics finance, illicit tobacco syndicates, and Southeast Asian scam networks. In the space of a decade, the promise of frictionless money has matured into something far more consequential: a liquidity system powerful enough to reorder economies, and elusive enough to escape the laws meant to govern it.</p><h2><strong>Drugs, Cigarettes, and Digital Liquidity</strong></h2><p>Australia is more flush with illicit substances than ever before. A recent study by the Australian Criminal Intelligence Commission (ACIC) found that <a href="https://www.aljazeera.com/news/2025/8/15/australia-finds-record-meth-cocaine-heroin-use-in-wastewater-analysis">Australians consumed</a> over 22 tonnes of methamphetamine, cocaine, and MDMA between August 2023 and August 2024, up 34 percent compared to the previous year&#8217;s findings. These drugs had an estimated combined street value of US$7.5 billion &#8211; making Australia a high-value market for global drug cartels. Meanwhile, Australia&#8217;s record high tobacco excise has created an <a href="https://www.tobaccoasia.com/news/australia%E2%80%99s-tobacco-black-market-surges/">unprecedented surge</a> in demand for underground alternatives, with industry data finding that illegal tobacco sales account for 64 percent of total consumption and 82 percent of total nicotine use.</p><p>Mexico&#8217;s Sinaloa and Jalisco New Generation (CJNG) cartels have become central suppliers in this ecosystem, embedding themselves through high-volume methamphetamine and cocaine routes that link Latin American production hubs to Australia&#8217;s premium end-market.</p><p>&#8220;Australians pay quite high prices globally for drugs&#8230; there is an increasing cocaine problem, especially in Sydney. This indicates significant supply links with cartels in South America, possibly linked through Asian-based money-laundering organizations,&#8221; said Thomas.</p><p>Indeed, <a href="https://www.acic.gov.au/sites/default/files/2023-08/submission_-_australias_illicit_drug_problem_challenges_and_opportunities_for_law_enforcement.pdf?utm_source=chatgpt.com">significant overlap</a> exists between cartel operations and entrenched Chinese and Southeast Asian syndicates that dominate the region&#8217;s chemical precursors, laundering networks, and scam-derived liquidity &#8211; suggesting that cartel drug profits blend with these systems before being injected into Australia&#8217;s capital markets at &#8220;clean&#8221; investments. AUSTRAC has previously noted how laundered funds often intersect with Australia&#8217;s high value <a href="https://www.reiq.com/articles/agency-practice/real-estate-a-prime-target-for-money-laundering">property market</a>, contributing to <a href="https://www.abc.net.au/news/2025-11-02/real-estate-property-market-first-home-buyers-schemes/105941822">unaffordable prices</a> for citizens across the country.</p><p>These growing illicit trades have facilitated the rise of an illegitimate financial ecosystem to service them.</p><p>&#8220;The narcotics and underground tobacco trades trade are the largest drivers of illicit finance in this country,&#8221; said Thomas. He also noted that important role digital currencies play in this financial system. &#8220;We have a (digital currency) market that isn&#8217;t regulated prudentially and therefore exposed to significant risk,&#8221; he added.</p><p>Thomas also noted that these illicit trades are not distinct criminal issues, but symptomatic of a maturing underground financial system.</p><p>&#8220;We believe the illicit tobacco and narcotics markets are controlled by the same entities,&#8221; he said.</p><p>Recent cases already show how digital currencies underpin the same financial circuits that move narcotics and illicit tobacco profits in Australia. In August 2021, Victoria Police seized AU$8.5 million in cryptocurrency from an online drug syndicate &#8212; the largest <a href="https://www.9news.com.au/national/victoria-police-seize-85m-in-cryptocurrency-from-dark-web-drug-syndicate/403f229c-6f3b-47ec-a7cd-a681068bd465?utm_source=chatgpt.com">crypto-asset seizure</a> in Australian history at the time &#8212; while AUSTRAC later documented a 2022 conviction in which an offender <a href="https://www.trmlabs.com/resources/blog/crypto-related-crime-in-australia-what-court-records-tell-us-and-what-lies-ahead">used cryptocurrency</a> to purchase, import, and resell illicit drugs via dark-web markets.</p><p>What emerges is a hybrid criminal order: a system in which Latin American supply chains, Asian liquidity networks, and Australian demand converge into a single adaptive organism that mirrors the complexity of the licit economy while feeding off its infrastructure. Illicit proceeds move through offshore businesses and digital corridors before re-entering legitimate markets as investment capital. These convergent flows inflate asset prices &#8212; from <a href="https://www.austrac.gov.au/sites/default/files/2024-07/2024_Impact_of_money_laundering_and_terrorism_financing.pdf">property to logistics</a> &#8211; and distort <a href="https://www.austrac.gov.au/sites/default/files/2024-07/2024%20AUSTRAC%20Money%20Laundering%20NRA.pdf">trade data</a> once seen as reliable economic indicators.</p><p>The boundary between organized crime and legitimate enterprise is dissolving. What appears to be foreign investment may conceal criminal liquidity seeking legitimacy &#8211; embedding transnational finance and organized crime within the same bloodstream of the Australian economy.</p><p>This financial metabolism doesn&#8217;t end with narcotics. The same infrastructure now powers the region&#8217;s fastest-growing criminal enterprise: Southeast Asian scam centers.</p><h2><strong>On Australia&#8217;s Doorstep: Scam Centers and Massive Capital Outflows</strong></h2><p>Australia stands at the geographic doorstep of one of the world&#8217;s most pressing financial and humanitarian disasters: the vast Southeast Asian scam-industrial complex. As detailed in Rousselle&#8217;s recent article for The New Lines Institute, these compounds form part of a <a href="https://newlinesinstitute.org/state-resilience-fragility/chinese-shadow-liquidity-and-the-scam-economy/">broader ecosystem</a> primarily driven by Chinese organized crime &#8211; often state-linked &#8211; and built on capital outflows from China and neighboring economies. In countries such as Cambodia, Laos, Myanmar, and others, illicit and semi-licit funds are recycled through offshore financial hubs, cryptocurrencies, and digital payment infrastructure.</p><p>What began as a fringe phenomenon tied to telecom fraud and online gambling has evolved into a region-wide industry generating tens of billions of dollars annually, intertwined with human trafficking, narcotics proceeds, state-aligned shell corporations, and even <a href="https://smallwarsjournal.com/2025/07/24/illicit-liquidity-as-battlespace-rethinking-finance-in-asymmetric-conflict/">armed militants</a> and designated terror groups such as the Houthis.</p><p>Australia&#8217;s exposure to this ecosystem is twofold: as a lucrative victim market and as a destination for laundered funds. In 2024 alone, Australians reported nearly 495,000 scam incidents and losses exceeding AU$2 billion, according to the Australian National Anti-Scam Centre (NASC). These are not isolated acts of cybercrime but components of a regional financial system that drains consumer capital from high-income economies and reintroduces it into legitimate sectors via offshore layering and crypto-enabled laundering.</p><p>&#8220;We see crypto used as a source of major narcotic transaction and the source of much scam activity. The scam centers operating in South East Asia are also a major laundering risk for the Australian economy,&#8221; Thomas observed.</p><p>Australia&#8217;s role in this shadow network extends beyond consumer losses. The same digital corridors that move narcotics profits and scam proceeds now intersect with domestic financial infrastructure. As Thomas warned, &#8220;These illicit funds are entering the legitimate economy in a number of places and we need coordinated effort to shut that out. We also need coordination to stop the flow of recruitment of people into these centers and block their labor supply &#8211; targeting those human trafficking networks would be of great benefit.&#8221;</p><p>The nexus between financial exploitation and forced labor underscores the human cost of this liquidity system: victims in Australia are connected, through layers of deception and capital transfer, to victims across Southeast Asia whose exploitation sustains the machinery of fraud.</p><p>From Cambodia&#8217;s scam compounds to Australia&#8217;s financial sector, the circuit is closed by liquidity &#8211; money stripped of origin, nationality, and moral judgement. What appears as digital crime at the consumer level is, in practice, an extension of the same transnational financial order that Rousselle described: a shadow ecosystem born of unchecked capital outflows, institutional capture, and the global failure to distinguish dirty liquidity from economic vitality.</p><h2><strong>Coordination, Capacity, and the Enforcement Gap</strong></h2><p>Australia&#8217;s current regulatory architecture was built for an earlier generation of financial crime. The country&#8217;s first AML/CTF framework &#8211; <a href="https://www.qls.com.au/news-media-advocacy/history-of-aml-in-australia">Tranche 1</a>, enacted under the Anti-Money Laundering and Counter-Terrorism Financing Act 2006 and implemented in 2007 &#8211; was revolutionary at the time. It brought banks, remitters, casinos, and bullion dealers under AUSTRAC&#8217;s supervision, embedding risk-based compliance into the financial sector.</p><p>Yet nearly two decades later, that framework has atrophied. Successive governments have failed to deliver the long-promised Tranche 2 reforms that would extend AML/CTF obligations to lawyers, accountants, real-estate agents, and company service providers. These extensions are essential: although digital assets such as cryptocurrencies have been regulated since 2018, the professional intermediaries who help conceal these flows remain largely outside enforcement. Tranche 2 is designed to close that gap, but years of delay have allowed those channels to become the principal on-ramps for illicit digital capital.</p><p>The rollout of Tranche 2 &#8212; which would bring these professional facilitators under the AML/CTF compliance regime &#8212; has been repeatedly delayed amid <a href="https://www.austrac.gov.au/business/consultation-industry/second-public-consultation-new-amlctf-rules">prolonged consultation</a> and <a href="https://www.sanctions.io/blog/understanding-tranche-2-of-the-aml-ctf-reform">industry resistance</a>, creating structural blind spots that now serve as conduits for illicit liquidity. The result is a bifurcated system: highly regulated financial institutions on one side, and semi-formal professional networks on the other, precisely the spaces through which scam proceeds, narcotics profits, and offshore capital outflows can be re-routed into legitimate assets.</p><p>The current regulatory gap will not close until July 2026, when Tranche 2 entities are scheduled to come under full compliance. Until then, most are only beginning to familiarize themselves with their new AML/CTF obligations.</p><p>As Thomas noted, &#8220;They are understanding the law and their legal obligations but still don&#8217;t properly understand money laundering &#8211; how people actually do it through law firms and accounting practices in particular.&#8221;</p><p>AUSTRAC and partner agencies are now preparing extensive case studies to build that operational literacy, but the knowledge gap remains profound.</p><p>Australia&#8217;s enforcement landscape compounds the challenge. AUSTRAC, Australian Securities and Investment Commission (ASIC), the Australian Federal Police (AFP), and state police each bring essential capabilities to the country&#8217;s financial-crime architecture, yet their mandates often intersect across complex and rapidly evolving typologies. Coordination has improved through initiatives such as the Fintel Alliance, but information sharing remains largely case-driven rather than systemic. The protracted rollout of Tranche 2 represents a strategic vulnerability, leaving key professional channels open to exploitation in the meantime.</p><p>When the reforms finally take effect in mid-2026, they will bring long-excluded gatekeepers into the AML/CTF regime and expand the country&#8217;s capacity to trace illicit flows through professional channels that have so far escaped scrutiny. But timing is everything. Every month of delay allows shadow liquidity to entrench itself further within Australia&#8217;s legitimate economy, laundered through legal practices, escrow accounts, property holdings, and offshore intermediaries. The effectiveness of Tranche 2 will depend not only on its legislation, but on whether the institutions charged with enforcing it can move from static compliance to dynamic intelligence, matching the speed and adaptability of the networks they seek to contain.</p><h2><strong>Conclusion</strong></h2><p>Blockchain analytics and AI-assisted transaction mapping have <a href="https://gnet-research.org/2025/10/24/closing-the-enforcement-gap-ai-illicit-liquidity-and-the-next-phase-of-counter-terrorist-finance/">stripped away</a> much of the mystery that once surrounded digitized illicit finance. The problem is no longer invisibility but inertia. Regulators and enforcement agencies now possess unprecedented data on cross-border fund movements, stable-coin settlements, and the interlocking wallets and shell entities that sustain shadow liquidity. The question is whether they can move fast enough to act on it.</p><p>Other jurisdictions already are. Europe&#8217;s MiCA framework, Hong Kong&#8217;s virtual-asset licensing regime, and the proposed U.S. GENIUS Act each signal a shift from reactive compliance to proactive financial-infrastructure defense. By contrast, Australia&#8217;s reforms remain stalled between consultation papers and industry pushback. Every month of delay leaves the country more deeply embedded in the regional circuits of criminal capital that its own analytics can now trace in real time.</p><p>Australia&#8217;s challenge is therefore strategic, not technical. The data exist; the patterns are visible. What remains undecided is whether the nation will use its visibility to close the enforcement gap &#8211; or continue to serve as the Indo-Pacific&#8217;s liquidity sink and laundering hub for offshore criminal finance.</p>]]></content:encoded></item><item><title><![CDATA[Podcast Interview: The China Global South Project]]></title><description><![CDATA[My latest appearance on the CGSP podcast to discuss illicit finance in Africa]]></description><link>https://www.btl-research.com/p/podcast-interview-the-china-global</link><guid isPermaLink="false">https://www.btl-research.com/p/podcast-interview-the-china-global</guid><dc:creator><![CDATA[Adam Rousselle]]></dc:creator><pubDate>Fri, 21 Nov 2025 19:10:33 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!UbeK!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8d322c73-ff1a-4979-81f8-07dd6f6f0c90_1906x1084.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>I recently appeared on the China Global South Project (CGSP) podcast, where I discussed my <a href="https://www.btl-research.com/p/illicit-prc-linked-finance-enables">recent article</a> for the Jamestown China Brief. There was much to unpack as that article was very dense and meant to spark exactly this sort of conversation. <br><br>Thanks to Geroud and the rest of the team at CGSP for reaching out.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!UbeK!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8d322c73-ff1a-4979-81f8-07dd6f6f0c90_1906x1084.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!UbeK!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8d322c73-ff1a-4979-81f8-07dd6f6f0c90_1906x1084.png 424w, https://substackcdn.com/image/fetch/$s_!UbeK!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8d322c73-ff1a-4979-81f8-07dd6f6f0c90_1906x1084.png 848w, https://substackcdn.com/image/fetch/$s_!UbeK!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8d322c73-ff1a-4979-81f8-07dd6f6f0c90_1906x1084.png 1272w, https://substackcdn.com/image/fetch/$s_!UbeK!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8d322c73-ff1a-4979-81f8-07dd6f6f0c90_1906x1084.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!UbeK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8d322c73-ff1a-4979-81f8-07dd6f6f0c90_1906x1084.png" width="1456" height="828" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8d322c73-ff1a-4979-81f8-07dd6f6f0c90_1906x1084.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:828,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2892559,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.btl-research.com/i/179584109?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8d322c73-ff1a-4979-81f8-07dd6f6f0c90_1906x1084.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!UbeK!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8d322c73-ff1a-4979-81f8-07dd6f6f0c90_1906x1084.png 424w, https://substackcdn.com/image/fetch/$s_!UbeK!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8d322c73-ff1a-4979-81f8-07dd6f6f0c90_1906x1084.png 848w, https://substackcdn.com/image/fetch/$s_!UbeK!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8d322c73-ff1a-4979-81f8-07dd6f6f0c90_1906x1084.png 1272w, https://substackcdn.com/image/fetch/$s_!UbeK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8d322c73-ff1a-4979-81f8-07dd6f6f0c90_1906x1084.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div id="youtube2-eePUvmq2i9M" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;eePUvmq2i9M&quot;,&quot;startTime&quot;:&quot;2593s&quot;,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/eePUvmq2i9M?start=2593s&amp;rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div>]]></content:encoded></item><item><title><![CDATA[Illicit PRC-linked Finance Enables Arms Diversion in Africa]]></title><description><![CDATA[A recent piece I wrote as a follow up to an article I wrote for China Brief last year, which was cited in a U.S. Senate Report.]]></description><link>https://www.btl-research.com/p/illicit-prc-linked-finance-enables</link><guid isPermaLink="false">https://www.btl-research.com/p/illicit-prc-linked-finance-enables</guid><dc:creator><![CDATA[Adam Rousselle]]></dc:creator><pubDate>Fri, 31 Oct 2025 15:47:00 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!4fFZ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e2495e8-e13c-4228-acb6-875a21b79109_1024x1024.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!4fFZ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e2495e8-e13c-4228-acb6-875a21b79109_1024x1024.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!4fFZ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e2495e8-e13c-4228-acb6-875a21b79109_1024x1024.jpeg 424w, https://substackcdn.com/image/fetch/$s_!4fFZ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e2495e8-e13c-4228-acb6-875a21b79109_1024x1024.jpeg 848w, https://substackcdn.com/image/fetch/$s_!4fFZ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e2495e8-e13c-4228-acb6-875a21b79109_1024x1024.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!4fFZ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e2495e8-e13c-4228-acb6-875a21b79109_1024x1024.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!4fFZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e2495e8-e13c-4228-acb6-875a21b79109_1024x1024.jpeg" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6e2495e8-e13c-4228-acb6-875a21b79109_1024x1024.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!4fFZ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e2495e8-e13c-4228-acb6-875a21b79109_1024x1024.jpeg 424w, https://substackcdn.com/image/fetch/$s_!4fFZ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e2495e8-e13c-4228-acb6-875a21b79109_1024x1024.jpeg 848w, https://substackcdn.com/image/fetch/$s_!4fFZ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e2495e8-e13c-4228-acb6-875a21b79109_1024x1024.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!4fFZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e2495e8-e13c-4228-acb6-875a21b79109_1024x1024.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><a href="https://medium.com/war-is-boring/chinese-anti-aircraft-missiles-appear-in-south-sudan-ce7c4e99470f">Image source</a></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!KzSh!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9afd89fd-1ff4-4359-8c85-d3c8cf8a8842_6250x1875.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!KzSh!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9afd89fd-1ff4-4359-8c85-d3c8cf8a8842_6250x1875.png 424w, https://substackcdn.com/image/fetch/$s_!KzSh!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9afd89fd-1ff4-4359-8c85-d3c8cf8a8842_6250x1875.png 848w, https://substackcdn.com/image/fetch/$s_!KzSh!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9afd89fd-1ff4-4359-8c85-d3c8cf8a8842_6250x1875.png 1272w, https://substackcdn.com/image/fetch/$s_!KzSh!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9afd89fd-1ff4-4359-8c85-d3c8cf8a8842_6250x1875.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!KzSh!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9afd89fd-1ff4-4359-8c85-d3c8cf8a8842_6250x1875.png" width="1456" height="437" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9afd89fd-1ff4-4359-8c85-d3c8cf8a8842_6250x1875.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:437,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!KzSh!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9afd89fd-1ff4-4359-8c85-d3c8cf8a8842_6250x1875.png 424w, https://substackcdn.com/image/fetch/$s_!KzSh!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9afd89fd-1ff4-4359-8c85-d3c8cf8a8842_6250x1875.png 848w, https://substackcdn.com/image/fetch/$s_!KzSh!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9afd89fd-1ff4-4359-8c85-d3c8cf8a8842_6250x1875.png 1272w, https://substackcdn.com/image/fetch/$s_!KzSh!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9afd89fd-1ff4-4359-8c85-d3c8cf8a8842_6250x1875.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><blockquote><p><em>This is an article I recently published with the Jamestown Foundation China Brief Notes. It comes as a follow up to <a href="https://www.btl-research.com/p/prc-manufactured-weapons-abound-among">an article</a> I wrote for China Brief last year, which was cited in a 2025 report by the U.S. Senate Foreign Relations Committee. You can find the link to the latest article <a href="https://jamestown.org/program/illicit-prc-linked-finance-enables-arms-diversion-in-africa/">here</a>. </em></p></blockquote><h3><strong>Executive Summary:</strong></h3><ul><li><p>Judicial cases in the Democratic Republic of the Congo and in Nigeria confirm that citizens from the People&#8217;s Republic of China (PRC) are active in both resource extraction and digital offshore laundering networks, connecting illicit resource economies and stablecoin settlement into value chains that sustain conflict.</p></li><li><p>Gold, timber, and crypto flows move through the same corridors that carry PRC-manufactured weapons into embargoed zones. This integration creates a shadow liquidity system in which capital and material reinforce one another, allowing African militant economies to become self-financing and resilient to external pressure.</p></li><li><p>Existing regimes treat arms diversion and money laundering as separate issues. They are not. Addressing this challenge requires collapsing the divide between arms embargo enforcement and financial crime intelligence into a single operational continuum.</p></li></ul><div><hr></div><p>The circulation of weapons manufactured in the People&#8217;s Republic of China (PRC) has become an increasingly visible feature of African conflicts. Earlier research by this author traced how Chinese small arms and light weapons appear in the hands of militant groups across the continent, often in ways that reveal the fragility of existing control mechanisms (<a href="https://jamestown.org/program/prc-manufactured-weapons-abound-among-african-militant-groups/">China Brief</a>, November 1, 2024; <a href="https://www.foreign.senate.gov/imo/media/doc/abridged_china_report.pdf">U.S. Senate</a>, July 2025). That research underscored the scale of material leakage from licit trade into irregular markets. Since then, more evidence has come to light to suggest that the story does not end with the physical movement of arms.</p><p>Alongside weapons, Chinese illicit finance networks are spreading across Africa&#8217;s conflict zones and beyond. These networks have the capacity to enable militant actors to not only acquire weapons but also to sustain self-financing economies of violence and extraction. They tie the diversion of arms to capital flows that are deliberately routed through opaque offshore structures, informal value transfer systems, and state-aligned facilitators.</p><p>Illicit finance is not a peripheral concern. It is a structural enabler of militant economies and arms transfers. Understanding the fusion of financial and material supply chains is therefore essential for grasping how African conflicts are evolving, and how external actors shape them.</p><h3><strong>Chinese Criminals Embedded in Conflict Economies</strong></h3><p>In January, a court in Bukavu, a war-torn community in the eastern Democratic Republic of the Congo, handed down a rare and decisive judgment against three PRC nationals involved in illicit extractive activity. The defendants were convicted for operating illegal mining concessions and laundering proceeds through both cash and precious metals (<a href="https://www.scmp.com/news/world/africa/article/3294788/3-chinese-citizens-sentenced-7-years-illegal-mining-dr-congo">South China Morning Post [SCMP]</a>, January 15). Authorities seized more than $400,000 in hard currency alongside a quantity of gold bars, establishing a direct evidentiary trail from resource extraction to illicit financial flows (<a href="https://centralnews.co.za/dr-congo-sentences-chinese-nationals-to-seven-years-for-illegal-mining-activities/">Central News</a>, January 16). Because this conviction was adjudicated in court, it created a judicially verified record of PRC actors engaging in illicit commerce within a conflict zone. The absence of PRC media coverage of this case is telling.</p><p>The defendants did not operate in a vacuum. The PRC maintains a visible commercial footprint across eastern Congo&#8217;s extractives economy, including Chinese-owned buying houses, traders, and small-scale gold operations in war-torn South Kivu (<a href="https://www.ecofinagency.com/mining/3012-46281-africas-mining-nations-stand-against-illegal-chinese-miners">ECOFIN</a>, December 30, 2024). PRC state media has even warned PRC nationals of the legal and security risks of doing such business in the war-torn region, explicitly mentioning mining activities (<a href="http://www.news.cn/world/20250728/c5c99a670034454c92f1a536f3e59173/c.html">Xinhua</a>; <a href="http://www.news.cn/world/20250728/c5c99a670034454c92f1a536f3e59173/c.html">Consular Express WeChat Official Account</a>, July 28). Congolese officials and local communities have repeatedly objected to illicit practices attributed to Chinese operators (<a href="https://acp.cd/province/sud-kivu-lexploitation-anarchique-et-illegale-des-minerais-a-ngando-mwenga-denoncee/">ACP</a>, November 15; <a href="https://www.radiookapi.net/2025/01/08/emissions/dialogue-entre-congolais/exploitation-illegale-des-minerais-au-sud-kivu">Radio Okapi</a>, August 8).</p><p>The Bukavu convictions confirm that Chinese illicit financiers are present inside eastern Congo&#8217;s conflict zones. A panel of UN experts reported to the press that minerals extracted from areas in eastern Congo controlled by the Congolese Rwandan-backed rebel paramilitary group M23 are being smuggled through Rwanda and Uganda before entering global markets (<a href="https://www.africanews.com/2024/10/01/m23-rebel-group-generates-approximately-300000-a-month-from-mining-un/">AfricaNews</a>, January 10; <a href="https://www.aljazeera.com/news/2025/7/18/un-experts-cast-blame-on-rwanda-and-uganda-what-are-they-doing-in-drc">Al-Jazeera</a>, July 18). At the same time, M23 rebels have been documented with significant stocks of PRC-manufactured weapons and equipment, consistent with supply via their Rwandan and Ugandan backers (<a href="https://jamestown.org/program/prc-manufactured-weapons-abound-among-african-militant-groups/">China Brief</a>, November 1, 2024). The PRC is the world&#8217;s dominant processor of the ore coltan, gold, and other Congolese exports, and both Rwanda and Uganda ship far more of these minerals than they produce (<a href="https://enact-africa.s3.amazonaws.com/site/uploads/2022-05-03-research-paper-29-rev.pdf?">Enact</a>, May 3, 2022; <a href="https://pdf.dfcfw.com/pdf/H3_AP202304241585731241_1.pdf?">Haitong</a>, April 23, 2023; <a href="https://xyfz.ajcass.com/UploadFile/Issue/202111080001/2024/3/20240311061440WU_FILE_0.pdf?">CASS West Asia and Africa Research Institute</a>, March 2024; <a href="https://allafrica.com/stories/202412180293.html">AllAfrica</a>, December 18, 2024). Taken together, these facts make PRC end-use not speculative but structurally inevitable: illicit finance on the ground, smuggling through neighbors, and end-user demand in the PRC form a single chain that helps sustain this conflict economy.</p><p>These dynamics are not confined to eastern Congo. Across Africa, PRC nationals are embedded in commodity corridors that move value and provide logistics. In 2022, roughly 435 tonnes of gold were smuggled out of Africa, 93 percent of it bound for the United Arab Emirates (UAE), with PRC buyers active at both ends of the chain (<a href="https://www.scmp.com/business/commodities/article/3241706/going-gold-hong-kong-ousts-dubai-biggest-hub-russian-bullion-trade?">SCMP</a>, November 16, 2023; <a href="https://www.swissaid.ch/en/articles/on-the-trail-of-african-gold/">Swissaid</a>, May 30, 2024; <a href="https://www.theafricareport.com/365790/east-drc-plays-tough-with-chinese-gold-mining-firms/">Africa Report</a>, October 24, 2024). PRC-linked syndicates also dominate timber and rosewood exports from the Sahel, Central, and East Africa, often sourcing directly from insurgent-affected areas (<a href="https://www.afdb.org/sites/default/files/documents/publications/illicit_timber_trade_report.pdf?">African Development Bank</a>, 2021). These gold and timber corridors easily provide the financial and logistical backbone for broader illicit trade, establishing flows of capital and transport capacity that could be redirected toward arms procurement or militant financing.</p><h3><strong>Chinese Criminals Laundering Crypto</strong></h3><p>In July, a federal court in Lagos, Nigeria ordered the forfeiture of approximately 223,000 Tether ($223,000)&#8212;the U.S. dollar-pegged stablecoin&#8212;from two PRC nationals convicted of fraud and money laundering (<a href="https://www.efcc.gov.ng/efcc/news-and-information/news-release/11284-court-orders-final-forfeiture-of-222-729-86usdt-recovered-from-chinese-in-lagos">EFCC</a>, July 21). The case was notable not only for the scale of the seizure but also for its judicial confirmation that PRC nationals were operating through crypto networks in Nigeria. It followed an earlier wave of enforcement in December 2024, when Nigeria&#8217;s Economic and Financial Crimes Commission (EFCC) carried out mass raids that led to the arrest of 792 suspects. Among those implicated were 148 PRC nationals accused of participating in coordinated crypto fraud and laundering schemes (<a href="https://www.toutiao.com/article/7497859024205955594/?wid=1759163166644">Toutiao</a>, April 27; <a href="https://theafricanmirror.africa/news/massive-crackdown-nigeria-arrests-792-in-global-cybercrime-takedown/">African Mirror</a>, December 19, 2024). Together, these cases establish a pattern of sustained involvement by PRC nationals in illicit digital finance across West Africa.</p><p>The pattern is clear: PRC illicit finance networks have embedded themselves into West African stablecoin rails. These rails enable frictionless cross-border settlement that can be directed toward extractive rents, arms procurement, or conventional fraud. Stablecoin rails in West Africa now provide the same frictionless settlement capacity increasingly favored by PRC-linked financiers in Southeast Asia (<a href="https://finance.sina.com.cn/money/fund/jjzl/2025-05-26/doc-inexwtaz7803987.shtml">Sina Finance</a>, May 26). In effect, stablecoins have become a structural enabler of transnational illicit finance tied to PRC nationals, providing cross-border transfer capacities beyond the reach of current regulatory controls.</p><h3><strong>Weapons Trafficking Completes the Supply Chain</strong></h3><p>In May, Amnesty International verified the presence of PRC-manufactured weapons in both Khartoum and Darfur, despite a standing United Nations arms embargo on Sudan. The investigation traced the weapons&#8217; path through the UAE, confirming that PRC-manufactured weapons had been re-exported into an active conflict zone (<a href="https://www.amnesty.org/en/latest/news/2025/05/sudan-advanced-chinese-weaponry-provided-by-uae-identified-in-breach-of-arms-embargo-new-investigation/">Amnesty International</a>, May 8; <a href="https://www.scmp.com/news/world/africa/article/3309655/uae-supplying-sudan-paramilitaries-chinese-made-weapons-amnesty">SCMP</a>, May 9). The UAE&#8212;already identified as a primary destination for smuggled African gold and a key entrep&#244;t for trafficked resources such as timber and wildlife&#8212;is now linked to weapons leakage into embargoed territories. A 2023 report by the PRC&#8217;s Ministry of Commerce (MOFCOM) highlights the country&#8217;s central role as a commodity logistics hub, while international investigations document its function as a distribution point for illicit flows ultimately bound for the PRC (<a href="https://thesentry.org/wp-content/uploads/2021/02/ConflictGoldResponsibleGold-TheSentry-Feb2021.pdf">The Sentry</a>, February 2021; <a href="https://globalinitiative.net/wp-content/uploads/2022/12/Trade-and-transit-Dubais-role-in-illicit-environmental-supply-chains-GI-TOC-2022.pdf">GITOC</a>, December 2022; <a href="https://fdi.mofcom.gov.cn/resource/pdf/2025/01/23/0ffa413a929b484c97a0175831c30f2a.pdf">MOFCOM</a>, 2023).</p><p>Extractive commodities and arms flows are not separate streams but parts of a single transnational infrastructural system. Gold and timber exports provide the financial base, often routed through opaque networks tied to PRC buyers. Stablecoin rails in West Africa supply frictionless cross-border digital settlement, as increasingly favored by PRC-linked illicit financiers in Southeast Asia (<a href="https://finance.sina.com.cn/money/fund/jjzl/2025-05-26/doc-inexwtaz7803987.shtml">Sina Finance</a>, May 26). The re-export of weapons through commodity hubs completes the circuit, bringing material support back into conflict zones. The convergence is the critical risk: financial, logistical, and military flows run along the same corridors, reinforcing each other and expanding the resilience of militant economies.</p><p>This configuration functions as a shadow liquidity system. Value extracted from African resources is continuously re-expressed as kinetic capability, ensuring that liquidity itself becomes a weaponized asset class. Each transaction in this system, whether a gold shipment, stablecoin transfer, or weapons re-export, amplifies the others, producing a feedback loop that stabilizes illicit power structures where governance fails.</p><h3><strong>Conclusion</strong></h3><p>The evidence now available establishes that the illicit involvement of PRC nationals in African conflict economies is neither incidental nor peripheral. Judicial convictions in Bukavu and Lagos confirm the presence of criminal actors from the PRC engaged in both extractive laundering and stablecoin-based fraud, while reporting from Sudan illustrates how weapons manufactured in the PRC reappear in embargoed theaters.</p><p>These cases reveal a common pattern. Illicit finance and logistics linked to PRC nationals run through the same corridors that sustain militant supply chains. Gold, timber, digital assets, and arms move along overlapping routes, creating a resilient system in which capital and material flows reinforce one another.</p><p>Recognizing this convergence is essential. The challenge is not simply weapons leakage or financial opacity in isolation but the way disparate supply chains combine to strengthen insurgent and criminal economies. PRC end-user demand and facilitation give the system scale and durability, tying local extraction and digital laundering directly to global markets. Addressing this challenge requires collapsing the divide between arms embargo enforcement and financial crime intelligence; and treating both as elements of one integrated system.</p>]]></content:encoded></item><item><title><![CDATA[Closing the Enforcement Gap: AI, Illicit Liquidity, and the Next Phase of Counter-Terrorist Finance]]></title><description><![CDATA[This Insight is published to coincide with Global Media and Information Literacy Week to highlight positive interventionist technology tools in the P/CVE sphere.]]></description><link>https://www.btl-research.com/p/closing-the-enforcement-gap-ai-illicit</link><guid isPermaLink="false">https://www.btl-research.com/p/closing-the-enforcement-gap-ai-illicit</guid><dc:creator><![CDATA[Adam Rousselle]]></dc:creator><pubDate>Fri, 24 Oct 2025 16:35:45 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!s6Vd!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14aa2e06-0a97-4810-a2f7-157b4fc97881_2048x1155.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!L_Is!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!L_Is!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png 424w, https://substackcdn.com/image/fetch/$s_!L_Is!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png 848w, https://substackcdn.com/image/fetch/$s_!L_Is!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png 1272w, https://substackcdn.com/image/fetch/$s_!L_Is!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!L_Is!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png" width="676" height="188" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:188,&quot;width&quot;:676,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:32791,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:&quot;&quot;,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!L_Is!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png 424w, https://substackcdn.com/image/fetch/$s_!L_Is!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png 848w, https://substackcdn.com/image/fetch/$s_!L_Is!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png 1272w, https://substackcdn.com/image/fetch/$s_!L_Is!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a></figure></div><p><strong>This is an article I recently wrote for the Global Network of Extremism and Technology (GNET). You can find the original link <a href="https://gnet-research.org/2025/10/24/closing-the-enforcement-gap-ai-illicit-liquidity-and-the-next-phase-of-counter-terrorist-finance">here</a>.</strong></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!s6Vd!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14aa2e06-0a97-4810-a2f7-157b4fc97881_2048x1155.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!s6Vd!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14aa2e06-0a97-4810-a2f7-157b4fc97881_2048x1155.jpeg 424w, https://substackcdn.com/image/fetch/$s_!s6Vd!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14aa2e06-0a97-4810-a2f7-157b4fc97881_2048x1155.jpeg 848w, https://substackcdn.com/image/fetch/$s_!s6Vd!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14aa2e06-0a97-4810-a2f7-157b4fc97881_2048x1155.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!s6Vd!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14aa2e06-0a97-4810-a2f7-157b4fc97881_2048x1155.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!s6Vd!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14aa2e06-0a97-4810-a2f7-157b4fc97881_2048x1155.jpeg" width="1456" height="821" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/14aa2e06-0a97-4810-a2f7-157b4fc97881_2048x1155.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:821,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Blockchain Use Cases and Applications by Industry&#65372;Learn about Technology  with TDK&#65372;Bridging the Past, Present, and Future of Tech&#65372;Learn about  Technology with TDK&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Blockchain Use Cases and Applications by Industry&#65372;Learn about Technology  with TDK&#65372;Bridging the Past, Present, and Future of Tech&#65372;Learn about  Technology with TDK" title="Blockchain Use Cases and Applications by Industry&#65372;Learn about Technology  with TDK&#65372;Bridging the Past, Present, and Future of Tech&#65372;Learn about  Technology with TDK" srcset="https://substackcdn.com/image/fetch/$s_!s6Vd!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14aa2e06-0a97-4810-a2f7-157b4fc97881_2048x1155.jpeg 424w, https://substackcdn.com/image/fetch/$s_!s6Vd!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14aa2e06-0a97-4810-a2f7-157b4fc97881_2048x1155.jpeg 848w, https://substackcdn.com/image/fetch/$s_!s6Vd!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14aa2e06-0a97-4810-a2f7-157b4fc97881_2048x1155.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!s6Vd!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14aa2e06-0a97-4810-a2f7-157b4fc97881_2048x1155.jpeg 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Terrorist groups are increasingly using digital assets to <a href="https://gnet-research.org/2025/07/21/hezbollahs-latin-american-networks-stablecoins-smuggling-and-sanctions-evasion/">move money outside traditional financial oversight</a>. These same channels &#8211; blockchain networks, stablecoins, and encrypted apps &#8211; now underpin a wider illicit economy that spans cybercrime, sanctions evasion, and elite capital movement. Together, they form a shadow financial infrastructure that operates at a scale and velocity traditional enforcement cannot match.</p><p>As regulators struggle to keep pace, artificial intelligence (AI) is emerging as a force multiplier. From clustering wallets and detecting laundering networks to automating early detection, AI is transforming how investigators detect, map, and disrupt illicit flows. Yet technology alone cannot solve the problem. Effective countermeasures require human analysis and strategic framing &#8211; linking the rise of digital liquidity systems to the broader financial ecosystems that sustain both criminal and terrorist actors. This Insight will explore emerging regulatory and technological trends aimed at closing the global enforcement gap &#8211; showing how AI-enabled enforcement, systemic liquidity mapping, and multi-domain synthesis can shift counter-terrorist financing from reactive disruption toward proactive resilience.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!RC1x!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa6047bd7-8e75-425a-a750-0915c4489e2e_871x1030.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!RC1x!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa6047bd7-8e75-425a-a750-0915c4489e2e_871x1030.png 424w, https://substackcdn.com/image/fetch/$s_!RC1x!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa6047bd7-8e75-425a-a750-0915c4489e2e_871x1030.png 848w, https://substackcdn.com/image/fetch/$s_!RC1x!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa6047bd7-8e75-425a-a750-0915c4489e2e_871x1030.png 1272w, https://substackcdn.com/image/fetch/$s_!RC1x!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa6047bd7-8e75-425a-a750-0915c4489e2e_871x1030.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!RC1x!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa6047bd7-8e75-425a-a750-0915c4489e2e_871x1030.png" width="871" height="1030" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a6047bd7-8e75-425a-a750-0915c4489e2e_871x1030.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1030,&quot;width&quot;:871,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!RC1x!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa6047bd7-8e75-425a-a750-0915c4489e2e_871x1030.png 424w, https://substackcdn.com/image/fetch/$s_!RC1x!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa6047bd7-8e75-425a-a750-0915c4489e2e_871x1030.png 848w, https://substackcdn.com/image/fetch/$s_!RC1x!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa6047bd7-8e75-425a-a750-0915c4489e2e_871x1030.png 1272w, https://substackcdn.com/image/fetch/$s_!RC1x!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa6047bd7-8e75-425a-a750-0915c4489e2e_871x1030.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Figure 1: The three-tiered liquidity framework.</p><p><strong>Understanding the Problem: A Three-Tiered Approach</strong></p><p>The challenge today is not simply that terrorists seek money beyond <a href="https://www.rand.org/pubs/research_reports/RR3026.html">regulatory and enforcement</a> oversight, but that the methods they use to mobilise funds converge with a broader set of illicit and semi-licit flows. The rise of blockchain and <a href="https://link.springer.com/chapter/10.1007/978-3-031-59547-9_9">digital currency</a> ecosystems has provided bad actors with faster, cheaper, and less traceable means of moving value globally. These value transfer mechanisms, combined with <a href="https://ctc.westpoint.edu/the-digital-terror-financing-of-central-asian-jihadis">encrypted messaging</a> apps, offer the ability to move vast sums outside the global banking system, thus representing a structural alternative to it.</p><p>Terrorists are not alone. A much larger global criminal ecosystem &#8211; spanning cyber fraud, state-linked sanctions evasion, and elite capital flight &#8211; exploits the same digital corridors. On 14 October, U.S. <a href="https://www.chainalysis.com/blog/southeast-asia-crypto-scam-network-mining-pig-butchering-october-2025/">authorities seized</a> over $14 billion USD worth of Bitcoin tied to Cambodia-based and Hong Kong-registered Prince Group, which provided laundering services to Southeast Asia&#8217;s vast <a href="https://home.treasury.gov/news/press-releases/sb0278">cybercrime industrial complex</a>. It was the <a href="https://www.bbc.co.uk/news/articles/c70jw436n0yo">largest Bitcoin seizure</a> in history, underscoring the scope of these illicit systems. These systems represent a financial substrate where actors with varied goals and ideological motives can rely on the same facilitators, which become more pervasive with each transaction.</p><p>The three-tiered <a href="https://www.btl-research.com/p/the-liquidity-framework">liquidity framework</a> explains this new paradigm. At the top, Tier 1 captures elite flows &#8211; shadow banks, high-net-worth individuals, and state-adjacent funds that seed the system &#8211; generally manifesting as capital outflows, although at times taking the form of strategic inflows in <a href="https://home.treasury.gov/news/press-releases/jy1581#:~:text=WASHINGTON%20%E2%80%94%20Today%2C%20the%20Department%20of,Central%20African%20Republic%20and%20Mali.">specific contexts</a>. Tier 2 is the facilitation layer, comprising over-the-counter (OTC) brokers, underregulated exchanges, and laundering platforms that have grown from Tier 1 flows. These entities now rent their services to anyone with the means to access them. Tier 3 is where threats surface, as extremists and criminal groups exploit the same intermediaries to move money through unregulated corridors. By mapping this cascade, we see how funds that leave states at the top can ultimately end up financing terrorism and criminality at the bottom &#8211; with Tier 2 serving as the connective tissue with none of the accountability of regulated financial systems.</p><p>Tier 2 intermediaries take many forms, but Huione Guarantee in Cambodia, Garantex in Russia/Dubai, and Iran&#8217;s Derakhshan/ Alivand shadow banking network all show how digital asset facilitators operate at the intersection of offshore capital and terrorist finance. Huione&#8217;s illicit marketplace evolved into a laundering channel for ethnic Chinese <a href="https://www.elliptic.co/blog/cyber-scam-marketplace">criminal networks</a> across Southeast Asia, with clear <a href="https://blog.bitrace.io/crypto-laundering-by-student-southeast-asian-crime-networks-penetrate-hong-kong/?utm_source=chatgpt.com">evidence of participation</a> by Hong Kong facilitators &#8211; strongly suggesting its use by Chinese elites to evade domestic capital controls. U.S. authorities also flagged Huione for <a href="https://gnet-research.org/2025/05/14/cash-flow-breaking-down-the-houthis-multibillion-dollar-financial-networks/">laundering $39 million USD</a> tied to the Houthis, a clear example of terrorist financial usage. Evidence also suggests that Myanmar-based <a href="https://smallwarsjournal.com/2025/07/24/illicit-liquidity-as-battlespace-rethinking-finance-in-asymmetric-conflict/">militant groups</a> have accessed Huione and comparable networks, further illustrating how such financial ecosystems enable militant and terrorist funding structures.</p><p>Meanwhile, U.S. and European regulators sanctioned the Moscow-based crypto exchange Garantex for enabling Russian sanctions evasion and <a href="https://www.elliptic.co/blog/elliptic-in-action-garantex?utm_">elite capital flows</a>, as well as for <a href="https://www.wsj.com/finance/currencies/garantex-russian-crypto-hamas-crime-sanctions-a3648357">processing transactions</a> linked to Palestinian Islamic Jihad. Further analysis has also revealed that funds from Garantex flowed into <a href="https://icsve.org/islamic-states-global-financial-networks-cryptocurrency-and-european-bank-transfers-fund-detained-is-women-and-incarcerated-is-fighters-in-syria-furthering-militant-objectives">wallets controlled</a> by the Islamic State Khorasan Province (ISKP). Finally, in Iran, the Derakhshan/ Alivand shadow banking network operated as a crypto-enabled extension of the regime&#8217;s <a href="https://www.chainalysis.com/blog/ofac-sanctions-iranian-shadow-crypto-banking-network-september-2025/?utm_">sanctions evasion</a> architecture, moving billions through front companies and exchange houses. U.S. Treasury designations also show the network <a href="https://home.treasury.gov/news/press-releases/sb0248">provided financial services</a> to Hezbollah funding corridors, again demonstrating a clear cascade between Tier 1, 2, and 3 flows.</p><p>While the three-tiered framework currently captures only some terrorist organisations, groups such as those associated with the <a href="https://gnet-research.org/2025/02/17/combating-the-islamic-state-finance-somalia-and-the-pan-african-nexus/">Islamic State</a> and <a href="https://www.elliptic.co/blog/how-terrorist-organizations-are-exploiting-crypto-to-raise-funds-and-evade-detection">al-Qaeda</a> also rely on intermediaries to move and launder funds on the blockchain. As these networks become more digitally sophisticated and financially liquid through their exploitation of high-value trades &#8211; including commodities such as <a href="https://gnet-research.org/2025/04/29/malis-environmental-crisis-the-link-between-climate-change-and-jnims-rapid-expansion/">gold</a> and <a href="https://thediplomat.com/2024/11/chinese-demand-for-rosewood-empowers-some-of-africas-deadliest-terrorist-groups/">timber</a> as well as <a href="https://www.atlanticcouncil.org/blogs/africasource/the-sahel-is-now-an-epicenter-of-drug-smuggling-that-is-terrible-news-for-everyone/">narcotics trafficking</a> &#8211; it is likely that they too will engage Tier 2 facilitators, further expanding their global financial reach and resilience.</p><p>Disrupting only the Tier 3 terrorist groups is insufficient, as these actors are symptomatic of broader systems. The real leverage lies in targeting the Tier 2 facilitators who profit from servicing everyone &#8211; oligarchs, sanctioned states, and militant/ terrorist groups alike. A strategy of networked disruption must therefore neutralise the brokers, platforms, and exchanges that systematically connect these flows. By constraining Tier 2, regulators and investigators can structurally disrupt the cascade before funds reach Tier 3, cutting off not just individual plots, but the infrastructure that makes global illicit liquidity possible. Although this challenge remains enormous in scope, new regulatory and technology-based solutions have begun to tip the scales in favour of global enforcement.</p><p><strong>Regulatory Reforms and AI Advances</strong></p><p>Emerging regulatory frameworks are bringing digital assets under formal oversight. In the U.S., the <a href="https://www.whitehouse.gov/fact-sheets/2025/07/fact-sheet-president-donald-j-trump-signs-genius-act-into-law/">GENIUS Act</a> would pull the issuers of and intermediaries behind stablecoins &#8211; the current lifeblood of large-scale <a href="https://www.chainalysis.com/blog/stablecoin-security-risks/">illicit financial flows</a> &#8211; into the existing anti-money laundering and combating the financing of terrorism (AML/CFT) system. In the European Union, the Markets in Crypto-Assets regulation (<a href="https://www.esma.europa.eu/esmas-activities/digital-finance-and-innovation/markets-crypto-assets-regulation-mica">MiCA</a>) sets harmonised standards for licensing and disclosure across the bloc. Financial hubs such as <a href="https://www.sfc.hk/en/Welcome-to-the-Fintech-Contact-Point/Virtual-assets/Virtual-asset-trading-platforms-operators">Hong Kong</a> and <a href="https://charltonsquantum.com/singapore-virtual-assets-regulation/">Singapore</a>, as well as Southeast Asian jurisdictions such as the <a href="https://insightplus.bakermckenzie.com/bm/technology-media-telecommunications_1/philippines-sec-issues-rules-and-guidelines-on-crypto-asset-service-providers-casp">Philippines</a>, are also moving to regulate exchanges, OTC brokers, and other intermediaries. Together, these measures mark a decisive shift: digital assets are no longer a lawless frontier, with governments actively working to close the gaps that criminals, sanctioned states, and violent extremists exploit.</p><p>However, <a href="https://www.trmlabs.com/reports-and-whitepapers/2025-crypto-crime-report">tens of billions</a> of dollars move each year through the informal systems described above, and human analysts alone <a href="https://www.researchgate.net/publication/391950456_Leveraging_Machine_Learning_in_Anti-Money_Laundering_Strengthening_US_Financial_Defenses_Against_Financial_Crimes">cannot keep pace</a> with flows of this magnitude and velocity. Without advanced tools and coordinated enforcement, new regulatory frameworks risk becoming outmanoeuvred by the actors they seek to constrain. Recent AI advances increasingly address this enforcement gap &#8211; not by replacing human analysis, but by amplifying it through pattern recognition at scale. Leading blockchain analytics firms have <a href="https://www.coinbase.com/en-ca/public-policy/advocacy/documents/blockchain-and-ai?utm_">already begun</a> layering AI into their products in ways that concretely boost detection, attribution, and investigation speed.</p><p>Blockchain analytics platforms currently use <a href="https://arxiv.org/html/2404.18251v1?utm_">machine learning</a> to cluster addresses that belong to the same actor, trace funds that are deliberately split and rerouted to hide their origin, and flag unusual transaction patterns that suggest illicit flows. Some systems go further, <a href="https://www.chainalysis.com/blog/rapid-ai-powered-crypto-triage-investigations/">automating the first level</a> of triage, presenting investigators with likely leads rather than raw data. Others use advanced models to sift through vast webs of wallet interactions and <a href="https://arxiv.org/pdf/2404.19109">highlight networks</a> that resemble known money-laundering structures. While private analytics firms rarely disclose which AI modules are employed in specific investigations, recent rollouts of <a href="https://www.chainalysis.com/product/rapid/">AI-enabled triage</a>, <a href="https://www.trmlabs.com/resources/blog/detecting-the-invisible-the-power-of-trm-labs-signatures-tm-in-blockchain-investigations">clustering</a>, and <a href="https://www.elliptic.co/blog/our-new-research-enhancing-blockchain-analytics-through-ai">typology-detection tools</a> suggest that such technologies are increasingly embedded in live enforcement workflows.</p><p>The effect on investigations is simple: machines take on the role of scanning and sorting, allowing human investigators to focus on context, judgment, and strategy. The combination makes it increasingly possible to confront illicit flows at volumes that have long <a href="https://arxiv.org/html/2503.09165v1?">exceeded the limits</a> of manual enforcement. But the technology is still developing, coverage remains uneven, and determined actors continue to find ways to <a href="https://arxiv.org/html/2503.09165v1#S5">exploit the gaps</a>. What AI offers today is not a finished solution, but an evolving opportunity to narrow the enforcement gap at the scale currently required.</p><p>Advances in AI disruption do not end with the private sector. The U.S. Military&#8217;s Defense Advanced Research Projects Agency (DARPA) has been developing a <a href="https://www.darpa.mil/research/programs/a3ml-anticipatory-adaptive">new programme</a> called Anticipatory and Adaptive Anti-Money Laundering (A3ML). According to DARPA, the programme seeks to transform anti-money laundering from &#8220;manual, reactive, and expensive analytic practices&#8221; into a system that can proactively identify illicit financial activity by analysing transaction data at machine speed. The initiative aims to build adaptive models capable of detecting complex laundering behaviours and evolving with new threat patterns across global financial networks. In a <a href="https://regulationinnovation.org/podcast/financial-crime-and-national-security-darpas-a3ml-program-making-money-laundering-too-expensive-to-exist/">recent interview</a>, A3ML programme manager David Dewhurst claimed the goal of the project is to &#8220;raise the cost of money laundering so high that it becomes unsustainable.&#8221;</p><p>If realised, A3ML would represent a significant step toward closing the enforcement gap that today&#8217;s regulators and investigators struggle to manage in the realm of terrorist and illicit finance. Given DARPA&#8217;s 60-year <a href="https://www.openaccessgovernment.org/darpa-60-years-of-ground-breaking-artificial-intelligence-research/100807/?utm_">track record</a> of pioneering AI technology, as well as the <a href="https://www.darpa.mil/node/2092">core technologies</a> behind the Internet itself, the fact that the agency is promoting A3ML publicly signals its potential as an emerging game-changer in countering terrorist finance and illicit liquidity networks as a whole.</p><p><strong>Recommendations: Building Human&#8211;Machine Fusion Across the Enforcement Chain</strong></p><p>Artificial intelligence will not replace human financial investigators; it will demand a new generation of them. As enforcement agencies integrate AI tools into financial investigations, the limiting factor will not be processing power but strategic judgment &#8211; the ability to interpret machine-generated signals in context. AI excels at pattern recognition, but it cannot discern intent, geopolitical linkage, or systemic consequence. These require human synthesis based on deep contextual understanding.</p><p>Three priorities follow from this reality:</p><p><strong>1. Invest in human-machine fusion:</strong> Regulators, tech firms, and research institutions should prioritise training analysts who can interpret algorithmic outputs, question model assumptions, and integrate AI findings into broader geopolitical and financial-systems analysis.</p><p><strong>2. Expand interdisciplinary research:</strong> The convergence of digital assets, sanctions evasion, and terrorist finance demands a research agenda that unites data science, economics, finance, criminology, strategic studies, and more. Understanding illicit liquidity networks at scale requires systems-level mapping and cross-domain synthesis, not siloed expertise.</p><p><strong>3. Institutionalise feedback loops:</strong> AI detection models improve only when informed by real investigative experience and extensive research. Private firms and research institutions should create channels for case-based learning and publication, ensuring that enforcement outcomes continuously refine analytical models.</p><p>Additional priorities for technology platforms to consider:</p><p><strong>4. Integrate financial signal detection into trust and safety operations:</strong> Social media, messaging, and other platforms are uniquely positioned to identify the early stages of extremist financing. Embedding financial intelligence cues such as patterns of wallet sharing, donation link reuse, or coordinated in-app transfers into existing moderation systems would enable early intervention without compromising privacy.</p><p><strong>5. Create secure interoperability between financial and content-moderation ecosystems:</strong> Platforms can pilot controlled data-exchange frameworks that allow vetted enforcement partners and blockchain analytics firms to cross-reference on-chain data with online behavioural indicators. This would help surface the connective tissue between propaganda distribution, recruitment, and funding pipelines that rely on digital payment rails.</p><p><strong>6. Promote collaboration on typology discovery:</strong> Major platforms can co-fund shared typology libraries that describe emerging laundering and fundraising behaviours across digital ecosystems. Building upon the precedent set by <a href="https://gifct.org/hsdb/">GIFCT&#8217;s hash-sharing database </a>and other collaborative frameworks, as well as existing typology reporting by FATF and the Egmont Group, a complementary repository for financial signals could integrate structured input from public and private stakeholders, including blockchain analytics firms at the forefront of these trends. This would create a unified typology framework &#8211; linking regulatory, platform, and investigative perspectives &#8211; and provide a common analytical language for identifying new threats while ensuring that emerging AI models across companies learn from consistent signal categories.</p><p>AI is reshaping financial intelligence, but its success will depend on the people who wield it &#8211; analysts capable of seeing the system, not just individual outcomes. For the technology companies that host, route, and monetise digital interactions, this means examining how digital economies can be co-opted by illicit liquidity systems and disrupting them when possible. The next frontier in counter-terrorist finance will belong to those who can bridge the gap between computation and comprehension &#8211; between safeguarding platforms and preserving the integrity of the digital economy.</p>]]></content:encoded></item><item><title><![CDATA[Chinese Shadow Liquidity and the Scam Economy]]></title><description><![CDATA[Chinese shadow liquidity networks, built to shield against external pressure, have mutated into a force of global instability.]]></description><link>https://www.btl-research.com/p/chinese-shadow-liquidity-and-the</link><guid isPermaLink="false">https://www.btl-research.com/p/chinese-shadow-liquidity-and-the</guid><dc:creator><![CDATA[Adam Rousselle]]></dc:creator><pubDate>Wed, 03 Sep 2025 11:56:27 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!zPHX!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85dcaf6a-977c-4ad5-a55b-11d1ae02cce5_1920x1280.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!6Gt1!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F932f0174-fe62-4bae-95d7-27252bf4e80b_310x60.svg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!6Gt1!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F932f0174-fe62-4bae-95d7-27252bf4e80b_310x60.svg 424w, https://substackcdn.com/image/fetch/$s_!6Gt1!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F932f0174-fe62-4bae-95d7-27252bf4e80b_310x60.svg 848w, https://substackcdn.com/image/fetch/$s_!6Gt1!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F932f0174-fe62-4bae-95d7-27252bf4e80b_310x60.svg 1272w, https://substackcdn.com/image/fetch/$s_!6Gt1!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F932f0174-fe62-4bae-95d7-27252bf4e80b_310x60.svg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!6Gt1!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F932f0174-fe62-4bae-95d7-27252bf4e80b_310x60.svg" width="310" height="60" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/932f0174-fe62-4bae-95d7-27252bf4e80b_310x60.svg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:60,&quot;width&quot;:310,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Logo&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Logo" title="Logo" srcset="https://substackcdn.com/image/fetch/$s_!6Gt1!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F932f0174-fe62-4bae-95d7-27252bf4e80b_310x60.svg 424w, https://substackcdn.com/image/fetch/$s_!6Gt1!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F932f0174-fe62-4bae-95d7-27252bf4e80b_310x60.svg 848w, https://substackcdn.com/image/fetch/$s_!6Gt1!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F932f0174-fe62-4bae-95d7-27252bf4e80b_310x60.svg 1272w, https://substackcdn.com/image/fetch/$s_!6Gt1!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F932f0174-fe62-4bae-95d7-27252bf4e80b_310x60.svg 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a></figure></div><blockquote><p><strong>Author&#8217;s Note:</strong> This article was originally written for the New Lines Institute (<a href="https://newlinesinstitute.org/global-security-mil-priorities/chinese-shadow-liquidity-and-the-scam-economy/">link</a>).</p><p>The analysis was cited by Coinbase in an October 2025 Request for Comment submitted to the U.S. Treasury Department (<a href="https://assets.ctfassets.net/sygt3q11s4a9/2JiDDSZgdu1zwNlwkLgE24/12b9465b1b96198a702288555713dbd3/Coinbase_Response_to_Treasury_RFC_on_Innovative_Methods_To_Detect_Illicit_Activity_Involving_Digital_Assets__1_.pdf">link</a>). </p></blockquote><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!zPHX!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85dcaf6a-977c-4ad5-a55b-11d1ae02cce5_1920x1280.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!zPHX!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85dcaf6a-977c-4ad5-a55b-11d1ae02cce5_1920x1280.jpeg 424w, https://substackcdn.com/image/fetch/$s_!zPHX!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85dcaf6a-977c-4ad5-a55b-11d1ae02cce5_1920x1280.jpeg 848w, https://substackcdn.com/image/fetch/$s_!zPHX!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85dcaf6a-977c-4ad5-a55b-11d1ae02cce5_1920x1280.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!zPHX!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85dcaf6a-977c-4ad5-a55b-11d1ae02cce5_1920x1280.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!zPHX!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85dcaf6a-977c-4ad5-a55b-11d1ae02cce5_1920x1280.jpeg" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/85dcaf6a-977c-4ad5-a55b-11d1ae02cce5_1920x1280.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Philippines Authorities Raid Scam Hub&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Philippines Authorities Raid Scam Hub" title="Philippines Authorities Raid Scam Hub" srcset="https://substackcdn.com/image/fetch/$s_!zPHX!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85dcaf6a-977c-4ad5-a55b-11d1ae02cce5_1920x1280.jpeg 424w, https://substackcdn.com/image/fetch/$s_!zPHX!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85dcaf6a-977c-4ad5-a55b-11d1ae02cce5_1920x1280.jpeg 848w, https://substackcdn.com/image/fetch/$s_!zPHX!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85dcaf6a-977c-4ad5-a55b-11d1ae02cce5_1920x1280.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!zPHX!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85dcaf6a-977c-4ad5-a55b-11d1ae02cce5_1920x1280.jpeg 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>A soldier stands guard as workers cover their faces while authorities raid the offices of Central One, an alleged scam hub masquerading as a call center company, on Oct. 31, 2024, in Bagac, Philippines. (Photo by Ezra Acayan/Getty Images)</em></p><p>The explosive rise of Southeast Asia-based scam networks targeting victims globally is no accident; it is the byproduct of China&#8217;s vast offshore shadow liquidity systems. Scammers from the region have increasingly targeted victims in the United States, who lost at least $5 billion to <a href="https://www.newsweek.com/china-online-scam-centers-us-victims-2102123">such scams</a> in 2024 alone. Scam hubs, some of which comprise <a href="https://www.bbc.com/news/articles/c04nx1vnw17o">entire cities</a> built using offshored Chinese wealth, threaten stability across Asia by draining middle-class savings into a self-perpetuating parasitic ecosystem. These criminal enterprises are now actively expanding their operations in <a href="https://www.asahi.com/ajw/articles/15719980">Africa and Latin America</a>, positioning themselves closer to Western societies where aging populations are especially vulnerable to <a href="https://www.ncoa.org/article/what-are-the-top-online-scams-targeting-older-adults/">sophisticated cybercrimes</a>. These systems also threaten regional stability, with recent military clashes between Thailand and Cambodia underpinned by rising <a href="https://www.theregister.com/2025/07/31/thai_cambodia_war_cyberscam_links/">scam activity</a> and capital flows to the Cambodian side of their disputed border.</p><p>Over the past decade, China built a secret offshore capital reservoir to shield itself from an increasingly hostile outside world. That reservoir, combined with massive capital outflows, has spawned a vast criminal ecosystem that threatens social and economic interests the world over. Moreover, the networks constituting this ecosystem now serve their own ends, not merely those of Beijing. In the absence of safeguards, this pooled liquidity has fueled criminality that now threatens China despite Beijing&#8217;s ongoing efforts to reassert control over it. This offshored criminal ecosystem demonstrates a fundamental truth by its very existence: liquidity systems, once externalized beyond state oversight, become self-reinforcing, corrosive infrastructures.</p><p>In Southeast Asia, sprawling scam hubs now siphon an estimated tens of billions of dollars or more annually, turning a defensive buffer into a <a href="https://therecord.media/southeast-asian-scam-syndicates-stealing-billions-annually">parasitic financial ecosystem</a> threatening regional and global stability. This criminal ecosystem exposes a significant contradiction at the heart of China&#8217;s model: a regime built on centralized control increasingly entangled with systems it can neither regulate nor contain. These networks &#8211; once designed to strengthen China&#8217;s financial sovereignty &#8211; now threaten it, eroding domestic stability and undermining the very narrative of control the ruling Communist Party depends on to maintain legitimacy.</p><h2><strong>What Is Shadow Liquidity?</strong></h2><p>Shadow liquidity is a mobile layer of capital that exists outside standard regulatory frameworks. Unlike traditional illicit finance, which is explicitly criminal, it occupies a gray zone &#8211; part statecraft tool, part private escape valve, part opportunistic exploitation. Its core function is not to hide individual transactions but to maintain a resilient flow of value that can shift jurisdictions, instruments, or ownership structures as conditions demand.</p><p>China&#8217;s offshore liquidity systems emerged as a response to external pressures, including <a href="https://harris-sliwoski.com/chinalawblog/why-following-your-chinese-suppliers-tariff-advice-could-land-you-in-jail/">tariffs</a> and <a href="https://ipdefenseforum.com/2025/02/shadow-networks-shell-companies-help-prc-russia-evade-sanctions-export-controls/?utm_source=chatgpt.com">sanctions</a>. Initially structured as discreet channels to support trade and investment, these reserves evolved into conduits for elite capital flight and informal influence operations. A clear example is the $900&#8239;billion in offshore <a href="https://thechinaproject.com/2023/06/29/shadow-reserves-how-china-hides-trillions-of-dollars-of-hard-currency/#:~:text=The%20policy%20banks%20initially%20weren,China%2DLAC%20Cooperation%20Fund).">foreign currency assets</a> held by China&#8217;s state commercial banks, funded by deposits made by state-owned enterprises and outside the official People&#8217;s Bank of China (PBoC) balance sheet. Designed as a buffer against external shocks, these pools of liquidity coincide with the rise of <a href="https://www.uscc.gov/research/chinas-exploitation-scam-centers-southeast-asia#:~:text=Key%20Findings%3A,trade%20in%20scale%20and%20sophistication.">informal networks</a> beyond Beijing&#8217;s direct control.</p><p>DeepSeek, an artificial intelligence product developed in <a href="https://www.btl-research.com/p/deepseek-deep-dive-what-role-did">close proximity</a> to China&#8217;s state-owned military and defense sector, provided a striking example of how offshore liquidity pools serve Chinese state interests. In June&#8239;2025, U.S. officials accused DeepSeek&#8217;s parent company of using <a href="https://www.reuters.com/world/china/deepseek-aids-chinas-military-evaded-export-controls-us-official-says-2025-06-23/">shell corporations</a> in Southeast Asia to acquire banned Nvidia H100 chips &#8211; critical for training advanced AI models &#8211; thereby bypassing sanctions aimed at curbing Beijing&#8217;s military AI ambitions. Recent cases also show that Chinese firms leverage <a href="https://www.washingtonpost.com/business/2025/07/27/us-trade-policy-china-transshipment/?utm_source=chatgpt.com">offshore entities</a> to evade recently escalated U.S. tariffs. In this way, these networks created a parallel reservoir of liquidity designed to move outside Beijing&#8217;s formal financial architecture while remaining at least partly aligned with state objectives.</p><p>However, by unleashing vast sums of liquidity into loosely regulated financial systems, Beijing seeded a landscape where state-linked capital, private wealth, and criminal enterprise converge. According to a July 2025 report from the U.S.&#8211;China Economic and Security Review Commission (USCC), Chinese <a href="https://www.uscc.gov/sites/default/files/2025-07/Chinas_Exploitation_of_Scam_Centers_in_Southeast_Asia.pdf?utm_source=chatgpt.com">criminal networks</a> in Southeast Asia &#8220;have built ties &#8211; some overt, some deniable &#8211; to the Chinese government by embracing patriotic rhetoric and supporting China&#8217;s Belt and Road Initiative (BRI).&#8221; The report further notes that &#8220;Chinese crime syndicates have expanded across the region with, at a minimum, implicit financial and political backing from elements of the Chinese government.&#8221; Murky state-linked investments in now-notorious scam hubs like the <a href="https://carnegieendowment.org/research/2023/12/the-mekong-region-is-a-test-of-chinas-global-development-and-security-model?lang=en">Golden Triangle Special Economic Zone</a> (SEZ) in Laos and Myanmar&#8217;s <a href="https://www.irrawaddy.com/news/burma/new-city-thai-myanmar-border-part-bri-despite-chinas-denials-developer-claims.html">Shwe Kokko SEZ</a> are just some examples. What was meant to be a controlled instrument of resilience has instead become a porous, adaptive ecosystem &#8211; one increasingly beyond Beijing&#8217;s ability to discipline without destabilizing the very flows it relies on.</p><p>In China&#8217;s case, offshored &#8220;shadow reserves&#8221; have become a <a href="https://warontherocks.com/2024/08/shadow-reserves-chinas-key-to-parry-u-s-financial-sanctions/?utm_source=chatgpt.com">critical funding source</a> for BRI projects, with state commercial banks channeling offshore foreign currency assets &#8211; often absent from official PBoC reporting &#8211; into overseas infrastructure. BRI has become the most visible expression of how shadow liquidity can be weaponized as both an economic and geopolitical instrument.</p><p>Because liquidity is inherently dynamic, these networks behave less like pipelines and more like living infrastructure. They adapt under enforcement pressure, migrate during crises, and often move faster than <a href="https://www.regulationtomorrow.com/asia/hong-kong-stablecoins-sprint-historic-bill-passes-draft-licensee-guidelines-released-and-aml-cft-consultation-begins/">formal financial reforms</a> can catch them. For China, this networked capital is both a pillar of external influence and a source of internal fragility: a system built to shield the state from outside constraint that has instead created an informal architecture of power &#8211; one Beijing now depends on but cannot fully control. Simultaneously, this informal architecture has proved resilient against Chinese and other global crackdowns, likely at least in part due to its entrenchment in Chinese elite power structures.</p><h2><strong>The Southeast Asia Inflection Point</strong></h2><p>In Southeast Asia, China&#8217;s shadow liquidity strategy has mutated into something far more volatile. <a href="https://globalinitiative.net/analysis/compound-crime-cyber-scam-operations-in-southeast-asia/">Scam compounds</a> in Cambodia, Laos, and Myanmar, sprawling online <a href="https://www.abc.net.au/news/2024-07-26/philippine-offshore-gaming-operators-pogo-workers-leaving/104147866">gambling hubs</a> in the Philippines, and a dense web of informal <a href="https://www.unodc.org/roseap/uploads/documents/Publications/2025/Inflection_Point_2025.pdf?utm_source=chatgpt.com">crypto-asset brokers</a> now act as powerful magnets for Chinese capital outflows. Funds slip past Beijing&#8217;s <a href="https://www.businesstimes.com.sg/companies-markets/banking-finance/chinas-shadowy-crypto-brokers-lure-us75-billion-economy-toils?utm_source=chatgpt.com">formal controls</a> through domestic <a href="https://www.wsj.com/world/china/china-economy-capital-flight-2ba6391b?utm_source=chatgpt.com">underground banking</a> networks, gray-market over-the-counter (OTC) brokers based in Hong Kong, and payment platforms such as Huione and other similar <a href="https://smallwarsjournal.com/2025/07/24/illicit-liquidity-as-battlespace-rethinking-finance-in-asymmetric-conflict/">underground systems</a>. These actors often facilitate <a href="https://www.lawfaremedia.org/article/the-world-s-underground-bankers">capital flight</a> disguised as trade settlement or investment outflows, converging powerfully with state-led outflows.</p><p>Investigations have tracked billions of dollars flowing through OTC desks in <a href="https://protos.com/was-ftx-funded-by-chinese-capital-flight__trashed/">Bangkok</a> and <a href="https://en.sggp.org.vn/chinese-fraud-ring-busted-in-hcmc-for-scamming-japanese-victims-post117281.html?utm_source=chatgpt.com">Ho Chi Minh City</a> into scam operations and laundering networks. What began as pass-throughs for capital flight is now self-reinforcing.<em> </em>Reports indicate that Chinese middle-class investors have lost tens of billions of dollars to newer forms of crypto fraud &#8211; particularly <a href="https://theconversation.com/pig-butchering-scams-have-stolen-billions-from-people-around-the-world-heres-what-you-need-to-know-252774">pig-butchering scams</a> &#8211; often facilitated by border OTC networks in Southeast Asia. According to Wired, <a href="https://www.wired.com/story/pig-butchering-scam-invasion/?utm_source=chatgpt.com">global losses</a> due to scam operations exceeded $75&#8239;billion in 2023, with China-origin capital feeding scam compounds and high-risk gambling zones in Cambodia, Laos, Myanmar, and beyond. These systems no longer route funds back into China; they feed their own expansion, siphoning ever-larger volumes of <a href="https://www.usip.org/sites/default/files/2024-05/ssg_transnational-crime-southeast-asia.pdf?utm_source=chatgpt.com">Chinese wealth</a> to sustain illicit economies.</p><p>This dynamic has created a parasitic financial architecture. Chinese liquidity designed to circumvent external constraints is now trapped in feedback loops, comingling with and empowering nonstate actors and criminal organizations. For example, the Yemen-based al-Houthi rebel group has used Huione to transfer $39 million in illicit proceeds. Militant groups in Myanmar have been linked to <a href="https://smallwarsjournal.com/2025/07/24/illicit-liquidity-as-battlespace-rethinking-finance-in-asymmetric-conflict/">similar funding</a> schemes. These networks have proven resilient in the face of global pressure, such as recent revelations that Huione remains operational despite its <a href="https://www.chainalysis.com/blog/huione-guarantee-still-active-despite-shutdown/">formal shutdown</a> in the wake of U.S. sanctions.</p><p>Scam centers now threaten regional stability in Southeast Asia, draining middle-class savings while embedding themselves into the broader gray-zone economy. For example, ethnic Chinese-run <a href="https://www.aljazeera.com/news/2022/4/13/in-thailand-chinese-gangs-recruit-the-desperate-into-phone-scams">scam centers</a> in Cambodia routinely target middle-class victims in <a href="https://www.straitstimes.com/asia/se-asia/thailand-targets-cambodian-scam-centres-as-border-dispute-rages">neighboring Thailand</a>. Thai authorities report that since 2022, <a href="https://www.reuters.com/world/asia-pacific/thailand-arrests-100-people-operating-border-scam-centre-2025-03-05/">these operations</a> have defrauded domestic investors of roughly 80&#8239;billion baht (about $2.5 billion), while regional estimates variably suggest the industry now generates nearly tens of billions of dollars annually. These scam centers became an important <a href="https://time.com/7305413/thailand-cambodia-border-war-hun-sen-manet-paetongtarn-thaksin-shinawatra/">point of tension</a> between Thailand and Cambodia in the months leading up to the July border clashes between the two countries that killed at least 35 people and displaced more than 260,000.</p><p>The result of China&#8217;s shadow liquidity outflows is a network that serves state, private, and criminal interests simultaneously &#8211; but answers fully to none. In this Southeast Asian crucible, China&#8217;s shadow liquidity has crossed an inflection point: from strategic tool to autonomous ecosystem, eroding the very stability it was meant to secure.</p><h2><strong>How It Backfires on China</strong></h2><p>The explosion of scam-driven liquidity drains in Southeast Asia produces visible social and economic consequences inside China. Hundreds of thousands &#8211; possibly millions &#8211; of Chinese citizens have <a href="https://onlinelibrary.wiley.com/doi/full/10.1111/rego.70007">lost savings</a> to cross-border fraud schemes linked to scam compounds and gray-market payment platforms. While reliable data on those losses is scarce, early <a href="https://arxiv.org/abs/2412.15423?utm_source=chatgpt.com">documented cases</a> point to hundreds of millions of dollars stolen through pigbutchering scams &#8211; long con frauds where perpetrators groom victims online before convincing them to hand over large sums of money. Today, estimates claim <a href="https://fortune.com/article/asian-scam-operations-united-nations-un-warning-cybersecurity/">scam compounds</a> generate tens of billions of dollars annually, most extracted from Chinese households &#8211; an ongoing bleed of domestic savings that represents a vastly underestimated long-term erosion of national capital.</p><p>This state-facilitated ecosystem has bred distrust within China&#8217;s middle class &#8211; the demographic Beijing relies on most for social stability. Recent unemployment and failed investments have fueled <a href="https://x.com/garnettime6/status/1948506226414813244">unrest</a> and <a href="https://www.newsweek.com/china-news-downplays-mass-killing-1985624">rising violence</a> &#8211; potential harbingers of things to come as scam losses mount. The scale of loss from cross-border scams is not merely individual but systemic. As illicit networks siphon billions annually, they erode China&#8217;s internal capital coherence &#8211; the ability of the state to direct domestic savings into strategic investment. Instead of reinforcing national resilience, these shadow channels are diverting household wealth into offshore criminal ecosystems that recycle capital outside Beijing&#8217;s control.</p><p>Although Chinese authorities have made efforts at <a href="https://www.nytimes.com/2025/02/27/world/asia/scam-centers-myanmar-thailand-china.html">cross-border crackdowns</a>, Southeast Asia&#8217;s scam economy continues to flourish. It is likely that Beijing cannot fully disavow these operations due to how embedded they have become within elite circles. For example, organized crime figures such as the 14K Triad&#8217;s Wan Kuok Koi (aka &#8220;Broken Tooth&#8221;) reportedly hold close political ties to the Chinese Communist Party (CCP), with Wan <a href="https://www.dw.com/en/how-chinese-mafia-are-running-a-scam-factory-in-myanmar/a-68113480">allegedly stating</a> that although he used to fight for the cartels, he now fights for the CCP. In 2018, Wan launched the World Hongmen History and Cultural Association, an entity U.S. authorities <a href="https://home.treasury.gov/news/press-releases/sm1206">sanctioned</a> two years later for its alleged criminal activity, including <a href="https://timesofindia.indiatimes.com/world/china/chinese-mafia-scam-factory-inside-asias-brutal-scam-compound/articleshow/107255572.cms">close ties</a> to Southeast Asian scam operations. Washington also claims that Wan is a senior member of the <a href="https://www.occrp.org/en/investigation/pacific-gambit-inside-the-chinese-communist-party-and-triad-push-into-palau">Chinese government</a>, holding a position on the Chinese People&#8217;s Political Consultative Conference &#8211; an assertion <a href="https://www.reuters.com/article/usa-china-sanctions-wan-idUSB9N2GP010/">Beijing denies</a>.</p><p>Another Chinese gangster, Zhao Wei, has benefited from extensive <a href="https://thediplomat.com/2021/05/boten-the-renaissance-of-laoss-golden-city/">BRI investment</a> in his Laos-based Golden Triangle SEZ, where he <a href="https://home.treasury.gov/news/press-releases/sm0272">owns and operates</a> the infamous Kings Romans Casino, which allegedly maintains extensive ties to <a href="https://www.business-humanrights.org/en/latest-news/laos-two-africans-allegedly-recruited-to-work-in-cyber-scam-compounds-in-sez-with-passports-taken-away-and-work-up-to-17-hours/">scam operations</a> in the SEZ. Such cases indicate that the Chinese regime maintains deep ties to the very scam operations that consistently undermine its public image despite attempts to rein them in. As ensuring <a href="https://www.brookings.edu/articles/chinas-achilles-heel-capital-flight/">capital outflows</a> likely plays a key role in maintaining loyalty within the CCP&#8217;s opaque <a href="https://asiasociety.org/policy-institute/decoding-chinese-politics/introduction-black-box-chinese-policy">patronage networks</a>, these scam operations may benefit from protection by the very officials meant to regulate them.</p><p>This dynamic sharply inverts the original aim of China&#8217;s offshore liquidity systems. What began as an effort to secure financial sovereignty and shield the economy from external shocks has instead produced an internal liquidity leak. It undermines the narrative of centralized control &#8211; the cornerstone of party legitimacy &#8211; as the population sees their own savings flow into unregulated, foreign-run criminal networks backed by state-led investments. In this way, the social cost of shadow liquidity is not just economic dislocation but also the corrosion of the trust Beijing needs to sustain its model of governance.</p><h2><strong>Policy and Security Implications</strong></h2><p>Current anti-money laundering and counter-terrorist financing frameworks focus on shadow liquidity as a <a href="https://www.researchgate.net/publication/389869404_Rule-Based_Systems_in_AML">criminal threat</a> on a case-by-case basis rather than a systemic one. Compliance systems emphasize wallet-level monitoring and red-flag thresholds, but as the Financial Action Task Force (FATF) warns, the <a href="https://www.fatf-gafi.org/en/publications/Methodsandtrends/comprehensive-update-terrorist-financing-risks-2025.html">decentralization</a> of financial operations &#8220;may further complicate efforts to disrupt larger financial networks.&#8221;</p><p>There is a clear imperative for disrupting and dismantling these shadow liquidity systems. The human cost is already visible &#8211; from <a href="https://www.pbs.org/wgbh/frontline/article/scam-centers-trafficking-myanmar/">human trafficking</a> rings sustaining scam operations to the <a href="https://www.newsweek.com/china-online-scam-centers-us-victims-2102123">growing number</a> of victims in the United States and globally whose wealth is funneled into opaque offshore corridors. With Western populations aging, Chinese illicit <a href="https://www.wsj.com/us-news/china-mexico-drug-money-laundering-banks-907f35f8">financial infrastructure</a> already embedded within Western societies, and <a href="https://www.interpol.int/en/News-and-Events/News/2025/INTERPOL-releases-new-information-on-globalization-of-scam-centres#:~:text=However%2C%20online%20scam%20centres%20have,from%20South%20America%20or%20Africa.">scam centers expanding</a> into geographically, linguistically, and culturally proximate regions such as Africa and Latin America, the risk of a structurally entrenched global scam economy is rising. Evidence that these same corridors are exploited by <a href="https://smallwarsjournal.com/2025/07/24/illicit-liquidity-as-battlespace-rethinking-finance-in-asymmetric-conflict/">terrorist and militant groups</a> such as the Houthis to launder and transfer funds beyond the reach of traditional enforcement only underscores the urgency for decisive action.</p><p>At the state level, China&#8217;s BRI has become a dual-use platform &#8211; advancing Beijing&#8217;s geopolitical objectives while quietly facilitating elite capital flight and enabling shadow liquidity systems under the cover of infrastructure investment. In this way, BRI simultaneously spreads and undermines Beijing&#8217;s influence globally but doubly harms U.S. and other global interests by simultaneously furthering Chinese military expansionism while enabling parasitic organized criminal infrastructure. Until Beijing demonstrates a genuine commitment to dismantling these offshore shadow liquidity networks, global regulators and enforcement agencies should treat its financial initiatives with maximum caution.</p><p>Scam compounds, OTC desks, and gray-market payment networks are no longer discrete criminal enterprises; they are embedded in shadow capital infrastructure originally tied to Chinese state objectives. Treating them as isolated criminal enterprises misses their role as autonomous reservoirs of capital capable of sustaining <a href="https://smallwarsjournal.com/2025/07/24/illicit-liquidity-as-battlespace-rethinking-finance-in-asymmetric-conflict/">proxy influence</a> and destabilizing economies.</p><p>Addressing this requires ecosystem-level targeting. FATF&#8217;s <a href="https://www.fatf-gafi.org/content/dam/fatf-gafi/publications/Comprehensive-Update-on-Terrorist-Financing-Risks-2025.pdf.coredownload.inline.pdf">2025 report</a> highlight &#8220;Operation Grafos,&#8221; where real-time intelligence sharing, blockchain analysis, and cross-jurisdictional coordination was employed to disrupt a virtual asset-based terrorism finance network. Those methods must become standard practice, not isolated cases.</p><p>Hybrid threat frameworks must integrate liquidity analysis alongside kinetic and cyber domains. The Basel Framework&#8217;s <a href="https://www.bis.org/basel_framework/">network-based supervision</a> and the Organization for Economic Cooperation and Development&#8217;s <a href="https://www.oecd.org/content/dam/oecd/en/networks/global-forum-tax-transparency/effective-beneficial-ownership-frameworks-toolkit-en.pdf">beneficial ownership</a> models offer practical templates for this. Pressure on Southeast Asian jurisdictions hosting scam enclaves must also escalate. Cambodia, Laos, Myanmar, and the Philippines are now structural nodes; carrot-and-stick approaches could force structural change.</p><p>Stablecoin and OTC-specific controls are essential. Hong Kong&#8217;s virtual asset service provider OTC regime and International Monetary Fund guidance on stablecoin flows provide blueprints for containing these pipelines. The recent announcement that stablecoin issuer Tether will <a href="https://www.coindesk.com/policy/2025/07/18/tether-ceo-says-he-ll-comply-with-genius-to-come-to-u-s-circle-says-it-s-set-now">fully comply</a> with Washington&#8217;s Guiding and Establishing National Innovation for U.S. Stablecoins (GENIUS) Act over a period of 36 months is a positive step in this direction. Without systemic measures to regulate and contain these flows, shadow liquidity will continue to metastasize beyond state control, embedding itself as a structural layer of global capital flows. Given the primacy of U.S. regulatory and enforcement bodies in the global financial system, Washington will have to anchor any serious effort to contain these high-risk and unregulated flows.</p><p>By mapping these flows as an ecosystem rather than isolated incidents, enforcement bodies can identify structural chokepoints where targeted interventions may have disproportionate disruptive impact.</p><h2><strong>Conclusion</strong></h2><p>Shadow liquidity is more than a byproduct of illicit finance; it is a strategic architecture. China&#8217;s experience shows how systems built to project resilience can evolve into autonomous networks draining wealth and feeding actors beyond state control.</p><p>This is the central warning: once liquidity is externalized into unregulated systems, it no longer necessarily serves the state or actor that created it. Financial sovereignty is not just reserves; it depends on controlling the conduits of trust &#8211; the pathways through which value moves. Without discipline over these flows, even the most carefully engineered financial architecture can become a vector of decay, eroding the very stability it was built to secure. The real question is whether these systems can be contained in time &#8211; before they permanently erode the foundations of the global financial order.</p>]]></content:encoded></item><item><title><![CDATA[PRC-Manufactured Weapons Abound Among African Militant Groups]]></title><description><![CDATA[Original work cited by the United States Senate]]></description><link>https://www.btl-research.com/p/prc-manufactured-weapons-abound-among</link><guid isPermaLink="false">https://www.btl-research.com/p/prc-manufactured-weapons-abound-among</guid><dc:creator><![CDATA[Adam Rousselle]]></dc:creator><pubDate>Wed, 27 Aug 2025 02:32:44 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Q8fm!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9eeac514-f12f-4a49-9884-98e6d52b81f9_633x422.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<ul><li><p></p></li></ul><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Q8fm!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9eeac514-f12f-4a49-9884-98e6d52b81f9_633x422.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Q8fm!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9eeac514-f12f-4a49-9884-98e6d52b81f9_633x422.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Q8fm!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9eeac514-f12f-4a49-9884-98e6d52b81f9_633x422.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Q8fm!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9eeac514-f12f-4a49-9884-98e6d52b81f9_633x422.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Q8fm!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9eeac514-f12f-4a49-9884-98e6d52b81f9_633x422.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Q8fm!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9eeac514-f12f-4a49-9884-98e6d52b81f9_633x422.jpeg" width="633" height="422" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9eeac514-f12f-4a49-9884-98e6d52b81f9_633x422.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:422,&quot;width&quot;:633,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:&quot;&quot;,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!Q8fm!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9eeac514-f12f-4a49-9884-98e6d52b81f9_633x422.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Q8fm!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9eeac514-f12f-4a49-9884-98e6d52b81f9_633x422.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Q8fm!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9eeac514-f12f-4a49-9884-98e6d52b81f9_633x422.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Q8fm!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9eeac514-f12f-4a49-9884-98e6d52b81f9_633x422.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>A screenshot from the movie Hotel Rwanda, in which a Hutu warlord shows off his PRC-made machete. (Source: Douban)</em></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!KzSh!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9afd89fd-1ff4-4359-8c85-d3c8cf8a8842_6250x1875.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!KzSh!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9afd89fd-1ff4-4359-8c85-d3c8cf8a8842_6250x1875.png 424w, https://substackcdn.com/image/fetch/$s_!KzSh!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9afd89fd-1ff4-4359-8c85-d3c8cf8a8842_6250x1875.png 848w, https://substackcdn.com/image/fetch/$s_!KzSh!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9afd89fd-1ff4-4359-8c85-d3c8cf8a8842_6250x1875.png 1272w, https://substackcdn.com/image/fetch/$s_!KzSh!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9afd89fd-1ff4-4359-8c85-d3c8cf8a8842_6250x1875.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!KzSh!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9afd89fd-1ff4-4359-8c85-d3c8cf8a8842_6250x1875.png" width="1456" height="437" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9afd89fd-1ff4-4359-8c85-d3c8cf8a8842_6250x1875.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:437,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!KzSh!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9afd89fd-1ff4-4359-8c85-d3c8cf8a8842_6250x1875.png 424w, https://substackcdn.com/image/fetch/$s_!KzSh!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9afd89fd-1ff4-4359-8c85-d3c8cf8a8842_6250x1875.png 848w, https://substackcdn.com/image/fetch/$s_!KzSh!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9afd89fd-1ff4-4359-8c85-d3c8cf8a8842_6250x1875.png 1272w, https://substackcdn.com/image/fetch/$s_!KzSh!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9afd89fd-1ff4-4359-8c85-d3c8cf8a8842_6250x1875.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><blockquote><p><em>This article was published on November 1, 2024 in the Jamestown Foundation China Brief. It has since been cited in a <a href="https://www.foreign.senate.gov/imo/media/doc/abridged_china_report.pdf">July 2025 report</a> by the U.S. Senate Committee on Foreign Relations. You can find the original article <a href="https://jamestown.org/program/prc-manufactured-weapons-abound-among-african-militant-groups/">here</a>. </em></p></blockquote><p><strong>Executive Summary:</strong></p><ul><li><p>Weapons manufactured in the People&#8217;s Republic of China (PRC) are increasingly falling into the hands of militant groups across Africa, with key contributors being state-owned defense contractors like Norinco. However, it is unclear how the weapons reach these groups.</p></li><li><p>Militant groups such as Mali-based JNIM and the Democratic Republic of Congo&#8217;s M23 are employing PRC-manufactured arms in their operations, with evidence suggesting the potential involvement of Chinese criminal syndicates and corruption within PRC defense firms and African militaries.</p></li><li><p>Extensive access to PRC-manufactured weapons by countries like Rwanda and Uganda, both of which support rebel groups, underscores the growing influence of PRC defense contractors in Africa, potentially contributing to regional conflicts.</p></li><li><p>Beijing&#8217;s experience in Myanmar, where it supports both the government and rebel groups, may offer insights into its role in African conflicts, raising concerns about how escalating conflicts could strain Beijing&#8217;s partnerships and jeopardize its regional investments.</p></li></ul><p>Weapons manufactured in the People&#8217;s Republic of China (PRC) are increasingly falling into the hands of militant groups across Africa as PRC defense contractors expand their influence in the region. Many African governments have signed arms deals with Beijing, with the PRC becoming the continent&#8217;s leading supplier of weapons this year. It is unclear how weapons are falling into the hands of militants, though corruption is likely playing a part in the influx of PRC-manufactured arms on the continent. Corruption has been rampant in recent years within the PRC&#8217;s military-industrial complex, reaching right to the top of the system. At the same time, the likelihood of corrupt activities by PRC arms companies in Africa&#8212;that operate far from regulatory oversight by Beijing&#8212;is high, as is the involvement of Chinese criminal groups that are also active in the region.</p><p>In late September, the Mali-based, al-Qaeda-affiliated Jama&#8217;at Nasr al-Islam wal Muslimin (JNIM) continued to escalate its presence in Africa&#8217;s Sahel region, executing attacks that claimed over 70 lives in Bamako (Xinhua, <a href="http://www.news.cn/world/20240918/69c11d7e7bee4c0ca64d4cad3bed92d9/c.html">September 18</a>; <a href="http://www.news.cn/20240920/0097fa33adce4ddc81a8540025db3a67/c.html">September 20</a>). JNIM has access to large numbers of PRC-manufactured weapons. This is one of several instances of non-state actors having access to substantial quantities of PRC military equipment&#8212;Myanmar constitutes another prominent case.</p><p><strong>Mali-based Terrorist Group Maintains Extensive Arsenal of PRC Weapons</strong></p><p>Propaganda videos and footage released by the Malian military reveal substantial stockpiles of weapons produced by PRC state-owned defense contractor Norinco (&#20013;&#22269;&#20853;&#22120;&#24037;&#19994;&#38598;&#22242;; &#21271;&#26041;&#24037;&#19994;), including a Type 80 machine gun, a Type 81-1 assault rifle, and at least two Type 69 rocket-propelled grenade (RPG) launchers equipped with high-explosive anti-tank projectiles (<a href="https://www.militantwire.com/p/jnim-al-qaeda-attacks-international">Militant Wire</a>, September 22). While the images also display weapons from other countries such as Russia, Romania, and older Soviet Union models, most of the arms pictured are of PRC origin.</p><p>Norinco has increasingly expanded its role in supplying militaries throughout the Sahel, particularly in Mali. A video released last summer shows Malian special forces outfitted with a broad array of PRC-manufactured weapons and equipment, including Norinco-produced CS/VP11 Lynx all-terrain vehicles equipped with W85 anti-aircraft machine guns, as well as JS 9mm submachine guns produced by Jianshe Industries (&#20113;&#21335;&#24314;&#35774;&#24037;&#19994;&#38598;&#22242;) (<a href="https://www.bilibili.com/video/BV15F411k7m5/">BiliBili</a>, August 27, 2023). Last month, during the Forum on China&#8211;Africa Cooperation (FOCAC) in Beijing, Mali secured another contract with Norinco to provide additional weapons to its military (<a href="http://in.china-embassy.gov.cn/eng/zgxw/202409/t20240902_11483337.htm">Embassy of the PRC in India</a>, September 2; <a href="https://www.military.africa/2024/09/malian-transitional-president-visits-norinco-ahead-of-china-africa-forum/#:~:text=Mali%20receives%20Norinco%20VP11%20MRAP,in%20the%20fight%20against%20insurgency">Military Africa</a>, September 3).</p><p>In recent years, JNIM has funded much of its expansion by running a protection racket associated with the illicit harvesting and trade of southern Malian rosewood, a highly valued tropical hardwood prized for its distinctive color and durability (<a href="https://issafrica.org/iss-today/timber-logging-drives-jnim-s-expansion-in-mali">ISS Africa</a>, June 19). In 2018, Malian whistleblower Amadou Traor&#233; exposed the extensive deforestation and criminal activities tied to Mali&#8217;s rosewood trade, prompting several international investigations (<a href="https://www.corruptionanonymous.org/a-consortium-of-senegalese-journalists-led-by-pplaaf-confirms-whistleblowers-disclosures-on-massive-plunder/">Corruption Anonymous</a>, September 13, 2023). Reports suggest that most of Mali&#8217;s exported rosewood ends up in the PRC, with PRC criminal syndicates operating in Mali and Senegal playing essential roles in the trade (<em><a href="https://www.scmp.com/news/china/diplomacy/article/3178591/malis-rosewood-crisis-not-happening-vacuum-and-china-key-buyer">South China Morning Post</a></em>, May 22, 2022; <a href="https://www.pplaaf.org/2023/09/11/new-investigations-on-rosewood-trafficking-between-mali-and-senegal.html">PPLAAF</a>, September 11, 2023). In the PRC, the trade of illegally exported Malian wood is so widespread that several online retailers sell it on Aicaigu (&#29233;&#37319;&#36141;), a business-to-business platform operated by PRC tech giant Baidu (<a href="https://b2b.baidu.com/ss?q=%E9%A9%AC%E9%87%8C%E7%BA%A2%E6%9C%A8&amp;from=b2b_straight&amp;srcid=5103&amp;from_restype=product&amp;pi=baidu.b2b_straight.title">Aicaigou</a>, October 10). However, the origin of JNIM&#8217;s vast cache of PRC-manufactured weapons and the group&#8217;s relationship with PRC criminal syndicates remains unclear. Although villagers in southern Mali have reported that local PRC crime syndicates pay protection money to JNIM, these reports remain unsubstantiated (<a href="https://issafrica.s3.amazonaws.com/site/uploads/ocwar-t-report-13-eng.pdf">ECOWAS</a>, November 2023). Such factors call for further investigation.</p><p><strong>PRC Defense Contractors Benefit From Worsening Conflict in the Eastern DRC</strong></p><p>In the eastern Democratic Republic of Congo (DRC), the March 23 Movement (M23), predominantly composed of Tutsi rebel forces, continues to devastate the region using PRC-manufactured weapons, including an assault on the provincial capital of Goma and the plundering of vast quantities of minerals (<a href="https://press.un.org/en/2024/sc15596.doc.htm">United Nations</a>, February 20; <a href="https://adf-magazine.com/2024/03/m23s-tech-might-outgun-sadc-force-peacekeepers-in-drc/">Africa Defense Forum</a>, March 5). Photos of seized M23 weapons and equipment released by the Congolese military underscore the PRC origin of these extensive supplies, particularly from Norinco and Xinxing (&#20013;&#22269;&#26032;&#20852;&#36827;&#20986;&#21475;&#26377;&#38480;&#36131;&#20219;&#20844;&#21496;), a firm specializing in military uniforms and tactical gear. In an interview with a local news outlet, Congolese-Belgian defense analyst Jean-Jacques Wondo Omanyundu noted, &#8220;the M23 weapons seized by the FARDC [the Congolese military] are almost all Chinese-made&#8221; (<a href="https://chinaglobalsouth.com/2022/07/12/chinese-weapons-and-military-equipment-are-showing-up-on-the-battlefields-of-the-eastern-dr-congo/">China Global South Project</a>, July 12, 2022).</p><p>A recent UN Security Council report concludes that M23 receives substantial financial and material support from neighboring Rwanda and Uganda, both of which have acquired significant quantities of PRC-manufactured weapons (<a href="https://documents.un.org/doc/undoc/gen/n24/118/80/pdf/n2411880.pdf">United Nations</a>; <a href="https://reliefweb.int/report/democratic-republic-congo/final-report-group-experts-democratic-republic-congo-s2024432-enarruzh">ReliefWeb</a>, June 4). In recent years, Rwanda has made large purchases of artillery systems and other arms produced by Norinco and other firms. A Shanghai-based firm called Deekon Group even uses images of the Rwandan military uniforms it produces for promotional purposes on its website (<a href="https://www.deekongroup.com/rwanda-military-uniform-bdu-286.html">Deekon Group</a>, October 8). The PRC and Rwanda also maintain close military and defense ties, with Beijing deploying an official defense attach&#233; to Rwanda earlier this year (<a href="http://rw.china-embassy.gov.cn/eng/xwdt/202402/t20240221_11248065.htm">Embassy of the PRC in Rwanda</a>, February 21). Uganda&#8217;s military, meanwhile, has purchased arms from Norinco and another Chinese firm, Poly Technologies (&#20445;&#21033;&#31185;&#25216;&#26377;&#38480;&#20844;&#21496;; &#20445;&#21033;&#31185;&#25216;), according to a 2021 investigation by a Ugandan journalist (<em><a href="https://www.independent.co.ug/uganda-buys-chinese-arms-for-war-on-adf/">The Independent [Uganda]</a></em>, December 19, 2021). In November last year, Norinco partnered with the Ugandan military to establish a research center focused on unmanned aerial vehicles (UAVs) in the country (<a href="https://www.modva.go.ug/diplomatic-partnership/updf-and-norinco-to-establish-uav-workshop-in-uganda/">MODVA</a>, November 29, 2023). The extensive access of Rwanda and Uganda to PRC-manufactured weapons, along with their support for the M23 movement, highlight the likely source of the rebel group&#8217;s large PRC-made arsenal.</p><p>To counter the escalating threat from M23, the DRC military has also turned to the PRC defense industry, purchasing its first batch of three CH-4 attack drone systems from China Aerospace and Technology Corporation (CASC; &#20013;&#22269;&#33322;&#22825;) last year (<a href="https://www.africaintelligence.com/central-africa/2023/05/22/kinshasa-receives-first-batch-of-three-chinese-attack-drones,109976363-bre">Africa Intelligence</a>, May 22, 2023). Later that year, Norinco became embroiled in controversy in the DRC when its subsidiary, Norin Mining, attempted to acquire cobalt and copper mines outside Lubumbashi, in the Katanga province, south of the M23-led insurgency in North Kivu province. The DRC state-owned mining conglomerate, G&#233;camines, moved to block the sale, claiming it had not been properly informed of the decision (<a href="https://www.africa-confidential.com/article/id/15050/State_miner_opposes_new_China_sale">Africa Confidential</a>, October 11). Although Lubumbashi is approximately 900 miles south of M23-controlled territory in North Kivu, the group conducted extensive attacks in the city during its 2014 offensive (<a href="https://www.bbc.com/news/world-africa-25645434">BBC</a>, January 7, 2014).</p><p><strong>Corruption at Defense Contractors and the Myanmar Example Raise Further Questions</strong></p><p>The PRC&#8217;s defense contractors are increasingly flocking to African markets, with the PRC surpassing Russia as the continent&#8217;s largest weapons supplier this year (<a href="https://adf-magazine.com/2024/07/china-becomes-africas-top-weapons-supplier-but-motive-and-quality-stir-debate/">ADF</a>, July 23). Norinco, which manufactures a wide range of weapons from handguns to tanks, has been at the forefront of this expansion, operating offices in over 70 countries. Its latest expansion into Dakar, Senegal, signals growth intentions in the West African market (<a href="http://en.norincogroup.com.cn/col/col432/index.html">Norinco</a>, October 8; <em><a href="https://www.scmp.com/news/china/diplomacy/article/3231408/chinese-weapons-supplier-norinco-expands-influence-west-africa-challenging-russia-and-france">SCMP</a></em>, August 21, 2023). According to its website, Norinco controls mining sites across Africa (including gold, cobalt, and palladium mines), is deeply involved in the regional copper trade, and plans further expansion (<a href="http://en.norinco.cn/col/col6501/index.html">Norinco</a>, October 8). Although there is insufficient evidence directly linking these companies to the militant groups who are using their weapons, recent developments within the PRC shed more light on these companies&#8217; practices.</p><p>Beijing has taken punitive actions against at least two senior Norinco executives since 2021 in response to corruption charges. In October 2021, PRC authorities charged former Norinco Chairman Yin Jiaxu (&#23609;&#23478;&#32490;) with bribery and seeking illegal profits for relatives and friends (<em><a href="https://peoplesdaily.pdnews.cn/china/er/30001412346">People&#8217;s Daily</a></em>, October 25, 2021). According to an official readout, Yin received &#8220;huge sums&#8221; of money and gifts, and held top positions at the company from 2002 until his 2018 retirement (<em><a href="https://www.globaltimes.cn/page/202104/1220190.shtml">Global Times</a></em>, April 4, 2021; <a href="http://m.ccdi.gov.cn/content/45/c2/82570.html">CCDI</a>, September 30, 2021). Last December, authorities removed then-Norinco Chairman Liu Shiquan (&#21016;&#30707;&#27849;) from the 14th National Committee of the Chinese People&#8217;s Political Consultative Conference amid an anti-corruption investigation into the defense and aerospace sector (<em><a href="https://jamestown.org/program/pla-personnel-shakeups-and-their-implications/">China Brief</a></em>, February 2; <em><a href="https://www.globaltimes.cn/page/202403/1308052.shtml">Global Times</a></em>, March 3). Liu had previously held senior roles at the state-owned China Aerospace Science and Industry Corporation (CASIC; &#20013;&#22269;&#33322;&#22825;&#31185;&#24037;).</p><p>These high-level disciplinary actions highlight the prominence of corruption within some of the PRC&#8217;s top defense contracting firms. Given the distance between operations in African countries and oversight by Beijing authorities, corrupt backchannels may be funneling the transfer of PRC-manufactured weapons to African militant groups for personal gain. Coupled with the involvement of Chinese criminal elements in Africa and the potential for internal corruption within the militaries of affected nations, this situation merits further investigation as a possible source of these weapons (<a href="https://www.occrp.org/en/news/report-chinas-rosewood-trade-with-mali-rigged-with-illegalities">OCCRP</a>, May 25, 2022; Africa Report, <a href="https://x.com/TheAfricaReport/status/1822905866187891029">August 12</a>; <a href="https://www.theafricareport.com/347687/in-zambia-concerns-about-growing-chinese-criminality/">May 14</a>).</p><p>The PRC&#8217;s experience in Myanmar may offer insights into this involvement in internal African conflicts, such as those in Mali and the DRC. For decades, Beijing has supported Myanmar&#8217;s ruling government while simultaneously providing material and financial backing to various armed resistance groups (<em><a href="https://jamestown.org/program/how-china-prolongs-myanmars-endless-internal-conflicts/">China Brief</a></em>, March 17, 2023; <a href="https://jamestown.org/program/peng-daxun-mndaa-leader-in-myanmar-retakes-kokang-with-chinese-assistance/">MLM</a>, July 31; <em><a href="https://www.scmp.com/news/china/diplomacy/article/3275762/does-china-risk-losing-it-all-it-plays-both-sides-myanmars-lengthy-civil-war">South China Morning Post</a></em>, August 25). Both JNIM in Mali and M23 in the DRC hold significant value for the PRC due to their access to rare and high-value resources. It is plausible that Beijing may unofficially support one or both groups to secure its continued resource access. However, if such claims are substantiated, they could damage the PRC&#8217;s reputation in Africa. Moreover, as seen in Myanmar, further conflict escalation could endanger Chinese investments and those of other nations. Moreover, JNIM&#8217;s prolonged conflict with Wagner mercenaries fighting for the Malian junta&#8212;coupled with the group&#8217;s use of PRC-manufactured weaponry&#8212;may strain the PRC&#8217;s &#8220;no limits&#8221; partnership with Moscow, particularly regarding African matters (<a href="http://www.xinhuanet.com/world/2021-01/02/c_1126937927.htm">Xinhua</a>, January 2, 2021).</p><p><strong>Conclusion</strong></p><p>The expanding presence of PRC defense contractors in Africa and the increasing use of PRC-manufactured weapons by militant groups warrant deeper investigation. However, such inquiries will likely prove challenging due to the frequently opaque nature of business dealings in these regions. What remains clear is that the growing prevalence of PRC-manufactured weapons among powerful militant groups in Africa has considerable implications as Beijing moves to dominate the African arms market. These implications include regional security, as non-state actors gain further access to advanced PRC weaponry and equipment, and geo-strategic concerns, as resource-based conflicts can potentially disrupt global supply chains. Given current trends, these threats will likely intensify as PRC defense contractors seek greater access to the continent&#8217;s arms markets.</p>]]></content:encoded></item><item><title><![CDATA[Illicit Liquidity as Battlespace: Rethinking Finance in Asymmetric Conflict]]></title><description><![CDATA[Inside the Digital Architecture Powering Proxy Warfare and State-Linked Crime]]></description><link>https://www.btl-research.com/p/illicit-liquidity-as-battlespace</link><guid isPermaLink="false">https://www.btl-research.com/p/illicit-liquidity-as-battlespace</guid><dc:creator><![CDATA[Adam Rousselle]]></dc:creator><pubDate>Fri, 25 Jul 2025 09:02:13 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!tJ8N!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F43eb67c2-14b0-4828-8ed1-52c1073ece55_640x428.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!3kMh!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa0f3519d-56f5-4368-a9f6-2536169886c2_200x32.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!3kMh!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa0f3519d-56f5-4368-a9f6-2536169886c2_200x32.png 424w, https://substackcdn.com/image/fetch/$s_!3kMh!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa0f3519d-56f5-4368-a9f6-2536169886c2_200x32.png 848w, https://substackcdn.com/image/fetch/$s_!3kMh!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa0f3519d-56f5-4368-a9f6-2536169886c2_200x32.png 1272w, https://substackcdn.com/image/fetch/$s_!3kMh!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa0f3519d-56f5-4368-a9f6-2536169886c2_200x32.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!3kMh!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa0f3519d-56f5-4368-a9f6-2536169886c2_200x32.png" width="200" height="32" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a0f3519d-56f5-4368-a9f6-2536169886c2_200x32.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:32,&quot;width&quot;:200,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:5226,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.btl-research.com/i/169170414?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa0f3519d-56f5-4368-a9f6-2536169886c2_200x32.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!3kMh!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa0f3519d-56f5-4368-a9f6-2536169886c2_200x32.png 424w, https://substackcdn.com/image/fetch/$s_!3kMh!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa0f3519d-56f5-4368-a9f6-2536169886c2_200x32.png 848w, https://substackcdn.com/image/fetch/$s_!3kMh!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa0f3519d-56f5-4368-a9f6-2536169886c2_200x32.png 1272w, https://substackcdn.com/image/fetch/$s_!3kMh!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa0f3519d-56f5-4368-a9f6-2536169886c2_200x32.png 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a></figure></div><p><em>This article was originally published in Small Wars Journal. You can find the original <a href="https://smallwarsjournal.com/2025/07/24/illicit-liquidity-as-battlespace-rethinking-finance-in-asymmetric-conflict/">here</a>. </em></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!tJ8N!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F43eb67c2-14b0-4828-8ed1-52c1073ece55_640x428.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!tJ8N!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F43eb67c2-14b0-4828-8ed1-52c1073ece55_640x428.png 424w, https://substackcdn.com/image/fetch/$s_!tJ8N!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F43eb67c2-14b0-4828-8ed1-52c1073ece55_640x428.png 848w, https://substackcdn.com/image/fetch/$s_!tJ8N!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F43eb67c2-14b0-4828-8ed1-52c1073ece55_640x428.png 1272w, https://substackcdn.com/image/fetch/$s_!tJ8N!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F43eb67c2-14b0-4828-8ed1-52c1073ece55_640x428.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!tJ8N!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F43eb67c2-14b0-4828-8ed1-52c1073ece55_640x428.png" width="640" height="428" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/43eb67c2-14b0-4828-8ed1-52c1073ece55_640x428.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:428,&quot;width&quot;:640,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:756471,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.btl-research.com/i/169170414?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F43eb67c2-14b0-4828-8ed1-52c1073ece55_640x428.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!tJ8N!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F43eb67c2-14b0-4828-8ed1-52c1073ece55_640x428.png 424w, https://substackcdn.com/image/fetch/$s_!tJ8N!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F43eb67c2-14b0-4828-8ed1-52c1073ece55_640x428.png 848w, https://substackcdn.com/image/fetch/$s_!tJ8N!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F43eb67c2-14b0-4828-8ed1-52c1073ece55_640x428.png 1272w, https://substackcdn.com/image/fetch/$s_!tJ8N!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F43eb67c2-14b0-4828-8ed1-52c1073ece55_640x428.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2><strong>Executive Summary</strong></h2><p>Illicit liquidity has emerged as the hidden scaffolding of modern conflict &#8211; a decentralized architecture enabling covert influence, conflict financing, and strategic evasion on a global scale. This report examines the continued operation of Huione, a Chinese-language criminal marketplace that facilitates large-scale financial laundering across Southeast Asia, despite public claims of shutdown. It further explores digital laundering tools more broadly, building toward a working typology. Leveraging encrypted messaging apps and informal financial networks, Huione enables the movement of billions of dollars in illicit funds through fiat-to-stablecoin conversions, card transfers, and in-person cash exchanges&#8211;critical infrastructure for state-aligned criminal actors, proxy networks, and scam-industrial complexes.</p><p>While often treated as a cybercrime or compliance issue, Huione and networks like it reflect a new reality: decentralized financial platforms now function as logistics and influence infrastructure in irregular conflict.</p><p>This article argues that the U.S. and its allies should view this laundering ecosystem not just as a criminal threat, but as a strategic enabler of adversarial statecraft. Without a shift in how threat finance is integrated into operational planning, on-chain laundering infrastructure like Huione will continue to outpace enforcement, undermine deterrence, and fuel irregular conflict below the threshold of war.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.btl-research.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.btl-research.com/subscribe?"><span>Subscribe now</span></a></p><p></p><h2><strong>Introduction</strong></h2><p>Starting in early 2024, blockchain analysts began tracing a set of suspicious transactions flowing out of <a href="https://www.democracy.community/stories/asia-democracy-chronicles-myanmars-local-centers-scam?utm_source=chatgpt.com">Shwe Kokko</a>&#8211;a lawless border town in Myanmar known for its <a href="https://www.straitstimes.com/asia/se-asia/thailand-cuts-power-to-chinese-backed-shwe-kokko-casino-complex-in-myanmar">Chinese-backed</a> casinos and scam compounds. The money trail wound through obscure stablecoin swaps, informal brokers, and encrypted Telegram channels before disappearing into the digital void. According to open-source intelligence, the proceeds, originating from online fraud and forced labor, are ultimately linked to the financial wing of the <a href="https://www.unodc.org/roseap/uploads/documents/Publications/2025/Inflection_Point_2025.pdf?utm_source=chatgpt.com">Karen National Army</a> (KNA), a militia currently engaged in armed resistance against Myanmar&#8217;s military regime.</p><p>This case is not an isolated one. Across the globe, armed groups exploit digital finance to fund their operations, evade sanctions, and project influence across borders. From Yemen&#8217;s <a href="https://gnet-research.org/2025/05/14/cash-flow-breaking-down-the-houthis-multibillion-dollar-financial-networks/">Houthi rebels</a> trading sanctioned Iranian oil with Chinese refineries, to Southeast Asian insurgents <a href="https://thediplomat.com/2025/05/us-announces-sanctions-against-myanmar-military-for-facilitating-cyber-scams/">laundering vast sums</a> in proceeds from brutally exploitative scam centers, evidence suggests militant groups increasingly launder their illicit gains through informal online networks. One such network is <em>Huione</em>, which has <a href="https://www.nytimes.com/2025/05/02/world/asia/treasury-huione-scammer-money-laundering-blacklist.html">laundered billions</a> of dollars through its highly resilient, decentralized digital infrastructure.</p><p>Huione Guarantee, a subsidiary of Huione Group, is a loosely organized network of Chinese&#8209;language Telegram channels and informal money brokers, operating out of Cambodia. It facilitates <a href="https://www.elliptic.co/blog/cyber-scam-marketplace">high-volume laundering</a> through stablecoins, escrow-like &#8220;guarantee&#8221; services, gift-card conversions, and direct fiat exchanges. Among its <a href="https://www.kharon.com/brief/huione-group-cambodia-treasury-fincen">top executives</a> is Hun To, a cousin of Cambodian President Hun Manet&#8211;one of Beijing&#8217;s most <a href="https://english.www.gov.cn/news/202504/18/content_WS68018acfc6d0868f4e8f1d74.html">reliable allies</a> in the region. Despite public claims of a <a href="https://www.chainalysis.com/blog/huione-group-shutdown-future-of-crypto-scam-infrastructure/">shutdown</a> in May, Huione continues to function as a <a href="https://www.trmlabs.com/resources/blog/huione-guarantee-and-xinbi-still-operating-on-telegram-despite-ban-underscoring-illicit-actors-persistence">critical backend</a> for scam compounds, sanctioned actors, and gray market networks.</p><p>Illicit finance is no longer a secondary enabler of conflict&#8211;it has become strategic terrain. Until military and intelligence planning fully integrates the financial dimension, adversaries will continue to weaponize liquidity with little resistance.</p><h3><strong>Legacy vs. Reality: Why Conventional CTF Tools Are Failing</strong></h3><p>For decades, counter-threat finance (CTF) operations have relied on a core set of tools: <a href="https://www.occ.treas.gov/topics/supervision-and-examination/bank-operations/financial-crime/suspicious-activity-reports/index-suspicious-activity-reports.html">Suspicious Activity Reports</a> (SARs), <a href="https://www.frbservices.org/financial-services/wires">wire transfer tracing</a>, and international cooperation through systems like <a href="https://www.swift.com/">SWIFT</a>. These models assume that most illicit finance flows through formal institutions&#8212;banks, remittance services, and regulated money transmitters. But this assumption is increasingly outdated.</p><p>Today, insurgent groups, proxy forces, and transnational criminal networks operate in a parallel financial ecosystem&#8212;one designed to avoid the very systems traditional CTF tools are built to monitor.</p><p>Instead of wire transfers, these actors use <a href="https://www.csis.org/analysis/stabilizing-us-financial-leadership-why-congress-must-get-stablecoin-regulation-right#:~:text=A%20recent%20Chainalysis%20report%20found,majority%20tied%20to%20sanctions%20evasion.">stablecoins</a>&#8211;digital tokens pegged to fiat currencies and moved easily across borders without banks. Instead of formal remittance services, they rely on <a href="https://www.lawfaremedia.org/article/the-world-s-underground-bankers">informal brokers</a>, often functioning as over-the-counter intermediaries, embedded in ethnic, linguistic, or diaspora networks. And instead of SWIFT messages, they communicate through encrypted apps like <a href="https://www.lawfaremedia.org/article/how-telegram-turbocharges-organized-crime">Telegram</a> and <a href="https://coag.gov/press-releases/phil-weiser-accountability-wechat-fentanyl-money-laundering-5-12-25/">WeChat</a>, where entire money-laundering marketplaces function out of public view.</p><p>Virtual economies&#8211;such as those embedded in <a href="https://news.un.org/en/story/2025/05/1163521">scam centers</a>, in-game <a href="https://www.amlrightsource.com/resources/digital-deception-financial-crime-in-esports-and-online-gaming#:~:text=These%20criminals%20buy%20and%20sell,the%20origin%20of%20the%20funds.">asset markets</a>, and social media <a href="https://www.law.upenn.edu/live/blogs/100-social-media-influencers-in-the-grand-scheme-of">monetization</a>&#8212;have become viable sources of revenue and platforms for money movement. These systems allow for peer-to-peer value transfer, rapid obfuscation, and low enforcement visibility, especially when shielded by weak regulatory regimes or <a href="https://www.brookings.edu/articles/chinas-role-in-the-fentanyl-crisis/">state complicity</a>.</p><p>Most CTF frameworks are <a href="https://www.fatf-gafi.org/content/dam/fatf-gafi/guidance/Opportunities-Challenges-of-New-Technologies-for-AML-CFT.pdf?utm_source=chatgpt.com">not designed</a><a href="#_msocom_2">[SS2]</a> to detect or disrupt financial flows that evade the banking system. And even when red flags are triggered, enforcement often stops at <a href="https://www.moneylaunderingnews.com/2022/06/doj-report-calls-for-international-cooperation-to-fight-digital-asset-crime/?utm_source=chatgpt.com">jurisdictional boundaries</a>. By contrast, platforms like Huione Guarantee operate within a legal gray zone&#8211;unlicensed in most of the jurisdictions they touch but are tolerated or even protected within their host countries.</p><p>The result is a growing enforcement gap. State and non-state actors alike are learning to operate in spaces where sanctions carry less relevance, banking oversight is minimal, and enforcement agencies lack both visibility and jurisdiction. Without a shift in how CTF is conceptualized and deployed, these alternative systems will continue to grow&#8211;fueling insurgency, proxy warfare&#8211; in addition to advanced criminality&#8211;far beyond their points of origin.</p><h3><strong>Case Study Cluster: Illicit Liquidity in Action</strong></h3><p>Illicit finance is now a primary enabler of armed groups operating in strategic gray zones. Whether through Huione or possibly through equivalent broker-mediated platforms, these actors rely on decentralized laundering infrastructure that overlaps with Chinese regulatory and economic ecosystems&#8211;providing both operational funding and resilience. Here are a few examples where the Huione case provides direct evidence of use, and where further research is needed to determine the nature of laundering pathways.</p><h3>Ansar Allah (AKA: The Houthis), Yemen</h3><ul><li><p>A May 2025 <a href="https://www.elliptic.co/blog/ofac-sanctions-eight-ansarallah-the-houthis-crypto-addresses">Elliptic investigation</a> linked $39 million in illicit flows to Houthi-controlled wallets via Huione-affiliated OTC brokers operating in Yemen and Southeast Asia.</p></li><li><p>In parallel, the Houthis have <a href="https://home.treasury.gov/news/press-releases/sb0090">sold Iranian oil</a> to Chinese &#8220;teapot&#8221; refineries in Shandong&#8212;allowing for off-the-books revenue outside U.S. Treasury control.</p></li><li><p>The Houthis&#8217; may have laundered these illicit oil proceeds through Huione-style stablecoin conversions, anonymized brokers, and encrypted cash channels.</p></li><li><p>The Houthis channel their illicit proceeds into ballistic missile development, drone programs, and influence operations, making illicit liquidity a <a href="https://www.wilsoncenter.org/article/houthi-arsenal">critical pillar</a> of Houthi capability.</p></li></ul><h3>Karen National Army (KNA), Myanmar</h3><ul><li><p>2025 U.S. Treasury sanctions confirm that the KNA facilitated and profited from <a href="https://home.treasury.gov/news/press-releases/sb0129?utm_source=chatgpt.com">scam compounds</a> in Shwe Kokko tied to forced labor, trafficking, and cybercrime.</p></li><li><p>Sanctioned <a href="https://home.treasury.gov/news/press-releases/sb0129?utm_source=chatgpt.com">shortly after</a> Huione, the KNA is a likely&#8211;but not publicly confirmed&#8212;user of these or similar laundering channels.</p></li><li><p>The KNA operates in territory influenced by China-tied real estate and criminal enterprises, making it <a href="https://globalinitiative.net/wp-content/uploads/2025/05/GI-TOC-Compound-crime-Cyber-scam-operations-in-Southeast-Asia-May-2025.pdf?utm_source=chatgpt.com">structurally embedded</a> in a transnational gray zone economy.</p></li><li><p>As with other conflict-linked criminal profit streams, illicit funds flowing through KNA-controlled scam operations are <a href="https://www.unodc.org/documents/firearms-protocol/2022/UNIDIR-UNODC_Adressing_the_linkages_between_illict_arms_organized_crime_and_armed_conflict.pdf?utm_source=chatgpt.com">likely channeled</a> into weapons, militia pay, and territorial control&#8211;similar to broader patterns documented in United National Office on Drugs and Crime (<a href="https://www.unodc.org/documents/firearms-protocol/2022/UNIDIR-UNODC_Adressing_the_linkages_between_illict_arms_organized_crime_and_armed_conflict.pdf?utm_source=chatgpt.com">UNODC</a>)/Global Initiative against Transnational Organized Crime (<a href="https://globalinitiative.net/wp-content/uploads/2022/08/GI-TOC-policy-brief_Arms-trafficking-web-1.pdf?utm_source=chatgpt.com">GI-TOC</a>) analysis.</p></li></ul><h3>Myanmar National Democratic Alliance (MNDAA, AKA: Kokang Army), Myanmar</h3><ul><li><p>The Myanmar National Democratic Alliance Army, composed of Mandarin-speaking ethnic Han Chinese, operates along the China-Myanmar border and <a href="https://www.voanews.com/a/china-pressures-myanmar-ethnic-groups-to-cut-ties-from-forces-perceived-as-close-to-us/7797362.html?utm_source=chatgpt.com">maintains long-standing ties</a> to Yunnan&#8217;s informal trade and finance ecosystems.</p></li><li><p>The MNDAA has operated and protected scam compounds in Kokang, including in <a href="https://www.reuters.com/world/asia-pacific/myanmar-rebels-claim-control-key-town-near-chinese-border-2024-01-05/?utm_source=chatgpt.com">Laukkai</a>, where cyber fraud targeting overseas victims has been widespread. These operations positioned the group within a broader ecosystem of illicit finance, logistics, and trafficking networks along the China-Myanmar border&#8212;though the mechanisms used to launder proceeds remain opaque.</p></li><li><p>The MNDAA has participated in Chinese-brokered <a href="https://www.reuters.com/world/asia-pacific/myanmar-military-minority-armed-group-agree-ceasefire-china-says-2025-01-20/?utm_source=chatgpt.com">ceasefires</a>, benefited from border gate openings and <a href="https://www.bnionline.net/en/news/china-reopens-border-crossings-mndaa-controlled-areas?utm_source=chatgpt.com">infrastructure access</a>, and aligned rhetorically with Beijing&#8217;s <a href="https://www.irrawaddy.com/news/ethnic-issues/mndaa-leader-vows-to-uphold-chinas-peace-policy-on-myanmar.html?utm_source=chatgpt.com">regional narrative</a>.</p></li><li><p>While no confirmed link to Huione has been documented, MNDAA&#8217;s involvement in the scam compound ecosystem and operational alignment with Yunnan&#8217;s gray finance routes make it a plausible participant in this emerging gray finance ecosystem.</p></li></ul><h3>Shared Strategic Profile</h3><ul><li><p>Each group operates near or within China&#8217;s shadow financial sphere</p></li><li><p>Each has benefited&#8211;directly or indirectly&#8211;from China&#8217;s regulatory fragmentation or tolerance of illicit flows</p></li><li><p>All use illicit finance not just for survival, but for the projection of asymmetric power</p></li></ul><h2><strong>The Illicit Liquidity Complex: A Working Typology</strong></h2><p>Over the past five years, digital laundering tools have coalesced into a loosely connected ecosystem. Armed groups, <a href="https://globalinitiative.net/analysis/where-does-north-korea-get-its-cash/">sanctioned regimes</a>, and criminal syndicates now operate within a shared financial domain. This domain is best described as an Illicit Liquidity Complex.</p><p>The Illicit Liquidity Complex does not operate as a single platform or network. It functions as an ecosystem of loosely affiliated brokers, laundering channels, and pseudo-legitimate financial services. These components collectively enable high-speed, low-visibility liquidity transfer across borders. The system&#8217;s effectiveness stems not from technical sophistication. It derives from structural fragmentation, operational adaptability, and regulatory absence.</p><h2><strong>Core Components</strong></h2><ul><li><p><strong>Informal Stablecoin Brokers</strong>: Middlemen who convert crypto to fiat and back&#8212;usually by communicating on Telegram or WeChat&#8212;without know-your-customer (KYC) protocols, often tied to language or diaspora trust networks.</p></li><li><p><strong>Shadow Financial Rails</strong>: Infrastructure that moves value without touching the banking system: OTC desks, Telegram-based escrow services&#8211;<a href="https://www.lawfaremedia.org/article/telegram-is-cooperating-with-authorities--for-now">often automated</a> or managed anonymously, in-person swaps, gift card laundering, and multiple <a href="https://www.merklescience.com/blog/merkle-science-multi-hop-feature">wallet hops</a>.</p></li><li><p><strong>Pseudo-Legitimate Platforms</strong>: Exchanges, fintech front ends, or &#8220;payment services&#8221; that provide a compliant fa&#231;ade while facilitating high-volume laundering behind the scenes (Ex: Huione).</p></li><li><p><strong>Social Monetization Layers</strong>: Streaming apps, fake shops, and in-game tipping tools that convert scam earnings into surface-level income&#8212;popular among scam syndicates and hybrid operators.</p></li></ul><p>The convergence of state-backed threats and informal financial systems makes this multifaceted ecosystem especially dangerous. State-aligned militias, cybercriminals, and sanctioned entities now use the same rails &#8211; or closely related ones. The same Huione-linked broker might move funds for a scam ring one day and a sanctioned militant group the next. This ecosystem is no longer merely a criminal concern; it is a form of financial infrastructure &#8211; built for plausible deniability, speed, and resilience. Its growth is outpacing what traditional enforcement can track.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.btl-research.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.btl-research.com/subscribe?"><span>Subscribe now</span></a></p><h2><strong>Toward a Strategic Response</strong></h2><p>Confronting the Illicit Liquidity Complex will require more than conventional financial enforcement. Traditional counter-threat finance methods&#8212;built around SARs and bank-led compliance&#8211;fail to engage the architecture of decentralized, broker-mediated laundering networks. A coherent response must address both tactical intervention and strategic adaptation across military, regulatory, and intelligence domains.</p><h3>Tactical Responses</h3><ul><li><p><strong>Map financial enablers in active and emerging conflict zones</strong></p><p></p><p>Conventional tools do not capture the movement of funds that never enter formal institutions. Field-level analysts and signal intelligence (SIGINT) operators must track informal stablecoin brokers, peer-to-peer transactions, and escrow services that exist entirely outside the banking system. Mapping should prioritize network structures and chokepoints&#8211;not just endpoints.</p></li><li><p><strong>Target and disrupt laundering infrastructure</strong></p><p></p><p>Focused action against digital escrow providers, laundering-as-a-service platforms like Huione and OTC brokers can have disproportionate impact. These entities perform functional roles similar to tunnels, supply caches, or encrypted communications. Their removal degrades adversarial force projection and financial resilience.</p></li></ul><h3>Strategic Shifts</h3><ul><li><p><strong>Embed financial mapping in counterinsurgency (COIN) and hybrid warfare doctrine</strong></p><p></p><p>Financial networks must be treated as terrain. This includes embedding forensic financial analysis into campaign planning, target development, and stability operations. Doctrinal integration should treat laundering infrastructure as both a logistics system and a narrative engine.</p><p></p></li><li><p><strong>Partner with blockchain analytics firms and adjacent platforms</strong></p><p></p><p>Blockchain firms possess tools to trace stablecoin movement, cross-chain swaps, and laundering loops. Partnerships with these firms&#8211;along with digital platforms vulnerable to abuse (e.g., <a href="https://kpmg.com/de/en/home/insights/2025/03/online-gaming-a-virtual-paradise-for-money-launderers.html">gaming economies</a>, <a href="https://www.amlrightsource.com/resources/money-laundering-through-social-media-and-online-gaming">social streaming</a> networks)&#8211;will expand visibility into high-velocity, low-signature financial flows.</p></li><li><p><strong>Build multi-jurisdictional regulatory frameworks</strong></p><p></p><p>Financial fragmentation remains one of the greatest enablers of illicit liquidity. Ireland and the EU have moved toward <a href="https://www.centralbank.ie/regulation/markets-in-crypto-assets-regulation/micar---frequently-asked-questions?utm_source=chatgpt.com">tighter regulation</a> of stablecoin flows and informal brokers through Markets in Crypto Assets Regulation (MiCAR). Such frameworks should be expanded and adapted to other high-risk environments, including Southeast Asia, the Gulf, and Central Asia.</p></li></ul><p><strong>Conclusion: Mapping the Unseen Battlespace</strong></p><p>Illicit liquidity now constitutes core terrain in modern conflict. Armed groups, proxy actors, and sanctioned states no longer rely on traditional banking or formal remittance channels. They exploit decentralized laundering infrastructure&#8212;composed of stablecoin brokers, escrow bots, and regionally protected financial corridors&#8212;to finance operations, sustain logistics, and wage narrative warfare.</p><p>Platforms like Huione are not peripheral or purely criminal. They function as tactical assets&#8211;digital equivalents of tunnels, weapons caches, or encrypted communications. These systems enable recruitment through economic incentives, fund weapons acquisition, and sustain political influence across borders. Their continued operation erodes deterrence and complicates battlefield intelligence.</p><p>Failure to identify, map, and degrade these systems will cede initiative in conflicts that remain below the threshold of war. The architecture behind illicit liquidity functions as enemy infrastructure and must be treated as such, with its operators prioritized as strategic targets. Without this shift, irregular actors will continue to weaponize liquidity&#8211;transforming stablecoins and informal brokers into engines of asymmetric power.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.btl-research.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Between the Lines is a reader-supported publication. To receive new posts and support my work, consider becoming a paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[Mali’s Environmental Crisis: The Link Between Climate Change and JNIM’s Rapid Expansion]]></title><description><![CDATA[Mali's climate crisis has been a boon for militant groups in the country, including the region's most dangerous]]></description><link>https://www.btl-research.com/p/malis-environmental-crisis-the-link</link><guid isPermaLink="false">https://www.btl-research.com/p/malis-environmental-crisis-the-link</guid><dc:creator><![CDATA[Adam Rousselle]]></dc:creator><pubDate>Tue, 29 Apr 2025 13:05:27 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!1skG!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2184a628-6a7c-449b-b06c-b081ccfe3cf5_1200x800.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!L_Is!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!L_Is!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png 424w, https://substackcdn.com/image/fetch/$s_!L_Is!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png 848w, https://substackcdn.com/image/fetch/$s_!L_Is!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png 1272w, https://substackcdn.com/image/fetch/$s_!L_Is!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!L_Is!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png" width="676" height="188" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:188,&quot;width&quot;:676,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:32791,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:&quot;&quot;,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!L_Is!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png 424w, https://substackcdn.com/image/fetch/$s_!L_Is!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png 848w, https://substackcdn.com/image/fetch/$s_!L_Is!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png 1272w, https://substackcdn.com/image/fetch/$s_!L_Is!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a></figure></div><p><strong>This is an article I recently wrote for the Global Network of Extremism and Technology (GNET). You can find the original link <a href="https://gnet-research.org/2025/04/29/malis-environmental-crisis-the-link-between-climate-change-and-jnims-rapid-expansion/">here</a>.</strong></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!1skG!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2184a628-6a7c-449b-b06c-b081ccfe3cf5_1200x800.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!1skG!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2184a628-6a7c-449b-b06c-b081ccfe3cf5_1200x800.png 424w, https://substackcdn.com/image/fetch/$s_!1skG!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2184a628-6a7c-449b-b06c-b081ccfe3cf5_1200x800.png 848w, https://substackcdn.com/image/fetch/$s_!1skG!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2184a628-6a7c-449b-b06c-b081ccfe3cf5_1200x800.png 1272w, https://substackcdn.com/image/fetch/$s_!1skG!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2184a628-6a7c-449b-b06c-b081ccfe3cf5_1200x800.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!1skG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2184a628-6a7c-449b-b06c-b081ccfe3cf5_1200x800.png" width="1200" height="800" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2184a628-6a7c-449b-b06c-b081ccfe3cf5_1200x800.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:800,&quot;width&quot;:1200,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1706846,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.btl-research.com/i/162407619?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2184a628-6a7c-449b-b06c-b081ccfe3cf5_1200x800.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!1skG!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2184a628-6a7c-449b-b06c-b081ccfe3cf5_1200x800.png 424w, https://substackcdn.com/image/fetch/$s_!1skG!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2184a628-6a7c-449b-b06c-b081ccfe3cf5_1200x800.png 848w, https://substackcdn.com/image/fetch/$s_!1skG!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2184a628-6a7c-449b-b06c-b081ccfe3cf5_1200x800.png 1272w, https://substackcdn.com/image/fetch/$s_!1skG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2184a628-6a7c-449b-b06c-b081ccfe3cf5_1200x800.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em><a href="https://www.mei.edu/publications/disorder-they-thrive-how-rural-distress-fuels-militancy-and-banditry-central-sahel">Image source</a></em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.btl-research.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.btl-research.com/subscribe?"><span>Subscribe now</span></a></p><p>Mali has been in a climate crisis for over half a century, experiencing at least 40 <a href="https://www.worldbank.org/en/country/mali/publication/economic-update-mali-2023-building-financial-resilience-in-response-to-recurrent-droughts">climate-related</a> shocks between 1970 and 2020. Last summer, the country withstood <a href="https://reliefweb.int/report/mali/west-africa-seasonal-monitor-2024-season-june-update">droughts</a> and <a href="https://reliefweb.int/disaster/fl-2024-000144-mli">flooding</a>, affecting some 400,000 people and costing some $9.5 million USD in annual crop revenues in one of the <a href="https://www.worldbank.org/en/country/mali/overview">world&#8217;s poorest</a> countries. These climate shocks have contributed to and exacerbated the country&#8217;s brutal and multifaceted civil war, which started in 2012, by driving recruitment and opening revenue-generating opportunities for militant groups. Although ethnic tensions in Mali&#8217;s arid and sparsely populated north gave rise to the conflict, it has since spread to the more salubrious south, with radical Islamist groups emerging as powerful contenders to unite the country&#8217;s disparate groups.</p><p>Jihadist militant groups have thrived amid Mali&#8217;s ongoing climate crisis. Malian people comprise roughly a dozen <a href="https://www.cia.gov/the-world-factbook/countries/mali/#people-and-society">ethnic groups</a> speaking <a href="https://translatorswithoutborders.org/language-data-for-mali/">79 languages</a>, and with 95% of the population adhering to Sunni Islam, Islamist ideologies are among any faction&#8217;s best chances to unite the various peoples of this complex and diverse land. The al-Qaeda-linked Jama&#8217;at Nusrat al-Islam wal-Muslimin (JNIM) is the most powerful of these factions and is responsible for 64% of all <a href="https://africacenter.org/wp-content/uploads/2020/11/ASB-38-EN.pdf">violent events</a> linked to Islamist groups in the Sahel since 2017. Its steady expansion and threat to the lives and livelihoods of Mali&#8217;s increasingly desperate population are an indirect consequence of the region&#8217;s worsening climate crisis.</p><p>Based in Mali&#8217;s extreme north and formed from a merger between four terror groups under the nominal leadership of longtime Tuareg warlord <a href="https://www.icc-cpi.int/defendant/iyad-ag-ghaly">Iyad Ag Ghaly</a>, JNIM has <a href="https://www.nationalsecurity.gov.au/what-australia-is-doing/terrorist-organisations/listed-terrorist-organisations/jamaat-nusrat-al-islam-wal-muslimin#:~:text=3%20November%202017.-,Details%20of%20the%20organisation,Faso%2C%20Niger%2C%20and%20Togo.">spread rapidly</a> across Mali and into Burkina Faso, Niger, Togo, and Benin. Much of this expansion results from the organisation&#8217;s ability to incorporate and co-opt <a href="https://acleddata.com/2023/11/13/actor-profile-jamaat-nusrat-al-islam-wal-muslimin-jnim/">other militant groups</a> under its broad umbrella while capitalising on the Sahel&#8217;s worsening climate crisis. This Insight explores how JNIM takes advantage of the Sahel&#8217;s climate crisis regarding recruitment and revenue generation while gaining access to increasingly sophisticated weaponry and posing an ever-expanding regional threat.</p><p><strong>Climate-Induced Desperation Drives JNIM Recruitment</strong></p><p>Mali&#8217;s role in world history is inestimable. Its lands were once the cradle of great civilisations such as the <a href="https://www.gardnermuseum.org/experience/metal-honor/gold/gallery-guide">Malian Empire</a>, the world&#8217;s leading supplier of gold in the 14th Century, the influx of which to Europe was so great that it gave rise to the gold-backed <a href="https://globalcapitalism.history.ox.ac.uk/files/ghocmansamusainmalipdf">currencies</a> that defined modern states until the mid-20th Century. However, modern Mali has become increasingly inhospitable to human life, with the country&#8217;s average <a href="https://climateknowledgeportal.worldbank.org/sites/default/files/2018-10/wb_gfdrr_climate_change_country_profile_for_MLI.pdf">annual temperature</a> rising by 0.7 degrees Celsius since 1960, its annual rainfall decreasing steadily, and its vast arid regions expanding rapidly. These trends have made much of the country&#8217;s north untenably dry, driving cattle herders such as the nomadic Fulani south into the traditional territory of the predominantly agricultural and sedentary Dogon, leading to <a href="https://www.aljazeera.com/program/in-the-field/2019/8/24/mali-in-crisis-the-fight-between-the-dogon-and-fulani#:~:text=It%20is%20an%20ancestral%20conflict,nomadic%20herders%20of%20the%20Sahel.">intense competition</a> over land and resources between two of the country&#8217;s largest ethnic groups. This conflict and others across Mali drive recruitment into armed militia groups, many of which JNIM has incorporated into its organisation.</p><p>Climate change drives jihadist recruitment in myriad ways. First, it and subsequent factional conflicts diminish people&#8217;s ability to produce income via stable means. For example, increased aridity and flooding result in reduced <a href="https://www.fao.org/4/i2856e/i2856e.pdf">crop yields</a> for farmers, while jihadist groups such as JNIM frequently <a href="https://acninternational.org/mali-hunger-the-new-weapon-of-the-jihadists-to-subjugate-the-population/">prevent farmers</a> from harvesting, using hunger and unemployment as means to drive recruitment and occupy new lands. The climate crisis also affects fishing as the increasing aridity of the Niger River&#8217;s flood plains, combined with overfishing, has left local fishers with fewer available stocks. This trend greatly limits the availability of dietary protein in the region, worsening the hunger crisis that continues to draw recruits to jihadist organisations. Moreover, al-Qaeda-linked jihadists, now organised under JNIM&#8217;s banner, <a href="https://www.rfi.fr/en/along-the-mighty-niger-river-fewer-fish-and-more-jihadists">frequently target</a> local fishermen traversing the waterways, making their trade increasingly unsustainable.</p><p>A <a href="https://www.sipri.org/publications/2021/sipri-policy-papers/climate-related-security-risks-and-peacebuilding-mali">2021 report</a> by the Stockholm International Peace Research Institute (SIPRI) demonstrates a likely correlation between climate change and jihadist recruitment in Mali. Farah Hegazi, one of the report&#8217;s authors, claimed in a <a href="https://www.dw.com/en/sipri-mali-sahel-climate-change-security/a-57276945?maca=en-rss-en-all-1573-rdf">2021 interview</a> that data she and others collected suggests a relationship between rainfall in central Mali and child soldier recruitment, with families tending to send more children to armed groups as a form of income in drier periods and fewer during periods of higher precipitation. Since 2016, JNIM and other jihadist groups have <a href="https://acleddata.com/2024/09/30/newly-restructured-the-islamic-state-in-the-sahel-aims-for-regional-expansion/">increasingly relied on child soldiers</a> to fill their ranks as the conflict over the Sahel intensifies.</p><p>Increased scarcity has <a href="https://africacenter.org/publication/growing-complexity-farmer-herder-conflict-west-central-africa/">exacerbated the disparity</a> between local elites and lower-caste young men, fissures that jihadist groups such as JNIM exploit to drive recruitment. JNIM frequently <a href="https://monitoring.bbc.co.uk/product/c204qwhm">uses Telegram</a> and chat rooms such as <a href="https://humanglemedia.com/the-dark-world-of-jihadist-propaganda-channels-on-telegram/">Rocket Chat and Element</a> to reach potential recruits, publicise its attacks, and distribute other propaganda to perpetuate narratives. These narratives tend to capitalise on local grievances related to the climate crisis, such as class and unemployment, as well as others, such as the junta government&#8217;s reliance on <a href="https://understandingwar.org/backgrounder/africa-file-september-19-2024-jnim-strikes-bamako-hungary-enters-sahel-ethiopia-somalia#:~:text=Jama'at%20Nusrat%20al%20Islam%20(JNIM)%20likely%20conducted,frequent%20activity%20in%20and%20around%20the%20capital">Russian Wagner</a> mercenaries, which are <a href="https://rusi.org/explore-our-research/publications/commentary/mixed-picture-how-mali-views-wagner-group">broadly unpopular</a> due to their penchant for excessive and often extreme force, widespread <a href="https://warontherocks.com/2023/02/mercenary-shocks-what-the-war-in-ukraine-will-eventually-mean-for-africa/">resource theft</a>, and general failure to uphold their security mandate.</p><p><strong>Climate Crisis Opens Revenue Streams for JNIM</strong></p><p>Because Mali has fewer opportunities in agriculture, the sector that traditionally provides employment for the vast majority of the country, many young men have turned to illegal <a href="https://www.povertyactionlab.org/evaluation/opportunities-improve-expansion-and-impact-agricultural-lending-mali#:~:text=In%20Mali%2C%2080%20percent%20of,sorghum%2C%20millet%2C%20and%20groundnuts.">timber harvesting</a> to earn a living. This trend has further exacerbated Mali&#8217;s climate crisis by contributing to widespread deforestation: over the past three decades, the <a href="https://apnews.com/article/mali-deforestation-climate-change-trees-3ee1452f74503c42f1eb28cf919f6330">country has lost</a> over 20,000 square kilometres of forest due to illegal harvesting and increased desertification. This deforestation contributes to Mali&#8217;s <a href="https://www.treeaid.org/blogs-updates/unprecedented-flooding-in-mali/#:~:text=Bamako%2C%20Mali%20%E2%80%93%2010th%20September,pressure%20on%20already%20vulnerable%20populations.">flood vulnerability</a> due to the land&#8217;s reduced ability to absorb rainwater, further devastating agrarian output. However, with a lack of fuel alternatives, the population has little choice but to <a href="https://apnews.com/article/mali-deforestation-climate-change-trees-3ee1452f74503c42f1eb28cf919f6330">cut down</a> their dwindling forests for basic necessities such as cooking, with poachers even cutting down trees planted by activists for firewood.</p><p>JNIM has also capitalised on this trend by involving itself in the illegal trade of rare timbers. Mali&#8217;s illicit sales of precious hardwood species such as ebony and <a href="https://gnet-research.org/2024/11/25/from-trees-to-terror-jnims-use-of-online-rosewood-sales-to-fuel-expansion/">rosewood have spiked in recent years</a> as demand from Chinese <a href="https://thediplomat.com/2024/11/chinese-demand-for-rosewood-empowers-some-of-africas-deadliest-terrorist-groups/">criminal syndicates</a>, heavily involved in local harvesting and trafficking, has spiked. JNIM has extended its racketeering operations, already heavily involved in regional <a href="https://www.atlanticcouncil.org/blogs/africasource/the-sahel-is-now-an-epicenter-of-drug-smuggling-that-is-terrible-news-for-everyone/">narcotics trafficking</a>, to timber smuggling, providing protection services to illegal loggers in exchange for payment. Unverified local sources claim that some Chinese timber traffickers pay <a href="https://issafrica.s3.amazonaws.com/site/uploads/ocwar-t-report-13-eng.pdf">protection fees</a> to JNIM in exchange for their services, and evidence suggests that Chinese domestic e-commerce platforms such as Baidu and Taobao <a href="https://gnet-research.org/2024/11/25/from-trees-to-terror-jnims-use-of-online-rosewood-sales-to-fuel-expansion/">market illegal Malian rosewood</a>. JNIM&#8217;s <a href="https://jamestown.org/program/prc-manufactured-weapons-abound-among-african-militant-groups/">widespread use</a> of Chinese-made small arms and light weapons (SALW) also warrants further investigation.</p><p>Gold is another lucrative revenue stream for JNIM and is also an indirect consequence of the group&#8217;s capitalising on the climate crisis in Mali&#8217;s fertile and <a href="https://www.britannica.com/place/Mali/Resources-and-power">gold-rich</a> southwest. JNIM has expanded its revenue from <a href="https://www.s-rminform.com/srm-insights/artisanal-mining-crime-militancy-in-africa">artisanal mines</a>, acquiring new lands by driving away increasingly desperate farmers using hunger and other means. Although Mali has laws that apply to gold exports, illegal miners there and in several other countries across Africa export vast sums of gold each year, with <a href="https://apnews.com/article/gold-smuggling-africa-uae-switzerland-e1a614c465766f1c3e90fb9e5a5167a2">major destinations</a> including the United Arab Emirates (UAE), T&#252;rkiye and others. Both countries are important hubs for international gold transactions, including online sellers, whom regulators have struggled to rein in regarding gold from illicit sources.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.btl-research.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.btl-research.com/subscribe?"><span>Subscribe now</span></a></p><p><strong>Advanced Weapons</strong></p><p>JNIM&#8217;s <a href="https://www.militantwire.com/p/jnim-al-qaeda-attacks-international">expanding arsenal</a> of advanced weaponry indirectly results from its ability to capitalise on the Sahel&#8217;s ongoing climate crisis. On one hand, JNIM&#8217;s ability to exploit the crisis and gain access to new revenue sources gives it the ability to purchase better weapons. On the other hand, JNIM&#8217;s improved ability to launch attacks with these increasingly advanced weapons gives it the ability to capture more advanced weapons from enemy forces. In this way, JNIM&#8217;s expanding militarisation is a self-perpetuating cycle firmly rooted in Mali&#8217;s climate crisis.</p><p>Chinese small arms and light weapons feature prominently in JNIM&#8217;s arsenal, allowing the group to inflict widespread attacks on government and civilian targets while expanding and maintaining its territorial holdings. The group also increasingly harnesses more <a href="https://acleddata.com/conflict-watchlist-2025/sahel-and-coastal-west-africa/">advanced weapons</a> such as mortars, rockets, improvised explosive devices (IEDs), and drones. JNIM tends to use modified <a href="https://acleddata.com/conflict-watchlist-2025/sahel-and-coastal-west-africa/">commercial drones</a> for offensive operations, outfitting these with explosives to drop on enemy targets or explode on impact in a kamikaze attack. Experts claim that drone usage by JNIM and other groups has increasingly levelled the <a href="https://www.military.africa/2025/02/the-rise-of-drone-warfare-insurgents-and-terrorists-in-africa/">playing field</a> between conventional militaries and non-state actors in the region. Although little information exists as to how JNIM and other jihadist groups in the Sahel acquire commercial drones, the market for these items is extensive, with both local and international manufacturers fulfilling the region&#8217;s burgeoning demand. It is possible that JNIM sources some of these devices from intermediaries in neighbouring countries using e-commerce platforms; this also warrants further investigation.</p><p><strong>Recommendations</strong></p><p>There are no easy answers to Mali&#8217;s worsening and concurrent ecological and security crises. Since <a href="https://www.europarl.europa.eu/RegData/etudes/ATAG/2021/690671/EPRS_ATA(2021)690671_EN.pdf">its 2021 coup</a>, the Malian government has become <a href="https://gjia.georgetown.edu/2024/01/17/the-mali-puzzle-international-isolation-anti-french-sentiments-and-withdrawal-of-un-peacekeepers/">increasingly isolated</a> from much of the world, instead turning to Russia and China to fulfil its dire security needs. These partnerships have done little to advance security in the country. Russia&#8217;s Wagner Group, engaged in widespread atrocities and resource theft, generates little more than disdain from the local population and remains generally feckless in its counterinsurgency mandate. Meanwhile, a <a href="https://jamestown.org/program/prc-manufactured-weapons-abound-among-african-militant-groups/">massive influx</a> of Chinese weapons into the country has not given the military the tools it needs to engage in meaningful counterterrorism operations, with many of these items now wielded by militant groups such as JNIM.</p><p>Last September, Mali&#8217;s government announced a partnership with Chinese tech giant Huawei to aid in the country&#8217;s &#8216;digital transformation&#8217;, with the goal of <a href="https://www.ecofinagency.com/public-management/0409-45846-mali-partners-with-huawei-to-speed-up-digital-transformation">enhancing security</a> through digital surveillance and other means. The following month, the junta regime announced it was lifting its operational ban on US-based satellite internet company Starlink for six months to develop a comprehensive <a href="https://techpoint.africa/news/mali-lifts-starlink-ban/">regulatory framework</a> during this period. Clearly, the regime seeks partners from the global tech industry to help fulfil its security needs. Although Starlink&#8217;s operations in Mali remain controversial, this timeframe gives it and potentially other Western tech companies the opportunity to meaningfully engage the Malian regime in ways that could advance goals related to counterterrorism moving forward.</p><p>Cooperation between technology companies and Mali could help improve the country&#8217;s security through enhanced digital surveillance while facilitating dialogue between the regime and foreign governments that could provide invaluable solutions in counterinsurgency operations. Given the regime&#8217;s abysmal <a href="https://www.amnesty.org/en/location/africa/west-and-central-africa/mali/report-mali/">human rights record</a>, companies should approach this prospect cautiously. However, anything that advances security in Mali could help ameliorate one of the world&#8217;s most dire ecological and humanitarian crises.</p><p>For example, under improved security conditions in Mali, legitimate mining companies could reinvest in the country&#8217;s vast and <a href="https://theconversation.com/mining-mali-how-policy-changes-are-reshaping-the-sector-249232?utm_source=clipboard&amp;utm_medium=bylinecopy_url_button">largely untapped</a> mineral reserves. Moreover, an improved security situation in the countryside would likely provide a boon to the agricultural sector. Gold and cotton are Mali&#8217;s <a href="https://tradingeconomics.com/mali/exports#:~:text=Mali%20main%20export%20is%20gold,%2C%20fertilizers%2C%20oil%20and%20iron.">top exports</a>, upon which it relies heavily to purchase fuel from the global market, with fuel representing 42% of its <a href="https://tradingeconomics.com/mali/imports#:~:text=Dec%202023-,Mali%20Imports,China%2C%20France%20and%20Ivory%20Coast.">total imports</a> by value. By improving the security situation to bolster these exports, Mali may import greater quantities of necessities such as fuel, taking pressure off its dwindling forests that are continually decimated for firewood. Moreover, reduced illegal logging for fuel would likely provide less cover to groups such as JNIM, who currently profit from the sale of rare timbers with impunity. This theoretical example is just one possible benefit that improved dialogue between Mali and the outside world could bring, and companies such as Starlink can help facilitate this through cautious first steps with a less-than-savoury regime.</p><p>There are also things tech companies can do to stem the flow of funds to JNIM, Mali&#8217;s most dangerous terrorist group, as a result of its profiteering from the country&#8217;s climate crisis. First, platform providers, including Apple and Google, can continue to pressure apps that fail to conform to their standards by permitting the dissemination of terrorist propaganda, such as Telegram and RocketChat. Second, social media platforms should work with global governments to strengthen the global regulatory framework for combating illegal gold transfers. Although the UAE and others have <a href="https://prema-consulting.com/uaes-new-laws-on-gold-imports-up-to-dh5-million-fine-for-violators/">attempted to regulate</a> the flow of illicit gold bullion into their countries, the problem persists, requiring enhanced global regulatory oversight. Until such enhanced oversight occurs, social media companies should carefully evaluate any company seeking to advertise online gold trading services on their platforms. Third, Chinese e-commerce companies should work to limit the sale of illicit rare timbers on their domestic platforms, for no other reason than the terrorist activity they help facilitate threatens <a href="https://warontherocks.com/2021/09/al-shabaab-and-chinese-trade-practices-in-mozambique/">Chinese interests</a> and citizens working in Africa. Finally, e-commerce companies should work closely with regional and local law enforcement to map the sale of commercial drones to militant groups. This mapping likely requires extensive intelligence and data gathering, which are currently sorely lacking in the region.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.btl-research.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Between the Lines is a reader-supported publication. To receive new posts and support my work, consider becoming a paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[ Combating Islamic State Finance: Central Asia and Around the World]]></title><description><![CDATA[According to the United Nations, the Islamic State&#8217;s most successful regional financial offices include al-Karrar, al-Furqan, and al-Siddiq. This series breaks down each office&#8217;s operations.]]></description><link>https://www.btl-research.com/p/combating-islamic-state-finance-central</link><guid isPermaLink="false">https://www.btl-research.com/p/combating-islamic-state-finance-central</guid><dc:creator><![CDATA[Adam Rousselle]]></dc:creator><pubDate>Mon, 10 Mar 2025 11:01:43 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!3lb6!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8598b70f-0849-465d-b718-a2efc35700bd_868x613.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!L_Is!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!L_Is!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png 424w, https://substackcdn.com/image/fetch/$s_!L_Is!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png 848w, https://substackcdn.com/image/fetch/$s_!L_Is!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png 1272w, https://substackcdn.com/image/fetch/$s_!L_Is!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!L_Is!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png" width="676" height="188" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:188,&quot;width&quot;:676,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:32791,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:&quot;&quot;,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!L_Is!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png 424w, https://substackcdn.com/image/fetch/$s_!L_Is!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png 848w, https://substackcdn.com/image/fetch/$s_!L_Is!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png 1272w, https://substackcdn.com/image/fetch/$s_!L_Is!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a></figure></div><p><strong>This is an article I recently wrote for the Global Network of Extremism and Technology (GNET). You can find the original link <a href="https://gnet-research.org/2025/02/17/combating-the-islamic-state-finance-somalia-and-the-pan-african-nexus/">here</a>.</strong></p><blockquote><p><strong>This article was cited in the Financial Action Task Force (FATF) Report on Terrorist Financing, the most authoritative global assessment of terrorist financing risks in 2025, which you can <a href="https://www.fatf-gafi.org/en/publications/Methodsandtrends/comprehensive-update-terrorist-financing-risks-2025.html#:~:text=Paris%2C%208%20July%202025%20%E2%80%93%20A,trends%20and%20thus%20respond%20effectively.">find here</a>. </strong></p></blockquote><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.btl-research.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.btl-research.com/subscribe?"><span>Subscribe now</span></a></p><p>The Afghan-based Islamic State Khorasan Province (ISKP) has become the Islamic State&#8217;s (IS) primary arm for inflicting brutal attacks on the world stage. On 3 January 2024, two ISKP suicide bombers <a href="https://www.aljazeera.com/news/2024/1/3/heinous-world-reacts-to-twin-blasts-that-kill-dozens-in-iran">detonated themselves</a> within 10&#8211;20 minutes of each other at a memorial ceremony for General Kassem Suleimani in Kerman, Iran, killing 95 and injuring 284 others. Less than three months later, ISKP gunmen <a href="https://www.voanews.com/a/ambassadors-lay-flowers-at-site-of-moscow-concert-hall-massacre-/7550547.html">opened fire</a> at a crowd attending a concert at Moscow&#8217;s Crocus City Hall before setting the venue ablaze, killing 145 people and injuring at least 551. <a href="https://gnet-research.org/2024/06/27/iskps-latest-campaign-expanded-propaganda-and-external-operations/">ISKP propaganda regularly calls for attacks</a> in South Asia, China, and the West, increasing the threat of another similar or perhaps more deadly attack in the future.</p><p>The primary financial facilitator behind these and other vicious attacks is Maktab al-Siddiq (the al-Siddiq office), which oversees a vast illicit financial network that raises money through donations and receives money from other regional counterparts, transferring vast sums through a vast global network of financiers. Although the office has faced many setbacks amid crackdowns by international law enforcement, it remains resilient, broadening its global network in a likely effort to evade further detection. This Insight explores Maktab al-Siddiq&#8217;s sources of revenue and the global financial infrastructure it uses to finance some of the world&#8217;s deadliest terrorist attacks.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!3lb6!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8598b70f-0849-465d-b718-a2efc35700bd_868x613.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!3lb6!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8598b70f-0849-465d-b718-a2efc35700bd_868x613.png 424w, https://substackcdn.com/image/fetch/$s_!3lb6!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8598b70f-0849-465d-b718-a2efc35700bd_868x613.png 848w, https://substackcdn.com/image/fetch/$s_!3lb6!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8598b70f-0849-465d-b718-a2efc35700bd_868x613.png 1272w, https://substackcdn.com/image/fetch/$s_!3lb6!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8598b70f-0849-465d-b718-a2efc35700bd_868x613.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!3lb6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8598b70f-0849-465d-b718-a2efc35700bd_868x613.png" width="868" height="613" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8598b70f-0849-465d-b718-a2efc35700bd_868x613.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:613,&quot;width&quot;:868,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;ISKP&#8217;s recruiting strategies and vulnerabilities in Central Asia&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="ISKP&#8217;s recruiting strategies and vulnerabilities in Central Asia" title="ISKP&#8217;s recruiting strategies and vulnerabilities in Central Asia" srcset="https://substackcdn.com/image/fetch/$s_!3lb6!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8598b70f-0849-465d-b718-a2efc35700bd_868x613.png 424w, https://substackcdn.com/image/fetch/$s_!3lb6!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8598b70f-0849-465d-b718-a2efc35700bd_868x613.png 848w, https://substackcdn.com/image/fetch/$s_!3lb6!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8598b70f-0849-465d-b718-a2efc35700bd_868x613.png 1272w, https://substackcdn.com/image/fetch/$s_!3lb6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8598b70f-0849-465d-b718-a2efc35700bd_868x613.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>Maktab al-Siddiq</strong></p><p>As part of the IS&#8217;s <a href="https://ctc.westpoint.edu/the-general-directorate-of-provinces-managing-the-islamic-states-global-network/">General Directorate of Provinces</a> (GDP), Maktab al-Siddiq oversees IS finances across much of Asia. According to the US State Department, the <a href="https://home.treasury.gov/system/files/136/Fact-Sheet-on-Countering-ISIS-Financing.pdf">office employs</a> unregistered money services businesses, established hawala networks, cash couriers, and virtual assets to finance subordinates in Afghanistan, Pakistan, India, Bangladesh, Maldives, and the Philippines. Through these financial tools, Maktab al-Siddiq allocates funds to various IS operations worldwide, such as for last year&#8217;s attacks in Iran and Russia. A man known as <a href="https://www.criticalthreats.org/analysis/the-state-of-al-qaeda-and-isis-in-2023">Tamim al-Kurdi</a> has reportedly run the office from somewhere in Afghanistan since 2020; however, he is barely mentioned in the existing literature on the organisation.</p><p>Because Maktab al-Siddiq is the primary financial facilitator of the ISKP, which has become the IS&#8217;s most notorious constituent group, it has attracted considerable attention and pressure from global authorities, forcing it to adapt. Although the office previously <a href="https://home.treasury.gov/system/files/136/Fact-Sheet-on-ISIS-Financing.pdf">generated revenue</a> from illicit activities such as extortion, kidnapping for ransom, and robbery, it has since outsourced these criminal activities to its subordinate groups, who transfer money back to the regional office when funds run low. Even with the arrests and deaths of key operatives and facilitators from <a href="https://static.rusi.org/op-taliban-campaign-against-islamic-state.pdf">Afghanistan</a>, <a href="https://www.nacta.gov.pk/around-70-most-wanted-terrorists-of-daesh-al-qaeda-held-from-across-punjab/">Pakistan</a>, <a href="https://www.aljazeera.com/news/2025/2/3/senior-isil-somalia-commander-captured-in-puntland">Somalia</a>, <a href="https://www.lemonde.fr/en/international/article/2024/11/25/an-islamic-state-network-that-wanted-to-reach-europe-has-been-dismantled-in-cote-d-ivoire-and-madagascar_6734016_4.html">Syria</a>, and <a href="https://www.dw.com/en/turkey-arrests-189-islamic-state-suspects/a-67857827">T&#252;rkiye</a> in 2023 and early 2024, the office has reportedly recovered. This resilience is likely the product of the organisation&#8217;s ability to spread its influence globally, <a href="https://jamestown.org/program/voice-of-khorasan-magazine-and-the-internationalization-of-islamic-states-anti-taliban-propaganda/">soliciting donations</a> from a broadening global base of donors and relying on operatives to complete transfers from many locations.</p><p><strong>Limited Local Revenue Generation Potential</strong></p><p>Maktab al-Siddiq is unlike its African counterparts in terms of local revenue generation, as its subordinate groups do not control significant territories. The ISKP once controlled mines in eastern Afghanistan&#8217;s Nangarhar province, generating millions of dollars in profits by smuggling resources such as talc, marble and lapis lazuli through channels in Pakistan and onto global markets. However, a 2018 <a href="https://www.rferl.org/a/afghan-us-forces-clear-militants-from-nangarhar/29351367.html">US-backed operation</a> to clear militants from key mining sites in Nangarhar and the subsequent 2021 <a href="https://www.hrw.org/news/2022/07/07/afghanistan-taliban-execute-disappear-alleged-militants#:~:text=Taliban%2DISKP%20Conflict%20in%20Nangarhar,to%20ISKP%20in%20the%20province.">Taliban takeover</a> of the province significantly reduced the ISKP&#8217;s ability to generate revenue there. Although the Taliban have been largely successful in gaining control over Afghanistan&#8217;s vast mineral wealth, the ISKP <a href="https://www.specialeurasia.com/2025/01/27/afghanistan-chinese-killed/">routinely targets</a> Chinese mine workers in the country, demonstrating that the battle for these resources is far from over. Nevertheless, the IS likely generates little, if any, revenue from Afghan-based resources today.</p><p>Rather than generating revenue through controlled lands, the ISKP and other groups under the purview of al-Siddiq generate funds through more covert means such as <a href="https://thesoufancenter.org/intelbrief-2024-april-10/">extortion, robbery and kidnapping</a> for ransom. In 2020, IS operatives reportedly commanded a &#8216;growing share&#8217; of Pakistan and Afghanistan&#8217;s <a href="https://www.wsj.com/articles/islamic-state-defeated-u-s-foe-still-brims-with-cash-ambition-11600464409">illicit tobacco</a> markets, although it is unknown whether these groups still generate revenue in this way at present. Because of this limited potential for local revenue generation, al-Siddiq and its subordinates have become increasingly dependent on external funding sources, relying on a complex web of regional and global partners to deliver funds to their intended destinations.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.btl-research.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.btl-research.com/subscribe?"><span>Subscribe now</span></a></p><p><strong>Global Funding Sources and Reliance on Intermediaries</strong></p><p>Given the high level of scrutiny al-Siddiq faces from international authorities, it is likely that the office functions as a clearing house between various IS branches, directing transfers when needed. In this way, the office serves as a steward for much of the IS&#8217;s global financial infrastructure, overseeing a diverse and international group of operators who carry out complex transfers using hawala networks and crypto exchanges. Recent crackdowns and geopolitical shifts have caused these funding networks to become increasingly global and diffuse, with this trend likely to continue as global authorities move against the organisation.</p><p>Al-Siddiq raises money by <a href="https://gnet-research.org/2024/10/04/the-rise-of-monero-iskps-preferred-cryptocurrency-for-terror-financing/">soliciting donations</a> through its propaganda channels, including the <em>Voice of Khorasan </em>magazine, which its subordinate, <a href="https://monitoring.bbc.co.uk/product/c204ub5t">al-Azaim</a> Media Foundation, publishes in multiple languages on a monthly basis. Each issue of the magazine includes an advertisement soliciting donations from readers in Monero, the IS&#8217;s preferred cryptocurrency due to its enhanced privacy protections (Fig 1). It includes obscured transaction details that make it especially difficult for international authorities to detect.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Hbx6!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73ccb1d9-10b0-49e2-b3fa-9ffd5cd7a916_856x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Hbx6!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73ccb1d9-10b0-49e2-b3fa-9ffd5cd7a916_856x1024.png 424w, https://substackcdn.com/image/fetch/$s_!Hbx6!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73ccb1d9-10b0-49e2-b3fa-9ffd5cd7a916_856x1024.png 848w, https://substackcdn.com/image/fetch/$s_!Hbx6!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73ccb1d9-10b0-49e2-b3fa-9ffd5cd7a916_856x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!Hbx6!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73ccb1d9-10b0-49e2-b3fa-9ffd5cd7a916_856x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Hbx6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73ccb1d9-10b0-49e2-b3fa-9ffd5cd7a916_856x1024.png" width="856" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/73ccb1d9-10b0-49e2-b3fa-9ffd5cd7a916_856x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:856,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!Hbx6!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73ccb1d9-10b0-49e2-b3fa-9ffd5cd7a916_856x1024.png 424w, https://substackcdn.com/image/fetch/$s_!Hbx6!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73ccb1d9-10b0-49e2-b3fa-9ffd5cd7a916_856x1024.png 848w, https://substackcdn.com/image/fetch/$s_!Hbx6!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73ccb1d9-10b0-49e2-b3fa-9ffd5cd7a916_856x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!Hbx6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73ccb1d9-10b0-49e2-b3fa-9ffd5cd7a916_856x1024.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Figure 1: The donation solicitation page at the end of most Voice of Khurasan issues. Obtained via Jihadology.</p><p>The donor base that funds al-Siddiq-linked groups, such as the ISKP, is increasingly geographically diverse. Although these groups <a href="https://eurasianet.org/tajik-islamic-state-network-fundraises-in-russia">previously solicited</a> donations closer to home, such as from ethnic Tajiks and other Central Asians living in Russia via Telegram groups and QIWI, a Russian payments app, it is unclear whether <a href="https://www.rferl.org/a/central-asian-migrants-russian-jails--sverdlovsk/33275555.html">Russian crackdowns</a> since the Crocus City Hall attacks have stymied these revenue streams. Moreover, sanctions imposed on Russia following its invasion of Ukraine most likely prohibit any significant <a href="https://www.bbc.com/news/business-60521822">international transactions</a> in roubles using Russian financial institutions. Recent arrests demonstrate how al-Siddiq-linked groups have broadened their donor base, such as the <a href="https://www.trmlabs.com/post/german-authorities-arrest-man-suspected-of-sending-cryptocurrency-to-iskp">June 2024</a> arrest of a German man for transferring over US $1,700 worth of cryptocurrency to an ISKP-linked account. In another example from last December, UK authorities arrested a <a href="https://www.bbc.com/news/articles/cjdn0elvpv2o">24-year-old Luton man</a> who allegedly transferred over &#163;16,000 worth of Monero to the ISKP. These are just some of the many arrests associated with ISKP-linked donors over the past two years, with the growing reach of <a href="https://eurasianet.org/perspectives-iskp-intensifying-online-propaganda-targeting-russia-and-central-asia">IS propaganda</a> on platforms such as Telegram, Theema, RocketChat, and others likely playing an essential role in this trend.</p><p><strong>Local Crackdowns Give Rise to an Increasingly Global Funding Network</strong></p><p>Maktab al-Siddiq and its subordinates rely heavily on external revenue sources and the intermediaries who facilitate the flow of funds. This reliance on external actors has required the organisation to foster a vast global network of financial facilitators in multiple countries. For example, the <a href="https://gnet-research.org/2024/10/04/the-rise-of-monero-iskps-preferred-cryptocurrency-for-terror-financing/">ISKP transferred</a> at least <a href="https://home.treasury.gov/system/files/136/Fact-Sheet-on-ISIS-Financing.pdf">$2,000 in virtual assets to the group in Moscow </a>responsible for carrying out the Crocus City Hall attack, likely using established al-Siddiq channels. As authorities continue to crack down on IS financial operations, these channels have become increasingly geographically broad.</p><p>Maktab al-Siddiq receives <a href="https://ctc.westpoint.edu/islamic-state-somalia-a-growing-global-terror-concern/">considerable funding</a> from the Somalia-based Maktab al-Karrar, which oversees a vast illicit financial network spanning much of eastern, central, and southern Africa. A United Nations report from early 2023 found that al-Karrar was sending US $25,000 per month in cryptocurrency to the ISKP, a subordinate of Maktab al-Siddiq, with a July 2024 UN report finding that al-Karrar was the ISKP&#8217;s top revenue source.</p><p>According to USUS authorities, T&#252;rkiye has been a <a href="https://www.hstoday.us/featured/crowdfunding-and-cryptocurrency-fuel-renewed-efforts-to-smuggle-islamic-state-fighters-from-syrian-detention/">key transit hub</a> for many global IS transfers, with IS operatives using local cryptocurrency exchanges, Hawala networks, and cash transfer apps such as <a href="https://www.hstoday.us/featured/crowdfunding-and-cryptocurrency-fuel-renewed-efforts-to-smuggle-islamic-state-fighters-from-syrian-detention/">PayPal and Western Union</a> to move money into the country before transferring it to other affiliated groups worldwide. In T&#252;rkiye, the interests of al-Karrar and al-Siddiq likely merged in the past, with the former taking advantage of local crypto exchanges to transfer funds to the ladder. However, recent moves by Turkish authorities will likely cause operatives from both regional offices to seek new ways to transfer funds between them.</p><p>Turkish authorities have made <a href="https://www.ndtv.com/world-news/turkey-arrests-over-100-suspected-members-of-islamic-state-6451644">sweeping moves</a> to crack down on IS operatives in the country, arresting more than 3,600 suspected operatives since June 2023, according to official figures. In 2021, the international crime watchdog Financial Action Task Force (FATF) placed T&#252;rkiye on its <a href="https://www.reuters.com/world/middle-east/simsek-indicates-that-turkey-removed-fatf-watchdogs-grey-list-2024-06-28/">&#8216;grey list&#8217;</a> due in part to the country&#8217;s role as a hub for terrorist financing, limiting international credit to the country and exacerbating its <a href="https://www.bbc.com/news/topics/c6xkk152803t">economic crisis</a>. T&#252;rkiye is a major hub for cryptocurrency trading, and regulators there have <a href="https://dig.watch/updates/turkey-to-enforce-strict-crypto-rules-by-2025#:~:text=Key%20measures%20include%20mandatory%20identity,take%20effect%20in%20February%202025.">recently introduced measures</a> to combat criminal and terrorist financial networks through enhanced oversight and identification systems. The country has also cracked down on <a href="https://nordicmonitor.com/2024/10/erdogan-govt-aware-of-isis-financiers-in-turkey-took-years-to-act/">hawala networks</a>, with many jewellers there acting as hawaladars due to the relatively stable value of their goods amid the country&#8217;s ongoing <a href="https://www.exportfinance.gov.au/resources/world-risk-developments/2022/june/turkey-high-inflation-and-low-interest-rates-threaten-economic-crisis/">inflationary crisis</a>. Turkish authorities also collaborated with their <a href="https://www.trmlabs.com/post/turkish-and-tajik-authorities-make-key-arrests-in-terror-network-disruption">counterparts in Tajikistan</a> &#8211; also a hub for IS financing &#8211; leading to the arrest of IS financiers in both countries in 2022 and 2023. Further, authorities identified US $2 million in suspicious transactions on the TRON blockchain in conjunction with TRM Labs and Binance. Binance also announced it <a href="https://moneyandbanking.co.th/en/2023/59872/">collaborated</a> with Tajikistan&#8217;s National Bank and other government agencies to disrupt terrorist financing there.</p><p>These crackdowns contributed to the FATF&#8217;s removal of T&#252;rkiye from its grey list in June 2024, and Ankara will likely continue to take harsh measures against terrorist financiers moving forward. For this reason, T&#252;rkiye is likely no longer a prime destination for IS financial transactions, as authorities continue to crack down on illicit activity, limiting the intersection between illicit hawala and crypto exchange activity. Similarly, enhanced scrutiny in Tajikistan and other Central Asian states, such as <a href="https://about.rferl.org/article/central-asia-in-focus-uzbek-authorities-detain-17-young-men-who-planned-to-join-isis/">Uzbekistan</a>, will also likely cause IS to look elsewhere for cryptocurrency transit hubs. As with al-Siddiq&#8217;s donor base, these sustained crackdowns will likely necessitate a further diffusion of the IS&#8217;s global financial network.</p><p>Recent events demonstrate the broad geographic reach of IS financial facilitators. In 2023, the US Treasury <a href="https://home.treasury.gov/news/press-releases/jy1659">designated</a> key individuals and companies based in the Maldives under their Office of Foreign Assets Control (OFAC) in relation to IS fundraising activity. The Maldives is a <a href="https://blog.upay.best/crypto-adoption/maldives/">growing market</a> for cryptocurrency adoption, noted for its lack of a clear regulatory regime, making it a potentially important node in terrorist financing. On a per capita basis, the Maldives sent <a href="https://www.lowyinstitute.org/the-interpreter/maldives-legacy-islamic-state">more recruits</a> to fight for the IS than any other between 2013 and 2018, and many of these veterans likely reside in the country at present.</p><p>In Spain, police arrested a Jordanian national in February 2024 on charges <a href="https://www.trmlabs.com/post/jordanian-national-arrested-in-spain-for-sending-200-000-euros-in-cryptocurrencies-to-the-islamic-state">related to transferring</a> &#8364;200,000 worth of Tether (USDT) on the TRON blockchain to various IS funding campaigns. The amount suggests that the suspect acted as an intermediary, receiving the funds from multiple sources before transferring them to IS-linked accounts. Last July, German police arrested two suspected IS operatives in Hamburg in connection with participating in a financing network, collecting <a href="https://www.generalbundesanwalt.de/SharedDocs/Pressemitteilungen/EN/2024/Pressemitteilung-vom-25-07-2024-engl.html">cash donations</a> and transferring them to IS sources. In December 2024, police in the US arrested a 35-year-old man in connection with providing <a href="https://www.justice.gov/opa/pr/virginia-man-convicted-crypto-financing-scheme-isis">material support</a> to the IS.</p><p>Although it is unclear whether these individuals are specifically related to official al-Siddiq channels, they nonetheless demonstrate the broad global reach of IS financial networks, of which al-Siddiq is a beneficiary. As global crackdowns on IS activity continue, the organisation will have to continue to adapt as it has done before.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.btl-research.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.btl-research.com/subscribe?"><span>Subscribe now</span></a></p><p><strong>Recommendations</strong></p><p>Disrupting al-Siddiq&#8217;s increasingly broad and diffuse network of global financiers is essential to thwarting further attacks by groups such as the ISKP. Adopting more robust regulatory measures in countries such as T&#252;rkiye is a positive development. Still, the lack of formal regulations in other countries, such as the Maldives, represents a significant problem. For this reason, international law enforcement agencies and blockchain intelligence platforms such as TRM Labs should work to identify suspicious transactions, especially in countries lacking coherent regulations, and advocate for reform in countries with underdeveloped regulatory bodies. This approach is likely more effective than targeting individual donors and propaganda, which this series covered in <a href="https://gnet-research.org/2025/02/17/combating-the-islamic-state-finance-somalia-and-the-pan-african-nexus/">Part 1.</a></p><p>Last October, <a href="https://regtechtimes.com/18-caught-in-monero-money-laundering-scheme-in/">Japanese authorities</a> arrested 18 suspects on suspicion of money laundering using Monero. Monero uses advanced privacy technologies such as ring signatures and stealth addresses that make it difficult to track to follow transactions. Nonetheless, Japanese authorities identified US $670,000 worth of Monero transactions over several months by linking suspicious transactions to stolen credit card purchases on an e-commerce platform. Although other countries&#8217; crypto markets may differ from Japan&#8217;s, this example could serve as a template for tracking illicit finance using Monero moving forward. Fintech firms, cryptocurrencies, and financial institutions should be forthcoming and aid wherever they can in such investigations.</p><p>Cryptocurrency trading platforms can play an essential role in identifying suspicious users and their transactions. Because companies such as Binance operate across global markets, they can serve as an essential mediator between international and local law enforcement, providing important recommendations and insights into suspicious local activities. Local and international open-source analysts can also play an essential role in this regard.</p><p>Finally, hawala networks represent a significant challenge for international authorities. Although combatting them is mostly a matter for local police, banks and international payment processors such as Western Union, PayPal and Wise should monitor closely for suspicious transactions as hawala networks rely on these in some instances to make up for cash from other transfers.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.btl-research.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Between the Lines is a reader-supported publication. To receive new posts and support my work, consider becoming a paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[Combating Islamic State Finance: West Africa and the Sahel ]]></title><description><![CDATA[According to the United Nations, the Islamic State&#8217;s most successful regional financial offices include al-Karrar, al-Furqan, and al-Siddiq. This is the second part of a three-part series.]]></description><link>https://www.btl-research.com/p/combating-islamic-state-finance-west</link><guid isPermaLink="false">https://www.btl-research.com/p/combating-islamic-state-finance-west</guid><dc:creator><![CDATA[Adam Rousselle]]></dc:creator><pubDate>Mon, 03 Mar 2025 12:46:14 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!PgEq!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd7f0583-f765-4962-97df-870aede0d9a0_800x450.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!L_Is!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!L_Is!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png 424w, https://substackcdn.com/image/fetch/$s_!L_Is!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png 848w, https://substackcdn.com/image/fetch/$s_!L_Is!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png 1272w, https://substackcdn.com/image/fetch/$s_!L_Is!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!L_Is!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png" width="676" height="188" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:188,&quot;width&quot;:676,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:32791,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:&quot;&quot;,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!L_Is!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png 424w, https://substackcdn.com/image/fetch/$s_!L_Is!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png 848w, https://substackcdn.com/image/fetch/$s_!L_Is!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png 1272w, https://substackcdn.com/image/fetch/$s_!L_Is!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a></figure></div><p><strong>This is an article I recently wrote for the Global Network of Extremism and Technology (GNET). You can find the original link <a href="https://gnet-research.org/2025/02/18/combating-islamic-state-finance-west-africa-and-the-sahel/">here</a>.</strong></p><blockquote><p><strong>This article was cited in the Financial Action Task Force (FATF) Report on Terrorist Financing, the most authoritative global assessment of terrorist financing risks in 2025, which you can <a href="https://www.fatf-gafi.org/en/publications/Methodsandtrends/comprehensive-update-terrorist-financing-risks-2025.html#:~:text=Paris%2C%208%20July%202025%20%E2%80%93%20A,trends%20and%20thus%20respond%20effectively.">find here</a>. </strong></p></blockquote><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!PgEq!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd7f0583-f765-4962-97df-870aede0d9a0_800x450.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!PgEq!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd7f0583-f765-4962-97df-870aede0d9a0_800x450.webp 424w, https://substackcdn.com/image/fetch/$s_!PgEq!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd7f0583-f765-4962-97df-870aede0d9a0_800x450.webp 848w, https://substackcdn.com/image/fetch/$s_!PgEq!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd7f0583-f765-4962-97df-870aede0d9a0_800x450.webp 1272w, https://substackcdn.com/image/fetch/$s_!PgEq!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd7f0583-f765-4962-97df-870aede0d9a0_800x450.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!PgEq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd7f0583-f765-4962-97df-870aede0d9a0_800x450.webp" width="800" height="450" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cd7f0583-f765-4962-97df-870aede0d9a0_800x450.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:450,&quot;width&quot;:800,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:40352,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/webp&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.btl-research.com/i/158287526?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd7f0583-f765-4962-97df-870aede0d9a0_800x450.webp&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!PgEq!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd7f0583-f765-4962-97df-870aede0d9a0_800x450.webp 424w, https://substackcdn.com/image/fetch/$s_!PgEq!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd7f0583-f765-4962-97df-870aede0d9a0_800x450.webp 848w, https://substackcdn.com/image/fetch/$s_!PgEq!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd7f0583-f765-4962-97df-870aede0d9a0_800x450.webp 1272w, https://substackcdn.com/image/fetch/$s_!PgEq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd7f0583-f765-4962-97df-870aede0d9a0_800x450.webp 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>The Islamic State West Africa Province (ISWAP) occupies much of the Lake Chad basin. <a href="https://www.bbc.com/pidgin/tori-58918419">Image source</a></em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.btl-research.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.btl-research.com/subscribe?"><span>Subscribe now</span></a></p><p>The Islamic State (IS) and its affiliate groups in West Africa and the Sahel remain resilient to the counterterrorism efforts of local and international authorities. Overseeing these groups is <a href="https://ctc.westpoint.edu/the-general-directorate-of-provinces-managing-the-islamic-states-global-network/">Maktab al-Furqan</a> (the Furqan office), an elusive organisation likely based in Nigeria that provides local IS branches with operational guidance and international funding under the purview of the General Directorate of Provinces (GDP). According to UN reports, Al-Furqan is one of the <a href="https://ctc.westpoint.edu/the-general-directorate-of-provinces-managing-the-islamic-states-global-network/">three most successful</a> financial branches of the Islamic State&#8217;s General Directorate of Provinces (GDP), along with the <a href="https://gnet-research.org/2025/02/17/combating-the-islamic-state-finance-somalia-and-the-pan-african-nexus/">Somalia-based al-Karrar</a> and the Afghan-based al-Siddiq. This Insight will examine what we know about al-Furqan, the organisations it oversees, its financial role in broader IS operations, and the potential threat this confluence of interests could pose moving forward.</p><p><strong>What We Know About Maktab al-Furqan</strong></p><p>Maktab al-Furqan derives its name from <a href="https://www.bbc.com/news/world-middle-east-37619225">Abu Mohammed al-Furqan</a>, the former IS minister of information who died in a US airstrike in Raqqa, Syria, on 7 September 2016. The organisation also <a href="https://www.dhs.gov/sites/default/files/publications/15-271-IA%20-%20Media%20Arms%20-%20Maniglia_update_v11_accessible.pdf">shares its name</a> with al-Furqan Media Foundation, a propaganda arm of the IS. Abu Bakr ibn Muhammad ibn &#8216;Ali <a href="https://www.counterextremism.com/extremists/abu-bakr-ibn-muhammad-ibn-ali-al-mainuki">al-Mainuki</a>, a Nigerian national born in 1982, currently leads Maktab al-Furqan on behalf of the GDP, having served in senior roles since around 2018.</p><p>Personal differences between al-Mainuki and Boko Haram leader Mamman Nur reportedly contributed to a public and <a href="https://acleddata.com/knowledge-base/acled-methodology-for-coding-boko-haram-and-iswap-factions/">acrimonious split</a> between the two organisations in 2016 that weakened the IS&#8217;s regional presence. However, al-Furqan remains one of the Islamic State&#8217;s &#8220;<a href="https://www.counterextremism.com/extremists/abu-bakr-ibn-muhammad-ibn-ali-al-mainuki">most vigorous</a> and best-established regional networks.&#8221; In 2023, US Secretary of State Antony Blinken <a href="https://www.federalregister.gov/documents/2023/06/16/2023-12870/designation-of-abdallah-makki-muslih-al-rufayi-and-abu-bakr-ibn-muhammad-ibn-ali-al-mainuki-as">imposed sanctions</a> on al-Mainuki and three others concerning their senior roles in the IS organisation, freezing any assets and blocking all asset transfers associated with him in the global financial system.</p><p>According to a May 2024 report by the US Department of Treasury:</p><p><em>&#8220;The ISIS branch in West Africa engages with the formal financial sector by using bank accounts to transfer money. Al-Furqan Office, which has a strong base in Nigeria and oversees ISIS-West Africa and other ISIS branches in the Sahel, Tunisia, Algeria, Libya, Cameroon, Niger and Chad.&#8221;</em></p><p>The Department of Treasury also assessed that unlike its more successful counterpart, Maktab al-Karrar, al-Furqan is likely seeking additional income due to a lack of stable revenue. Nevertheless, al-Furqan has protocols in place that maintain the regional financial structure of IS operations. For example, it <a href="https://ctc.westpoint.edu/the-general-directorate-of-provinces-managing-the-islamic-states-global-network/">reportedly collects</a> 50 per cent of funds generated by the larger Islamic State West Africa Province (ISWAP) in Nigeria and redistributes them to smaller branches in Mali, Burkina Faso, Niger, and Chad, which fall under the purview of the newly restructured Islamic State&#8211;Sahel Province (ISSP). Moreover, with Nigeria now the world&#8217;s <a href="https://newlinesmag.com/reportage/the-rise-and-fall-of-cryptocurrency-in-nigeria/#:~:text=An%20estimated%2033%25%20of%20the,upon%20which%20cryptocurrencies%20are%20built.">second-largest</a> cryptocurrency trading market, al-Furqan likely plays a pivotal role in regional and global IS finance.</p><p>According to experts, with Nigeria&#8217;s nearly US $60 million in cryptocurrency transfers in 2023 and <a href="https://newlinesmag.com/reportage/the-rise-and-fall-of-cryptocurrency-in-nigeria/#:~:text=An%20estimated%2033%25%20of%20the,upon%20which%20cryptocurrencies%20are%20built.">an estimated 33% of Nigerians investing in cryptocurrencies</a>, the IS and other terrorist groups can easily <a href="https://adf-magazine.com/2024/10/islamic-state-group-uses-cryptocurrency-to-finance-attacks/">hide their transactions</a> within this growing centre of trading activity. The US Treasury also claims that the IS has been expanding its use of <a href="https://home.treasury.gov/system/files/136/Fact-Sheet-on-ISIS-Financing.pdf">virtual assets</a> in Africa since January 2024, with Nigeria-based Maktab al-Furqan likely playing a role in this process. With the IS reportedly moving away from cryptocurrencies such as Bitcoin and Tether to Monero, which offers <a href="https://thesoufancenter.org/intelbrief-2024-october-16/">enhanced privacy</a>, al-Furqan can likely further disguise its activities within the Nigerian crypto market. Moreover, IS groups increasingly <a href="https://gnet-research.org/2024/10/04/the-rise-of-monero-iskps-preferred-cryptocurrency-for-terror-financing/">solicit donations</a> in Monero through propaganda outlets such as its <em>Voice of Khorasan </em>publication, and it is possible that the organisation routes some of these solicited donations through entities associated with Maktab al-Furqan, given the scope of Nigeria&#8217;s crypto market.</p><p><strong>Branches Under al-Furqan Remain Resilient Despite Operational Setbacks</strong></p><p>Maktab Al-Furqan oversees two provinces of the IS, the ISWAP and the newly restructured Islamic State&#8211;Sahel Province (ISSP). ISWAP bases its operations along the shores of Lake Chad in northern Nigeria, where it generates revenue from <a href="https://pulitzercenter.org/stories/iswaps-tax-system-bleeding-farmers-dry-northeastern-nigeria">local taxation</a> on farmers and fishermen, as well as robbing civilians and kidnapping for ransom. The group&#8217;s 2016 split from Boko Haram has diminished its local revenue sources, and the two groups continue to vie for territorial control; on 13 January, ISWAP fighters <a href="https://www.bangkokpost.com/world/2938786/jihadists-kill-at-least-40-farmers-in-northeast-nigeria">murdered</a> at least 40 local farmers for reportedly straying into their lands. In December 2021, an action group founded by the Economic Community of West African States (ECOWAS) found that ISWAP was moving around US <a href="https://punchng.com/iswap-moves-n18bn-annual-revenue-through-nigerias-financial-system-ecowas-body/">$36 million</a> in funds generated in its territories through Nigeria&#8217;s legitimate financial system annually, likely with the involvement of Maktab al-Furqan.</p><p>The ISSP is primarily centred in northern Mali and is one of the <a href="https://www.clingendael.org/sites/default/files/2024-01/27_Burkina_Faso.pdf">most violent and active</a> terrorist organisations in the Sahel region, with a <a href="https://www.dni.gov/nctc/terrorist_groups/isis_sahel.html">track record</a> of targeting Malian, Wagner, and US military personnel as well as local civilians. It also receives funding from ISWAP via Maktab al-Furqan. The current literature provides little insight into how Maktab al-Furqan sends funds to the ISSP; however, it likely heavily relies on <a href="https://www.investopedia.com/terms/h/hawala.asp">hawala</a>, informal and largely unregulated financial systems used to send money internationally. Although the ISSP regularly contends with <a href="https://www.understandingwar.org/backgrounder/foreign-fighters-and-jihadi-rivalry-sahel-somalia-backslides">opposing forces</a> such as the al-Qaeda-linked Jama&#8217;at Nusrat al Islam wa al Muslimin (JNIM) and Russia&#8217;s Wagner Group, since January 2023, the group has focused on <a href="https://acleddata.com/2024/09/30/newly-restructured-the-islamic-state-in-the-sahel-aims-for-regional-expansion/">expanding its territories</a>, particularly in northeast Mali&#8217;s Gao and Menako regions.</p><p>Northern Mali is a lucrative route for the global narcotics trade, with local traffickers working with powerful cartels in Latin America to <a href="https://www.aljazeera.com/news/2023/8/27/isil-doubled-territory-it-controls-in-mali-in-less-than-a-year-un">traffic drugs</a> through the country&#8217;s north into Algeria and onto the European markets. If the ISSP can successfully seize these lucrative trafficking routes, it could become a significant revenue generator for the IS organisation and, with the help of Maktab al-Furqan, could funnel some of this revenue to finance global attacks by other branches, such as the Islamic State Khorasan Province (ISKP).</p><p><strong>Regulatory Environment and Recommendations</strong></p><p>Combating the ongoing expansion of IS in West Africa and the Sahel requires a systematic approach to the group&#8217;s local finances. Although military and police responses have had a limited impact to date, Nigerian authorities have initiated <a href="https://www.ibanet.org/overview-of-cryptocurrency-regulatory-landscape-nigeria">regulatory responses</a> to the country&#8217;s growing cryptocurrency market in part due to concerns over terrorist financing. These responses include <a href="https://www.bloomberg.com/news/articles/2024-01-03/nigeria-slaps-strict-rules-on-banks-after-lifting-cryptocurrency-ban">restricting banks</a> and other financial institutions from trading in cryptocurrencies and limiting such transactions to regulated peer-to-peer platforms. These regulations aim to curtail cryptocurrency use in illicit activities like terrorist financing by requiring platforms to conduct transactions through approved channels and disclose key information about those involved in trading. In April 2024, Nigerian authorities secured a <a href="https://www.efcc.gov.ng/efcc/news-and-information/news-release/10019-court-grants-efcc-order-to-freeze-1146-suspicious-accounts">court order</a> to freeze the assets of 1,146 suspicious accounts related to unauthorised forex trading, money laundering and terrorist financing.</p><p>The limited amount of information available on IS and Maktab al-Furqan&#8217;s financial activity in West Africa requires further research by international law enforcement, financial institutions, and fintech companies. Because IS networks rely heavily on Monero, a cryptocurrency that offers enhanced privacy compared to Bitcoin or Tether, industry professionals and international law enforcement should work closely with Nigerian authorities to trace suspicious transactions that may be associated with al-Furqan or the groups it oversees.</p><p>Hawala networks likely play an important role in IS&#8217;s growing influence in West Africa, especially regarding transfers between groups facilitated by Maktab al-Furqan. Limiting the use of such networks could play an essential role in limiting IS expansion in West Africa, particularly as ISSP relies on transfers facilitated by Maktab al-Furqan that, if left unchecked, could facilitate its seizure of highly lucrative narco-trafficking routes. Recently, the Central Bank of Nigeria (CBN) adopted new <a href="https://studentreview.hks.harvard.edu/how-can-nigeria-divert-remittance-flows-to-formal-channels/">licensing guidelines</a> with the aim of combating hawala by offering competitive rates and more reliable services. As Nigeria&#8217;s legitimate fintech sector continues to grow, global fintech firms should work to foster its development by sharing best practices related to cybercrime and counter-terrorism.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.btl-research.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Between the Lines is a reader-supported publication. To receive new posts and support my work, consider becoming a paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Combating Islamic State Finance: Somalia and the Pan-African Nexus]]></title><description><![CDATA[According to the United Nations, the Islamic State&#8217;s most successful regional financial offices include al-Karrar, al-Furqan, and al-Siddiq. This series breaks down each office&#8217;s operations.]]></description><link>https://www.btl-research.com/p/combating-the-islamic-state-finance</link><guid isPermaLink="false">https://www.btl-research.com/p/combating-the-islamic-state-finance</guid><dc:creator><![CDATA[Adam Rousselle]]></dc:creator><pubDate>Tue, 25 Feb 2025 06:03:37 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!C4P3!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb2f92c23-1b42-4ef4-a7dc-8e76ca80dc48_1024x576.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p></p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!L_Is!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!L_Is!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png 424w, https://substackcdn.com/image/fetch/$s_!L_Is!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png 848w, https://substackcdn.com/image/fetch/$s_!L_Is!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png 1272w, https://substackcdn.com/image/fetch/$s_!L_Is!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!L_Is!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png" width="676" height="188" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:188,&quot;width&quot;:676,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:32791,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:&quot;&quot;,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!L_Is!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png 424w, https://substackcdn.com/image/fetch/$s_!L_Is!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png 848w, https://substackcdn.com/image/fetch/$s_!L_Is!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png 1272w, https://substackcdn.com/image/fetch/$s_!L_Is!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a></figure></div><p><strong>This is an article I recently wrote for the Global Network of Extremism and Technology (GNET). You can find the original link <a href="https://gnet-research.org/2025/02/17/combating-the-islamic-state-finance-somalia-and-the-pan-african-nexus/">here</a>.</strong></p><blockquote><p><strong>This article was cited in the Financial Action Task Force (FATF) Report on Terrorist Financing, the most authoritative global assessment of terrorist financing risks in 2025, which you can <a href="https://www.fatf-gafi.org/en/publications/Methodsandtrends/comprehensive-update-terrorist-financing-risks-2025.html#:~:text=Paris%2C%208%20July%202025%20%E2%80%93%20A,trends%20and%20thus%20respond%20effectively.">find here</a>. </strong></p><p><strong>It was also cited in a <a href="https://africacenter.org/wp-content/uploads/2025/07/2025-07-CTCVE-CTOC-Workshop-Guide.pdf">July 2025 report</a> from the Africa Center for Strategic Studies, a U.S. Department of Defense Institution. </strong></p></blockquote><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.btl-research.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.btl-research.com/subscribe?"><span>Subscribe now</span></a></p><p>Atop <a href="https://thesomalidigest.com/islamic-state-in-somalia-strategically-takes-over-al-miskaad/">Cal Miskaad</a>, an arid 2,000 meter-high mountain range in northeast Somalia&#8217;s Puntland region, an international cohort of Islamic State (IS) operatives oversee one of the organisation&#8217;s most important financial hubs. In recent years, IS fighters in Somalia have been central to the financial integration of much of the organisation&#8217;s African operations, including in the Democratic Republic of Congo, Mozambique, Uganda, and South Africa, into an increasingly cohesive network that funds the group&#8217;s growing global presence. These groups have already sent money to fund Afghan-based <a href="https://aoav.org.uk/2023/financing-terror-the-islamic-state-in-the-khorasan-region/">IS operations</a>, and given the enormous revenue-generating potential of their respective regions, there is a high risk that they will continue funding further global attacks. This Insight examines the financial evolution of the Islamic State&#8217;s African operations, its sources of revenue, and how the tech industry can address this growing threat.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!C4P3!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb2f92c23-1b42-4ef4-a7dc-8e76ca80dc48_1024x576.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!C4P3!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb2f92c23-1b42-4ef4-a7dc-8e76ca80dc48_1024x576.jpeg 424w, https://substackcdn.com/image/fetch/$s_!C4P3!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb2f92c23-1b42-4ef4-a7dc-8e76ca80dc48_1024x576.jpeg 848w, https://substackcdn.com/image/fetch/$s_!C4P3!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb2f92c23-1b42-4ef4-a7dc-8e76ca80dc48_1024x576.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!C4P3!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb2f92c23-1b42-4ef4-a7dc-8e76ca80dc48_1024x576.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!C4P3!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb2f92c23-1b42-4ef4-a7dc-8e76ca80dc48_1024x576.jpeg" width="1024" height="576" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b2f92c23-1b42-4ef4-a7dc-8e76ca80dc48_1024x576.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:576,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!C4P3!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb2f92c23-1b42-4ef4-a7dc-8e76ca80dc48_1024x576.jpeg 424w, https://substackcdn.com/image/fetch/$s_!C4P3!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb2f92c23-1b42-4ef4-a7dc-8e76ca80dc48_1024x576.jpeg 848w, https://substackcdn.com/image/fetch/$s_!C4P3!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb2f92c23-1b42-4ef4-a7dc-8e76ca80dc48_1024x576.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!C4P3!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb2f92c23-1b42-4ef4-a7dc-8e76ca80dc48_1024x576.jpeg 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>Islamic State Somalia (ISS) fighters in the Cal Miskaad region of Somalia&#8217;s Puntland. <a href="https://www.longwarjournal.org/archives/2019/09/islamic-state-trains-in-somalias-puntland.php">Image source</a></em></p><p><strong>Building Sophisticated Financial Structures Inside a Power Vacuum</strong></p><p>The Islamic State Somalia (ISS) serves as the IS&#8217;s <a href="https://www.crisisgroup.org/africa/horn-africa/somalia/islamic-state-somalia-responding-evolving-threat">financial hub</a> for branches across much of Africa. Overseeing these operations is <a href="https://home.treasury.gov/news/press-releases/jy1652">Abdiweli Mohamed Yusuf</a>, a Somali man in his early forties who regularly meets with and reports to other leaders in the country, facilitates the international transfers of fighters and supplies, and manages the group&#8217;s local revenue streams. In July 2023, the United States Treasury&#8217;s Office of Foreign Assets Control (OFAC) imposed sanctions on Yusuf, naming him a Specially Designated Global Terrorist (SDGT). Yusuf reportedly works closely with <a href="https://abcnews.go.com/International/top-isis-leader-somalia-target-us-airstrike/story?id=111160552">Abdiqadir Mumin</a>, another OFAC-designated terrorist who was the target of a US airstrike last May and whose death remains unconfirmed. If alive, Mumin remains the emir of the ISS-based <a href="https://thesoufancenter.org/intelbrief-2024-july-31/">al-Karrar Office</a>, which runs financial programs, militant operations and logistics, and support for IS groups across eastern, central and southern Africa. In this way, the ISS and al-Karrar work closely in Somalia to facilitate regional and global terrorist activities.</p><p>Al-Karrar transfers hundreds of thousands of dollars in <a href="https://warontherocks.com/2024/07/a-globally-integrated-islamic-state/">funds generated</a> by ISS to IS operatives in South Africa, who transfer cash to other operatives in Kenya, Uganda, and Tanzania. The South African operatives then send the cash to IS branches in the DRC and Mozambique and other IS financial offices such as <a href="https://home.treasury.gov/system/files/136/Fact-Sheet-on-ISIS-Financing.pdf">al-Siddiq</a> and <a href="https://jamestown.org/brief/abubakar-mainok-iswaps-sahel-based-al-furqan-representative/">al-Furqan</a>, which oversee financial operations in Central Asia and West Africa, respectively. The South African operatives frequently use Hawala networks (informal international transfer systems) to transfer funds internationally, usually in small amounts, to avoid suspicion by authorities.</p><p>Hawala systems rely on local brokers (Hawaladar) to make <a href="https://www.acamstoday.org/the-hawala-system-a-risky-alternative-to-traditional-banking/">informal international transfers</a> in exchange for a percentage-based commission. Under such a system, a sender <a href="https://www.investopedia.com/terms/h/hawala.asp#:~:text=Hawala%20is%20an%20informal%20method,outside%20of%20traditional%20banking%20systems.">gives cash</a> to a Hawaladar who informs another Hawaladar of the intended location of the transfer. The second Hawaladar pays the agreed-upon sum to the recipient, later recouping it via another transfer or by balancing their accounts with other transactions, sometimes through legitimate banks. These systems are largely unregulated and highly opaque, making them challenging for authorities to monitor. Moreover, Hawala systems account for an estimated $325 billion in <a href="https://www.dowjones.com/professional/risk/resources/risk-blog/hawala-risks">global transfers</a> annually, making it difficult for authorities to differentiate innocent transfers from those used to fund terrorist activity.</p><p>Cryptocurrency transfers also comprise many international transfers between IS operatives. In early 2023, a United Nations report found that al-Karrar was sending $25,000 per month in <a href="https://ctc.westpoint.edu/islamic-state-somalia-a-growing-global-terror-concern/">cryptocurrency</a> to the Afghan-based Islamic State Khorasan Province (ISKP), with a July 2024 report finding that al-Karrar was the ISKP&#8217;s top revenue source overall. The ISKP is one of the IS&#8217;s deadliest branches, responsible for some of the organisation&#8217;s most prominent <a href="https://www.dw.com/en/isis-k-which-claimed-moscow-attack-is-a-brutal-is-branch/a-68653285">international attacks</a> in recent years, such as those that occurred in <a href="https://newlinesmag.com/argument/the-curious-case-of-the-kerman-attacks/">Kerman, Iran</a> and <a href="https://www.bbc.co.uk/news/world-europe-68646380">Moscow, Russia</a> in 2024. Although authorities generally find it easier to <a href="https://adf-magazine.com/2024/10/islamic-state-group-uses-cryptocurrency-to-finance-attacks/">track cryptocurrency</a> transfers than cash, IS and other terror groups have been innovative in evading authorities using currencies such as Bitcoin, Tether, and <a href="https://gnet-research.org/2024/10/04/the-rise-of-monero-iskps-preferred-cryptocurrency-for-terror-financing/">Monero</a>. According to US authorities, T&#252;rkiye is a <a href="https://www.hstoday.us/featured/crowdfunding-and-cryptocurrency-fuel-renewed-efforts-to-smuggle-islamic-state-fighters-from-syrian-detention/">key transit hub</a> for many global IS transfers, with IS operatives using local cryptocurrency exchanges as well as cash transfer apps such as <a href="https://www.hstoday.us/featured/crowdfunding-and-cryptocurrency-fuel-renewed-efforts-to-smuggle-islamic-state-fighters-from-syrian-detention/">PayPal and Western Union</a> to move money into the country before transferring it to other affiliated groups worldwide.</p><p>To achieve such levels of financial success and sophistication, the ISS and al-Karrar Office have made their Puntland home a hub for <a href="https://www.voanews.com/a/report-is-somalia-becomes-financial-hub-leader-could-be-top-is-chief/7781793.html">international operatives</a>, with foreigners comprising around half of the current IS operatives in Somalia. Authorities continue to struggle to contain such internationalised threats as IS branches across much of Africa operate well outside their respective spheres of control. For example, Somalia has been in a varied state of civil war since 1991, and its semi-autonomous state of Puntland, where the ISS operates, <a href="https://www.reuters.com/world/africa/somalias-puntland-refuses-recognise-federal-government-after-disputed-2024-03-31/">recently announced</a> plans to govern itself wholly independently of the federal government. Although local authorities arrested six Moroccan nationals working with the ISS and <a href="https://www.bbc.com/news/world-africa-68444127">sentenced them</a> to death in early 2024, the group continues to operate in the Cal Miskaad mountains and elsewhere, largely with impunity.</p><p>Similarly, IS branches in the <a href="https://www.lawfaremedia.org/article/islamic-state-congo-what-now">DRC</a> and <a href="https://acleddata.com/2023/10/30/actor-profile-islamic-state-mozambique-ism/">Mozambique</a> mostly operate outside the territorial control of their respective governments. Meanwhile, operatives in South Africa <a href="https://idsa.demosl-03.rvsolutions.in/idsa-event/report-of-monday-morning-meeting-on-isis-an-enduring-threat/">take advantage</a> of established economic structures, local corruption, and complacency to finance and provide support for international operations. Combating IS branches&#8217; increasingly integrated financial operations in Africa requires much more than local police or militaries can provide.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.btl-research.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.btl-research.com/subscribe?"><span>Subscribe now</span></a></p><p><strong>Lucrative Revenue Streams Pose a Global Threat</strong></p><p>As Somalia-based IS financiers become increasingly sophisticated in their operations, their ability to access lucrative potential revenue streams through other IS-affiliated groups represents a global threat. Moreover, recent evidence suggests that much of the IS General Directorate of Provinces (GDP), an organisation that manages the group&#8217;s global operations financially and logistically, is <a href="https://ctc.westpoint.edu/the-general-directorate-of-provinces-managing-the-islamic-states-global-network/">now centred</a> in Somalia, adding greater seriousness to the threat emanating from there. Given the enormous revenue-generating potential of IS groups in eastern, central, and southern Africa, the global threat posed by their financial integration remains high.</p><p>In Somalia, the ISS <a href="https://ctc.westpoint.edu/islamic-state-somalia-a-growing-global-terror-concern/">raises at least</a> $100,000 USD monthly through extortion and illicit taxation, according to an early 2023 UN report, transferring some of this cash to other IS groups via al-Karrar office. Another recent estimate claimed that the group raised US $2 million in the <a href="https://www.bbc.com/news/articles/cyv4270gljpo">first half</a> of 2022. The ISS also reportedly <a href="https://home.treasury.gov/news/press-releases/jy1066">raises revenue</a> locally through other means, such as arms smuggling and kidnapping for ransom. However, money raised by ISS represents a small portion of the potential revenue of other IS branches working under the purview of al-Karrar.</p><p>In Mozambique, the Islamic State bases its operations in the northern province of Cabo Delgado, a region described as a &#8216;smuggler&#8217;s<a href="https://www.defenceweb.co.za/security/national-security/the-hidden-face-of-the-war-in-cabo-delgado/"> paradise</a>&#8216; due to its lack of government control, abundance of natural resources, and lengthy coastline with over 30 coastal islands. Here, the local IS branch engages in <a href="https://gnet-research.org/2024/11/25/from-trees-to-terror-jnims-use-of-online-rosewood-sales-to-fuel-expansion/">illicit rosewood smuggling</a>, with a 2024 Environmental Investigation Agency (EIA) report finding that 30% of the <a href="https://eia.org/wp-content/uploads/2024/06/EIA_US_Mozambique_Timber_Report_0424_FINAL_SINGLES-5-13.pdf">timber logged</a> in Cabo Delgado is at a high risk of coming from insurgent-occupied forests. Chinese traders purchase the <a href="https://thediplomat.com/2024/11/chinese-demand-for-rosewood-empowers-some-of-africas-deadliest-terrorist-groups/">vast majority</a> of Mozambique&#8217;s illicit timber exports, playing important roles in each step of the smuggling process. IS Mozambique operatives also reportedly <a href="https://www.dw.com/en/mozambique-jihadists-from-abroad-pour-into-cabo-delgado/a-68623366#:~:text=%22They%20mainly%20finance%20themselves%20through,northern%20Mozambique%2C%20according%20to%20Mahamba.">raise cash</a> via weapons and drug smuggling as well as kidnapping for ransom. The group raises an estimated $1.9 million in <a href="https://www.bbc.com/news/articles/c51nnzzkpkyo">revenue</a> each month, making it one of the largest potential contributors to IS coffers on the continent.</p><p>In the eastern DRC, the IS-aligned Allied Democratic Forces (ADF) have <a href="https://www.washingtonpost.com/world/2023/06/05/congo-islamic-state-adf-financing/">received funding</a> to expand their operations in the province of Ituri despite joint operations by the DRC and Ugandan militaries. The investment could pay off significantly for the IS as Ituri province is rich in <a href="https://www.csis.org/blogs/examining-extremism/examining-extremism-allied-democratic-forces">mineral and agricultural</a> resources that the ADF can exploit. In South Africa, IS operatives not only transfer money between other IS cells across the continent but also <a href="https://www.france24.com/en/live-news/20230613-south-africa-in-the-spotlight-over-terror-funding">raise cash</a> locally via kidnappings, illicit mineral and narcotics trafficking, and scams targeting South African citizens using <a href="https://idsa.demosl-03.rvsolutions.in/idsa-event/report-of-monday-morning-meeting-on-isis-an-enduring-threat/">fake dating profiles</a> on apps such as Tinder. In this way, the growing financial interconnectedness of the Somali-based al-Karrar office and local IS branches with significant fundraising potential could help fund future IS operations on the world stage, representing a significant regional and global threat.</p><p><strong>Recommendations</strong></p><p>A coordinated international response is required to address the growing financial integration and revenue generation potential of IS branches in eastern, central, and southern Africa.</p><p>One of the best ways to counter illicit finance through hawala systems is to offer better, legitimate financial services to Africa&#8217;s more than <a href="https://www.africanenda.org/en/blog/2023/what-does-it-feel-like-to-be-unbanked">350 million people</a> without access to bank services. With South Africa playing an essential role as an IS financial transit hub and <a href="https://oxfordbusinessgroup.com/reports/south-africa/2016-report/economy/the-final-20-reaching-the-unbanked-population-is-a-complex-task">nearly a quarter</a> of the population lacking access to legitimate financial services, offering a legitimate and transparent means for them to transfer money internationally could help authorities better target illicit Hawala transfers.</p><p>Hawala transfers used to finance terror activity rely on many more semi-legitimate transfers between innocent customers that mask their true intent &#8211; a process referred to as &#8216;<a href="https://amluae.com/what-is-layering-in-money-laundering/#:~:text=Layering%20refers%20to%20moving%20money,initial%20source%20of%20the%20money.">layering</a>&#8216; in illicit finance. By reducing the number of innocent transactions within Hawala systems, local authorities would be more able to pinpoint Hawala transfers used for nefarious purposes while gaining the means to track suspicious transfers made via legitimate financial institutions and fintech products. South African <a href="https://thefintechtimes.com/top-african-challenger-banks-helping-the-unbanked-through-mobile-services/">fintech products</a> such as Tymebank, BankZero, and DiscoveryBank offer the unbanked a means to store and transfer money online with minimal fees. South African authorities should consider programmes that encourage the use of such products and initiatives to ensure citizens have access to the identification documents needed to access these services via their smartphones. Similarly, service providers such as PayPal and Western Union should continue to work with authorities while monitoring and reporting any suspicious use of their products.</p><p>Turkish authorities recently announced <a href="https://finance.yahoo.com/news/stricter-crypto-regulations-announced-turkey-152040176.html?guccounter=1&amp;guce_referrer=aHR0cHM6Ly93d3cuZ29vZ2xlLmNvbS8&amp;guce_referrer_sig=AQAAANZ26B1o6yCJrnI7ECiGtdAl2a6IT5mFRjVCnHXJGJIvkMzAM1LHkEtt2NxpuGN7HU0cQg_cXBnS5xgT2PeDp5T6CuVjfIa9oTnfuEnpOwKFbRVl8IY5Nq9a1btuzYlOTZPPenAUtCZa0ojc2sni3Z1uhFTJY9qiJyEzMFS7LSAb">new regulations</a> for cryptocurrency exchanges aimed at curbing terrorist financing and other illicit activities, which they will introduce in February 2025. These regulations include identification requirements for transactions exceeding $425 USD and require service providers to gather user information for previously unregistered wallet addresses. T&#252;rkiye is currently the world&#8217;s <a href="https://www.trade.gov/market-intelligence/turkey-financial-services-future-cryptocurrency-market">fourth largest</a> crypto exchange market, with the Turkish Capital Markets Board (CMB) reporting 47 applications to firms seeking licenses to trade crypto since July 2024. These regulations represent a positive step in stemming illicit financial activity in the country, and crypto service providers in T&#252;rkiye and elsewhere should work closely with the CMB as well as the U.S. Treasury and other international authorities to better regulate the market and identify potential IS operatives seeking to finance their global activities. Similarly, cryptocurrencies such as Monero, Bitcoin, and Tether should continue to take steps to block or discourage IS and other terrorist groups from exploiting their networks by working with international authorities, as well as adopt strategies to better monitor their ledgers and identify potentially nefarious users.</p><p>Dating apps such as Tinder have strict <a href="https://policies.tinder.com/terms/intl/en/">terms of use</a>, including prohibitions on extremist content and criminal usage. These terms also require the company to assist local law enforcement, should the need arise. South Africa has seen a wave of dating app-related <a href="https://www.voaafrica.com/a/south-africa-police-activists-spike-in-lgbtq-abductions-extortion-/7389981.html">criminal activity</a> in recent years, and law enforcement there should work closely with Tinder and similar platforms to identify extremist profiles and request any information leading to the arrest of illicit users.</p><p>With resource smuggling representing a significant portion of the IS&#8217;s revenue-generating potential in Africa, authorities and tech companies should do more to combat the global marketing and sale of illegal goods. Chinese criminals play an important role in the smuggling and sale of illegal rosewood and other resources, and although Chinese authorities have worked with authorities in Mozambique and elsewhere to <a href="https://forumchinaplp.org.mo/en/economic_trade/view/3639">curb resource smuggling</a> among Chinese criminal syndicates, these groups continue to operate largely with impunity. Moreover, Chinese tech companies such as <a href="https://gnet-research.org/2024/11/25/from-trees-to-terror-jnims-use-of-online-rosewood-sales-to-fuel-expansion/">Baidu and Taobao</a> continue to market smuggled rosewood in the domestic market. In recent years, IS groups have increasingly called for <a href="https://gnet-research.org/2024/01/08/the-islamic-states-south-asian-branches-are-spearheading-an-anti-china-campaign/">attacks on China</a>, giving Chinese authorities every incentive to deprive the organisation of funding by cracking down on their citizen&#8217;s illegal activities in Africa and better regulating what goods may be sold on their domestic e-commerce platforms.</p><p>Finally, many IS groups in Africa operate in remote regions with limited Internet access, which is essential for running sophisticated illicit global financial networks. <a href="https://gnet-research.org/2024/12/18/dark-signals-the-growing-threat-of-satellite-internet-in-extremist-networks/">Starlink continues to expand its presence in Africa</a>, including providing service in <a href="https://clubofmozambique.com/news/starlink-approved-in-nigeria-and-mozambique-says-elon-musk-217797/">Mozambique</a>, with plans to expand into the <a href="https://www.starlink.com/map">DRC</a> in 2025. The company is also considering providing service in <a href="https://hornobserver.com/articles/2150/Starlink-to-operate-in-Somalia-Officials">Somalia</a>. Indian authorities recently captured <a href="https://www.opindia.com/2024/12/manipur-security-forces-recover-starlink-linked-to-kuki-terrorists/">Starlink terminals</a> from terrorists operating in the state of Manipur, highlighting the risk that other such organisations could access the Starlink network in the future. Although no evidence suggests IS groups operating in these places currently use Starlink, the company should be vigilant in limiting access to these groups. Starlink is currently working with the US military to limit <a href="https://spacenews.com/pentagon-working-with-spacex-to-cut-off-russian-militarys-illicit-use-of-starlink-internet/">Russia&#8217;s access</a> to the network inside Ukraine. The company should work closely with local authorities as well as the Pentagon and OFAC to deny access to any potential IS operatives in Africa moving forward.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.btl-research.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.btl-research.com/subscribe?"><span>Subscribe now</span></a></p><p></p>]]></content:encoded></item><item><title><![CDATA[The Targeting of Ethnic Tajiks by Online Extremists: A Global Problem]]></title><description><![CDATA[Extremist groups increasingly target ethnic Tajiks to carry out regional and global attacks. Recent events demonstrate that this is a potent global threat.]]></description><link>https://www.btl-research.com/p/the-targeting-of-ethnic-tajiks-by</link><guid isPermaLink="false">https://www.btl-research.com/p/the-targeting-of-ethnic-tajiks-by</guid><dc:creator><![CDATA[Adam Rousselle]]></dc:creator><pubDate>Fri, 03 Jan 2025 11:01:30 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!HXGw!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb2a464f3-e7e6-469c-bde9-89b1380d9a75_1280x720.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!L_Is!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!L_Is!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png 424w, https://substackcdn.com/image/fetch/$s_!L_Is!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png 848w, https://substackcdn.com/image/fetch/$s_!L_Is!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png 1272w, https://substackcdn.com/image/fetch/$s_!L_Is!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!L_Is!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png" width="676" height="188" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:188,&quot;width&quot;:676,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:32791,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:&quot;&quot;,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!L_Is!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png 424w, https://substackcdn.com/image/fetch/$s_!L_Is!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png 848w, https://substackcdn.com/image/fetch/$s_!L_Is!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png 1272w, https://substackcdn.com/image/fetch/$s_!L_Is!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a></figure></div><p><strong>This is an article I recently wrote for the Global Network of Extremism and Technology (GNET). You can find the original link <a href="https://gnet-research.org/2024/12/13/the-targeting-of-ethnic-tajiks-by-online-extremists-a-global-problem/">here</a>.</strong></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.btl-research.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.btl-research.com/subscribe?"><span>Subscribe now</span></a></p><p>Extremist groups increasingly target ethnic Tajiks for recruitment through sophisticated online propaganda campaigns, resulting in some of the world&#8217;s most horrific terrorist attacks over the past year, including those in <a href="https://newlinesmag.com/argument/the-curious-case-of-the-kerman-attacks/">Kerman, Iran</a> and <a href="https://carnegieendowment.org/russia-eurasia/politika/2024/03/moscow-terror-attack-spotlights-russia-tajikistan-ties?lang=en">Moscow, Russia</a>. An ethnic Persian people of central Asia, the largest Tajik populations exist in <a href="https://www.globalpartnersonline.org/pray-for-tajik-people/">Afghanistan</a>, where over 11 million comprise more than a quarter of the population, and <a href="https://www.cia.gov/the-world-factbook/countries/tajikistan/">Tajikistan</a>, where just over 10 million comprise the country&#8217;s vast majority. For over a decade, the authoritarian government of Tajikistan and extremist groups in Afghanistan have waged an ideological war for the hearts and minds of Tajik people living on both sides of the border, with terrorist groups, including the Taliban-aligned Jama&#8217;at Ansarullah (JA) and the Islamic State Khorasan Province (ISKP), recruiting ethnic Tajiks to carry out massive attacks both regionally and globally. This Insight explores the various ways terror groups in the region seek to recruit and co-opt ethnic Tajiks using online propaganda, and possible measures platforms can take to address this growing challenge.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!HXGw!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb2a464f3-e7e6-469c-bde9-89b1380d9a75_1280x720.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!HXGw!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb2a464f3-e7e6-469c-bde9-89b1380d9a75_1280x720.jpeg 424w, https://substackcdn.com/image/fetch/$s_!HXGw!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb2a464f3-e7e6-469c-bde9-89b1380d9a75_1280x720.jpeg 848w, https://substackcdn.com/image/fetch/$s_!HXGw!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb2a464f3-e7e6-469c-bde9-89b1380d9a75_1280x720.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!HXGw!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb2a464f3-e7e6-469c-bde9-89b1380d9a75_1280x720.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!HXGw!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb2a464f3-e7e6-469c-bde9-89b1380d9a75_1280x720.jpeg" width="1280" height="720" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b2a464f3-e7e6-469c-bde9-89b1380d9a75_1280x720.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:720,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!HXGw!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb2a464f3-e7e6-469c-bde9-89b1380d9a75_1280x720.jpeg 424w, https://substackcdn.com/image/fetch/$s_!HXGw!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb2a464f3-e7e6-469c-bde9-89b1380d9a75_1280x720.jpeg 848w, https://substackcdn.com/image/fetch/$s_!HXGw!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb2a464f3-e7e6-469c-bde9-89b1380d9a75_1280x720.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!HXGw!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb2a464f3-e7e6-469c-bde9-89b1380d9a75_1280x720.jpeg 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em><a href="https://daryo.uz/en/2024/08/13/un-afghan-isis-k-expansion-linked-to-support-from-central-asian-diasporas">Image source</a></em></p><p><strong>The Tajik Taliban and the Al-Qaeda Media Nexus</strong></p><p>In 2021, <a href="https://www.rferl.org/a/taliban-tajik-militants-border/31380071.html">the Afghan Taliban handed control of the Tajikistan border</a> districts of northeast Afghanistan&#8217;s Badakhshan province to JA, an al-Qaeda-affiliated group formed in 2006. For years, JA has maintained a hostile relationship with the <a href="https://freedomhouse.org/country/tajikistan">Emomali Rahmon authoritarian government</a> in neighbouring Tajikistan, where the group <a href="https://jamestown.org/program/islamic-extremist-group-jamaat-ansarullah-overcomes-tajikistans-inter-tribal-conflicts/">came to prominence</a> following a September 2010 suicide attack on a police station that killed two officers, two civilians, and wounded 28 others. Since then, JA has regularly focused on cross-border operations, including attacks, border raids, and online propaganda aimed at recruiting people within Tajikistan. JA publicly aligned itself with the Afghan Taliban following the latter&#8217;s takeover of Afghanistan in August 2021, earning the <a href="https://thekhorasandiary.com/en/2023/11/06/understanding-jamaat-ansarullah-ideological-shifts-and-objectives">unofficial title</a> of Tehreek-e-Taliban Tajikistan (TTT). JA&#8217;s ideology is primarily a mix of the Taliban&#8217;s brand of radical Islamism mixed with Tajik ethno-nationalism.</p><p>JA maintains an active presence on Telegram. In an October 2021 post on Telegram, Mahdi Arsalan, one of JA&#8217;s top leaders, declared his group&#8217;s <a href="https://asiaplustj.info/en/news/tajikistan/security/20211007/commander-of-jamaat-ansarullah-radical-group-declares-his-readiness-to-invade-into-tajikistan">readiness to invade</a> Tajikistan. According to a <a href="https://www.memri.org/jttm/afghan-media-report-examines-tajik-jihad-group-jamaat-ansarullah-and-its-relationship-afghan">November report</a> from the Middle East Media Research Institute (MEMRI), JA members &#8216;continue to speak in Telegram channels about continuing Jihadist activity against the government of Emomali Rahman&#8217;. The group also benefits from the Taliban&#8217;s broader media nexus, including the reportedly Al-Qaeda-operated <a href="https://gnet-research.org/2023/12/22/pro-taliban-media-campaign-highlights-regional-threats-to-afghanistans-neighbours/">al-Mersaad</a> media campaign, which produces Tajik language pro-Taliban content that mirrors news coverage on X and Telegram. Al-Mersaad&#8217;s coverage includes <a href="https://www.understandingwar.org/tajikistan-and-afghanistan">regular criticism</a> of Tajikistan&#8217;s Rahmon government, referring to the president by his Soviet-era name &#8216;Rahmonov&#8217; and labelling him a &#8216;communist&#8217;. The campaign also blames the Rahmon regime for the rise of its <a href="https://www.criticalthreats.org/analysis/salafi-jihadi-movement-weekly-update-august-31-2023">ideological rival</a>, the ISKP, which also runs an extensive propaganda campaign to radicalise ethnic Tajiks on both sides of the border.</p><p><strong>ISKP&#8217;s Recruitment of Ethnic Tajiks Produces Global Consequences</strong></p><p>The ISKP targets and recruits ethnic Tajiks using an extensive online propaganda campaign, recruiting individuals to carry out <a href="https://www.caspianpolicy.org/research/security/iskps-resurgence-the-growing-threat-to-central-asia-and-global-security">notable attacks</a> inside Tajikistan as well as launch attacks on the country from neighbouring Afghanistan. The group has also recruited Tajiks for international attacks, with major attacks in Kerman, Iran and <a href="https://carnegieendowment.org/russia-eurasia/politika/2024/03/moscow-terror-attack-spotlights-russia-tajikistan-ties?lang=en">Moscow</a> reportedly perpetrated by ethnic Tajiks from Afghanistan and Tajikistan, respectively. On 8 April, Italian police <a href="https://www.reuters.com/world/europe/italy-arrests-tajik-man-suspected-belonging-islamic-state-2024-04-08/">arrested</a> a Tajikistan national with alleged ties to the Islamic State (IS) at Rome&#8217;s Fiumicino International Airport. On 14 June, US authorities arrested eight Tajik nationals with alleged ties to IS who had <a href="https://www.cnn.com/2024/06/14/politics/isis-us-fears-terror-attack/index.html">illegally crossed</a> the southern border. According to former US Deputy Assistant Secretary of Defense for Afghanistan, Pakistan, and Central Asia <a href="https://www.voanews.com/a/while-small-in-number-tajik-fighters-an-asset-for-islamic-state-khorasan/7465311.html">David Sevney</a>, although the total number of Tajiks in the ISKP is &#8216;fairly small&#8217;, they form a &#8216;fairly large portion of the more aggressive and successful fighters.&#8217;</p><p>Ideologically, the ISKP shares JA&#8217;s criticisms of the Rahmon government but also extensively criticises the Taliban and their affiliated groups for their lack of aggression and ideological purity. In this way, the group targets <a href="https://eurasianet.org/perspectives-iskp-posing-rising-threat-to-central-asia">disaffected members</a> of JA and other extremist groups, such as the Turkestan Islamic Party (TIP), for recruitment. The ISKP&#8217;s al-Azaim Foundation is the <a href="https://gnet-research.org/2024/06/27/iskps-latest-campaign-expanded-propaganda-and-external-operations/">largest contributor</a> of propaganda for the group and functions as part of a broader constellation of sixteen other competing but aligned groups that produce translated content in Tajik and several other languages for a global audience. The ISKP even uses AI-generated newscasters to <a href="https://www.info-res.org/afghan-witness/reports/iskp-use-of-generative-ai-presenters-to-create-newscasts/">broadcast propaganda</a> via its Khursan TV channel on Teleguard, a Swiss alternative to Telegram.</p><p>This extensive media ecosystem produces propaganda in the form of online print magazines and videos with narratives focused on criticising both the government of Tajikistan along with the Afghan Taliban and JA. For example, videos produced by these outlets <a href="https://www.foreignaffairs.com/tajikistan/new-recruiting-ground-isis">frequently criticise</a> Rahmon&#8217;s dictatorial and nepotistic rule, with many featuring faked images of the president&#8217;s humiliation and death. The ISKP also focuses much of its propaganda on the Taliban and its affiliated groups. On 24 November, the ISKP&#8217;s Voice of Khorasan publication released an issue on RocketChat extensively <a href="https://jihadology.net/2024/11/24/new-article-from-the-islamic-states-wilayat-khurasan-three-years-of-the-%e1%b9%adalibans-apostates-filth/">devoted to criticising</a> the Taliban&#8217;s three years of de-facto control over Afghanistan titled &#8216;Three Years of the Taliban Apostates&#8217; Filth&#8217;.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!zoJW!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb5ad7180-bd5c-4181-bb3f-8628f6ed1413_354x512.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!zoJW!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb5ad7180-bd5c-4181-bb3f-8628f6ed1413_354x512.png 424w, https://substackcdn.com/image/fetch/$s_!zoJW!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb5ad7180-bd5c-4181-bb3f-8628f6ed1413_354x512.png 848w, https://substackcdn.com/image/fetch/$s_!zoJW!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb5ad7180-bd5c-4181-bb3f-8628f6ed1413_354x512.png 1272w, https://substackcdn.com/image/fetch/$s_!zoJW!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb5ad7180-bd5c-4181-bb3f-8628f6ed1413_354x512.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!zoJW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb5ad7180-bd5c-4181-bb3f-8628f6ed1413_354x512.png" width="354" height="512" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b5ad7180-bd5c-4181-bb3f-8628f6ed1413_354x512.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:512,&quot;width&quot;:354,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!zoJW!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb5ad7180-bd5c-4181-bb3f-8628f6ed1413_354x512.png 424w, https://substackcdn.com/image/fetch/$s_!zoJW!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb5ad7180-bd5c-4181-bb3f-8628f6ed1413_354x512.png 848w, https://substackcdn.com/image/fetch/$s_!zoJW!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb5ad7180-bd5c-4181-bb3f-8628f6ed1413_354x512.png 1272w, https://substackcdn.com/image/fetch/$s_!zoJW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb5ad7180-bd5c-4181-bb3f-8628f6ed1413_354x512.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Figure 1: The cover of the 24 November issue of Voice of Khurasan titled &#8216;Three Years of the Taliban Apostates&#8217; Filth&#8217;.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.btl-research.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.btl-research.com/subscribe?"><span>Subscribe now</span></a></p><p><strong>Fertile Ground for Radicalism to Take Hold</strong></p><p>Tajikistan&#8217;s regular crackdowns on religious freedom and other civil liberties, and a desperate economic situation on both sides of the border, have produced fertile ground for radicalism to take hold among ethnic Tajiks. Since 2009, the Rahmon government has adopted increasingly <a href="https://thediplomat.com/2023/04/will-tajikistan-meaningfully-engage-on-religious-freedom/">repressive tactics</a> aimed at curbing extremism, including only permitting state-sanctioned religious activities and widespread surveillance of religious organisations. Measures have also included informal bans on hijabs for women and beards for men, leading to reports of police publicly and <a href="https://www.rferl.org/a/uzbekistan-police-forcibly-shave-bushy-beard-islam/33102988.html">forcibly shaving</a> men in some instances. Such repressive measures likely play a role in <a href="https://www.nytimes.com/2024/09/08/world/europe/tajikistan-extremism-beards-head-scarves.html">driving radicalisation</a> in the country. Meanwhile, Tajikistan&#8217;s economic situation produces little opportunity for the public, with a recent <a href="https://eurasianet.org/tajikistan-government-report-highlights-the-problems-of-poverty-and-unemployment">government report</a> noting that most citizens do not earn enough money to afford basic necessities. Moreover, the economic situation on the Afghan side of the border is even worse, with a 7 March <a href="https://news.un.org/en/story/2024/03/1147387">United Nations report</a> noting that Afghanistan&#8217;s economy has &#8216;basically collapsed&#8217;. In this way, crackdowns on religious freedom in Tajikistan and a spiralling economic situation on both sides of the border create a situation for extremist propaganda to take hold among disaffected Tajiks living in both countries.</p><p>Although Tajikistan&#8217;s government has sought to limit the public&#8217;s exposure to online extremist content using <a href="https://rsf.org/en/country/tajikistan">widespread Internet censorship</a>, these measures have been broad in scope and have not stemmed to presence of extremist content in recent years. Instead, these efforts have served to hide the Tajikistani army&#8217;s use of <a href="https://rsf.org/en/tajikistan-bans-independent-news-site-calling-it-extremist-organisation">deadly force</a> by shutting down opposition media while indiscriminately <a href="https://thediplomat.com/2022/05/internet-severed-again-in-tajikistans-gbao/">cutting off</a> Internet access in some 200,000 people living in the troubled Gorno-Badakhshan Autonomous Region (GBAR) for extended periods. Although such measures may limit some exposure to extremist online content at the expense of human rights, the recent involvement of Tajik nationals in terrorist attacks demonstrates extremists&#8217; ability to reach them on both sides of the border effectively.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!hLF6!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc72f96d8-2b52-45d9-b2ea-f04cfb141aab_512x405.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!hLF6!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc72f96d8-2b52-45d9-b2ea-f04cfb141aab_512x405.png 424w, https://substackcdn.com/image/fetch/$s_!hLF6!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc72f96d8-2b52-45d9-b2ea-f04cfb141aab_512x405.png 848w, https://substackcdn.com/image/fetch/$s_!hLF6!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc72f96d8-2b52-45d9-b2ea-f04cfb141aab_512x405.png 1272w, https://substackcdn.com/image/fetch/$s_!hLF6!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc72f96d8-2b52-45d9-b2ea-f04cfb141aab_512x405.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!hLF6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc72f96d8-2b52-45d9-b2ea-f04cfb141aab_512x405.png" width="512" height="405" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c72f96d8-2b52-45d9-b2ea-f04cfb141aab_512x405.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:405,&quot;width&quot;:512,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!hLF6!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc72f96d8-2b52-45d9-b2ea-f04cfb141aab_512x405.png 424w, https://substackcdn.com/image/fetch/$s_!hLF6!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc72f96d8-2b52-45d9-b2ea-f04cfb141aab_512x405.png 848w, https://substackcdn.com/image/fetch/$s_!hLF6!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc72f96d8-2b52-45d9-b2ea-f04cfb141aab_512x405.png 1272w, https://substackcdn.com/image/fetch/$s_!hLF6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc72f96d8-2b52-45d9-b2ea-f04cfb141aab_512x405.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Figure 2: Al-Mersaad (also spelled Al-Mirsaad, Arabic for The Watchtower) operates openly on X, producing pro-Taliban content in the style of a media outlet. This Dari language account is one of several operated by the campaign, which also operates X accounts in English, Arabic, Uzbek, Russian, and more. The campaign&#8217;s slogan is &#8216;Stronghold for ideological struggle.&#8217;</p><p><strong>Recommendations</strong></p><p>Addressing extremist content aimed at ethnic Tajiks requires a tailored approach, including <a href="https://www.politico.eu/article/facebook-content-moderation-posts-wars-afghanistan-middle-east-arabic/">content moderation</a> in the Tajik and Dari languages, which are <a href="https://plc.sas.upenn.edu/persian">mutually intelligible</a> but use different scripts. Recent advances in artificial intelligence (AI) allow for automated content moderation, and these systems should continue to be programmed with advanced Tajik and Dari language capabilities. Although large platforms such as <a href="https://www.facebook.com/help/1584908458516247">Facebook</a>, <a href="https://www.socialmediatoday.com/news/x-looks-improve-content-moderation/705817/">X</a>, Instagram, and <a href="https://www.reuters.com/technology/bytedance-cuts-over-700-jobs-malaysia-shift-towards-ai-moderation-sources-say-2024-10-11/">TikTok</a> have systems to limit extremist content and continue to advance in this area, other platforms such as <a href="https://themedialine.org/top-stories/telegrams-hate-speech-increased-433-since-october-7-2023-new-privacy-policies-useless-experts-say/">Telegram</a> and RocketChat are much more limited in their moderation. Apple and Google have successfully pushed Telegram to adopt stricter <a href="https://www.wired.com/story/telegram-hamas-channels-deplatform/">content moderation</a> policies by threatening to expel it from their app stores. Still, extreme content continues to proliferate on the platform. In this way, further pressure is needed to bring companies like Telegram, Teleguard, RocketChat and others into compliance with best practices regarding content moderation.</p><p>The legal basis for limiting the content of the pro-Taliban media channel al-Mersaad, which operates extensively on X and Telegram, is much less clear as the group does not publicly align itself with the Taliban regime or al-Qaeda, which <a href="https://eurasianet.org/al-qaidataliban-linked-media-campaign-frames-islamic-state-khurasan-as-foreign-tajik-group">experts believe</a> operates the channel in secret. In this way, further research demonstrating that designated terrorist groups operate al-Mersaad would be invaluable in shutting down the pro-Taliban campaign in the future.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.btl-research.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Between the Lines is a reader-supported publication. To receive new posts and support my work, consider becoming a paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[From Trees to Terror: JNIM’s Use of Online Rosewood Sales to Fuel Expansion]]></title><description><![CDATA[Mali's JNIM is one of the world's deadliest terror groups. Its recent expansion has come at the expense of the country's dwindling forests.]]></description><link>https://www.btl-research.com/p/from-trees-to-terror-jnims-use-of</link><guid isPermaLink="false">https://www.btl-research.com/p/from-trees-to-terror-jnims-use-of</guid><dc:creator><![CDATA[Adam Rousselle]]></dc:creator><pubDate>Fri, 06 Dec 2024 11:55:29 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Npiq!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12f0ded9-0a7a-463e-97f1-dfa1a9fe930a_640x391.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p></p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!L_Is!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!L_Is!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png 424w, https://substackcdn.com/image/fetch/$s_!L_Is!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png 848w, https://substackcdn.com/image/fetch/$s_!L_Is!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png 1272w, https://substackcdn.com/image/fetch/$s_!L_Is!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!L_Is!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png" width="676" height="188" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:188,&quot;width&quot;:676,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:32791,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:&quot;&quot;,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!L_Is!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png 424w, https://substackcdn.com/image/fetch/$s_!L_Is!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png 848w, https://substackcdn.com/image/fetch/$s_!L_Is!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png 1272w, https://substackcdn.com/image/fetch/$s_!L_Is!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02fef9e5-9bfa-4a8b-9d79-93c8ce03c968_676x188.png 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a></figure></div><p><strong>This is an article I recently wrote for the Global Network of Extremism and Technology (GNET). You can find the original link <a href="https://gnet-research.org/2024/11/25/from-trees-to-terror-jnims-use-of-online-rosewood-sales-to-fuel-expansion/">here</a>.</strong> </p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.btl-research.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.btl-research.com/subscribe?"><span>Subscribe now</span></a></p><p>On 17 September, al-Qaeda-affiliated Malian terror group <a href="https://www.csis.org/blogs/examining-extremism/examining-extremism-jamaat-nasr-al-islam-wal-muslimin">Jama'at Nasr al-Islam wal Muslimin (JNIM)</a> carried out a <a href="https://www.understandingwar.org/backgrounder/africa-file-september-19-2024-jnim-strikes-bamako-hungary-enters-sahel-ethiopia-somalia">series of attacks</a> in the country's capital of Bamako, targeting a military police training camp and the Modibo Keita International Airport. One anonymous security source claimed that <a href="https://www.france24.com/en/africa/20240919-major-jihadist-attack-in-mali-s-capital-killed-more-than-70-security-source-says-jnim-bamako-al-qaeda">77 people died</a> in these attacks, with 255 more wounded. These attacks comes as part of the group&#8217;s broader efforts to supplant established state authority in favor of its <a href="https://www.csis.org/blogs/examining-extremism/examining-extremism-jamaat-nasr-al-islam-wal-muslimin">extreme interpretation</a> of Islamic Law. JNIM's threat to Mali and the Sahel region at large continues to rise, with a 2023 study by the Africa Center for Strategic Studies concluding that JNIM was responsible for most of the <a href="https://africacenter.org/spotlight/africa-militant-islamist-group-linked-fatalities-at-all-time-high/">50% spike</a> in fatalities attributed to Islamist groups in Somalia and the Sahel compared to the previous year.</p><p>Much of this threat stems from JNIM's direct and indirect leveraging of digital technologies, including an extensive online propaganda campaign and <a href="https://issafrica.org/iss-today/timber-logging-drives-jnim-s-expansion-in-mali">potential partnering</a> with Chinese criminal groups to indirectly sell smuggled Malian rosewood. This insight will discuss JNIM&#8217;s online media presence and the online marketing of illicit rosewood that may help fund its regional operations.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Npiq!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12f0ded9-0a7a-463e-97f1-dfa1a9fe930a_640x391.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Npiq!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12f0ded9-0a7a-463e-97f1-dfa1a9fe930a_640x391.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Npiq!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12f0ded9-0a7a-463e-97f1-dfa1a9fe930a_640x391.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Npiq!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12f0ded9-0a7a-463e-97f1-dfa1a9fe930a_640x391.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Npiq!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12f0ded9-0a7a-463e-97f1-dfa1a9fe930a_640x391.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Npiq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12f0ded9-0a7a-463e-97f1-dfa1a9fe930a_640x391.jpeg" width="640" height="391" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/12f0ded9-0a7a-463e-97f1-dfa1a9fe930a_640x391.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:391,&quot;width&quot;:640,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Npiq!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12f0ded9-0a7a-463e-97f1-dfa1a9fe930a_640x391.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Npiq!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12f0ded9-0a7a-463e-97f1-dfa1a9fe930a_640x391.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Npiq!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12f0ded9-0a7a-463e-97f1-dfa1a9fe930a_640x391.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Npiq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12f0ded9-0a7a-463e-97f1-dfa1a9fe930a_640x391.jpeg 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>Illegally harvested rosewood logs in Ghana, 2019. <a href="https://adf-magazine.com/2024/03/despite-ban-china-bankrolls-rosewood-logging-in-northern-ghana/">Image source</a></em></p><p><strong>Online Propaganda Campaign</strong></p><p>JNIM emerged in March of 2017, the result of a <a href="https://www.newsweek.com/al-qaeda-groups-unite-sahel-563351">merger between</a> four Malian terror groups: the regional branch of al-Qaeda of the Islamic Maghreb (AQIM), the <a href="https://www.dni.gov/nctc/ftos/mlf_fto.html">Macina Liberation Front</a>, <a href="https://www.counterextremism.com/threat/al-mourabitoun">al-Mourabitoun</a>, and Ansar Dine. The latter of these groups had already developed an extensive online presence, <a href="https://academic.oup.com/ia/article/95/6/1331/5584346">devoting 44%</a> of its total communications to news management, targeting Muslims abroad and drawing them into the Malian conflict as stakeholders. However, because the U<s>.</s>S<s>.</s> State Department designated Ansar Dine as a <a href="https://www.state.gov/foreign-terrorist-organizations/">foreign terrorist organization</a> in 2013, the group was limited in accessing social media platforms such as YouTube, instead relying heavily on Telegram channels to spread its communications, which became increasingly professionalized and regular. When Ansar Dine merged into JNIM, it gained access to al-Qaeda's assets and narratives, allowing for its messaging to spread further.</p><p>JNIM operates multiple telegram channels through its media wing, al-Zallaqa. According to H&#233;ni Nsaibia and Rida Lyammouri, al-Zallaqa temporarily creates or maintains <a href="https://gnet-research.org/2020/10/27/digital-dunes-and-shrublands-a-comparative-introduction-to-the-sahelian-jihadi-propaganda-ecosystem/">closed Telegram accounts</a> to spread propaganda across a designated network, disseminating it to supporters and subscribers. Although periodic crackdowns have caused al-Zallaqa to temporarily migrate to platforms outside Telegram, its strategy remains resilient, with the group releasing an <a href="https://monitoring.bbc.co.uk/product/b00027pj">audio address</a> to recruit new members on Telegram and Chirpwire on 15 August. A recent investigation found that JNIM regularly <a href="https://monitoring.bbc.co.uk/product/c204qwhm">releases content</a>, such as claiming attacks, on its Telegram, sometimes on a daily basis, and that this content includes documentary-style videos that mimic news broadcasts.</p><p>Under al-Qaeda's umbrella, <a href="https://humanglemedia.com/the-dark-world-of-jihadist-propaganda-channels-on-telegram/">JNIM has partnered</a> with Nigeria-based Ansaru to disseminate propaganda, radicalise members, and connect with similar organisations in other regions using Telegram accounts and chat rooms such as Rocket Chat and Element. Moreover, by leveraging its al-Qaeda affiliation, JNIM propaganda reaches broader audiences through the umbrella organis<s>z</s>ation's global channels. For example, JNIM content reached <a href="https://dayan.org/content/al-qaedas-propaganda-virtual-turkey#_edn13">Turkish audiences</a> through an al-Qaeda-affiliated Turkish Telegram channel in 2018.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.btl-research.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.btl-research.com/subscribe?"><span>Subscribe now</span></a></p><p><strong>Rosewood smuggling and the criminal groups that facilitate it</strong></p><p>JNIM partly fuels its ongoing expansion by offering protection services to illicit rosewood smugglers in southern Mali. Between 2017 and 2022, China imported an estimated <a href="https://www.voanews.com/a/china-s-illegal-rosewood-trade-with-mali-under-scrutiny-/6580241.html">$220 million</a> of rosewood from Mali alone. Rosewood is <a href="https://www.sciencedirect.com/science/article/abs/pii/S0016718523001975#:~:text=The%20growing%20demand%20for%20rosewood,of%20rosewood%20to%20global%20trade.">particularly prized</a> in the Chinese market, where consumer demand for expensive replicas of Ming and Qing dynasty furniture made from the wood has been in high demand for decades. Ecological and other concerns caused Mali to <a href="https://www.voanews.com/a/china-s-illegal-rosewood-trade-with-mali-under-scrutiny-/6580241.html">ban rosewood</a> exports in 2020, with other countries in the region following suit, including <a href="https://curious.earth/blog/ban-introduced-to-address-the-senegambia-illegal-rosewood-trade/">Senegal and Gambia</a> in 2022. However, these bans have done little to stop JNIM and others from participating in this lucrative revenue source, with JNIM reportedly <a href="https://www.defenceweb.co.za/african-news/timber-logging-drives-jnims-expansion-in-mali/">dislodging</a> bandits who steal from smuggling rings more effectively than hired security agents. According to local reports, JNIM often kills those bandits who do not conform to its dictates.</p><p>China's insatiable demand for rosewood resulted in the <a href="https://www.occrp.org/en/news/report-chinas-rosewood-trade-with-mali-rigged-with-illegalities#:~:text=Following%20the%20depletion%20of%20rosewood,the%20region's%20semi%2Darid%20forests.">depletion</a> of Southeast Asian rosewood forests around 2010, causing Chinese traders to turn to Africa increasingly. For this reason, several Chinese <a href="https://www.pplaaf.org/2023/09/11/new-investigations-on-rosewood-trafficking-between-mali-and-senegal.html">criminal syndicates</a> operating in Mali and neighbouring Senegal engage heavily in the illicit rosewood trade in collusion with local authorities and businesses. According to Organized Crime Index, Chinese companies <a href="https://africa.ocindex.net/country/mali">smuggle rosewood</a> out of Mali using authorized wood export companies, with the illicit rosewood trade linked to ivory smuggling operations as well. Although locals in southern Mali allege that Chinese traders <a href="https://issafrica.s3.amazonaws.com/site/uploads/ocwar-t-report-13-eng.pdf">pay protection</a> fees to JNIM, the extent of relations between the two remains unclear. However, recent clashes between JNIM and the Malian government reveal that the terror group extensively uses <a href="https://www.militantwire.com/p/jnim-al-qaeda-attacks-international">Chinese-made weapons</a>, including rocket-propelled grenades with anti-tank projectiles. For these reasons, the relationship between JNIM's rosewood protection racket and West Africa-based Chinese criminal syndicates requires further investigation.</p><p>China's tech sector plays a vital role in selling and marketing illegal West African rosewood, which helps fuel JNIM's rapid expansion there. Moreover, the sector makes little effort to hide its role. A simple <a href="https://www.baidu.com/s?ie=utf-8&amp;f=8&amp;rsv_bp=1&amp;rsv_idx=1&amp;tn=baidu&amp;wd=%E7%BA%A2%E6%9C%A8%E9%A9%AC%E9%87%8C&amp;fenlei=256&amp;rsv_pq=0xf8b457a60089351f&amp;rsv_t=ad3avbf%2FH%2FfFZmBJaB%2BWzefaN1yWXKx%2B5kSylZvhA0I1OiZY5MgdBA0kTvA2&amp;rqlang=en&amp;rsv_dl=tb&amp;rsv_sug3=2&amp;rsv_sug1=2&amp;rsv_sug7=101&amp;rsv_enter=0&amp;rsv_btype=i&amp;prefixsug=%25E7%25BA%25A2%25E6%259C%25A8%25E9%25A9%25AC%25E9%2587%258C&amp;rsp=3&amp;inputT=1793&amp;rsv_sug4=2475">search on Baidu</a>, China&#8217;s top search engine, of &#8216;Malian Rosewood&#8217; (&#32418;&#26408;&#39532;&#37324;) reveals dozens of related links to online retailers and articles extolling the benefits of Malian rosewood furniture. Although e-commerce sites focused solely on the domestic market, such as Taobao specifically market <a href="https://www.google.com/search?q=%E7%BA%A2%E6%9C%A8%E9%A9%AC%E9%87%8C%20site%3Ataobao.com&amp;rlz=1C5CHFA_enCA1038CA1039&amp;oq=taobao&amp;gs_lcrp=EgZjaHJvbWUyEggAEEUYORiRAhixAxiABBiKBTIMCAEQABhDGIAEGIoFMg0IAhAAGJECGIAEGIoFMgwIAxAAGEMYgAQYigUyDAgEEAAYQxiABBiKBTIMCAUQABhDGIAEGIoFMg0IBhAuGK8BGMcBGIAEMgcIBxAAGIAEMgwICBAAGEMYgAQYigUyBwgJEAAYgATSAQgxMDg4ajBqN6gCCLACAQ&amp;sourceid=chrome&amp;ie=UTF-8&amp;ved=2ahUKEwiE0YfDuJeJAxWETWwGHX0eOBMQ2wF6BAgKEAE&amp;ei=3RISZ8TuNISbseMP_bzgmQE">Malian rosewood</a> and goods made from it, on Alibaba, the country's largest international e-commerce retailer, vendors do not list the <a href="https://www.alibaba.com/trade/search?spm=a2700.galleryofferlist.the-new-header_fy23_pc_search_bar.keydown__Enter&amp;tab=all&amp;SearchText=rosewood+furniture">national origin</a> of their rosewood items, or claim it comes from markets where rosewood exports remain legal, such as <a href="https://www.alibaba.com/product-detail/Indian-Rosewood-Furniture-Wholesale-Price-Rosewood_141284505.html?spm=a2700.galleryofferlist.normal_offer.d_price.526113a04izQhB">India</a> and <a href="https://www.alibaba.com/product-detail/Quality-Rosewood-for-sale_62003994211.html?spm=a2700.galleryofferlist.normal_offer.d_image.40b013a0Py5NjV">South Africa</a>. In this way, it remains unclear if Chinese retailers are marketing illegal Malian rosewood that helps fund JNIM&#8217;s ongoing insurgency to the global market.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!5Zf3!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F569a45d3-009d-4f32-a8fa-1f4a9467dab8_1024x887.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!5Zf3!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F569a45d3-009d-4f32-a8fa-1f4a9467dab8_1024x887.png 424w, https://substackcdn.com/image/fetch/$s_!5Zf3!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F569a45d3-009d-4f32-a8fa-1f4a9467dab8_1024x887.png 848w, https://substackcdn.com/image/fetch/$s_!5Zf3!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F569a45d3-009d-4f32-a8fa-1f4a9467dab8_1024x887.png 1272w, https://substackcdn.com/image/fetch/$s_!5Zf3!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F569a45d3-009d-4f32-a8fa-1f4a9467dab8_1024x887.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!5Zf3!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F569a45d3-009d-4f32-a8fa-1f4a9467dab8_1024x887.png" width="1024" height="887" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/569a45d3-009d-4f32-a8fa-1f4a9467dab8_1024x887.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:887,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!5Zf3!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F569a45d3-009d-4f32-a8fa-1f4a9467dab8_1024x887.png 424w, https://substackcdn.com/image/fetch/$s_!5Zf3!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F569a45d3-009d-4f32-a8fa-1f4a9467dab8_1024x887.png 848w, https://substackcdn.com/image/fetch/$s_!5Zf3!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F569a45d3-009d-4f32-a8fa-1f4a9467dab8_1024x887.png 1272w, https://substackcdn.com/image/fetch/$s_!5Zf3!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F569a45d3-009d-4f32-a8fa-1f4a9467dab8_1024x887.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>A Baidu search of &#8216;Malian Rosewood&#8217; </em>(&#32418;&#26408;&#39532;&#37324;) <em>reveals dozens of related links to online retailers and articles extolling the benefits of Malian rosewood furniture</em></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!fhme!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1e893e39-5e71-423f-bfb6-f63f6a6a9547_1024x899.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!fhme!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1e893e39-5e71-423f-bfb6-f63f6a6a9547_1024x899.png 424w, https://substackcdn.com/image/fetch/$s_!fhme!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1e893e39-5e71-423f-bfb6-f63f6a6a9547_1024x899.png 848w, https://substackcdn.com/image/fetch/$s_!fhme!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1e893e39-5e71-423f-bfb6-f63f6a6a9547_1024x899.png 1272w, https://substackcdn.com/image/fetch/$s_!fhme!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1e893e39-5e71-423f-bfb6-f63f6a6a9547_1024x899.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!fhme!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1e893e39-5e71-423f-bfb6-f63f6a6a9547_1024x899.png" width="1024" height="899" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1e893e39-5e71-423f-bfb6-f63f6a6a9547_1024x899.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:899,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!fhme!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1e893e39-5e71-423f-bfb6-f63f6a6a9547_1024x899.png 424w, https://substackcdn.com/image/fetch/$s_!fhme!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1e893e39-5e71-423f-bfb6-f63f6a6a9547_1024x899.png 848w, https://substackcdn.com/image/fetch/$s_!fhme!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1e893e39-5e71-423f-bfb6-f63f6a6a9547_1024x899.png 1272w, https://substackcdn.com/image/fetch/$s_!fhme!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1e893e39-5e71-423f-bfb6-f63f6a6a9547_1024x899.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>Although Chinese online retailers market illegal Malian rosewood to the domestic market, they do not do so on international ecommerce platforms, such as Alibaba.</em></p><p><strong>Recommendations</strong></p><p>Authorities have struggled to contain extremist content from JNIM, the broader al-Qaeda network, and other terror groups on Telegram for some time. Although the Dubai-based company recently hired around 100 contractors to work as content moderators, with just 60 full-time employees, Telegram <a href="https://www.nytimes.com/2024/09/07/technology/telegram-crime-terrorism.html">reportedly ignores</a> most requests for assistance from global law enforcement agencies. However, Apple and Google, which have significant leverage over Telegram due to their ability to expel it from their app stores, have successfully pushed the company to restrict the spread of <a href="https://www.wired.com/story/telegram-hamas-channels-deplatform/">extremist content</a> on its platform. This leverage, combined with the <a href="https://www.theguardian.com/technology/2024/sep/23/telegram-illegal-content-pavel-durov-arrest">recent arrest</a> of CEO Pavel Durov, could push Telegram to adopt more robust measures to counter extremist content like those of other platforms such as YouTube and Instagram. Given JNIM's resilience in using the app to spread its messaging to date, these enhanced moderation measures are likely necessary to counter its presence on the platform moving forward. Similarly, authorities should work in conjunction with Apple and Google to demand similar moderation practices at smaller chat services such as Chirpwire, Rocket Chat, and Element.</p><p>Governments and industry should do more to counter the global trade of illicit West African rosewood on Chinese e-commerce platforms. Although Western shipping companies Maersk and CMA-CGM have <a href="https://finance.yahoo.com/news/malis-rosewood-crisis-not-happening-093000863.html?guccounter=1&amp;guce_referrer=aHR0cHM6Ly93d3cuZ29vZ2xlLmNvbS8&amp;guce_referrer_sig=AQAAANZ26B1o6yCJrnI7ECiGtdAl2a6IT5mFRjVCnHXJGJIvkMzAM1LHkEtt2NxpuGN7HU0cQg_cXBnS5xgT2PeDp5T6CuVjfIa9oTnfuEnpOwKFbRVl8IY5Nq9a1btuzYlOTZPPenAUtCZa0ojc2sni3Z1uhFTJY9qiJyEzMFS7LSAb">already committed</a> to blocking and investigating their role in the illicit rosewood trade, respectively, this has not yet stopped smuggled rosewood from reaching China&#8217;s shores. Although international institutions can do little about the marketing of illicit rosewood inside China, customs agencies and law enforcement should more closely scrutinise the international sale of rosewood products on Chinese e-commerce platforms as these may be indirectly funding JNIM's <a href="https://www.clingendael.org/pub/2022/conflict-in-the-penta-border-area/3-explaining-jnim-expansion-into-benin/">ongoing expansion</a>. Finally, further investigation is needed into Mali's illicit rosewood trade, including the local supply chains that may link Chinese smuggling syndicates and consumer markets to JNIM's ongoing expansion. </p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.btl-research.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Between the Lines is a reader-supported publication. To receive new posts and support my work, consider becoming a paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[Chinese Demand for Rosewood Empowers Some of Africa’s Deadliest Terrorist Groups]]></title><description><![CDATA[Chinese smuggling rings have been instrumental in the illegal trafficking of rosewood. They also provide support to terrorist groups in West Africa and Mozambique.]]></description><link>https://www.btl-research.com/p/chinese-demand-for-rosewood-empowers</link><guid isPermaLink="false">https://www.btl-research.com/p/chinese-demand-for-rosewood-empowers</guid><dc:creator><![CDATA[Adam Rousselle]]></dc:creator><pubDate>Sun, 01 Dec 2024 02:32:56 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!6Bn-!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6dd3c285-c4cf-41f0-8971-fc7f23459de6_4521x2808.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!6Bn-!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6dd3c285-c4cf-41f0-8971-fc7f23459de6_4521x2808.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!6Bn-!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6dd3c285-c4cf-41f0-8971-fc7f23459de6_4521x2808.jpeg 424w, https://substackcdn.com/image/fetch/$s_!6Bn-!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6dd3c285-c4cf-41f0-8971-fc7f23459de6_4521x2808.jpeg 848w, https://substackcdn.com/image/fetch/$s_!6Bn-!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6dd3c285-c4cf-41f0-8971-fc7f23459de6_4521x2808.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!6Bn-!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6dd3c285-c4cf-41f0-8971-fc7f23459de6_4521x2808.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!6Bn-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6dd3c285-c4cf-41f0-8971-fc7f23459de6_4521x2808.jpeg" width="1456" height="904" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6dd3c285-c4cf-41f0-8971-fc7f23459de6_4521x2808.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:904,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!6Bn-!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6dd3c285-c4cf-41f0-8971-fc7f23459de6_4521x2808.jpeg 424w, https://substackcdn.com/image/fetch/$s_!6Bn-!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6dd3c285-c4cf-41f0-8971-fc7f23459de6_4521x2808.jpeg 848w, https://substackcdn.com/image/fetch/$s_!6Bn-!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6dd3c285-c4cf-41f0-8971-fc7f23459de6_4521x2808.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!6Bn-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6dd3c285-c4cf-41f0-8971-fc7f23459de6_4521x2808.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>Commandos from the Mozambique Defense Armed Forces participate in a simulated raid during a U.S.-Mozambique Joint Combined Exercise Training, near Moamba, Mozambique, Aug. 19, 2024. U.S. Air Force photo by Tech. Sgt. Christopher Dyer.</em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.btl-research.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.btl-research.com/subscribe?"><span>Subscribe now</span></a></p><p>For centuries, cultures around the globe have prized items made from rosewood due to its fine-grained durability and rich coloring. Nowhere has this been more true than in China, where rosewood furniture, with its intense cherry red hues, carries cultural associations of prosperity and life-affirming energy.</p><p>Although historically only attainable for wealthy merchants and elite members of the Ming and Qinq-era imperial courts, in recent decades, the rapid expansion of China&#8217;s middle class has sparked an unprecedented explosion of demand for all things rosewood. This demand first <a href="https://news.mongabay.com/2015/12/chinas-demand-for-rosewood-is-destroying-forests-in-southeast-asia-and-increasingly-in-africa/">wreaked havoc on forests</a> across Asia. The decimation caused a wave of logging bans in fragile forest ecosystems, starting with China&#8217;s 1998 <a href="https://www.stdaily.com/English/ChinaNews/202302/f3c3afc80a6f4f8598f436983354d082.shtml">Natural Forest Protection Program</a>. For this reason, Chinese smuggling rings have increasingly turned to some of sub-Saharan Africa&#8217;s most vulnerable forests, brazenly defying a series of bans on rosewood sales there.</p><p>From a smuggler&#8217;s haven on the Mozambican coast of southeast Africa to a complex network of middlemen in West Africa, Chinese intermediaries have been instrumental in the trade of rosewood, the single <a href="https://e360.yale.edu/features/the-rosewood-trade-the-illicit-trail-from-forest-to-furniture#:~:text=Rosewood%20is%20the%20most%20trafficked,Office%20on%20Drugs%20and%20Crime.">most illegally trafficked</a> natural product on earth. Today, growing evidence suggests these vast criminal nexuses provide support to some of Africa&#8217;s deadliest terrorist groups, which have increasingly gained access to advanced weapons made by Chinese defense contractors.</p><p><strong>This is an excerpt from an piece I recently wrote for the Diplomat. To read the full article, <a href="https://thediplomat.com/2024/11/chinese-demand-for-rosewood-empowers-some-of-africas-deadliest-terrorist-groups/">click here</a>. </strong></p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!FOdi!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31d0ba57-67fb-47fa-9d8c-4a13e6aae7c4_354x83.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!FOdi!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31d0ba57-67fb-47fa-9d8c-4a13e6aae7c4_354x83.png 424w, https://substackcdn.com/image/fetch/$s_!FOdi!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31d0ba57-67fb-47fa-9d8c-4a13e6aae7c4_354x83.png 848w, https://substackcdn.com/image/fetch/$s_!FOdi!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31d0ba57-67fb-47fa-9d8c-4a13e6aae7c4_354x83.png 1272w, https://substackcdn.com/image/fetch/$s_!FOdi!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31d0ba57-67fb-47fa-9d8c-4a13e6aae7c4_354x83.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!FOdi!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31d0ba57-67fb-47fa-9d8c-4a13e6aae7c4_354x83.png" width="354" height="83" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/31d0ba57-67fb-47fa-9d8c-4a13e6aae7c4_354x83.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:83,&quot;width&quot;:354,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:11089,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!FOdi!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31d0ba57-67fb-47fa-9d8c-4a13e6aae7c4_354x83.png 424w, https://substackcdn.com/image/fetch/$s_!FOdi!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31d0ba57-67fb-47fa-9d8c-4a13e6aae7c4_354x83.png 848w, https://substackcdn.com/image/fetch/$s_!FOdi!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31d0ba57-67fb-47fa-9d8c-4a13e6aae7c4_354x83.png 1272w, https://substackcdn.com/image/fetch/$s_!FOdi!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31d0ba57-67fb-47fa-9d8c-4a13e6aae7c4_354x83.png 1456w" sizes="100vw"></picture><div></div></div></a></figure></div><p></p>]]></content:encoded></item><item><title><![CDATA[China’s Crackdowns Belie Fears Within the Regime]]></title><description><![CDATA[Growing economic woes and social stagnation are driving increased repression.]]></description><link>https://www.btl-research.com/p/chinas-crackdowns-belie-fears-within</link><guid isPermaLink="false">https://www.btl-research.com/p/chinas-crackdowns-belie-fears-within</guid><dc:creator><![CDATA[Adam Rousselle]]></dc:creator><pubDate>Fri, 22 Nov 2024 11:01:32 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3d978bd6-c1a2-4c9f-bb77-1f7323ad219c_1024x683.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!k5kR!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe0e44284-a8b3-48a4-bd8e-18f517a078d7_2046x1212.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!k5kR!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe0e44284-a8b3-48a4-bd8e-18f517a078d7_2046x1212.png 424w, https://substackcdn.com/image/fetch/$s_!k5kR!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe0e44284-a8b3-48a4-bd8e-18f517a078d7_2046x1212.png 848w, https://substackcdn.com/image/fetch/$s_!k5kR!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe0e44284-a8b3-48a4-bd8e-18f517a078d7_2046x1212.png 1272w, https://substackcdn.com/image/fetch/$s_!k5kR!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe0e44284-a8b3-48a4-bd8e-18f517a078d7_2046x1212.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!k5kR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe0e44284-a8b3-48a4-bd8e-18f517a078d7_2046x1212.png" width="1456" height="862" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e0e44284-a8b3-48a4-bd8e-18f517a078d7_2046x1212.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:862,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:585971,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!k5kR!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe0e44284-a8b3-48a4-bd8e-18f517a078d7_2046x1212.png 424w, https://substackcdn.com/image/fetch/$s_!k5kR!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe0e44284-a8b3-48a4-bd8e-18f517a078d7_2046x1212.png 848w, https://substackcdn.com/image/fetch/$s_!k5kR!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe0e44284-a8b3-48a4-bd8e-18f517a078d7_2046x1212.png 1272w, https://substackcdn.com/image/fetch/$s_!k5kR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe0e44284-a8b3-48a4-bd8e-18f517a078d7_2046x1212.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>This article was published as part of the ongoing collaboration between Between the Lines and The Dispatch. Between the Lines listeners can access The Dispatch free for 30 days. <a href="https://thedispatch.com/join-offer-between-the-lines/?utm_source=btl&amp;utm_medium=partnerships-podcast&amp;utm_campaign=1124">Click here</a> for more details.</em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.btl-research.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.btl-research.com/subscribe?"><span>Subscribe now</span></a></p><p>Halloween was widely celebrated in Shanghai, perhaps more than in Western cities. Thousands of costumed young people flocked to the city&#8217;s <a href="https://www.housebeautiful.com/design-inspiration/a35998298/shanghai-art-deco/">art deco</a> core&#8212;a remnant of its jazz-age colonial past&#8212;joining dozens of parties set to the tune of Michael Jackson&#8217;s <em>Thriller </em>and other festive staples. Even the timing was perfect, as late October comes with cool breezes and golden ginkgo leaves beneath azure skies&#8212;a reprieve from Shanghai&#8217;s notoriously hot summers and damp, frigid winters. But 2024 was different. With little notice, police <a href="https://www.scmp.com/news/china/article/3284172/chinese-police-detain-halloween-party-goers-crackdown-shanghai?module=perpetual_scroll_0&amp;pgtype=article">rounded up</a> costumed partygoers, took them to stations, and forced them to remove their makeup and costumes before registering their names, IDs, and phone numbers. Uniformed officers posted notices stating, &#8220;All cosplaying is prohibited, and no Halloween makeup will be permitted.&#8221; Even the weather turned, with unseasonal rains soaking the streets.&nbsp;</p><p>Authorities in Shanghai remain on edge following the <a href="https://www.scmp.com/news/china/politics/article/3201315/anger-chinese-covid-restrictions-boils-over-rare-protests-major-cities">White Paper protests</a> of November 2022, when thousands of youth took to the streets in response to draconian COVID prevention measures and the economic and social hardships that came with them. Moreover, many <a href="https://www.france24.com/en/asia-pacific/20241031-in-shanghai-halloween-sends-shivers-down-china-s-spine">tongue-in-cheek costumes</a> mocked pandemic prevention workers and other sensitive topics during last year&#8217;s Halloween festivities, something authorities were unwilling to bear this year. Elsewhere in the country, there are signs of growing economic discontent. Workers <a href="https://asia.nikkei.com/Business/Business-trends/Factory-strikes-flare-up-in-China-as-economic-woes-deepen">regularly protest</a> layoffs and unpaid wages at the many struggling factories that dot the southern provinces. There were <a href="https://clb.org.hk/en/content/china-labour-bulletin-strike-map-data-analysis-first-half-2024-review-workers-rights#:~:text=As%20of%202024%2C%20the%20number,same%20period%20the%20previous%20year.">719 such incidents</a> in the first half of this year, compared to 696 during the same period last year and just <a href="https://clb.org.hk/en/content/china-labour-bulletin-strike-map-data-analysis-2022-year-review-workers-rights">37 strikes</a> in all of 2022. Many of these labor disputes have provoked violent responses from authorities, most infamously when riot gear-clad police <a href="https://www.theguardian.com/technology/2022/nov/24/workers-in-running-battles-with-police-at-foxconns-iphone-factory-in-china">beat workers</a> outside a Foxconn iPhone plant in Zhengzhou in November 2022.&nbsp;</p><p>China&#8217;s domestic crackdowns belie a deep and growing sense of fear among its political elites. This insecurity runs counter to the frequent media portrayal of China as a confident and rising superpower and speaks to the growing economic and social crises gripping the country.&nbsp;</p><h3><strong>Manufacturing crisis and unemployment.</strong></h3><p>China&#8217;s manufacturing sector, the country&#8217;s largest generator of desperately needed foreign cash and investment, has fallen on hard times. Exports have fallen below expectations amid a <a href="https://www.reuters.com/markets/asia/chinas-exports-likely-slowed-further-september-global-demand-cools-2024-10-10/">softening global economy</a>, reduced domestic demand, and increased competition from emerging markets such as <a href="https://www.scmr.com/article/shift-from-china-is-leading-to-india">India</a>, <a href="https://www.nytimes.com/2023/01/01/business/mexico-china-us-trade.html">Mexico</a>, and <a href="https://www.supplychaindive.com/news/vietnam-manufacturing-semiconductors-hub-growth-us-biden-china-amkor-intel-google/700461/">Vietnam</a>. Although China aims to transition toward &#8220;high quality&#8221; manufacturing, including items such as electric vehicles (EVs) and batteries, rising protectionism on the world stage threatens its export prospects, especially following the recent election of <a href="https://www.wsj.com/world/china/china-courts-u-s-allies-as-defense-against-trumps-protectionism-e574714e">Donald Trump</a>. Despite significant investment and potential, some 52,000 Chinese EV-related companies <a href="https://www.economist.com/business/2024/08/08/chinas-manufacturers-are-going-broke">shut down</a><strong> </strong>last year amid weakening demand and rising raw material costs. Many analysts blame significant government subsidies to the industry for creating overcapacity&#8212;a problem that is <a href="https://www2.deloitte.com/us/en/insights/economy/global-impacts-of-chinese-overcapacity.html">hardly exclusive</a> to the EV sector.<strong>&nbsp;</strong></p>
      <p>
          <a href="https://www.btl-research.com/p/chinas-crackdowns-belie-fears-within">
              Read more
          </a>
      </p>
   ]]></content:encoded></item></channel></rss>