<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Between the Lines: Threat Finance]]></title><description><![CDATA[Following the money to wherever it takes us]]></description><link>https://www.btl-research.com/s/threat-finance</link><image><url>https://substackcdn.com/image/fetch/$s_!-B99!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb2b8d0f-7f85-4d51-aa5d-160c09a2114e_605x605.png</url><title>Between the Lines: Threat Finance</title><link>https://www.btl-research.com/s/threat-finance</link></image><generator>Substack</generator><lastBuildDate>Fri, 01 May 2026 22:06:44 GMT</lastBuildDate><atom:link href="https://www.btl-research.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Adam Rousselle]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[betweenthelines@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[betweenthelines@substack.com]]></itunes:email><itunes:name><![CDATA[Adam Rousselle]]></itunes:name></itunes:owner><itunes:author><![CDATA[Adam Rousselle]]></itunes:author><googleplay:owner><![CDATA[betweenthelines@substack.com]]></googleplay:owner><googleplay:email><![CDATA[betweenthelines@substack.com]]></googleplay:email><googleplay:author><![CDATA[Adam Rousselle]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[The TD Bank Money Laundering Case: Anatomy of a Compliance Failure]]></title><description><![CDATA[Industrial-Scale Laundering and the Limits of Anomaly-Based Supervision]]></description><link>https://www.btl-research.com/p/the-td-bank-money-laundering-case</link><guid isPermaLink="false">https://www.btl-research.com/p/the-td-bank-money-laundering-case</guid><dc:creator><![CDATA[Adam Rousselle]]></dc:creator><pubDate>Mon, 23 Feb 2026 21:05:46 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Zjv9!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F58f6e527-42c4-4ee6-9b0e-45798983f35c_1400x800.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Zjv9!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F58f6e527-42c4-4ee6-9b0e-45798983f35c_1400x800.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Zjv9!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F58f6e527-42c4-4ee6-9b0e-45798983f35c_1400x800.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Zjv9!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F58f6e527-42c4-4ee6-9b0e-45798983f35c_1400x800.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Zjv9!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F58f6e527-42c4-4ee6-9b0e-45798983f35c_1400x800.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Zjv9!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F58f6e527-42c4-4ee6-9b0e-45798983f35c_1400x800.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Zjv9!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F58f6e527-42c4-4ee6-9b0e-45798983f35c_1400x800.jpeg" width="1400" height="800" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/58f6e527-42c4-4ee6-9b0e-45798983f35c_1400x800.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:800,&quot;width&quot;:1400,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;The anti-money-laundering lever that regulators have never used | American  Banker&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="The anti-money-laundering lever that regulators have never used | American  Banker" title="The anti-money-laundering lever that regulators have never used | American  Banker" srcset="https://substackcdn.com/image/fetch/$s_!Zjv9!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F58f6e527-42c4-4ee6-9b0e-45798983f35c_1400x800.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Zjv9!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F58f6e527-42c4-4ee6-9b0e-45798983f35c_1400x800.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Zjv9!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F58f6e527-42c4-4ee6-9b0e-45798983f35c_1400x800.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Zjv9!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F58f6e527-42c4-4ee6-9b0e-45798983f35c_1400x800.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em><a href="https://www.americanbanker.com/news/the-anti-money-laundering-lever-that-regulators-have-never-used">Image source</a></em></p><p>On October 10, 2024, Toronto-Dominion (TD) Bank agreed to pay approximately US $3.09 billion to U.S. regulators &#8211; the single <a href="https://www.cbc.ca/news/business/td-bank-penalties-1.7348819">largest penalty</a> ever imposed under the Bank Secrecy Act (BSA). The financial consequences extended beyond the headline figure: compliance overhauls, independent monitors, legal expenses, and operational restrictions materially affected the bank&#8217;s U.S. business. Senior executives departed, compensation was reduced, and branch-level employees now face criminal charges.</p><p>According to the U.S. Department of Justice, between January 2018 and April 2024, TD&#8217;s transaction monitoring program <a href="https://www.justice.gov/archives/opa/pr/td-bank-pleads-guilty-bank-secrecy-act-and-money-laundering-conspiracy-violations-18b">failed to review</a> approximately 92% of its transactions &#8212; representing activity collectively valued at more than $18 trillion. Within that same period, three criminal networks with ties to drug trafficking organizations transferred over $670 million in illicit funds through TD accounts.</p><p>But the magnitude of the penalty &#8212; and <a href="https://thefinancialcrimenews.com/td-bank-usa-aml-fines-amp-penalties-a-deep-dive/">its ramifications</a> for TD and the broader banking sector &#8212; underscores something more unsettling. If criminal networks were able to move over half a billion dollars through a major financial institution over multiple years &#8211; despite the presence of formal monitoring systems &#8211; the underlying laundering infrastructure was not opportunistic. It was operationally mature.</p><p>While the TD case represents a particularly egregious breach of a major financial institution by bad actors, the vast demand to enter these systems by an expanding global criminal services market makes it a powerful warning of the dangers posed by a lack of action amid a global surge in parallel financial activity.</p><h2><strong>Investigation and findings</strong></h2><p>Federal authorities began investigating cartel-linked laundering activity in the New York tri-state area in the early 2020s. In one instance, agents reportedly tailed a box truck transporting <a href="https://www.bradley.com/insights/publications/2024/11/3-billion-td-bank-aml-settlement-is-a-wake-up-call-for-all-banks">bags of bulk cash</a> that were deposited across multiple bank branches, with TD locations featuring prominently. The ringleader of these activities was Da Ying (&#8220;David&#8221;) Sze, a Chinese-born resident of Queens, New York. According to court filings, Sze&#8217;s network laundered approximately $653 million, roughly $470 million of which moved through TD Bank. A subsequent <a href="https://www.congress.gov/crs-product/R48786">congressional report</a> noted the network moved funds to thousands of individuals and entities across the United States, China, Hong Kong, and other jurisdictions.</p><p>The Sze network did not rely on large-scale corruption to operate within TD. According to court documents, the organization provided approximately $57,000 in retail gift cards to multiple bank employees over a three-year period. In exchange for these gift cards, employees repeatedly <a href="https://www.comsuregroup.com/news/gift-cards-insider-risk-and-hundreds-of-millions-laundered-lessons-learnt/">ignored reporting</a> standards, issuing official bank checks for accounts mostly filled with underreported cash. According to charging documents, one <a href="https://www.nytimes.com/2024/10/10/business/td-bank-fine.html?unlocked_article_code=1.RU4.pbFX.JUDDsZpAfAS8&amp;smid=url-share">branch employee</a> asked another &#8220;how is that not money laundering?&#8221; after a customer was permitted to buy more than $1 million in bank checks with cash. &#8220;Oh, it 100 percent is,&#8221; replied the second employee.</p><p>While multiple insiders were charged in connection with related laundering schemes, the only publicly detailed case tied to the Sze network is that of <a href="https://www.amlintelligence.com/2026/01/latest-former-td-bank-insider-pleads-guilty-to-474m-money-laundering-scheme/#:~:text=A%20former%20TD%20Bank%20employee,%E2%80%9Cconductor%E2%80%9D%20on%20those%20reports.">Wilfredo Aquino</a>, an assistant store manager at a Midtown Manhattan TD branch. Aquino accepted more than $11,000 in gift cards between 2019 and 2021. In the context of a mid-level retail banking salary in Manhattan, and given <a href="https://www.amlintelligence.com/2026/01/latest-former-td-bank-insider-pleads-guilty-to-474m-money-laundering-scheme/#:~:text=A%20former%20TD%20Bank%20employee,%E2%80%9Cconductor%E2%80%9D%20on%20those%20reports.">Aquino had processed</a> some 1,680 checks worth over $92 million, the inducements were modest &#8212; suggesting that the network&#8217;s strategy depended less on dramatic bribery than on sustained, low-friction facilitation at key review points.</p><p>At $57,000 in gift cards, total known inducements amounted to roughly 0.01 percent of the funds Sze passed through TD-linked accounts &#8212; a negligible input cost for a network operating at industrial scale. The vulnerability was not expensive corruption, but calibrated pressure applied to the right choke points.</p><p>While global financial institutions continue to struggle to improve their compliance systems, what is clear is that demand to inject illicit cash into capital markets via legitimate institutions has reached an unprecedented scale and scope.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!G5ck!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88cbc14c-e8dc-4b84-b9bf-ad9049b8a504_700x394.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!G5ck!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88cbc14c-e8dc-4b84-b9bf-ad9049b8a504_700x394.jpeg 424w, https://substackcdn.com/image/fetch/$s_!G5ck!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88cbc14c-e8dc-4b84-b9bf-ad9049b8a504_700x394.jpeg 848w, https://substackcdn.com/image/fetch/$s_!G5ck!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88cbc14c-e8dc-4b84-b9bf-ad9049b8a504_700x394.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!G5ck!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88cbc14c-e8dc-4b84-b9bf-ad9049b8a504_700x394.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!G5ck!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88cbc14c-e8dc-4b84-b9bf-ad9049b8a504_700x394.jpeg" width="700" height="394" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/88cbc14c-e8dc-4b84-b9bf-ad9049b8a504_700x394.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:394,&quot;width&quot;:700,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:41401,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.btl-research.com/i/188949112?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88cbc14c-e8dc-4b84-b9bf-ad9049b8a504_700x394.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!G5ck!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88cbc14c-e8dc-4b84-b9bf-ad9049b8a504_700x394.jpeg 424w, https://substackcdn.com/image/fetch/$s_!G5ck!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88cbc14c-e8dc-4b84-b9bf-ad9049b8a504_700x394.jpeg 848w, https://substackcdn.com/image/fetch/$s_!G5ck!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88cbc14c-e8dc-4b84-b9bf-ad9049b8a504_700x394.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!G5ck!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88cbc14c-e8dc-4b84-b9bf-ad9049b8a504_700x394.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>Da Ying (&#8220;David&#8221;) Sze depositing bulk cash at a NYC-area TD branch. <a href="https://www.amlintelligence.com/2026/01/latest-former-td-bank-insider-pleads-guilty-to-474m-money-laundering-scheme/#:~:text=A%20former%20TD%20Bank%20employee,%E2%80%9Cconductor%E2%80%9D%20on%20those%20reports.">Image source</a></em></p><h2><strong>Supply and Demand &#8212; Laundering as a Service Market</strong></h2><p>Service-based alternative clearing networks have emerged amid unprecedented capital mobility, digitized payment velocity, and increasing geopolitical fragmentation. Over the past decade, <a href="https://www.btl-research.com/p/western-banks-and-the-rise-of-parallel">these systems</a> have expanded in ways that bypass and place strain on formal regulatory frameworks. They reflect a convergence of three structural forces: capital flight from high-pressure jurisdictions such as China, the steady supply of bulk cash generated by large transnational criminal enterprises, and the acceleration of cross-border value transfer enabled by fintech and digital assets.</p><p>Operationally, these <a href="https://newlinesinstitute.org/global-security-mil-priorities/china-cartel-nexus-the-liquidity-architecture-transforming-the-global-drug-economy/">networks integrate</a> bulk cash collection, offshore credit balancing, digital asset conversion, and trade-based value settlement into a continuous clearing cycle. The result is a service-layered market for laundering and liquidity conversion, scaled by the sheer volume of capital seeking movement across jurisdictions. The objective is not merely concealment, but transformation &#8212; converting trapped or illicit value into <a href="https://www.btl-research.com/p/understanding-unregulated-capital">deployable capital</a> within stable financial systems.</p><p>Recent enforcement actions and reporting demonstrate the scale and operational capacity of this underground services market. In Southeast Asia, the Huione Chinese language marketplace and corporate networks associated with Prince Group have been identified as providing services used by criminal actors tied to scam compounds and gambling rings. According to Chainalysis, Huione-linked <a href="https://www.chainalysis.com/blog/2025-crypto-crime-report-introduction/">addresses processed</a> more than $70 billion in crypto-denominated transactions between 2021 and 2025. In October 2024, the U.S. Department of Justice announced a <a href="https://www.trmlabs.com/resources/blog/operation-prince-inside-the-global-effort-that-led-to-the-largest-forfeiture-in-us-history">civil forfeiture</a> action involving over $15 billion in bitcoin connected to activity tied to Prince Group&#8211;associated entities &#8212; the largest digital asset seizure in history. In North America, FinCEN reporting has identified Chinese money laundering networks (CMLNs) as key facilitators of bulk cash clearing. Suspicious Activity Reports referencing such networks reflected approximately $312 billion in <a href="https://newlinesinstitute.org/global-security-mil-priorities/china-cartel-nexus-the-liquidity-architecture-transforming-the-global-drug-economy/">flagged transactions</a> between 2020 and 2024. The Da Ying Sze network likely represented only one operational node within this broader clearing architecture.</p><p>These figures illustrate that the networks in question are not marginal or episodic; they are structured, capitalized, and globally integrated. Their continued operation depends not on remaining entirely outside the formal financial system, but on accessing it selectively at key integration points. This is where regulated financial institutions enter the equation.</p><p><strong>Banks as Entry Points for Illicit Capital</strong></p><p>Banks sit at the final integration point between parallel financial systems and formal capital markets. At its core, this is a supply-and-demand equilibrium: illicit or trapped capital seeks conversion; regulated capital markets offer <a href="https://www.btl-research.com/p/western-banks-and-the-rise-of-parallel">absorption capacity</a> and safety; intermediaries profit from the spread. As enforcement actions over the past decade demonstrate, financial institutions exposed to these flows face escalating compliance, reputational, and sanctions-related risks.</p><p>Court documents reveal the extent to which TD Bank&#8217;s compliance team failed to monitor suspicious transactions and the Department of Justice cited systemic weaknesses in the bank&#8217;s AML infrastructure, including gaps in transaction monitoring coverage and risk escalation. But while the TD example may be extreme in scope, the bank is not alone.</p><p>Over the past several years, major financial institutions &#8212; from <a href="https://www.investopedia.com/stock-analysis/2013/investing-news-for-jan-29-hsbcs-money-laundering-scandal-hbc-scbff-ing-cs-rbs0129.aspx">HSBC</a> to <a href="https://www.justice.gov/archives/opa/pr/danske-bank-pleads-guilty-fraud-us-banks-multi-billion-dollar-scheme-access-us-financial">Danske Bank</a> &#8212; have faced significant penalties tied to AML deficiencies valued in the billions of dollars. In less extreme cases &#8211; such as <a href="https://www.fincen.gov/news/news-releases/fincen-announces-390000000-enforcement-action-against-capital-one-national">Capital One</a> or <a href="USAA%20Federal%20Savings%20Bank">USAA Federal Savings Bank</a> &#8211; penalties have still reached hundreds of millions of dollars. The recurrence of multi-billion-dollar penalties across traditional banks and <a href="https://www.justice.gov/archives/opa/pr/binance-and-ceo-plead-guilty-federal-charges-4b-resolution">digital asset platforms</a> underscores a systemic compliance lag rather than isolated institutional failure. Industry analyses and regulatory reports <a href="https://www.sanctions.io/blog/why-companies-fail-on-aml-compliance">repeatedly warn</a> that compliance systems often lag behind transaction complexity and adversary adaptation. The recurring pattern is not episodic misconduct, but structural misalignment between institutional monitoring models and industrial-scale laundering services.</p><p>As banks increasingly integrate digital assets into their payment and settlement systems, risk exposure expands rather than contracts. Beyond retail deposits and digital asset channels, trade finance instruments and correspondent banking relationships provide additional integration pathways between shadow liquidity networks and formal capital markets.</p><p>Existing AML <a href="https://www.fatf-gafi.org/content/dam/fatf-gafi/guidance/Guidance-Risk-Based-Supervision.pdf">evaluation frameworks</a> primarily assess compliance with reporting and supervisory standards; they are less equipped to measure institutional resilience against coordinated, service-based clearing models. As parallel liquidity systems scale, institutions calibrated to detect isolated transactional anomalies &#8212; rather than sustained throughput facilitated by dispersed nodes within otherwise profitable client relationships &#8212; will remain structurally exposed.</p><p>Recalibrating compliance from anomaly detection toward throughput risk management may become one of the banking sector&#8217;s defining challenges in the years ahead. National supervisory regimes remain fragmented, while clearing networks operate transnationally, exploiting jurisdictional seams faster than coordination mechanisms can align. In this environment, the question is no longer whether parallel clearing systems can penetrate formal institutions, but whether supervisory models can evolve quickly enough to recognize that they already have.</p><p><strong>Conclusion</strong></p><p>The TD enforcement action highlights more than episodic compliance breakdown. It reflects the growing sophistication of parallel clearing systems that now function as service-based liquidity providers, capable of sustained access to regulated institutions. These networks do not depend on dramatic corruption, but instead rely on consistent access to friction points &#8212; human, procedural, or technological &#8212; where transaction flow can continue with minimal interruption.</p><p>As illicit and constrained capital continues to seek conversion into stable financial markets, pressure on these integration nodes will increase. Monitoring systems calibrated to detect irregular spikes may struggle to identify persistent throughput dispersed across routine activity. The resulting vulnerability lies less in individual misconduct than in structural misalignment between institutional oversight models and industrial-scale clearing operations. Reorienting supervision toward throughput risk &#8212; rather than isolated anomaly detection &#8212; may become essential as shadow liquidity systems continue expanding alongside formal capital markets.</p>]]></content:encoded></item><item><title><![CDATA[Western Banks and the Rise of Parallel Financial Systems]]></title><description><![CDATA[The growing risk of illicit and sanctions-evasive liquidity embedding Into global capital markets]]></description><link>https://www.btl-research.com/p/western-banks-and-the-rise-of-parallel</link><guid isPermaLink="false">https://www.btl-research.com/p/western-banks-and-the-rise-of-parallel</guid><dc:creator><![CDATA[Adam Rousselle]]></dc:creator><pubDate>Thu, 05 Feb 2026 16:50:15 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Qnxz!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c515543-46b0-4c4f-a8df-fdeac6fd5ba5_4000x2660.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Qnxz!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c515543-46b0-4c4f-a8df-fdeac6fd5ba5_4000x2660.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Qnxz!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c515543-46b0-4c4f-a8df-fdeac6fd5ba5_4000x2660.webp 424w, https://substackcdn.com/image/fetch/$s_!Qnxz!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c515543-46b0-4c4f-a8df-fdeac6fd5ba5_4000x2660.webp 848w, https://substackcdn.com/image/fetch/$s_!Qnxz!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c515543-46b0-4c4f-a8df-fdeac6fd5ba5_4000x2660.webp 1272w, https://substackcdn.com/image/fetch/$s_!Qnxz!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c515543-46b0-4c4f-a8df-fdeac6fd5ba5_4000x2660.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Qnxz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c515543-46b0-4c4f-a8df-fdeac6fd5ba5_4000x2660.webp" width="1456" height="968" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0c515543-46b0-4c4f-a8df-fdeac6fd5ba5_4000x2660.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:968,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Deutsche Bank Police Raid Adds to Risk Control Concern - Bloomberg&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Deutsche Bank Police Raid Adds to Risk Control Concern - Bloomberg" title="Deutsche Bank Police Raid Adds to Risk Control Concern - Bloomberg" srcset="https://substackcdn.com/image/fetch/$s_!Qnxz!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c515543-46b0-4c4f-a8df-fdeac6fd5ba5_4000x2660.webp 424w, https://substackcdn.com/image/fetch/$s_!Qnxz!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c515543-46b0-4c4f-a8df-fdeac6fd5ba5_4000x2660.webp 848w, https://substackcdn.com/image/fetch/$s_!Qnxz!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c515543-46b0-4c4f-a8df-fdeac6fd5ba5_4000x2660.webp 1272w, https://substackcdn.com/image/fetch/$s_!Qnxz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c515543-46b0-4c4f-a8df-fdeac6fd5ba5_4000x2660.webp 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>Image from a previous <a href="https://www.bloomberg.com/opinion/articles/2018-11-29/deutsche-bank-police-raid-adds-to-risk-control-concern">police raid </a>on Deutsche Bank that occurred in 2018</em><br><br>On January 28, German police prosecutors raided the Berlin and Frankfurt offices of Deutsche Bank, the largest financial institution in the country. The surprise raid came just one day before the company was set to release its 2025 earnings report, causing <a href="https://www.marketwatch.com/livecoverage/stock-market-today-sp500-7000-dow-nasdaq-up-tech-boost-meta-microsoft-tesla-fed-dollar-gold-record/card/deutsche-bank-stock-slumps-on-reports-of-raid-over-money-laundering-allegations-S6TI6mIJzwoK1EiGlJ6F?gaa_at=eafs&amp;gaa_n=AWEtsqdDrfTn015e_cK2m-T6ftqYcWcppPhfYvYtg7a7jD_UpFFqLO3NuHCzYNRZP-g%3D&amp;gaa_ts=697bee6d&amp;gaa_sig=VBxke9ePRH3yrERqJoCg35sB62IkTjHjakDYFlqYGEgp3oBYC_1XR30TjsJe5qv_d6z3F5lb8frkyv8lEzu2kw%3D%3D">share prices</a> to immediately plummet by around 3%. At least 30 plainclothes investigators entered the offices around 10am local time, targeting a &#8220;yet unknown&#8221; number of employees. According to prosecutors, their investigation surrounds companies suspected of <a href="https://www.dw.com/en/germany-news-deutsche-bank-raided-in-money-laundering-probe/live-75687631">money laundering</a> on behalf of entities tied to sanctioned Russian oligarch, Roman Abramovich.</p><p>This raid is illustrative of a much broader trend.</p><p>The last few years have delivered a steady slew of headlines about major law enforcement actions against banks suspected of money laundering and falling prey to criminal influence. Last year, the U.S. Treasury made the <a href="https://home.treasury.gov/news/press-releases/sb0179">unprecedented move</a> of sanctioning three Mexican banks as a primary money laundering concerns in connection with opioid trafficking. In 2024, Canada&#8217;s TD Bank agreed to pay a record <a href="https://www.fincen.gov/news/news-releases/fincen-assesses-record-13-billion-penalty-against-td-bank">$3 billion</a> in fines in connection with money laundering for the Sinaloa and other Mexican drug cartels; Canada&#8217; FINTRAC imposed nearly $10 million in <a href="https://fintrac-canafe.canada.ca/pen/amps/pen-2024-05-02-eng">additional fines</a> against the bank. Crypto exchanges are at the front lines of such punitive measures, with Binance agreeing to pay a $4.3 billion in fines and restitution in a <a href="https://www.forbes.com/sites/tylerroush/2024/02/23/judge-approves-binances-43-billion-settlement-for-anti-money-laundering-sanctions-violations/">2023 deal</a> with US regulators enforcement. Last year, FINTRAC <a href="https://www.acams.org/en/news/canadas-new-normal-record-aml-penalties">imposed a record </a>$177 million in fines against crypto exchange Xeltox in connection with darknet markets, child abuse, fraud, and ransomware.</p><p>These are not compliance failures, but failures of perception. Institutions are operating with risk models built for a world in which illicit finance was episodic, traceable, and external to core liquidity systems. That world no longer exists.</p><p>While laundering techniques evolve incrementally, detection regimes evolve retroactively. Capital that clears today under acceptable assumptions is increasingly reclassified tomorrow as sanctionable, tainted, or facilitative. Institutions that do not adapt in advance are not merely exposed &#8212; they are accumulating latent enforcement risk they cannot unwind. Evidence suggests the consequences are increasingly unaffordable, prompting the need for proactive measures.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!kSZk!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f0ec059-6dfe-4565-bee8-b2363fcfbdfd_1024x576.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!kSZk!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f0ec059-6dfe-4565-bee8-b2363fcfbdfd_1024x576.jpeg 424w, https://substackcdn.com/image/fetch/$s_!kSZk!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f0ec059-6dfe-4565-bee8-b2363fcfbdfd_1024x576.jpeg 848w, https://substackcdn.com/image/fetch/$s_!kSZk!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f0ec059-6dfe-4565-bee8-b2363fcfbdfd_1024x576.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!kSZk!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f0ec059-6dfe-4565-bee8-b2363fcfbdfd_1024x576.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!kSZk!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f0ec059-6dfe-4565-bee8-b2363fcfbdfd_1024x576.jpeg" width="1024" height="576" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1f0ec059-6dfe-4565-bee8-b2363fcfbdfd_1024x576.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:576,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Myanmar's Shwe Kokko: Inside a city 'built on scams' - BBC News&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Myanmar's Shwe Kokko: Inside a city 'built on scams' - BBC News" title="Myanmar's Shwe Kokko: Inside a city 'built on scams' - BBC News" srcset="https://substackcdn.com/image/fetch/$s_!kSZk!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f0ec059-6dfe-4565-bee8-b2363fcfbdfd_1024x576.jpeg 424w, https://substackcdn.com/image/fetch/$s_!kSZk!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f0ec059-6dfe-4565-bee8-b2363fcfbdfd_1024x576.jpeg 848w, https://substackcdn.com/image/fetch/$s_!kSZk!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f0ec059-6dfe-4565-bee8-b2363fcfbdfd_1024x576.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!kSZk!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f0ec059-6dfe-4565-bee8-b2363fcfbdfd_1024x576.jpeg 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>Shwe Kokko, Myanmar: built in a civil war and financed through Chinese state investment, the multi-billion-dollar militant-backed city now serves as a notorious hub for cyber scammers. </em></p><h2><strong>Parallel financial infrastructures</strong></h2><p>Massive, parallel liquidity architectures now operate alongside regulated global financial markets. These systems emerged to serve actors excluded from the formal financial system and have proliferated amid rapid fintech innovation, tightening sanctions regimes, and rising geopolitical polarization.</p><p>Strict capital controls, combined with sustained political and economic instability, have generated large and unregulated capital outflows from high-stress jurisdictions such as <a href="https://www.brookings.edu/articles/chinas-achilles-heel-capital-flight/">China</a>, <a href="https://www.theguardian.com/world/2023/oct/31/russia-capital-controls-rouble-vladimir-putin">Russia</a>, and <a href="https://www.euronews.com/business/2026/01/09/irans-revolutionary-guard-control-the-economy-heres-why-the-currency-suffers">Iran</a>. These outflows create primary demand for parallel financial infrastructure, supplying the early liquidity needed to establish and scale shell companies, grey-market digital exchanges, trade-based money laundering mechanisms, and over-the-counter (OTC) crypto brokerage networks. Under sanctions pressure, state-linked actors within these jurisdictions also rely on such channels to export goods and procure restricted or <a href="https://www.btl-research.com/p/deepseek-deep-dive-what-role-did?utm_source=publication-search">dual-use technologies</a> beyond formal oversight.</p><p>These parallel architectures are not used exclusively by state-linked elites or individuals engaged in capital flight. Organized criminal groups&#8212;including Latin America <a href="https://www.btl-research.com/p/chinacartel-nexus-the-liquidity-architecture">drug cartels</a>, Chinese-run <a href="https://www.btl-research.com/p/chinese-shadow-liquidity-and-the">scam syndicates</a> operating across Southeast Asia and Africa, and European networks such as the <a href="https://decode39.com/6663/ndrangheta-china-shadow-banks/">&#8217;Ndrangheta</a>&#8212;exploit the same ungoverned financial rails to move and launder proceeds.</p><p>The systemic risk lies not in any single actor, but in the laundering capacity of these parallel systems themselves. Although designed to operate outside regulatory oversight, these infrastructures ultimately interface with&#8212;and depend upon&#8212;safe, well-regulated <a href="https://www.btl-research.com/p/understanding-unregulated-capital">financial markets</a>. Capital originating in capital flight, sanctions evasion, and organized crime frequently converges at the same intermediaries and settlement points before being absorbed into Western asset markets.</p><p>For example, <a href="https://newlinesinstitute.org/global-security-mil-priorities/china-cartel-nexus-the-liquidity-architecture-transforming-the-global-drug-economy/">Chinese money laundering networks</a> (CMLNs) facilitate the laundering of bulk cash generated by Mexican drug cartels, with funds ultimately settling into U.S. asset portfolios held by wealthy Chinese households seeking capital externalization. Similarly, <a href="https://newlinesinstitute.org/global-security-mil-priorities/chinese-shadow-liquidity-and-the-scam-economy/">infrastructure projects</a> financed under the Chinese state-run Belt and Road Initiative have, in certain jurisdictions, contributed to permissive governance environments that organized criminal groups exploit to establish large-scale cyber-scam operations, ultimately moving wealth out of the country and into private hands elsewhere. Once laundered through the region&#8217;s vast ecosystem of casino gambling hubs and international shell corporations, these funds may be invested in Western markets like <a href="https://www.btl-research.com/p/australian-watchdog-sounds-alarm">Australia</a> or the United States.</p><p>Elsewhere, Iranian regime-linked elites have accumulated extensive international <a href="https://www.ft.com/content/c28d7274-6bba-49c7-bddb-4a4bb100ef97">property portfolios</a> in Western countries using <a href="https://www.btl-research.com/p/from-resilience-to-extraction-how">shadow financial</a> infrastructure associated with the Islamic Revolutionary Guard Corps and its affiliated networks. In Europe, criminal organizations such as the &#8217;Ndrangheta <a href="https://nordicmonitor.com/2025/10/german-report-warns-turkeys-narco-authoritarianism-is-fueling-organized-crime-across-europe/#:~:text=The%20report%20also%20examines%20the,culture%20of%20impunity%20remains%20unchanged.">rely on the same</a> real-estate-based laundering channels in Turkey and offshore banking access points in Cyprus that have long been used by Russian elites to externalize wealth and sustain financial activity under sanctions pressure. Recent evidence also indicates that Russian state-owned factories <a href="https://eualive.net/russian-arms-fueling-italian-mafia-a-growing-security-threat/">increasingly supply</a> Italian mafia groups with unmarked weapons via shadow fleet vessels, demonstrating that these informal networks can produce violent consequences.</p><p>Across these cases, the common denominator is not coordination between actors, but the repeated reuse of resilient parallel financial infrastructure that channels capital back into regulated Western markets. Funds associated with criminal or terrorist activity are placed through multiple layers&#8212;including casinos, online gaming platforms, real estate, and front companies&#8212;before being progressively cleaned and integrated. The result is not a segregated illicit economy, but deep structural integration between unaccountable liquidity systems and the global financial core.</p><h2><strong>Exposure</strong></h2><p>The three-tiered architecture clarifies the exposure to Western banks and other institutions:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!UkIB!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F82f44a0d-f19c-4c71-8119-71a91c4cd04f_1148x572.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!UkIB!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F82f44a0d-f19c-4c71-8119-71a91c4cd04f_1148x572.png 424w, https://substackcdn.com/image/fetch/$s_!UkIB!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F82f44a0d-f19c-4c71-8119-71a91c4cd04f_1148x572.png 848w, https://substackcdn.com/image/fetch/$s_!UkIB!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F82f44a0d-f19c-4c71-8119-71a91c4cd04f_1148x572.png 1272w, https://substackcdn.com/image/fetch/$s_!UkIB!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F82f44a0d-f19c-4c71-8119-71a91c4cd04f_1148x572.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!UkIB!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F82f44a0d-f19c-4c71-8119-71a91c4cd04f_1148x572.png" width="1148" height="572" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/82f44a0d-f19c-4c71-8119-71a91c4cd04f_1148x572.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:572,&quot;width&quot;:1148,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;A diagram of a business\n\nAI-generated content may be incorrect.&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="A diagram of a business

AI-generated content may be incorrect." title="A diagram of a business

AI-generated content may be incorrect." srcset="https://substackcdn.com/image/fetch/$s_!UkIB!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F82f44a0d-f19c-4c71-8119-71a91c4cd04f_1148x572.png 424w, https://substackcdn.com/image/fetch/$s_!UkIB!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F82f44a0d-f19c-4c71-8119-71a91c4cd04f_1148x572.png 848w, https://substackcdn.com/image/fetch/$s_!UkIB!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F82f44a0d-f19c-4c71-8119-71a91c4cd04f_1148x572.png 1272w, https://substackcdn.com/image/fetch/$s_!UkIB!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F82f44a0d-f19c-4c71-8119-71a91c4cd04f_1148x572.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>Figure 1 illustrates a three-tier liquidity architecture showing how parallel financial systems interact with regulated Western capital markets.</em></p><ul><li><p><strong>Tier 1</strong> captures upstream capital outflows from high-stress jurisdictions shaped by capital controls, sanctions pressure, and regime instability. Driven primarily by elite asset externalization and state-linked value movement, these outflows provide much of the initial liquidity that seeds parallel financial systems due to the volume of demand they represent.</p></li><li><p><strong>Tier 2</strong> represents the midstream laundering infrastructure that enables these flows to move and settle outside formal regulatory oversight. This layer includes OTC brokers, trade-based money laundering, shell companies, grey-market digital exchanges, and related facilitators that function as shared financial rails used by state-linked elites, criminal networks, and sanctioned actors alike.</p></li><li><p><strong>Tier 3</strong> encompasses downstream threat actors. Including organized crime groups, militant organizations, and terrorist networks. These groups frequently exploit the same infrastructure to move and launder illicit proceeds.</p></li></ul><p>The diagram highlights the <strong>bidirectional interaction between tiers</strong>, reflecting how upstream capital flight sustains laundering infrastructure while downstream criminal activity reinforces its profitability and resilience.</p><p><strong>The right-hand node</strong> illustrates the final stage of the cycle: <em>integration into Western capital markets</em>. Despite originating in parallel systems designed to evade oversight, laundered capital ultimately seeks stability and legal protection within regulated financial systems, creating systemic exposure for financial institutions, real estate markets, and investment products.</p><p>The core risk lies not in any single actor, but in the durable infrastructure that links capital flight, illicit finance, and regulated markets into a continuous financial circuit. Most importantly, as global sanctions regimes increasingly target state-linked actors at Tier 1 and non-state actors at Tier 3, exposure concentrates in Western capital markets where funds moving through this infrastructure are ultimately integrated.</p><h2><strong>Global enforcement vigilance</strong></h2><p>Global regulators and law enforcement agencies are under accelerating pressure to <strong>identify, disrupt, and prosecute</strong> financial activity linked to illicit finance. This pressure is no longer cyclical or reputational; it is structural and driven by two converging forces.</p><h4><strong>First, geopolitical escalation and sanctions enforcement</strong></h4><p>In an increasingly polarized international environment, illicit financial channels used by adversarial states to bypass export controls and procure restricted or dual-use goods are now treated as matters of national security rather than compliance oversight. As sanctions regimes expand in scope and severity, enforcement agencies are increasingly compelled to pursue not only upstream actors but also the financial institutions through which such activity ultimately settles.</p><p><em>Examples include Russia&#8217;s sanctioned war economy, Iran&#8217;s shadow banking networks, and China&#8217;s underground procurement of restricted military and dual-use technologies.</em></p><h4><strong>Second, the trans-nationalization of organized crime</strong></h4><p>Modern criminal networks are increasingly post-sovereign, operating across jurisdictions and establishing parallel financial systems that erode state authority and undermine global governance. These systems are no longer peripheral; they intersect directly with regulated markets.</p><p><em>Examples include militarized Mexican cartels such as Sinaloa and CJNG, as well as large-scale scam-center enclaves in Myanmar and Cambodia.</em></p><p>Across all domains, political tolerance for inaction is collapsing. Regulatory and law enforcement agencies are increasingly expected to demonstrate tangible results, often through high-profile investigations, raids, and retroactive enforcement actions. In the United States, recent sanctions guidance has materially expanded this exposure: the Treasury Department&#8217;s Office of Foreign Assets Control now applies a ten-year <a href="https://ofac.treasury.gov/media/933056/download?inline">enforcement lookback</a>, extending liability to conduct that cleared under acceptable assumptions years earlier. Parallel developments are underway in Europe, where the European Union has moved to <a href="https://www.skadden.com/insights/publications/2024/11/eu-aims-for-harmonized-sanctions">harmonize criminal penalties</a> for sanctions violations across member states, signaling a broader shift toward more aggressive and coordinated enforcement.</p><p>Because Western banks and capital markets represent the terminal integration point for most large-scale laundering activity, they are not incidental to this process, <em>structurally exposed</em> to it. Capital that once cleared under acceptable assumptions is increasingly reclassified as sanctionable, tainted, or facilitative. Institutions that treat these dynamics as external threats rather than embedded risks are not merely vulnerable to future scrutiny; they are accumulating enforcement exposure that cannot be unwound once political thresholds are crossed.</p><h2><strong>Technological advances risk further investigatory disruption</strong></h2><p>Technological advances in <a href="https://www.btl-research.com/p/closing-the-enforcement-gap-ai-illicit">machine learning and artificial intelligence</a> are rapidly expanding investigators&#8217; ability to retroactively identify illicit financial networks after they have already entered Western capital markets. While global organized crime syndicates adopted crypto early to bypass traditional regulatory controls, the underlying structure of blockchain systems &#8212; which preserve immutable transaction records on public ledgers &#8212; has paradoxically made illicit liquidity more traceable over time. As a result, capital that once appeared safely integrated can later be reconstructed, mapped, and reclassified. Blockchain analytics platforms are already deploying advanced AI-driven pattern detection, and DARPA&#8217;s <a href="https://www.darpa.mil/research/programs/a3ml-anticipatory-adaptive">A3ML program</a> aims to make large-scale money laundering economically unviable by disrupting these networks at scale.</p><p>At scale, AI adoption favors actors with capital depth, institutional expertise, and the protection of the rule of law. While criminals may experiment with tactical obfuscation, these advantages compound over time in favor of investigators rather than illicit networks. Banks and other financial institutions should therefore assume that today&#8217;s undetected exposure may become tomorrow&#8217;s enforceable liability, rather than relying on money launderers&#8217; ability to permanently conceal financial activity.</p><h2><strong>Conclusion</strong></h2><p>The dynamics described here are not temporary distortions or episodic compliance challenges. They reflect a structural shift in how illicit, gray, and state-linked capital moves, settles, and ultimately integrates into the global financial system. Parallel financial infrastructures have matured into durable liquidity systems that operate continuously alongside regulated markets, not at their margins.</p><p>Western banks and asset markets sit downstream of these systems. They are not incidental endpoints but the terminal nodes where capital originating in sanctions evasion, and criminal enterprise ultimately seeks stability, legal protection, and yield. As enforcement priorities expand from reputational misconduct to national security risk, and as sanctions regimes increasingly target both state and non-state actors across this spectrum, exposure concentrates precisely where this capital is absorbed.</p><p>Crucially, enforcement is no longer prospective. Detection, attribution, and liability are increasingly retroactive, enabled by improved data integration, cross-border coordination, and advancing analytical technologies. Capital that cleared under acceptable assumptions in the past is now subject to reclassification, scrutiny, and enforcement years later. Once political thresholds are crossed, this exposure cannot be unwound.</p><p>Institutions that continue to treat illicit finance as an external threat, rather than an embedded feature of modern liquidity systems, are not merely vulnerable to future action. They are accumulating latent enforcement risk that will surface on timelines and terms they do not control. In this environment, resilience depends less on incremental compliance improvements than on a fundamental reassessment&#8212;at the board, supervisory, and enterprise-risk level&#8212;of how parallel financial infrastructures intersect with regulated markets and where, within that system, exposure is truly accumulating.</p><p><strong>This problem is not cyclical, but structural. Western financial markets sit downstream of parallel liquidity systems that are already embedded. Enforcement is increasingly retroactive, not preventive. Institutions that fail to adapt now are not merely exposed to future scrutiny &#8212; they are accumulating liabilities that cannot be unwound once political thresholds are crossed.</strong></p>]]></content:encoded></item><item><title><![CDATA[Podcast Interview: Access Hub]]></title><description><![CDATA[My latest appearance on the Access Hub podcast to the world of illicit finance and the growing global threat it poses]]></description><link>https://www.btl-research.com/p/podcast-interview-access-hub</link><guid isPermaLink="false">https://www.btl-research.com/p/podcast-interview-access-hub</guid><dc:creator><![CDATA[Adam Rousselle]]></dc:creator><pubDate>Wed, 04 Feb 2026 16:53:35 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!a_yd!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d25fb2b-b802-46c0-a6bf-95c89792c382_1106x1104.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>I recently appeared on the <a href="https://www.accesshub.space/">Access Hub</a> podcast to talk about my recent work. Thanks again to Omkar Nikam for reaching out. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!a_yd!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d25fb2b-b802-46c0-a6bf-95c89792c382_1106x1104.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!a_yd!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d25fb2b-b802-46c0-a6bf-95c89792c382_1106x1104.png 424w, https://substackcdn.com/image/fetch/$s_!a_yd!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d25fb2b-b802-46c0-a6bf-95c89792c382_1106x1104.png 848w, https://substackcdn.com/image/fetch/$s_!a_yd!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d25fb2b-b802-46c0-a6bf-95c89792c382_1106x1104.png 1272w, https://substackcdn.com/image/fetch/$s_!a_yd!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d25fb2b-b802-46c0-a6bf-95c89792c382_1106x1104.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!a_yd!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d25fb2b-b802-46c0-a6bf-95c89792c382_1106x1104.png" width="1106" height="1104" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7d25fb2b-b802-46c0-a6bf-95c89792c382_1106x1104.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1104,&quot;width&quot;:1106,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1036754,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.btl-research.com/i/186878628?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d25fb2b-b802-46c0-a6bf-95c89792c382_1106x1104.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!a_yd!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d25fb2b-b802-46c0-a6bf-95c89792c382_1106x1104.png 424w, https://substackcdn.com/image/fetch/$s_!a_yd!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d25fb2b-b802-46c0-a6bf-95c89792c382_1106x1104.png 848w, https://substackcdn.com/image/fetch/$s_!a_yd!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d25fb2b-b802-46c0-a6bf-95c89792c382_1106x1104.png 1272w, https://substackcdn.com/image/fetch/$s_!a_yd!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d25fb2b-b802-46c0-a6bf-95c89792c382_1106x1104.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>Part I:</strong> </p><div id="youtube2-Cgacz25opXs" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;Cgacz25opXs&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/Cgacz25opXs?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p><strong>Part II:</strong> </p><div id="youtube2-SPztw6ynZGs" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;SPztw6ynZGs&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/SPztw6ynZGs?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div>]]></content:encoded></item><item><title><![CDATA[Understanding Unregulated Capital Outflows Is Essential in Predicting Tomorrow's Threats]]></title><description><![CDATA[The Financial Mechanics Behind the Modern Threat Landscape]]></description><link>https://www.btl-research.com/p/understanding-unregulated-capital</link><guid isPermaLink="false">https://www.btl-research.com/p/understanding-unregulated-capital</guid><dc:creator><![CDATA[Adam Rousselle]]></dc:creator><pubDate>Tue, 27 Jan 2026 19:50:53 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Krmp!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb08c3f8-cec8-4b8f-9a02-fdd1a3b1e8bb_1750x984.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Author&#8217;s Note: </p><blockquote><p><em>This piece is more technical than much of my prior work. It is intended as a conceptual and analytical framework rather than a narrative essay, and is written for readers interested in understanding the structural mechanics of unregulated capital flows and their downstream security implications.</em></p><p><em>I am publishing it openly in the belief that clearer analytical tools are necessary if institutions are to anticipate and disrupt emerging threats more effectively. Readers who find this work useful, or who are working on related problems, are welcome to contact me directly at info@btl-research.com.</em></p></blockquote><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Krmp!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb08c3f8-cec8-4b8f-9a02-fdd1a3b1e8bb_1750x984.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Krmp!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb08c3f8-cec8-4b8f-9a02-fdd1a3b1e8bb_1750x984.png 424w, https://substackcdn.com/image/fetch/$s_!Krmp!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb08c3f8-cec8-4b8f-9a02-fdd1a3b1e8bb_1750x984.png 848w, https://substackcdn.com/image/fetch/$s_!Krmp!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb08c3f8-cec8-4b8f-9a02-fdd1a3b1e8bb_1750x984.png 1272w, https://substackcdn.com/image/fetch/$s_!Krmp!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb08c3f8-cec8-4b8f-9a02-fdd1a3b1e8bb_1750x984.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Krmp!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb08c3f8-cec8-4b8f-9a02-fdd1a3b1e8bb_1750x984.png" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/bb08c3f8-cec8-4b8f-9a02-fdd1a3b1e8bb_1750x984.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:937309,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.btl-research.com/i/185993083?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb08c3f8-cec8-4b8f-9a02-fdd1a3b1e8bb_1750x984.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Krmp!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb08c3f8-cec8-4b8f-9a02-fdd1a3b1e8bb_1750x984.png 424w, https://substackcdn.com/image/fetch/$s_!Krmp!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb08c3f8-cec8-4b8f-9a02-fdd1a3b1e8bb_1750x984.png 848w, https://substackcdn.com/image/fetch/$s_!Krmp!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb08c3f8-cec8-4b8f-9a02-fdd1a3b1e8bb_1750x984.png 1272w, https://substackcdn.com/image/fetch/$s_!Krmp!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb08c3f8-cec8-4b8f-9a02-fdd1a3b1e8bb_1750x984.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>In work published over the past several months, I have emphasized that unregulated capital flows I term &#8220;shadow liquidity&#8221; consistently manifest as powerful downstream threats. Whether terrorist groups in Sub-Saharan Africa leveraging illicit networks to smuggle resources and procure weapons, or scam centers and drug cartels exploiting complex liquidity architectures, the global shadow financial ecosystem has become markedly more dangerous.</p><p>I developed a three-tier framework to explain how these parallel financial architectures operate and why they generate persistent downstream harm. Tier 2 consists of a vast layer of globally connected financial intermediaries that move value outside formal legal and regulatory oversight. <strong>Tier 3</strong> sits downstream of these flows and includes criminal organizations, militant groups, and terrorist networks that exploit Tier 2 infrastructure to finance operations and project predation and violence.</p><p>Tier 1 is where the threat ultimately originates. At this level, large pools of wealth&#8212;often held by corrupt officials, politically exposed persons, and other elites in tightly controlled capital markets&#8212;seek to externalize assets to safer jurisdictions. This demand for offshore mobility creates the economic foundation for Tier 2 networks, which are then leveraged by Tier 3 actors, with or without direct state involvement.</p><p>These dynamics likely involve <strong>hundreds of billions of dollars annually</strong>, much of which fuels instability, entrenches criminal economies, and contributes to the impoverishment and coercion of millions of people worldwide. In recent work for the New Lines Institute, I documented how militarized <a href="https://newlinesinstitute.org/global-security-mil-priorities/chinese-shadow-liquidity-and-the-scam-economy/">scam syndicates </a>in Southeast Asia and Latin American <a href="https://newlinesinstitute.org/global-security-mil-priorities/china-cartel-nexus-the-liquidity-architecture-transforming-the-global-drug-economy/">drug cartels</a> (Tier 3) tap into Tier 2 infrastructure that moves billions of dollars annually in response to Tier 1 demand originating in the tightly controlled Chinese capital market. My most recent work for <em>Between the Lines</em> shows how <a href="https://www.btl-research.com/p/from-resilience-to-extraction-how">Iran leverages</a> a similar three-tiered structure to finance its proxy networks and externalize elite wealth.</p><p>Each of these systems is <strong>inherently destabilizing</strong>, not only for downstream societies targeted by criminal and militant activity, but also for the states at the origin point, where capital flight erodes economic resilience and governance over time. For this reason, understanding the origin of unregulated capital flows at Tier 1 is imperative for global security.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!j5m8!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88f20b90-4197-442a-b45c-1e48154cb028_1094x1054.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!j5m8!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88f20b90-4197-442a-b45c-1e48154cb028_1094x1054.png 424w, https://substackcdn.com/image/fetch/$s_!j5m8!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88f20b90-4197-442a-b45c-1e48154cb028_1094x1054.png 848w, https://substackcdn.com/image/fetch/$s_!j5m8!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88f20b90-4197-442a-b45c-1e48154cb028_1094x1054.png 1272w, https://substackcdn.com/image/fetch/$s_!j5m8!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88f20b90-4197-442a-b45c-1e48154cb028_1094x1054.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!j5m8!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88f20b90-4197-442a-b45c-1e48154cb028_1094x1054.png" width="1094" height="1054" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/88f20b90-4197-442a-b45c-1e48154cb028_1094x1054.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1054,&quot;width&quot;:1094,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:224744,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.btl-research.com/i/185993083?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88f20b90-4197-442a-b45c-1e48154cb028_1094x1054.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!j5m8!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88f20b90-4197-442a-b45c-1e48154cb028_1094x1054.png 424w, https://substackcdn.com/image/fetch/$s_!j5m8!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88f20b90-4197-442a-b45c-1e48154cb028_1094x1054.png 848w, https://substackcdn.com/image/fetch/$s_!j5m8!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88f20b90-4197-442a-b45c-1e48154cb028_1094x1054.png 1272w, https://substackcdn.com/image/fetch/$s_!j5m8!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88f20b90-4197-442a-b45c-1e48154cb028_1094x1054.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>The three-tier framework illustrates how unregulated capital flight and its facilitators at Tier 1 and Tier 2 translate into downstream criminal and militant threats at Tier 3.</em></p><h2>Unprecedented Speed</h2><p>This danger is magnified by the unprecedented speed at which unregulated wealth now moves. Since the collapse of Bretton Woods in the early 1970s, global finance has become increasingly interconnected, with cross-jurisdictional transfers occurring in hours&#8212;or seconds&#8212;rather than days or weeks. Compliance and enforcement frameworks remain largely reactive, disproportionately focused on individual transactional disruption rather than sustained action against underlying networks, ownership, and control structures. The proliferation of shell corporations and offshore banking has further obscured attribution and accountability, while crypto-based decentralized financial systems introduce parallel liquidity channels that operate largely outside the regulatory assumptions underpinning the modern financial order.</p><p>Over the past decade, the consequences of these dynamics have become severe and self-reinforcing. Armed militant groups sustained by global shadow liquidity from <a href="https://thediplomat.com/2024/11/chinese-demand-for-rosewood-empowers-some-of-africas-deadliest-terrorist-groups/">resource theft</a> and <a href="https://www.atlanticcouncil.org/blogs/africasource/the-sahel-is-now-an-epicenter-of-drug-smuggling-that-is-terrible-news-for-everyone/">drug trafficking</a> have destabilized large swaths of the Sahel. Industrial-scale scam operations in Southeast Asia and parts of Africa rely on coerced labor, embedding vulnerable populations in criminal economies that <a href="https://www.fdd.org/analysis/2026/01/14/made-in-china-paid-by-seniors-stopping-the-surge-of-international-scams/">prey disproportionately</a> on the elderly in aging industrial societies. Other multinational laundering networks sustain transnational cartels that <a href="https://newlinesinstitute.org/global-security-mil-priorities/china-cartel-nexus-the-liquidity-architecture-transforming-the-global-drug-economy/">distribute lethal products</a> while recycling billions in illicit proceeds.</p><p>In both underregulated jurisdictions and advanced economies, the downstream effects are increasingly visible: criminalized local ecosystems, degraded infrastructure, housing market distortion, and the erosion of demographic resilience essential to long-term social stability.</p><p>If left unchecked, these illicit flows have the power to destabilize and degrade modern life at a systemic level. For this reason, network-level disruption&#8212;not merely transactional interdiction&#8212;is imperative.</p><h2><strong>Toward Networked Disruption</strong></h2><p>Regulators and enforcement professionals are beginning to grapple with the scope of the challenge. Financial institutions, insurers, manufacturers, and other exposed sectors have devoted increasing resources to understanding global financial risk, giving rise to specialized internal teams and a growing ecosystem of external advisory firms of uneven quality. Enforcement authorities have also come to rely more heavily on the emerging blockchain analytics sector, but often as a partial substitute for deeper structural investigation. </p><p>For criminal organizations and malign state actors, blockchain has proven to be a double-edged sword. While it enables near-instantaneous, low-friction value transfer across jurisdictions, the permanent recording of transactions on public ledgers creates cumulative exposure once investigators begin reconstructing networks. Advances in machine learning and artificial intelligence &#8211; as I chronicled for an <a href="https://gnet-research.org/2025/10/24/closing-the-enforcement-gap-ai-illicit-liquidity-and-the-next-phase-of-counter-terrorist-finance/">October article</a> at GNET &#8211; have further accelerated the ability to cluster, trace, and contextualize these datapoints at scale, offering meaningful advantages over traditional investigative methods.</p><p>Regulatory efforts to bring key enablers&#8212;such as <a href="https://www.congress.gov/bill/119th-congress/senate-bill/1582/text">stablecoins</a>&#8212;more fully within existing compliance frameworks are a necessary step forward. But transactional visibility and downstream disruption alone are insufficient. Achieving durable, network-level impact in a way that meaningfully improves global security requires a deeper understanding of how unregulated capital forms, aggregates, and moves at its source&#8212;before it is laundered, weaponized, or embedded into resilient criminal and state-aligned illicit infrastructures.</p><h2><strong>Why Timing Capital Outflows Is Essential</strong></h2><p>Understanding why timing matters requires close examination of where unregulated capital flows originate. In an increasingly polarized global financial environment, states seeking to operate outside the dollar-denominated system&#8212;often due to sanctions or anticipation of future sanctions&#8212;have enabled parallel financial architectures to sustain economic activity.</p><p>When these systems function as intended, they pull liquidity inward toward core institutions &#8211; especially central banks &#8211; reinforcing local currencies and supporting essential state functions under stress conditions such as wartime sanctions. As long as confidence holds, capital movement within these systems remains predominantly centripetal, stabilizing rather than eroding the domestic financial base.</p><p>But opacity of these parallel systems is both a feature and a fault. Because they are unaccountable by design&#8212;even to the states that authorize them&#8212;these systems enable insiders to quietly extract and offshore wealth. When confidence begins to fracture, elite incentives shift rapidly. Pressure to externalize capital compounds, transforming inward-facing financial mechanisms into outward-facing extraction channels. At this inflection point, operators increasingly seek offshore liquidity through any available means, including partnerships with transnational criminal networks and, in some cases, the financing of terrorism. When the financing of other states or proxy groups through these opaque networks becomes a state directive, the rate of elite pilfering often accelerates, as illicit capital movement is shielded by national security justifications and subjected to even less internal oversight.</p><p>Importantly, Tier 2 capacity is not unlimited. As unregulated capital outflows accelerate, intermediary networks can become congested, creating observable bottlenecks before capital fully disperses downstream. In several recent cases, unusually large pools of digital assets appear to have stalled within intermediary structures rather than being rapidly laundered onward, suggesting constraints in conversion, layering, or off-ramping capacity.</p><p>One widely reported example involves Prince Group, which has been linked in open-source reporting to the custody of a <a href="http://google.com/search?q=prince+group+seizure&amp;rlz=1C5CHFA_enCA1038CA1039&amp;oq=prince+group+seizu&amp;gs_lcrp=EgZjaHJvbWUqCggAEAAYxwMYgAQyCggAEAAYxwMYgAQyBggBEEUYQDIGCAIQRRg5MgoIAxAAGIAEGKIEMgoIBBAAGIAEGKIEMgcIBRAAGO8FMgoIBhAAGIAEGKIEMgoIBxAAGIAEGKIE0gEIMjY3NWowajmoAgGwAgHxBSF3k8V84jSc&amp;sourceid=chrome&amp;ie=UTF-8">multibillion-dollar </a>bitcoin balance. Regardless of ultimate attribution or intent, the scale and persistence of such holdings are difficult to explain by benign delay alone. More plausibly, they reflect saturation at the Tier 2 level&#8212;where capital has exited its origin environment but cannot yet be safely or efficiently absorbed into downstream structures.</p><p>Such congestion is analytically significant. It indicates that Tier 1 outflows are already stressing intermediary networks, even before full centrifugal dynamics take hold. For analysts and enforcement bodies, these stalled pools may therefore function as early warning indicators of impending cascade behavior rather than isolated anomalies.</p><p>This dynamic is already visible across multiple jurisdictions. Unregulated capital outflows from China are enabling multibillion-dollar transnational scam networks, casino-based laundering nodes, and drug trafficking organizations. Opaque outflows from Iran provide direct financial services to proxy groups and, indirectly, to terrorist organizations operating beyond Tehran&#8217;s stated strategic interests, including al-Qaeda-aligned actors in Somalia. Russia, meanwhile, relies on opaque financial channels to source physical gold and sanctioned inputs through criminal facilitators and private military companies operating abroad, sustaining its war effort under mounting external pressure.</p><p>When systemic trust in these environments deteriorates, capital outflow pressures compound. Iran&#8217;s parallel systems have already shifted into a centrifugal phase of capital flight, one likely to generate escalating downstream threats as stress persists. Russia continues to attract liquidity inward, but sustained trade contraction and reserve drawdowns increase the risk of a similar inflection. China, while still appearing stable on paper, has experienced persistent capital leakage for several years&#8212;producing some of the most severe downstream criminal and security effects observed to date.</p><p>These systems are inherently brittle. The strategic question is not whether they will fracture, but when. Once that threshold is crossed, vast pools of liquidity move rapidly through opaque channels that intersect with criminal and militant actors, producing destabilizing effects that are difficult to reverse. Understanding when these outflows are likely to accelerate&#8212;and at what scale&#8212;is therefore essential to planning any form of pre-emptive, network-level disruption of illicit liquidity systems.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!VEyG!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38e4d497-7c20-4161-9388-1101a6adf2f5_1688x1276.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!VEyG!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38e4d497-7c20-4161-9388-1101a6adf2f5_1688x1276.png 424w, https://substackcdn.com/image/fetch/$s_!VEyG!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38e4d497-7c20-4161-9388-1101a6adf2f5_1688x1276.png 848w, https://substackcdn.com/image/fetch/$s_!VEyG!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38e4d497-7c20-4161-9388-1101a6adf2f5_1688x1276.png 1272w, https://substackcdn.com/image/fetch/$s_!VEyG!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38e4d497-7c20-4161-9388-1101a6adf2f5_1688x1276.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!VEyG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38e4d497-7c20-4161-9388-1101a6adf2f5_1688x1276.png" width="1456" height="1101" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/38e4d497-7c20-4161-9388-1101a6adf2f5_1688x1276.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1101,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:131194,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.btl-research.com/i/185993083?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38e4d497-7c20-4161-9388-1101a6adf2f5_1688x1276.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!VEyG!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38e4d497-7c20-4161-9388-1101a6adf2f5_1688x1276.png 424w, https://substackcdn.com/image/fetch/$s_!VEyG!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38e4d497-7c20-4161-9388-1101a6adf2f5_1688x1276.png 848w, https://substackcdn.com/image/fetch/$s_!VEyG!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38e4d497-7c20-4161-9388-1101a6adf2f5_1688x1276.png 1272w, https://substackcdn.com/image/fetch/$s_!VEyG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38e4d497-7c20-4161-9388-1101a6adf2f5_1688x1276.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>A simplified diagram of centripetal vs. centrifugal liquidity flows through unregulated Tier 2 channels. </em></p><h2><strong>Understanding Capital Logic</strong></h2><p>In a post&#8211;Bretton Woods system, dollar-denominated capital tends to concentrate in jurisdictions that offer:</p><ul><li><p>Credible protection of property rights through predictable legal and regulatory institutions</p></li><li><p>Stable, transparent, and non-punitive tax regimes</p></li><li><p>Deep, liquid, and internationally integrated financial systems</p></li><li><p>Political and currency stability sufficient to preserve real value</p></li><li><p>Credible exit optionality, allowing capital to move without arbitrary restriction or penalty</p></li><li><p>Broad-based asset appreciation that rewards passive capital over time</p></li></ul><p>These conditions largely explain why, over the past fifty years, global wealth has been reinvested disproportionately into Western financial markets&#8212;particularly the <a href="https://www.institutionalinvestor.com/article/2dx6hsx6ifqynskb7oav4/corner-office/most-of-the-worlds-assets-continue-to-flow-to-north-america">United States</a>, which combines deep capital markets with unmatched legal and currency credibility.</p><p>In highly controlled jurisdictions with adversarial or semi-adversarial relationships to Washington&#8212;such as China, Russia, and Iran&#8212;capital behavior is governed by a different logic. In these systems, <em>jurisdictional prudence</em> becomes a critical X-factor shaping whether capital remains onshore or seeks exit.</p><p>In such environments, capital can rationally remain domestic despite restrictive controls if two conditions hold:</p><ul><li><p>The domestic economy continues to offer returns that exceed the cumulative cost and risk of outward transfer</p></li><li><p>Regime behavior remains bounded and predictable, such that capital faces managed exposure rather than sudden or arbitrary appropriation</p></li></ul><p>Where these conditions are met, capital inertia is often the rational outcome&#8212;even in jurisdictions that lack many of the features typically associated with capital-attracting environments. But when these conditions go away, typically as a feature of economic downturns borne of deep structural flaws, capital takes flight, even at enormous cost to its owners. However, the adoption of cryptocurrencies, including central bank digital currencies, reduces the cost and increases the speed of capital mobility, reducing the time it takes for downstream threats to manifest.</p><p>There is no universal formula for precisely timing or quantifying Tier 1 capital outflows. What is increasingly clear, however, is that the velocity of modern unregulated finance causes downstream threat formation to accelerate rapidly once cascading dynamics are triggered. Conventional country risk frameworks have consistently misread these systems as more stable than they are by ignoring the behavior of elite capital under stress. Effective security intervention therefore depends on identifying and disrupting Tier 1 outflows before they metastasize into downstream criminal and militant activity.</p><h2><strong>A mathematical simplification</strong></h2><p>I have formalized this logic into a simple decision rule governing capital outflows from tightly controlled jurisdictions. The formulation builds on John T. Cuddington&#8217;s 1986 treatment of capital flight as a <a href="https://ies.princeton.edu/pdf/S58.pdf">portfolio response</a>, updated to reflect the substantially lower costs and reduced barriers to entry created by contemporary Tier 2 facilitators. </p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!O69C!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7dd82b4-f2bb-4d29-8d96-ec402a9af21a_584x218.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!O69C!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7dd82b4-f2bb-4d29-8d96-ec402a9af21a_584x218.png 424w, https://substackcdn.com/image/fetch/$s_!O69C!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7dd82b4-f2bb-4d29-8d96-ec402a9af21a_584x218.png 848w, https://substackcdn.com/image/fetch/$s_!O69C!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7dd82b4-f2bb-4d29-8d96-ec402a9af21a_584x218.png 1272w, https://substackcdn.com/image/fetch/$s_!O69C!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7dd82b4-f2bb-4d29-8d96-ec402a9af21a_584x218.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!O69C!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7dd82b4-f2bb-4d29-8d96-ec402a9af21a_584x218.png" width="584" height="218" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b7dd82b4-f2bb-4d29-8d96-ec402a9af21a_584x218.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:218,&quot;width&quot;:584,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;A black text on a white background\n\nAI-generated content may be incorrect.&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="A black text on a white background

AI-generated content may be incorrect." title="A black text on a white background

AI-generated content may be incorrect." srcset="https://substackcdn.com/image/fetch/$s_!O69C!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7dd82b4-f2bb-4d29-8d96-ec402a9af21a_584x218.png 424w, https://substackcdn.com/image/fetch/$s_!O69C!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7dd82b4-f2bb-4d29-8d96-ec402a9af21a_584x218.png 848w, https://substackcdn.com/image/fetch/$s_!O69C!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7dd82b4-f2bb-4d29-8d96-ec402a9af21a_584x218.png 1272w, https://substackcdn.com/image/fetch/$s_!O69C!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7dd82b4-f2bb-4d29-8d96-ec402a9af21a_584x218.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p>In this formulation, <strong>Rd</strong> denotes the expected return on domestic assets, adjusted for political and regime risk. This adjustment, <strong>A</strong>, captures the probability and severity of arbitrary state intervention, expropriation, capital freezes, or discretionary enforcement that reduces the effective value of onshore wealth.</p><p><strong>Ro</strong> denotes the expected return available in offshore jurisdictions, reflecting both asset performance and institutional credibility abroad. The term <strong>C</strong> represents the cumulative cost of externalization, including capital controls, transaction and intermediary fees, time delays, enforcement exposure, and operational risk associated with moving capital across borders.</p><p>Capital remains onshore when the risk-adjusted domestic return (<strong>Rd minus A</strong>) exceeds the offshore alternative net of externalization costs (<strong>Ro minus C</strong>). Capital flight becomes the rational outcome once this inequality reverses.</p><p>Technologies that reduce transfer friction&#8212;most notably cryptocurrencies and related settlement infrastructures&#8212;operate by lowering <strong>C</strong>, thereby compressing the time between deteriorating domestic conditions and large-scale capital outflows and accelerating the emergence of downstream threats.</p><h2><strong>Bridging the siloes</strong></h2><p>One of the primary reasons these dynamics continue to be misread is that the systems responsible for monitoring finance, trade, sanctions, and security risk remain analytically siloed. Capital flight is treated as a macroeconomic concern. Trade distortions are assessed separately from illicit finance. Criminal and militant threats are examined downstream, long after the financial conditions that enable them have already taken shape.</p><p>This fragmentation obscures the timing problem at the center of modern illicit liquidity. By the time financial and/or political instability registers in conventional economic indicators&#8212;or downstream threats become visible to security services&#8212;the critical window for upstream intervention has often already closed as Tier 2 intermediaries have scaled. Capital has dispersed. Criminal and militant actors have embedded themselves into resilient networks that are costly and difficult to unwind.</p><p>Bridging these siloes is therefore not a matter of institutional reorganization, but of analytical integration. Understanding when and how Tier 1 capital begins to externalize&#8212;across financial, trade, and geopolitical domains simultaneously&#8212;is essential to disrupting Tier 2 networks before they mature and preventing downstream threats from metastasizing at scale.</p><h2><strong>Conclusion</strong></h2><p>Modern illicit liquidity systems move faster than the frameworks built to monitor them. As capital mobility accelerates and parallel financial architectures grow more opaque, downstream threats will continue to emerge faster than reactive enforcement can contain them.</p><p>The central challenge is no longer attribution after the fact, but anticipation. Identifying when Tier 1 capital begins to externalize&#8212;how quickly it moves, where it encounters friction, and when intermediary capacity begins to saturate&#8212;has become the decisive variable in preventing the downstream consolidation of criminal and militant power.</p><p>Meeting this challenge requires analytical integration across finance, trade, sanctions, and security domains. Without that integration, institutions will continue to misread stability, intervene too late, and confront threats only after they have embedded themselves into resilient networks.</p>]]></content:encoded></item><item><title><![CDATA[Beyond Compliance: Enabling the Next Generation of AI Technology to Dismantle Illicit Liquidity Networks]]></title><description><![CDATA[Inside the Shadow Architecture That Shapes Modern Conflict]]></description><link>https://www.btl-research.com/p/beyond-compliance-enabling-the-next</link><guid isPermaLink="false">https://www.btl-research.com/p/beyond-compliance-enabling-the-next</guid><dc:creator><![CDATA[Adam Rousselle]]></dc:creator><pubDate>Sun, 23 Nov 2025 19:52:11 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Qwz9!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F00b264d5-064b-48f4-a5c0-71d13f270880_1260x720.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Qwz9!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F00b264d5-064b-48f4-a5c0-71d13f270880_1260x720.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Qwz9!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F00b264d5-064b-48f4-a5c0-71d13f270880_1260x720.png 424w, https://substackcdn.com/image/fetch/$s_!Qwz9!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F00b264d5-064b-48f4-a5c0-71d13f270880_1260x720.png 848w, https://substackcdn.com/image/fetch/$s_!Qwz9!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F00b264d5-064b-48f4-a5c0-71d13f270880_1260x720.png 1272w, https://substackcdn.com/image/fetch/$s_!Qwz9!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F00b264d5-064b-48f4-a5c0-71d13f270880_1260x720.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Qwz9!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F00b264d5-064b-48f4-a5c0-71d13f270880_1260x720.png" width="1260" height="720" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/00b264d5-064b-48f4-a5c0-71d13f270880_1260x720.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:720,&quot;width&quot;:1260,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Qwz9!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F00b264d5-064b-48f4-a5c0-71d13f270880_1260x720.png 424w, https://substackcdn.com/image/fetch/$s_!Qwz9!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F00b264d5-064b-48f4-a5c0-71d13f270880_1260x720.png 848w, https://substackcdn.com/image/fetch/$s_!Qwz9!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F00b264d5-064b-48f4-a5c0-71d13f270880_1260x720.png 1272w, https://substackcdn.com/image/fetch/$s_!Qwz9!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F00b264d5-064b-48f4-a5c0-71d13f270880_1260x720.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2><em><strong>Primer: How This Piece Got Here</strong></em></h2><p><em>This essay has already lived a small life of its own.</em></p><p><em>Since July, it circulated through several major legacy outlets. Some passed quickly and professionally; others expressed enthusiasm, requested time-consuming revisions, and ultimately stepped back for reasons that were never fully articulated. The responses varied, but the pattern was clear: uncertainty around unfamiliar frameworks, discomfort with material that sits outside conventional editorial lanes, and a broader hesitancy to publish work that challenges inherited assumptions.</em></p><p><em>The experience reinforced something that is only now beginning to shift. As recently as this past summer, traditional media still treated illicit liquidity as a peripheral issue. But the field is finally catching up. The traction my newer work has gained&#8212;across policy, enforcement, and analytical circles&#8212;reflects a broader recognition that liquidity is central terrain, not an auxiliary concern. The industry is evolving, even if the legacy editorial machinery has been slower to recognize the shift.</em></p><p><em>This piece was written to explain that evolution&#8212;how illicit liquidity systems now outlast militaries, sanctions regimes, and enforcement architecture itself&#8212;and why understanding this shift is no longer optional. Its publication journey ended up mirroring its own thesis: frameworks built for a previous era often struggle to accommodate the realities of the present one.</em></p><p><em>Since writing it, I&#8217;ve expanded and refined many of the concepts it introduced, but this remains the originating document. I am publishing it here in the form it was meant to take&#8212;not diluted, not retrofitted to an older template, and not reshaped to fit the boundaries of legacy formats. If those outlets revisit this space later, they can. My readers don&#8217;t need them to recognize the stakes.</em></p><p><em>Below is the full piece, unchanged except for minor clarity edits&#8212;the version that wasn&#8217;t designed to make anyone comfortable, but to make the problem clear.</em></p><div><hr></div><p><br>In May 2025, FinCEN designated <a href="https://www.fincen.gov/news/news-releases/fincen-finds-cambodia-based-huione-group-be-primary-money-laundering-concern">Huione Group</a> and Huione Pay as a &#8220;primary money laundering concern&#8221;, citing $4 billion in proceeds tied to scams, human trafficking, and North Korean hackers. Despite global scrutiny, Huione <a href="https://www.chainalysis.com/blog/huione-guarantee-still-active-despite-shutdown/">remains operational</a>.</p><p>This outcome is a strategic warning.</p><p>Huione&#8217;s resilience typifies a new global architecture of shadow liquidity that sustains conflict, corruption, and authoritarian influence from Southeast Asia to West Africa and beyond. These networks do not survive because they evade detection but because enforcement strategies continue to treat financial infrastructure as peripheral rather than primary terrain.</p><p>While U.S. and allied responses have prioritized <a href="https://bidenwhitehouse.archives.gov/briefing-room/presidential-actions/2023/02/23/memorandum-on-united-states-conventional-arms-transfer-policy/?utm_source=chatgpt.com">weapons transfers</a>, <a href="https://www.whitehouse.gov/presidential-actions/2025/01/clarifying-the-militarys-role-in-protecting-the-territorial-integrity-of-the-united-states/?utm_source=chatgpt.com">territorial control</a>, and traditional <a href="https://warontherocks.com/2023/07/what-allies-want-delivering-the-u-s-national-defense-strategys-ambition-on-allies-and-partners/?utm_source=chatgpt.com">alliance-building</a>, adversaries have quietly focused on what actually sustains power: value mobility. The real vulnerability is our failure to treat financial infrastructure as battlespace&#8212;one that sustains adversaries and keeps them resilient against sanctions and other enforcement measures.</p><p>If adversaries can move value with speed, deniability, and scale, they do not need air superiority or territorial control. They can fund insurgency, project influence, and exploit crises faster than formal systems can adapt. The longer this architecture remains intact, the greater the threat to global stability.</p><p>To remain effective, national security thinking must evolve to treat financial infrastructure as core battlespace. This includes conceptualizing the purpose of tools currently under development, such as DARPA&#8217;s Advanced Analysis of Multinational Money Laundering (<a href="https://www.darpa.mil/research/programs/a3ml-anticipatory-adaptive">A3ML</a>) initiative&#8212;not merely as forensic engines, but as platforms for pre-emptive disruption of shadow liquidity networks.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.btl-research.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Between the Lines is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2><strong>Defining the Battlespace</strong></h2><p><a href="https://newlinesinstitute.org/state-resilience-fragility/chinese-shadow-liquidity-and-the-scam-economy/">Shadow liquidity</a> is a distinct category of capital movement&#8212;decentralized, broker-mediated, and designed for cross-jurisdictional convertibility beyond banking oversight. These networks&#8212;operating through <a href="https://fuze.finance/blog/otc-crypto-trading-in-2025/#:~:text=OTC%20(Over%2Dthe%2DCounter,discreetly%20without%20moving%20market%20prices.">over-the-counter</a> (OTC) crypto brokers, <a href="https://media-publications.bcg.com/Stablecoins-five-killer-tests-to-gauge-their-potential.pdf">stablecoin</a> corridors, <a href="https://www.investopedia.com/terms/h/hawala.asp">hawala-style</a> settlement systems, and gray-market payment platforms like <a href="https://www.bloomberg.com/news/features/2025-08-01/huione-s-24-billion-hub-for-cybercrime-is-an-amazon-for-criminals">Huione</a>&#8212;form a parallel liquidity architecture outside formal regulation. Shadow liquidity spans both licit and illicit nodes; Illicit Liquidity Networks (ILNs) are its subset devoted specifically to illegal flows.</p><p>Persistence makes shadow liquidity strategically significant. Traditional threat finance has generally been <a href="https://www.bronid.com/post/what-are-the-typologies-of-money-laundering-and-terrorist-financing?utm_source=chatgpt.com">treated as episodic</a>: discrete flows tied to specific actors, transactions, or events, which can be traced, disrupted, and prosecuted. Shadow liquidity systems, by contrast, <a href="https://smallwarsjournal.com/2025/07/24/illicit-liquidity-as-battlespace-rethinking-finance-in-asymmetric-conflict/">behave like infrastructure</a>. They are not pipelines serving a single organization or network but adaptive, self-reinforcing ecosystems that outlast individual actors.</p><p>The convergence of these systems with crypto rails has accelerated their reach and resilience. OTC brokers link fiat currencies to <a href="https://vancelian.com/en/news/hong-kong-targets-over-the-counter-otc-crypto-services-in-regulatory-clampdown">dollar-denominated</a> stablecoins, serving not just as technical facilitators, but essential nodes in an informal financial network where <a href="https://www.fatf-gafi.org/content/dam/fatf-gafi/reports/Trade-Based-Money-Laundering-Trends-and-Developments.pdf?utm_source=chatgpt.com">trade settlement</a>, <a href="https://www.fatf-gafi.org/content/dam/fatf-gafi/reports/Professional-Money-Laundering.pdf?utm_source=chatgpt.com">investment flows</a>, and other illicit capital flows blend into the same liquidity pools.</p><p>Treating shadow liquidity as just another typology of illicit finance misses its structural role: it is not a symptom of criminal activity but an <a href="https://smallwarsjournal.com/2025/07/24/illicit-liquidity-as-battlespace-rethinking-finance-in-asymmetric-conflict/">enabler</a> of hybrid state and non&#8209;state operations. Whether used to sustain sanctioned economies, move capital into gray&#8209;zone <a href="https://www.tearline.mil/public_page/cambodia?utm_source=chatgpt.com">investment projects</a>, or provide working liquidity to transnational criminal or <a href="https://gnet-research.org/2025/05/14/cash-flow-breaking-down-the-houthis-multibillion-dollar-financial-networks/">militant networks</a>, these systems create strategic depth for actors who would otherwise be constrained by formal financial architectures.</p><p>Understanding modern threat finance requires a shift from seeing illicit flows as isolated events to mapping the living infrastructure that sustains them. Shadow liquidity is not the side effect of a globalized economy; it is the battlespace in which financial sovereignty, hybrid conflict, and criminal enterprise now converge.</p><h2><strong>Case study cluster:</strong></h2><p>The following cases illustrate how shadow liquidity manifests across regions and conflict theaters, showing both its adaptability and its strategic impact. Taken together, these cases illustrate a convergence: shadow liquidity networks evolve into semi-sovereign systems once they achieve scale. Whether scam economies in Southeast Asia, Iran&#8217;s proxy liquidity, or Russia&#8217;s mercenary finance, the pattern is the same &#8212; financial autonomy emerges faster than enforcement adapts. This comparative view highlights why treating flows as isolated typologies misses the structural threat.</p><h2><strong>Southeast Asia &#8211; China&#8217;s Shadow Finance Ecosystem</strong></h2><p>Southeast Asia has become the epicenter of China&#8217;s offshore liquidity blowback.<strong> </strong>What began as state-managed capital outflows&#8212;meant to <a href="https://ipdefenseforum.com/2025/02/shadow-networks-shell-companies-help-prc-russia-evade-sanctions-export-controls/?utm_source=chatgpt.com">bypass controls</a> and evade sanctions&#8212;has evolved into a parasitic financial ecosystem: <a href="https://www.uscc.gov/research/chinas-exploitation-scam-centers-southeast-asia">scam compounds</a>, <a href="https://www.bbc.com/news/world-asia-67471138">gray casinos</a>, and informal <a href="https://www.trmlabs.com/resources/blog/how-telegrams-ban-on-huione-and-xinbi-has-reshaped-the-guarantee-services-landscape">payment rails</a> now operate beyond Beijing&#8217;s reach while draining billions from China&#8217;s <a href="https://theconversation.com/pig-butchering-scams-have-stolen-billions-from-people-around-the-world-heres-what-you-need-to-know-252774">own economy</a>.</p><p>Across Cambodia, Laos, and Myanmar, Huione Pay and networks like it anchor <a href="https://theinternationalriskpodcast.com/the-international-risks-of-china-s-belt-and-road-initiative-philanthropy-or-a-hidden-pathway-to-crime/#:~:text=China's%20Yunnan%20province%20and%20its,as%20well%20as%20financial%20crime">scam hubs</a> tied to Chinese-funded <a href="https://www.business-humanrights.org/en/latest-news/southeast-asia-special-economic-zones-in-mekong-region-become-hub-for-scam-operations-and-human-trafficking-as-organised-crime-groups-grow/?utm_source=chatgpt.com">Special Economic Zones</a> (SEZs) and <a href="https://smallwarsjournal.com/2025/07/24/illicit-liquidity-as-battlespace-rethinking-finance-in-asymmetric-conflict/">armed actors</a>. This reach extends beyond the region, as evidenced by the <a href="https://gnet-research.org/2025/05/14/cash-flow-breaking-down-the-houthis-multibillion-dollar-financial-networks/">Houthis&#8217; use of Huione</a> as a money laundering service, underscoring how Southeast Asia&#8217;s shadow finance now fuels conflicts beyond the region. China&#8217;s offshore shadow finance systems are no longer just a laundering problem but a crisis of sovereignty. These systems persist not through evasion, but through structural autonomy.</p><h2><strong>Iran &#8211; Liquidity Proxies and Strategic Autonomy</strong></h2><p>Iran&#8217;s proxy liquidity system has become semi-sovereign&#8212;sustaining regional influence while eroding domestic control.</p><p>Groups like <a href="https://gnet-research.org/2025/07/21/hezbollahs-latin-american-networks-stablecoins-smuggling-and-sanctions-evasion/">Hezbollah</a> and the <a href="https://gnet-research.org/2025/05/14/cash-flow-breaking-down-the-houthis-multibillion-dollar-financial-networks/">Houthis</a> now operate independent financial architectures, built on regional taxation, smuggling, and crypto-mediated commodity sales. Stablecoins and hawala networks stretching from <a href="https://www.elliptic.co/blog/ofac-sanctions-eight-ansarallah-the-houthis-crypto-addresses">Cambodia</a> to <a href="https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/the-maduro-hezbollah-nexus-how-iran-backed-networks-prop-up-the-venezuelan-regime/">Venezuela</a> allow these proxies to generate and deploy funds without central disbursement&#8212;blurring the line between state-backed operations and autonomous liquidity regimes.</p><p>Tehran&#8217;s leverage is now negotiated, not commanded. Even Iraqi militias once firmly under Iranian Revolutionary Guard Corps (IRGC) influence increasingly pursue <a href="https://ecfr.eu/publication/proxy-battles-iraq-iran-and-the-turmoil-in-the-middle-east/#:~:text=Iran%20faces%20a%20challenging%20balancing,and%20dialogue%20in%20the%20region.">self-financing</a> agendas. Meanwhile, the IRGC has <a href="https://www.ncr-iran.org/en/news/economy/iran-news-chainalysis-report-exposes-regimes-deepening-reliance-on-crypto-amid-economic-collapse/">offshored vast capital</a> through front companies, creating a shadow reserve system that sustains proxy operations but hollows out Iran&#8217;s monetary base.</p><p>Phantom <a href="https://www.aljazeera.com/news/2021/5/5/iran-ex-central-bank-boss-faces-indictment-over-mismanagement">gold accounting</a> and <a href="https://www.calcalistech.com/ctechnews/article/5en9hq25s?utm_source=chatgpt.com">offshore accounts</a> conceal a liquidity collapse. The rial&#8217;s <a href="https://www.ft.com/content/6968b018-b04d-4389-85da-d4ebe91e927e">redenomination</a>&#8212;slashing four zeros&#8212;signals a potential regime-induced currency failure. Sanctions that target banks or known intermediaries miss the mark; the true threat is not just the actors, but the parallel financial architecture sustaining them.</p><h2><strong>Russia &#8211; Mercenary Liquidity Infrastructure</strong></h2><p>The resilience of Wagner and its successor, the Africa Corps, reveals how deeply embedded shadow liquidity systems are in Russia&#8217;s expeditionary strategy. These networks bypass Moscow&#8217;s formal financial system, instead relying on <a href="https://icct.nl/publication/understanding-us-designation-wagner-group-transnational-criminal-organisation">resource smuggling</a>, gold and diamond flows <a href="https://www.npr.org/2023/12/27/1221318890/russia-ukraine-wagner-group-putin-africa-blood-gold">laundered through Dubai</a>, and opaque third-party facilitators. Non-bank intermediaries and commodity traders provide both mobility and deniability, with indications that <a href="https://www.ft.com/content/741f67e2-ff00-4395-98bb-608083ce3432?utm_source=chatgpt.com">stablecoin rails</a> bridge African resource wealth to operational accounts abroad.</p><p>Russian mercenary operations in Africa reveal how shadow liquidity enables sanctions evasion and strategic divergence. These networks can outgrow state control, making local deals that <a href="https://ctc.westpoint.edu/africa-corps-has-russia-hit-a-ceiling-in-africa/?utm_source=chatgpt.com">contradict</a> official policy. The enforcement lesson is structural: targeting individuals fails when the network is modular, adaptive, and partially sovereign. Wagner&#8217;s liquidity architecture shows how private and state power converge through shadow finance</p><h2><strong>Synthesis:</strong></h2><p>Liquidity systems built for strategic depth have mutated into semi-autonomous infrastructures. Across Southeast Asia&#8217;s scam-finance belt, Iran&#8217;s proxy networks, and Russia&#8217;s mercenary plunder, a common feature emerges&#8212;adaptability and persistence. These are not episodic money trails but living financial architectures. Disrupting them requires more than transaction monitoring; it demands ecosystem-level mapping and structural interventions.</p><h2><strong>Institutional Blind Spots</strong></h2><p>Despite advances in threat finance, global security systems remain misaligned. The core challenge is conceptual inertia. National security and regulatory frameworks still treat illicit finance as a transactional problem despite shifting circumstances. The greatest threats now move not through isolated bank accounts or criminal actors, but through decentralized liquidity networks&#8212;adaptive, hybrid financial ecosystems that function beyond the reach of conventional enforcement.</p><p>These networks are not invisible. They are partially observed, persistently flagged, and yet structurally misunderstood. Financial surveillance <a href="https://www.occ.treas.gov/topics/supervision-and-examination/bank-operations/financial-crime/suspicious-activity-reports/index-suspicious-activity-reports.html">tracks anomalies</a> inside banks but misses liquidity outside them. What it cannot see, let alone disrupt, is the architecture of liquidity that exists outside its perimeter.</p><p>Today&#8217;s adversarial liquidity flows increasingly blend stablecoin corridors, over-the-counter (OTC) brokers, <a href="https://www.investopedia.com/terms/s/shellcorporation.asp">shell companies</a>, <a href="https://bitmarkets.academy/en/crypto-for-professionals/what-are-nested-exchanges">nested exchanges</a>, and informal value transfer systems like hawala. They straddle legality, often making use of mainstream platforms and payment rails while remaining structurally opaque. These flows do not behave like traditional laundering transactions, but rather like sovereign financial systems in miniature, operating under their own rules and norms. Current tools were built to find bad actors, not to identify financial sovereignty.</p><p>This actor-centric paradigm enables profound blind spots. Compliance tools detect transactions but fail to contextualize liquidity patterns across jurisdictions and asset types. As a result, regulators and intelligence agencies see fragments&#8212;but no infrastructure. The network remains intact, quietly evolving.</p><p>Legal constraints further widen the gap. Jurisdictional <a href="https://globalnetworkinitiative.org/wp-content/uploads/GNI-MLAT-Report.pdf?utm_source=chatgpt.com">silos</a>, lengthy mutual legal assistance treaty (<a href="https://globalnetworkinitiative.org/wp-content/uploads/GNI-MLAT-Report.pdf?utm_source=chatgpt.com">MLAT</a>) procedures, and fragmented <a href="https://www.moneylaunderingnews.com/2023/07/leveraging-aml-measures-to-combat-tax-crimes-a-guest-blog/?utm_source=chatgpt.com">beneficial ownership</a> laws delay or block enforcement. Meanwhile, regulatory frameworks remain chronically outdated. Cryptocurrency policy is <a href="https://www.mheducation.com/highered/blog/2025/03/cryptocurrency-regulations-are-changing-across-the-globe.html">inconsistent</a> across the U.S., EU, and Asia. Platforms offering liquidity-as-a-service&#8212;such as peer-to-peer (<a href="https://www.elluminatiinc.com/how-p2p-crypto-exchange-works/#:~:text=your%20questions%20answered.-,Peer%20To%20Peer%20(P2P)%20Crypto%20Exchange%20%E2%80%93%20Defined,software%20typically%20makes%20it%20possible.">P2P</a>) exchanges, <a href="https://www.mckinsey.com/industries/financial-services/our-insights/the-stable-door-opens-how-tokenized-cash-enables-next-gen-payments">stablecoin escrow</a> markets, and anonymous <a href="https://hyperverge.co/blog/anonymous-crypto-wallets/">crypto wallets</a>&#8212;often fall through the cracks. Many operate in legal gray zones or under <a href="https://www3.weforum.org/docs/WEF_Pathways_to_the_Regulation_of_Crypto_Assets_2023.pdf">regulatory arbitrage</a>, where no single state has oversight, and with little incentive to close the gap.</p><p>The result is not a lack of information, but an inability to act on what is already visible. Shadow liquidity does not thrive in darkness. It thrives in disconnection&#8212;between agencies, between legal systems, and between the visible and the actionable. This disjointedness is no longer an anomaly. It is the terrain upon which adversarial financial networks are built.</p><h2><strong>From Designation to Disruption: the Legal Infrastructure for Liquidity Warfare and A3ML</strong></h2><p>The proposed Anticipatory and Adaptive Anti-Money Laundering (A3ML) framework is designed to identify, designate, and dismantle illicit liquidity systems. Unlike traditional tools focused on compliance and anomalies, A3ML can become an AI-driven <a href="https://hackernoon.com/darpas-bold-ai-plan-to-stop-money-laundering-in-its-tracks?utm_source=chatgpt.com">infrastructure mapping system</a>. To be effective, it must be trained on deep, pattern-based financial research and empowered by cross-jurisdictional legal reform. Its targeting must focus not only on bad actors, but on the systemic architecture that sustains them.</p><p>The American legal architecture built to combat organized crime offers a blueprint for confronting today&#8217;s most urgent financial threat: illicit liquidity networks. The Racketeer Influenced and Corrupt Organizations Act (<a href="https://www.ojp.gov/ncjrs/virtual-library/abstracts/rico-racketeer-influenced-and-corrupt-organizations-act-statute">RICO</a>) succeeded not by prosecuting criminals one by one, but by treating entire criminal enterprises as unified entities. It marked a doctrinal shift&#8212;from targeting individuals to dismantling infrastructure.</p><p>Illicit finance in 2025 demands a similar evolution of thought. What we face today are not merely networks of bad actors but global, adaptive liquidity ecosystems that serve as the financial backbone of transnational crime, proxy warfare, and authoritarian statecraft. These systems are durable, decentralized, and increasingly indistinguishable from legitimate financial activity. We must understand them not as criminal anomalies, but as sovereign financial organisms enabled by adaptive cross-jurisdictional infrastructure.</p><p>This is not about policing bad actors. It is about mapping and disabling the systems that allow bad actors to regenerate faster than enforcement can respond.</p><h2><strong>Civil Asset Forfeiture as Strategic Weapon</strong></h2><p>Time is the decisive variable in liquidity warfare. Prosecutions remain too slow to neutralize networks moving billions in real time. A3ML must therefore expand the civil asset forfeiture logic pioneered under RICO across global jurisdictions. Unlike criminal cases, civil forfeiture permits freezing assets on a preponderance of the very evidence A3ML is built to track in real time.</p><p>Civil forfeiture enables <a href="https://www.law.cornell.edu/wex/civil_forfeiture">pre-emptive action</a> against identified liquidity networks&#8212;especially when paired with new legal definitions that treat financial networks, not just individuals, as targets. This mechanism already exists. What is missing is the conceptual shift that elevates illicit liquidity to the level of strategic infrastructure.</p><p>To operate globally, this tool must be accompanied by jurisdictional harmonization. While A3ML does not currently establish mutual recognition protocols, its framework could build on existing international precedents&#8212;such as the <a href="https://www.coe.int/en/web/cdpc/pc-rac#:~:text=The%20Council%20of%20Europe%20has,and%20the%20financing%20of%20terrorism.">Strasbourg</a> and <a href="https://www.coe.int/en/web/cop198">Warsaw</a> Conventions&#8212;to enable partner states to enforce each other&#8217;s forfeiture orders against designated liquidity networks. The goal is speed: convert intelligence into disruption within days, not years.</p><h2><strong>Jurisdictional Leverage and Legal Hooks</strong></h2><p>The United States already has the legal foundation to operationalize A3ML. Statutes such as Section 311 of the <a href="https://www.fincen.gov/resources/statutes-and-regulations/usa-patriot-act">USA PATRIOT</a> Act and the <a href="https://www.occ.treas.gov/topics/supervision-and-examination/bsa/index-bsa.html#:~:text=The%20Bank%20Secrecy%20Act%20(BSA,and%20agencies%20of%20foreign%20banks.">Bank Secrecy Act</a> provide hooks for systemic disruption, especially when combined with U.S. control over dollar clearing and correspondent <a href="https://ofac.treasury.gov/faqs/946">banking access</a>. A3ML&#8217;s contribution is not legal but conceptual: it unifies these authorities into a framework for targeting liquidity networks rather than isolated actors&#8212;and at speeds much faster than human analysis.</p><p>Global coordination is not just possible&#8212;it is already taking shape. The Financial Action Task Force (FATF), long the international standard-setter for AML/CFT compliance, has begun to acknowledge the complexity of illicit financial infrastructures beyond formal institutions. Initiatives like Operation Grafos&#8212;which targeted professional money laundering networks as coherent entities&#8212;represent a significant step toward structural thinking. Grafos &#8211; highlighted in the <a href="https://www.fatf-gafi.org/en/publications/Methodsandtrends/comprehensive-update-terrorist-financing-risks-2025.html">FATF&#8217;s 2025 report</a> on terrorist finance - showed that the global community is starting to move from transactional enforcement to enterprise-level disruption.</p><p>But FATF&#8217;s core recommendations still focus primarily on institutional behavior: due diligence, beneficial ownership, and recordkeeping. They stop short of mapping or designating networked liquidity systems, and they lack the enforcement mandates required to neutralize them.</p><p>This is where A3ML fits&#8212;not as a competitor to established frameworks, but as their architectural complement and enforcer. It provides the conceptual framing and enforcement logic needed to extend current compliance standards into a cross-jurisdictional, structural response to liquidity-based threats. By aggregating and processing data in real time, A3ML can reframe illicit finance not as a series of reporting failures, but as a systematized battlespace&#8212;one that demands structural tools to navigate and dismantle. It must be trained on real data and paired with cross-border reform.</p><h2><strong>Defining the Target: Illicit Liquidity Networks</strong></h2><p>Illicit Liquidity Networks (ILNs) are the unlawful subset of shadow liquidity&#8212;persistent financial structures, whether criminal, corporate, or state-aligned, through which value moves beyond sovereign control. Where shadow liquidity describes the broader architecture, ILNs identify the specifically illicit nodes that A3ML is designed to dismantle.</p><p>A3ML could designate ILNs as systemic threats rather than fragmented cases. Phase I would map ILNs through public&#8211;private partnerships. Phase II would build on emerging stablecoin oversight to close gray intermediaries. Phase III would disable them through forfeiture, cutoffs, and coordinated sanctions. Implementing these phases would require no new agency, only integration of existing authorities. A3ML is not a silver bullet but a structural correction. Without it, security architecture will remain reactive&#8212;outpaced by networks that understand one truth: control liquidity, and you control survival. Operational success will depend on embedding liquidity mapping into existing security frameworks and building analytic partnerships capable of predictive disruption beyond the banking system.</p><h1><strong>Conclusion &#8211; Sovereignty and Strategy in the Age of Hybrid Liquidity</strong></h1><p>Sovereignty today is no longer defined by borders, flags, or deterrence, but by the ability to control the flow of capital&#8212;licit and illicit, digital and analog, state and shadow. In this battlespace, liquidity itself is sovereignty. Without tools to secure the circulatory system of finance, every alliance, sanction, and military asset is vulnerable to erosion by this new paradigm.</p><p>Illicit liquidity networks enable proxy wars, hollow out regulatory regimes, and entrench criminal ecosystems that feed on institutional weakness. And they do it faster than conventional enforcement can react. Treating financial architectures as an auxiliary domain of national security is no longer tenable. What A3ML offers is not just a legal instrument&#8212;it is a strategic reorientation. One that recognizes that power now flows through networks, not just weapons; through escrow chains and stablecoins, not just supply chains and ships.</p><p>If we fail to respond, we invite encroachment&#8212;not by military forces, but by liquidity systems we ignored. The choice is clear: keep reacting in fragments, or build the architecture to defeat liquidity insurgency systemically.</p>]]></content:encoded></item><item><title><![CDATA[Illicit Crypto Isn’t Uncontrollable: Why I’m Cautiously Optimistic]]></title><description><![CDATA[What the next phase of countering illicit finance will look like]]></description><link>https://www.btl-research.com/p/illicit-crypto-isnt-uncontrollable</link><guid isPermaLink="false">https://www.btl-research.com/p/illicit-crypto-isnt-uncontrollable</guid><dc:creator><![CDATA[Adam Rousselle]]></dc:creator><pubDate>Thu, 18 Sep 2025 09:00:45 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!n2Fp!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F937d73f1-ab78-4aab-9248-f9e828ab5bd4_810x524.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!n2Fp!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F937d73f1-ab78-4aab-9248-f9e828ab5bd4_810x524.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!n2Fp!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F937d73f1-ab78-4aab-9248-f9e828ab5bd4_810x524.jpeg 424w, https://substackcdn.com/image/fetch/$s_!n2Fp!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F937d73f1-ab78-4aab-9248-f9e828ab5bd4_810x524.jpeg 848w, https://substackcdn.com/image/fetch/$s_!n2Fp!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F937d73f1-ab78-4aab-9248-f9e828ab5bd4_810x524.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!n2Fp!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F937d73f1-ab78-4aab-9248-f9e828ab5bd4_810x524.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!n2Fp!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F937d73f1-ab78-4aab-9248-f9e828ab5bd4_810x524.jpeg" width="810" height="524" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/937d73f1-ab78-4aab-9248-f9e828ab5bd4_810x524.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:524,&quot;width&quot;:810,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Same risks, same rules&#8221;: The SEC's selective approach to crypto regulation  - Ledger Insights - blockchain for enterprise&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Same risks, same rules&#8221;: The SEC's selective approach to crypto regulation  - Ledger Insights - blockchain for enterprise" title="Same risks, same rules&#8221;: The SEC's selective approach to crypto regulation  - Ledger Insights - blockchain for enterprise" srcset="https://substackcdn.com/image/fetch/$s_!n2Fp!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F937d73f1-ab78-4aab-9248-f9e828ab5bd4_810x524.jpeg 424w, https://substackcdn.com/image/fetch/$s_!n2Fp!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F937d73f1-ab78-4aab-9248-f9e828ab5bd4_810x524.jpeg 848w, https://substackcdn.com/image/fetch/$s_!n2Fp!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F937d73f1-ab78-4aab-9248-f9e828ab5bd4_810x524.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!n2Fp!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F937d73f1-ab78-4aab-9248-f9e828ab5bd4_810x524.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>No one has ever accused me of being an optimist &#8212; especially if they&#8217;ve read <em>Between the Lines.</em></p><p>However, today I&#8217;m staking out a position of cautious optimism on one of the hardest problems in financial intelligence: getting a handle on illicit crypto flows, especially when it comes to designated terrorist groups. </p><p>To be clear: nothing in this field will ever be perfect. Threat finance is adaptive by design. But after tracking this space for years, I&#8217;m convinced the scales are tipping in ways that make overwhelming pessimism harder to sustain.</p><p>Here&#8217;s why.</p><p><strong>Data aggregation</strong></p><p>Every crypto transaction leaves a digital trace. Even if pseudonymous, it&#8217;s still a ledger entry &#8212; vastly different from the opaque networks of hawala or bulk cash smuggling.</p><p>The <a href="https://www.ccn.com/news/crypto/japans-police-monero-track-scam-ringleader/">successful takedown</a> of illicit Monero transactions by Japanese National Police is proof that anonymity tech can be pierced when regulators and enforcement pair data with persistence. Practitioners in the blockchain analysis space have told me that anonymous tokens are not as anonymous as some would have you believe. </p><p>The problem right now is that it takes a lot of people to find and process the data needed to track illicit flows and the industry struggles to keep up. That&#8217;s where AI comes in &#8212; to turn the overwhelming volume of raw data into actionable detection.</p><p><strong>AI development</strong></p><p>Several blockchain analytics firms are already layering machine learning into their platforms &#8212; using AI to catch anomalies humans miss. But they are not the only ones.</p><p>The Defense Advanced Research Projects Agency (DARPA) is currently developing a programme called Anticipatory &amp; Adaptive Anti&#8211;Money Laundering (A3ML). In a recent podcast, the A3ML project lead commented his team&#8217;s goal is to make money laundering &#8220;too expensive&#8221; by dramatically increasing the effectiveness, speed, and scale of detection using artificial intelligence (AI). Because money laundering is defined by scale, speed, and complexity &#8212; exactly the domains where human investigators are outmatched and algorithmic detection excels &#8212; AI could be a genuine gamechanger.</p><p>DARPA has been quietly promoting A3ML for months, meaning it is well past the idea stage. With leading analytics firms already incorporating AI into their products, the use of AI in this field is no longer hypothetical. Given the rapid speed of advancement in current AI technologies, the efficacy of these products is likely to improve dramatically in the coming months and years.</p><p><strong>Regulatory reform</strong></p><p>The European Union&#8217;s <a href="https://www.esma.europa.eu/esmas-activities/digital-finance-and-innovation/markets-crypto-assets-regulation-mica">MiCA</a> regime, the U.S. <a href="https://www.whitehouse.gov/fact-sheets/2025/07/fact-sheet-president-donald-j-trump-signs-genius-act-into-law/">GENIUS</a> Act, and Hong Kong&#8217;s <a href="https://www.hkma.gov.hk/eng/key-functions/international-financial-centre/stablecoin-issuers/">stablecoin ordinance</a> all point to a growing global consensus that crypto markets can and must be regulated. The traction my recent articles on unregulated crypto regimes have gained underscores that this isn&#8217;t just a policy shift &#8212; there&#8217;s real appetite across the field to understand and address these risks.</p><p>I believe enforcement will continue moving toward a preponderance standard &#8212; acting whenever aggregated signals indicate illicit activity is more likely than not, rather than waiting for airtight proof. In practice, that standard favors systems that can aggregate patterns, spot anomalies, and connect disparate signals faster than any manual investigation &#8212; exactly the kind of connective tissue that AI-driven systems can surface better than human investigators. Yes, gray jurisdictions will still exist, but in a world where dollar clearing still reigns supreme, the preponderance model will leave them increasingly isolated and deprived for non-compliance. </p><p><strong>Terrorist finance:  tip of the spear</strong></p><p>Terrorist finance is likely to feel the impact of this enforcement shift before other domains. The reason is twofold. First, national security considerations ensure that counter-terrorism receives the highest priority for resources, political will, and legal innovation. Governments simply cannot afford to take a passive stance when designated groups are exploiting new technologies. </p><p>Second, counter-terrorism already has over two-decades-worth of laws, regulations, and intelligence cooperation to build upon &#8212; from FATF standards and UN Security Council resolutions to domestic tools like the U.S. Patriot Act and equivalent frameworks worldwide. That foundation makes terrorist finance the most immediate proving ground for applying aggregated data and AI-enabled detection under a preponderance standard, before those same methods expand into broader areas of illicit finance.</p><p><strong>Conclusion</strong></p><p>Progress in this field isn&#8217;t measured by perfection &#8212; it&#8217;s measured by whether the system gets harder for bad actors to exploit. And by every sign &#8212; data aggregation, AI adoption, and regulatory convergence &#8212; we&#8217;re moving in that direction.</p><p>Caution is still warranted; threat finance adapts. But the fatalism that says this space is uncontrollable no longer matches reality. There is much work to be done in mapping these systems moving forward, but on this issue at least, I am cautiously optimistic.</p><blockquote><p><em>Note: This article is in part a preview of a bigger piece I&#8217;m currently working out. Also, stay tuned for the long-awaited Part II of my China military series.</em></p></blockquote><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.btl-research.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Between the Lines is a reader-supported publication. To receive new posts and support my work, become a paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[FinCEN Names the Game: Chinese Shadow Liquidity in Action]]></title><description><![CDATA[FinCEN&#8217;s latest advisory exposes $312 billion in flows, but the real danger is a parallel financial system evolving faster than enforcement.]]></description><link>https://www.btl-research.com/p/fincen-finally-names-the-game-chinese</link><guid isPermaLink="false">https://www.btl-research.com/p/fincen-finally-names-the-game-chinese</guid><dc:creator><![CDATA[Adam Rousselle]]></dc:creator><pubDate>Fri, 29 Aug 2025 17:22:46 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!vdtL!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9a4b2d6f-a201-4715-bef7-78c18fb63c53_1480x833.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!vdtL!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9a4b2d6f-a201-4715-bef7-78c18fb63c53_1480x833.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!vdtL!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9a4b2d6f-a201-4715-bef7-78c18fb63c53_1480x833.jpeg 424w, https://substackcdn.com/image/fetch/$s_!vdtL!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9a4b2d6f-a201-4715-bef7-78c18fb63c53_1480x833.jpeg 848w, https://substackcdn.com/image/fetch/$s_!vdtL!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9a4b2d6f-a201-4715-bef7-78c18fb63c53_1480x833.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!vdtL!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9a4b2d6f-a201-4715-bef7-78c18fb63c53_1480x833.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!vdtL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9a4b2d6f-a201-4715-bef7-78c18fb63c53_1480x833.jpeg" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9a4b2d6f-a201-4715-bef7-78c18fb63c53_1480x833.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;20241406-chinese-money-laundering-crackdown-gfx.jpg&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="20241406-chinese-money-laundering-crackdown-gfx.jpg" title="20241406-chinese-money-laundering-crackdown-gfx.jpg" srcset="https://substackcdn.com/image/fetch/$s_!vdtL!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9a4b2d6f-a201-4715-bef7-78c18fb63c53_1480x833.jpeg 424w, https://substackcdn.com/image/fetch/$s_!vdtL!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9a4b2d6f-a201-4715-bef7-78c18fb63c53_1480x833.jpeg 848w, https://substackcdn.com/image/fetch/$s_!vdtL!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9a4b2d6f-a201-4715-bef7-78c18fb63c53_1480x833.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!vdtL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9a4b2d6f-a201-4715-bef7-78c18fb63c53_1480x833.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em><a href="https://www.cnn.com/2024/06/18/politics/us-chinese-money-launderers-drug-cartels">Image source</a></em></p><p>FinCEN&#8217;s <a href="https://www.fincen.gov/news/news-releases/fincen-issues-advisory-and-financial-trend-analysis-chinese-money-laundering">new advisory</a> on Chinese Money Laundering Networks (CMLNs) underscores a truth often missed in enforcement reporting: these are not isolated laundering schemes but components of a parallel financial architecture, a shadow liquidity system now entrenched across the Americas and around the world. </p><p>The advisory contains staggering numbers: over 137,000 suspicious activity reports (SARs), $312 billion in suspicious flows, and the same trade-based, over-the-counter (OTC), and insider-driven mechanisms. The underlying systems that set off these alerts are the connective tissue that allow sanctioned states, cartels, and elites to thrive despite formal financial controls.</p><p>FinCEN frames this as &#8220;Chinese money laundering.&#8221; And when it comes to cartel finance, Chinese enablers are indeed the most visible. Yet they are only part of a parallel financial architecture &#8212; a global ecosystem where Chinese actors are central, but not alone. Other state and non-state players drive and exploit these flows as well. Until regulators and analysts treat shadow liquidity as infrastructure, rather than a collection of anomalous SARs, enforcement will remain reactive while the networks evolve faster than the tools meant to stop them.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.btl-research.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.btl-research.com/subscribe?"><span>Subscribe now</span></a></p><h2><strong>Bigger than you think, and more chaotic</strong></h2><p><br>These laundering networks are diffuse, but global. They service multi-billion-dollar <a href="https://www.btl-research.com/p/beneath-the-border-scam-centers-and">scam operations</a> in Southeast Asia, terrorist groups like <a href="https://gnet-research.org/2025/05/14/cash-flow-breaking-down-the-houthis-multibillion-dollar-financial-networks/">the Houthis</a>, and emerging criminal enclaves in <a href="https://www.btl-research.com/p/from-asia-to-the-world-how-global">Africa and Latin America.</a> The FinCEN advisory highlights just some of their embeddedness in Western societies, underscoring the scope of this problem.</p><p>The sort of networks FinCEN highlights aren&#8217;t just laundering for cartels &#8212; they&#8217;re tapping into a much larger reservoir of Chinese shadow capital. Crypto-enabled, OTC-driven liquidity rails emerged first to move elite wealth offshore, but over the past decade they&#8217;ve evolved into a parallel financial architecture. These flows <a href="https://www.btl-research.com/p/the-hidden-threat-of-chinas-offshore">no longer sit</a> neatly under Beijing&#8217;s command; they form a sprawling ecosystem of brokers, gray banks, scam centers, and informal clearinghouses that operate beyond the reach of both Western enforcement and the Communist Party itself.</p><p>This is what makes the threat so destabilizing: it&#8217;s not simply &#8220;Chinese laundering,&#8221; but a decentralized liquidity system born from state and elite outflows that now finances everything from fentanyl supply chains to dual-use tech procurement. In other words, what started as controlled leakage has become a global shadow infrastructure &#8212; chaotic, adaptive, and only partially answerable to any state.</p><p>Drug cartels, scammers, and terrorists are just the visible tip of this hidden architecture. They set off SARs and grab headlines, but they are a symptom, not the disease. To understand how we got here, <em>Between the Lines</em> has developed a three-tiered model that tracks the money cascade from its source.</p><p><strong>The Three-Tiered Liquidity Approach</strong></p><p>Drug cartels, scammers, and terrorists are the visible tip of this hidden architecture. They set off SARs and grab headlines, but they&#8217;re only the final chapter in a much longer story. To understand how we got here, <em>Between the Lines</em> has developed a three-tiered model that tracks the money cascade from its source.</p><ul><li><p><strong>Tier 1: The Seed Money.</strong> Vast capital outflows from countries like China, Russia, and Iran fund alternative criminal ecosystems outside global jurisdictions. The true danger of these countries lies not in their strength, but in their weakness &#8212; an inability to stem elite graft and offshore leakage that fuels shadow economies worldwide. Although these governments rely on offshored liquidity, they cannot control it once it&#8217;s outside the country - leaving them ultimately vulnerable. </p><p></p></li><li><p><strong>Tier 2: The Enablers.</strong> Operating in a legal gray zone, these brokers and businesses aren&#8217;t quite illegal enough to shut down without hard evidence. They thrive in lax regulatory environments, running OTC crypto desks, gray exchanges, and shell firms. They provide the escape valves for Tier 1 elites, and the laundering services that Tier 3 bad actors depend on.</p><p></p></li><li><p><strong>Tier 3: The Headline Grabbers.</strong> These are the actors you see in FinCEN advisories and blockchain analytics reports. Southeast Asian scammers, Iranian proxies, Mexican cartels &#8212; all exploit this ecosystem. Some build entire operations on Tier 1 outflows; others simply tap it for laundering. They kill, rob, and enslave, but remain only the tip of the iceberg. Authorities shut down one operator, while the deeper pool of shadow liquidity ensures they always resurface somewhere new.</p><ul><li><p>Some Tier 3 operators, like Southeast Asian scammers were built directly on Tier 1 capital outflows enabled by Tier 2 operators.</p></li><li><p>Others, like Mexican cartels, came to the game later, accessing Tier 2 channels to legitimize their ill-gotten gains.</p></li><li><p>What they all have in common is that they are the dirtiest players in the game: terrorists, drug traffickers, slavers, and thieves on a massive scale. </p></li></ul></li></ul><p>Reports highlighting <a href="https://www.justice.gov/usao-dc/pr/largest-ever-seizure-funds-related-crypto-confidence-scams">asset seizures</a> are comforting. So are those on the shutdown of gray exchanges like <a href="https://www.chainalysis.com/blog/russian-exchange-garantex-dismantled/">Russia&#8217;s Garantex</a>. But in every case, the real operators reconstitute somewhere else with impunity. Until we find a way to go after these cascades systematically, the cycle will continue unabated, threatening global security on practically every level.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!GuUr!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ce3cdb7-2dbb-4c18-aa29-7aceb75ab7bd_336x504.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!GuUr!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ce3cdb7-2dbb-4c18-aa29-7aceb75ab7bd_336x504.png 424w, https://substackcdn.com/image/fetch/$s_!GuUr!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ce3cdb7-2dbb-4c18-aa29-7aceb75ab7bd_336x504.png 848w, https://substackcdn.com/image/fetch/$s_!GuUr!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ce3cdb7-2dbb-4c18-aa29-7aceb75ab7bd_336x504.png 1272w, https://substackcdn.com/image/fetch/$s_!GuUr!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ce3cdb7-2dbb-4c18-aa29-7aceb75ab7bd_336x504.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!GuUr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ce3cdb7-2dbb-4c18-aa29-7aceb75ab7bd_336x504.png" width="584" height="876" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0ce3cdb7-2dbb-4c18-aa29-7aceb75ab7bd_336x504.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:504,&quot;width&quot;:336,&quot;resizeWidth&quot;:584,&quot;bytes&quot;:260288,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.btl-research.com/i/171975993?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ce3cdb7-2dbb-4c18-aa29-7aceb75ab7bd_336x504.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!GuUr!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ce3cdb7-2dbb-4c18-aa29-7aceb75ab7bd_336x504.png 424w, https://substackcdn.com/image/fetch/$s_!GuUr!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ce3cdb7-2dbb-4c18-aa29-7aceb75ab7bd_336x504.png 848w, https://substackcdn.com/image/fetch/$s_!GuUr!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ce3cdb7-2dbb-4c18-aa29-7aceb75ab7bd_336x504.png 1272w, https://substackcdn.com/image/fetch/$s_!GuUr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ce3cdb7-2dbb-4c18-aa29-7aceb75ab7bd_336x504.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!5_iw!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7821da0-4883-4329-9d03-992c3395c31e_504x504.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!5_iw!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7821da0-4883-4329-9d03-992c3395c31e_504x504.png 424w, https://substackcdn.com/image/fetch/$s_!5_iw!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7821da0-4883-4329-9d03-992c3395c31e_504x504.png 848w, https://substackcdn.com/image/fetch/$s_!5_iw!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7821da0-4883-4329-9d03-992c3395c31e_504x504.png 1272w, https://substackcdn.com/image/fetch/$s_!5_iw!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7821da0-4883-4329-9d03-992c3395c31e_504x504.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!5_iw!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7821da0-4883-4329-9d03-992c3395c31e_504x504.png" width="632" height="632" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b7821da0-4883-4329-9d03-992c3395c31e_504x504.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:504,&quot;width&quot;:504,&quot;resizeWidth&quot;:632,&quot;bytes&quot;:366519,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.btl-research.com/i/171975993?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7821da0-4883-4329-9d03-992c3395c31e_504x504.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!5_iw!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7821da0-4883-4329-9d03-992c3395c31e_504x504.png 424w, https://substackcdn.com/image/fetch/$s_!5_iw!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7821da0-4883-4329-9d03-992c3395c31e_504x504.png 848w, https://substackcdn.com/image/fetch/$s_!5_iw!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7821da0-4883-4329-9d03-992c3395c31e_504x504.png 1272w, https://substackcdn.com/image/fetch/$s_!5_iw!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7821da0-4883-4329-9d03-992c3395c31e_504x504.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>Between the Lines&#8217; proprietary Predictive Intelligence Pipeline</em></p><h2><strong>What Between the Lines Offers</strong></h2><p>Before we can disrupt these networks, we need to understand them. <em>Between the Lines</em> exists to map the shadow liquidity systems that underpin global crime, state corruption, and geopolitical instability.</p><p>Where others focus on symptoms &#8212; the cartels, the scams, the terror groups &#8212; we dig into the architecture: the hidden financial scaffolding that sustains them. Our analysis blends geopolitics, macroeconomics, open-source intelligence, and financial investigation with years of institutional memory tracing capital outflows from Beijing, Moscow, and Tehran to scam compounds in Southeast Asia and fentanyl traffickers in Mexico. Beyond mapping the networks, Between the Lines is developing models to anticipate and time these flows with as much precision as possible.</p><p>We share the doctrine publicly &#8212; models like the three-tiered liquidity approach that explain how capital moves, why enforcement fails, and where interventions could succeed. But we can&#8217;t afford to give it all away for free. The real value lies in tailoring this framework to specific risks: a bank&#8217;s exposure to shadow liquidity, a government&#8217;s vulnerability to illicit flows, or a regulator&#8217;s blind spots in enforcement. Those require <strong>bespoke reports and private briefings</strong>, built to solve problems no generic red flag can.</p><p>For policymakers, compliance officers, and investigators, <em>Between the Lines</em> provides more than headlines &#8212; it delivers the clarity and strategy needed to actually disrupt these networks. For readers, it offers a rare vantage point on the hidden infrastructure reshaping global security and finance.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.btl-research.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Between the Lines is a reader-supported publication. To receive new posts and support my work, become a paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[The Liquidity Framework ]]></title><description><![CDATA[Targeting the Multi-Billion-Dollar Infrastructure behind 21st Century Threat Finance]]></description><link>https://www.btl-research.com/p/the-liquidity-framework</link><guid isPermaLink="false">https://www.btl-research.com/p/the-liquidity-framework</guid><dc:creator><![CDATA[Adam Rousselle]]></dc:creator><pubDate>Tue, 26 Aug 2025 15:01:28 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!T2WR!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5fad3b7c-8645-4257-ba0c-e5dcfbd64e8a_1024x512.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!T2WR!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5fad3b7c-8645-4257-ba0c-e5dcfbd64e8a_1024x512.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!T2WR!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5fad3b7c-8645-4257-ba0c-e5dcfbd64e8a_1024x512.jpeg 424w, https://substackcdn.com/image/fetch/$s_!T2WR!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5fad3b7c-8645-4257-ba0c-e5dcfbd64e8a_1024x512.jpeg 848w, https://substackcdn.com/image/fetch/$s_!T2WR!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5fad3b7c-8645-4257-ba0c-e5dcfbd64e8a_1024x512.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!T2WR!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5fad3b7c-8645-4257-ba0c-e5dcfbd64e8a_1024x512.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!T2WR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5fad3b7c-8645-4257-ba0c-e5dcfbd64e8a_1024x512.jpeg" width="1024" height="512" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5fad3b7c-8645-4257-ba0c-e5dcfbd64e8a_1024x512.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:512,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Liquidity: Meaning, Types &amp; How to Measure It&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Liquidity: Meaning, Types &amp; How to Measure It" title="Liquidity: Meaning, Types &amp; How to Measure It" srcset="https://substackcdn.com/image/fetch/$s_!T2WR!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5fad3b7c-8645-4257-ba0c-e5dcfbd64e8a_1024x512.jpeg 424w, https://substackcdn.com/image/fetch/$s_!T2WR!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5fad3b7c-8645-4257-ba0c-e5dcfbd64e8a_1024x512.jpeg 848w, https://substackcdn.com/image/fetch/$s_!T2WR!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5fad3b7c-8645-4257-ba0c-e5dcfbd64e8a_1024x512.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!T2WR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5fad3b7c-8645-4257-ba0c-e5dcfbd64e8a_1024x512.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Illicit finance is no longer episodic crime. It has matured into <a href="https://smallwarsjournal.com/2025/07/24/illicit-liquidity-as-battlespace-rethinking-finance-in-asymmetric-conflict/">shadow liquidity systems</a>: parallel infrastructures where state actors, cartels, mercenary groups, and cybercriminals pool and regenerate capital. These systems &#8211; empowered by digital currencies and vast capital outflows &#8211; function as underground financial institutions, enabling adversaries to outlast sanctions, rebuild after seizures, and finance operations at scale.</p><p>Global institutions still treat illicit finance as a series of anomalies &#8212; bad transactions, rogue exchanges, isolated scams. This fragmented view leaves the circulatory system itself untouched. The result: adversaries adapt faster than regulators, and global security erodes while enforcement chases symptoms.</p><h2><strong>Why It Matters</strong></h2><ul><li><p><strong>National Security:</strong> Shadow liquidity sustains proxy wars, sanctions evasion, cyber operations, and militant logistics. It is the bloodstream of <a href="https://gnet-research.org/2025/05/14/cash-flow-breaking-down-the-houthis-multibillion-dollar-financial-networks/">hybrid conflict</a>.</p></li><li><p><strong>Economic Integrity:</strong> These systems siphon billions from households and corporations alike. They play a destabilizing role in across whole regions, as <a href="https://www.thaienquirer.com/58027/thai-police-launch-international-war-room-to-crack-down-on-scam-centers-exclude-cambodia-over-data-risks/">witnessed recently</a> in Southeast Asia.</p></li><li><p><strong>Beyond Control:</strong> These systems feed off capital outflows (especially from China) but answer to no one &#8212; even the countries that <a href="https://www.dw.com/en/why-is-china-clamping-down-on-scammers-in-southeast-asia/a-71456569">spawned them</a>.</p></li><li><p><strong>Real World Threats:</strong> Iran-backed proxies and Southeast Asian militant groups use these networks. So do multi-billion-dollar global scam operations. The threat is real and it&#8217;s already here.</p></li><li><p><strong>Strategic Leverage:</strong> Whoever maps and disrupts these infrastructures doesn&#8217;t just fight crime &#8212; they control adversaries&#8217; capacity to project power.</p></li></ul><h2><strong>The Gap</strong></h2><ul><li><p><strong>Tools are reactive:</strong> Blockchain analytics, anti-money laundering (AML) compliance, and sanctions designations find anomalies but not architectures.</p></li><li><p><strong>Regulation is fragmented:</strong> National silos and outdated legal frameworks make systemic action impossible.</p></li></ul><h2><strong>The BTL Framework</strong></h2><p>Between the Lines Research has developed a framework to analyze illicit finance as <strong>infrastructure</strong> rather than incident. Key components:</p><ul><li><p><strong>Primary Liquidity:</strong> Capital outflows &#8212; fast, mobile fuel.</p></li><li><p><strong>Secondary Liquidity:</strong> Informal systems (hawala, OTC desks, trade credit) that enable gray exchange.</p></li><li><p><strong>Tertiary Liquidity:</strong> Long-term reservoirs (real estate, commodities, criminal operations [ex: scam centers], militant/ terrorist groups) that can be mobilized in crisis.</p></li></ul><p>By tracking conversion between these tiers, we expose the stress points adversaries use to survive and regenerate.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ksp_!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6960c124-7815-4075-b677-61855c96332b_1536x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ksp_!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6960c124-7815-4075-b677-61855c96332b_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!ksp_!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6960c124-7815-4075-b677-61855c96332b_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!ksp_!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6960c124-7815-4075-b677-61855c96332b_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!ksp_!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6960c124-7815-4075-b677-61855c96332b_1536x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ksp_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6960c124-7815-4075-b677-61855c96332b_1536x1024.png" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6960c124-7815-4075-b677-61855c96332b_1536x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2099226,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.btl-research.com/i/171975993?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6960c124-7815-4075-b677-61855c96332b_1536x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ksp_!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6960c124-7815-4075-b677-61855c96332b_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!ksp_!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6960c124-7815-4075-b677-61855c96332b_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!ksp_!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6960c124-7815-4075-b677-61855c96332b_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!ksp_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6960c124-7815-4075-b677-61855c96332b_1536x1024.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!5_iw!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7821da0-4883-4329-9d03-992c3395c31e_504x504.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!5_iw!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7821da0-4883-4329-9d03-992c3395c31e_504x504.png 424w, https://substackcdn.com/image/fetch/$s_!5_iw!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7821da0-4883-4329-9d03-992c3395c31e_504x504.png 848w, https://substackcdn.com/image/fetch/$s_!5_iw!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7821da0-4883-4329-9d03-992c3395c31e_504x504.png 1272w, https://substackcdn.com/image/fetch/$s_!5_iw!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7821da0-4883-4329-9d03-992c3395c31e_504x504.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!5_iw!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7821da0-4883-4329-9d03-992c3395c31e_504x504.png" width="632" height="632" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b7821da0-4883-4329-9d03-992c3395c31e_504x504.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:504,&quot;width&quot;:504,&quot;resizeWidth&quot;:632,&quot;bytes&quot;:366519,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.btl-research.com/i/171975993?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7821da0-4883-4329-9d03-992c3395c31e_504x504.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!5_iw!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7821da0-4883-4329-9d03-992c3395c31e_504x504.png 424w, https://substackcdn.com/image/fetch/$s_!5_iw!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7821da0-4883-4329-9d03-992c3395c31e_504x504.png 848w, https://substackcdn.com/image/fetch/$s_!5_iw!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7821da0-4883-4329-9d03-992c3395c31e_504x504.png 1272w, https://substackcdn.com/image/fetch/$s_!5_iw!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7821da0-4883-4329-9d03-992c3395c31e_504x504.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>Between the Lines&#8217; proprietary Three-Tiered Framework and Predictive Intelligence Pipeline</em></p><p><strong>Applications</strong></p><ul><li><p><strong>National Security:</strong> Identify and pre-empt liquidity corridors sustaining adversary militaries and proxies.</p></li><li><p><strong>Financial Sector:</strong> Develop financial intelligence (FININT) products that move beyond anomaly detection into systemic mapping.</p></li><li><p><strong>Tech &amp; Cyber:</strong> Integrate liquidity mapping with cyber threat intel to close the gap between digital intrusions and financial outcomes.</p></li></ul><p><strong>Case Study: Chinese Capital Outflows and Scam-Backed Militias</strong></p><p>The rapid outflow of Chinese capital, driven by elite flight and tightening domestic controls, has created offshore liquidity pools across Southeast Asia. These flows illustrate how shadow liquidity systems evolve from simple capital escape into infrastructures that finance armed groups and destabilize regional economies.</p><ul><li><p><strong>Capital Outflows (Primary):</strong> Wealthy elites and mid-tier operators move funds offshore to evade Beijing&#8217;s capital controls. Much of this first moves through cash, stablecoins, and front companies in border economies.</p></li><li><p><strong>Infrastructure Formation (Secondary):</strong> These outflows feed into OTC desks, casinos, and unregulated payment processors, which become regional hubs for laundering and reinvestment for tertiary actors.</p></li><li><p><strong>Tertiary Parasitism and Destabilization:</strong> At the highest tier, the threat becomes acute.</p><ul><li><p>Scam compounds siphon billions annually through trafficked labor.</p></li><li><p>Armed groups and private militias provide protection for these hubs, turning them into semi-sovereign enclaves in Cambodia and Myanmar.</p></li><li><p>Platforms like Huione facilitate <a href="https://gnet-research.org/2025/05/14/cash-flow-breaking-down-the-houthis-multibillion-dollar-financial-networks/">laundering at scale</a>, enabling actors such as the Houthis to exploit the same corridors.</p></li><li><p>The fact that <a href="https://www.chainalysis.com/blog/huione-guarantee-still-active-despite-shutdown/">Huione remains active</a> despite sanctions and a nominal shutdown shows that these systems are networked, not episodic &#8212; requiring a systemic approach.</p></li></ul></li></ul><p>This cycle shows how a single driver &#8212; Chinese capital flight &#8212; cascades into a shadow liquidity architecture that finances militancy, erodes sovereignty, and extracts value from legitimate economies. Episodic enforcement actions like sanctions strike at symptoms in the tertiary tier, but the real threat lies in the multi-tiered networks that remain resilient and regenerative.</p><h2><strong>What Between the Lines Provides</strong></h2><p>Between the Lines translates this framework into actionable outputs: tailored briefings, case studies, and strategic advisory designed to help institutions understand and anticipate how shadow liquidity shapes their risk environment. Whether the need is regulatory foresight, adversary mapping, or integration into existing threat intelligence, BTL brings the concepts down to ground level &#8212; where they can guide decisions, not just analysis.</p><p></p>]]></content:encoded></item><item><title><![CDATA[Why Capturing Islamic State Somalia’s Finance Chief Won’t Stop the Money]]></title><description><![CDATA[Tactical victories don&#8217;t dismantle transnational financial systems.]]></description><link>https://www.btl-research.com/p/why-capturing-islamic-state-somalias</link><guid isPermaLink="false">https://www.btl-research.com/p/why-capturing-islamic-state-somalias</guid><dc:creator><![CDATA[Adam Rousselle]]></dc:creator><pubDate>Wed, 06 Aug 2025 09:02:19 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Mg_6!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa0f5175c-4ca2-4b57-b08a-0fe8966a3e4e_2048x1152.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Mg_6!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa0f5175c-4ca2-4b57-b08a-0fe8966a3e4e_2048x1152.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Mg_6!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa0f5175c-4ca2-4b57-b08a-0fe8966a3e4e_2048x1152.webp 424w, https://substackcdn.com/image/fetch/$s_!Mg_6!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa0f5175c-4ca2-4b57-b08a-0fe8966a3e4e_2048x1152.webp 848w, https://substackcdn.com/image/fetch/$s_!Mg_6!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa0f5175c-4ca2-4b57-b08a-0fe8966a3e4e_2048x1152.webp 1272w, https://substackcdn.com/image/fetch/$s_!Mg_6!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa0f5175c-4ca2-4b57-b08a-0fe8966a3e4e_2048x1152.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Mg_6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa0f5175c-4ca2-4b57-b08a-0fe8966a3e4e_2048x1152.webp" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a0f5175c-4ca2-4b57-b08a-0fe8966a3e4e_2048x1152.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:657724,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/webp&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.btl-research.com/i/170231682?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa0f5175c-4ca2-4b57-b08a-0fe8966a3e4e_2048x1152.webp&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Mg_6!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa0f5175c-4ca2-4b57-b08a-0fe8966a3e4e_2048x1152.webp 424w, https://substackcdn.com/image/fetch/$s_!Mg_6!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa0f5175c-4ca2-4b57-b08a-0fe8966a3e4e_2048x1152.webp 848w, https://substackcdn.com/image/fetch/$s_!Mg_6!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa0f5175c-4ca2-4b57-b08a-0fe8966a3e4e_2048x1152.webp 1272w, https://substackcdn.com/image/fetch/$s_!Mg_6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa0f5175c-4ca2-4b57-b08a-0fe8966a3e4e_2048x1152.webp 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>PDF Soldiers hunt for IS-S operatives in the Cal Miskaad mountains in January 2025. <a href="https://taskandpurpose.com/news/us-forces-somalia-finance-chief/">Image source</a></em></p><p>On July 25, U.S. Special Operations Forces <a href="https://www.africom.mil/pressrelease/35911/us-forces-conduct-operation-targeting-isis-somalia">captured</a> Islamic State&#8211;Somalia (IS-S) leader Abdiweli Muhammad Yusuf in a targeted raid near Dhaardaar, Puntland. U.S. Africa Command (AFRICOM) and the Puntland Defense Forces (PDF) describe Yusuf as a senior <a href="https://www.longwarjournal.org/archives/2025/07/us-ground-raid-captures-islamic-state-leader-in-northern-somalia.php">financial facilitator</a> in IS-S&#8217;s regional network&#8212;labeled in several outlets as the group&#8217;s &#8220;finance chief.&#8221; He reportedly served as Emir of Maktab al-Karrar (al-Karrar Office), which oversees Islamic State financial operations across eastern and southern Africa.</p><p>The operation to capture Yusuf, conducted near Dhaardaar in Puntland, follows a broader uptick in U.S. intelligence-led strikes against jihadist factions in East Africa. Although global security is no doubt improved by Yusuf&#8217;s new life in U.S. custody, the networks he oversaw have likely already begun to adapt to his absence. Targeting them will require a similar adaptation in counter threat finance moving forward.</p><h2><strong>A regional hydra</strong></h2><p>It&#8217;s not that Yusuf was unimportant&#8212;I <a href="https://www.btl-research.com/p/combating-the-islamic-state-finance">flagged him</a> in an article back in February. But what that piece made clear was this: the system he supposedly presided over is far more resilient than any one individual.</p><p>Al-Karrar is the largest fundraising node in IS&#8217;s global operation. It manages a sophisticated patchwork of hawaladars (informal money transfer agents), crypto brokers, and administrators spanning much of eastern and southern Africa. Its fundraising includes ransom kidnappings and pig-butchering scams in South Africa. It also maintains close ties to groups like Mozambique&#8217;s al-Shabab (not to be confused with the Somali group), which allegedly generates over $20 million annually through illicit timber and resource smuggling.</p><p>According to several reports, Al-Karrar is also the main financial backer of Islamic State Khorasan Province (ISKP)&#8212;the IS branch behind deadly attacks in Iran and Russia and multiple foiled plots in Europe. Funds appear to move through informal remittance corridors from Somalia to Central Asia, often mediated by crypto brokers and hawala facilitators.</p><p>In short, it&#8217;s fairly large operation comprised of a broad patchwork of transregional operators.</p><h2><strong>The architecture that sustains terror</strong></h2><p>Just like in a major corporation or bank, senior terrorist financial operators&#8212;even those at the top&#8212;are ultimately replaceable. Finance is a trade: complex, but not rarefied. Puntland may not attract Wall Street-level talent, but it has nonetheless produced a resilient and international cohort of operators skilled in transnational illicit finance.</p><p>The architecture that sustains these networks&#8212;informal corridors, crypto rails, hawaladars, local extortion, and commodity-based laundering&#8212;remains largely intact. These are not fragile hierarchies. They are decentralized ecosystems designed to survive leadership decapitation.</p><p>Kinetic operations may produce short-term friction, but they do not dismantle decentralized financial ecosystems. The true point of leverage lies in targeting the liquidity infrastructure itself: the stablecoin brokers, hawala corridors, illicit exchanges, and jurisdictional blind spots that allow terrorist networks to persist, adapt, and regenerate.</p><h2><strong>The bottom line</strong></h2><p>Degrading terrorist finance requires more than leadership targeting&#8212;it demands structural engagement. That means addressing the financial ecosystems that outlast individuals. From stablecoin rails to commodity laundering and informal remittance routes, these systems must become the focus of counter&#8211;threat finance strategy. Tactical successes only translate into durable gains when we challenge the infrastructures that sustain insurgency and transnational violence.</p><p><em>More to come. Stay tuned.</em></p>]]></content:encoded></item><item><title><![CDATA[Beyond Territory and Ideology: Illicit Liquidity Nodes — Enabled by Tech — Sustain Modern Terrorism]]></title><description><![CDATA[From Crypto Rails to Commodity Flows: The Parallel Economies Behind Global Militancy]]></description><link>https://www.btl-research.com/p/beyond-territory-and-ideology-illicit</link><guid isPermaLink="false">https://www.btl-research.com/p/beyond-territory-and-ideology-illicit</guid><dc:creator><![CDATA[Adam Rousselle]]></dc:creator><pubDate>Sat, 02 Aug 2025 09:01:48 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!G3Gq!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b271305-15ea-4454-8efa-8b863a92b5af_620x414.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!G3Gq!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b271305-15ea-4454-8efa-8b863a92b5af_620x414.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!G3Gq!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b271305-15ea-4454-8efa-8b863a92b5af_620x414.jpeg 424w, https://substackcdn.com/image/fetch/$s_!G3Gq!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b271305-15ea-4454-8efa-8b863a92b5af_620x414.jpeg 848w, https://substackcdn.com/image/fetch/$s_!G3Gq!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b271305-15ea-4454-8efa-8b863a92b5af_620x414.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!G3Gq!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b271305-15ea-4454-8efa-8b863a92b5af_620x414.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!G3Gq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b271305-15ea-4454-8efa-8b863a92b5af_620x414.jpeg" width="620" height="414" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4b271305-15ea-4454-8efa-8b863a92b5af_620x414.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:414,&quot;width&quot;:620,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!G3Gq!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b271305-15ea-4454-8efa-8b863a92b5af_620x414.jpeg 424w, https://substackcdn.com/image/fetch/$s_!G3Gq!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b271305-15ea-4454-8efa-8b863a92b5af_620x414.jpeg 848w, https://substackcdn.com/image/fetch/$s_!G3Gq!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b271305-15ea-4454-8efa-8b863a92b5af_620x414.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!G3Gq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b271305-15ea-4454-8efa-8b863a92b5af_620x414.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Sovereignty is often depicted as the ability to control territory and govern people. In reality, it is fundamentally the capacity to generate and direct liquidity&#8212;to move value, fund loyal networks, and project power across borders. Liquidity is not merely a financial tool; it is the circulatory system of modern power.</p><p>Militant groups today function as alternative liquidity states, building informal financial scaffolds that blend local cash taxation, resource extraction, and transnational flows. By leveraging technological advances&#8212;such as crypto-enabled remittance networks, digital payment rails, and global e-commerce platforms&#8212;these actors have developed a form of sovereignty unparalleled in modern history in terms of flexibility, deniability, and resilience.</p><p>This liquidity sovereignty enables groups to persist and adapt even after losing territory, charismatic leaders, or formal hierarchies. It is not ideology or battlefield victories alone that sustain them, but their mastery of hidden liquidity architectures &#8212; sovereign ecosystems in their own right&#8212;that quietly underwrite violence, influence, and long-term survival.</p><p><strong>Islamic State networks &#8212; Fragmented yet digitally adaptive</strong></p><p>The Islamic State&#8217;s global branches primarily rely on <a href="https://ctc.westpoint.edu/the-financial-future-of-the-islamic-state/?utm_source=chatgpt.com">hyperlocal cash generation</a> &#8212; including micro-extortion, petty taxation, and opportunistic resource control &#8212; to survive. Yet it is their evolving digital liquidity architecture that sustains them as a transregional threat.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.btl-research.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Between the Lines is a reader-supported publication. To receive new posts and support my work, become a paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>
      <p>
          <a href="https://www.btl-research.com/p/beyond-territory-and-ideology-illicit">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Beneath the Border: Scam Centers and the Thailand–Cambodia Conflict]]></title><description><![CDATA[Why Emerald Triangle scam hubs matter more than most headlines suggest.]]></description><link>https://www.btl-research.com/p/beneath-the-border-scam-centers-and</link><guid isPermaLink="false">https://www.btl-research.com/p/beneath-the-border-scam-centers-and</guid><dc:creator><![CDATA[Adam Rousselle]]></dc:creator><pubDate>Sun, 27 Jul 2025 18:23:35 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!v0IK!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbaec2515-02a4-461d-9b18-b226c954ee96_600x400.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!v0IK!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbaec2515-02a4-461d-9b18-b226c954ee96_600x400.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!v0IK!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbaec2515-02a4-461d-9b18-b226c954ee96_600x400.jpeg 424w, https://substackcdn.com/image/fetch/$s_!v0IK!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbaec2515-02a4-461d-9b18-b226c954ee96_600x400.jpeg 848w, https://substackcdn.com/image/fetch/$s_!v0IK!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbaec2515-02a4-461d-9b18-b226c954ee96_600x400.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!v0IK!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbaec2515-02a4-461d-9b18-b226c954ee96_600x400.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!v0IK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbaec2515-02a4-461d-9b18-b226c954ee96_600x400.jpeg" width="600" height="400" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/baec2515-02a4-461d-9b18-b226c954ee96_600x400.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:400,&quot;width&quot;:600,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;People huddling in and around tents in Oddar Meanchey Province in Cambodia. &quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="People huddling in and around tents in Oddar Meanchey Province in Cambodia. " title="People huddling in and around tents in Oddar Meanchey Province in Cambodia. " srcset="https://substackcdn.com/image/fetch/$s_!v0IK!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbaec2515-02a4-461d-9b18-b226c954ee96_600x400.jpeg 424w, https://substackcdn.com/image/fetch/$s_!v0IK!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbaec2515-02a4-461d-9b18-b226c954ee96_600x400.jpeg 848w, https://substackcdn.com/image/fetch/$s_!v0IK!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbaec2515-02a4-461d-9b18-b226c954ee96_600x400.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!v0IK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbaec2515-02a4-461d-9b18-b226c954ee96_600x400.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>A makeshift refugee camp in Cambodia&#8217;s Oddar Meanchey Province. <a href="https://www.nytimes.com/2025/07/24/world/asia/thailand-cambodia-border-fight.html">Image source</a></em></p><p>Up until only a few months ago, the disputed stretch between Thailand and Cambodia was a quiet landscape of temples visited by people from both sides of the border. In the summer months, this region&#8212;known as the Emerald Triangle for its dense forests&#8212;can feel like it&#8217;s baking in the mid&#8209;40s Celsius, the heat broken only by heavy rains that sometimes clear into spectacular golden sunsets under flamingo pink skies. The ancient sites&#8212;and the communities that sustain them&#8212;reflect a shared lineage: both peoples trace their roots to the Khmer Empire, once centered near today&#8217;s Angkor Wat, until the Sukhothai ancestors of the modern Thai state broke away in the mid&#8209;13th century.</p><p>The heart of the border dispute lies in boundaries drawn during the French colonial era, when early 20th&#8209;century treaties fixed a rigid line across what had long been a fluid cultural frontier. The region has since known intense war and instability, albeit previously unrelated to this haphazard border demarcation. From 1967 through 1998, Cambodia endured a brutal civil war that drew in both regional and global powers, leaving its territory among the most <a href="https://www.maginternational.org/what-we-do/where-we-work/cambodia/#:~:text=Cambodia%20is%20one%20of%20most,of%20Cambodia%20and%20other%20factions.">heavily land mined</a> on earth. On July&#8239;23, one of those remnants maimed five Thai soldiers, prompting shutdowns of both countries&#8217; embassies.</p><p>Nevertheless, until only a few weeks ago, the borderlands had settled into a decades-long calm, with people from both sides enjoying picnics at temple sites. According to official reports, Thai soldiers became agitated when Cambodians sang their<a href="https://thethaiger.com/news/national/cambodian-general-upset-by-thai-soldiers-intervention-at-border-temple"> national anthem</a> at one of these sites, and that&#8217;s around when the violence intensified. Nobody seems to have wanted this war, and if you watch accounts like Preston Stewart&#8217;s, the Cambodian troops were so unprepared that many are fighting in t&#8209;shirts and flip&#8209;flops.</p><p>Recent headlines have been dominated by deadly clashes along the disputed border. Most of those killed have been civilians, with both militaries blaming each other for targeting innocents. Thus far, clashes between Thai and Cambodian troops along the two countries&#8217; <a href="https://www.aljazeera.com/news/2025/7/25/death-toll-in-thai-cambodia-clashes-rises-to-16-as-120000-flee-border-area">disputed border</a> have killed at least 14 people and displaced 120,000 others.</p><p>Like most things in Southeast Asia these days, there&#8217;s much beneath the headlines. Along this stretch of frontier, Chinese-run scam centers and the illicit capital they generate form part of the conflict&#8217;s backdrop&#8212;and while it&#8217;s too early to call them the driving force, their weight is too significant to ignore.</p><p>This piece will unpack that dimension and explain how illicit economies intersect with the border tensions in ways most coverage has missed.</p><h2><strong>A little context</strong></h2><p>I knew something was off when Thai authorities <a href="https://www.bbc.com/news/articles/c9vrrj72xy7o">suspended the leadership</a> of Prime Minister Paetongtarn Shinawatra, the youngest in the country&#8217;s history and only the second woman to hold the post, over a call with former Cambodian Prime Minister Hun Sen. In the <a href="https://asia.nikkei.com/Video/Audio-Leaked-phone-call-that-led-to-Thai-PM-Paetongtarn-s-suspension">leaked conversation</a>, Paetongtarn addressed Hun as &#8220;uncle,&#8221; offered to &#8220;take care of anything you need,&#8221; and described Thailand&#8217;s top general as &#8220;opposing&#8221; and out of step with the nation&#8217;s interest&#8212;remarks that ignited accusations of compromising sovereignty and deference to Cambodian influence. We&#8217;ll likely never know the full context of that exchange, but there is much to parse between the lines.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.btl-research.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Between the Lines is a reader-supported publication. To receive new posts and support my work, become a paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>
      <p>
          <a href="https://www.btl-research.com/p/beneath-the-border-scam-centers-and">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[From Asia to the World: How Global Scam Networks Are Targeting Us]]></title><description><![CDATA[How Global Scam Centers Became Shadow Financial Superpowers &#8212; And What We Can Do to Stop Them]]></description><link>https://www.btl-research.com/p/from-asia-to-the-world-how-global</link><guid isPermaLink="false">https://www.btl-research.com/p/from-asia-to-the-world-how-global</guid><dc:creator><![CDATA[Adam Rousselle]]></dc:creator><pubDate>Thu, 17 Jul 2025 11:01:02 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!-fLn!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85b62d02-33b2-4d8e-8d9c-01473d897f9f_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!-fLn!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85b62d02-33b2-4d8e-8d9c-01473d897f9f_1536x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!-fLn!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85b62d02-33b2-4d8e-8d9c-01473d897f9f_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!-fLn!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85b62d02-33b2-4d8e-8d9c-01473d897f9f_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!-fLn!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85b62d02-33b2-4d8e-8d9c-01473d897f9f_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!-fLn!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85b62d02-33b2-4d8e-8d9c-01473d897f9f_1536x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!-fLn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85b62d02-33b2-4d8e-8d9c-01473d897f9f_1536x1024.png" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/85b62d02-33b2-4d8e-8d9c-01473d897f9f_1536x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2460147,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.btl-research.com/i/168487745?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85b62d02-33b2-4d8e-8d9c-01473d897f9f_1536x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!-fLn!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85b62d02-33b2-4d8e-8d9c-01473d897f9f_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!-fLn!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85b62d02-33b2-4d8e-8d9c-01473d897f9f_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!-fLn!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85b62d02-33b2-4d8e-8d9c-01473d897f9f_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!-fLn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85b62d02-33b2-4d8e-8d9c-01473d897f9f_1536x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><h1><strong>Introduction &#8212; Beyond Asia</strong></h1><p>Southeast Asia&#8217;s scam compounds &#8212; fueled with liquidity from Chinese capital flight &#8212; have become synonymous with industrial-scale fraud, human trafficking, and gray finance. From the infamous enclaves of Cambodia&#8217;s Sihanoukville to the lawless border zones in Myanmar and Laos, these semi-sovereign illicit ecosystems extract a staggering toll, primarily targeting people in mainland China through sophisticated scams and coercive trafficking operations. According to <a href="https://www.cnn.com/2024/03/28/asia/southeast-asia-interpol-scam-human-trafficking-crime-intl-hnk">Interpol estimates</a>, they feed into a $3 trillion global underground economy each year.</p><p>Although these networks are closely linked to Chinese state-led investment flows, they have rapidly evolved beyond Beijing&#8217;s effective control, forcing violent <a href="https://www.dw.com/en/why-are-scammers-still-thriving-in-southeast-asia/a-72555085">yet largely ineffective</a> cross-border crackdowns. Now, these scam syndicates are turning their <a href="https://www.dw.com/en/un-warns-of-massive-cyberscams-spreading-across-the-world/a-72304457">attention outward</a> &#8212; expanding into Africa, Latin America, and ultimately, Western markets. In doing so, they threaten to become not just a regional crisis but a global liquidity parasite, undermining legitimate economies and corroding financial sovereignty worldwide.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.btl-research.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.btl-research.com/subscribe?"><span>Subscribe now</span></a></p><h1><strong>Why Africa and Latin America?</strong></h1><p>Africa and Latin America have become <a href="https://www.aljazeera.com/features/2025/5/30/each-person-had-10-phones-trapped-in-a-cyber-scam-centre-in-laos">increasingly attractive</a> hubs for illicit financial networks and <a href="https://www.threatmark.com/latam-digital-fraud/">scam operations</a> &#8212; and the reasons are both structural and strategic.</p><p>First, these regions offer regulatory weakness and <a href="https://www.transparency.org/en/cpi/2024">pervasive corruption</a>, creating fertile ground for criminal enterprises. Countries such as Nigeria, Ghana, Kenya, and South Africa <a href="https://www.interpol.int/en/News-and-Events/News/2025/New-INTERPOL-report-warns-of-sharp-rise-in-cybercrime-in-Africa?utm_source=chatgpt.com">in Africa</a>, as well as Brazil, Colombia, and Mexico <a href="https://globalinvestigationsreview.com/guide/the-guide-anti-money-laundering/third-edition/article/latest-developments-in-the-latin-american-fight-against-money-laundering?utm_source=chatgpt.com">in Latin America</a>, have seen a rapid rise in scam and laundering infrastructure precisely because local enforcement remains fragmented and often politically compromised.</p><p>Second, the rise of new <a href="https://journals.sagepub.com/doi/10.1177/14695405241243203">digital middle classes</a> in these regions provides a vast pool of <em>fresh, soft targets</em>. As millions of people come online, often without robust digital literacy or strong consumer protections, they become ideal prey for sophisticated social engineering campaigns and financial fraud schemes.</p><p>Third, operating from Africa and Latin America provides distance from Asian enforcement pressure. As authorities in China and Southeast Asia <a href="https://www.bnnbloomberg.ca/business/international/2025/06/03/more-than-1800-people-arrested-in-crack-down-on-asia-based-scam-operations/">crack down</a> on certain scam and laundering networks, criminal actors strategically shift to jurisdictions with weaker oversight and fewer extradition treaties.</p><p>Fourth, these regions enjoy proximity to European and North American markets, combined with linguistic and cultural familiarity (English, Spanish, French). This makes it significantly easier to craft scams that resonate with Western emotional and financial vulnerabilities &#8212; whether impersonating local authorities, exploiting charitable causes, or manipulating diaspora ties.</p><p>Finally, the emergence of advanced AI tools has dramatically lowered the barrier to entry for these networks. AI allows operators in Africa and Latin America to simulate highly convincing Western identities, tailor emotional manipulation at scale, and automate entire scam ecosystems with precision. This convergence of regulatory gaps, technological capacity, and cultural access creates an almost perfect storm for transnational financial exploitation.</p><h1><strong>The True Objective: Systemic Liquidity Extraction</strong></h1><p>The ultimate goal of these networks is not simply small-scale fraud or opportunistic scams &#8212; it is the deliberate, engineered siphoning of capital out of vulnerable systems on a massive scale. This is what I call systemic liquidity extraction: large, sustained flows designed to hollow out economic and social resilience from within.</p><p>Rather than quick-hit financial crimes, these operations weaken social trust in digital systems, creating long-term skepticism toward online platforms, payment rails, and even centralized financial institutions. By undermining user confidence, they create an environment in which alternative (and often illicit) rails can thrive with less scrutiny.</p><p>In a landmark case, North Korea&#8217;s Lazarus Group, <a href="https://www.bbc.com/news/stories-57520169">nearly stole</a> $1 billion from the Bangladeshi Central Bank until their transfers were intercepted by authorities in the Philippines. If hackers can nearly execute a financial crime of this scale, the risk to broader systems is enormous.</p><p>At a higher level, illicit networks reinforce the architecture of offshore and shadow liquidity sovereignty &#8212; allowing bad actors to control, store, and redeploy value outside regulated channels. A clear example is the Huione case, where payment platforms linked to the Chinese language criminal ecosystem (like Huione Pay) have <a href="https://www.trmlabs.com/resources/blog/treasury-moves-against-huione-group-in-landmark-action-targeting-global-cybercrime-infrastructure">enabled scam and trafficking</a> groups across Southeast Asia to move billions in illicit proceeds while residing in armed and fortified &#8220;scam cities&#8221;. By operating in weakly regulated environments and offering integrated messaging, payment and layering tools, Huione effectively creates a private, opaque financial system. The network even helped the Iran-backed Houthis <a href="https://gnet-research.org/2025/05/14/cash-flow-breaking-down-the-houthis-multibillion-dollar-financial-networks/">move illicit funds</a>. This shadow sovereignty provides strategic flexibility and covert geopolitical leverage, allowing actors to shape markets, destabilize rivals, and shield assets from enforcement or sanctions.</p><p>Chinese criminal syndicates, already deeply embedded in Western underground financial and criminal ecosystems, play a central role in this extraction strategy. The most prominent example is their extensive role in laundering money for Mexican <a href="https://www.brookings.edu/articles/chinese-crime-and-geopolitics-in-2024/">drug cartels</a>, but there are many others &#8212; including seemingly <a href="https://www.wsj.com/world/americas/guns-and-death-threats-spur-canada-to-reel-in-baby-eel-fishing-87b6733f">niche operations</a> like illegal baby eel smuggling on Canada&#8217;s East Coast. Over years, these networks have built cross-border <a href="https://www.justice.gov/archives/opa/pr/federal-indictment-alleges-alliance-between-sinaloa-cartel-and-money-launderers-linked?utm_source=chatgpt.com">laundering structures</a> ranging from <a href="https://cullencommission.ca/files/reports/CullenCommission-FinalReport-Full.pdf">casino junkets</a> and <a href="https://www.mitrade.com/insights/news/live-news/article-3-844781-20250527?utm_source=chatgpt.com">underground banks</a> to large-scale <a href="https://www.dw.com/en/china-temu-shein-trade-tariffs-europe-fraud-products/a-72434992">e-commerce fraud</a>, giving them direct access to Western liquidity. Their operational maturity allows them to move funds quickly and invisibly into offshore havens, fueling both private enrichment and broader state-aligned objectives. Should these networks become intertwined with expanding global scam operations, their ability to siphon from their host societies would become even greater. </p><p>Finally, aging Western societies are <a href="https://www.ncoa.org/article/what-are-the-top-online-scams-targeting-older-adults/">particularly susceptible</a> to these scam-driven extraction economies. Older populations often hold disproportionate liquid wealth and are more vulnerable to targeted social engineering, especially as loneliness and digital illiteracy compound emotional susceptibility. As demographic trends continue to skew older across Europe and North America, the scale of potential liquidity siphoning &#8212; and corresponding social destabilization &#8212; will only grow.</p><h1><strong>Why Current Responses Fail</strong></h1><p>Today&#8217;s regulatory and enforcement responses are fundamentally reactive, designed to address individual scams or laundered transactions rather than dismantle the systemic financial scaffolding that enables them.</p><p>For example, in Australia, banks shut down <a href="https://www.theaustralian.com.au/business/financial-services/banks-struggling-to-contain-mule-accounts/news-story/f5ed78b4899d70dd330c50610e4bee24?utm_source=chatgpt.com">fewer than</a> 13,000 mule accounts last year despite over 100,000 being exploited. A mule account is a bank account controlled by an intermediary who <a href="https://www.fbi.gov/how-we-can-help-you/scams-and-safety/common-frauds-and-scams/money-mules">moves illicit funds</a> on behalf of criminal networks, making it harder for authorities to trace and seize core assets. In another example, in the US, <a href="https://www.propublica.org/article/pig-butchering-scam-cybercrime-us-banks-money-laundering?utm_source=chatgpt.com">despite losing</a> an estimated $44 billion annually to &#8220;pig-butchering&#8221; scams, regulators have focused on freezing individual accounts rather than dismantling the networks enabling Chinese syndicates to exploit U.S. bank accounts at scale. Pig butchering is an especially pernicious and increasingly common form of scamming where perpetrators emotionally groom their victims over time, often through romance or investment schemes, before manipulating them into <a href="https://dfpi.ca.gov/news/insights/pig-butchering-how-to-spot-and-report-the-scam/#:~:text=Pig%20butchering%20is%20an%20investment,or%20another%20fraudulent%20investment%20opportunity.">transferring large sums</a> of money into fraudulent platforms controlled by criminal networks.</p><p>These examples illustrates a focus on surface-level symptoms rather than dismantling the underlying laundering networks. Instead of treating these networks as strategic threats to economic sovereignty, they are managed as isolated criminal or compliance issues. There is no <a href="https://www.unodc.org/documents/AnnualReport/UNODC_REPORT_2023-WEB.pdf?utm_source=chatgpt.com">global framework</a> capable of addressing the structural nature of these transnational scam and laundering hubs. Multilateral efforts target symptoms &#8212; not the liquidity networks sustaining them.</p><p>According to the Financial Action Task Force&#8217;s (FATF) <a href="https://www.fatf-gafi.org/en/publications/Methodsandtrends/comprehensive-update-terrorist-financing-risks-2025.html?utm_source=chatgpt.com">July 2025 report</a> (where I am cited several times), 69% of jurisdictions face major or structural deficiencies in countering terrorist financing &#8212; even as vulnerabilities continue to multiply. Similarly, the United Nations Office on Drugs and Crime&#8217;s (UNODC) annual report highlights that global responses remain fragmented and reactive, targeting individual cases rather than dismantling cross-border laundering infrastructures.</p><p>Finally, weak regulatory regimes have little incentive to change, as these shadow flows often bolster local elites, provide off-books revenue streams, and help maintain fragile patronage systems. In the absence of a fundamental shift in how we perceive this burgeoning parasitic financial ecosystem, many more will inevitably fall prey to it worldwide.</p><h1><strong>Closing Warning</strong></h1><p>These scam centers are no longer merely regional nuisances; they are mutating into global economic pathogens. Left unchecked, they will embed themselves as sovereign liquidity parasites, quietly draining our societies from within &#8212; hollowing out social trust, weakening regulatory legitimacy, and siphoning capital at scale.</p><p>There is still a way to stop them &#8212; but it requires a complete shift in how we see them. We must recognize these networks as strategic infrastructure threats, not just criminal annoyances, and move toward dismantling their liquidity architecture as a core element of national and economic security strategy.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.btl-research.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.btl-research.com/subscribe?"><span>Subscribe now</span></a></p><h1><strong>Inner Circle Tier Exclusive:</strong></h1><p><strong>The Liquidity Kill Switch: Designing the Doctrine to Dismantle Global Fraud Hubs and Terrorist Finance Networks</strong></p><p>There is still a way to stop them &#8212; but it requires a complete shift in how we see them. We must recognize these networks as strategic infrastructure threats, not just criminal annoyances, and move toward dismantling their liquidity architecture as a core element of national and economic security strategy.</p><p>In my upcoming briefing, exclusively for Inner Circle Tier members, I will provide:</p><p>&#8226; Tools to <strong>economically disarm scam centers at scale</strong>, cutting off the oxygen that keeps them alive.</p><p>&#8226; A <strong>detailed breakdown</strong> of integrated kill switch strategies &#8212; spanning financial rails, digital infrastructure, and on-the-ground physical choke points.</p><p>&#8226; Discover <strong>real-world incentive levers</strong> to compel host governments to act, even when local elites benefit from scam economies.</p><p>&#8226; A <strong>practical roadmap</strong> designed for policymakers, regulators, and private compliance teams looking to move beyond reactive enforcement and toward systemic disruption.</p><p>&#8226; Built on original, FATF-cited research and hard operational realities &#8212; not theoretical white papers.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.btl-research.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption"><strong>The Inner Circle is a high-trust, subscriber-supported tier. Join to access exclusive strategic analysis, private briefings, and early insights you won&#8217;t find anywhere else &#8212; designed for serious readers who want to stay ahead of global illicit finance and geopolitical risk.</strong></p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[An Archipelago Beyond Control: The Hidden Threat of China’s Offshore Capital]]></title><description><![CDATA[How elite offshore capital threatens global stability and exposes the cracks in China&#8217;s power.]]></description><link>https://www.btl-research.com/p/the-hidden-threat-of-chinas-offshore</link><guid isPermaLink="false">https://www.btl-research.com/p/the-hidden-threat-of-chinas-offshore</guid><dc:creator><![CDATA[Adam Rousselle]]></dc:creator><pubDate>Mon, 14 Jul 2025 10:14:50 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!EbO1!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffff79c29-b507-431f-8dc6-d7f2f51b6aa0_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!EbO1!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffff79c29-b507-431f-8dc6-d7f2f51b6aa0_1536x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!EbO1!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffff79c29-b507-431f-8dc6-d7f2f51b6aa0_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!EbO1!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffff79c29-b507-431f-8dc6-d7f2f51b6aa0_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!EbO1!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffff79c29-b507-431f-8dc6-d7f2f51b6aa0_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!EbO1!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffff79c29-b507-431f-8dc6-d7f2f51b6aa0_1536x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!EbO1!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffff79c29-b507-431f-8dc6-d7f2f51b6aa0_1536x1024.png" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/fff79c29-b507-431f-8dc6-d7f2f51b6aa0_1536x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2951207,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.btl-research.com/i/168219580?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffff79c29-b507-431f-8dc6-d7f2f51b6aa0_1536x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!EbO1!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffff79c29-b507-431f-8dc6-d7f2f51b6aa0_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!EbO1!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffff79c29-b507-431f-8dc6-d7f2f51b6aa0_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!EbO1!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffff79c29-b507-431f-8dc6-d7f2f51b6aa0_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!EbO1!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffff79c29-b507-431f-8dc6-d7f2f51b6aa0_1536x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Many Western Analysts suggest that China&#8217;s exported capital remains loyal to Beijing. But the reality is far more interesting &#8212; and more dangerous.</p><p>The conventional view is deceptively simple:</p><ul><li><p>Many view China&#8217;s offshore liquidity as a giant <strong>shadow war chest</strong>, a controlled network of sovereign assets deployed at the whim of the Chinese Communist Party (CCP).</p></li><li><p>Western policymakers and risk managers build entire frameworks assuming these offshore pools remain tightly harnessed to Beijing&#8217;s strategic aims.</p></li><li><p>And yes, these pools have indeed been used to discreetly purchase <a href="https://www.tomshardware.com/tech-industry/semiconductors/chinese-ai-firm-deepseek-reportedly-using-shell-companies-to-try-and-evade-u-s-chip-restrictions-allegedly-procured-unknown-number-of-h100-ai-gpus-after-ban-but-nvidia-denies-the-claim">dual-use technology</a>, circumvent <a href="https://asia.nikkei.com/Economy/Trade-war/Trump-tariffs/Shell-game-How-China-linked-front-companies-dodge-U.S.-tariffs">export controls</a>, and secure critical commodities beyond the reach of sanctions or trade scrutiny.</p></li></ul><h3><strong>But what if that loyalty is an illusion?</strong></h3><p>What if China&#8217;s exported liquidity &#8212; ostensibly state-aligned &#8212; is actually becoming a <strong>self-reinforcing shadow sovereignty</strong>, drifting beyond centralized control?</p><p>What if it now serves multiple masters: oligarchic families, hybrid criminal networks, local proxies, and opportunistic elites &#8212; all willing to pledge partial allegiance to Beijing when convenient, yet equally capable of undermining it when incentives shift?</p><p>In this emerging reality, offshore Chinese capital is no longer a single, monolithic weapon of statecraft. It has metastasized into a global gray liquidity architecture &#8212; one that blurs the lines between strategic reserves, private vaults, and criminal war chests.</p><p>This shift fundamentally rewires the logic of economic influence, risk exposure, and conflict escalation in ways most analysts still refuse to see.</p><h2><strong>The true nature of liquidity</strong></h2><p>Liquidity, at its core, means cash or assets easily convertible into cash. But in the 21st century, it is far more than a balance sheet metric &#8212; it is the true bloodstream of power. Liquidity buys influence, loyalty, and the capacity to project narratives and ideology. In this way, it is not just a financial tool; it is the lifeblood of sovereignty itself.</p><p>A state&#8217;s or entity&#8217;s ability to deploy liquidity &#8212; rapidly and across borders &#8212; <strong>fundamentally underpins sovereignty today</strong>. While armies once defined territorial control, liquidity now defines operational reach, resilience, and influence.</p><p>Crucially, those who wield liquidity, especially in environments lacking robust rule of law, tend to prioritize safety and self-preservation over ideology. Capital does not pledge allegiance; it flows toward sanctuary and survival.</p><p>Once capital crosses borders and regulatory boundaries, it mutates. It is <strong>layered through offshore structures, routed via proxies, embedded in shell networks</strong>, and reappears under new ownership masks, often with strong criminal tendencies. This metamorphosis is not a bug &#8212; it is a feature of the modern liquidity system, which is technically advanced but increasingly outside the rule of law.</p><p>Here is where the concept of <strong>post-sovereign liquidity</strong> emerges. Post-sovereign liquidity is:</p><ul><li><p>No longer strictly tied to a single central authority or policy framework.</p></li><li><p>Operates as a <strong>self-defending organism</strong>, protecting itself first &#8212; often at the expense of its originating state.</p></li><li><p>Creates hybrid power actors: networks that can act as extensions of state power when convenient, but also as independent parasitic or symbiotic systems when strategic incentives shift.</p></li></ul><p>In this new reality, sovereignty itself becomes porous. States may believe they command liquidity, but more often than not, liquidity becomes something well beyond their control. With global payment platforms and crypto currency rails enabling instantaneous global transfers, unregulated liquidity flows have never been easier or more widespread.  </p><h2><strong>Demystifying the Chinese system</strong></h2><p>I imagine many Western analysts find it comforting to believe that China&#8217;s offshore liquidity moves in lockstep with Beijing&#8217;s strategic orders &#8212; as if all that money acts as one seamless geopolitical weapon. But the truth is far messier, and far more human. It is a reality that the Western mind &#8212; so conditioned by rule-of-law frameworks that it cannot imagine a world without them &#8212; struggles to fully grasp. Having lived in China for much of my adult life, I carry a kind of muscle memory for systems governed by rule of man rather than rule of law, and thus see things differently.</p><p>Inside China, elite interests are deeply fragmented. Party leaders in Beijing strive to keep a tight grip, pushing grand ideological projects and enforcing strict discipline. Yet beneath them, <a href="https://www.junyanjiang.com/uploads/5/8/1/9/58193547/jiangzhang_fwb.pdf?utm_source=chatgpt.com">provincial networks</a> focus on their own survival and enrichment, prioritizing regional patronage webs and local power dynamics. Meanwhile, private capital &#8212; the tech tycoons, property moguls, and SOE-adjacent billionaires &#8212; operates with a different logic altogether, seeking to transform vulnerable domestic wealth into safer, untouchable <a href="https://www.reuters.com/markets/asia/chinese-investors-rush-offshore-assets-spurs-hong-kong-wealth-inflows-2024-06-16/">offshore assets</a>.</p><p>George R.R. Martin&#8217;s <em><a href="https://awoiaf.westeros.org/index.php/A_Song_of_Ice_and_Fire">A Song of Ice and Fire</a></em> series &#8212; and the <em>Game of Thrones</em> television adaptation it inspired &#8212; offers a powerful lens for understanding these dynamics. Although fictional, the series is rooted in a Western historical period before concepts like a politically independent judiciary and rule of law fully took hold. China&#8217;s internal history under the CCP mirrors this kind of ruthless, soul-crushing factionalism and political backstabbing. One of Martin&#8217;s most cynical characters, <a href="https://www.youtube.com/shorts/7ENAl0UOxkU">Cersei Lannister</a>, distilled the essence of this worldview when she told her son:</p><p><em>&#8220;Everyone who isn&#8217;t us is an enemy.&#8221;</em></p><p>This simple line captures the raw brutality of contemporary Chinese elite politics. While so much modern analysis mystifies China as an inscrutable civilization beyond Western comprehension, in many ways, it is not so fundamentally different. In the West, corruption cases often end up in court dockets and drawn-out legal battles; in China, competing interests are handled more quietly, swiftly, and brutally. </p><p><a href="https://www.scmp.com/economy/china-economy/article/3304476/china-may-face-sustained-capital-outflow-pressure-top-economists-warn">Capital flight</a> is often the primary byproduct of such heavy-handed approaches &#8212; not renewed loyalty, but quiet escape, especially when the <a href="https://thedispatch.com/article/chinas-crackdowns-belie-fears-within-the-regime/">economic fundamentals</a> begin to falter. Why capital flight? Because in a system of life-or-death consequences, the safest way to ensure the survival of one&#8217;s family &#8212; the true <a href="https://en.amazingtalker.com/blog/en/chinese/81499/#:~:text=In%20Chinese%20culture%2C%20the%20family,can%20find%20support%20and%20protection.">core unit</a> of Chinese civilization &#8212; is to store assets beyond the reach of one&#8217;s enemies.</p><p>When legal enforcement is practically non-existent and nobody truly knows who is a friend and who is an enemy, the true nature of exported liquidity is anything but clear cut. When its wielders stand to benefit or face punishment, it can become a powerful tool to advance state interests &#8212; avoiding tariffs, securing critical commodities, or acquiring banned military hardware. But when these vast liquidity pools operate beyond the scope of state reward and punishment, they take on a life of their own. In some cases, they directly <a href="https://oilprice.com/Latest-Energy-News/World-News/Chinese-Exporters-Reroute-Rare-Earths-to-Keep-Supplying-US.html">defy state directives</a>, such as illegally exporting banned rare earth minerals to U.S. markets. At other times, they morph into parasitic criminal ecosystems that feed on human misery in every conceivable way &#8212; most visibly in Southeast Asia&#8217;s vast archipelago of <a href="https://www.unodc.org/unodc/frontpage/2024/July/crushing-scam-farms--southeast-asias-criminal-service-providers.html">scam-center cities</a>, all backed by offshored Chinese capital.</p><p>The result is a richer, murkier tapestry of competing interests &#8212; and one that is, in many ways, even more dangerous than clear-cut geopolitical competition between two adversaries.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!dxUX!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ed6b4a3-ee8e-4ec8-ac14-30aede50928a_1552x1244.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!dxUX!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ed6b4a3-ee8e-4ec8-ac14-30aede50928a_1552x1244.png 424w, https://substackcdn.com/image/fetch/$s_!dxUX!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ed6b4a3-ee8e-4ec8-ac14-30aede50928a_1552x1244.png 848w, https://substackcdn.com/image/fetch/$s_!dxUX!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ed6b4a3-ee8e-4ec8-ac14-30aede50928a_1552x1244.png 1272w, https://substackcdn.com/image/fetch/$s_!dxUX!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ed6b4a3-ee8e-4ec8-ac14-30aede50928a_1552x1244.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!dxUX!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ed6b4a3-ee8e-4ec8-ac14-30aede50928a_1552x1244.png" width="1456" height="1167" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4ed6b4a3-ee8e-4ec8-ac14-30aede50928a_1552x1244.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1167,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!dxUX!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ed6b4a3-ee8e-4ec8-ac14-30aede50928a_1552x1244.png 424w, https://substackcdn.com/image/fetch/$s_!dxUX!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ed6b4a3-ee8e-4ec8-ac14-30aede50928a_1552x1244.png 848w, https://substackcdn.com/image/fetch/$s_!dxUX!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ed6b4a3-ee8e-4ec8-ac14-30aede50928a_1552x1244.png 1272w, https://substackcdn.com/image/fetch/$s_!dxUX!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ed6b4a3-ee8e-4ec8-ac14-30aede50928a_1552x1244.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>Cersei Lannister (left) perhaps carries more historical parallels with women in Chinese history than in the West. I&#8217;ve heard her variously compared to the Empress Dowager Cixi (pictured above), Cultural Revolutionary and wife of Mao Zedong, Jiang Qing, and others. <a href="https://asoiafchineselit.wordpress.com/2020/12/13/the-lioness-the-dragon-lady-historical-parallels-pt-1/">Image source</a></em></p><h2><strong>Historic precedent</strong></h2><p>Fractured elite interests in China are nothing new. We can see echoes throughout its history: the defeated Guomindang&#8217;s <a href="https://www.mining.com/web/how-one-man-took-chinas-gold/?utm_source=chatgpt.com">desperate flight</a> to Taiwan in 1949, carrying state and private treasure by the boatload; or the Ming dynasty&#8217;s maritime merchants, who slipped beyond the reach of the imperial court and built <a href="https://scholarspace.manoa.hawaii.edu/server/api/core/bitstreams/04159870-42f8-4dc6-8789-54c0b79496b0/content">independent networks</a> across Southeast Asia.</p><p>Having spent much of my life studying Chinese history, I have observed certain patterns. The one that stands out above all: at times of crisis, liquidity always flows away from the core. In pre-modern eras, this meant competing regional strongholds that became warring states as increasingly cash-starved dynasties collapsed. From the Ming dynasty onward, this took the form of wealth quietly stashed abroad &#8212; most often in Southeast Asia.</p><p>Today, shadow finance serves both as a tool for immediate survival and as a quiet escape hatch. The state, with its vast political and technological reach, plays a powerful role in these overseas archipelagos of escaped sovereignty &#8212; perhaps the most powerful &#8212; but it is far from the only interest at stake. Many elites, even while professing loyalty to the Party, quietly build offshore structures and hidden reserves: insurance policies for themselves and their families should the system falter or turn on them. Increasingly, these offshore pools morph into parasitic systems the state can neither fully control nor completely disown.</p><p>In this way, China&#8217;s global liquidity is not a monolith. It is a scattered, self-preserving organism, loyal to no single master, ready to pivot or flee at the first sign of real crisis. What looks from the outside like a unified economic spear is, in fact, a restless swarm of competing interests &#8212; each guarding its own future above all else.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.btl-research.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption"><strong>Between the Lines is a reader-supported publication. Support independent analysis that sees beyond the noise &#8212; and unlock access to exclusive insights &#8212; by becoming a paid subscriber.</strong></p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>
      <p>
          <a href="https://www.btl-research.com/p/the-hidden-threat-of-chinas-offshore">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[The New Divide: Why Liquidity, Not Land, Defines Sovereignty]]></title><description><![CDATA[Canada&#8217;s quiet technocratic pivot reveals a new global split: mastery of cash flows versus sovereign leakage.]]></description><link>https://www.btl-research.com/p/the-new-divide-why-liquidity-not</link><guid isPermaLink="false">https://www.btl-research.com/p/the-new-divide-why-liquidity-not</guid><dc:creator><![CDATA[Adam Rousselle]]></dc:creator><pubDate>Mon, 07 Jul 2025 10:30:25 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!4n8l!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F863c9f76-3bc5-4a52-9aa6-a486d95d8886_780x439.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em><strong>Please note:</strong> This article, like all my others, is not political. I make no specific endorsement of any political leader or party anywhere in the world.</em></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!4n8l!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F863c9f76-3bc5-4a52-9aa6-a486d95d8886_780x439.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!4n8l!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F863c9f76-3bc5-4a52-9aa6-a486d95d8886_780x439.jpeg 424w, https://substackcdn.com/image/fetch/$s_!4n8l!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F863c9f76-3bc5-4a52-9aa6-a486d95d8886_780x439.jpeg 848w, https://substackcdn.com/image/fetch/$s_!4n8l!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F863c9f76-3bc5-4a52-9aa6-a486d95d8886_780x439.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!4n8l!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F863c9f76-3bc5-4a52-9aa6-a486d95d8886_780x439.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!4n8l!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F863c9f76-3bc5-4a52-9aa6-a486d95d8886_780x439.jpeg" width="780" height="439" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/863c9f76-3bc5-4a52-9aa6-a486d95d8886_780x439.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:439,&quot;width&quot;:780,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;A smiling politician claps on stage.&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="A smiling politician claps on stage." title="A smiling politician claps on stage." srcset="https://substackcdn.com/image/fetch/$s_!4n8l!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F863c9f76-3bc5-4a52-9aa6-a486d95d8886_780x439.jpeg 424w, https://substackcdn.com/image/fetch/$s_!4n8l!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F863c9f76-3bc5-4a52-9aa6-a486d95d8886_780x439.jpeg 848w, https://substackcdn.com/image/fetch/$s_!4n8l!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F863c9f76-3bc5-4a52-9aa6-a486d95d8886_780x439.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!4n8l!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F863c9f76-3bc5-4a52-9aa6-a486d95d8886_780x439.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>The electoral victory of Canadian Prime Minister Mark Carney, a career central banker, wasn&#8217;t just politics &#8212; it signals a global pattern: liquidity, not land, increasingly underpins sovereignty. <a href="https://www.cbc.ca/news/canada/ottawa/canada-federal-election-2025-results-nepean-1.7516414">Image source</a></em></p><p>&#8220;Lead us, Big Daddy,&#8221; a woman screamed at an event for Canadian Prime Minister and Liberal Party leader Mark Carney in Scarborough, Ontario, this past April.</p><p>All cringe aside, the moment marked a clear catalyst in Canadian political life. Just a few months earlier, the upcoming federal election looked like a nightmare for the Liberals: polls showed only 16% of Canadians <a href="https://angusreid.org/liberals-prime-minister-trudeau-resign-election-2025-poilievre-singh/">planned to vote</a> for the party. Carney&#8217;s predecessor, Justin Trudeau, had been effectively hounded out of office amid intensifying calls for his resignation, leaving Conservative leader Pierre Poilievre poised to take power.</p><p>Then, a parallel chain of events unfolded with stunning speed, galvanizing the Canadian system in a completely different direction. The November election of U.S. President Donald Trump brought new tariffs on Canadian goods and loud calls to <a href="https://www.cnn.com/2025/01/09/world/trudeau-trump-canada-tariffs-tapper-intl-latam">make Canada</a> &#8220;the 51st state.&#8221; The rhetoric infuriated Canadians, with many donning Trump-style hats reading &#8220;Canada is not for Sale&#8221; and &#8220;Canada is Already Great.&#8221; By March, Carney &#8212; a reserved former central bank chief &#8212; won the Liberal Party leadership with nearly 86% of the vote and <a href="https://www.cbc.ca/news/politics/liberal-pary-leadership-winner-1.7476359">became Prime Minister</a>. He had never held elected office and became only the fourth Prime Minister in Canadian history to take power without even a seat in the House of Commons.</p><p>The April 28 election delivered results no one had predicted just months earlier: Carney&#8217;s Liberals <a href="https://www.nytimes.com/2025/04/29/world/canada/carney-liberals-canada-election-results.html">handily defeated</a> the opposition and gained seats, ending up just three shy of a majority government.</p><p>Carney&#8217;s unexpected rise represents more than a resurgence of economic nationalism. It signals a deeper shift in how Canadians imagine sovereignty and resilience in a world increasingly shaped by external shocks underpinned by liquidity systems. Canada, with its highly centralized, transparent, and tightly regulated liquidity architecture, responded to this threat the way it knows best: by electing a technocratic central banker to steer it through crisis. By rehabilitating a party that, after a decade in power, was headed for electoral obscurity, the system made clear what it wanted most &#8212; the kind of technocratic leadership that only a regime built on trusted, centralized liquidity could produce.</p><h1><strong>Liquidity as the new foundation of sovereignty</strong></h1><p>Sovereignty has long been understood as the power to control territory and enforce borders. Maps and armies were the ultimate symbols of statehood, the concrete markers of a government&#8217;s ability to project authority. Yet in an era defined by transnational capital, global supply chains, and instant digital transactions, this territorial framing feels increasingly outdated.</p><p>Today, the true backbone of sovereignty is liquidity: a state&#8217;s capacity to generate, anchor, and direct flows of value (money, especially digital payments). Control over liquidity determines whether a government can maintain social contracts, fund security apparatuses, and stabilize domestic markets in the face of external shocks.</p><p>Here lies the critical schism: states that consolidate liquidity &#8212; through centralized, transparent, and trusted systems &#8212; can reinforce sovereignty and adapt under pressure. In contrast, states that suffer from liquidity leakage, where capital quietly escapes into offshore havens and private survival networks, find their sovereignty hollowed from within long before any dramatic collapse becomes visible.</p><p>Whether through shadow reserves, offshore trusts, or digital asset flight, the silent migration of liquidity reveals where power truly lives &#8212; and where it is quietly dying. In this sense, the future of sovereignty will be decided not at the border, but in the bloodstream of value flows.</p><h1><strong>Under-regulated, opaque systems and sovereign leakage</strong></h1><p>Sovereignty is not lost all at once; it erodes quietly through small fractures in a state&#8217;s liquidity architecture. In under-regulated and opaque systems, value escapes through informal circuits, fueling rival power centers and weakening the state&#8217;s core. While these systems may appear centralized on the surface, they often conceal hidden leakage that hollows out actual sovereignty far more effectively than any external invasion.</p><h3>China &#8212; scam centers and gray zone liquidity</h3><p>China is often viewed as a monolith of centralized control, yet beneath this surface lies a fragmented landscape of gray zone liquidity. While the state nominally controls its financial system through strict capital controls and centralized directives, it simultaneously tolerates and indirectly benefits from <a href="https://www.btl-research.com/p/chinas-gray-zone-syndicates-part-fa6">peripheral cash ecosystems</a> &#8212; especially in Southeast Asia. As we explored in my China Grey Zone series, Beijing <a href="https://www.btl-research.com/p/chinas-gray-zone-syndicates-part">enables these</a> liquidity flows as a workaround to external pressure &#8212; using them to evade tariffs and sanctions. However, this same strategy seeds fragmentation and empowers peripheral actors, ultimately undermining the very sovereignty it seeks to protect</p><p>Scam centers in Myanmar, Cambodia, and Laos serve as <a href="https://news.un.org/en/story/2025/05/1163521">offshore liquidity</a> vents, recycling funds through cryptocurrency rails, informal money brokers, and online gambling channels. Chinese actors, including local officials and security services, extract rents and <a href="https://www.washingtonpost.com/world/2024/06/19/china-online-scams-myanmar-trafficking/?utm_source=chatgpt.com">facilitate the expansion</a> of these networks, often under the guise of &#8220;development&#8221; or &#8220;business diplomacy.&#8221;</p><p>These scam economies and gray financial nodes hollow sovereignty from within. The Chinese state becomes both participant and hostage: benefiting from offshore cash generation while losing consolidated oversight over the system. Beneath the narrative of strong central command lies an archipelago of liquidity escape routes that empower non-state actors, local elites, and transnational crime networks.</p><p>Ironically, Beijing has begun pushing to <a href="https://www.dw.com/en/why-is-china-clamping-down-on-scammers-in-southeast-asia/a-71456569">crack down</a> on these scam centers, despite many being indirectly <a href="https://apnews.com/article/china-southeast-asia-cyberscam-criminal-myanmar-4d749243cd4c95d697060d8cef59cabb">funded or facilitated</a> by state-backed Belt and Road Initiative (BRI) infrastructure and investment projects. This reactive enforcement highlights the internal contradiction: the state depends on gray liquidity flows to sustain influence abroad, yet those same flows undermine its long-term strategic coherence. The result is a sovereignty that appears centralized but is riddled with silent fractures, primed for instability when crisis hits.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.btl-research.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Between the Lines is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h3>Iran &#8212; proxies and semi-autonomous liquidity</h3><p>Iran&#8217;s strategy of regional influence hinges on proxy groups like Hezbollah, the Houthis, and various militias in Iraq and Syria. Initially, Tehran&#8217;s liquidity flows into these networks served as direct strategic extensions of state policy. However, over time, these proxies have developed semi-autonomous funding channels, creating parallel financial ecosystems that increasingly operate beyond Tehran&#8217;s direct control. In this way, proxies funded to advance Iranian security needs could end up undermining its sovereignty. </p><p>Hezbollah&#8217;s diversified <a href="https://www.btl-research.com/p/audio-funding-a-war-chest-hezbollahs-002">revenue streams</a> &#8212; including narcotics, counterfeit goods, and cryptocurrency donations &#8212; allow it to make independent strategic decisions, sometimes even contradicting Iranian preferences. The Houthis, meanwhile, have leveraged local commodity taxation, remittance interception, and crypto-enabled remittance corridors to create a <a href="https://www.btl-research.com/p/cash-flow-breaking-down-the-houthis?utm_source=publication-search">self-sustaining</a> war economy. Similarly, Iraqi militias &#8212; while historically reliant on Iranian backing &#8212; have acted on their own imperatives, <a href="https://www.reuters.com/world/middle-east/iraqi-armed-groups-dial-down-us-attacks-request-iran-commander-2024-02-18/?utm_source=chatgpt.com">launching attacks</a> against U.S. forces even when Tehran has explicitly called for restraint.</p><p>These developments mean that Tehran&#8217;s once-coherent liquidity projection is now fragmented. Proxy actors can launch attacks based on their independent liquidity systems rather than Iran&#8217;s overarching strategic plan. Although Tehran still exerts enormous influence, its control is far from paramount, leading to ceded sovereign control. In trying to externalize sovereignty through proxies, Iran has inadvertently fostered competing centers of power, leaving its regional influence more unstable and less predictable.</p><h3>Pakistan &#8212; ISI&#8217;s liquidity and Taliban autonomy</h3><p>Pakistan&#8217;s Inter-Services Intelligence (ISI) has long used liquidity as a tool of strategic depth, funneling <a href="https://www.hrw.org/reports/2001/afghan2/Afghan0701-02.htm?utm_source=chatgpt.com">cash and resources</a> into Afghan Taliban networks to maintain leverage over Kabul and regional dynamics. However, this liquidity strategy has boomeranged.</p><p>The Taliban, once reliant on Pakistani patronage, have built independent <a href="https://www.brookings.edu/articles/drugs-security-and-counternarcotics-policies-in-afghanistan/?utm_source=chatgpt.com">cash economies</a> rooted in cross-border taxation, smuggling networks, narcotics trade, and local resource levies. Over time, they have transformed into an alternative liquidity state operating parallel to, and beyond, Pakistani control.</p><p>As these autonomous revenue streams grew, Pakistan lost what grip it had over critical border regions, ceding effective sovereignty to a hybrid armed governance structure. This leakage of liquidity from a nominally centralized intelligence service into independent militant coffers has weakened Islamabad&#8217;s ability to enforce internal coherence, resulting in a fragmented and fragile sovereignty especially visible in the tribal borderlands.</p><h3>Technology acceleration</h3><p>Technology magnifies these dynamics exponentially. Digital payment systems, cryptocurrency rails, and encrypted apps allow liquidity to escape state oversight in real time &#8212; especially under conditions of corrupt officials, weak regulatory frameworks, and systemic opacity. Sovereignty is no longer eroded slowly over decades through smuggling and informal markets; it is now undermined at the speed of code, with value moving across borders and into rival hands in seconds rather than years.</p><h1><strong>The alternative: Canada&#8217;s immune response</strong></h1><p>While many states struggle with fragmented liquidity systems and sovereign leakage, Canada offers a striking systemic contrast. Despite its vast geography and strong provincial identities, Canada&#8217;s financial backbone is extraordinarily centralized and coherent. Just <a href="https://www.investopedia.com/terms/b/bigsixbanks.asp">six major banks</a> dominate the landscape, operating under tight, transparent regulation overseen by an all-powerful central bank. </p><p>This architecture is often misunderstood by outside observers. Commentators like Peter Zeihan, for example, argue that Canada is economically disunified because each province trades more with the U.S. than with other provinces. However, this view misses a deeper structural reality: Canada&#8217;s liquidity flows remain centrally anchored and carefully stewarded, allowing it to act as a unified economic organism despite external trade patterns. </p><p>When faced with external shocks, such as dramatic tariff increases and talk of trade wars, states with centralized liquidity systems do not turn to military defenses or populist strongmen. Instead, they empower technocratic stewards who can manage financial flows and stabilize internal value networks. Mark Carney&#8217;s unexpected rise is the perfect embodiment of this &#8220;liquidity immune system&#8221; response. The system is not perfect, as Canada has experienced record capital </p><p>But the system is not perfect. Canada has seen record capital outflows in recent months&#8212;over $84&#8239;billion in net securities flight over just four months &#8212;highlighting the difference between <a href="https://betterdwelling.com/canadas-capital-flight-accelerates-as-investors-dump-domestic-assets/">formal capital flight </a>and that facilitated by shadow liquidity systems. These outflows move under the purview of a strong regulatory regime, flowing through transparent, market-based channels rather than illicit networks siphoning wealth into opaque offshore systems beyond legal reach. This contrast underscores a critical point: while regulated liquidity can be steered even in crisis, shadow liquidity operates on a separate plane&#8212;adaptive, opaque, and beyond the grasp of state policy mechanisms.</p><p>A former central banker with no electoral background, Carney symbolizes the Canadian instinct to protect sovereignty not through barbed wire or nationalist slogans, but through disciplined monetary governance and systemic financial consolidation. His ascent reflects a collective preference for liquidity resilience over theatrical displays of territorial control &#8212; a choice that sets Canada apart in a world where many states increasingly lose coherence under liquidity stress, especially as new technologies accelerate and camouflage capital flight with unprecedented speed.</p><p>Not only would the tightly regulated Canadian system not leak liquidity into actors that fundamentally threaten its sovereignty, its system is so consolidated and trusted that when faced with external threats, it reflexively empowers technocratic stewards rather than alternative power centers.</p><h1><strong>Conclusion: No moral judgment &#8212; only structural divergence</strong></h1><p><em>What happens when a state can no longer defend its financial bloodstream?</em></p><p>This article is not a moral critique of states that experience liquidity leakage, nor an endorsement of those with highly centralized liquidity systems. Historical and institutional asymmetries shape each country&#8217;s financial architecture in ways that cannot be quickly or easily rewritten. Canada, for example, benefits from an industrial and legal foundation that predates those of many developing countries by over a century &#8212; a foundation that enables tighter regulatory oversight and more trusted central institutions.</p><p>What matters is the structural reality: future sovereign power will be defined by a state&#8217;s ability to generate, anchor, and defend its liquidity flows. The decisive contests of the coming decades will not be fought on territorial frontiers alone but within the hidden arteries of capital and value transfer.</p><p>In this new era, sovereignty will belong not to states that hold ground, but to those who master the circulatory systems of capital.</p>]]></content:encoded></item><item><title><![CDATA[How Shadow Liquidity Sustains Al-Shabaab: From Charcoal Exports to Shell Companies]]></title><description><![CDATA[Mapping the hidden financial arteries that keep one of Africa&#8217;s deadliest insurgencies alive &#8212; from global smuggling routes to potential cryptocurrency adaptations.]]></description><link>https://www.btl-research.com/p/how-shadow-liquidity-sustains-al</link><guid isPermaLink="false">https://www.btl-research.com/p/how-shadow-liquidity-sustains-al</guid><dc:creator><![CDATA[Adam Rousselle]]></dc:creator><pubDate>Thu, 03 Jul 2025 15:11:54 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!zsk9!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1e81bf81-f4cf-4bed-aada-28dce32fab08_1023x575.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!zsk9!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1e81bf81-f4cf-4bed-aada-28dce32fab08_1023x575.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!zsk9!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1e81bf81-f4cf-4bed-aada-28dce32fab08_1023x575.jpeg 424w, https://substackcdn.com/image/fetch/$s_!zsk9!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1e81bf81-f4cf-4bed-aada-28dce32fab08_1023x575.jpeg 848w, https://substackcdn.com/image/fetch/$s_!zsk9!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1e81bf81-f4cf-4bed-aada-28dce32fab08_1023x575.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!zsk9!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1e81bf81-f4cf-4bed-aada-28dce32fab08_1023x575.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!zsk9!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1e81bf81-f4cf-4bed-aada-28dce32fab08_1023x575.jpeg" width="1023" height="575" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1e81bf81-f4cf-4bed-aada-28dce32fab08_1023x575.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:575,&quot;width&quot;:1023,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;FILE - Armed al-Shabab fighters ride on pickup trucks as they prepare to travel into the city, just outside the capital Mogadishu, in Somalia, Dec. 8, 2008.&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="FILE - Armed al-Shabab fighters ride on pickup trucks as they prepare to travel into the city, just outside the capital Mogadishu, in Somalia, Dec. 8, 2008." title="FILE - Armed al-Shabab fighters ride on pickup trucks as they prepare to travel into the city, just outside the capital Mogadishu, in Somalia, Dec. 8, 2008." srcset="https://substackcdn.com/image/fetch/$s_!zsk9!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1e81bf81-f4cf-4bed-aada-28dce32fab08_1023x575.jpeg 424w, https://substackcdn.com/image/fetch/$s_!zsk9!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1e81bf81-f4cf-4bed-aada-28dce32fab08_1023x575.jpeg 848w, https://substackcdn.com/image/fetch/$s_!zsk9!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1e81bf81-f4cf-4bed-aada-28dce32fab08_1023x575.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!zsk9!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1e81bf81-f4cf-4bed-aada-28dce32fab08_1023x575.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em><a href="https://www.voanews.com/a/us-sanctions-5-al-shabab-finance-officers-4-charcoal-smugglers/7109280.html">Image source</a></em></p><h1>Preface</h1><p><em>This article was originally drafted and circulated privately in March 2025. Although it was not published through its initial intended outlet, I share it now to advance public understanding of Al-Shabaab&#8217;s evolving financial networks and the broader dynamics of illicit liquidity in conflict economies. </em></p><p><em>This article draws from my Shadow Liquidity Doctrine, first drafted and circulated privately in early 2025. The doctrine defines shadow liquidity and its operational twin, illicit liquidity, as strategic infrastructures that sustain modern conflict, enable gray zone operations, and maintain covert networks of power. Al-Shabaab&#8217;s financial architecture exemplifies this hidden circulatory system: an adaptive flow of capital that transcends borders, sanctions, and formal oversight.</em></p><h1>Intro</h1><p>Somali terror group al-Shabaab remains a persistent global threat despite decades of international efforts to combat its influence. With recent reports indicating the militants have <a href="https://substack.com/@confusedeagledc/p-159428249">established</a><a href="#_msocom_1">[1]</a> <a href="https://substack.com/@confusedeagledc/p-159428249">checkpoints</a> just 15 kilometers from the capital, Mogadishu, the al-Qaeda-aligned group continues to launch a dizzying array of attacks, recently striking the Somali <a href="https://www.dailynewsegypt.com/2025/03/19/al-shabaab-claims-responsibility-for-attack-on-somali-presidents-convoy-egypt-denounces-terrorist-act/">presidential convoy</a> and an <a href="https://www.bbc.com/news/articles/cx2gdjd57lro">international hotel</a> in the capital and launching <a href="https://www.africanews.com/2020/01/06/al-shabaab-attacks-base-used-by-us-kenyan-troops/">a bomb attack</a> on a US military base in neighboring Kenya last summer &#8211; just to name a few. With the African Union Mission in Somalia (ATMIS) ending its mandate on 31 December 2024 and replaced by a <a href="https://understandingwar.org/backgrounder/africa-file-august-22-2024-%E2%80%9Caussom%E2%80%9D-new-au-mission-somalia-burkina-faso-reaches-boiling#:~:text=%5B3%5D%20ATMIS%20began%20in%202022,mission%20will%20have%2011%2C911%20personnel.">scaled-down</a> African Union Support and Stabilization Mission in Somalia (AUSSOM), many in Somalia and abroad have <a href="https://www.africa-confidential.com/article/id/15298/row-over-troop-numbers-jeopardises-au-mission">expressed doubts</a> as to the mission&#8217;s future success in combating this growing threat.</p><p>Sophisticated financial networks underpin much of al-Shabaab&#8217;s regional and global threat. These networks are prime examples of what I define as shadow liquidity &#8212; hidden capital flows that function as strategic infrastructure, enabling militant and criminal actors to endure despite military or ideological setbacks.</p><p>Al-Shabaab&#8217;s sustained influence could have severe geopolitical ramifications, given the group&#8217;s sway over <a href="https://adf-magazine.com/2024/03/report-al-shabaab-extends-reach-with-offer-to-protect-somali-pirates/">piracy outfits</a> on the Indian Ocean and close ties to the <a href="https://www.btl-research.com/p/airstrikes-on-somalia-and-the-looming?utm_source=publication-search">Houthis and Iran</a>. Last summer, US reports indicated that the Yemen-based and Iranian-backed Houthis had met with members of al-Shabaab to discuss mutual aid, including Houthi arms transfers and technical expertise in exchange for al-Shabaab&#8217;s efforts to ramp up piracy of the Somali coast. If successful, this move could extend the <a href="https://www.btl-research.com/p/red-sea-shutdown-why-houthi-attacks">current crisis</a> in the Red Sea by thousands of kilometers and more severely impact global shipping, especially if al-Shabaab and the pirate outfits it supports gain access to <a href="https://www.btl-research.com/p/beware-irans-military-industrial">sophisticated Iranian</a> drones, missiles, and other weaponry. In addition to these potential global ramifications, al-Shabaab poses a significant threat regionally, having carried out <a href="https://www.crisisgroup.org/africa/horn-africa/al-shabaabs-attacks-east-africa-timeline">devastating attacks</a> killing thousands in Somalia as well as neighbouring Kenya and Ethiopia. In this way, any future al-Shabaab gains could come at a cost to global security as a whole.</p><p>Sophisticated financial networks underpin much of al-Shabaab&#8217;s regional and global threat. The organization is by far al-Qaeda&#8217;s <a href="https://www.militantwire.com/p/al-shabaab-maintains-large-scale">wealthiest</a> constituent group, <a href="https://home.treasury.gov/news/press-releases/jy2168#:~:text=Al%2DShabaab%20generates%20over%20%24100,is%20not%20limited%20to%20Somalia.">generating</a> over $100 million USD in revenue annually, funds essential to its deadly operations at home and abroad. Although growing global scrutiny over the past year has hindered al-Shabaab&#8217;s financial operations, the group remains tactically resilient, indicating it has and will likely continue to adapt to its constrained financial circumstances. This insight explores how al-Shabaab raises money locally, has harnessed a sophisticated network of financial facilitators and investments abroad to bring money into Somalia, and how it may adapt following new rounds of sanctions by US authorities.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.btl-research.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Between the Lines is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h1><strong>Local Revenue Generation</strong></h1><p>Al-Shabaab&#8217;s revenue generation starts with its territorial holdings, encompassing much of southern Somalia&#8217;s Juba River valley. The Juba valley is Somalia&#8217;s primary centre for food production, giving al-Shabaab a considerable advantage over the Mogadishu-based federal government. Somalia produces only 40% of its grain requirement domestically, and with most farmland controlled by al-Shabaab, the federal government relies heavily on imports and aid from the outside world at a time when international container ships face a <a href="https://icc-ccs.org/new-report-highlights-continued-threat-of-somali-piracy/">growing threat</a> of pirate attacks off Somali waters. In a country as <a href="https://concernusa.org/news/hunger-in-somalia/#:~:text=It%20has%20the%20third%2Dhighest,2017%2C%202022%2C%20and%202023.">famine-prone</a> as Somalia, al-Shabaab holds sway over who eats and who does not, giving it considerable power over the populace. Moreover, by holding these lands, al-Shabab extracts revenue from any and all economic activity that occurs on them through heavy taxes levied on commodity exports.</p><p>Illicit charcoal production and sales have been al-Shabaab&#8217;s most important revenue stream. According to local reports, the group generates between US $8&#8211;18 million in annual revenue from a <a href="https://www.grida.no/resources/7489">single roadblock</a> that taxes trucks transporting charcoal in the Badhaade District of the Lower Juba Region. In total, al-Shabaab earns an estimated one-third of all revenue generated by charcoal production in Somalia &#8211; some US $38&#8211;56 million annually. However, these figures date from 2013, and the group&#8217;s revenue may be currently much higher. The largest markets for Somali charcoal include the United Arab Emirates, Kuwait, Egypt, Saudi Arabia, and Lebanon. Shisha smokers especially <a href="https://correctiv.org/en/latest-stories/2023/01/16/charcoal-somalias-burning-issue/">prize Somali charcoal</a> due to its distinct acacia wood aroma, and Chinese e-commerce giant Alibaba ships the product worldwide on behalf of numerous <a href="https://www.alibaba.com/showroom/somali-charcoal.html">online sellers</a>.</p><p>Both al-Shabaab and the Somali Federal Government generate <a href="https://hornobserver.com/articles/2265/Somalias-Profitable-charcoal-trade-benefits-government-and-Al-Shabaab-Report">significant revenue</a> from illicit charcoal exports, with government-imposed roadblocks in the capital also collecting taxes on cargo trucks coming from al-Shabaab-controlled territories. For this reason, controlling exports from within the country is practically impossible. According to a 2018 report, al-Shabaab <a href="https://www.reuters.com/article/world/iran-is-new-transit-point-for-somali-charcoal-in-illict-trade-taxed-by-militants-idUSKCN1MJ158/">works closely</a> with Iran to facilitate charcoal exports, shipping goods under false country of origin certificates from Comoros, C&#244;te D&#8217;Ivoire, and Ghana to ports in Iran, wherein local agents package and resell the product under a &#8216;Product of Iran&#8217; label. These factors obfuscate the true origin of much of the charcoal on the global market. Reports also indicate that al-Qaeda, al-Shabaab&#8217;s parent organization, bases much of its operations in Iran with the central organization&#8217;s de-facto chief, <a href="https://extremism.gwu.edu/al-qaeda-de-facto-leader-sayf-al-adl">Sayf al-&#8216;Adl</a>, reportedly living openly in Tehran. In this way, al-Qaeda Central may facilitate and benefit from illicit Somali exports to Iranian shores.</p><p>Other means by which al-Shabaab <a href="https://theowp.org/reports/narcotics-and-terrorist-financing-how-al-shabaab-profit-from-the-global-heroin-trade/">generates revenue</a> locally include trans-Saharan human and narcotics trafficking, as well as kidnapping <a href="https://www.aa.com.tr/en/africa/al-shabaab-gunmen-abduct-5-officials-in-kenyas-border-region/3470166">foreign nationals</a> for ransom, important sources of foreign currency that it uses to purchase weapons and other goods. Reports indicate that al-Shabaab purchases much of its supplies from <a href="https://www.vox.com/world/2017/7/13/15948184/pirates-terrorists-somalia-isis-shabaab">coastal pirate rings</a>, requiring cash to do so. Estimates of the group&#8217;s total <a href="https://www.nationalsecurity.gov.au/what-australia-is-doing/terrorist-organisations/listed-terrorist-organisations/al-shabaab">fighting force</a> vary between 5,000&#8211;14,000: feeding, clothing, and arming these individuals and paying them enough to support their families requires a steady flow of cash in one of the world&#8217;s poorest countries, meaning al-Shabaab must take an active role in Somali export markets and invest globally to generate stable sources of hard currency.</p><h1><strong>International F<s>i</s>nancial Networks and Adapting to N<s>e</s>w Constraints</strong></h1><p>The United States Treasury Office of Foreign Asset Control (OFAC) and other entities heavily sanction al-Shabaab, limiting its access to the global financial system; given al-Shabaab&#8217;s reliance on commodity exports and Somalia&#8217;s limited cash economy, the group has had to work with external financiers to bring cash onto Somali shores. According to OFAC, the Dubai-based Haleel Holdings LLC and Qemat al Najah General Trading have been the <a href="https://home.treasury.gov/news/press-releases/jy2168">primary facilitators</a> of al-Shabaab&#8217;s global financial operations. The former operates branches in several countries to export Somali goods, transfer money, and make investments on al-Shabaab&#8217;s behalf. However, with OFAC slapping these firms with new sanctions last May, al-Shabaab now faces significant challenges in receiving funds from abroad. This development will likely cause the group to adapt.</p><p>Haleel Holdings operates a <a href="https://home.treasury.gov/news/press-releases/jy2168">vast network</a> of regional offices in the UAE, Cyprus, Kenya, Uganda, and Somalia. Prior to its 2024 OFAC designation, the company had avoided restrictions for many years despite significant international pressure and scrutiny. For example, in 2019, <a href="https://chimpreports.com/al-shabaab-money-u-s-sanctioned-ugandan-company-was-let-off-the-hook-by-ugandan-courts/">Ugandan courts</a> cleared the firm&#8217;s local foreign exchange and commodities trading division, Haleel Commodities, of charges associated with financing terrorism despite considerable pressure from US authorities and the Ugandan Financial Intelligence Agency (FIA).</p><p>According to reports, Haleel&#8217;s financial nexus served as interlocutors between al-Shabaab and <a href="https://home.treasury.gov/news/press-releases/jy1028">local businesses</a> in Somalia &#8211; likely helping these businesses export commodities such as charcoal and apportioning some of the revenue to al-Shabaab as a form of taxation. Using al-Shabaab funds, Haleel oversaw foreign revenue-generating investments, such as the Kenya-based <a href="https://kenyanwallstreet.com/us-sanctions-crown-bus-15-others-for-terror-financing/">Crown Bus</a> transport company, which the US also claims helped facilitate al-Shabaab&#8217;s logistical operations. Last year&#8217;s OFAC sanctions on al-Shabaab facilitators targeted 15 other companies linked to the terrorist group, investments likely facilitated by Haleel. The company likely funneled some of the profits back to al-Shabaab&#8217;s Somali operations <a href="https://www.u4.no/publications/hawala-remittance-system-and-money-laundering.pdf">via hawala</a>. These informal financial networks covertly transfer as much as <a href="https://www.rahmanravelli.co.uk/expertise/anti-money-laundering-investigations/articles/providers-of-hawala-services-in-the-uae-have-been-made-to-register-as-the-state-looks-to-prevent-money-laundering-syed-rahman-of-financial-crime-specialists-rahman-ravelli-assesses-the-uae-s-stance-/">$300 billion USD</a> worldwide annually. Haleel also provided other services to al-Shabaab, including weapons procurement and recruitment.</p><p>By designating Haleel and other companies related to facilitating al-Shabaab financial activities, US authorities have effectively blocked these companies&#8217; access to global fund transfers and asset holdings while adding increased scrutiny by local authorities. Although these facilitators may turn to informal means, such as hawala networks, to transfer funds back to al-Shabaab, they will likely face considerable challenges moving forward, given their inability to access legitimate funding sources. While this is a positive development for countering al-Shabaab&#8217;s growing influence, the group&#8217;s considerable resources in Somalia and longstanding ingenuity will likely result in its financial adaptation moving forward. For this reason, global law enforcement agencies and tech companies should monitor the situation closely.</p><p>Under current levels of scrutiny from Washington, al-Shabaab&#8217;s financial path forward will not be an easy one. However, the group has likely already adapted to some degree. In the past, al-Shabaab generated money through fraudulent <a href="https://extremism.gwu.edu/sites/g/files/zaxdzs5746/files/AQ-Financing-in-US_Jarvinen_October%202022.pdf">charitable donations</a> set up across the vast global Somali diaspora community, including from within the United States, receiving funds from witting and unwitting donors. The fundraisers, often women, sent remittances to Somalia broken into small amounts to avoid suspicion. In 2011, an American jury found two female US citizens of Somali origin from Rochester, Minnesota, guilty of providing <a href="https://www.justice.gov/archives/opa/pr/two-minnesota-women-convicted-providing-material-support-al-shabaab">material support</a> to al-Shabaab. In 2017, a Virginia court successfully prosecuted a <a href="https://www.justice.gov/archives/opa/pr/two-women-sentenced-providing-material-support-terrorists">similar case</a> involving two Somali-American women linked to al-Shabaab fundraising. In both cases, the women formed part of a <a href="https://www.voanews.com/a/two-women-us-convicted-financing-somali-group-al-shabaab/3566479.html">global fundraising network</a>, including operatives in Somalia, Kenya, Egypt, the Netherlands, Sweden, the United Kingdom, and Canada. These women and others provided financial support to al-Shabaab at the time through traditional cash remittance companies. With today&#8217;s mobile remittance providers more widespread and sophisticated cryptocurrencies also more readily available, al-Shabaab could attempt to solicit donations from global donors in larger amounts now that US authorities have placed the group&#8217;s primary financial facilitators under heavy restrictions.</p><p>Al-Shabaab could also solicit donations via digital currencies, especially those with enhanced privacy protections such as Monero. The group could also leverage al-Qaeda&#8217;s vast global propaganda apparatus, which operates extensively in places where local regimes likely provide haven for its activities, such as Afghanistan, Iran, and Yemen. Al-Qaeda&#8217;s chief global rival, the Islamic State, has pioneered this fundraising model, and, given its success, al-Qaeda affiliates like al-Shabaab could adapt it for their own purposes moving forward. Moreover, given the high levels of scrutiny on al-Shabaab financiers who transfer cash and make investments via traditional means, digital currency transfers to new external financial facilitators are likely, given the significant revenue al-Shabaab generates from commodity exports. Finally, al-Shabaab will likely increasingly turn to criminal activity to finance its operations, including kidnapping for ransom, as well as human and narcotics trafficking, to finance its operations. The group kidnapped five <a href="https://www.reuters.com/world/africa/suspected-al-shabaab-gunmen-abduct-chiefs-northeast-kenya-media-reports-2025-02-03/">Kenyan officials</a> from the Kenya-Somalia border order region of Mandera County in February, and such incidents could become increasingly commonplace.</p><h1><strong>Recommendations</strong></h1><p>Al-Shabaab will likely take a multifaceted approach to its increasingly constrained financial circumstances. Ensuring this terror group, one of the world&#8217;s <a href="https://www.visionofhumanity.org/deadliest-terror-groups-in-2024/">four deadliest</a>, remains restricted from accessing global funds will require technology companies to remain vigilant and closely collaborate with law enforcement agencies. Companies can also explore long-term and short-term measures to combat financial operations by al-Shabaab and other groups.</p><p>In the short term, global remittance providers and digital currency exchanges should closely monitor suspicious transactions, especially in East Africa. These organizations should also work to compile comprehensive, human-curated datasets containing suspicious transactions that may be shared with law enforcement when required. The Financial Action Task Force (FATF) has released a <a href="https://www.fatf-gafi.org/en/publications/Methodsandtrends/crowdfunding-for-terrorism-financing.html">comprehensive guide</a> to countering terrorist crowdfunding campaigns, noting these groups&#8217; propensity for using cryptocurrencies with enhanced privacy features such as Tether and Monero. Last year, the Japanese National Police Agency&#8217;s Special Cyber Investigations Division <a href="https://news.bitcoin.com/monero-decrypted-japanese-police-report-breakthrough-in-flow-analysis-development/">arrested</a> an individual suspected of conducting money laundering activities using Monero. Although the agency has not commented on their exact methods, they did indicate that they used the suspect&#8217;s records from communication apps, credit card transactions, and suspected Monero transactions. This landmark case may prove an invaluable blueprint for global law enforcement agencies and technology companies to compile as much data on suspicious transactions as possible to share with these potential investigations.</p><p>In the long term, service providers such as e-commerce platforms and blockchain companies should explore ways to improve the verification of supply chains associated with goods used to finance terrorism, such as charcoal. Current estimates place the value of the global <a href="https://www.skyquestt.com/report/charcoal-market#:~:text=Charcoal%20Market%20Insights,period%20(2025%2D2032).">charcoal market</a> at just over $8 billion USD, making Somalia&#8217;s illicit and environmentally unsustainable exports a <a href="https://oec.world/en/profile/bilateral-product/wood-charcoal/reporter/som">small fraction</a> of this total, and thus difficult to track internationally. Given al-Shabaab and its partners&#8217; talent for obfuscating the true origin of their goods, cutting off funding to this deadly terror group demands a more technical approach. Blockchain verification systems could be an important step in the right direction as they offer a tamper-proof, efficient, and transparent means to verify the legitimacy of exports and imports at each journey step.</p><p>For example, a legal and compliant Indonesia-based charcoal supplier would upload a public, secure stamp verifying the legal shipment of goods from their facility to the nearby port of Tanjung Parek in Surabaya. Agents at both this port and its destination port in Jeddah, Saudi Arabia, would also upload their own secure stamps, as would the buyer upon delivery, with each individual contributing to a record of the product&#8217;s legal supply chain in the form of a publicly accessible digital ledger. Any individual or group seeking to commit fraud by selling illegally sourced goods through legitimate channels would do so publicly and transparently, greatly heightening their personal risk for doing so. In this way, e-commerce retailers and their compliance teams could rest assured of the near-zero risk that the goods sold on their platforms finance terrorist groups like al-Shabaab. By investing in such products, companies may also come ahead of future compliance requirements regarding counter-terrorist financing related to goods sold on their platforms.</p><p>Finally, hawala systems present the single largest frontier in counter-terrorist financing. Countering terrorist activity through these networks requires financial institutions and transfer apps to keep close tabs on suspicious activity that may be timed with illicit hawala transfers, as many hawaladar (hawala transfer agents) use legitimate means to <a href="https://www.investopedia.com/terms/h/hawala.asp">settle their accounts</a>. In the longer term, offering low-cost and accessible solutions to the world&#8217;s vast unbanked population of some <a href="https://www.weforum.org/stories/2024/07/why-financial-inclusion-is-the-key-to-a-thriving-digital-economy/#:~:text=The%20World%20Bank%20estimates%20that,in%20the%20global%20financial%20landscape.">1.4 billion people</a> is the best way to add transparency and accountability to this vast, unregulated, informal global remittance system. Many companies and governments across Africa have invested in such products, and global technology companies should consider further investing in new ways to enhance access for the globally unbanked. With hawala currently accounting for as much as <a href="https://www.researchgate.net/figure/nformation-flow-and-individual-transactions-in-hawala-banking_fig1_241412537">$300 billion</a> in transfers annually, there is a clear profit incentive to offering more accessible and lower-cost options than this vulnerable population can access through their local hawaladar. By limiting the flow of legitimate money through Hawala networks, providing services to the global unbanked population ultimately limits the cover provided to bad actors such as criminals and terrorist groups, who also use Hawala to finance their activities.</p><h1>Conclusion </h1><p>Al-Shabaab&#8217;s survival depends not only on ideology and violence, but on its ability to maintain and adapt its shadow liquidity networks. For a deeper exploration of these hidden financial infrastructures and their strategic implications globally, see my <a href="https://www.btl-research.com/p/what-is-shadow-liquidity">Shadow Liquidity Doctrine</a>.</p>]]></content:encoded></item><item><title><![CDATA[Liquidity Is Sovereignty: The Hidden Infrastructure of Global Power]]></title><description><![CDATA[The Strategic Infrastructure Behind Global Conflict. A concept I've been developing for some time.]]></description><link>https://www.btl-research.com/p/what-is-shadow-liquidity</link><guid isPermaLink="false">https://www.btl-research.com/p/what-is-shadow-liquidity</guid><dc:creator><![CDATA[Adam Rousselle]]></dc:creator><pubDate>Thu, 03 Jul 2025 14:49:46 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!0O_o!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1e34e8c-14bf-4bdd-b70d-0998e6aeb6da_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!0O_o!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1e34e8c-14bf-4bdd-b70d-0998e6aeb6da_1536x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!0O_o!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1e34e8c-14bf-4bdd-b70d-0998e6aeb6da_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!0O_o!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1e34e8c-14bf-4bdd-b70d-0998e6aeb6da_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!0O_o!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1e34e8c-14bf-4bdd-b70d-0998e6aeb6da_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!0O_o!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1e34e8c-14bf-4bdd-b70d-0998e6aeb6da_1536x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!0O_o!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1e34e8c-14bf-4bdd-b70d-0998e6aeb6da_1536x1024.png" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d1e34e8c-14bf-4bdd-b70d-0998e6aeb6da_1536x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!0O_o!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1e34e8c-14bf-4bdd-b70d-0998e6aeb6da_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!0O_o!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1e34e8c-14bf-4bdd-b70d-0998e6aeb6da_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!0O_o!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1e34e8c-14bf-4bdd-b70d-0998e6aeb6da_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!0O_o!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1e34e8c-14bf-4bdd-b70d-0998e6aeb6da_1536x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3><strong>Between the Lines Research &#8211; Strategic Note, July 2025</strong></h3><h3><strong>Personal Note</strong></h3><p>This work is the product of years spent tracing the financial systems that sustain both state and non-state actors. It is not a polemic, but a strategic framework designed to support policymakers, practitioners, and financial system stakeholders. The goal is to illuminate how liquidity flows &#8212; especially those operating beyond formal oversight &#8212; shape modern conflict, resilience, and global risk.</p><h3><strong>Introduction: Why Liquidity Matters</strong></h3><p>Geopolitical and security analyses often focus on ideology, battlefield tactics, or formal alliances. But beneath these surface-level factors lies a deeper infrastructure: <strong>shadow liquidity</strong> &#8212; the unregulated or hybridized capital flows that underwrite the operational capacity of both governments and armed non-state actors.</p><p>Understanding this hidden architecture is critical to designing effective counter-threat finance (CFT) and anti-money laundering (AML) strategies. It also reframes <strong>sovereignty</strong> not just as legal authority, but as the capacity to generate, direct, and protect liquidity.</p><h3><strong>Defining the Concept: What Is Shadow Liquidity?</strong></h3><p><strong>Shadow liquidity</strong> refers to the movement of value through informal, opaque, or hybrid channels outside regulatory visibility. This includes:</p><ul><li><p>Non-transparent conduits (e.g., hawala systems, OTC brokers, dual-use trade logistics)</p></li><li><p>Privacy-enhancing crypto rails and decentralized exchanges</p></li><li><p>Illicit resource-to-cash pipelines (e.g., gold, timber, synthetic drugs)</p></li><li><p>Informal remittance streams embedded in conflict economies</p></li></ul><p>These flows are often structured to resist attribution, formal tracing, or enforcement &#8212; making them highly adaptive and strategically valuable.</p><p></p><h3><strong>Liquidity as Strategic Capacity</strong></h3><p>Liquidity is not merely a financial concern; it is a source of power. It enables:</p><ul><li><p>Insurgents and hybrid actors to survive loss of territory or leadership</p></li><li><p>Sanctioned states to sustain procurement, proxy support, and domestic control</p></li><li><p>Transnational networks to expand influence without conventional military tools</p></li></ul><p>In fragile, sanctioned, or contested environments, control over liquidity is what allows actors to endure. It is a form of sovereignty unto itself.</p><p></p><h3><strong>Historical Context: Sovereignty and Value Control</strong></h3><p>Across history, power and legitimacy have followed control over capital:</p><ul><li><p>The American Founders&#8217; revolutionary authority was underwritten not only by ideology, but by their personal assets, shipping networks, and trans-Atlantic credit lines.</p></li><li><p>Imperial collapses &#8212; from the Western Roman Empire to late Ming and Qing China &#8212; were preceded by liquidity fragmentation long before formal dissolution.</p></li></ul><p>Modern threat actors replicate these patterns: embedding in high-value ecosystems, exploiting loopholes in digital finance, and building sovereign-like liquidity systems that bypass formal governance.</p><div><hr></div><h3><strong>Policy Relevance: Why Institutions Should Care</strong></h3><p>This framework has direct implications for financial security, compliance, and multilateral coordination:</p><ul><li><p><strong>FIUs and CFT teams</strong> must look beyond direct actors to the liquidity infrastructures that enable threat persistence.</p></li><li><p><strong>Sanctions architects</strong> must trace how shadow liquidity routes evolve around enforcement barriers.</p></li><li><p><strong>Multilateral bodies</strong> may benefit from integrating this lens into typology-building and technical assistance.</p></li><li><p><strong>Technology platforms and financial firms</strong> play a frontline role in identifying and disrupting emergent liquidity corridors.</p></li></ul><div><hr></div><h3><strong>Who This Serves</strong></h3><p>This framework is intended for:</p><ul><li><p>Financial intelligence units and national risk teams</p></li><li><p>Investigative and judicial bodies working on threat finance</p></li><li><p>Regulatory technology and compliance firms</p></li><li><p>Multilateral analysts engaging fragile or high-risk jurisdictions</p></li></ul><div><hr></div><h3><strong>Accessing the Full Framework</strong></h3><p>This note introduces the &#8220;Liquidity as Sovereignty&#8221; doctrine and outlines the <strong>Shadow Liquidity Framework</strong>, developed by Between the Lines Research (BTL). The complete version &#8212; including case studies (ISKP, Hezbollah, Houthis, JNIM), typology matrices, and operational indicators &#8212; is available upon request.</p><p><strong>For secure access, institutional briefings, or research collaboration:</strong></p><p><strong>info@btl-research.com </strong></p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;e23dbb5a-e251-4759-8e8f-e5d0dfeb48dd&quot;,&quot;caption&quot;:&quot;Personal Statement&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;lg&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;The Shadow Liquidity Doctrine: How Shadow Liquidity and Illicit Liquidity Shape Modern Conflict&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:51046878,&quot;name&quot;:&quot;Adam Rousselle&quot;,&quot;bio&quot;:&quot;Editor-in-Chief and Principal Analyst at Between the Lines Research. Contributor at GNET, Nikkei Asia, The Diplomat, The Jamestown Foundation, and more. &quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/63c08aa3-3b25-4ef2-9653-620da15140c9_1024x1024.png&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2025-07-03T14:24:11.229Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!0O_o!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1e34e8c-14bf-4bdd-b70d-0998e6aeb6da_1536x1024.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.btl-research.com/p/the-shadow-liquidity-doctrine-how&quot;,&quot;section_name&quot;:&quot;Inner Circle Briefings&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:167437408,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:0,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Between the Lines&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!-B99!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb2b8d0f-7f85-4d51-aa5d-160c09a2114e_605x605.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div><hr></div><h3><strong>Stay ahead</strong></h3><p>Subscribe or join my Inner Circle for updates, exclusive analyses, and private briefings on shadow liquidity, threat finance, and global strategic risk.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.btl-research.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.btl-research.com/subscribe?"><span>Subscribe now</span></a></p><p><strong> Share and cite</strong></p><p>You are welcome to share or cite this summary with attribution. For full doctrine use or excerpts, please request permission.</p><p>-Adam Rousselle, Founder and Chief Analyst, Between the Lines Research</p><p><em>All frameworks and original conceptual language herein are protected as intellectual property under applicable law. Any unauthorized use without attribution is expressly prohibited</em></p><p></p>]]></content:encoded></item><item><title><![CDATA[Crypto, Conflict, and Sanctions: Inside the Financial Networks Powering Modern Warfare]]></title><description><![CDATA[How Tehran&#8217;s digital money networks&#8212;mirrored by Russia, China, and North Korea&#8212;are quietly outpacing the systems meant to contain them.]]></description><link>https://www.btl-research.com/p/crypto-conflict-and-sanctions-inside</link><guid isPermaLink="false">https://www.btl-research.com/p/crypto-conflict-and-sanctions-inside</guid><dc:creator><![CDATA[Adam Rousselle]]></dc:creator><pubDate>Tue, 17 Jun 2025 16:11:56 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Yruk!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe82374a2-f9d1-4069-9993-edabd1e60af5_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Yruk!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe82374a2-f9d1-4069-9993-edabd1e60af5_1536x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Yruk!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe82374a2-f9d1-4069-9993-edabd1e60af5_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!Yruk!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe82374a2-f9d1-4069-9993-edabd1e60af5_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!Yruk!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe82374a2-f9d1-4069-9993-edabd1e60af5_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!Yruk!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe82374a2-f9d1-4069-9993-edabd1e60af5_1536x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Yruk!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe82374a2-f9d1-4069-9993-edabd1e60af5_1536x1024.png" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e82374a2-f9d1-4069-9993-edabd1e60af5_1536x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2691705,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.btl-research.com/i/166163189?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe82374a2-f9d1-4069-9993-edabd1e60af5_1536x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Yruk!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe82374a2-f9d1-4069-9993-edabd1e60af5_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!Yruk!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe82374a2-f9d1-4069-9993-edabd1e60af5_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!Yruk!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe82374a2-f9d1-4069-9993-edabd1e60af5_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!Yruk!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe82374a2-f9d1-4069-9993-edabd1e60af5_1536x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The headlines called it retaliation. Some analysts labeled it symbolic. But as we explored <a href="https://www.btl-research.com/p/irans-strike-on-israel-was-no-bluff">on Friday</a>, Iran&#8217;s massive missile and drone barrage wasn&#8217;t about face-saving&#8212;it was a live demonstration of capability. A stress test. A rehearsal.</p><p>But there&#8217;s a second battlefield brewing&#8212;quieter, more resilient, and arguably more enduring&#8212;unfolding in parallel to the visible barrage. One that most coverage ignores.</p><p>Beneath the missiles lies a deeper infrastructure: a financial ecosystem engineered to survive sanctions, bypass traditional systems, and fuel conflict beyond the reach of the global financial system. Crypto wallets, OTC brokers, and informal financial nodes&#8212;stretching from <a href="https://www.kharon.com/brief/iran-russia-venezuela-oil-sanctions-shipping">Qom to Caracas</a>, from <a href="https://home.treasury.gov/news/press-releases/jy2627">Sana&#8217;a to Hong Kong</a>&#8212;<strong> </strong>make up a vast and largely invisible financial infrastructure powering Iran&#8217;s asymmetric war machine. This is asymmetric finance.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.btl-research.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Between the Lines is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>What began as a workaround to Western sanctions has now hardened into a core pillar of Iran&#8217;s regional strategy. In the hours and days after the attack, crypto markets reacted&#8212;not in ways that definitively point to illicit proxy activity &#8211; but interestingly nonetheless. Bitcoin and other major <a href="https://www.coindesk.com/markets/2025/06/12/btc-trading-under-104k-as-israel-appears-to-strike-iran">tokens dipped</a>, reflecting broader geopolitical uncertainty and a flight from risk. In the days to come, we are likely to see reports from leading blockchain analytics firms on illicit flows associated with Iran and its proxies. These networks have long relied on informal financial rails, including stablecoin brokers and weak-KYC exchanges, to quietly route funds through jurisdictions like Lebanon, the Gulf, Venezuela, and Southeast Asia. The extent to which this system will be mobilized remains unknown&#8212;but past <a href="https://www.chainalysis.com/blog/crypto-crime-sanctions-2025/?utm_source=chatgpt.com">escalations suggest</a> these financial rails become activated in parallel with military operations.</p><p>To understand this conflict today, and where it&#8217;s going tomorrow, we must look not just at what exploded&#8212;but what moved, where, and how much. The story isn&#8217;t just about rockets, drones, and ballistics. It&#8217;s about rails&#8212;financial rails&#8212;that enable the machine behind them.</p><p>Iran has built a system designed for asymmetric conflict across multiple domains. The military strikes dominate headlines, but they&#8217;re only part of the picture. Behind them is a parallel system designed to quietly sustain escalation&#8212;a financial infrastructure built to move money, fund proxies, and resist sanctions without triggering collapse.</p><h1><strong>Why This Matters to Threat Finance</strong></h1><p>Every war casts a financial shadow. Behind every drone strike is a supply chain. Behind every military advance, a funding channel. And in Iran&#8217;s case, those channels are increasingly built on a patchwork of informal networks: <a href="https://www.dw.com/en/are-houthis-blackmailing-shipping-companies-for-millions/a-70766332">hawala</a> dealers, OTC crypto brokers, and stablecoin rails straddling two hemispheres.</p><p>These systems&#8212;designed to evade formal banking channels and U.S. sanctions&#8212;don&#8217;t just enable the fight. They shape it. Iran&#8217;s ability to project power without triggering catastrophic retaliation depends in part on its ability to quietly move funds, mask logistics, and keep its <a href="https://jamestown.org/program/hezbollah-took-advantage-of-crisis-in-lebanon-to-build-gold-reserve-popularity-in-preparation-for-war-with-israel/">proxies liquid</a>. As Western scrutiny tightens on traditional sanctions-evasion tools, crypto has increasingly filled the gap. <a href="https://www.btl-research.com/p/building-blocks-tethers-role-in-the">Tether</a> (USDT), in particular, has become a favored instrument for laundering value between jurisdictions, with minimal friction and high anonymity. </p><p>The same digital rails that move funds for everyday transactions are now the arteries of asymmetric warfare, sustaining networks that would otherwise go dry under traditional scrutiny. For threat finance, this means the front line has shifted: identifying wallet activity, tracing OTC intermediaries, and mapping stablecoin liquidity are no longer technical exercises&#8212;they are essential to preempting escalation, disrupting proxy logistics, and safeguarding the integrity of the global financial system.</p><h2>Strategic Continuity Through Financial Asymmetry</h2><p>A remarkable aspect of this escalation apart isn&#8217;t just what Iran launched&#8212;but how it manages to stay funded while doing it. Beneath the drones and ballistic headlines is a quieter story: Iran&#8217;s financial system has adapted to conflict. Not by bracing for impact&#8212;but by flowing around it.</p><p>Over the past year&#8212;and particularly since early 2024&#8212;Tehran has actively deepened its already robust resilience against sanctions. These efforts include signing a bilateral monetary contract with <a href="https://www.tehrantimes.com/news/508437/Four-reasons-predicting-jump-in-Iran-Russia-trade-in-2025?utm_source=chatgpt.com">Russia</a> to enable rial&#8211;ruble trade and linking their payment systems, pushing forward <a href="https://www.intellinews.com/brics-nations-push-to-expand-trade-in-local-currencies-369212/?utm_source=chatgpt.com">BRICS-wide</a> local-currency trade initiatives, and building <a href="https://freedomhouse.org/sites/default/files/2024-06/Policy%20Brief%20-%20Iran%20%286-26%29%20V4%20GW.pdf?utm_source=chatgpt.com">SWIFT-alternative</a> transfer systems through regional platforms like the Asian Clearing Union. Commodity sales, particularly oil, help fuel this cashflow and proxies like the Houthis play a central role in the <a href="https://home.treasury.gov/news/press-releases/jy2758">shadow fleets</a> and laundering logistics that make it all possible.</p><p>Simultaneously, Iran has steadily expanded its domestic crypto infrastructure&#8212;not just as a pressure valve for ordinary citizens, but as a <a href="https://www.trmlabs.com/resources/blog/new-drones-old-tactics-how-iran-uses-crypto-to-fund-conflict-and-evade-sanctions?utm_source=chatgpt.com">strategic workaround</a> of sanctions. Nobitex, the country&#8217;s <a href="https://www.trmlabs.com/resources/blog/nobidex-is-first-decentralized-exchange-built-and-launched-in-iran">largest exchange</a>, continues to facilitate significant volumes of crypto-to-rial conversions, often routed through high-risk wallets or offshore OTC channels. In parallel, Iranian authorities have pursued a central bank digital currency <a href="https://cointelegraph.com/news/iran-digital-rial-cbdc-launch">(CBDC) pilot</a> program, signaling their interest in developing state-aligned digital payment systems outside U.S.-controlled rails.</p><p>Iranian proxy networks&#8212;including the <a href="https://gnet-research.org/2025/05/14/cash-flow-breaking-down-the-houthis-multibillion-dollar-financial-networks/">Houthis</a> and <a href="https://www.chainalysis.com/blog/israel-nbctf-hezbollah-iran-quds-crypto-seizure/">Hezbollah</a>&#8212;have also increasingly relied on stablecoins such as Tether (USDT) and relatively anonymous over-the-counter (OTC) brokers to move funds discreetly, circumvent compliance barriers, and sustain operational liquidity. The effect is not macroeconomic stabilization but the creation of flexible, deniable financial corridors that extend Tehran&#8217;s reach in conflict zones while insulating its core institutions from direct exposure.</p><p>In short: airstrike exchanges are one front. Money movements are another.</p><h2>The New Architecture of Modern Conflict</h2><p>Iran&#8217;s shadow financial infrastructure is not a temporary workaround. It is part of the broader emergence of global shadow financial architecture&#8212;created by states currently or increasingly outside the established international order such as Iran, but also Russia, China, and North Korea. It is a constellation of tolerated proxies and cutouts. Some analysts refer to these countries as forming a so-called &#8216;axis of authoritarianism&#8217; &#8211; but when it comes to threat finance, that framing misses the point. These financial ties are not based on mutual ideology, but method. They form a shared playbook of sanctions resistance, obfuscation, and liquidity in a growing global gray space.</p><p>Iran isn&#8217;t improvising. Nor is Russia, with its ruble-backed <a href="https://cointelegraph.com/news/russian-ruble-stablecoin-exec-names-7-usdt-replica-features">crypto experiments</a> and <a href="https://www.wsj.com/finance/regulation/while-senate-considers-genius-act-russian-is-charged-with-stablecoin-laundering-da507c74">stablecoin laundering</a> through the UAE and elsewhere. Nor is China, which shelters capital in <a href="https://www.btl-research.com/p/chinas-gray-zone-syndicates-part">offshore shadows</a> while tolerating OTC networks that quietly enable adversaries. North Korea with its navy-based <a href="https://www.cbc.ca/news/world/north-korea-criminal-empire-drugs-trafficking-1.4435265">narcotics rings</a> and criminal hacker groups like the <a href="https://www.nccgroup.com/us/the-lazarus-group-north-korean-scourge-for-plus10-years/">Lazarus Group</a> were early adopters of this game.</p><p>Each escalation&#8212;military or political&#8212;is now mirrored by a quieter campaign: proxy wallets, OTC brokers, and stablecoins routed through permissive zones. Financial adaptation has become a core function of conflict, not an afterthought.</p><p>The systems meant to detect and disrupt these shadow networks&#8212;compliance regimes, sanctions enforcement, blockchain forensics&#8212;are still fighting to keep up. New designations from the U.S. Treasury&#8217;s Office of Foreign Assets Control (OFAC) arrive with growing regularity, but often only after the fact. One distinct advantage in this new terrain is transparency by design: every cryptocurrency transaction exists on a ledger. But visibility alone isn&#8217;t enough. Without the right tools&#8212;and without timely coordination&#8212;these records remain inert, meaningful only in hindsight.</p><p>Tracking and mapping these systems requires multidisciplinary expertise&#8212;not just blockchain analytics, but a deep understanding of the actors behind the flows and the geopolitical currents that guide them. As the conflict in the Middle East intensifies, and as state and proxy actors grow more fluent in exploiting financial gray zones, the cost of analytical blind spots will rise&#8212;not just on the battlefield, but across global markets. The battlefield is expanding&#8212;and so are the rails that sustain it. Research like this doesn&#8217;t just explain the fire&#8212;it might be the thing that removes the oxygen before it spreads.</p><p><em>For custom briefings on the financial networks behind today&#8217;s conflicts, get in touch today: <a href="mailto:info@btl-research.com">info@btl-research.com</a></em></p>]]></content:encoded></item><item><title><![CDATA[China’s Gray Zone Syndicates – Part III: Blowback and Breakdown]]></title><description><![CDATA[How China&#8217;s Shadow Architecture Turned Against It and the World&#8212;and What Comes Next]]></description><link>https://www.btl-research.com/p/chinas-gray-zone-syndicates-part-36e</link><guid isPermaLink="false">https://www.btl-research.com/p/chinas-gray-zone-syndicates-part-36e</guid><dc:creator><![CDATA[Adam Rousselle]]></dc:creator><pubDate>Thu, 12 Jun 2025 17:37:18 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!iVvd!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe69aada6-63c9-4452-b621-250e5d3fe4fa_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!iVvd!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe69aada6-63c9-4452-b621-250e5d3fe4fa_1536x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!iVvd!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe69aada6-63c9-4452-b621-250e5d3fe4fa_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!iVvd!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe69aada6-63c9-4452-b621-250e5d3fe4fa_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!iVvd!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe69aada6-63c9-4452-b621-250e5d3fe4fa_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!iVvd!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe69aada6-63c9-4452-b621-250e5d3fe4fa_1536x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!iVvd!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe69aada6-63c9-4452-b621-250e5d3fe4fa_1536x1024.png" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e69aada6-63c9-4452-b621-250e5d3fe4fa_1536x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:3275478,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.btl-research.com/i/165802037?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe69aada6-63c9-4452-b621-250e5d3fe4fa_1536x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!iVvd!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe69aada6-63c9-4452-b621-250e5d3fe4fa_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!iVvd!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe69aada6-63c9-4452-b621-250e5d3fe4fa_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!iVvd!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe69aada6-63c9-4452-b621-250e5d3fe4fa_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!iVvd!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe69aada6-63c9-4452-b621-250e5d3fe4fa_1536x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>In the first two parts of this series, we examined how Beijing has strategically blurred the lines between crime, finance, and statecraft.</p><ul><li><p><strong>Part I</strong> explored how transnational criminal networks&#8212;scam syndicates, money laundering fronts, and trafficking hubs&#8212;offered China a deniable infrastructure for advancing influence across Southeast Asia and beyond.</p></li><li><p><strong>Part II</strong> explored how informal financial channels&#8212;ranging from offshore dollar reserves and state-tied shell companies to elite capital flight&#8212;became embedded in China&#8217;s strategy for resilience, evasion, and quiet geopolitical reach.</p></li></ul><p>But the system has started to turn on its architects.</p><p>What began as a tool of resilience has become a vector of global risk. China&#8217;s shadow reserves, gray banking operations, and offshore laundering proxies&#8212;once seen as clever circumventions of Western sanctions&#8212;are now leaking influence, bleeding capital, and empowering actors Beijing can&#8217;t fully control. In some cases, these networks pose greater strategic and reputational threats than the constraints they were built to avoid.</p><p>Think the Chernobyl disaster&#8212;but global. A radioactive core leaking financial and geopolitical fallout across everything it touches, until someone builds a concrete dome over the whole thing. That dome may be coming&#8212;but the damage is already done, and the fallout will linger for years.</p><p>This third and final installment unpacks how the very mechanisms China built to escape constraint may now be generating volatility, corruption, and strategic backlash at a scale even Beijing can&#8217;t contain.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.btl-research.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Between the Lines is a reader-supported publication. To receive new posts and support my work, become a paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p><strong>The Internal Fracture: Power Diffusion at Home</strong></p><p>When Beijing implemented the <a href="https://thedispatch.com/article/chinas-crackdowns-belie-fears-within-the-regime/">Three Red Lines</a> policy in 2020 to curb reckless real estate borrowing, it triggered a cascade far beyond the housing sector. As liquidity dried up, elite families and state-linked firms sought refuge&#8212;not in domestic reforms, but in the <em>exit ramps</em> of offshore finance. A surge of capital flight followed, channeled through underground banks, crypto rails, and shell networks tied to party patrons abroad.</p><p>But this wasn&#8217;t a system constructed from scratch&#8212;it was already primed for abuse.</p><p>For years, state-owned banks had been quietly stockpiling <a href="https://www.btl-research.com/p/chinas-gray-zone-syndicates-part-fa6">offshore dollar reserves</a>, tucked away in opaque accounts and affiliated investment vehicles. These reserves, originally meant as a financial shock absorber against Western pressure, became a deep pool of shadow liquidity&#8212;ready to be tapped, siphoned, or strategically rerouted with minimal oversight.</p><p>What began as a strategy for resilience&#8212;steering capital into the shadows to protect it from volatility&#8212;has become a mechanism for fragmentation.</p>
      <p>
          <a href="https://www.btl-research.com/p/chinas-gray-zone-syndicates-part-36e">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[China’s Gray Zone Syndicates – Part II How China’s Hidden Dollar Reserves Fueled a Global Shadow Economy]]></title><description><![CDATA[What happens when a superpower builds a shadow financial system&#8212;and loses control of it?]]></description><link>https://www.btl-research.com/p/chinas-gray-zone-syndicates-part-fa6</link><guid isPermaLink="false">https://www.btl-research.com/p/chinas-gray-zone-syndicates-part-fa6</guid><dc:creator><![CDATA[Adam Rousselle]]></dc:creator><pubDate>Sun, 08 Jun 2025 14:40:42 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!-N4F!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ecef499-9f5a-4402-9681-4f2651350479_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!-N4F!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ecef499-9f5a-4402-9681-4f2651350479_1536x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!-N4F!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ecef499-9f5a-4402-9681-4f2651350479_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!-N4F!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ecef499-9f5a-4402-9681-4f2651350479_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!-N4F!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ecef499-9f5a-4402-9681-4f2651350479_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!-N4F!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ecef499-9f5a-4402-9681-4f2651350479_1536x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!-N4F!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ecef499-9f5a-4402-9681-4f2651350479_1536x1024.png" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5ecef499-9f5a-4402-9681-4f2651350479_1536x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:3205737,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.btl-research.com/i/165470220?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ecef499-9f5a-4402-9681-4f2651350479_1536x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!-N4F!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ecef499-9f5a-4402-9681-4f2651350479_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!-N4F!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ecef499-9f5a-4402-9681-4f2651350479_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!-N4F!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ecef499-9f5a-4402-9681-4f2651350479_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!-N4F!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ecef499-9f5a-4402-9681-4f2651350479_1536x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>In the 2010s, China began quietly shifting hundreds of billions of dollars in U.S. reserves into hidden accounts controlled by state banks, offshore entities, and opaque investment arms. At the same time, elite capital flight surged, triggered by political crackdowns and economic uncertainty. Also during this time, we&#8217;ve seen the rise of a murky offshore empire of Chinese money now deeply embedded in illicit markets, scam zones, crypto laundromats, and corrupt logistics hubs across Southeast Asia and beyond. Coincidence? Probably not. What began as a strategy to evade sanctions and project financial resilience has instead helped fuel one of the largest gray financial ecosystems in modern history&#8212;blurring the line between statecraft, corruption, and organized crime.</p><p>This piece unpacks how it happened, why it matters, and what it means for the future of global power.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.btl-research.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Between the Lines is a reader-supported publication. To receive new posts and support my work, consider becoming a paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>
      <p>
          <a href="https://www.btl-research.com/p/chinas-gray-zone-syndicates-part-fa6">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[China’s Gray Zone Syndicates – Part I: Criminal Convergence and Strategic Ambiguity in the Global Shadow Economy]]></title><description><![CDATA[How Chinese-linked criminal networks blur the lines between state strategy and illicit finance&#8212;reshaping global power through deniable influence, shadow banking, and transnational crime.]]></description><link>https://www.btl-research.com/p/chinas-gray-zone-syndicates-part</link><guid isPermaLink="false">https://www.btl-research.com/p/chinas-gray-zone-syndicates-part</guid><dc:creator><![CDATA[Adam Rousselle]]></dc:creator><pubDate>Wed, 04 Jun 2025 09:01:50 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!28Dw!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F098c8503-8d77-4963-913a-937f460f3667_1024x1536.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!28Dw!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F098c8503-8d77-4963-913a-937f460f3667_1024x1536.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!28Dw!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F098c8503-8d77-4963-913a-937f460f3667_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!28Dw!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F098c8503-8d77-4963-913a-937f460f3667_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!28Dw!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F098c8503-8d77-4963-913a-937f460f3667_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!28Dw!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F098c8503-8d77-4963-913a-937f460f3667_1024x1536.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!28Dw!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F098c8503-8d77-4963-913a-937f460f3667_1024x1536.png" width="1024" height="1536" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/098c8503-8d77-4963-913a-937f460f3667_1024x1536.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1536,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2951341,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.btl-research.com/i/165148529?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F098c8503-8d77-4963-913a-937f460f3667_1024x1536.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!28Dw!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F098c8503-8d77-4963-913a-937f460f3667_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!28Dw!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F098c8503-8d77-4963-913a-937f460f3667_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!28Dw!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F098c8503-8d77-4963-913a-937f460f3667_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!28Dw!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F098c8503-8d77-4963-913a-937f460f3667_1024x1536.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>Yes, I asked ChatGPT to make me a GTA-themed cover image. </em></p><p>When most people think of China&#8217;s role in the global economy, they picture vast container ships, massive port infrastructure, and sprawling industrial zones. That&#8217;s accurate&#8212;but it&#8217;s not the whole story. Beneath the surface of legal trade flows exists a shadow economy: sprawling, loosely regulated, and increasingly strategic.</p><p>This is the realm of China&#8217;s <em>gray zone strategy</em>&#8212;the space between peace and conflict, legality and criminality. In this domain, <em>Chinese transnational crime networks</em> and illicit financial systems quietly advance Beijing&#8217;s geopolitical interests. These operations&#8212;ranging from <em>online gambling syndicates</em> to <em>crypto laundering rings</em>&#8212;often operate independently. Yet they frequently intersect with state-linked business interests or serve strategic ends, especially in Southeast Asia, Africa, and parts of the West.</p><p>This convergence of <em>organized crime, illicit finance,</em> and covert influence is no accident. It forms a <em>plausibly deniable architecture of power</em>&#8212;a parallel system that moves <a href="https://jamestown.org/program/mapping-chinas-small-arms-trade-chinas-illicit-domestic-gun-trade/">weapons</a>, <a href="https://www.europol.europa.eu/media-press/newsroom/news/30-arrested-in-crackdown-chinese-human-trafficking-ring-in-spain-and-croatia">people</a>, and <a href="https://www.wired.com/story/xinbi-guarantee-crypto-scam-hub/">digital assets</a> while supporting <em>China&#8217;s strategic ambitions</em> and shielding it from direct accountability. Understanding this shadow infrastructure is essential to grasping the future of <em>global competition and statecraft</em> in an era defined by blurred lines and contested rules. Although other countries have  credible accusations of  ties to criminal rings operating outside their borders, China&#8217;s are distinct in scale and integration with state interests, such as the Belt and Road Initiative (BRI). </p><p>Most of Chinese criminal syndicates operate independently. But when the moment is right, the Chinese state can and does lean on them&#8212;subtly or forcefully&#8212;to advance its goals without attribution, and often without consequence. To be clear: most of these actors are not agents directly working on behalf of Beijing (although some allegedly are), but that the system in which they operate creates space for strategic alignment and informal state benefit&#8212;a hallmark of gray zone dynamics.</p><p>What results is a decentralized, plausibly deniable financial architecture that enables Beijing&#8217;s global ambitions&#8212;not by command, but through complex relationships involving a mix of financial incentives and coercion.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.btl-research.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.btl-research.com/subscribe?"><span>Subscribe now</span></a></p><p><strong>Dual-Use Dynamics &#8211; Crime as Opportunity</strong></p><p>All Chinese-linked criminal networks operating globally exist for one primary reason: profit. From online <a href="https://www.pcmag.com/news/meet-the-criminals-behind-southeast-asias-lucrative-online-gambling-websites">gambling rings</a> in Southeast Asia to <a href="https://thediplomat.com/2024/11/chinese-demand-for-rosewood-empowers-some-of-africas-deadliest-terrorist-groups/">smuggling routes</a> in Africa and <a href="https://www.wsj.com/us-news/china-mexico-drug-money-laundering-banks-907f35f8">cartel money</a> laundering in the Americas, these groups are driven by self-interest and economic opportunity. But their operations increasingly generate strategic spillover for Beijing.</p><p>These ecosystems corrode institutions, overwhelm enforcement capacity, and destabilize fragile states. In Cambodia and Laos, Chinese-run <a href="https://www.crisisgroup.org/asia/south-east-asia/stepping-south-east-asias-most-conspicuous-criminal-enclave">casino compounds and scam centers</a> have fueled trafficking, corruption, and political capture&#8212;often embedded in <a href="https://jamestown.org/program/organized-crime-on-the-belt-and-road/">Belt and Road</a>-aligned infrastructure projects.  In some cases, these ventures are associated with <a href="https://www.internationalaffairs.org.au/australianoutlook/business-as-usual-chinese-organised-crime-in-southeast-asia/?utm_source=chatgpt.com">state-linked</a> businessmen, raising questions about their role as informal instruments of Chinese influence. Although other countries like Russia leverage their overseas crime syndicates to help meet state goals, China&#8217;s unique blend of gray finance, state-aligned enterprise, diplomatic cover, and the scale of its  investment stands out. </p><p>The digital dimension is just as consequential. These criminal networks rely heavily on over-the-counter (OTC) crypto brokers, stablecoins like Tether, and platforms like<strong> </strong><a href="https://www.elliptic.co/blog/huione-largest-ever-illicit-online-marketplace-stablecoin">Huione</a> to move billions outside the reach of global regulators. These tools enable real-time capital mobility, payment anonymity, and sanction-resistant value transfer. Crypto is not just a laundering mechanism&#8212;it&#8217;s a core pillar of a parallel financial infrastructure that serves both illicit actors and, at times, broader Chinese interests.</p><p>In parallel, these same networks extend China&#8217;s informal reach into <a href="https://www.propublica.org/article/sam-cooper-interview-china-canada-influence?utm_source=chatgpt.com">diaspora communities</a>. In Canada, Australia, and the U.S., loosely affiliated actors have engaged in surveillance, harassment, and coercion of dissidents, often in tandem with <a href="https://www.bbc.com/news/world-us-canada-66791749">Chinese consular</a> or <a href="https://www.securitepublique.gc.ca/cnt/trnsprnc/brfng-mtrls/prlmntry-bndrs/20200930/015/index-en.aspx">United Front</a>-linked operations. These networks also help generate untaxed capital, entrench Chinese business interests, and build parallel <a href="https://www.icij.org/investigations/offshore/leaked-records-reveal-offshore-holdings-of-chinas-elite/?utm_source=chatgpt.com">financial infrastructures</a> that operate well outside the purview of global regulators.</p><p>This is not a top-down operation. It&#8217;s a decentralized ecosystem&#8212;where illicit actors, shadow financiers, and state-linked intermediaries often find alignment. What emerges is a deniable architecture of power and profit&#8212;adaptable, resilient, and increasingly strategic.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!RXq6!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2cdcdfe4-b77b-48a0-a630-3b7869abf62d_1330x748.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!RXq6!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2cdcdfe4-b77b-48a0-a630-3b7869abf62d_1330x748.jpeg 424w, https://substackcdn.com/image/fetch/$s_!RXq6!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2cdcdfe4-b77b-48a0-a630-3b7869abf62d_1330x748.jpeg 848w, https://substackcdn.com/image/fetch/$s_!RXq6!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2cdcdfe4-b77b-48a0-a630-3b7869abf62d_1330x748.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!RXq6!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2cdcdfe4-b77b-48a0-a630-3b7869abf62d_1330x748.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!RXq6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2cdcdfe4-b77b-48a0-a630-3b7869abf62d_1330x748.jpeg" width="1330" height="748" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2cdcdfe4-b77b-48a0-a630-3b7869abf62d_1330x748.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:748,&quot;width&quot;:1330,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:809427,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.btl-research.com/i/165148529?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2cdcdfe4-b77b-48a0-a630-3b7869abf62d_1330x748.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!RXq6!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2cdcdfe4-b77b-48a0-a630-3b7869abf62d_1330x748.jpeg 424w, https://substackcdn.com/image/fetch/$s_!RXq6!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2cdcdfe4-b77b-48a0-a630-3b7869abf62d_1330x748.jpeg 848w, https://substackcdn.com/image/fetch/$s_!RXq6!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2cdcdfe4-b77b-48a0-a630-3b7869abf62d_1330x748.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!RXq6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2cdcdfe4-b77b-48a0-a630-3b7869abf62d_1330x748.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>US law enforcement recently sanctioned Cambodia-based Huione Pay in connection with terrorist financing and money laundering. The company&#8217;s primary focus was its regional Chinese criminal clientele. <a href="https://www.bankingriskandregulation.com/huione-group-the-blacklisted-shadow-bank-behind-the-cyber-crime-boom/">Image source</a></em></p><p><strong>Selective Enforcement &#8211; Rule of Law as a Dial, Not a Switch</strong></p><p>China&#8217;s approach to transnational crime is not uniformly applied&#8212;it&#8217;s strategic. Domestically, Beijing aggressively prosecutes crimes like online gambling, crypto fraud, and large-scale scamming, particularly when they risk domestic unrest or reputational fallout. Abroad, however, enforcement becomes far more selective. Crimes committed by Chinese nationals in foreign jurisdictions&#8212;especially in Southeast Asia&#8212;often draw inconsistent responses depending on the political and strategic context.</p><p>Cambodia offers a clear case in point. Chinese-run gambling and scam operations have flourished in cities like Sihanoukville, despite Beijing&#8217;s sweeping 2020 domestic ban on online gambling. While China has extradited hundreds of suspects from Cambodia&#8212;including a 2024 operation that saw over 680 nationals <a href="https://www.globaltimes.cn/page/202404/1310967.shtml">repatriated</a> for fraud and illegal gambling&#8212;it has shown remarkable tolerance for larger, well-connected networks. Notably, <a href="https://www.reuters.com/world/asia-pacific/gambling-tycoon-abused-thai-jail-after-saying-he-spied-china-lawyers-say-2025-01-24/">She Zhijiang</a>, a Chinese-born tycoon who built a regional gambling empire, operated for years despite being wanted by Chinese authorities <a href="https://www.nationthailand.com/news/general/40046012">since 2014</a>. A self-professed Chinese spy, his eventual arrest in Thailand came only after <a href="https://www.aljazeera.com/program/101-east/2024/9/26/she-zhijiang-discarded-chinese-spy-or-criminal-mastermind">allegations</a> that he had defied Chinese intelligence demands&#8212;suggesting political selectivity in enforcement.</p><p>This pattern reflects a deeper logic: crackdowns at home protect social stability, while tolerance abroad enables capital outflows, influence-building, and deniable engagement in unstable environments. Sometimes mass arrests are  politically expedient, especially when the criminals <a href="https://www.benarnews.org/english/commentaries/long-arm-09152023131346.html">target victims </a>in Mainland China of create diplomatic fallout abroad<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a>. By regularly seeking extraditions of <a href="https://www.chinadaily.com.cn/a/202404/13/WS661a1070a31082fc043c1c7a.html#:~:text=One%20hundred%20and%20thirty%20Chinese,China's%20Ministry%20of%20Public%20Security.">known criminals </a>and prosecuting them, the Chinese state state takes a very public stance against overseas crime. However, it apparently tolerates some individuals more than others&#8212;a strategic gray zone posture, not explicit policy. In this way, Chinese law enforcement functions less like a binary switch and more like a dial&#8212;tightened or relaxed depending on what serves China&#8217;s national interest.</p><p>Having lived in China for a significant portion of my adult life, I can say the dial metaphor applies just as well to the domestic context. Laws are not fixed boundaries; they are instruments, applied flexibly to manage dissent, control capital, and preserve state authority. Internationally, this same model has been quietly exported&#8212;not as a formal doctrine, but as a political habit. What emerges is a form of <a href="https://afe.easia.columbia.edu/main_pop/kpct/ct_china.htm#:~:text=Government%20in%20China%20was%20characterized%20by%20rule,the%20role%20of%20government%20in%20China%20today.">rule by man, not rule by law</a>&#8212;adapted to local environments, but unmistakably recognizable to anyone who has seen how the system works at home.</p><div><hr></div><p><em>Personal Note: After disembarking a flight from Sihanoukville, Cambodia to Xiamen, China, I witnessed dozens of my fellow passengers arrested in front of live news cameras at customs. Present were around a dozen uniformed officers&#8212;alongside one plainclothes agent wearing khakis, a golf shirt, windbreaker, sunglasses, and a badge hanging from his neck &#8211; think Horatio Caine from CSI Miami.</em></p><p><em>I didn&#8217;t stick around long, but I caught enough to recognize what was happening. As he cuffed a middle-aged man in a Gucci tracksuit dripping with heavy jewelry, the plainclothes officer mentioned &#8220;illegal gambling operations.&#8221; It was fast, public, and clearly orchestrated for the cameras. My friend and I were the only foreigners there &#8211; we exited quickly and tried to avoid rousing suspicions.</em></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!hGeY!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8a123413-32fe-4b60-8cd0-6ce6ec37367f_864x1296.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!hGeY!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8a123413-32fe-4b60-8cd0-6ce6ec37367f_864x1296.png 424w, https://substackcdn.com/image/fetch/$s_!hGeY!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8a123413-32fe-4b60-8cd0-6ce6ec37367f_864x1296.png 848w, https://substackcdn.com/image/fetch/$s_!hGeY!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8a123413-32fe-4b60-8cd0-6ce6ec37367f_864x1296.png 1272w, https://substackcdn.com/image/fetch/$s_!hGeY!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8a123413-32fe-4b60-8cd0-6ce6ec37367f_864x1296.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!hGeY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8a123413-32fe-4b60-8cd0-6ce6ec37367f_864x1296.png" width="864" height="1296" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8a123413-32fe-4b60-8cd0-6ce6ec37367f_864x1296.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1296,&quot;width&quot;:864,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2634441,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.btl-research.com/i/165148529?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8a123413-32fe-4b60-8cd0-6ce6ec37367f_864x1296.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!hGeY!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8a123413-32fe-4b60-8cd0-6ce6ec37367f_864x1296.png 424w, https://substackcdn.com/image/fetch/$s_!hGeY!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8a123413-32fe-4b60-8cd0-6ce6ec37367f_864x1296.png 848w, https://substackcdn.com/image/fetch/$s_!hGeY!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8a123413-32fe-4b60-8cd0-6ce6ec37367f_864x1296.png 1272w, https://substackcdn.com/image/fetch/$s_!hGeY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8a123413-32fe-4b60-8cd0-6ce6ec37367f_864x1296.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>A ChatGPT rendering the scene at Xiamen Gaoqi International as I remember it. </em></p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!83bY!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F715cf81b-fd1a-4be0-a6f3-a6ce30f22a9b_700x460.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!83bY!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F715cf81b-fd1a-4be0-a6f3-a6ce30f22a9b_700x460.jpeg 424w, https://substackcdn.com/image/fetch/$s_!83bY!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F715cf81b-fd1a-4be0-a6f3-a6ce30f22a9b_700x460.jpeg 848w, https://substackcdn.com/image/fetch/$s_!83bY!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F715cf81b-fd1a-4be0-a6f3-a6ce30f22a9b_700x460.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!83bY!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F715cf81b-fd1a-4be0-a6f3-a6ce30f22a9b_700x460.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!83bY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F715cf81b-fd1a-4be0-a6f3-a6ce30f22a9b_700x460.jpeg" width="700" height="460" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/715cf81b-fd1a-4be0-a6f3-a6ce30f22a9b_700x460.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:460,&quot;width&quot;:700,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:48391,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.btl-research.com/i/165148529?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F715cf81b-fd1a-4be0-a6f3-a6ce30f22a9b_700x460.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!83bY!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F715cf81b-fd1a-4be0-a6f3-a6ce30f22a9b_700x460.jpeg 424w, https://substackcdn.com/image/fetch/$s_!83bY!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F715cf81b-fd1a-4be0-a6f3-a6ce30f22a9b_700x460.jpeg 848w, https://substackcdn.com/image/fetch/$s_!83bY!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F715cf81b-fd1a-4be0-a6f3-a6ce30f22a9b_700x460.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!83bY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F715cf81b-fd1a-4be0-a6f3-a6ce30f22a9b_700x460.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>Chinese casinos like this one are a common sight in Sihanoukville, Cambodia these days. An idyllic beach resort once visited by Jackie Kennedy and other global jetsetters, the town has since descended into a gritty playground for China&#8217;s criminal underworld. <a href="https://english.cambodiadaily.com/news/some-90-per-cent-of-the-economy-in-sihanoukville-is-in-chinese-hands-150948/">Image source</a></em></p><p><strong>The Gray Zone Advantage &#8211; Influence Without Ownership</strong></p><p>In this context, the &#8220;gray zone&#8221; refers to the space between peace and open conflict&#8212;where states pursue strategic objectives through unofficial, unattributable, or legally ambiguous means. China has proven adept at operating in this space in a number of ways, most prominently through its <a href="https://www.btl-research.com/p/maritime-militias-how-paramilitary?utm_source=publication-search">maritime militias</a> &#8211; an unofficial naval force disguised as fishing vessels increasingly used to press China&#8217;s territorial claims in the South China Sea. China&#8217;s indirect engagement with transnational criminal networks is another form of gray zone tactic as these actors offer Beijing a toolkit for reshaping environments abroad &#8212;without the political costs of formal intervention. However, as we will see in the coming parts of this series, these tactics do not always work out in China&#8217;s best interest.</p><p>Criminal syndicates aligned with Chinese interests can quietly destabilize adversaries, erode governance, and undermine legal norms. Through illicit logistics routes, offshore gambling hubs, and informal banking networks, they create parallel corridors of capital and influence that operate beyond the reach of traditional regulatory regimes. These networks have become deeply embedded in weak and fragile states&#8212;from Cambodia to <a href="https://gnet-research.org/2024/11/25/from-trees-to-terror-jnims-use-of-online-rosewood-sales-to-fuel-expansion/">Mali</a>&#8212;where enforcement is limited, corruption is entrenched, and the allure of Chinese money often overrides accountability. The result isn&#8217;t just corruption&#8212;it&#8217;s a quiet erosion of sovereignty in regions where enforcement is weak, capital flows are opaque, and China&#8217;s informal proxies move faster than state regulators can track.</p><p>But the reach of these ecosystems doesn&#8217;t stop there. In Western societies, these criminal groups intersect with real estate markets, underground financial systems, and diaspora-linked political influence efforts. From Vancouver&#8217;s &#8220;<a href="https://www.nzz.ch/english/triad-money-laundering-is-fueling-canadas-fentanyl-nightmare-ld.1814726">snow washing</a>&#8221; phenomenon to United Front-linked surveillance in <a href="https://www.abc.net.au/news/2019-08-14/liberal-gladys-liu-linked-to-secretive-chinese-influence-network/11288210">Sydney</a> and <a href="https://www.theguardian.com/world/2022/nov/07/chinese-police-stations-toronto-canada">Toronto</a>, Chinese-aligned networks have quietly moved billions and shaped elite ecosystems&#8212;often under the radar of traditional law enforcement.</p><p>Across all settings, the strategic advantage is the same: plausible deniability. China benefits from the reach and flexibility of these actors&#8212;reaping access, leverage, and insulation&#8212;without incurring the costs of formal involvement. When scrutiny intensifies, officials can disavow any connection. But by then, the strategic value has often already been extracted: institutions have been strained, norms undermined, and influence embedded. The disorder serves a purpose&#8212;and attribution remains elusive by design.</p><p><strong>Looking Ahead &#8211; Setting the Stage for Parts II &amp; III</strong></p><p>This first part provided an overview on how China quietly benefits from transnational criminal ecosystems&#8212;not by directly commanding them, but by tolerating and, at times, subtly enabling them. These networks blur the boundaries between profit and policy, crime and strategy. But the story doesn&#8217;t end with deniable influence.</p><p><strong>Part II</strong> will examine how financial nodes like <strong>crypto brokers, shadow banking systems, and offshore economic enclaves</strong> have become vital components of China&#8217;s informal resilience architecture. In a future defined by <strong>economic decoupling and great-power conflict</strong>, these mechanisms may serve as critical lifelines&#8212;moving money, skirting enforcement, and keeping strategic initiatives afloat.</p><p><strong>Part III</strong> will explore how these same networks entrench China&#8217;s presence across <strong>Southeast Asia and the broader Global South</strong>, empowering its geopolitical reach through informal supply chains, regulatory arbitrage, and captured digital infrastructure in preparation for an uncertain future.</p><p>To understand tomorrow&#8217;s strategic competition, we need to understand the infrastructure no one officially owns&#8212;but that many quietly rely on.</p><div><hr></div><h3><strong>Enjoying this deep dive?</strong></h3><p><strong>Part I</strong> of <em>China&#8217;s Gray Zone Syndicates</em> is free to read &#8212; but <strong>Parts II and III</strong> will be available exclusively to <strong>paid subscribers</strong>.</p><p>If you value original, high-impact research on illicit finance, geopolitics, war, energy, and more, consider supporting this work by becoming a <strong>founding or paid subscriber</strong>.</p><p>&#128274; Unlock the full series &#8212; and future investigations &#8212; by subscribing now.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.btl-research.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.btl-research.com/subscribe?"><span>Subscribe now</span></a></p><p></p><p></p><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-1" href="#footnote-anchor-1" class="footnote-number" contenteditable="false" target="_self">1</a><div class="footnote-content"><p><strong> Case in Point: Scale and Pattern - </strong>In just the first half of 2024, Chinese authorities repatriated over <a href="https://www.reuters.com/world/asia-pacific/china-cambodia-effort-nets-240-chinese-suspects-anti-fraud-campaign-2024-11-28/">920 suspects</a> from Cambodia tied to online fraud and illegal gambling. UNODC reports show that scam compounds across Southeast Asia now employ tens of thousands&#8212;often trafficking victims&#8212;linked to Chinese criminal syndicates. U.S. Treasury sanctions against Huione Pay and related actors underscore <a href="https://home.treasury.gov/news/press-releases/jy2044">the scale</a>: billions in illicit crypto flows tied to human trafficking, terrorist financing, and fraud.</p><p></p></div></div>]]></content:encoded></item></channel></rss>