Skip to main content Accessibility help
×
Hostname: page-component-76fb5796d-vfjqv Total loading time: 0 Render date: 2024-04-26T20:44:09.972Z Has data issue: false hasContentIssue false

5 - The Business of Terrorism and Criminal Financing of Terrorism

Published online by Cambridge University Press:  05 August 2014

Louise I. Shelley
Affiliation:
George Mason University, Virginia
Get access

Summary

Osama bin Laden’s confiscated documents revealed that he was considering an increased use of kidnapping to generate money to fund his organization. With a decline in donor contributions amid efforts by Western powers to stop funds from ideological supporters reaching al-Qaeda, Bin Laden needed to generate more cash. As is increasingly common, he turned to traditional crime to fund terrorism – kidnapping. The reason that Osama favored this form of crime was not only its feasibility but its low risk and long-term use by terrorists as a funding source. Osama analyzed the success of al-Qaeda affiliates in North Africa (AQIM), Yemen (AQAP), and Iraq, who actively used kidnapping as a revenue generator. Some individual ransoms in North Africa have been as large as $2 million, and, since 2008, according to French experts, AQIM has gained $80 million through its kidnapping rackets. Government and multinational employees have sometimes been ransomed, but really significant profits were achieved by kidnapping individuals working for corporations, where the ransoms received were frequently greater. Kidnapping is now believed to be AQIM’s largest revenue source and enhances its ability to conduct operations.

It is hardly surprising that bin Laden reasoned like a businessman. His family owned one of the largest businesses of the Middle East. He grew up in a family of businesspeople, not a hereditary elite. His mother was the daughter of a Syrian trader.

Type
Chapter
Information
Dirty Entanglements
Corruption, Crime, and Terrorism
, pp. 173 - 217
Publisher: Cambridge University Press
Print publication year: 2014

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Laden, “Bin was about to branch out into the kidnapping business to boost cash reserves,” Mail Online, June 20, 2011
Nossiter, Adam, “Millions in Ransoms Fuel Militants’ Clout in West Africa,” New York Times, December 12, 2012
Nossiter, Adam, “For Mali’s New President, Corruption Issue Lingers,” New York Times, August 22, 2013
Burke, Jason, Al-Qaeda Casting a Shadow of Terror (London: I. B. Tauris, 2003), 43–45Google Scholar
Napoleoni, Loretta, “The Evolution of Terrorist Financing since 9/11: How the New Generation of Jihadists Fund Themselves,” in Terrornomics, ed. Costigan, Sean S. and Gold, David (Aldershot, UK: Ashgate, 2007), 13–24Google Scholar
Zelinsky, Aaron and Shubik, Martin, “Research Note: Terrorist Groups as Business Firms: A New Typological Framework,” Terrorism and Political Violence 21, no. 2 (2009): 327–36CrossRefGoogle Scholar
Zelinsky, and Shubik, and Krueger, Alan B., What Makes a Terrorist? Economics and the Roots of Terrorism, Lectures, Lionel Robbins (Princeton, NJ: Princeton University Press, 2007)Google Scholar
Brück, Tilman, ed., The Economic Analysis of Terrorism (London: Routledge, 2007)
Naylor, R. T., Satanic Purses: Money Myth and Misinformation in the War on Terror (Montreal, QC: McGill-Queen’s University Press, 2006)Google Scholar
Vittori, Jodi, Terrorist Financing and Resourcing (New York: Palgrave Macmillan, 2011)CrossRefGoogle Scholar
Gambetta, Diego, The Sicilian Mafia: The Business of Private Protection (Cambridge, MA: Harvard University Press, 1996)Google Scholar
Fiorentini, Gianluca and Peltzman, Sam, eds., The Economics of Organized Crime (Cambridge: Cambridge University Press, 1995)
Gunaratna, Rohan, Inside Al Qaeda: Global Network of Terror (New York: Columbia University Press), 62–67
Horgan, John and Taylor, Max, “Playing the ‘Green Card’: Financing the Provisional IRA: Part 1,” Terrorism and Political Violence 11, no. 2 (1999): 10CrossRefGoogle Scholar
Fondeo del terrorismo,” Infolaft 1, no. 4 (2009): 10–15
Rabasa, Angel, Chalk, Peter, Cragin, Kim, Daly, Sara A., Gregg, Heather S., Karasik, Theodore W., O’Brien, Kevin A., and Rosenau, William, Beyond al-Qaeda, Part I: The Global Jihadist Movement (Santa Monica, CA: RAND, 2006), 57–61Google Scholar
Strozier, Charles and Frank, James, The PKK: Financial Sources, Social and Political Dimensions (Saarbrücken, Germany: VDM, 2011)Google Scholar
Peters, Gretchen, Haqqani Network Financing: The Evolution of an Industry (West Point, NY: Combating Terrorism Center at West Point, July 2012)Google Scholar
Terörün Ekonomisi: Sınır Illerinde Kaçakçilik ve Terörün Finansmanı (Ankara: Police Academy, 2009)
O’Brien, McKenzie, “Fluctuations between Crime and Terror: The Case of Abu Sayyaf’s Kidnapping Activities,” Terrorism and Political Violence 24, no. 2 (2012): 320–36CrossRefGoogle Scholar
Wittig, Timothy points out in Understanding Terrorist Finance (Houndsmill, UK: Palgrave Macmillan, 2011), 75–78CrossRefGoogle Scholar
Sarkar, Sumita and Tiwari, Arvind, “Combating Organised Crime: A Case Study of Mumbai City,” Faultlines 12 (2002)Google Scholar
Treverton, Gregory F., Matthies, Carl, Cunningham, Karla J., Goulka, Jeremiah, Ridgeway, Greg, and Wong, Anny, Film Piracy, Organized Crime and Terrorism (Santa Monica, CA: RAND, 2009), 93–94Google Scholar
de Poot, C. J. and Sonnenschein, A., Jihadi Terrorism in the Netherlands (The Hague: WODC, 2011), 109–10Google Scholar
Saviano, Roberto, Gomorrah, trans. from the Italian by Jewiss, Virginia (New York: Farrar, Straus, and Giroux), 2007, 181–86Google Scholar
Pieth, Mark, ed., Financing of Terrorism (Dordrecht, Netherlands: Kluwer Academic, 2003)CrossRef
Passas, Nikos, “Terrorism Financing Mechanisms and Policy Dilemmas,” in Terrorism Finance and State Responses: A Comparative Perspective, ed. Giraldo, Jeanne and Trinkunas, Harold (Stanford, CA: Stanford University Press, 2007), 30Google Scholar
Dietz, Rebekah K., “Illicit Networks: Targeting the Nexus between Terrorists, Proliferators and Narcotraffickers,” (Monterey, CA: U.S. Naval Post Graduate School, 2010)Google Scholar
IISS Nuclear Black Market Dossier: A Net Assessment (London, 2007), 43–64
Capie, David, “Trading the Tools of Terror: Armed Groups and Light Weapons Proliferation in Southeast Asia,” in Terrorism and Violence in Southeast Asia: Transnational Challenges to States and Regional Stability, ed. Smith, Paul J. (Armonk, NY: M. E. Sharpe, 2005), 191Google Scholar
Farah, Douglas, “Fixers, Super Fixers, and Shadow Facilitators: How Networks Connect,” in Convergence: Illicit Networks and National Security in the Age of Globalization, ed. Miklaucic, Michael and Brewer, Jacqueline (Washington, DC: National Defense University Press, 2013), 75–95Google Scholar
FATF, Proliferation Financing Report, June 18, 2008
Stern, Jessica, “Mind over Martyr: How to Deradicalize Terrorists,” Foreign Affairs, January–February, 2010, 95–108
Berman, Eli, Radical, Religious and Violent: The New Economics of Terrorism (Cambridge, MA: MIT Press, 2009)Google Scholar
Green, Daniel, “Al Qaeda’s Resiliency in Yemen,” PolicyWatch 2014, August 7, 2013,
Levitt, Matthew, “Follow the Money: Leveraging Financial Intelligence to Combat Transnational Threats,” Georgetown Journal of International Affairs, Winter/Spring 2011, 36
Peterson, Marilyn B., A Guide to Counter Threat Finance Intelligence, 2009
Cücük, Hasan, “Danish Bank Freezes Roj TV Accounts over PKK Links,” February 2, 2012,
Roth, John, Greenburg, Douglas, and Wille, Serena, Monograph on Terrorist Financing (Washington, DC: National Commission on Terrorist Attacks upon the United States, 2004)Google Scholar
Levitt, Matthew, Hamas Politics, Charity and Terrorism in the Service of Jihad (New Haven, CT: Yale University Press, 2006), 54Google Scholar
Bell, J. Bowyer, The IRA 1968–2000: Analysis of a Secret Army (London: Frank Cass, 2000), 176Google Scholar
Curtis, Glen E. and Karacan, Tara, The Nexus among Terrorists, Narcotics Traffickers, Weapons Proliferators and Organized Crime Networks in Western Europe, December 2002
Roth, Mitchel P. and Sever, Murat, “The Kurdish Workers Party (PKK): Funding Terrorism through Organized Crime, a Case Study,” Studies in Conflict and Terrorism, October 2007, 901–20
Jaber, Hala, Hezbollah Born with a Vengeance (New York: Columbia University Press, 1997), 152Google Scholar
Kittner, Cristiana C. Brafman, “The Role of Safe Havens in Islamist Terrorism,” Terrorism and Political Violence 19 (2007): 313CrossRefGoogle Scholar
Veness, David, “Low Intensity and High Impact Conflict,” in The Future of Terrorism, ed. Taylor, Maxwell and Horgan, Paul (London: Frank Cass, 2000), 11Google Scholar
Levitt, Matthew and Jacobsen, Michael, The Money Trail: Finding, Following and Freezing Terrorist Finances, Policy Focus 89 (Washington, DC: Washington Institute, November 2008), 50–51Google Scholar
UN International Drug Control Programme, World Drug Report (New York: Oxford University Press, 1997), 124Google Scholar
Naím, Moisés, Illicit: How Smugglers, Traffickers, and Copycats Are Hijacking the Global Economy (New York: Anchor Books, 2006)Google Scholar
Shelley, Louise I., Human Trafficking: A Global Perspective (Cambridge: Cambridge University Press, 2010), 7CrossRefGoogle Scholar
Vittori, Jodi, Terrorist Financing and Resourcing (New York: Palgrave Macmillan, 2011), 31CrossRefGoogle Scholar
Adams, Jennifer J. and Pizarro, Jesenia M., “MS13: A Gang Profile,” Journal of Gang Research 16, no. 4 (2009): 1–14Google Scholar
Rape for Profit: Trafficking of Nepali Girls and Women to India’s Brothels,” Human Rights Watch/Asia 12, no. 5(A) (1995)
Anthony, Augustine, “Pakistan Rescues Boys Trained as Suicide Bombers,” July 28, 2009,
Shelley, Louise and Picarelli, John T., “Methods Not Motives: Implications of the Convergence of International Organized Crime and Terrorism,” Police Practice and Research 3, no. 4 (2002): 313CrossRefGoogle Scholar
Burruss, Logan, “Human Smuggling aboard Seized Ship,” August 13, 2010,
Williams, Phil, Criminals, Militias, and Insurgents: Organized Crime in Iraq (Carlisle, PA: Strategic Studies Institute, 2009), 185CrossRefGoogle Scholar
Hamm, Mark S., “Crimes Committed by Terrorist Groups: Theory, Research and Prevention,” NIJ, September 2005,
Williams, Phil, “Drugs and Guns,” Bulletin of the Atomic Scientists 55 (January/February 1999): 46–48CrossRefGoogle Scholar
Farah, Douglas and Braun, Stephen, Merchant of Death: Money, Guns, Planes, and the Man Who Makes War Possible (Hoboken, NJ: John Wiley, 2007)Google Scholar
Rabasa, Angel, Chalk, Peter, Cragin, Kim, Daly, Sara A., Gregg, Heather S., Karasik, Theodore W., O’Brien, Kevin A., and Rosenau, William, Beyond al-Qaeda, Part II: The Outer Rings of the Terrorist Universe (Santa Monica, CA: RAND, 2006), 111–18Google Scholar
Naylor, R. T., “The Insurgent Economy: Black Market Operations of Guerrilla Organizations,” Crime, Law and Social Change 20, no. 1 (1993): 13, 20Google Scholar
Alley, Patrick, a founder and codirector of Global Witness, “Conflict and Extractive Industries,” at Scenarios for Peace: Transparency and Anti-corruption, fifteenth anniversary of Transparency International, September 5, 2013, Bogotá
Campbell, Tanner and Gunaratna, Rohan, “Maritime Terrorism, Piracy and Crime,” in Terrorism in the Asia-Pacific: Threat and Response, ed. Gunaratna, Rohan (Singapore: Eastern Universities Press, 2003), 75–77Google Scholar
Murphy, Martin N., Contemporary Piracy and Maritime Terrorism: The Threat to International Security (London: IISS, 2007)Google Scholar
Murphy, Martin N., Small Boats, Weak States, Dirty Money: The Challenge of Piracy (New York: Columbia University Press, 2008)Google Scholar
Naylor, R. T., Wages of Crime: Black Markets, Illegal Finance, and the Underworld Economy, rev. ed. (Ithaca, NY: Cornell University Press, 2004), 196–246Google Scholar
Massé, Frédéric and Camargo, Johanna, “Actores Armados Ilegales y Sector Extractivo en Colombia,” V informe del Centro Internacional de Toledo para la Paz (CITpax) Observatorio Internacional, 2012,
Witness, Global, “For a Few Dollars More: How al Qaeda Moved into the Diamond Trade,” April 2003,
Campbell, Greg, Blood Diamonds: Tracing the Deadly Path of the World’s Most Precious Stones (Boulder, CO: Westview Press, 2002)Google Scholar
Farah, Douglas, Blood from Stones: The Secret Financial Network of Terror (New York: Broadway Books, 2004)Google Scholar
Douglas, Leo R. and Alie, Kelvin, “High-value natural resources: linking wildlife conservation to international conflict, insecurity, and development concerns,” Biological Conservation, 171 (March 2014), 270–77
Gettleman, Jeffrey, “Elephants Dying in Epic Frenzy as Ivory Fuels Wars and Profits,” New York Times, September 3, 2012
Ratchford, Marina, Allgood, Beth, and Todd, Paul, Criminal Nature: The Global Security Implications of the Illegal Wildlife Trade (Washington, DC: IFAW, 2013)Google Scholar
Peters, Gretchen, How Opium Profits the Taliban (Washington, DC: U.S. Institute of Peace, 2009)Google Scholar
Peters, , Seeds of Terror: How Drugs, Thugs, and Crime Are Reshaping the Afghan War (New York: Picador, 2010)Google Scholar
Shelley, Louise and Hussain, Nazia, “Narco-trafficking in Pakistan-Afghanistan Border Areas and Implications for Security in Narco-jihad: Drug Trafficking and Security in Afghanistan and Pakistan,” NBR Special Report 20 (December 2009), 30–31, 35, 37, 40
Warrick, Joby, “U.S. Accuses Lebanese Companies of Laundering Money for Hezbollah,” Washington Post, April 23, 2013
Zarate, Juan C., Treasury’s War: The Unleashing of a New Era of Financial Warfare (New York: Public Affairs, 2013), 359Google Scholar
Williams, Phil and Felbab-Brown, Vanda, Drug Trafficking, Violence and Instability, SSI Monograph (Carlisle, PA: Strategic Studies Institute, U.S. Army War College, April 2012), 41CrossRefGoogle Scholar
Warlord, Inc., Extortion and Corruption along the U.S. Supply Chain in Afghanistan, report of the Majority Staff, Rep. John F. Tierney, Chair Committee on Oversight and Government Reform, U.S. House of Representatives, June 1, 2010
Peters, Gretchen, Crime and Insurgency in the Tribal Areas of Afghanistan and Pakistan (West Point, NY: Combating Terrorism Center at West Point, 2010), 31–32CrossRefGoogle Scholar
Alonso, Rogelio and Rey, Marcos Garcia, “The Evolution of Jihadist Terrorism in Morocco,” Terrorism and Political Violence 19, no. 4 (2007): 576CrossRefGoogle Scholar
Arianti, V., “Indonesian Terrorism Financing: Resorting to Robberies,” RSIS Commentaries, No. 142, July 29, 2013,
Kaplan, David E., “Paying for Terror: How Jihadist Groups Are Using Organized-Crime Tactics – and Profits – to Finance Attacks on Targets around the Globe,” November 27, 2005,
Cozzens, Jeffrey and Rosenau, William, “The ‘Homegrown’ Case of Jami`at al-Islam al-Sahih,” August 15, 2009,
Hamm, Mark, “Crimes Committed by Terrorist Groups,” NIJ, September 2005
della Porta, Donatella, “Left-Wing Terrorism in Italy,” in Terrorism in Context, ed. Crenshaw, Martha (University Park: Pennsylvania State University Press, 1995), 105–59Google Scholar
Anderson, John Lee, Guerillas: The Men and Women Fighting Today’s Wars (New York: Random House Times Books, 1992), 107Google Scholar
Seguridad, Dirección de Justicia y, “Cifras de Violencia, 1996–2002,” 2002, 3–4, copy provided to the author
Pécaut, Daniel, Les Farc, une guerilla sans fin? (Paris: Lignes de Repères, 2008), 77Google Scholar
Rollins, John and Wyler, Liana, International Terrorism and Transnational Crime: Security Threats, U.S. Policy, and Considerations for Congress (Washington, DC: Congressional Research Service, 2010), 18Google Scholar
Betancourt, Ingrid, La Rage au Coeur (Paris: Pocher, 2001)Google Scholar
Filler, Alfredo L., “The Abu Sayyaf Group: A Growing Menace to Civil Society,” Terrorism and Political Violence 14, no. 4 (2002): 131–62CrossRefGoogle Scholar
Repetskya, Anna, “The Classification of the Criminal Exploitation of People and Problems of Criminal Responsibility for It,” in Torgovliia Liudmi: Sotsiokriminologicheskii Analiz (Trade in People: Socio-criminological Analysis)
ed. Tiuriukanova, E. V. and Erokhina, L. D. (Moscow: Academia, 2002), 59–88
Berry, LaVerle, Curtis, Glenn E., and Gibbs, John N., Nations Hospitable to Organized Crime and Terrorism (Washington, DC: Federal Research Division, Library of Congress, 2003), 4–5Google Scholar
Thorne, John, “Kidnapping Westerners Is a Lucrative Business in the Sahel,” The National, December 20, 2009
Cristiani, Dario and Fabiani, Riccardo, “Al Qaeda in the Islamic Maghreb (AQIM): Implications for Algeria’s Regional and International Relations,” Instituto Affari Internazaionali, April 2011, 7,
Arlacchi, Pino, Mafia Business: The Mafia Ethic and the Spirit of Capitalism, trans. Ryle, Martin (London: Verso, 1986)Google Scholar
Catanzaro, Raimondo, Men of Respect: A Social History of the Sicilian Mafia, trans. Rosenthal, Raymond (New York: Free Press, 1992)Google Scholar
Volkov, Vadim, Violent Entrepreneurs: The Use of Force in the Making of Russian Capitalism (Ithaca, NY: Cornell University Press, 2002)Google Scholar
Winer, Jonathan, “Origins, Organization and Prevention of Terrorist Finance,” testimony before the Senate Committee on Governmental Affairs, July 31, 2003,
Zanini, Michele, “Middle East Terrorism and Netwar,” Studies in Conflict and Terrorism 22 (1999): 247CrossRefGoogle Scholar
Adams, J., “The Financing of Terrorism,” in Contemporary Research on Terrorism, ed. Wilkinson, P. and Stewart, A.M. (Aberdeen: Aberdeen University Press, 1987), 401Google Scholar
Simon, Jeremy M., “Plastic and Terror: Study Describes How Terrorists Use Credit Cards,” October 1, 2008,
Lefkowitz, Josh, “The Crime-Terror Nexus,” New York State Office of Homeland Security, March 13, 2006, 5,
Weiser, Benjamin, “A Nation Challenged: An Arrest; Algerian Man Faces Charges in a Millennium Terror Plot,” New York Times, November 17, 2001,
Lormel, Dennis, “Credit Cards and Terrorists.” January 16, 2008,
Corera, Gordon, “The World’s Most Wanted Cyber-jihadist,” January 16, 2008,
Özeren, Süleyman, Cyberterrorism and Cybercrime: Vulnerabilities and International Cooperation (Saarbrücken, Germany: VDM, 2009), 17Google Scholar
Broadhurst, Roderic and Grabosky, Peter, eds., Cyber-crime: The Challenge in Asia (Hong Kong: Hong Kong University Press, 2005)
Zanini, M. and Edwards, S. J. A., “The Networking of Terror in the Information Age,” in Networks and Netwars, ed. Arquilla, J. and Ronfelt, D. (Santa Monica, CA: RAND, 2001), 29–60Google Scholar
Denning, D. E. and Baugh, W. E., Hiding Crimes in Cyberspace: Cybercrime: Law Enforcement, Security and Surveillance in the Information Age (New York: Routledge, 2000)Google Scholar
Williams, Phil, “Warning Indicators, Terrorist Finances, and Terrorist Adaptation,” Strategic Insights 4, no. 1 (2005)Google Scholar
Kerbaj, Richard and Kennedy, Dominic, “Link between Child Porn and Muslim Terrorists Discovered in Police Raids,” October 17, 2008,
Cassara, John, Hide and Seek: Intelligence, Law Enforcement, and the Stalled War on Terrorist Finance (Washington, DC: Potomac Books, 2006), 150–54, 176–81Google Scholar
Raphaeli, Nimrod, “Financing of Terrorism: Sources, Methods and Channels,” Terrorism and Political Violence 15, no. 4 (2003): 74–75CrossRefGoogle Scholar
Wahab, Bilal, “How Iraq Oil Smuggling Greases Violence,” Middle East Quarterly, Fall 2006
Murphy, Martin N., Somalia: The New Barbary? Piracy and Islam in the Horn of Africa (New York: Columbia University Press, 2011)Google Scholar
Murphy, , Weak States, Dirty Money: Piracy and Maritime Terrorism in the Modern World (New York: Columbia University Press, 2010), 4Google Scholar
Sanderson, Thomas M., “Transnational Terror and Organized Crime: Blurring the Lines,” SAIS Review 24, no. 1 (2004): 51–52CrossRefGoogle Scholar
Gettleman, Jeffrey, “Somali Pirates Capture Tanks and Global Notice,” New York Times, January 26, 2008
Abdukadirov, Sherzod, “Terrorism: The Dark Side of Social Entrepreneurship,” Studies in Conflict and Terrorism 33, no. 7 (2010): 603–17CrossRefGoogle Scholar
Hamm, Mark S., Terrorism as Crime: From Oklahoma City to Al-Qaeda and Beyond (New York: New York University Press, 2007), 16–17Google Scholar
Bovenkerk, Frank and Yesilgöz, Yucel, “The Turkish Mafia and the State,” in Organised Crime in Europe: Patterns and Policies in the European Union and Beyond, ed. Fijnaut, Cyrille and Paoli, Letizia (Dordrecht, Netherlands: Springer, 2004), 598–99Google Scholar
Strozier, Charles and Frank, James, The PKK: Financial Sources, Social and Political Dimension (Saarbrücken, Germany: VDM, 2011)Google Scholar
Hasson, Nir, “Four Arab Lawyers Suspected of Passing Messages for Islamic Jihad. The Four Are Suspected of Passing Information from Islamic Jihad Prisoners in Israel to the Group’s Officials in Gaza, in Return for Thousands of Shekels,” Ha’aretz, April 20, 2011,
Moynihan, Colin, “Radical Lawyer Convicting of Aiding Terrorist Is Jailed,” New York Times, November 20, 2009,
Brazil: Primeiro Comando da Capital (PCC), January 1, 2008
Garzón, Juan Carlos, Mafia & Co: The Criminal Networks in Mexico, Brazil and Colombia, translated by Ogle, Kathy (Bogotá: Planeta, 2008), 76Google Scholar
Manwaring, Max C., “Three Lessons from Contemporary Challenges to Security,” Prism 2, no. 3 (2011): 107Google Scholar
Godson, Roy, ed., Menace to Society: Political-Criminal Collaboration around the World (New Brunswick, NJ: Transaction, 2003)
Amawi, Mohammad Zaki, El-Hindi, Marwan Othman, Mazloum, Wassim I., May 10, 2009; see
Raphaeli, Nimrod, “Financing of Terrorism: Sources, Methods and Channels,” Terrorism and Political Violence 15, no. 4 (2003): 72CrossRefGoogle Scholar
Barrett, Devlin and Perez, Evan, “HSBC to Pay Record U.S. Penalty U.K.-Based Bank Expected to Admit Money-Laundering Lapses as Part of $1.9 Billion Agreement,” Wall Street Journal, December 11, 2012
Tabibi, Matt, “Gangster Bankers: Too Big to Jail How HSBC Hooked Up with Drug Traffickers and Terrorists. And Got Away with It,” February 14, 2013,
Silver-Greenberg, Jessica, “Cash Moves by HSBC in Inquiry,” New York Times, August 24, 2012
Levitt, Matthew, Hezbollah: The Global Footprint of Lebanon’s Party of God (Washington, DC: Georgetown University Press, 2013), 259Google Scholar
Hume, Jessica, “US Seizes $150 Million from Hezbollah-Linked Lebanese Canadian Bank,” Toronto Sun, August 21, 2012,
Levitt, Matthew, Hamas: Politics, Charity, and Terrorism in the Service of Jihad (New Haven, CT: Yale University Press, 2006), 165Google Scholar
Passas, Nikos, “Informal Value Transfer Systems, Terrorism and Money Laundering,” January 2005,
Thompson, Edwina A., Trust Is the Coin of the Real: Lessons from the Money Men in Afghanistan (Karachi: Oxford University Press, 2011)Google Scholar
Gastrow, Peter, Termites at Work: Transnational Organized Crime and State Erosion in Kenya (New York: International Peace Institute, 2011), 8Google Scholar
Thompson, Edwina A., “Misplaced Blame: Islam, Terrorism and the Origins of Hawala,” Max Planck Volume of United Nations Law, ed. von Bogdandy, A. and Wolfrum, R., 2007, 11, 279–305,
Razavy, Maryam, “Hawala: An Underground Haven for Terrorists or Social Phenomenon?,” Crime, Law, and Social Change 44, no. 3 (2005): 277–99CrossRefGoogle Scholar
Combating Terrorism: Additional Steps Needed to Enhance Foreign Partners’ Capacity to Prevent Terrorist Travel, GAO-11-637 (Washington, DC: U.S. Government Accountability Office, June 2011), 6
Aydinli, Ersel, “From Finances to Transnational Mobility: Searching for the Global Jihadists’ Achilles Heel,” Terrorism and Political Violence 18 (2006): 307–9CrossRefGoogle Scholar
Khan, Emal and Alderson, Andrew, “Revealed: Pakistan’s ‘Cottage Industry’ in Forged Documents Sought by Terrorists,” The Telegraph, April 11, 2009
“Madrid Bombings Link to Forged Passports Arrests, Suspected Members of an International Ring Providing Forged Passports to Terrorists May Have Links to 2004 Train Bombings,” Guardian, December 2, 2010
Farah, , “Fixers, Super Fixers, and Shadow Facilitators”; World Economic Forum, “Organised Crime Enablers.” Ana Baric, Trafficking and Terrorism: How Organized Crime Thrives on Passport Fraud,” March 13, 2014,
Zheglov, Aleksandr, “Before the Flight Examination: How the Women Bombers Got on the Planes,” Kommersant, September 16, 2004
Pública, Plaza, “Del Monte contrató a los Mendoza para intimidar sindicalistas, según denuncia,” August 8, 2011,
Shinn, David, “Rise of Piracy and Other Maritime Insecurity in Somalia,” Somali Piracy Conference, hosted by the National Maritime Intelligence Center and the Office of Naval Intelligence, April 7, 2009,
Wallis, Daniel, “Piracy Ransoms Funding Somalia Insurgency,” Reuters, August 24, 2008,
Zelinsky, Aaron and Shubik, Martin, “Research Note: Terrorist Groups as Business Firms: A New Typological Framework,” Terrorism and Political Violence 21, no. 2 (2009): 327–36CrossRefGoogle Scholar
Schmidle, Nicholas, “The Hostage Business,” New York Times, December 6, 2009
Harden, Blaine, “Global Insurance Fraud by North Korea Outlined,” Washington Post, June 18, 2009
Smith, David and Chonghaile, Clar Ni, “Somali Pirates Hijacking Fewer Merchant Ships: Robust Action by International Navies and Hiring of Armed Security Guards Drive Piracy to Three-Year Low,” Guardian, October 23, 2012
Gambetta, Diego and Varese, Frederico, “Is Sicily the Future of Russia: Private Protection and the Rise of the Russian Mafia,” European Journal of Sociology 42, no. 1 (2001): 186–220Google Scholar

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×