convergence
convergence
convergence
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Threat Finance<br />
ultimately threatens the trustworthiness of the financial system. 3 It is the process of making<br />
financial proceeds from illicit activities appear legal through the following three stages:<br />
In the initial stage of money laundering—placement—the launderer introduces his<br />
“dirty” illegal profits into the legitimate financial system. This might be done by breaking up<br />
large amounts of cash into less conspicuous sums that are then deposited directly into bank<br />
accounts, or by purchasing a series of monetary instruments (checks, money orders, etc.) that<br />
are then collected and deposited into accounts at other locations.<br />
After the funds have entered the financial system, the second stage—layering—takes<br />
place. The launderer engages in a series of conversions or movements of the funds to distance<br />
them from their sources. The funds might be channeled through the purchase and sales of<br />
investment instruments, or the launderer might simply wire the funds through a series of accounts<br />
at various banks across the globe. This use of widely scattered accounts for laundering is<br />
especially prevalent in jurisdictions that do not cooperate in money-laundering investigations.<br />
In some instances, the launderer disguises the transfers as payments for goods or services,<br />
giving them a legitimate appearance.<br />
Having successfully processed his criminal profits through the first two phases, the<br />
launderer then moves them to the third stage—integration—in which the now “clean” funds<br />
reenter the legitimate economy. The launderer might choose to invest the funds into real estate,<br />
luxury assets, or business ventures. 4<br />
Terrorist Financing. Terrorist financing refers to the processing of funds to sponsor or<br />
facilitate terrorist activity. A terrorist group, like any other criminal organization, builds and<br />
maintains an infrastructure to facilitate the development of sources of funding, channel those<br />
funds to the providers of materials and services to the organization, and possibly launder the<br />
funds used in financing the terrorist activity or resulting from that same activity.<br />
Terrorist organizations derive income from a variety of sources, often combining both<br />
lawful and unlawful funding. The agents involved do not always know the illegitimate end of<br />
that income. The forms of financing can be grouped in two types:<br />
Financial support comes in the form of donations, community solicitation, and other<br />
fundraising initiatives. It may originate with states and large organizations or individuals.<br />
Revenue-generating activities provide income derived from criminal activities such as<br />
kidnapping, extortion, smuggling, and fraud. Income may also be derived from legitimate<br />
economic activities such as diamond trading or real estate investment. 5<br />
As demonstrated, criminal and terrorist financing are similar in that “they often exploit<br />
the same vulnerabilities in financial systems that allow for anonymity and non-transparency<br />
in the execution of financial transactions.” 6 For the purposes of studying the financial activities<br />
of illicit networks, these similarities (and crossover via the crime-terror nexus) outweigh the<br />
differences.<br />
Common Modes of Threat Finance<br />
Financing is essential for any organization and its activities, and this axiom applies equally<br />
to illicit networks. Their activities can be categorized into operational and support activities.<br />
Operational activities include surveillance and reconnaissance, rehearsal, final preparations,<br />
113