A New Era of Terror Money?

Bitcoin (virtual currency) coins placed on Dollar banknotes, next to computer keyboard, are seen in this illustration picture

Cryptocurrencies offer a viable alternative to the existing international financial system for terrorists and others engaged in illicit activities.

Bitcoin, along with other cryptocurrencies, has attracted considerable scrutiny in the past few months due to a consider run up in prices. While the press devotes a great deal of attention towards the crypto nouveau riche or the usual proclamations that the entire phenomenon is a bubble comparable to the tulip mania policymakers and regulatory authorities are preoccupied with a different set of concerns: the potential for terrorist and criminal organizations to make use of these financial instruments.

These fears are warranted. Bitcoin originally attained infamy as a medium to acquire drugs and other illegal narcotics off of darknet markets such as the Silk Road. To this day, Bitcoin is still used at times when transacting on the Silk Road’s shady successors. In the realm of terrorism, jihadis have gradually developed an understanding of how cryptocurrencies can aid them in their endeavors. In 2014, an article entitled “Bitcoin wa Sadaqat al-Jihad” appeared on an online blog and put forward various reasons for jihadist to embrace Bitcoin, explaining that the existing global banking system has “eliminated [charity] for jihad on a large scale” and presenting Bitcoin is a way to circumvent this system. More recent research has revealed that the Islamic State and other extremist outfits are relying on Bitcoin as a new fundraising mechanism in order to stay afloat.

Today Bitcoin is no longer the cryptocurrency of choice when conducting illicit transactions or attempting to move money undetected. The currency is not completely anonymous; rather, it is pseudonymous. Users are sending Bitcoin from their “address” to another address, with all of this information being recorded on a public ledger. Researchers from Qatar University and Hamad Bin Khalifa University have demonstrated that it is possible to exploit this model, writing that “historical pieces of information could be used to identify a certain user.” If one can tie a user’s Bitcoin address to some identifying piece of information (for example, a user’s Bitcoin address on his/her account on a fiat-to-cryptocurrency exchange), then a user’s identity can be revealed.

Those trying to hide their tracks have migrated to what are known as “privacy coins”: cryptocurrencies that are designed to grant users privacy in their financial dealings, often by obscuring the specific details of cryptocurrency transactions. The most well-known of these is Monero, which encrypts the user’s address and creates fake addresses to hide the original sender. The exact quantity of Monero being transacted is also hidden. The cryptocurrency is so secure that when authorities seized the holdings of Alphabay, a darknet market, they were unable to determine the exact quantity of Monero that it’s operator possessed.

Mercifully, the danger of ISIS and other organizations employing privacy coins is overstated at this time. As explained by a report from the Center for New American Security,

[terrorists] seek to move money from places outside the locations where they operate to the areas in which they plan and from which they launch attacks. Often they use many layers of intermediaries so that donors and ultimate recipients may not be known to one other. […] terrorists use the funds to buy things they need to sustain the group or to conduct attacks. And because they do so from the general economy, they often would need to reconvert the [cryptocurrencies] they receive into fiat currency. This final step introduces both an unnecessary layer of complexity and an increased vulnerability to the disruption of their operations by adding additional actors and entities into the fundraising matrix. […] But the final—and most important—reason that terrorist groups have not adopted [cryptocurrencies] at scale is that these groups, and individual terrorist operatives, have not yet perceived the need to do so. They still find it possible to circumvent global rules governing terrorist financing with sufficient ease and frequency that using [cryptocurrencies] is unnecessary. They exploit incomplete implementation of regulatory requirements and global standards at banks, use unlicensed and undersupervised money services businesses (MSBs), or simply cart around cash. As long as these value transfer methods are readily available, there is no great need to invest in new, complicated techniques to transfer value.