Virtual Currencies and Terrorist Financing : Assessing the Risks And

Total Page:16

File Type:pdf, Size:1020Kb

Virtual Currencies and Terrorist Financing : Assessing the Risks And DIRECTORATE GENERAL FOR INTERNAL POLICIES POLICY DEPARTMENT FOR CITIZENS' RIGHTS AND CONSTITUTIONAL AFFAIRS COUNTER-TERRORISM Virtual currencies and terrorist financing: assessing the risks and evaluating responses STUDY Abstract This study, commissioned by the European Parliament’s Policy Department for Citizens’ Rights and Constitutional Affairs at the request of the TERR Committee, explores the terrorist financing (TF) risks of virtual currencies (VCs), including cryptocurrencies such as Bitcoin. It describes the features of VCs that present TF risks, and reviews the open source literature on terrorist use of virtual currencies to understand the current state and likely future manifestation of the risk. It then reviews the regulatory and law enforcement response in the EU and beyond, assessing the effectiveness of measures taken to date. Finally, it provides recommendations for EU policymakers and other relevant stakeholders for ensuring the TF risks of VCs are adequately mitigated. PE 604.970 EN ABOUT THE PUBLICATION This research paper was requested by the European Parliament's Special Committee on Terrorism and was commissioned, overseen and published by the Policy Department for Citizens’ Rights and Constitutional Affairs. Policy Departments provide independent expertise, both in-house and externally, to support European Parliament committees and other parliamentary bodies in shaping legislation and exercising democratic scrutiny over EU external and internal policies. To contact the Policy Department for Citizens’ Rights and Constitutional Affairs or to subscribe to its newsletter please write to: [email protected] RESPONSIBLE RESEARCH ADMINISTRATOR Kristiina MILT Policy Department for Citizens' Rights and Constitutional Affairs European Parliament B-1047 Brussels E-mail: [email protected] AUTHORS Tom KEATINGE, Director of the Centre for Financial Crime and Security Studies, Royal United Services Institute (coordinator) David CARLISLE, Centre for Financial Crime and Security Studies, Royal United Services Institute, etc. Florence KEEN, Centre for Financial Crime and Security Studies, Royal United Services Institute, etc. LINGUISTIC VERSION Original: EN Manuscript completed in May 2018 © European Union, 2018 This document is available on the internet at: http://www.europarl.europa.eu/supporting-analyses DISCLAIMER The opinions expressed in this document are the sole responsibility of the author and do not necessarily represent the official position of the European Parliament. Reproduction and translation for non-commercial purposes are authorised, provided the source is acknowledged and the publisher is given prior notice and sent a copy. Virtual currencies and terrorist financing: assessing the risks and evaluating responses ____________________________________________________________________________________________ CONTENTS CONTENTS 3 LIST OF ABBREVIATIONS 5 LIST OF TABLES 7 LIST OF MAPS 7 LIST OF FIGURES 7 EXECUTIVE SUMMARY 9 1. VIRTUAL CURRENCIES: DEFINITIONS, CHARACTERISTICS AND USES 12 1.1. Types of VCs, Their Features and Uses 12 1.1.1. Basic Definitions 12 1.1.2. Decentralised VCs (Cryptocurrencies) 13 1.1.3. Centralised VCs 18 2. BACKGROUND ON AML/CFT EFFORTS AND VIRTUAL CURRENCIES 20 2.1. New Payment Methods, FinTech and CFT Efforts 21 2.1.1. The FATF and New Technologies 21 2.1.2. The FATF and VCs 21 2.1.3. The EU Response 23 3. ASSESSING THE TERRORIST FINANCING RISKS OF VIRTUAL CURRENCIES 27 3.1. TF Risks in Context 27 3.2. TF Risk Features of VCs 30 3.2.1. Anonymity and Pseudonymity 30 3.2.2. P2P Cross-Border Transfer and Portability 38 3.2.3. Decentralisation 39 3.3. Other Potential Risks 42 3.3.1. The Convergence of Cybercrime and Terrorism 42 3.3.2 The Creation of Virtual Currencies and Other Advanced Uses 44 4. LEGAL AND REGULATORY MECHANISMS 46 4.1. The International Response 46 4.1.1. FATF and Virtual Currencies: Guidance for a Risk Based Approach 46 4.1.2. Non-EU Measures on VCs 47 4.2. EU Mechanisms 50 4.2.1. EU Fifth Anti-Money Laundering Directive 50 4.2.2. Innovative Approaches to VC Regulation Across Europe 53 4.3. The Role of Self-Regulation 55 3 Policy Department for Citizens' Rights and Constitutional Affairs ____________________________________________________________________________________________ 5. COOPERATION AND PARTNERSHIP ACROSS THE EU 57 5.1. EU Law Enforcement Responses to VCs 57 5.1.1. Europol’s Role 57 5.1.2. Other EU-Wide Initiatives 59 5.1.3. Member State Responses 59 5.2. The Role of Public-Private Partnership 61 6. POLICY RECOMMENDATIONS 63 6.1. Ensuring Effective, Robust and Comprehensive Regulation 63 6.2. Developing Law Enforcement Knowledge and Capacity 64 6.3. Developing an Enhanced Intelligence Picture 65 6.4. Enabling Public-Private Partnership 66 REFERENCES 67 ANNEX I - RELEVANT LEGAL AND REGULATORY MECHANISMS 80 ANNEX II - VALUES OF MAJOR CRYPTOCURRENCIES 84 ANNEX III - SIGNIFICANT LAW ENFORCEMENT ACTIONS 85 4 Virtual currencies and terrorist financing: assessing the risks and evaluating responses ____________________________________________________________________________________________ LIST OF ABBREVIATIONS AMLD Anti-Money Laundering Directive 5AMLD EU Fifth Anti-Money Laundering Directive AML/CFT Anti-money laundering and countering the financing of terrorism CDD Customer due diligence Dapps Decentralised applications DDoS Distributed denial of service attack DEX Decentralised exchange DLT Distributed ledger technology EBA European Banking Authority FATF Financial Action Task Force FCA UK Financial Conduct Authority FinCEN US Financial Crimes Enforcement Network FINMA Swiss Financial Market Supervisory Authority FIUs Financial intelligence units FSA Financial Services Agency of Japan FSRBs FATF-Style Regional Bodies G7 Group of Seven G20 Group of Twenty GDPR General Data Protection Regulation GFSC Gibraltar Financial Services Commission IOCTA Internet Organised Crime Threat Assessment ISIS Islamic State of Iraq and Syria ITMC Ibn Taymiyya Media Center 5 Policy Department for Citizens' Rights and Constitutional Affairs ____________________________________________________________________________________________ JMLIT Joint Money Laundering Intelligence Task Force KYC Know Your Customer MSB Money service business MSC Mujahideen Shura Council in the Environs of Jerusalem OCGs Organised crime groups LEAs Law enforcement agencies P2P Peer-to-peer PPP Public-private partnership RBA Risk-based approach STR Suspicious Transaction Report SNRA Supra-National Risk Assessment SPLC Southern Poverty Law Center TF Terrorist financing VC Virtual currency 6 Virtual currencies and terrorist financing: assessing the risks and evaluating responses ____________________________________________________________________________________________ LIST OF TABLES TABLE 1 Values of Major Cryptocurrencies................................................................. 83 TABLE 2 Significant Law Enforcement Actions............................................................. 84 LIST OF MAPS MAP 1 Map of Bitcoin ATMs in Austria by Number and Location.................................. 16 MAP 2 LocalBitcoins Map of Locations to Sell Bitcoins in Brussels................................ 41 LIST OF FIGURES FIGURE 1 A Bitcoin Transaction .................................................................................. 31 FIGURE 2 Neonazi Bitcoin Tracker ................................................................................ 31 FIGURE 3 Al-Sadaqah Twitter Account Requesting Donations in Bitcoin and Monero ........... 34 FIGURE 4 Image from Al-Sadaqah Twitter Account Requesting Alt-Coins .......................... 34 FIGURE 5 German Passports for Sale on the Dark Web ................................................... 37 FIGURE 6 Image of the WannaCry Ransomware Message Sent to Victims ......................... 43 FIGURE 7 LocalBitcoins Trading Volumes in India (March 2013 – April 2018) ..................... 52 7 Policy Department for Citizens' Rights and Constitutional Affairs ____________________________________________________________________________________________ FIGURE 8 AlphaBay and Hansa Pages After Seizure by Law Enforcement ......................... 58 8 Virtual currencies and terrorist financing: assessing the risks and evaluating responses ____________________________________________________________________________________________ EXECUTIVE SUMMARY Virtual currencies (VCs) - which include cryptocurrencies such as Bitcoin, as well as a range of other digital value-transfer methods – are innovative new technologies that enable digital transactions and the delivery of financial products and services in new online networks, environments and marketplaces. Consequently, some observers view VCs as important for furthering competition in payments services, expanding financial inclusion and enabling greater efficiency and speed in cross-border value transfer. Like other financial products and services, VCs have features that present risks for facilitating criminality, including money laundering and terrorist financing (TF). The borderless, peer-to- peer (P2P) nature of certain VCs offers the prospect for terrorist actors to transfer funds outside the regulated sector and beyond the purview of anti-money laundering and countering the financing of terrorism (AML/CFT) authorities. VCs also feature varying levels of anonymity and pseudonymity, which can enable the concealment of illicit activity. Instances of VCs’ illicit use in cybercrime and in encrypted
Recommended publications
  • The Current Economics of Cyber Attacks
    The Current Economics of Cyber Attacks Ron Winward Security Evangelist October 17, 2016 What Are We Talking About Historical Context Does Hacking Pay? Cyber Aack Marketplace Economics of Defenses: Reality Check 2 Once Upon a Time… 3 Story of the Automobile Ideal economic condions help fuel and grow this industry Be&er Roads Assembly Line Ideal Economic Condi9ons Growth 4 Cyber Attacks Reaching a Tipping Point More Resources More Targets More Mature Availability of low More high value, A level of maturity cost resources increasingly vulnerable that drives efficiency targets leads to more and ensures valuable informaon anonymity The economics of hacking have turned a corner! 5 Modern Economics of Cyber Attacks and Hacking 6 Do You Romanticize Hackers? 7 Reality of Today’s Hackers May look more like this . than like this 8 Today’s Adversary: Not always the Lone Wolf Structured organizaon with roles, focus Premeditated plan for targe9ng, exfiltraon, mone9zaon of data/assets Mul9-layered trading networks for distribu9on, Source: HPE: the business of hacking obfuscaon Why? Because increasingly, CRIME PAYS! 9 Or Does It? The average aacker earns approximately ¼ of the salary of an average IT employee The cost and 9me to plan aacks has decreased Be&er access to be&er tools makes aacks easier Remember: Nobody is trying to be “average” 10 Sophisticated Understanding of Value Mone9zable criminal enterprise Credit Cards Medical Records Intellectual Property Creden9als Vulnerabili9es Exploits 11 The Economics of Web Attacks Hacker steals US healthcare
    [Show full text]
  • The Internet and Drug Markets
    INSIGHTS EN ISSN THE INTERNET AND DRUG MARKETS 2314-9264 The internet and drug markets 21 The internet and drug markets EMCDDA project group Jane Mounteney, Alessandra Bo and Alberto Oteo 21 Legal notice This publication of the European Monitoring Centre for Drugs and Drug Addiction (EMCDDA) is protected by copyright. The EMCDDA accepts no responsibility or liability for any consequences arising from the use of the data contained in this document. The contents of this publication do not necessarily reflect the official opinions of the EMCDDA’s partners, any EU Member State or any agency or institution of the European Union. Europe Direct is a service to help you find answers to your questions about the European Union Freephone number (*): 00 800 6 7 8 9 10 11 (*) The information given is free, as are most calls (though some operators, phone boxes or hotels may charge you). More information on the European Union is available on the internet (http://europa.eu). Luxembourg: Publications Office of the European Union, 2016 ISBN: 978-92-9168-841-8 doi:10.2810/324608 © European Monitoring Centre for Drugs and Drug Addiction, 2016 Reproduction is authorised provided the source is acknowledged. This publication should be referenced as: European Monitoring Centre for Drugs and Drug Addiction (2016), The internet and drug markets, EMCDDA Insights 21, Publications Office of the European Union, Luxembourg. References to chapters in this publication should include, where relevant, references to the authors of each chapter, together with a reference to the wider publication. For example: Mounteney, J., Oteo, A. and Griffiths, P.
    [Show full text]
  • Beauty Is Not in the Eye of the Beholder
    Insight Consumer and Wealth Management Digital Assets: Beauty Is Not in the Eye of the Beholder Parsing the Beauty from the Beast. Investment Strategy Group | June 2021 Sharmin Mossavar-Rahmani Chief Investment Officer Investment Strategy Group Goldman Sachs The co-authors give special thanks to: Farshid Asl Managing Director Matheus Dibo Shahz Khatri Vice President Vice President Brett Nelson Managing Director Michael Murdoch Vice President Jakub Duda Shep Moore-Berg Harm Zebregs Vice President Vice President Vice President Shivani Gupta Analyst Oussama Fatri Yousra Zerouali Vice President Analyst ISG material represents the views of ISG in Consumer and Wealth Management (“CWM”) of GS. It is not financial research or a product of GS Global Investment Research (“GIR”) and may vary significantly from those expressed by individual portfolio management teams within CWM, or other groups at Goldman Sachs. 2021 INSIGHT Dear Clients, There has been enormous change in the world of cryptocurrencies and blockchain technology since we first wrote about it in 2017. The number of cryptocurrencies has increased from about 2,000, with a market capitalization of over $200 billion in late 2017, to over 8,000, with a market capitalization of about $1.6 trillion. For context, the market capitalization of global equities is about $110 trillion, that of the S&P 500 stocks is $35 trillion and that of US Treasuries is $22 trillion. Reported trading volume in cryptocurrencies, as represented by the two largest cryptocurrencies by market capitalization, has increased sixfold, from an estimated $6.8 billion per day in late 2017 to $48.6 billion per day in May 2021.1 This data is based on what is called “clean data” from Coin Metrics; the total reported trading volume is significantly higher, but much of it is artificially inflated.2,3 For context, trading volume on US equity exchanges doubled over the same period.
    [Show full text]
  • On the Norms of Charitable Giving in Islam: a Field Experiment
    A Service of Leibniz-Informationszentrum econstor Wirtschaft Leibniz Information Centre Make Your Publications Visible. zbw for Economics Lambarraa, Fatima; Riener, Gerhard Working Paper On the norms of charitable giving in Islam: A field experiment DICE Discussion Paper, No. 59 Provided in Cooperation with: Düsseldorf Institute for Competition Economics (DICE) Suggested Citation: Lambarraa, Fatima; Riener, Gerhard (2012) : On the norms of charitable giving in Islam: A field experiment, DICE Discussion Paper, No. 59, ISBN 978-3-86304-058-1, Heinrich Heine University Düsseldorf, Düsseldorf Institute for Competition Economics (DICE), Düsseldorf This Version is available at: http://hdl.handle.net/10419/59571 Standard-Nutzungsbedingungen: Terms of use: Die Dokumente auf EconStor dürfen zu eigenen wissenschaftlichen Documents in EconStor may be saved and copied for your Zwecken und zum Privatgebrauch gespeichert und kopiert werden. personal and scholarly purposes. Sie dürfen die Dokumente nicht für öffentliche oder kommerzielle You are not to copy documents for public or commercial Zwecke vervielfältigen, öffentlich ausstellen, öffentlich zugänglich purposes, to exhibit the documents publicly, to make them machen, vertreiben oder anderweitig nutzen. publicly available on the internet, or to distribute or otherwise use the documents in public. Sofern die Verfasser die Dokumente unter Open-Content-Lizenzen (insbesondere CC-Lizenzen) zur Verfügung gestellt haben sollten, If the documents have been made available under an Open gelten abweichend
    [Show full text]
  • Cybercrime: Internet Driven Illicit Activities and Behavior
    Land Forces Academy Review Vol. XXV, No. 4(100), 2020 CYBERCRIME: INTERNET DRIVEN ILLICIT ACTIVITIES AND BEHAVIOR Maurice DAWSON Illinois Institute of Technology, Chicago, United States of America [email protected] ABSTRACT Cybercrime affects multiple areas of society with nefarious activities ranging from human trafficking to illegal arms sale. The Internet has allowed some nefarious activities to be revived as others have emerged in this new age. In turn, this has become a national security issue for countries as this requires resources to combat this evolving threat. These activities include undermining legitimate services that provide government services to its citizens, such as passport, national identification, tax services, and more. This paper introduces some of these activities, enabling readers to understand this digital criminal world further. KEYWORDS: cybercrime, human trafficking, dark web, online marketplace, cryptocurrency, disinformation 1. Introduction name a few (Deibert, 2009). Meanwhile, The Internet has allowed for many more countries have been known to use the technological advances that have brought Internet to target political dissidents such as forth positive outcomes. In retrospect, the Cuba, Ethiopia, Eritrea, Gambia, Morocco, Internet has also allowed for criminal North Korea, Russia, and more (Committee activities to flourish. And while both to Protect Journalists, 2020). Even with this positive and negative effects are expected, mentioned censorship and oversight, illicit the use of the Internet by a criminal activities remain on the rise through the organization, nation-states, terrorists, Internet. extremists, and others finds another means In recent years, police and other law to market their illegal activity. As the enforcement organizations have shut down introduction of the technological pages that advocate prostitution.
    [Show full text]
  • An Evolving Threat the Deep Web
    8 An Evolving Threat The Deep Web Learning Objectives distribute 1. Explain the differences between the deep web and darknets.or 2. Understand how the darknets are accessed. 3. Discuss the hidden wiki and how it is useful to criminals. 4. Understand the anonymity offered by the deep web. 5. Discuss the legal issues associated withpost, use of the deep web and the darknets. The action aimed to stop the sale, distribution and promotion of illegal and harmful items, including weapons and drugs, which were being sold on online ‘dark’ marketplaces. Operation Onymous, coordinated by Europol’s Europeancopy, Cybercrime Centre (EC3), the FBI, the U.S. Immigration and Customs Enforcement (ICE), Homeland Security Investigations (HSI) and Eurojust, resulted in 17 arrests of vendors andnot administrators running these online marketplaces and more than 410 hidden services being taken down. In addition, bitcoins worth approximately USD 1 million, EUR 180,000 Do in cash, drugs, gold and silver were seized. —Europol, 20141 143 Copyright ©2018 by SAGE Publications, Inc. This work may not be reproduced or distributed in any form or by any means without express written permission of the publisher. 144 Cyberspace, Cybersecurity, and Cybercrime THINK ABOUT IT 8.1 Surface Web and Deep Web Google, Facebook, and any website you can What Would You Do? find via traditional search engines (Internet Explorer, Chrome, Firefox, etc.) are all located 1. The deep web offers users an anonym- on the surface web. It is likely that when you ity that the surface web cannot provide. use the Internet for research and/or social What would you do if you knew that purposes you are using the surface web.
    [Show full text]
  • Asymmetric Proof-Of-Work Based on the Generalized Birthday Problem
    Equihash: Asymmetric Proof-of-Work Based on the Generalized Birthday Problem Alex Biryukov Dmitry Khovratovich University of Luxembourg University of Luxembourg [email protected] [email protected] Abstract—The proof-of-work is a central concept in modern Long before the rise of Bitcoin it was realized [20] that cryptocurrencies and denial-of-service protection tools, but the the dedicated hardware can produce a proof-of-work much requirement for fast verification so far made it an easy prey for faster and cheaper than a regular desktop or laptop. Thus the GPU-, ASIC-, and botnet-equipped users. The attempts to rely on users equipped with such hardware have an advantage over memory-intensive computations in order to remedy the disparity others, which eventually led the Bitcoin mining to concentrate between architectures have resulted in slow or broken schemes. in a few hardware farms of enormous size and high electricity In this paper we solve this open problem and show how to consumption. An advantage of the same order of magnitude construct an asymmetric proof-of-work (PoW) based on a compu- is given to “owners” of large botnets, which nowadays often tationally hard problem, which requires a lot of memory to gen- accommodate hundreds of thousands of machines. For prac- erate a proof (called ”memory-hardness” feature) but is instant tical DoS protection, this means that the early TLS puzzle to verify. Our primary proposal Equihash is a PoW based on the schemes [8], [17] are no longer effective against the most generalized birthday problem and enhanced Wagner’s algorithm powerful adversaries.
    [Show full text]
  • Databreaches in Healthcare the Attractiveness of Leaked Healthcare Data for Cybercriminals 2 Whitepaper: Databreaches in Healthcare
    Databreaches in Healthcare The attractiveness of leaked healthcare data for cybercriminals 2 Whitepaper: Databreaches in healthcare Table of Contents Introduction.................................................................................................. 5 An international problem ............................................................................................................................ 6 The risk of digitization ................................................................................................................................ 6 The medical IoT ............................................................................................................................................ 7 Overview of the attack vector: What has Healthcare suffered in the past? ............................................ 8 What are the most common causes of health data compromise? ................................................................... 10 Hacking/IT incidents ................................................................................................................................. 10 Social Engineering......................................................................................................................................11 Examples ......................................................................................................................................................11 Why is the healthcare vertical such an attractive target?.......................................................................
    [Show full text]
  • Banking on Bitcoin: BTC As Collateral
    Banking on Bitcoin: BTC as Collateral Arcane Research Bitstamp Arcane Research is a part of Arcane Crypto, Bitstamp is the world’s longest-running bringing data-driven analysis and research cryptocurrency exchange, supporting to the cryptocurrency space. After launch in investors, traders and leading financial August 2019, Arcane Research has become institutions since 2011. With a proven track a trusted brand, helping clients strengthen record, cutting-edge market infrastructure their credibility and visibility through and dedication to personal service with a research reports and analysis. In addition, human touch, Bitstamp’s secure and reliable we regularly publish reports, weekly market trading venue is trusted by over four million updates and articles to educate and share customers worldwide. Whether it’s through insights. their intuitive web platform and mobile app or industry-leading APIs, Bitstamp is where crypto enters the world of finance. For more information, visit www.bitstamp.net 2 Banking on Bitcoin: BTC as Collateral Banking on bitcoin The case for bitcoin as collateral The value of the global market for collateral is estimated to be close to $20 trillion in assets. Government bonds and cash-based securities alike are currently the most important parts of a well- functioning collateral market. However, in that, there is a growing weakness as rehypothecation creates a systemic risk in the financial system as a whole. The increasing reuse of collateral makes these assets far from risk-free and shows the potential instability of the financial markets and that it is more fragile than many would like to admit. Bitcoin could become an important part of the solution and challenge the dominating collateral assets in the future.
    [Show full text]
  • Is Bitcoin Rat Poison? Cryptocurrency, Crime, and Counterfeiting (Ccc)
    IS BITCOIN RAT POISON? CRYPTOCURRENCY, CRIME, AND COUNTERFEITING (CCC) Eric Engle1 1 JD St. Louis, DEA Paris II, DEA Paris X, LL.M.Eur., Dr.Jur. Bremen, LL.M. Humboldt. Eric.Engle @ yahoo.com, http://mindworks.altervista.org. Dr. Engle beleives James Orlin Grabbe was the author of bitcoin, and is certain that Grabbe issued the first digital currency and is the intellectual wellspring of cryptocurrency. Kalliste! Copyright © 2016 Journal of High Technology Law and Eric Engle. All Rights Re- served. ISSN 1536-7983. 2016] IS BITCOIN RAT POISON? 341 Introduction Distributed cryptographic currency, most famously exempli- fied by bitcoin,2 is anonymous3 on-line currency backed by no state.4 The currency is generated by computation (“mining”), purchase, or trade.5 It is stored and tracked using peer-to-peer technology,6 which 2 See Jonathan B. Turpin, Note, Bitcoin: The Economic Case for A Global, Virtual Currency Operating in an Unexplored Legal Framework, 21 IND. J. GLOBAL LEGAL STUD. 335, 337-38 (2014) (describing how Bitcoin is a virtual currency). Bitcoin is supported by a distributed network of users and relies on advanced cryptography techniques to ensure its stability and reliability. A Bitcoin is simply a chain of digital signatures (i.e., a string of numbers) saved in a “wallet” file. This chain of signa- tures contains the necessary history of the specific Bitcoin so that the system may verify its legitimacy and transfer its ownership from one user to another upon request. A user's wallet consists of the Bitcoins it contains, a public key, and a private key.
    [Show full text]
  • Compromised Connections
    COMPROMISED CONNECTIONS OVERCOMING PRIVACY CHALLENGES OF THE MOBILE INTERNET The Universal Declaration of Human Rights, the International Covenant on Civil and Political Rights, and many other international and regional treaties recognize privacy as a fundamental human right. Privacy A WORLD OF INFORMATION underpins key values such as freedom of expression, freedom of association, and freedom of speech, IN YOUR MOBILE PHONE and it is one of the most important, nuanced and complex fundamental rights of contemporary age. For those of us who care deeply about privacy, safety and security, not only for ourselves but also for our development partners and their missions, we need to think of mobile phones as primary computers As mobile phones have transformed from clunky handheld calling devices to nifty touch-screen rather than just calling devices. We need to keep in mind that, as the storage, functionality, and smartphones loaded with apps and supported by cloud access, the networks these phones rely on capability of mobiles increase, so do the risks to users. have become ubiquitous, ferrying vast amounts of data across invisible spectrums and reaching the Can we address these hidden costs to our digital connections? Fortunately, yes! We recommend: most remote corners of the world. • Adopting device, data, network and application safety measures From a technical point-of-view, today’s phones are actually more like compact mobile computers. They are packed with digital intelligence and capable of processing many of the tasks previously confined
    [Show full text]
  • Survey of Terrorist Groups and Their Means of Financing
    SURVEY OF TERRORIST GROUPS AND THEIR MEANS OF FINANCING HEARING BEFORE THE SUBCOMMITTEE ON TERRORISM AND ILLICIT FINANCE OF THE COMMITTEE ON FINANCIAL SERVICES U.S. HOUSE OF REPRESENTATIVES ONE HUNDRED FIFTEENTH CONGRESS SECOND SESSION SEPTEMBER 7, 2018 Printed for the use of the Committee on Financial Services Serial No. 115–116 ( U.S. GOVERNMENT PUBLISHING OFFICE 31–576 PDF WASHINGTON : 2018 VerDate Mar 15 2010 14:03 Dec 06, 2018 Jkt 000000 PO 00000 Frm 00001 Fmt 5011 Sfmt 5011 G:\GPO PRINTING\DOCS\115TH HEARINGS - 2ND SESSION 2018\2018-09-07 TIF TERRO mcarroll on FSR431 with DISTILLER HOUSE COMMITTEE ON FINANCIAL SERVICES JEB HENSARLING, Texas, Chairman PATRICK T. MCHENRY, North Carolina, MAXINE WATERS, California, Ranking Vice Chairman Member PETER T. KING, New York CAROLYN B. MALONEY, New York EDWARD R. ROYCE, California NYDIA M. VELA´ ZQUEZ, New York FRANK D. LUCAS, Oklahoma BRAD SHERMAN, California STEVAN PEARCE, New Mexico GREGORY W. MEEKS, New York BILL POSEY, Florida MICHAEL E. CAPUANO, Massachusetts BLAINE LUETKEMEYER, Missouri WM. LACY CLAY, Missouri BILL HUIZENGA, Michigan STEPHEN F. LYNCH, Massachusetts SEAN P. DUFFY, Wisconsin DAVID SCOTT, Georgia STEVE STIVERS, Ohio AL GREEN, Texas RANDY HULTGREN, Illinois EMANUEL CLEAVER, Missouri DENNIS A. ROSS, Florida GWEN MOORE, Wisconsin ROBERT PITTENGER, North Carolina KEITH ELLISON, Minnesota ANN WAGNER, Missouri ED PERLMUTTER, Colorado ANDY BARR, Kentucky JAMES A. HIMES, Connecticut KEITH J. ROTHFUS, Pennsylvania BILL FOSTER, Illinois LUKE MESSER, Indiana DANIEL T. KILDEE, Michigan SCOTT TIPTON, Colorado JOHN K. DELANEY, Maryland ROGER WILLIAMS, Texas KYRSTEN SINEMA, Arizona BRUCE POLIQUIN, Maine JOYCE BEATTY, Ohio MIA LOVE, Utah DENNY HECK, Washington FRENCH HILL, Arkansas JUAN VARGAS, California TOM EMMER, Minnesota JOSH GOTTHEIMER, New Jersey LEE M.
    [Show full text]