Terrorist Financing on the Internet
Total Page:16
File Type:pdf, Size:1020Kb
JUNE 2009 . VOL 2 . ISSUE 6 Terrorist Financing on the entity called “Azzam Publications” and whose leaders were impressed by his a number of associated websites that computer knowledge and ambition. Internet were primarily focused on supporting He quickly developed close ties to the the Taliban in Afghanistan and the organization.6 AQI began feeding videos By Michael Jacobson mujahidin in Chechnya. On these sites, directly to Tsouli for him to post.7 At Babar solicited funds, attempted to the outset, Tsouli uploaded these videos since the september 11 attacks on the recruit fighters, and even provided to free webhosting services, and at this United States, al-Qa`ida has come detailed instructions on how individuals point he had few expenses and little need under growing international pressure. could move both themselves and money for funds. These free sites, however, In response, the terrorist organization to conflict zones.2 The website was had limited bandwidth and soon came has increasingly relied on the internet explicit in its purpose.3 to slow Tsouli down as he ramped up to spread its message and gain support his activities. Tsouli then turned to throughout the world. While its use To persuade individuals to donate, Babar sites with better technical capabilities, of the internet for propaganda and used a familiar argument: supporting but that forced him to raise money.8 recruiting purposes has received wide jihad in some fashion was an obligation publicity, al-Qa`ida has also utilized the incumbent upon every Muslim. Babar Not surprisingly, given his expertise, internet for a variety of other purposes, noted that even if one could not fight Tsouli turned to the internet to raise including terrorist financing. Al- in the jihad, they nonetheless had a the funds to pay for these sites. Tsouli Qa`ida is far from alone among terrorist religious obligation to contribute funds. and his partner, Tariq al-Daour, organizations in exploiting the internet He argued that the began acquiring stolen credit card for financing. A wide range of other numbers on the web, purchasing them terrorist groups—including Hamas, first and most important thing through various online forums, such Lashkar-i-Tayyiba and Hizb Allah— that Muslims can do in the West as Cardplanet.9 By the time Tsouli and have also used the internet to raise and is to donate money and to raise his partner were arrested, al-Daour had transfer needed funds to support their it amongst their families, friends accumulated 37,000 stolen credit card activities. and others…for someone who is numbers on his computer, which they not able to fight at this moment had used to make more than $3.5 million The internet offers broad reach, timely in time due to a valid excuse they in charges.10 Tsouli laundered money efficiency, as well as a certain degree of can start by the collection and through a number of online gambling anonymity and security for both donors donation of funds.4 sites, such as absolutepoker.com and and recipients. Although governments paradisepoker.com, using the stolen throughout the world now recognize that Babar’s case is just one example of early credit card information. They conducted the internet is an increasingly valuable terrorist use of the internet for financing hundreds of transactions at 43 different tool for terrorist organizations, the purposes. websites in total. Any winnings were response has been inconsistent. For the cashed in and transferred electronically United States and its allies to effectively Financing Earned through Online Criminal to bank accounts specifically established counter this dangerous trend, they will Activity for this purpose. In this way, the money have to prioritize their efforts in this One of the primary ways that terrorist would now appear legitimately won, area in the years to come. This article groups use the internet to raise funds is and thus successfully laundered.11 In provides an example of early terrorist through criminal activity. Younis Tsouli, total, Tsouli used 72 of these credit use of the internet, explains how and a young British man better known by cards to register 180 websites, hosted why terrorists launder and raise funds his internet code-name “Irhabi 007,”5 by 95 different companies.12 through websites, and examines the may today be the best known virtual challenges of countering this problem terrorist. Tsouli began his “career” 6 Gordon Corera, “The World’s Most Wanted Cyber- effectively. by posting videos depicting terrorist Jihadist,” BBC News, January 16, 2008. activity on various websites. He came to 7 Ibid. Early Terrorist Financing on the Internet the attention of al-Qa`ida in Iraq (AQI), 8 “Cyber Operative Charged in Real World Terror Plot,” While terrorists’ use of the internet for Anti-Defamation League, March 1, 2006. finance-related activities dramatically Ahmad,” September 2004 and indictment of Ahmad in 9 “U.S. Secret Service’s Operation Firewall Nets 28 Ar- increased after 9/11, it began well before. U.S.A. v. Babar Ahmad, District Court of Connecticut, rests,” U.S. Secret Service, press release, October 28, The most prominent example was Babar 2004. 2004. These forums obtained the credit cards through Ahmad, a young British citizen from 2 “Affadavit in Support of Request for Extradition of various online scams and e-mail viruses. See Brian South London who put his computer Babar Ahmad.” Krebs, “Terrorism’s Hook into Your Inbox,” Washington expertise to use early on in support of 3 On a question and answer page, Babar wrote that “Az- Post, July 5, 2007. the jihadist cause until his arrest in zam Publications has been set up to propagate the call for 10 For example, one New Jersey woman described how 2004.1 Beginning in 1997, Babar ran an jihad among the Muslims who are sitting down, ignorant she received an e-mail asking her to verify eBay account of this vital duty…Thus the purpose of Azzam Publica- information, which she completed, including sensitive fi- 1 Babar was arrested in 2004 by the United Kingdom on tions is to ‘incite the believers’ and secondly to raise some nancial information. Al-Daour ended up with her credit the basis of an extradition request by the United States. money for the brothers.” card information. For more, see Krebs. Babar’s appeals of the extradition request are still cur- 4 “Affadavit in Support of Request for Extradition of 11 Krebs. rently pending. For more, see U.S.A. v. Babar Ahmad, Babar Ahmad.” 12 Written statement from Andy Cochran at “Do the “Affadavit in Support of Request for Extradition of Babar 5 “Irhabi 007” means “Terrorist 007.” Payment Card Industry Data Standards Reduce Cyber- JUNE 2009 . VOL 2 . ISSUE 6 Charities (GRF), an organization designated in of the internet to raise and transfer Charities and non-governmental 2002 by the U.S. Treasury Department funds is also part of a broader global organizations (NGO) remain a major for its ties to al-Qa`ida and the Taliban.15 shift toward the use of technology in problem in the terrorist financing arena, On its website, the GRF said that the international commerce. There have and their activities on the internet are charity was “organized exclusively been dramatic shifts in how funds can no exception to this troublesome trend. for charitable, religious, education be transferred from one destination According to the Paris-based Financial and scientific purposes including to to another, with new technological Action Task Force, “the misuse of non- establish, promote, and carry out relief developments. Transferring funds profit organizations for the financing of and charitable activities, projects, electronically—using the internet to terrorism is coming to be recognized as a organizations, institutions and funds.” initiate transactions—has become crucial weak point in the global struggle GRF’s mission statement focused on increasingly common through services to stop such funding at its source.”13 its work in emergency relief, medical such as PayPal. Transactions can also Charities are especially susceptible to aid, advancement of education and be conducted through cell phones abuse by terrorists and their supporters development of social welfare, noting in what are now better known as for whom charitable or humanitarian that it will “act with goodwill towards “M-payments.” In countries where organizations are particularly all people.” GRF accepted donations the formal financial sector is less attractive front organizations. Some through its website, with donors able to than robust—such as in many African charities are founded with the express pay through credit and debit cards, and countries—using the internet or cell purpose of financing terror, while wire transfers, among other means.16 phones to facilitate transfers is a far others are existing entities that are In reality, the charity was set up and more attractive and readily available infiltrated by terrorist operatives and run for years by Rabih Haddad, who option. Online gambling sites and supporters and co-opted from within. was allegedly a previous member of other similar entities have also made it It is a significant challenge for law Maktab al-Khidmat (Services Bureau), the easier to launder money on the internet enforcement, intelligence officials, “precursor organization to al Qaeda.”17 than it was in the past—a practice that and charity headquarters personnel to terrorist groups have taken advantage effectively monitor funds distributed Another al-Qa`ida-linked NGO, the al- of in recent years. While this type of in conflict zones, which can be easily Haramain Islamic Foundation, a Saudi- activity could potentially expose them diverted away from the intended cause. based NGO that was designated by the to detection, terrorists attempt to mask Another challenge for governments that U.S.