Library Catalog

Illicit Money : Financing Terrorism in the Twenty-First Century / Jessica Davis.

By: Material type: TextTextPublisher: Boulder : Lynne Rienner Publishers, [2022]Copyright date: ©2021Description: 1 online resource (265 p.)Content type:
Media type:
Carrier type:
ISBN:
  • 9781555879824
  • 9781626379930
Subject(s): DDC classification:
  • 363.325068/1 23
LOC classification:
  • HV6431 .D295 2021
Other classification:
  • online - DeGruyter
Online resources:
Contents:
Frontmatter -- Contents -- List of Tables and Figures -- Acknowledgments -- 1 Financing Terrorism -- Part 1 Raising Money -- 2 Finding Donors -- 3 Using and Abusing Organizations -- 4 Designing Business Models -- 5 Making Crime Pay -- Part 2 Using Money -- 6 Deploying Funds -- 7 Managing, Storing, and Investing Funds -- 8 Moving Funds -- 9 Obscuring Funds -- Part 3 New Frontiers -- 10 Stemming the Flow of Funds -- 11 Old Methods, New Technologies -- Bibliography -- Index -- About the Book
Summary: Terrorists need money . to recruit and train people, to buy weapons, to maintain safe houses, to carry out attacks. Which raises the question: how do they procure and protect funds to finance their operations? In Illicit Money, Jessica Davis thoroughly answers that question. Davis explores the full spectrum of terrorist finance, drawing on extensive case studies to dissect how individuals, cells, and organizations raise and manage, as well as hide, funds. In her concluding chapters, she considers both opportunities and challenges related to countering these illicit activities.
Holdings
Item type Current library Call number URL Status Notes Barcode
eBook eBook Biblioteca "Angelicum" Pont. Univ. S.Tommaso d'Aquino Nuvola online online - DeGruyter (Browse shelf(Opens below)) Online access Not for loan (Accesso limitato) Accesso per gli utenti autorizzati / Access for authorized users (dgr)9781626379930

Frontmatter -- Contents -- List of Tables and Figures -- Acknowledgments -- 1 Financing Terrorism -- Part 1 Raising Money -- 2 Finding Donors -- 3 Using and Abusing Organizations -- 4 Designing Business Models -- 5 Making Crime Pay -- Part 2 Using Money -- 6 Deploying Funds -- 7 Managing, Storing, and Investing Funds -- 8 Moving Funds -- 9 Obscuring Funds -- Part 3 New Frontiers -- 10 Stemming the Flow of Funds -- 11 Old Methods, New Technologies -- Bibliography -- Index -- About the Book

restricted access online access with authorization star

http://purl.org/coar/access_right/c_16ec

Terrorists need money . to recruit and train people, to buy weapons, to maintain safe houses, to carry out attacks. Which raises the question: how do they procure and protect funds to finance their operations? In Illicit Money, Jessica Davis thoroughly answers that question. Davis explores the full spectrum of terrorist finance, drawing on extensive case studies to dissect how individuals, cells, and organizations raise and manage, as well as hide, funds. In her concluding chapters, she considers both opportunities and challenges related to countering these illicit activities.

Mode of access: Internet via World Wide Web.

In English.

Description based on online resource; title from PDF title page (publisher's Web site, viewed 02. Mai 2023)