
17 July 2024
Financial Extremism: The Dark Side of Crowdfunding and Terrorism
Financial Extremism: How Crowdfunding and Cryptocurrencies Fuel Terrorist Financing
The October 7, 2023 attacks and the subsequent Iron Swords campaign exposed a worrying dynamic: modern terrorist groups are using online crowdfunding and cryptocurrencies to raise, move and hide funds. These digital venues let organizers solicit global support quickly, often under humanitarian pretexts, and route donations in ways that frustrate traditional financial controls. Far from marginal, documented cases and seizure operations show these channels can yield substantial sums and help sustain operations while reducing vulnerability to sanctions and bank oversight.
Why crowdfunding appeals to violent actors
Crowdfunding appeals to armed groups for several practical reasons. Donation-based platforms are easy to use, require little technical skill, and reach broad audiences through social media amplification. Small, dispersed donations reduce the risk that any single transfer draws attention. Campaigns framed as humanitarian aid or relief create plausible deniability and attract sympathetic donors. Cryptocurrencies and prepaid vouchers offer cross-border transferability with privacy features that complicate tracing. Smaller or regional platforms and payment service providers with limited compliance capacity create low-friction conduits. In combination, these aspects meet key operational criteria terrorists value: simplicity, reach, reputational legitimacy with target audiences, and reduced exposure to conventional countermeasures.
Observed methods and patterns
Case evidence and financial-intelligence reporting identify recurring methods used to exploit crowdfunding:
- Campaigns presented as humanitarian relief, orphan assistance, or medical aid while diverting funds to armed groups or their affiliates. Organizers sometimes create or co-opt charities and funnel donations via those entities.
- Use of mainstream crowdfunding sites and social networks to publicize campaigns, then shifting donors to crypto wallets, non-fungible tokens (NFTs), or lesser-known platforms once traditional payment channels are blocked.
- Acceptance of small-value donations at scale, which aggregate into meaningful totals without triggering immediate suspicion; median individual gifts are often modest, yet campaigns can still raise thousands or more.
- Reliance on cryptocurrencies, prepaid vouchers, and mixers or crypto exchanges to obscure origin and destination; exchanges that fail to perform robust Know Your Customer (KYC) or suspicious-activity monitoring enable persistence of these flows.
- Charging multiple credit cards, using stolen card details, or loading anonymous prepaid cards to make donations appear legitimate while hiding the true source.
- Targeting niche, low-capacity crowdfunding platforms where compliance resources are limited, and content moderation is weak.
- Physical cash collection and subsequent placement through third-party accounts to make on-platform payments appear legitimate while breaking the audit trail across jurisdictions.
- Routing donations through high-risk jurisdictions or tax havens, using shell entities and layered transfers to frustrate cross-border tracing.
These techniques are not mutually exclusive; sophisticated operators combine them to raise and move funds while evading detection. Recent seizures, including frozen crypto wallets and coordinated exchange cooperation, demonstrate both the promise and limits of current disruption efforts.
Regulatory and operational gaps
International conventions and UN Security Council resolutions criminalize financing of terrorism, and many jurisdictions have strong criminal penalties and asset-seizure powers. Yet important gaps remain. Donation-based crowdfunding often falls outside the legal scope of anti-money-laundering and counter–terrorist financing (AML/CFT) regimes. Platforms that accept donations are in many countries not treated like regulated financial institutions or obliged to perform the same level of due diligence. Cryptocurrencies create additional challenges where virtual-asset service providers are under-regulated or operate across conflicting national regimes. Smaller platforms, cross-border campaigns, and social-media-fueled solicitations exploit differences in national regulation and enforcement priorities.
Practical measures to reduce risk
A focused, balanced response can reduce abuse without destroying legitimate crowdfunding’s social and economic benefits. Key measures include:
- Extend AML/CFT obligations to donation-based crowdfunding platforms and payment service providers in a proportionate, risk-based way. This should include identity verification for organizers and declared beneficiaries when thresholds or risk indicators are met.
- Require transparent reporting of crypto donations associated with fundraising campaigns, and mandate that virtual-asset service providers apply KYC and suspicious-activity reporting to campaign-related flows.
- Implement platform-level risk controls: automatic flags for campaigns with certain risk features (foreign beneficiaries in conflict zones, ambiguous humanitarian claims, sudden spikes in attention, routing to crypto wallets), tiered due diligence proportionate to raised amounts, and clearer policies for vetting and removing illicit campaigns.
- Strengthen cooperation between platforms, financial institutions, crypto exchanges and authorities. Rapid information sharing and trusted reporting channels allow freezes and seizures before funds are dispersed.
- Harmonize definitions and regulatory expectations through international bodies (FATF, UN, G20) so actors cannot exploit jurisdictional arbitrage. FATF’s mutual evaluations should explicitly assess national treatment of donation-based crowdfunding.
- Invest in analytics and defensive technology: blockchain tracing tools, machine-learning models to detect suspicious campaign content and behavior, and cross-platform open-source intelligence to identify campaign networks. Human review and protections against false positives are essential to protect legitimate expression and donations.
- Launch public-awareness campaign that educate donors and payment providers about indicators of misuse and how to verify charities and campaigns, reducing the pool of unwitting contributors.
- Prioritize intelligence-led monitoring of known extremist channels and rapid takedown or disruption of emergent fund-raising initiatives, while ensuring oversight and legal safeguards.
Policy design must preserve legitimate uses of crowdfunding — charitable, entrepreneurial and civic — so interventions should be narrowly tailored, transparent, and subject to appeal and oversight.
Conclusion: act now, adapt continuously
Crowdfunding and digital assets are reshaping how violence-supporting actors source and move funds. The threat is dynamic: techniques evolve quickly and exploit gaps between platform policies, national laws, and international standards. The experience of recent conflicts shows both the capacity of groups to adapt and the effectiveness of rapid public–private action: exchanges and enforcement agencies have seized and froze assets when cooperation is timely and tools are available.
Effective mitigation requires three sustained priorities:
- regulatory adaptation to bring donation-based crowdfunding and crypto-linked fundraising into proportionate AML/CFT coverage;
- robust, ethical public–private cooperation that combines technical tracing capabilities with legal authority to act; and
- demand-side measures — public education and transparency — that shrink the donor base for abusive campaigns.
Doing so will make it harder for violent actors to exploit digital finance while preserving the many legitimate benefits crowdfunding delivers.
Dive deeper
- Research ¦ Farber, S., & Yehezkel, S. A. (2024). Financial Extremism: The Dark Side of Crowdfunding and Terrorism. Terrorism and Political Violence, 37(5), 651–670. https://doi.org/10.1080/09546553.2024.2362665 ¦
Link ¦
licensed under the following terms, with no changes made:
CC BY-NC-ND 4.0