Feeds

Terrorists grow fat on email scams

Black helicopters scrambled

  • alert
  • submit to reddit

The Power of One eBook: Top reasons to choose HP BladeSystem

Organisations such as al-Qaeda, ETA en PKK are copying Nigerian scams to fund terrorism, two Dutch experts told Dutch daily De Telegraaf this week.

Harald Koppe, head of the Dutch Unusual Transactions Reporting Office (MOT), and Harry Jongbloed of the Dutch criminal investigation department, say there is "strong evidence" from international crime fighting organisations such as the FBI that at least some of the terrorist funding is coming from advanced fee fraud (such as Nigerian-style scam emails) and the sale of pirated software, including CDs and DVDs. Using the internet to raise funds is fairly risk free, experts say.

According to an Interpol report prepared for the US House Committee on International Relations earlier this year, intellectual property crimes are indeed a growing resource for terrorist groups from Northern Ireland to the Arab world, including al-Qaeda and Hizbullah. Last year Interpol already called for a global crackdown on software and music piracy.

A couple of months ago the Recording Industry Association of America (RIAA) said it had evidence that illegal CD plants in Pakistan were financed by international terrorist Dawood Ibrahim, although some people have downplayed these claims as blatant propaganda.

But what about Nigerian scams? Could these seriously be a source of funding for terrorism? Or are terrorists merely copying their tactics?

To date, solid evidence for such claims hasn’t been presented publicly. In fact, the supposed link between Nigerian scammers and terrorists is still a matter of debate among experts. Some believe the cultural background of the perpetrators makes terrorism funding highly improbable. Others, such as Rachel Ehrenfeld, author of the book Funding Evil, say that as 50 per cent of the Nigerian population is Muslim, there is an ideological affiliation with some terrorist organisations. Hmm. A recent survey found that the proportion of Nigerian Muslims who view the United States favorably fell from more than 70 per cent to less than 40 per cent last year.

Ehrenfeld stresses that in many cases the collaboration is just financially motivated. "People who buy fake Gucci bags and Swiss watches sold by Nigerians on the sidewalks of Fifth Avenue in Manhattan contribute to terrorism," she claims.

The Dutch Unusual Transactions Reporting Office (MOT) believes there are some disturbing trends. Suspicious money transfers emanating from the European countries these days can often be linked to West African criminal networks, MOT concludes in its annual report. There also appear to be connections with the drugs trade.

Under the code name "Hyena", the Dutch criminal investigation department managed to freeze a total of €1m in bank accounts linked to Nigerian scams in the past couple of months, but it admits it is still only a very small part. ®

Related stories

Al-Qaeda computer geek nearly overthrew US
Al-Qaeda cyber terrorist panics US
'Electronic Jihad' fails to materialise
Terrorism at all-time low, US gov says
Warning: virus terrorism stories may contain nuts

Designing a Defense for Mobile Applications

More from The Register

next story
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.