Feeds

Terrorists grow fat on email scams

Black helicopters scrambled

  • alert
  • submit to reddit

Securing Web Applications Made Simple and Scalable

Organisations such as al-Qaeda, ETA en PKK are copying Nigerian scams to fund terrorism, two Dutch experts told Dutch daily De Telegraaf this week.

Harald Koppe, head of the Dutch Unusual Transactions Reporting Office (MOT), and Harry Jongbloed of the Dutch criminal investigation department, say there is "strong evidence" from international crime fighting organisations such as the FBI that at least some of the terrorist funding is coming from advanced fee fraud (such as Nigerian-style scam emails) and the sale of pirated software, including CDs and DVDs. Using the internet to raise funds is fairly risk free, experts say.

According to an Interpol report prepared for the US House Committee on International Relations earlier this year, intellectual property crimes are indeed a growing resource for terrorist groups from Northern Ireland to the Arab world, including al-Qaeda and Hizbullah. Last year Interpol already called for a global crackdown on software and music piracy.

A couple of months ago the Recording Industry Association of America (RIAA) said it had evidence that illegal CD plants in Pakistan were financed by international terrorist Dawood Ibrahim, although some people have downplayed these claims as blatant propaganda.

But what about Nigerian scams? Could these seriously be a source of funding for terrorism? Or are terrorists merely copying their tactics?

To date, solid evidence for such claims hasn’t been presented publicly. In fact, the supposed link between Nigerian scammers and terrorists is still a matter of debate among experts. Some believe the cultural background of the perpetrators makes terrorism funding highly improbable. Others, such as Rachel Ehrenfeld, author of the book Funding Evil, say that as 50 per cent of the Nigerian population is Muslim, there is an ideological affiliation with some terrorist organisations. Hmm. A recent survey found that the proportion of Nigerian Muslims who view the United States favorably fell from more than 70 per cent to less than 40 per cent last year.

Ehrenfeld stresses that in many cases the collaboration is just financially motivated. "People who buy fake Gucci bags and Swiss watches sold by Nigerians on the sidewalks of Fifth Avenue in Manhattan contribute to terrorism," she claims.

The Dutch Unusual Transactions Reporting Office (MOT) believes there are some disturbing trends. Suspicious money transfers emanating from the European countries these days can often be linked to West African criminal networks, MOT concludes in its annual report. There also appear to be connections with the drugs trade.

Under the code name "Hyena", the Dutch criminal investigation department managed to freeze a total of €1m in bank accounts linked to Nigerian scams in the past couple of months, but it admits it is still only a very small part. ®

Related stories

Al-Qaeda computer geek nearly overthrew US
Al-Qaeda cyber terrorist panics US
'Electronic Jihad' fails to materialise
Terrorism at all-time low, US gov says
Warning: virus terrorism stories may contain nuts

Mobile application security vulnerability report

More from The Register

next story
NEW, SINISTER web tracking tech fingerprints your computer by making it draw
Have you been on YouPorn lately, perhaps? White House website?
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Black Hat anti-Tor talk smashed by lawyers' wrecking ball
Unmasking hidden users is too hot for Carnegie-Mellon
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
NUDE SNAPS AGENCY: NSA bods love 'showing off your saucy selfies'
Swapping other people's sexts is a fringe benefit, says Snowden
Own a Cisco modem or wireless gateway? It might be owned by someone else, too
Remote code exec in HTTP server hands kit to bad guys
prev story

Whitepapers

Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.