Illicit Money : : Financing Terrorism in the Twenty-First Century / / Jessica Davis.

Terrorists need money . to recruit and train people, to buy weapons, to maintain safe houses, to carry out attacks. Which raises the question: how do they procure and protect funds to finance their operations? In Illicit Money, Jessica Davis thoroughly answers that question. Davis explores the full...

Full description

Saved in:
Bibliographic Details
Superior document:Title is part of eBook package: De Gruyter EBOOK PACKAGE COMPLETE 2021 English
VerfasserIn:
Place / Publishing House:Boulder : : Lynne Rienner Publishers, , [2022]
©2021
Year of Publication:2022
Language:English
Online Access:
Physical Description:1 online resource (265 p.)
Tags: Add Tag
No Tags, Be the first to tag this record!
id 9781626379930
lccn 2021016760
ctrlnum (DE-B1597)623040
(OCoLC)1312726501
collection bib_alma
record_format marc
spelling Davis, Jessica, author. aut http://id.loc.gov/vocabulary/relators/aut
Illicit Money : Financing Terrorism in the Twenty-First Century / Jessica Davis.
Boulder : Lynne Rienner Publishers, [2022]
©2021
1 online resource (265 p.)
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
text file PDF rda
Frontmatter -- Contents -- List of Tables and Figures -- Acknowledgments -- 1 Financing Terrorism -- Part 1 Raising Money -- 2 Finding Donors -- 3 Using and Abusing Organizations -- 4 Designing Business Models -- 5 Making Crime Pay -- Part 2 Using Money -- 6 Deploying Funds -- 7 Managing, Storing, and Investing Funds -- 8 Moving Funds -- 9 Obscuring Funds -- Part 3 New Frontiers -- 10 Stemming the Flow of Funds -- 11 Old Methods, New Technologies -- Bibliography -- Index -- About the Book
restricted access http://purl.org/coar/access_right/c_16ec online access with authorization star
Terrorists need money . to recruit and train people, to buy weapons, to maintain safe houses, to carry out attacks. Which raises the question: how do they procure and protect funds to finance their operations? In Illicit Money, Jessica Davis thoroughly answers that question. Davis explores the full spectrum of terrorist finance, drawing on extensive case studies to dissect how individuals, cells, and organizations raise and manage, as well as hide, funds. In her concluding chapters, she considers both opportunities and challenges related to countering these illicit activities.
Mode of access: Internet via World Wide Web.
In English.
Description based on online resource; title from PDF title page (publisher's Web site, viewed 02. Mai 2023)
Terrorism Finance.
POLITICAL SCIENCE / Terrorism. bisacsh
Title is part of eBook package: De Gruyter EBOOK PACKAGE COMPLETE 2021 English 9783110754001
Title is part of eBook package: De Gruyter EBOOK PACKAGE COMPLETE 2021 9783110753776 ZDB-23-DGG
Title is part of eBook package: De Gruyter EBOOK PACKAGE Political Science 2021 English 9783110754179
Title is part of eBook package: De Gruyter EBOOK PACKAGE Political Science 2021 9783110753943 ZDB-23-PLW
Title is part of eBook package: De Gruyter Lynne Rienner Press Complete eBook-Package 2021 9783110783520
print 9781555879824
https://doi.org/10.1515/9781626379930
https://www.degruyter.com/isbn/9781626379930
Cover https://www.degruyter.com/document/cover/isbn/9781626379930/original
language English
format eBook
author Davis, Jessica,
Davis, Jessica,
spellingShingle Davis, Jessica,
Davis, Jessica,
Illicit Money : Financing Terrorism in the Twenty-First Century /
Frontmatter --
Contents --
List of Tables and Figures --
Acknowledgments --
1 Financing Terrorism --
Part 1 Raising Money --
2 Finding Donors --
3 Using and Abusing Organizations --
4 Designing Business Models --
5 Making Crime Pay --
Part 2 Using Money --
6 Deploying Funds --
7 Managing, Storing, and Investing Funds --
8 Moving Funds --
9 Obscuring Funds --
Part 3 New Frontiers --
10 Stemming the Flow of Funds --
11 Old Methods, New Technologies --
Bibliography --
Index --
About the Book
author_facet Davis, Jessica,
Davis, Jessica,
author_variant j d jd
j d jd
author_role VerfasserIn
VerfasserIn
author_sort Davis, Jessica,
title Illicit Money : Financing Terrorism in the Twenty-First Century /
title_sub Financing Terrorism in the Twenty-First Century /
title_full Illicit Money : Financing Terrorism in the Twenty-First Century / Jessica Davis.
title_fullStr Illicit Money : Financing Terrorism in the Twenty-First Century / Jessica Davis.
title_full_unstemmed Illicit Money : Financing Terrorism in the Twenty-First Century / Jessica Davis.
title_auth Illicit Money : Financing Terrorism in the Twenty-First Century /
title_alt Frontmatter --
Contents --
List of Tables and Figures --
Acknowledgments --
1 Financing Terrorism --
Part 1 Raising Money --
2 Finding Donors --
3 Using and Abusing Organizations --
4 Designing Business Models --
5 Making Crime Pay --
Part 2 Using Money --
6 Deploying Funds --
7 Managing, Storing, and Investing Funds --
8 Moving Funds --
9 Obscuring Funds --
Part 3 New Frontiers --
10 Stemming the Flow of Funds --
11 Old Methods, New Technologies --
Bibliography --
Index --
About the Book
title_new Illicit Money :
title_sort illicit money : financing terrorism in the twenty-first century /
publisher Lynne Rienner Publishers,
publishDate 2022
physical 1 online resource (265 p.)
contents Frontmatter --
Contents --
List of Tables and Figures --
Acknowledgments --
1 Financing Terrorism --
Part 1 Raising Money --
2 Finding Donors --
3 Using and Abusing Organizations --
4 Designing Business Models --
5 Making Crime Pay --
Part 2 Using Money --
6 Deploying Funds --
7 Managing, Storing, and Investing Funds --
8 Moving Funds --
9 Obscuring Funds --
Part 3 New Frontiers --
10 Stemming the Flow of Funds --
11 Old Methods, New Technologies --
Bibliography --
Index --
About the Book
isbn 9781626379930
9783110754001
9783110753776
9783110754179
9783110753943
9783110783520
9781555879824
callnumber-first H - Social Science
callnumber-subject HV - Social Pathology, Criminology
callnumber-label HV6431
callnumber-sort HV 46431 D295 42021
url https://doi.org/10.1515/9781626379930
https://www.degruyter.com/isbn/9781626379930
https://www.degruyter.com/document/cover/isbn/9781626379930/original
illustrated Not Illustrated
dewey-hundreds 300 - Social sciences
dewey-tens 360 - Social problems & social services
dewey-ones 363 - Other social problems & services
dewey-full 363.325068/1
dewey-sort 3363.325068 11
dewey-raw 363.325068/1
dewey-search 363.325068/1
doi_str_mv 10.1515/9781626379930
oclc_num 1312726501
work_keys_str_mv AT davisjessica illicitmoneyfinancingterrorisminthetwentyfirstcentury
status_str n
ids_txt_mv (DE-B1597)623040
(OCoLC)1312726501
carrierType_str_mv cr
hierarchy_parent_title Title is part of eBook package: De Gruyter EBOOK PACKAGE COMPLETE 2021 English
Title is part of eBook package: De Gruyter EBOOK PACKAGE COMPLETE 2021
Title is part of eBook package: De Gruyter EBOOK PACKAGE Political Science 2021 English
Title is part of eBook package: De Gruyter EBOOK PACKAGE Political Science 2021
Title is part of eBook package: De Gruyter Lynne Rienner Press Complete eBook-Package 2021
is_hierarchy_title Illicit Money : Financing Terrorism in the Twenty-First Century /
container_title Title is part of eBook package: De Gruyter EBOOK PACKAGE COMPLETE 2021 English
_version_ 1770177204660994048
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04113nam a22007455i 4500</leader><controlfield tag="001">9781626379930</controlfield><controlfield tag="003">DE-B1597</controlfield><controlfield tag="005">20230502090707.0</controlfield><controlfield tag="006">m|||||o||d||||||||</controlfield><controlfield tag="007">cr || ||||||||</controlfield><controlfield tag="008">230502t20222021cou fo d z eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2021016760</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781626379930</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1515/9781626379930</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-B1597)623040</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1312726501</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-B1597</subfield><subfield code="b">eng</subfield><subfield code="c">DE-B1597</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">cou</subfield><subfield code="c">US-CO</subfield></datafield><datafield tag="050" ind1="0" ind2="0"><subfield code="a">HV6431</subfield><subfield code="b">.D295 2021</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">POL037000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">363.325068/1</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Davis, Jessica, </subfield><subfield code="e">author.</subfield><subfield code="4">aut</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Illicit Money :</subfield><subfield code="b">Financing Terrorism in the Twenty-First Century /</subfield><subfield code="c">Jessica Davis.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boulder : </subfield><subfield code="b">Lynne Rienner Publishers, </subfield><subfield code="c">[2022]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2021</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (265 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">text file</subfield><subfield code="b">PDF</subfield><subfield code="2">rda</subfield></datafield><datafield tag="505" ind1="0" ind2="0"><subfield code="t">Frontmatter -- </subfield><subfield code="t">Contents -- </subfield><subfield code="t">List of Tables and Figures -- </subfield><subfield code="t">Acknowledgments -- </subfield><subfield code="t">1 Financing Terrorism -- </subfield><subfield code="t">Part 1 Raising Money -- </subfield><subfield code="t">2 Finding Donors -- </subfield><subfield code="t">3 Using and Abusing Organizations -- </subfield><subfield code="t">4 Designing Business Models -- </subfield><subfield code="t">5 Making Crime Pay -- </subfield><subfield code="t">Part 2 Using Money -- </subfield><subfield code="t">6 Deploying Funds -- </subfield><subfield code="t">7 Managing, Storing, and Investing Funds -- </subfield><subfield code="t">8 Moving Funds -- </subfield><subfield code="t">9 Obscuring Funds -- </subfield><subfield code="t">Part 3 New Frontiers -- </subfield><subfield code="t">10 Stemming the Flow of Funds -- </subfield><subfield code="t">11 Old Methods, New Technologies -- </subfield><subfield code="t">Bibliography -- </subfield><subfield code="t">Index -- </subfield><subfield code="t">About the Book</subfield></datafield><datafield tag="506" ind1="0" ind2=" "><subfield code="a">restricted access</subfield><subfield code="u">http://purl.org/coar/access_right/c_16ec</subfield><subfield code="f">online access with authorization</subfield><subfield code="2">star</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Terrorists need money . to recruit and train people, to buy weapons, to maintain safe houses, to carry out attacks. Which raises the question: how do they procure and protect funds to finance their operations? In Illicit Money, Jessica Davis thoroughly answers that question. Davis explores the full spectrum of terrorist finance, drawing on extensive case studies to dissect how individuals, cells, and organizations raise and manage, as well as hide, funds. In her concluding chapters, she considers both opportunities and challenges related to countering these illicit activities.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: Internet via World Wide Web.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">In English.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Description based on online resource; title from PDF title page (publisher's Web site, viewed 02. Mai 2023)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Terrorism</subfield><subfield code="x">Finance.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">POLITICAL SCIENCE / Terrorism.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">EBOOK PACKAGE COMPLETE 2021 English</subfield><subfield code="z">9783110754001</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">EBOOK PACKAGE COMPLETE 2021</subfield><subfield code="z">9783110753776</subfield><subfield code="o">ZDB-23-DGG</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">EBOOK PACKAGE Political Science 2021 English</subfield><subfield code="z">9783110754179</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">EBOOK PACKAGE Political Science 2021</subfield><subfield code="z">9783110753943</subfield><subfield code="o">ZDB-23-PLW</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">Lynne Rienner Press Complete eBook-Package 2021</subfield><subfield code="z">9783110783520</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">print</subfield><subfield code="z">9781555879824</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1515/9781626379930</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://www.degruyter.com/isbn/9781626379930</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="3">Cover</subfield><subfield code="u">https://www.degruyter.com/document/cover/isbn/9781626379930/original</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">978-3-11-075400-1 EBOOK PACKAGE COMPLETE 2021 English</subfield><subfield code="b">2021</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">978-3-11-075417-9 EBOOK PACKAGE Political Science 2021 English</subfield><subfield code="b">2021</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">978-3-11-078352-0 Lynne Rienner Press Complete eBook-Package 2021</subfield><subfield code="b">2021</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_CL_SN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ECL_SN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EEBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ESSHALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_PPALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_SSHALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV-deGruyter-alles</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA11SSHE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA13ENGE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA17SSHEE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA5EBK</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-23-DGG</subfield><subfield code="b">2021</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-23-PLW</subfield><subfield code="b">2021</subfield></datafield></record></collection>