Illicit Money : : Financing Terrorism in the Twenty-First Century / / Jessica Davis.
Terrorists need money . to recruit and train people, to buy weapons, to maintain safe houses, to carry out attacks. Which raises the question: how do they procure and protect funds to finance their operations? In Illicit Money, Jessica Davis thoroughly answers that question. Davis explores the full...
Saved in:
Superior document: | Title is part of eBook package: De Gruyter EBOOK PACKAGE COMPLETE 2021 English |
---|---|
VerfasserIn: | |
Place / Publishing House: | Boulder : : Lynne Rienner Publishers, , [2022] ©2021 |
Year of Publication: | 2022 |
Language: | English |
Online Access: | |
Physical Description: | 1 online resource (265 p.) |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
9781626379930 |
---|---|
lccn |
2021016760 |
ctrlnum |
(DE-B1597)623040 (OCoLC)1312726501 |
collection |
bib_alma |
record_format |
marc |
spelling |
Davis, Jessica, author. aut http://id.loc.gov/vocabulary/relators/aut Illicit Money : Financing Terrorism in the Twenty-First Century / Jessica Davis. Boulder : Lynne Rienner Publishers, [2022] ©2021 1 online resource (265 p.) text txt rdacontent computer c rdamedia online resource cr rdacarrier text file PDF rda Frontmatter -- Contents -- List of Tables and Figures -- Acknowledgments -- 1 Financing Terrorism -- Part 1 Raising Money -- 2 Finding Donors -- 3 Using and Abusing Organizations -- 4 Designing Business Models -- 5 Making Crime Pay -- Part 2 Using Money -- 6 Deploying Funds -- 7 Managing, Storing, and Investing Funds -- 8 Moving Funds -- 9 Obscuring Funds -- Part 3 New Frontiers -- 10 Stemming the Flow of Funds -- 11 Old Methods, New Technologies -- Bibliography -- Index -- About the Book restricted access http://purl.org/coar/access_right/c_16ec online access with authorization star Terrorists need money . to recruit and train people, to buy weapons, to maintain safe houses, to carry out attacks. Which raises the question: how do they procure and protect funds to finance their operations? In Illicit Money, Jessica Davis thoroughly answers that question. Davis explores the full spectrum of terrorist finance, drawing on extensive case studies to dissect how individuals, cells, and organizations raise and manage, as well as hide, funds. In her concluding chapters, she considers both opportunities and challenges related to countering these illicit activities. Mode of access: Internet via World Wide Web. In English. Description based on online resource; title from PDF title page (publisher's Web site, viewed 02. Mai 2023) Terrorism Finance. POLITICAL SCIENCE / Terrorism. bisacsh Title is part of eBook package: De Gruyter EBOOK PACKAGE COMPLETE 2021 English 9783110754001 Title is part of eBook package: De Gruyter EBOOK PACKAGE COMPLETE 2021 9783110753776 ZDB-23-DGG Title is part of eBook package: De Gruyter EBOOK PACKAGE Political Science 2021 English 9783110754179 Title is part of eBook package: De Gruyter EBOOK PACKAGE Political Science 2021 9783110753943 ZDB-23-PLW Title is part of eBook package: De Gruyter Lynne Rienner Press Complete eBook-Package 2021 9783110783520 print 9781555879824 https://doi.org/10.1515/9781626379930 https://www.degruyter.com/isbn/9781626379930 Cover https://www.degruyter.com/document/cover/isbn/9781626379930/original |
language |
English |
format |
eBook |
author |
Davis, Jessica, Davis, Jessica, |
spellingShingle |
Davis, Jessica, Davis, Jessica, Illicit Money : Financing Terrorism in the Twenty-First Century / Frontmatter -- Contents -- List of Tables and Figures -- Acknowledgments -- 1 Financing Terrorism -- Part 1 Raising Money -- 2 Finding Donors -- 3 Using and Abusing Organizations -- 4 Designing Business Models -- 5 Making Crime Pay -- Part 2 Using Money -- 6 Deploying Funds -- 7 Managing, Storing, and Investing Funds -- 8 Moving Funds -- 9 Obscuring Funds -- Part 3 New Frontiers -- 10 Stemming the Flow of Funds -- 11 Old Methods, New Technologies -- Bibliography -- Index -- About the Book |
author_facet |
Davis, Jessica, Davis, Jessica, |
author_variant |
j d jd j d jd |
author_role |
VerfasserIn VerfasserIn |
author_sort |
Davis, Jessica, |
title |
Illicit Money : Financing Terrorism in the Twenty-First Century / |
title_sub |
Financing Terrorism in the Twenty-First Century / |
title_full |
Illicit Money : Financing Terrorism in the Twenty-First Century / Jessica Davis. |
title_fullStr |
Illicit Money : Financing Terrorism in the Twenty-First Century / Jessica Davis. |
title_full_unstemmed |
Illicit Money : Financing Terrorism in the Twenty-First Century / Jessica Davis. |
title_auth |
Illicit Money : Financing Terrorism in the Twenty-First Century / |
title_alt |
Frontmatter -- Contents -- List of Tables and Figures -- Acknowledgments -- 1 Financing Terrorism -- Part 1 Raising Money -- 2 Finding Donors -- 3 Using and Abusing Organizations -- 4 Designing Business Models -- 5 Making Crime Pay -- Part 2 Using Money -- 6 Deploying Funds -- 7 Managing, Storing, and Investing Funds -- 8 Moving Funds -- 9 Obscuring Funds -- Part 3 New Frontiers -- 10 Stemming the Flow of Funds -- 11 Old Methods, New Technologies -- Bibliography -- Index -- About the Book |
title_new |
Illicit Money : |
title_sort |
illicit money : financing terrorism in the twenty-first century / |
publisher |
Lynne Rienner Publishers, |
publishDate |
2022 |
physical |
1 online resource (265 p.) |
contents |
Frontmatter -- Contents -- List of Tables and Figures -- Acknowledgments -- 1 Financing Terrorism -- Part 1 Raising Money -- 2 Finding Donors -- 3 Using and Abusing Organizations -- 4 Designing Business Models -- 5 Making Crime Pay -- Part 2 Using Money -- 6 Deploying Funds -- 7 Managing, Storing, and Investing Funds -- 8 Moving Funds -- 9 Obscuring Funds -- Part 3 New Frontiers -- 10 Stemming the Flow of Funds -- 11 Old Methods, New Technologies -- Bibliography -- Index -- About the Book |
isbn |
9781626379930 9783110754001 9783110753776 9783110754179 9783110753943 9783110783520 9781555879824 |
callnumber-first |
H - Social Science |
callnumber-subject |
HV - Social Pathology, Criminology |
callnumber-label |
HV6431 |
callnumber-sort |
HV 46431 D295 42021 |
url |
https://doi.org/10.1515/9781626379930 https://www.degruyter.com/isbn/9781626379930 https://www.degruyter.com/document/cover/isbn/9781626379930/original |
illustrated |
Not Illustrated |
dewey-hundreds |
300 - Social sciences |
dewey-tens |
360 - Social problems & social services |
dewey-ones |
363 - Other social problems & services |
dewey-full |
363.325068/1 |
dewey-sort |
3363.325068 11 |
dewey-raw |
363.325068/1 |
dewey-search |
363.325068/1 |
doi_str_mv |
10.1515/9781626379930 |
oclc_num |
1312726501 |
work_keys_str_mv |
AT davisjessica illicitmoneyfinancingterrorisminthetwentyfirstcentury |
status_str |
n |
ids_txt_mv |
(DE-B1597)623040 (OCoLC)1312726501 |
carrierType_str_mv |
cr |
hierarchy_parent_title |
Title is part of eBook package: De Gruyter EBOOK PACKAGE COMPLETE 2021 English Title is part of eBook package: De Gruyter EBOOK PACKAGE COMPLETE 2021 Title is part of eBook package: De Gruyter EBOOK PACKAGE Political Science 2021 English Title is part of eBook package: De Gruyter EBOOK PACKAGE Political Science 2021 Title is part of eBook package: De Gruyter Lynne Rienner Press Complete eBook-Package 2021 |
is_hierarchy_title |
Illicit Money : Financing Terrorism in the Twenty-First Century / |
container_title |
Title is part of eBook package: De Gruyter EBOOK PACKAGE COMPLETE 2021 English |
_version_ |
1770177204660994048 |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04113nam a22007455i 4500</leader><controlfield tag="001">9781626379930</controlfield><controlfield tag="003">DE-B1597</controlfield><controlfield tag="005">20230502090707.0</controlfield><controlfield tag="006">m|||||o||d||||||||</controlfield><controlfield tag="007">cr || ||||||||</controlfield><controlfield tag="008">230502t20222021cou fo d z eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2021016760</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781626379930</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1515/9781626379930</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-B1597)623040</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1312726501</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-B1597</subfield><subfield code="b">eng</subfield><subfield code="c">DE-B1597</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">cou</subfield><subfield code="c">US-CO</subfield></datafield><datafield tag="050" ind1="0" ind2="0"><subfield code="a">HV6431</subfield><subfield code="b">.D295 2021</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">POL037000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">363.325068/1</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Davis, Jessica, </subfield><subfield code="e">author.</subfield><subfield code="4">aut</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Illicit Money :</subfield><subfield code="b">Financing Terrorism in the Twenty-First Century /</subfield><subfield code="c">Jessica Davis.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boulder : </subfield><subfield code="b">Lynne Rienner Publishers, </subfield><subfield code="c">[2022]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2021</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (265 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">text file</subfield><subfield code="b">PDF</subfield><subfield code="2">rda</subfield></datafield><datafield tag="505" ind1="0" ind2="0"><subfield code="t">Frontmatter -- </subfield><subfield code="t">Contents -- </subfield><subfield code="t">List of Tables and Figures -- </subfield><subfield code="t">Acknowledgments -- </subfield><subfield code="t">1 Financing Terrorism -- </subfield><subfield code="t">Part 1 Raising Money -- </subfield><subfield code="t">2 Finding Donors -- </subfield><subfield code="t">3 Using and Abusing Organizations -- </subfield><subfield code="t">4 Designing Business Models -- </subfield><subfield code="t">5 Making Crime Pay -- </subfield><subfield code="t">Part 2 Using Money -- </subfield><subfield code="t">6 Deploying Funds -- </subfield><subfield code="t">7 Managing, Storing, and Investing Funds -- </subfield><subfield code="t">8 Moving Funds -- </subfield><subfield code="t">9 Obscuring Funds -- </subfield><subfield code="t">Part 3 New Frontiers -- </subfield><subfield code="t">10 Stemming the Flow of Funds -- </subfield><subfield code="t">11 Old Methods, New Technologies -- </subfield><subfield code="t">Bibliography -- </subfield><subfield code="t">Index -- </subfield><subfield code="t">About the Book</subfield></datafield><datafield tag="506" ind1="0" ind2=" "><subfield code="a">restricted access</subfield><subfield code="u">http://purl.org/coar/access_right/c_16ec</subfield><subfield code="f">online access with authorization</subfield><subfield code="2">star</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Terrorists need money . to recruit and train people, to buy weapons, to maintain safe houses, to carry out attacks. Which raises the question: how do they procure and protect funds to finance their operations? In Illicit Money, Jessica Davis thoroughly answers that question. Davis explores the full spectrum of terrorist finance, drawing on extensive case studies to dissect how individuals, cells, and organizations raise and manage, as well as hide, funds. In her concluding chapters, she considers both opportunities and challenges related to countering these illicit activities.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: Internet via World Wide Web.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">In English.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Description based on online resource; title from PDF title page (publisher's Web site, viewed 02. Mai 2023)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Terrorism</subfield><subfield code="x">Finance.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">POLITICAL SCIENCE / Terrorism.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">EBOOK PACKAGE COMPLETE 2021 English</subfield><subfield code="z">9783110754001</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">EBOOK PACKAGE COMPLETE 2021</subfield><subfield code="z">9783110753776</subfield><subfield code="o">ZDB-23-DGG</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">EBOOK PACKAGE Political Science 2021 English</subfield><subfield code="z">9783110754179</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">EBOOK PACKAGE Political Science 2021</subfield><subfield code="z">9783110753943</subfield><subfield code="o">ZDB-23-PLW</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">Lynne Rienner Press Complete eBook-Package 2021</subfield><subfield code="z">9783110783520</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">print</subfield><subfield code="z">9781555879824</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1515/9781626379930</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://www.degruyter.com/isbn/9781626379930</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="3">Cover</subfield><subfield code="u">https://www.degruyter.com/document/cover/isbn/9781626379930/original</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">978-3-11-075400-1 EBOOK PACKAGE COMPLETE 2021 English</subfield><subfield code="b">2021</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">978-3-11-075417-9 EBOOK PACKAGE Political Science 2021 English</subfield><subfield code="b">2021</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">978-3-11-078352-0 Lynne Rienner Press Complete eBook-Package 2021</subfield><subfield code="b">2021</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_CL_SN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ECL_SN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EEBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ESSHALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_PPALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_SSHALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV-deGruyter-alles</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA11SSHE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA13ENGE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA17SSHEE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA5EBK</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-23-DGG</subfield><subfield code="b">2021</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-23-PLW</subfield><subfield code="b">2021</subfield></datafield></record></collection> |