Funding Modes of Terrorist Groups in the Digital Age: Challenges and Solutions Based on Information Technology
DOI:
https://doi.org/10.70710/sitj.v2i3.66Keywords:
Artificial Intelligence, Big Data Analytics, Blockchain, Cybercrime, Information Technology, Terrorism FinancingAbstract
The digital era has changed the landscape of terrorism financing, where information technology such as blockchain, crypto assets, and digital platforms are strategically used to disguise cash flows and evade authority surveillance. This study aims to identify and analyse the modus operandi of terrorist group funding in the digital age and formulate information technology-based solutions to address it. The approach used is qualitative, employing a literature review method, integrating Crime Script Analysis (CSA) theory to map the stages of crime and Rational Choice Theory (RCT) to understand the rational motives of perpetrators in choosing digital means. The research findings indicate that funding methods include using cryptocurrency through illegal exchanges, exploiting nominee accounts, misusing digital charitable institutions, and cross-border peer-to-peer money transfer systems. Blockchain provides high anonymity and cross-border flexibility, which are exploited to obscure transaction traces. The main challenges identified include regulatory limitations, a lack of interoperability in financial surveillance systems, and law enforcement agencies' low capacity to address high-tech crimes. As a response, this study proposes five technology-based solutions: Cyber Crime Big Data Analytics, the use of Artificial Intelligence (AI) in Open Source Intelligence (OSINT), the establishment of an integrated Command Centre, the enhancement of Data Surveillance systems, and the strengthening of national Data Centres. These solutions are believed to enhance the effectiveness of real-time prevention and detection of digital terrorism financing. This study recommends cross-sector collaboration and strategic investment in information technology development as the key to mitigating the threat of digital terrorism financing in the future.
Downloads
References
Abuza, Z. (2003). Funding terrorism in Southeast Asia: The financial network of Al Qaeda and Jemaah Islamiyah. Contemporary Southeast Asia, 25(2), 169–199. https://doi.org/10.1355/CS25-2A
Anggriawan, R., & Susila, M. E. (2024). Cryptocurrency and its Nexus with Money Laundering and Terrorism Financing within the Framework of FATF Recommendations. Novum Jus, 18(2), 249–277. https://doi.org/10.14718/NovumJus.2024.18.2.10novumjus.ucatolica.edu.co+1journals.centeriir.org+1
Anisa, I. V., & Syauqillah, M. (2022). Strategi kontra intelijen terhadap strategi pendanaan Jamaah Islamiyah melalui lembaga amal. Syntax Literate: Jurnal Ilmiah Indonesia, 7(4), 1925–1935. https://doi.org/10.36418/syntax-literate.v7i4.13086
Badan Siber dan Sandi Negara (BSSN). Laporan Honeynet Project. Jakarta: BSSN, 2020.
Bappebti. (2023). Laporan Tahunan Bappebti 2023. Badan Pengawas Perdagangan Berjangka Komoditi.
Becker, G. S. (1976). The Economic Approach to Human Behavior. University of Chicago Press.
Becker, G.S. “Crime and Punishment: An Economic Approach.” Journal of Political Economy 76, no. 2 (1968): 169–217.
Bellucci, L., Carminati, B., & Ferrari, E. (2021). Detecting financial frauds using graph databases and machine learning. Future Generation Computer Systems, 123, 393–403. https://doi.org/10.1016/j.future.2021.04.009
Brito, J., & Castillo, A. (2013). Bitcoin: A primer for policymakers. Mercatus Center at George Mason University.
Carlisi, C., & De Feo, M. (2023). Cryptocurrencies, anonymity and counter-terrorism financing: The case of Monero and ISKP. Journal of Financial Regulation and Compliance, 31(2), 184–198. https://doi.org/10.1108/JFRC-12-2022-0092
Charities Aid Foundation. World Giving Index 2024. London: CAF, 2024.
Chen, Y., Qin, Z., Zhang, B., & Wu, C. (2020). Big data analytics for detecting terrorist financing: A survey. IEEE Access, 8, 47466–47480. https://doi.org/10.1109/ACCESS.2020.2978834
Clarisa Permata Hariono & Go Lisanawati. (2022). Peran Teknologi Finansial Dalam Pencegahan Pendanaan Terorisme. Jurnal Iustitia Omnibus, 4(1), 71–85.
Cornish, D. B., & Clarke, R. V. (2008). The Rational Choice Perspective. In R. Wortley & L. Mazerolle (Eds.), Environmental Criminology and Crime Analysis (pp. 21–47). Willan Publishing.
Cornish, D.B. “The Procedural Analysis of Offending and Its Relevance for Situational Crime Prevention.” Crime Prevention Studies 3 (1994): 151–196.
Detik.com. (2024, Januari 24). Penggalang dana teroris di Lampung dihukum 5 tahun penjara. https://news.detik.com/berita/d-7154171/penggalang-dana-teroris-di-lampung-dihukum-5-tahun-penjara
Durrant, R. (2020). Blockchain and cryptocurrencies: Opportunities and challenges for counter-terrorism financing. Journal of Financial Crime, 27(4), 1173–1186. https://doi.org/10.1108/JFC-03-2020-0044
Durrant, R. “Blockchain and Cryptocurrencies: Opportunities and Challenges for Counter-Terrorism Financing.” Journal of Financial Crime 27, no. 4 (2020): 1123–1135.
Elliptic. (2019). Hamas-linked wallets have received $7.7 million in cryptoassets. Elliptic. Retrieved from https://www.elliptic.co/blog/hamas-linked-wallets-received-millions-in-cryptoassets
Europol. (2022). Cryptocurrency laundering by terror groups: Privacy coins and forensic challenges. European Union Agency for Law Enforcement Cooperation.
FATF. (2021). Opportunities and Challenges of New Technologies for AML/CFT. Financial Action Task Force. https://www.fatf-gafi.org
Ferwerda, J. (2019). The effectiveness of anti-money laundering policy: A cost-benefit approach. Journal of Money Laundering Control, 22(2), 210–221. https://doi.org/10.1108/JMLC-11-2017-0060
FinCEN. (2023). Advisory on the Use of Virtual Currency for Terrorist Financing. U.S. Department of the Treasury. https://www.fincen.gov/
Foley, S., Karlsen, J. R., & Putniņš, T. J. (2019). Sex, drugs, and bitcoin: How much illegal activity is financed through cryptocurrencies? The Review of Financial Studies, 32(5), 1798–1853. https://doi.org/10.1093/rfs/hhy074
Global Relief Foundation. (2002). Designation of the Global Relief Foundation as a financial supporter of terrorism. U.S. Department of the Treasury. https://home.treasury.gov/news/press-releases/po3631
Honeynet Project. (2020). Indonesia Cyber Threat Report. https://www.honeynet.or.id
Internet World Stats. (2021). World Internet Usage and Population Statistics. https://www.internetworldstats.com
Internet World Stats. World Internet Usage and Population Statistics. 2021.
Interpol. (2022). Global Crime Trend Report. https://www.interpol.int
Kejaksaan Agung Republik Indonesia. (2024). Laporan Tahunan Kejaksaan Agung RI: Analisis Kejahatan Siber dan Keuangan Tahun 2024. https://www.kejaksaan.go.id/
Kethineni, S., & Cao, Y. (2020). The rise in popularity of cryptocurrency and associated criminal activity. International Criminal Justice Review, 30(3), 325–344.
Kohlmann, E. F. (2006). Charitable organizations and terrorism financing: A war on terror status-check. The Danish Institute for International Studies. https://www.diis.dk/files/media/publications/import/extra/charitableorganizations_and_terrorismfinancing_ek.pdf
Kompas.com. (2017, September 27). Dua dari 18 WNI simpatisan ISIS jadi tersangka kasus pendanaan terorisme. https://nasional.kompas.com/read/2017/09/27/19055401/dua-dari-18-wni-simpatisan-isis-jadi-tersangka-kasus-pendanaan-terorisme
Kompas.com. (2022, Mei 11). Dua dari lima WNI yang disanksi AS terkait pendanaan ISIS merupakan mantan narapidana teroris. https://nasional.kompas.com/read/2022/05/11/13294211/dua-dari-lima-wni-yang-disanksi-as-terkait-pendanaan-isis-merupakan-mantan.
Kshetri, N. (2018). 1 The emerging role of big data in key development issues: Opportunities, challenges, and concerns. Big Data for Development, 3(1), 10–24.
Levi, M., & Maguire, M. (2004). Reducing and preventing organized crime: An evidence-based critique. Crime, Law and Social Change, 41(5), 397–469. https://doi.org/10.1023/B:CRIS.0000039582.04270.a4
Levitt, M. (2014). Hezbollah: Financing Terror through Criminal Enterprise. In J. K. Giraldo & H. A. Trinkunas (Eds.), Terrorism Financing and State Responses. Stanford University Press.
Maimbo, S. M., & Passas, N. (2005). Remittances and Economic Development in Somalia. World Bank Working Paper.
Moustafa, N., Slay, J., & Creech, G. (2019). Big data analytics for intrusion detection: A survey. Journal of Big Data, 6(1), 1–33. https://doi.org/10.1186/s40537-019-0192-5
OJK. (2024). Transformasi Pengawasan OJK terhadap Inovasi Keuangan Digital. Otoritas Jasa Keuangan.
PPATK. (2022). Penilaian Risiko Organisasi Nirlaba dalam Pendanaan Terorisme. Jakarta: Pusat Pelaporan dan Analisis Transaksi Keuangan. https://www.ppatk.go.id
PPATK. (2024). Laporan Tahunan PPATK 2023. Pusat Pelaporan dan Analisis Transaksi Keuangan. https://www.ppatk.go.id/
Prasetya, A. Y., Subroto, A., & Nurish, A. (2021). Model Pendanaan Terorisme Melalui Media Cryptocurrency. Journal of Terrorism Studies, 3(1), Article 3. https://doi.org/10.7454/jts.v3i1.1030Scholar Hub+2Scholar Hub+2Journal Portal+2
Putri, C. P. H., & Lisanawati, G. (2022). Peran Teknologi Finansial Dalam Pencegahan Pendanaan Terorisme. Jurnal Hukum IUS QUIA IUSTUM, 30(1), 70–90. https://doi.org/10.20885/iustum.vol30.iss1.art4Journal Portal
Ramadianto, A. R., & Wicaksono, B. A. (2023). Countering The Crimes of Money Laundering and Terrorism Financing in Indonesia Digital Banking: A Legal Approach Perspectives. Indonesian Journal of Counter Terrorism and National Security, 2(2). https://doi.org/10.15294/ijctns.v2i2.66841Universitas Negeri Semarang Journal
Reitano, T., & Shaw, M. (2020). Illicit financial flows and terrorism financing in fragile states. Global Initiative Journal on Organized Crime, 5(1), 1–17.
Republik Indonesia. (2013). Undang-Undang Nomor 9 Tahun 2013 tentang Pencegahan dan Pemberantasan Tindak Pidana Pendanaan Terorisme. Lembaran Negara Republik Indonesia Tahun 2013 Nomor 87.
Rizky, F., & Sari, N. (2022). Eks-napiter dan kejahatan keuangan: Studi kasus keterlibatan dalam pendanaan ISIS. Jurnal Ilmu Kriminologi Indonesia, 3(2), 118–135.
Setiawan, A., & Hartono, D. (2020). Cybersecurity readiness in Indonesia: A critical review. Indonesian Journal of Cyber Security, 2(1), 15–29.
Shahbaz, M., Gao, J., & Zhai, L. (2022). Role of national cybersecurity centers in combating terrorism financing. Journal of Strategic Security, 15(3), 35–52.
Shapiro, J., & Siegel, D. (2021). Financial crimes and cryptocurrency in Asia-Pacific: Risks and responses. Journal of Financial Crime, 28(4), 1169–1185. https://doi.org/10.1108/JFC-12-2020-0237.
Sirait, R. A., & Rangkuti, E. Y. (2023). Pencegahan pendanaan terorisme oleh yayasan amal di Indonesia. Jurnal Hukum Universitas Sumatera Utara, 11(2), 210–222. https://jurnal.usu.ac.id/jhu/article/view/11456
SuaraIndo.id. (2021, Agustus 30). Dari koin jadi pelor: Jalur teroris menghimpun dana. https://www.suaraindo.id/2021/08/dari-koin-jadi-pelor-jalur-teroris-menghimpun-dana
The Conversation. (2020, Februari 28). Yang tidak kalah penting dari isu kepulangan simpatisan ISIS: Mengawasi arus keuangan mereka. https://theconversation.com/yang-tidak-kalah-penting-dari-isu-kepulangan-simpatisan-isis-mengawasi-arus-keuangan-mereka-132972
Thomas, D., Al-Khateeb, S., & Yu, J. (2021). Cybercrime and digital security: The evolving threat landscape. Journal of Information Security, 12(3), 123–137.
TRM Labs. (2024). Crypto and Terrorism: The Rise of ISIS-K’s Digital Financing. https://www.trmlabs.com/resources/blog/terrorist-financing-six-crypto-related-trends-to-watch-in-2023.
UN Security Council. (2004). Report of the Monitoring Group on Al-Qaeda and the Taliban (S/2004/679). https://undocs.org/S/2004/679.
U.S. Department of Justice. (2020, August 13). Global disruption of three terrorist financing cyber-enabled campaigns. https://www.justice.gov/opa/pr/global-disruption-three-terror-finance-cyber-campaigns.
UU No. 9 Tahun 2013 tentang Pencegahan dan Pemberantasan Tindak Pidana Pendanaan Terorisme.
van Wegberg, R., de Graaf, K., & Kleemans, E. (2018). Cryptocurrency and criminality: A research agenda. Trends in Organized Crime, 21(3), 270–286. https://doi.org/10.1007/s12117-018-9325-6.
Whyte, C. (2019). Cryptoterrorism: Assessing the utility of blockchain technologies for terrorist enterprise. Studies in Conflict & Terrorism, 44(2), 99–121. https://doi.org/10.1080/1057610X.2018.1531565
Wijayanto, S., & Pramono, A. D. (2021). Analisis Peran Fintech dalam Modus Pendanaan Terorisme Digital di Indonesia. Jurnal Keamanan Nasional, 7(2), 134–152.
Wirtz, B. W., Weyerer, J. C., & Geyer, C. (2018). Artificial Intelligence and the public sector—Applications and challenges. International Journal of Public Administration, 42(7), 596–615. https://doi.org/10.1080/01900692.2018.1498103.
World Bank. “Data berdasarkan International Telecommunication Union (ITU).” 2021.
Yulianti, D., & Nachrawi, N. (2024). Analisis yuridis terhadap pendanaan terorisme oleh kelompok Jamaah Islamiyah dalam putusan No. 308/PID.SUS/2020. Jurnal Hukum & Keamanan Nasional, 9(1), 45–60. https://doi.org/10.31000/jhkn.v9i1.19200
Yulianti, T., & Nachrawi, G. (2022). Modus Pendanaan Terorisme oleh Jamaah Islamiyah Berdasar UU No. 5 Tahun 2018: Analisis Putusan No. 308/PID.SUS/2020/PN JKT.TIM. IBLAM Law Review, 4(3). https://doi.org/10.52249/ilr.v4i3.454
Zelin, A. Y. (2020). The Jihadist Governance Dilemma: Hay’at Tahrir al-Sham and the Challenge of Local Legitimacy. Washington Institute for Near East Policy. https://www.washingtoninstitute.org/policy-analysis/jihadist-governance-dilemma
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Security Intelligence Terrorism Journal (SITJ)

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.






