Counter-terrorist financing, cryptoassets, social media platforms, and suspicious activity reports: A step into the regulatory unknown
Presentation / Conference Contribution
This paper is divided into three parts. Firstly, the paper presents evidence how terrorism financiers are able to operate via the Internet and social media platforms. Secondly, it enhances the understanding of the use of Defence against Terrorism Fin... Read More about Counter-terrorist financing, cryptoassets, social media platforms, and suspicious activity reports: A step into the regulatory unknown.