Professional Documents
Culture Documents
JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide
range of content in a trusted digital archive. We use information technology and tools to increase productivity and
facilitate new forms of scholarship. For more information about JSTOR, please contact support@jstor.org.
Your use of the JSTOR archive indicates your acceptance of the Terms & Conditions of Use, available at
https://about
jstor .org/terms
lan Oxford University Press is collaborating with JSTOR to digitize, preserve and extend access
& 3) to The British Journal of Criminology
s
JSTOR
This content downloaded from 210.57.215.174 on Fri, 03 Nov 2023 09:03 48 +00:00
All use subject to hitps://about jstor.org/terms
d0i:10.1093/bjc/azw057 BRIT. J. CRIMINOL. (2016) 56, 1125-1145
Advance Access publication 2 August 2016
After 9/11, international counter terrorism financing efforts have delivered measures under both
a criminal justice model and a regulatory risks model. Questions therefore arise about the delivery
of justice within these respective models, alongside doubts about their capacity to yield meaningful
impacts from an ‘all risks’ platform rather than a targeted criminal suspect approach. Particular
reference is made to informal value transfer systems, such as hawala, which have come under sus-
tained suspicion. This article presents original insights from a fildwork survey of UK counter ter-
rorism legislation and practices in order to assess their intended and, to some extent, unintended
consequences.
*Karen Cooper, School of Law, Liverpool John Moores University, Brownlow Hill, Liverpool L3 5UG, UK; Clive Walker,
Centre for Criminal Justice Studies, School of Law, University of Leeds, Leeds LS2 9JT, UK; law6cw@leeds.ac.uk.
1125
© The Author 2016, Published by Oxford University Press on behalf of the Centre for Crime and Justice Studies (ISTD).
All rights reserved. For permissions, please e-mail: journals.permissions@oup.com
This content downloaded from 210.57.215.174 on Fri, 03 Nov 2023 09:03 48 +00:00
All use subject to hitps://about jstor.org/terms
COOPER AND WALKER
This content downloaded from 210.57.215.174 on Fri, 03 Nov 2023 09:03 48 +00:00
All use subject to hitps://about jstor.org/terms
SECURITY FROM TERRORISM FINANCING
1127
This content downloaded from 210.57.215.174 on Fri, 03 Nov 2023 09:03 48 +00:00
All use subject to hitps://about jstor.org/terms
COOPER AND WALKER
combining transactions into bulk payments for ease and efficiency in the ‘settlement’
process between hawaladars, potentially also involving third parties and beneficiar-
ies who can readily remain anonymous. These operational characteristics obscure the
totality of information relating to the entire transactions process, exacerbated by idio-
syncratic and non-standardized record-keeping (Thompson 2007: 297) with data often
only retained until the transaction is complete (de Goede 2003: 532). These practices
contribute to a lack of transaction transparency and so limit investigation of suspi-
cious transactions. System cohesion is founded on reciprocal trust between hawaladars
which derives from shared ethnicity, religion, social standing and business connections
(Bowers 2009: 383-5) and reduces the need for close scrutiny of the identity of par-
ties, source of funds or transaction purpose, the verification of which are de rigueurin
Western systems.
IVTS remain important vehicles for the delivery of financial support from migrant
diaspora to developing countries (UK Remittance Working Group 2005: 1). They are
also important conduits facilitating access to financial services to remote areas without
banking facilities and enable the delivery of humanitarian aid to areas of conflict and
natural disaster. For such populations, IVTS assist financial inclusion and consequent
financial security. Worldwide remittance volumes through the more formal portion
of the IVTS sector (involving some connection with formal regulated systems) were
estimated at $582 billion in 2014, with $435 billion received by developing countries
(World Bank 2014); the informal sector is estimated conservatively to involve at least
half that of formal flows (World Bank 2011: 19). The accompanying unease about ter-
rorism insecurity and the more general undermining of the regulatory protection of
the formal financial sector is shared by UK regulators, given that the United Kingdom
is a significant remittance-sending state (World Bank 2011). The United Kingdom has a
Muslim population of 2.7 million, with other ethnic groups associated with remittance
cultures (such as East Africans) adding to this cohort (Office for National Statistics
2012: 7). One in four UK remitters was born in the United Kingdom, suggesting that
the cultural tradition of migrant remittances may be transferred across generations
(Boon 2006: 160). Against this backdrop, UK remittance outflows are to areas of regu-
latory concern, mainly India, Nigeria and Pakistan, total around £2bn (UK Remittance
‘Working Group 2005; Amjad 2013; World Bank 2014).
Prior to 9/11, IVTS were largely unregulated in the United Kingdom and elsewhere
(FATF 2005: 5). However, in view of the suspicions triggered by terrorism (Passas 2006),
this era was hastened to an end. The FATF, founded in 1989 by the (then) G7, has set the
international standard for the formalization of IVTS, through a ‘soft law’ approach, sig-
nalled by its nine Special Recommendations adopted on 29 and 30 October 2001. FATF
Special Recommendation VI (now recommendation 14, as consolidated in 2012) com-
mits members to ‘Impose anti-money-laundering requirements on alternative remit-
tance systems’ (FATF 2010; 2013). This edict has reverberated around the globe, with
major security and social consequences.
In the United States, allegations against Al Barakaat, the principal Somali-based
remittance operator, prompted its sanctions listing (from 2001 to 2012) by the UN,
leading to the collapse of its business. The extent to which this action was lawful,
fair or effective in stemming terrorism financing has since been questioned on the
grounds that measures may have adversely undermined humanitarian purposes and
in light of the lack of consideration as to their impact on financial inclusion and the
1128
This content downloaded from 210.57.215.174 on Fri, 03 Nov 2023 09:03 48 +00:00
All use subject to hitps://about jstor.org/terms
SECURITY FROM TERRORISM FINANCING
lack of congruence with the holistic and developmental approach of the human secu-
rity framework (Scheinin 2007: para. 48; Donohue 2008: ch. 3; Heupel 2013). In the
United Kingdom, IVTS were viewed as being subject to ‘witting and unwitting’ misuse
(HM Treasury 2006: para.6.2), a risk underlined by subsequent investigations but not
by any prosecutions (HM Revenue & Customs 2009: para. 9). The official response was
to regulate them as MSB pursuant to EC Money Laundering Directives, the latest of
which, the Money Laundering Regulations 2007 (MLR 2007), apply the Third Directive
(2005/60/EC). Whether these national responses amount to the fair and effective man-
agement of risk will be considered after a brief survey of the alternative CJM.
1129
This content downloaded from 210.57.215.174 on Fri, 03 Nov 2023 09:03 48 +00:00
All use subject to hitps://about jstor.org/terms
COOPER AND WALKER
of justice and the legitimacy. The precise and robust standard of criminal proof and
procedural rules relating to disclosure might be at odds with security agency objectives
in drawing on intelligence for use in disruptive activities, where such sensitive material
is never intended for public disclosure (Walker 2006). Indeed, the CJM may sometimes
be deployed as an instrument to facilitate intelligence-gathering rather than prosecu-
tions, through the ‘far reaching’ criminal offences in the Terrorism Act 2000 which
compel the production of information from the financial sector (in sections 19 and
21A-D), extended further (by the Counter Terrorism Act 2008, section 77) to include
information received in the course of a trade, profession, business or employment and
charitable sector.
Given this clash of objectives, it follows that the success of the CJM in delivering
security and deterrence in respect of terrorism is questionable. Notably, there have
been few prosecutions for terrorist funding offences, with only 16 convictions under
the Terrorism Act 2000 for the period 2001-12 (Home Office 2012), though criminal
provisions under the Proceeds of Crime Act 2002 remain an option (King and Walker
2015). Notably no conviction has been reported within the regulated hawala sector, yet
it is still reckoned to be vulnerable and ‘high risk’ (National Crime Agency 2013; 2014:
11), and so terrorist financing offences are still considered important sites for investiga-
tion and disruption of terrorism (Sproat 2010: 321).
This content downloaded from 210.57.215.174 on Fri, 03 Nov 2023 09:03 48 +00:00
All use subject to hitps://about jstor.org/terms
SECURITY FROM TERRORISM FINANCING
The UNSCR 1267 regime outlined earlier is enforced in the United Kingdom by
the Afghanistan (Asset-Freezing) Regulations (2011) and the Al-Qaida Asset Freezing
Regulations (2011). Listing decisions are made by the UN Security Council, with listing
being open-ended, save for a mandatory three year review. The UNSCR 1267 regime
has been much condemned for its minimal transparency and fairness. The initial list-
ing does not identify the proposing state authority, disclose detailed reasons for listing,
or tolerate rights of defence to advocate delisting. The UN Security Council, a remote
intergovernmental institution, is more familiar with handling wayward governments
through diplomatic channels than according quasi-judicial protections to individuals.
No system of review or removal existed for those affected until 2006. The subsequent
appointment of an Ombudsperson (UNSCR 1904 of 17 December 2009) has secured a
more accessible delisting process but still fails to offer minimum due process guaran-
tees. This deficiency has caused tensions with the expectations as to individual rights
specified by the European Court of Justice (European Commission v Kadi 2013b) and the
European Court of Human Rights (Al-Dulimi 2016). The absence of forensic testing and
detailed explanations relating to listings are questioned as to their effective contribu-
tion to security, and their considerable cost to individual rights and personal security is
indubitable, as the Al Barakaat case demonstrates.
The same controversies have affected the next two sanctions listing systems. The
European Union reinforced UNSCR 1373 by deploying Council Common Position
2001/931/CFSP, which requires another listing and asset freezing system to address ter-
rorism extending beyond the borders of one member state (Eckes 2009; Cameron 2013).
Enforcement by Council Regulation (EC) 258072001 of 27 December 2001 is directly
binding on member states, supported by national criminal sanctions. Regulation
2580/2001 targets European-specific terrorist groups which present a European-wide
threat—mainly secessionists and some international terrorist organizations. A work-
ing party examines proposals for listing (and delisting) on nomination by a state’s
‘Competent Authority’ (such as the UK’s HM Treasury) with a six monthly review of the
entire list. Once again, the fairness of the processes has been found wanting (People’s
‘Mojahedin Organization of Iran 2011).
Within the United Kingdom, enforcement of European Union autonomous sanctions
is provided under the Terrorist Asset Freezing etc Act 2010 (TAFA 2010), which also
affords HM Treasury an independent power to select subjects to be sanctioned—mostly
involving persons charged or convicted of terrorism offences in the United Kingdom
(Anderson 2014). Listing under TAFA 2010 is more rigorous and subject to more due
process than under the supranational codes. Section 2 requires reasonable belief that
the person is or has been involved in terrorism activity, with the order being necessary
for the protection of members of the public. Nevertheless, the listing decision is by the
Secretary of State (and not a court) and draws on a looser range of intelligence than the
evidential standards required of the CJM. Whilst listing decisions are subject to appeal
to the High Court (TAFA 2010, section 26), concerns about security sensitive material
can involve proceedings being closed to the suspect.
The amounts frozen under these schemes remain modest: for TAFA 2010, £15,000 in
relation to 36 accounts; for the UN regime, £60,000 in respect of 33 accounts; under the
EU regime £11,000 in relation to 10 accounts (Hansard 2016). Whilst few are affected
(18 individuals and 7 entities and cash amounts are ‘remarkably low’ (Anderson 2014:
para. 2.24), small sums can still impact on contemporary terrorism which often lacks
1131
This content downloaded from 210.57.215.174 on Fri, 03 Nov 2023 09:03 48 +00:00
All use subject to hitps://about jstor.org/terms
COOPER AND WALKER
1132
This content downloaded from 210.57.215.174 on Fri, 03 Nov 2023 09:03 48 +00:00
All use subject to hitps://about jstor.org/terms
SECURITY FROM TERRORISM FINANCING
and even then should reflect competitive neutrality, cost effectiveness, transparency,
flexibility and accountability (Siminova 2011: 346).
Given that, in 2005, a fifth of the 246 money laundering investigations by HMRC
concerned MSBs (HM Treasury 2006: 17), the imposition of regulation has aimed
to deter transgressions by creating a ‘hardening of the environment’ (HM Treasury
2006: 12). At the same time, an initial tailoring of regulation still aimed for regulation
‘from below’ by being ‘deliberately light-touch, with further focus on education and
outreach’, to promote 'a vibrant and competitive MSB sector’ and embracing MSBs
as ‘active partners in the fight against crime and terrorism’ (HM Treasury 2006: 5, 6).
However, the ‘regulatory bite’ later hardened the environment by additional regula-
tory demands and enforcement aimed to exclude those whose standards were viewed
as too risky.
The MLR 2007 enforce the core of the UK’s RRM, requiring IVTS operators to
be registered as MSBs. Following an IMF review in 2011 (IMF 2011, para. 43), MSB
business owners must satisfy a ‘fit and proper’ test (Money Laundering (Amendment)
Regulations 2012, regulations 26, 28 and 30), while regulations 10 and 11 afford
broader grounds for exclusion, adding to grounds such as relevant convictions, confis-
cations and regulatory breaches to include potential insecurity from business owners
‘with regard to the risk of money laundering or terrorist financing’. Research findings
indicate that MSBs perceive the ‘fit and proper test’ to be weak in deterring potentially
unsuitable entrants (Cooper 2014: 268), suggestive that entry barriers might be circum-
vented by vesting control in others behind the scenes.
The MLR 2007 require registration of all UK MSB business premises and agents,
with MSB owners/senior managers required to risk assess their business risks relat-
ing to money laundering and terrorist financing, reflecting risk mitigation manage-
ment strategies within an AML compliance policy. A Money Laundering Reporting
Officer must be appointed, having overall responsibility for Suspicious Activity Reports
(SARs—considered later), staff training and oversight of AML and regulatory compli-
ance. The MLR 2007 set out tiers of due diligence standards to be applied, pursuant to
stipulated conditions, and now requires the maintenance and retention of transaction
records for a minimum of five years.
Given the widespread suspicion relating to IVTS after 9/11, regulation was regarded
as a necessary protection against misuse, especially because many MSBs operated as
small local or regional businesses (HM Treasury 2006: 9). However, unfairness in the
application of the regulations potentially emerges in the disproportionate targeting of
MSBs, who lack the resources of major financial businesses to handle the regulatory
impositions. This unfairness was reflected in the research interviews, whereby the sec-
tor support for regulation was said to be undermined by the treatment of the sector in
line with other financial institutions, without an appreciation of differential markets,
resources, operation logistics and capital resources (Cooper 2014: 270, 281). The impact
of the changing regulatory environment has reportedly reduced operators at the lower
end of the sector, limited access to the sector and professionalized the sector by having
‘chopped out the very bottom part of the market’ and some smaller operators (Cooper
2014: 273) because of the additional expertize required to ensure regulatory compli-
ance. As a result, some MSBs had sought the security of agency status and oversight
by a larger principal business (Cooper 2014: 272), and some had gone out of business
altogether (John Howell & Co 2016: 49). The regulatory framework was considered to
1133
This content downloaded from 210.57.215.174 on Fri, 03 Nov 2023 09:03 48 +00:00
All use subject to hitps://about jstor.org/terms
COOPER AND WALKER
have impacted in a disproportionately negative way on these smaller MSBs which had
previously dominated the sector, while larger businesses were able to absorb the extra
demands of regulation. (Cooper 2014: 270). These regulatory effects have potentially
reshaped the sector, leading to the dominance of an agency franchise model, with
principals supervising form the ‘top down’ and drawing on their additional resources
to support compliance by their agents at the bottom.
The MLR 2007 rely on a risk-based approach (FATF 2009: 7) which should theoreti-
cally enable its fair and proportionate application to all businesses regardless of size,
accommodating the diverse range of MSBs (remittance forwarding, cheque cashing or
bureaux de change), and the diverse profiles of remittance users and corridors served.
One interviewee estimated that the effectiveness of the regulatory framework came
from the general deterrence and the extent of the RRM (Cooper 2014: 264). Regulatory
effectiveness by being linked to breadth and volume rather than the specific value of
tailored measures, means that the policy of promoting a level regulatory playing field is
harder to achieve in the smaller-scale MSB sector.
Regulatory adjustment has presented a further challenge in response to changing
sectoral risk, since adequate risk management is a dynamic and ongoing process requir-
ing a constant revision of guidance to the sector and its responses (Cooper 2014: 271).
Almost all surveyed businesses reported significant increased compliance costs, which,
as fixed costs, disproportionately affect businesses with smaller capital bases (Cooper
2014: 271).
In addition, due diligence linked to the risk of terrorism financing demands consid-
erable effort in respect of enhanced risks associated with the specific receiving loca-
tions, or the risk from known areas of terrorist activity, examples being Pakistan and
the Horn of Africa. Additionally, remittance activity peaks in conjunction with reli-
gious festivals and related charitable donations, where guidance requires enhanced
due diligence (EDD) in response to transaction values which exceed the total average
value of remittances (HMRC 2014: para. 8.16) or where transactions make no commer-
cial sense and regardless of the individual’s customer profile. EDD is inevitably oner-
ous at peak remittance periods, for what are essentially high volume, low value and low
profit transactions.
Supervisory guidance should be such that it informs sector risk assessment, but it can
only apply efficiently if clear, accessible and evidence-based. However, several interview-
ees commented on the lack of consistency in on-site supervisory audits and guidance,
even questioning the knowledge and experience of the supervisory teams. Where fur-
ther advice was sought, it was not always forthcoming or clear, leaving businesses uncer-
tain as to the sufficiency of their compliance but mindful of potential consequences if
later determined to be deficient (Cooper 2014: 276). In some instances, guidance was
perceived as inaccessible due to lack of specificity, vagueness and differences in subjec-
tive viewpoints, and these features dampened the motivation of the MSBs to be compli-
ant (Cooper 2014: 265, 266).
As with regulation from above as to asset freezing, the tests of effectiveness and fair-
ness as applied to the MSB regulatory regime are difficult to assess, given the diversity
of the sector in terms of size and function and the restrictions on data collection by
regulators and its accessibility to researchers. The government, however, remains com-
mitted to keeping under review the regulatory burden on business (Home Office and
HM Treasury 2016).
1134
This content downloaded from 210.57.215.174 on Fri, 03 Nov 2023 09:03 48 +00:00
All use subject to hitps://about jstor.org/terms
SECURITY FROM TERRORISM FINANCING
Cross-cutting issues
This section of the article explores aspects of the human security concerns referred to
earlier that are consequential to the application of counter terrorism finance policy but
do not directly ‘fit’ within just one of the regulatory models presented. The two cross-
cutting aspects considered in this section of the paper relate to the practical operation
of IVTS in the United Kingdom. One relates to the filing of SARs (Home Office 2005).
The second concerns the impacts of both Models for financial inclusion and the cur-
rent ‘de-risking’ by financial institutions which potentially yields economic insecurity
for some minority ethnic groups.
1135
This content downloaded from 210.57.215.174 on Fri, 03 Nov 2023 09:03 48 +00:00
All use subject to hitps://about jstor.org/terms
COOPER AND WALKER
1136
This content downloaded from 210.57.215.174 on Fri, 03 Nov 2023 09:03 48 +00:00
All use subject to hitps://about jstor.org/terms
SECURITY FROM TERRORISM FINANCING
In line with the foregoing comments about the influence of mainstream money laun-
dering norms, interviewees in the field were acutely aware of the need to report sus-
picions and were relatively confident about the indicators for money laundering, on
which there was a plethora of guidance and which was at the forefront of their daily
operational decision-making, some having filed SARs on that basis (Cooper 2014: 261).
Although the filing of SARs does not require the suspicions to be firmly grounded
(Shah v HSBC 2010), reporting presupposes some level of tangible suspicion but general
money laundering indicators cannot necessarily be read across to arouse suspicion of
terrorism financing. One interviewee identified that terrorism financing would be com-
paratively challenging to detect (Cooper 2014: 252).
Sanctions listings are regarded as definitive indicators of terrors suspects, but manual
searches are time-consuming for small MSBs lacking the necessary IT infrastructure or
revenue for commercial screening packages; and even here a ‘false match’ can occur
(Cooper 2014: 253). Interviewees were less able to articulate other factual circumstances
which would arouse terrorism financing suspicion, with those mentioned mainly relat-
ing to generalized jurisdictional risk (Cooper 2014: 248). Objective factors determining
the rationale for jurisdictional risk assessment were less easy to determine, requiring in
reality a sophisticated understanding of regulatory compliance and enforcement in the
destination country within the context of current international affairs. Crucially, inter-
viewees also lacked an appreciation of the potential relevance of small sums in support-
ing terrorism (Cooper 2014: 250), a misconception underscoring the lack of effective
sector guidance. Conversely, interviewees were keen to discount any suspicion associ-
ated with community user groups, implying a sensitivity of MSBs to the allegations that
ethnicity, culture or religion can trigger suspicion (Cooper 2014: 250). Consequently,
ethnicity or religion were not relied upon as indicators of suspicion; the FATF sugges-
tion of identified name and geographical area as relevant terrorist indicators was also
subsequently retracted as too broad to secure reliable SARs (FATF 2004: 27).
The lack of feedback to the sector combined with the fact that SARs are just one ele-
ment in building up actionable intelligence make it very difficult to assess the effective-
ness of SARs. This point was confirmed by other financial sector responses to recent
Home Office Consultation on the SARs regime (Home Office and HM Treasury 2016:
Annex B). Neither can the National Crime Agency outline acceptable reporting prac-
tices with precision, other than aiming for quality over quantity (National Crime Agency
2014: 8). Even if SARs are sufficiently forthcoming, the 9/11 National Commission
doubted their impact, given that funds were moved by the attackers through the finan-
cial sector in regular ways that would not have flagged those transactions as suspicious;
as a result, ‘trying to starve the terrorists of money is like trying to catch one kind of
fish by draining the ocean’ (2004: 382).
As for fairness, the interviewees pointed to a lack of certainty as to whether, and at
what point, a SAR should be filed and what level of suspicion should trigger this. The
perceived lack of guidance would appear to disadvantage MSBs compared to large
banking corporates, especially given that the sector remains liable for not filing even if
no prosecution ensues (Mohammad Ahmad v HMA 2009). Without the desired certainty,
operators apply informal risk management strategies, such as the refusal of customers’
business (Cooper 2014: 260).
1137
This content downloaded from 210.57.215.174 on Fri, 03 Nov 2023 09:03 48 +00:00
All use subject to hitps://about jstor.org/terms
CCOOPER AND WALKER
1138
This content downloaded from 210.57.215.174 on Fri, 03 Nov 2023 09:03 48 +00:00
All use subject to hitps://about jstor.org/terms
SECURITY FROM TERRORISM FINANCING
Conclusions
Combating terrorism finance remains a multifaceted project (Gardella 2003), but with
the RRM predominating over the CJM in terms of pervasiveness and impact. The lat-
ter may be procedurally superior in offering a fair balance between state and societal
interests and the securing individual rights. However, the limits of the CJM create a
space for precautionary logic to drive pre-emptive and exclusionary action through the
RRM in order to reassert security, and absent the safeguards of the former, the RRM
potentially allows for ‘policy laundering’ through soft law approaches which allow the
introduction and expansion of pervasive and sometimes drastic financial regulation
which lacks accountability or fairness (Hayes 2012).
The analysis of these two approaches in relation to the regulation of IVTS shows
that terrorism finance measures do not operate in a vacuum. Although socio-economic
conditions can adjust and accommodate increased regulation in the name of security,
there is a limit to tolerance at the expense of valued norms. This equally applies to both
models but is more keenly felt within the RRM where accountability is weaker.
Effectiveness has proven more difficult to discern, other than that new edifices of
regulatory routines and extended criminal codes have been devised and imposed.
Therefore, further research is needed in order to capture the full impact of the rela-
tive contributions of the models identified to deliver security and to develop a more
1139
This content downloaded from 210.57.215.174 on Fri, 03 Nov 2023 09:03 48 +00:00
All use subject to hitps://about jstor.org/terms
CCOOPER AND WALKER
nuanced understanding of how suspicion and risk and vulnerabilities are conceptual-
ized and applied across the range of actors and communities. Further consideration of
impact and effectiveness need also to be informed of potential adverse consequences
on vulnerable communities. As is the case elsewhere in the financial sector, more faith
has been placed in the impact of the RRM than the CJM, but that faith may now be
waning in view of repeated findings of widespread and deliberate regulatory infrac-
tions by banks, which have persisted despite harsh sanctions (Arnold 2015).
This article has confirmed that counter terrorism is in part being ‘fought out in
the halls of our financial institutions’ (Ayers 2002: 58, 59). A financial front has been
opened, with many late modern attributes of public-private partnership, soft laws and
multi-tiered governance. What has been delivered in terms of fairness and effective-
ness is not only hard to assess but also seems at times to be beside the point to those in
positions of power who appear have pre-determined security and commercial agendas.
REFERENCES
Apams,J. (1986), The Financing of Terror. Simon & Schuster.
Adeso, Global Center on Cooperative Security and Oxfam. (2015), Joint Agency
Briefing Note: Hanging by a Thread, available online at http://adesoafrica.org/
download/564c3e33eede?2/.
Afghanistan (Asset-Freezing) Regulations. (2011), SI 2011/1893.
Al-Dulimi and Montana Management v Switzerland. (2016), Application number 5809/08.
Al-Qaida Asset Freezing Regulation. (2011), SI 2011/2742.
AMJAD, R., IRFAN, M. and ARIF, G. M. (2013), How to Increase Formal Inflows of Remittances: An
Analysis of the Remittance Market in Pakistan. International Growth Centre.
ANDERSON, D. (2014), Fourth Report on the Operation of the Terrorist Asset-Freezing etc. Act 2010
(Review Period: Year to 16 September 2014). Home Office.
ARNOLD, M. (2015), ‘Conduct and Litigation Charges a “Way of Life” for British Banks’
Financial Times, 27 April 2015.
ASHWORTH, A. and ZEDNER, L. (2013), Prevention and the Limits of the Criminal Law. Oxford
University Press.
AYERS, A. (2002), ‘The Financial Action Task Force: The War on Terrorism Will Not Be
Fought on the Battlefield’, New York School Journal of Human Rights, 18: 449-59.
BECK, U. (2006), Cosmopolitan Vision, 2nd edn. Polity Press.
BooN, M. (2006), BME Remittance Survey Research Report for the Department for International
Development. ICM Research.
Bowers, C. B. (2009), ‘Hawala, Money Lending, and Terrorist Financing: Micro Lending
as an End to Illicit Remittance’, Denver Journal of International Law and Policy, 37: 377-419.
BRUNNERMEIER, M., CROCKET, A., GOODHART, C., PERSAUD, A. D., and SHIN, H. (2009), The
Fundamental Principles of Financial Regulation. Geneva Reports on the World Economy.
Bupp, L. (2012), ‘Re-regulating the Financial System: The Return of State or Societal
Corporatism?’, Contemporary Social Science, 7: 1-19.
CALLAWAY, R. and HARRELSON-STEPHENS,J. (2006), ‘Toward a Theory of Terrorism: Human
Security as a Determinant of Terrorism’, Studies in Conflict & Terrorism, 29: 679-702.
Cameron, I.. (ed.) (2013), EU Sanctions. Intersentia.
Commission on Human Security. (2003), Human Security Now: Final Report. United Nations.
1140
This content downloaded from 210.57.215.174 on Fri, 03 Nov 2023 09:03 48 +00:00
All use subject to hitps://about jstor.org/terms
SECURITY FROM TERRORISM FINANCING
This content downloaded from 210.57.215.174 on Fri, 03 Nov 2023 09:03:48 +00:00
All use subject to https:/about jstor.org/terms
COOPER AND WALKER
This content downloaded from 210.57.215.174 on Fri, 03 Nov 2023 09:03 48 +00:00
All use subject to hitps://about jstor.org/terms
SECURITY FROM TERRORISM FINANCING
International Monetary Fund. (2011), Country Report: United Kingdom: Anti-Money Laundering/
Combating the Financing of Terrorism Technical Note. Report No.11/231.
John Howell & Co. (2016), Drivers and Impacts of Derisking. FCA.
Joint Money Laundering Steering Group. (2014), Guidance in Respect of Money Service
Businesses.
KEATINGE, T. (2014), Uncharitable Behaviour. Demos.
KING, C. and WALKER, C. (2015), ‘Counter Terrorism Financing: A Redundant
Fragmentation?’, New Journal of European Criminal Law, 6: 372-95.
LANDER, S. (2006), Review of the Suspicious Activity Reports Regime. Home Office.
Levi, M. (2010), ‘Combating the Financing of Terrorism’, British Journal of Criminology, 50:
650-69.
LioTTa, P. and OweN, T. (2006), ‘Why Human Security?’, Whitehead Journal of Diplomacy and
International Relations, T: 37-55.
Lord Lloyd. (1996), Inquiry into Legislation Against Terrorism. Command Paper 3420.
Lowkery, C. and RAMACHANDRAN, V. (2015), Unintended Consequences 0f Anti—-Money
Laundering Policies for Poor Countries. Centre for Global Development.
MAKIN, P. and CLARK, D. (2014), Safe Corridors for Remittances. Consult Hyperion.
MaKIN, P., CLARK, D., and LoNIE, S. (2015), Detailed Recommendations to Reduce and Manage
Risk at the ‘Last Mile’ of the US-Somalia Safer Corridor Pilot. Consult Hyperion.
McCuLLocH, J. and PICKERING, S. (2009), ‘Pre-crime and Counter-Terrorism: Imagining
Future Crime in the ‘War on Terror”, British Journal of Criminology, 49: 628-45.
McDoNALD, M. (2002) ‘Human security and the construction of security’, Global Society, 16:
277-95.
Mohammad Ahmad v Her Majesty’s Advocate (2009) HCJAC 60.
Money Laundering Regulations (2007) SI 2007/2157.
Money Laundering (Amendment) Regulations 2012, SI 2012/2298.
National Commission on Terrorist Attacks on the United States. (2004), Final Report.
National Crime Agency. (2013), Economic Crime Command/Project QUAVER Team: Criminal
Finances: Criminal Exploitation of the Money Service Business Remittance Sector. London: SOCA
Assessment ODX-6504 (07/13).
National Crime Agency. (2014), Suspicious Activity Reports (SARs) Annual Report 2014.
National Crime Agency. (2015), Suspicious Activity Reports (SARs) Annual Report 2015.
Newton Report. (2003), Anti-Terrorism, Crime and Security Act 2001 Review Report (2003-04
HC 100). Privy Counsellor Review Committee.
Office for National Statistics. (2012), 2011 Census: Key Statistics for England and Wales March
2011
PARKER, M. and TAYLOR, M. (2010), ‘Financial Intelligence’, Studies in Conflict and Terrorism,
33: 949-59.
Passas, N. (2006), ‘Fighting Terror with Error: The Counter-Productive Regulation of
Informal Value Transfers’, Crime, Law and Social Change, 45: 315-36.
People’s Mojahedin Organization of Iran v Council of the European Union. (2011), Case C 27-09.
PERKEL, W. (2004), ‘Money Laundering and Terrorism: Informal Value Transfer Systems’,
American Criminal Law Review, 41: 183-211.
RoBERTS, D. (2010), Global Governance and Biopolitics Regulating Human Security. Zen Books.
RYDER, N. (2015), The Financial War on Terrorism: A Review of Counter-Terrorist Financing
Strategies Since 2001. Routledge.
SAGEMAN, M. (2011), Leaderless Jihad. University of Pennsylvania Press.
1143
This content downloaded from 210.57.215.174 on Fri, 03 Nov 2023 09:03:48 +00:00
All use subject to https:/about jstor.org/terms
CCOOPER AND WALKER
Shah and another v HSBC Private Bank (UK) Ltd. (2010) EWCA Civ 31.
SCHEININ, M. (2007), Report of the Special Rapporteur on the Promotion and Protection of Human
Rights and Fundamental Freedoms While Countering Terrorism. A/HRC/6/17, United Nations.
SCHUILENBURG, M. (2012), ‘The Securitization of Society: On the Rise of Quasi-Criminal
Law and Selective Exclusion’, Social Justice, 38: 73-88.
SHEHU, A. Y. (2012), ‘Promoting Financial Inclusion for Effective Anti-Money Laundering
and Counter Financing of Terrorism (AML/CFT)’, Crime, Law & Social Change, 57:
305-23.
SIMINOVA, A. (2011), ‘The Risk-Based Approach to Anti-Money Laundering: Problems and
Solutions’, Journal of Money Laundering and Control, 14: 346-58.
SPROAT, P. (2010), ‘Counter-Terrorist Finance in the UK: A Quantitative and Qualitative
Commentary Based on Open-Source Materials’, Journal of Money Laundering Control, 13:
315-35.
THOMPSON, E. (2007), ‘Misplaced Blame: Islam, Terrorism and the Origins of Hawala',
Yearbook of UN Law, 11: 279-305.
THOMPSON, E., PLUMMER, R., SENTIS, K., CATALANO, K., THOMPSON, J. and KEATINGE, T.
(2013), Safe Corridors Rapid Assessment, Case Study: Somalia and UK Banking. Beechwood
International.
UK Remittance Working Group. (2005), The UK Remittance Market. Profile Business
Intelligence.
UN Convention on the Suppression of Terrorist Finance. (1999), UN Treaty Series 2178,
197.
UNODC. (2006), Preventing Terrorism: A Criminal Justice Strategy Integrating Rule of Law
Standards in the Implementation of United Nations Anti-Terrorism Instruments.
United States Government Accountability Office. (2016), Financial Institutions: Fines, Penalties,
and Forfeitures for Violations of Financial Crimes and Sanctions Requirements. GAO-16-297.
US Senate Permanent Sub-Committee on Investigations. (2012), US Vulnerability to Money
Laundering, Drugs and Terrorist Financing.
USv HSBC Banks USA, N.A. and HSBC Holdings PLC. (2013), Case 1:12-cr-00763-JG, 7 January
2013.
VACCANI, M. (2009), Alternative Remittance Systems and Terrorism Financing: Issues in Risk
‘Management. Working Paper No 180, World Bank.
WALKER, C. (2004), ‘Political Violence and Commercial Risk’, Current Legal Problems, 56:
531-78.
'WALKER, C. (2006), ‘Intelligence and Anti-Terrorism Legislation in the United Kingdom’,
Crime, Law and Social Change, 44: 387-422.
WALKER, C. (2009), ‘Neighbor Terrorism and the All-Risks Policing of Terrorism’, Journal of
National Security Law & Policy, 3: 121-68.
WALKER, C. (2011), Terrorism and the Law. Oxford University Press.
WALKER, C. (2012), ‘The Impact of Contemporary Security Agendas Against Terrorism
on the Substantive Criminal Law’, in A. Masferrer, ed., Post 9/11 and the Sate of Permanent
Legal Emergency, 121-52. Springer.
WALKER, C. (2013), ‘Terrorism prosecution in the United Kingdom: Lessons in the manipu-
lation of criminalisation and due process’, in O. Gross and F. ni Aolain, eds., Guantanamo
and Beyond: Exceptional Courts and Military Commissions in Comparative and Policy Perspective,
245-66. Cambridge University Press.
WALKER, C. (2014a), The Anti-Terrorism Legislation, 3rd edn. Oxford University Press.
1144
This content downloaded from 210.57.215.174 on Fri, 03 Nov 2023 09:03:48 +00:00
All use subject to https:/about jstor.org/terms
SECURITY FROM TERRORISM FINANCING
WALKER, C. (2014b), ‘Terrorism Financing and the Policing of Charities: Who Pays the
Price?’, in C. King and C. Walker, eds., Dirty Assets: Emerging Issues in the Regulation 0f
Criminal and Terrorist Assets. Ashgate.
Weiss v National Westminster Bank. (2014), 13-1618-cv, USCA 2nd Cir, 22 September 2014.
World Bank. (2011), Migration and Remittances Fact Book, 2nd edn.
World Bank. (2014), Annual Remittance Data, available online at http://econ.worldbank.org/
‘WBSITE/EXTERNAL/EXTDEC/EXTDECPROSPECTS/0,,contentMDK:22759429~pa
gePK:64165401~piPK:64165026~theSitePK:476883,00.html.
‘WyNN-POPE, P., ZEGENHAGEN,Y. and KURNADI, F. (2015), ‘Legislating Against Humanitarian
Principles’, International Review of the Red Cross 97: 235-63.
ZEDNER, L. (2007), ‘Pre-crime and Post-criminology?’, Theoretical Criminology, 11: 261-81.
ZWITTER, A. (2011), Human Security and the Prevention of Terrorism. Routledge.
1145
This content downloaded from 210.57.215.174 on Fri, 03 Nov 2023 09:03:48 +00:00
All use subject to https:/about jstor.org/terms