How Terrorists Send Money
Jay Mailinglists
jay.listo at gmail.com
Thu May 10 00:58:02 PDT 2007
Hawala networks already use some form of steganography...manipulating
invoices of goods to hide the transfer of money.
http://www.interpol.int/Public/FinancialCrime/MoneyLaundering/hawala/default.asp
"...many hawala transactions (legitimate and illegitimate) are conducted
in the context of import/export businesses, the manipulation of
invoices, as discussed above, is a very common means of settling
accounts after the transactions have been made."
Eugen Leitl wrote:
> On Wed, May 09, 2007 at 05:38:41PM +0700, Jay Mailinglists wrote:
>
>> This is not quite the case of terrorists using mobile payments.
>>
>
> I thought terrorists were using Hawala.
> (And, since it's increasingly using faxes and email, the NSA
> has a field day with it. Somebody educate them about cryptography
> and steganography).
More information about the cypherpunks-legacy
mailing list