Item request has been placed!
×
Item request cannot be made.
×
Processing Request
Links between terrorism financing and organised crime in Nigeria.
Item request has been placed!
×
Item request cannot be made.
×
Processing Request
- Author(s): Umar, Bello
- Source:
Journal of Financial Crime; 2025, Vol. 32 Issue 1, p147-153, 7p
- Subject Terms:
- Additional Information
- Subject Terms:
- Subject Terms:
- Abstract:
Purpose: This study aims to assess terrorism activities to identify measures required to mitigate the rise of terrorism activities and their metamorphosis into organised criminal activity through the prevention, disruption and dismantling of sources of financing terrorism. Design/methodology/approach: A qualitative methodology was adopted for this study using descriptive synthesis from recent publications and reports of reputable organisations, i.e. relevant grey literature, key informant interview and a focus group discussion. This triangulation approach was used to cross-validate the findings. Findings: The findings revealed that terrorism financing is most likely linked to organised crime for generating revenues and is further used to finance the activities of terrorists. Practical implications: Terrorists operate from places with little or no presence of governance and, better still, ungovernable spaces for carrying out legitimate businesses, raising internally generated revenues from protection fees, ransoms and taxes. This space further allows domestic collaboration with local criminal gangs to exploit natural mineral resources. If the market for these resources is across borders, international or transnational criminal groups collaborate with terrorists to move the goods and assist with financial services for the generated proceeds. Originality/value: This study assessed the emerging links between terrorism financing and organised crime in Nigeria. [ABSTRACT FROM AUTHOR]
- Abstract:
Copyright of Journal of Financial Crime is the property of Emerald Publishing Limited and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
No Comments.