Security Council - Counter-Terrorism Committee (CTC) - Insight Briefing /securitycouncil/ctc/tags/insight-briefing en CTED hosts Insight Briefing on how propaganda ecosystems enable terrorist financing /securitycouncil/ctc/news/cted-hosts-insight-briefing-how-propaganda-ecosystems-enable-terrorist-financing <div class="field field-name-field-featured-image field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><div id="file-78953" class="file file-image file-image-jpeg"> <h2 class="element-invisible"><a href="/securitycouncil/ctc/file/78953">img_7788_copy.jpg</a></h2> <div class="content"> <img class="panopoly-image-original img-responsive" src="/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/styles/panopoly_image_original/public/news_articles/img_7788_copy.jpg?itok=p2uwKHiC" alt="" /> </div> </div> </div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p>On 22 April 2026, the Counter-Terrorism Committee Executive Directorate (CTED) hosted an Insight Briefing by Adam Rousselle, an investigative analyst specializing in illicit and terrorist finance, on the topic of “Trust Networks and Parallel Financial Systems: How Propaganda Ecosystems Enable Terrorist Financing”. The briefing explored how terrorists manage to sustain their financing systems when formal financial institutions are inaccessible.&nbsp;</p> <p>CTED’s Coordinator on Countering the Financing of Terrorism, Svetlana Martynova, highlighted the joint work of CTED with the Financial Action Task Force on examining the relevant trends, including in the context of the&nbsp;<a href="/securitycouncil/ctc/news/cted-welcomes-release-fatf-comprehensive-update-terrorist-financing-risks" title="/securitycouncil/ctc/news/cted-welcomes-release-fatf-comprehensive-update-terrorist-financing-risks">FATF 2025 Comprehensive Update on Terrorism Financing Risks</a>. Ms. Martynova noted that for terrorist organizations, propaganda is often both a core activity and a significant expenditure. It serves multiple purposes, including expanding their support base, legitimizing their actions, and intimidating adversaries. In many cases, propaganda also aims to support financing efforts by recruiting donors and disseminating instructions on how to contribute financially. These finance-oriented communication campaigns may be carried out through a variety of channels, including social media platforms, messaging applications, traditional media, and in-person outreach.&nbsp;</p> <p>In his presentation, Mr. Rousselle explained that terrorist financial activity is often only the visible endpoint of a much broader system. Long before funds are raised or transferred, networks are formed, relationships are built, and trust is established. In this sense, terrorist financing begins not with money, but with the conditions that make money move. At the center of this system lies a largely overlooked layer: the construction of credibility and connection. Through repeated interaction, shared narratives, and social validation, individuals and groups establish who can be trusted and who cannot. This process determines which actors are considered legitimate enough to coordinate, fundraise, or facilitate operations. Without this foundation, financial activity cannot scale or sustain itself.&nbsp;</p> <p>Digital platforms have transformed how this trust is built. What may appear as propaganda or ideological messaging often serves a deeper function. Across social media, messaging applications, and online publications, content is used not only to persuade, but to create relationships between actors who would otherwise remain disconnected. Carefully produced media soliciting donations for terrorist groups —consistent branding, structured layouts, and professional visuals—signals competence and stability to their supporters. These signals reduce uncertainty and make targeted audiences more likely to engage, support, and ultimately contribute financially.&nbsp;</p> <p>Over time, these systems have evolved from more centralized structures to increasingly decentralized and distributed models. In earlier configurations, hierarchy enforced coordination. Today, as networks fragment and spread across regions and platforms, trust replaces hierarchy as the primary organizing mechanism. This shift has significant implications. Decentralized systems are more resilient, harder to disrupt, and capable of regenerating even after targeted interventions. When one part of the network is removed, the underlying trust relationships often persist and reconfigure elsewhere.&nbsp;</p> <p>Current counter-terrorism financing efforts remain largely focused on detecting transactions after they occur. While necessary, this approach is inherently reactive. It addresses the symptoms rather than the system itself. By the time financial activity becomes visible, the underlying network is already established and capable of adapting to disruption. As long as that network remains intact, new channels and methods can replace those that are removed.</p> <p>Addressing this challenge requires a shift in focus. Rather than concentrating solely on financial flows, efforts must move upstream to identify and understand the systems that enable them. This means mapping how trust is formed, how it spreads across platforms, and how it connects actors within and across networks. It also requires integrating behavioral, financial, and network data into a more coherent analytical framework, allowing earlier identification of risk before transactions occur.</p> <p>Facilitated by CTED’s Political Analysis and Research Unit, this briefing is part of CTED’s work on identifying emerging issues, trends and developments relating to countering terrorism, pursuant to Security Council&nbsp;resolutions <a href="https://docs.un.org/s/RES/2395(2017)">2395 (2017)</a> and <a href="https://docs.un.org/s/res/2617(2021)">2617 (2021)</a>, in close cooperation with academia, think tanks, and international, regional, and subregional organizations.</p> <p style="text-align:justify; margin-bottom:11px">&nbsp;</p> <p style="text-align:justify; margin-bottom:11px"><span style="font-size:12pt"><span style="line-height:normal"><span style="font-family:Aptos,sans-serif"><b><span style="font-size:11.0pt"><span style="font-family:Roboto"><span style="color:black">Additional Resources:</span></span></span></b></span></span></span></p> <ul> <li style="text-align:justify"><span style="font-size:12pt"><span style="color:#467886"><span style="line-height:normal"><span style="tab-stops:list .5in"><span style="font-family:Aptos,sans-serif"><a href="https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgnet-research.org%2F2026%2F04%2F07%2Fpropaganda-as-financial-infrastructure-how-islamic-state-and-al-qaeda-media-ecosystems-enable-terrorist-finance%2F&amp;data=05%7C02%7Cvijai.singh%40un.org%7C31c5916b4d844380c06608dea0b3676e%7C0f9e35db544f4f60bdcc5ea416e6dc70%7C0%7C0%7C639124889548565397%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=yuBWY4d2mo%2FDhVQk%2F76ykXy7xqLmUelqAqRFCfDhpes%3D&amp;reserved=0" style="color:blue; text-decoration:underline" title="https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgnet-research.org%2F2026%2F04%2F07%2Fpropaganda-as-financial-infrastructure-how-islamic-state-and-al-qaeda-media-ecosystems-enable-terrorist-finance%2F&amp;data=05%7C02%7Cvijai.singh%40un.org%7"><span style="font-size:11.0pt"><span style="font-family:Roboto"><span style="color:#467886">Propaganda as Financial Infrastructure: How Islamic State and al-Qaeda Media Ecosystems Enable Terrorist Finance</span></span></span></a></span></span></span></span></span></li> <li style="text-align:justify"><span style="font-size:12pt"><span style="color:#467886"><span style="line-height:normal"><span style="tab-stops:list .5in"><span style="font-family:Aptos,sans-serif"><a href="https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgnet-research.org%2F2025%2F10%2F24%2Fclosing-the-enforcement-gap-ai-illicit-liquidity-and-the-next-phase-of-counter-terrorist-finance%2F&amp;data=05%7C02%7Cvijai.singh%40un.org%7C31c5916b4d844380c06608dea0b3676e%7C0f9e35db544f4f60bdcc5ea416e6dc70%7C0%7C0%7C639124889548592710%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=U8s6doLOLajTyFUMaRVEo9uXvMD0uLezV9f%2BqdFT6YE%3D&amp;reserved=0" style="color:blue; text-decoration:underline" target="_blank" title="https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgnet-research.org%2F2025%2F10%2F24%2Fclosing-the-enforcement-gap-ai-illicit-liquidity-and-the-next-phase-of-counter-terrorist-finance%2F&amp;data=05%7C02%7Cvijai.singh%40un.org%7C31c5916b4d8443"><span style="font-size:11.0pt"><span style="font-family:Roboto"><span style="color:#467886">Closing the Enforcement Gap: AI, Illicit Liquidity, and the Next Phase of Counter-Terrorist Finance</span></span></span></a></span></span></span></span></span></li> <li style="text-align:justify"><span style="font-size:12pt"><span style="color:black"><span style="line-height:normal"><span style="tab-stops:list .5in"><span style="font-family:Aptos,sans-serif"><a href="https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgnet-research.org%2F2025%2F02%2F18%2Fcombating-islamic-state-finance-west-africa-and-the-sahel%2F&amp;data=05%7C02%7Cvijai.singh%40un.org%7C31c5916b4d844380c06608dea0b3676e%7C0f9e35db544f4f60bdcc5ea416e6dc70%7C0%7C0%7C639124889548613806%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=qscD%2Bo%2FRYXHnUS1dBo8OtQGlJhav%2FT6qP5iHt91t9tY%3D&amp;reserved=0" style="color:blue; text-decoration:underline" target="_blank" title="https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgnet-research.org%2F2025%2F02%2F18%2Fcombating-islamic-state-finance-west-africa-and-the-sahel%2F&amp;data=05%7C02%7Cvijai.singh%40un.org%7C31c5916b4d844380c06608dea0b3676e%7C0f9e35db544f4f60bd"><span style="font-size:11.0pt"><span style="font-family:Roboto"><span style="color:#467886">Combating Islamic State Finance: West Africa and the Sahel</span></span></span></a></span></span></span></span></span></li> <li style="text-align:justify"><span style="font-size:12pt"><span style="color:black"><span style="line-height:normal"><span style="tab-stops:list .5in"><span style="font-family:Aptos,sans-serif"><a href="https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgnet-research.org%2F2025%2F02%2F19%2Fcombating-islamic-state-finance-central-asia-and-around-the-world%2F&amp;data=05%7C02%7Cvijai.singh%40un.org%7C31c5916b4d844380c06608dea0b3676e%7C0f9e35db544f4f60bdcc5ea416e6dc70%7C0%7C0%7C639124889548634719%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=PIajh3yRb5HyccGu4gE5%2BMhZqyxPKNOKE0rPCW%2FCKG4%3D&amp;reserved=0" style="color:blue; text-decoration:underline" target="_blank" title="https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgnet-research.org%2F2025%2F02%2F19%2Fcombating-islamic-state-finance-central-asia-and-around-the-world%2F&amp;data=05%7C02%7Cvijai.singh%40un.org%7C31c5916b4d844380c06608dea0b3676e%7C0f9e35db54"><span style="font-size:11.0pt"><span style="font-family:Roboto"><span style="color:#467886">Combating Islamic State Finance: Central Asia and Around the World</span></span></span></a>&nbsp;&nbsp;</span></span></span></span></span></li> <li style="text-align:justify"><span style="font-size:12pt"><span style="color:black"><span style="line-height:normal"><span style="tab-stops:list .5in"><span style="font-family:Aptos,sans-serif"><a href="https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgnet-research.org%2F2025%2F02%2F17%2Fcombating-the-islamic-state-finance-somalia-and-the-pan-african-nexus%2F&amp;data=05%7C02%7Cvijai.singh%40un.org%7C31c5916b4d844380c06608dea0b3676e%7C0f9e35db544f4f60bdcc5ea416e6dc70%7C0%7C0%7C639124889548653731%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=GeDV7wdA8XLaPDnOClPcHH5eQNixgfpoe8eOEhGFANM%3D&amp;reserved=0" style="color:blue; text-decoration:underline" target="_blank" title="https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgnet-research.org%2F2025%2F02%2F17%2Fcombating-the-islamic-state-finance-somalia-and-the-pan-african-nexus%2F&amp;data=05%7C02%7Cvijai.singh%40un.org%7C31c5916b4d844380c06608dea0b3676e%7C0f9e35"><span style="font-size:11.0pt"><span style="font-family:Roboto"><span style="color:#467886">Combating Islamic State Finance: Somalia and the Pan-African Nexus</span></span></span></a></span></span></span></span></span></li> </ul> </div></div></div><div class="field field-name-field-front-page-article field-type-list-boolean field-label-above"><div class="field-label">Front Page Article:&nbsp;</div><div class="field-items"><div class="field-item even"></div></div></div> Fri, 24 Apr 2026 15:34:00 +0000 AKHVEDELID 77129 at /securitycouncil/ctc CTED Insight Briefing brings technology-driven counter-terrorism into focus /securitycouncil/ctc/news/cted-insight-briefing-brings-technology-driven-counter-terrorism-focus <div class="field field-name-field-featured-image field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><div id="file-46052" class="file file-image file-image-jpeg"> <h2 class="element-invisible"><a href="/securitycouncil/ctc/file/46052">img_1791_copy.jpg</a></h2> <div class="content"> <img class="panopoly-image-original img-responsive" src="/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/styles/panopoly_image_original/public/news_articles/img_1791_copy_0.jpg?itok=trC926L6" alt="" /> </div> </div> </div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><blockquote><p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span class="MsoHyperlink" style="font-family:Roboto"><span style="color:black"><span style="text-decoration:none"><span style="font-size:12.0pt"><span style="line-height:107%">On 27 March 2023, CTED hosted an Insight Briefing on the blind spots in technology-driven counter-terrorism decision-making processes and proposed methods to mitigate these blind spots. CTED/Vijai Singh-Persaud</span></span></span></span></span></span></span></span></p> </blockquote> <p style="margin-bottom:11px">&nbsp;</p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span class="MsoHyperlink" style="font-family:Roboto"><span style="color:black"><span style="text-decoration:none"><span style="font-size:12.0pt"><span style="line-height:107%">The use of predictive technologies to improve counter-terrorism initiatives, and more specifically border security, was the focus of CTED’s latest Insight Briefing, which was held on 27 March 2023.</span></span></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span class="MsoHyperlink" style="font-family:Roboto"><span style="color:black"><span style="text-decoration:none"><span style="font-size:12.0pt"><span style="line-height:107%">One of the main takeaways of the Briefing was that while predictive and probabilistic algorithms, human and signals intelligence, big data analytics, and facial recognition capabilities offer opportunities for Member States’ efforts to address the scourge of terrorism, they also present some challenges. </span></span></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span class="MsoHyperlink" style="font-family:Roboto"><span style="color:black"><span style="text-decoration:none"><span style="font-size:12.0pt"><span style="line-height:107%">Noting the Security Council’s guidance in its resolution 2396 (2017) on the benefits of biometrics in counter-terrorism, as well as on the need to improve standards for the use and collection of biometric data in counter-terrorism, the limitations in technology-driven counter-terrorism were outlined and recommendations for mitigating them provided. </span></span></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span class="MsoHyperlink" style="font-family:Roboto"><span style="color:black"><span style="text-decoration:none"><span style="font-size:12.0pt"><span style="line-height:107%">During his opening remarks, David Scharia, Director, and Head of the Technical Expertise and Research Branch of CTED, noted that the Briefing was aimed at assisting Member States in identifying methods to improve technology-assisted decision-making processes in the context of counter-terrorism. </span></span></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span class="MsoHyperlink" style="font-family:Roboto"><span style="color:black"><span style="text-decoration:none"><span style="font-size:12.0pt"><span style="line-height:107%">The Briefing featured a presentation from Professor Shiri Krebs, Professor of Law, Deakin University, Australia, and a member of CTED’s Global Research Network. The presentation, entitled “Fact and Fiction in Technology-Driven Technology”, detailed how counter-terrorism efforts in the context of airport and border security had increasingly evolved towards preventative counter-terrorism. The benefit of predictive and probabilistic technologies lies in their ability to provide vast amounts of immediate, relevant information, immediately process this information, and identify connections and inconsistencies.</span></span></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span class="MsoHyperlink" style="font-family:Roboto"><span style="color:black"><span style="text-decoration:none"><span style="font-size:12.0pt"><span style="line-height:107%">Professor Krebs noted, however, that attempts to prevent terrorist attacks through the identification of suspicious individuals, including from data collected in terrorism watch lists and databases and from law enforcement cooperation, could create false predictions about people and incorrectly assess the risk they pose. This could, in turn, negatively affect the principles of human rights, equality, and privacy, to name just a few. During her presentation, Professor Krebs also explained how technological limitations, limitations surrounding humans’ use of technology and cognitive biases could cause decision-making errors in counter-terrorism risk assessments. </span></span></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span class="MsoHyperlink" style="font-family:Roboto"><span style="color:black"><span style="text-decoration:none"><span style="font-size:12.0pt"><span style="line-height:107%">Concluding with a few suggestions for improving predictive counter-terrorism, Professor Krebs cited the need to develop transparent data practices and decision-assisting technologies, develop strengthened and clarified evidentiary standards, and provide capacity-building trainings to assist in de-biasing national and international decision makers.</span></span></span></span></span></span></span></span></p> <p style="margin-bottom:11px">&nbsp;</p> <p style="margin-bottom:11px">&nbsp;</p> <p style="margin-bottom:11px">&nbsp;</p> <p style="margin-bottom:11px">&nbsp;</p> <p style="margin-bottom:11px">&nbsp;</p> </div></div></div><div class="field field-name-field-front-page-article field-type-list-boolean field-label-above"><div class="field-label">Front Page Article:&nbsp;</div><div class="field-items"><div class="field-item even"></div></div></div> Fri, 31 Mar 2023 22:31:00 +0000 BMUSONI 44109 at /securitycouncil/ctc