When using virtual assets such as Bitcoin to finance terrorism, which tactic may be used to ensure that the virtual assets are not easily seized by law enforcement?
A.
Using self-hosted wallets to create many different donation addresses that are updated continuously
B.
Posting donation addresses that are linked to accounts at centralized virtual asset service providers
C.
Using the same donation address across multiple donation campaigns and media types
D.
Forming relationships with virtual asset service providers that have strong KYC processes in place to avoid suspicion
Using self-hosted wallets, or wallets that are stored on the user’s computer, is one of the tactics that may be used to finance terrorism with virtual assets such as Bitcoin. By creating many different donation addresses that are updated continuously, law enforcement will have a harder time tracing transactions. It is also important to note that using the same donation address across multiple donation campaigns and media types, as well as forming relationships with virtual asset service providers that have strong KYC processes in place, can draw attention from law enforcement and should be avoided.
Contribute your Thoughts:
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit