Enroll Course

100% Online Study
Web & Video Lectures
Earn Diploma Certificate
Access to Job Openings
Access to CV Builder



online courses

Utilizing Technology to Combat Terrorism Financing: EFCC’s Strategy in Nigeria

business . 

The Chairman of the Economic and Financial Crimes Commission (EFCC), Ola Olukoyede, has announced the agency's adoption of technology to combat the illicit flow of funds to terrorist organizations. This decision was revealed during a goodwill message delivered at a Multi-stakeholder Meeting on Terrorism Financing and Violent Extremism in the North-East, organized by the Civil Society Legislative Advocacy Centre (CISLAC) and Transparency International in Nigeria, with funding from GIABA-ECOWAS.

Olukoyede highlighted concerns over the issue of terrorism financing and emphasized the EFCC's commitment to leveraging technology as a strategic tool in addressing this critical security challenge.He articulated, "The challenge that lies ahead of us is to diligently pursue solutions that will bring an end to this decade-long nightmare and reinstate stability in the distressed region. Despite numerous attempts through conferences and workshops to address this issue, the situation continues to present a grave concern.

Within the EFCC and among the broader Nigerian populace, there is a shared apprehension regarding the persistent nature of this crisis and its ability to evade resolution. The perplexing question that arises is how these terrorist groups in the region manage to not only sustain their operations but also procure increasingly sophisticated weaponry, all while evading apprehension and accountability. This troubling reality underscores the urgent need for innovative strategies and collaborative efforts to effectively combat terrorism financing and dismantle the networks that enable these illicit activities to persist."

The phenomenon of unscrupulous actors utilizing humanitarian activities as a facade to finance terrorist groups raises critical questions that demand thorough examination and scrutiny.The EFCC has encountered instances where individuals have been prosecuted for exploiting the dire circumstances in the North-East under the guise of non-profit organizations to further their own illicit agendas. One notable example is the case of "Mama Boko Haram," a figure who emerged during the peak of the insurgency and portrayed herself as a reputable intermediary for facilitating negotiations and transactions with the terrorist group.

These deceptive practices not only exploit the vulnerable conditions in conflict-affected regions but also pose a significant threat to national security and stability. The infiltration of terrorist financing through seemingly legitimate humanitarian channels underscores the need for heightened vigilance, robust regulatory mechanisms, and collaborative efforts to identify and disrupt such illicit activities. It is imperative to remain vigilant and proactive in addressing these challenges to safeguard against the exploitation of humanitarian aid for nefarious purposes.

In recent investigations, the EFCC has made alarming discoveries regarding certain platforms suspected of facilitating illicit activities, with Binance being a significant focus of prosecution. However, our inquiries have revealed the involvement of numerous other platforms in similar unlawful practices. Notably, the EFCC has taken decisive action by freezing over a thousand accounts, uncovering disturbing revelations about the nefarious purposes to which some of these accounts are being utilized, including funding terrorism activities.

The scale and complexity of these illicit financial operations underscore the gravity of the situation and the urgent need for comprehensive intervention. The proliferation of platforms engaging in illicit activities poses a significant threat to national security and stability, necessitating a coordinated and proactive approach to combatting terrorism financing. It is imperative to address these challenges with heightened vigilance, robust enforcement measures, and strategic partnerships to disrupt and dismantle the networks enabling such illicit activities.

SIIT Courses and Certification

Full List Of IT Professional Courses & Technical Certification Courses Online
Also Online IT Certification Courses & Online Technical Certificate Programs