الف) کتابها
- بابایی، جواد (1400). جرائم رایانهای و آیین دادرسی حاکم بر آن. تهران: ادارة کل آموزش قوة قضاییه.
- برنارد کوهن، سائول (1387). ژئوپلوتیک نظام جهانی. ترجمة عباس کاردان، تهران: ابرار معاصر.
- دسوزا، جاش (1396). تأمین مالی تروریسم: پولشویی و فرار مالیاتی. ترجمة آزاد، معاونت پژوهش تولید علم، دانشگاه اطلاعات و امنیت ملی.
- فتحیزاده، امیرهوشنگ؛ اسماعیلی عطاآبادی، عقیل (1399). حقوق بلاکچین. تهران: شرکت چاپ و نشر بازرگانی.
ب) مقالات
- آهنگری، کارن (1400). «پرایوسی کوین چیست؟». قابل دسترس در: https://bitpin.ir/academy/privacy-coin/ (Visited: 2022/03/27)
- الهویی نظری، حمید؛ فامیل زوار جلالی، امیر (1396). مسئولیت بینالمللی دولتهای تأمین مالیکننده تروریسم. فصلنامة مطالعات حقوق عمومی، 47(3)، 725- 746.
- الهویی نظری، حمید؛ امیری، صالح؛ بینیاز، زهرا (1401). استانداردهای نظام پرداخت جایگزین در جرائم پولشویی و تأمین مالی تروریسم. فصلنامة مطالعات حقوق عمومی، 52(3)، 1227- 1252.
- زرنشان، شهرام (1386). شورای امنیت و تعهدات دولتها برای مقابله با تروریسم. مجلة حقوقی، (36)، - 94.
- فیضی، فریناز؛ رنجبریان، امیرحسین (1402). واکنش حقوق بینالملل به وب پنهان: چرایی و چگونگی. فصلنامة تحقیقات حقوقی، ویژهنامة حقوق فناوری.
- کدخدایی، عباسعلی؛ فامیل زوار جلالی، امیر (1402). ارزیابی پایبندی دولتها به توصیههای گروه ویژه اقدام مالی در مبارزه با تأمین مالی تروریسم. فصلنامة مطالعات حقوق عمومی دانشگاه تهران، آمادة انتشار.
- کدخدایی، عباسعلی؛ نوروزپور، حسام (1399). چالشهای ارزهای مجازی در مبارزه با پولشویی و تأمین مالی تروریسم با تأکید بر اقدامات و توصیههای کارگروه ویژة اقدام مالی (FATF). مجلة حقوقی بینالمللی، (62).
- ماتسورا، جفری اچ، (1397). بررسی اجمالی مقررات ارز دیجیتال و پیامدهای قانونی آن. ترجمة سعید سیاه بیدی کرمانشاهی و حمیدرضا کناریزاده، پژوهشنامة حقوق فارس، 1(1).
- میرعباسی، سیدباقر، فامیل زوار جلالی؛ امیر (1395). مسئولیت بینالمللی دولتها ناشی از مدارا و مماشات با گروههای دهشت افکن؛ با تأکید بر قضیة افغانستان. فصلنامة مطالعات حقوق عمومی دانشگاه تهران، 46(2)، 247-271.
- ناصر فلاح، بهزاد (1398). آیا تراکنشهای ارزهای دیجیتال واقعا ناشناس است؟. قابل دسترس در: https://arzdigital.com/are-cryptocurrency-transactions-anonymous)/ (visited: 2023/09/09
ج) مصاحبه
- مصاحبه با علی جهانی (1403). رئیس هیأت مدیرة شرکت تبادل رمزارز بیتپین، منطقة آزاد تجاری و اقتصادی انزلی.
- انگلیسی
- Book
- Duquet, N. (ed.), (2017). Triggering Terror: Illicit Guns Markets and Firearms Acquisition of Terrorist Networks in Europe. Flemish Peace Institute, Brussels
- Gates, M. (2017). Block Chain. Wise fox pub
- Ozkaya, E., & Islam, R. (2019). Inside the Dark Web. Taylor and Francis Group
- B)Article
- Greenberg, A, (2014). Dark Wallet’ Is About to Make Bitcoin Money Laundering Easier Than Ever. Wired, April 29, Available at: https://www.wired.com/2014/04/dark-wallet/. (A)
- Greenberg, A (2014). Waiting for Dark: Inside Two Anarchists’Quest for Untraceable Money. Wired, July 11, Available at: https://www.wired.com/2014/07/inside-dark-wallet/. (B)
- Benjamin, W (2011). The Rise and Fall of Bitcoin. Wired, November 23
- Berg, S., & Killian J McCarthy, (2016). The Economics of ISIS — A Case of Theft or MoneyLaundering?. Freedom from Fear, (11), Retrieved from: https://www.un-ilibrary.org/human-rights-and-refugees/the-economics-of-isis-a-case-of-theft-or-money-laundering_c855eaf4-en (visited:08/10/2022).
- Dalyan, S. (2008). Combating the financing of terrorism: Rethinking strategies for success, Defense Against Terrorism Review,1.
- Dion, D. (2013). I’ll Gladly Trade you two bits on Tuesday for a Byte Today, Bitcoin, Regulating Fraud in the Economy of Hacker-Cash, Ill. J. L. Tech and Policy
- Eric, M. (2013). The Bitcoin Pizza Purchase That’s Worth $7 Million Today. Forbes, December 23
- Fanusie, Y & Robinson, T. (2018). Bitcoin Laundering: An Analysis of Illicit Flows into Digital Currency Services, Foundation for Defense of Democracies and Elliptic, 12 January.
- Fanusie, Y (2018). Survey of Terrorist Groups and Their Means of Financing, House Financial Services Committee, Available at: https://financialservices.house.gov/uploadedfiles/hhrg-115-ba01-wstate-yfanusie-20180907.pdf (visited: 2023/10/12)
- Goriacheva, A, Jakubenko N, Pogodina, O & Silnov, D. (2018), Anonymization Technologies of Cryptocurrency Transactions as Money Laundering Instrument. in III Network AML/CFT Institute International Scientific and Research Conference “FinTech and RegTech: Possibilities, Threats and Risks of Financial Technologies”, KnE Social Sciences
- Harman, D. (2015). U.S.-based ISIS Cell Fundraising on the Dark Web, New Evidence Suggests. Haaretz, 29 January, https://www.haaretz.com/.premium-isis-uses-bitcoin-for-fundraising-1.5366305. (visited:2023/10/08)
- Kethineni, S., Cao, Y., & Dodge, Cassandra (2017). Use of Bitcoin in Darknet Markets: Examining Facilitative Factors on Bitcoin-Related Crimes, American Journal of Criminal Justice, 43(2), Available at: http://dx.doi.org/10.1007/s12103-017-9394-6
- Maxey, L. (2018). Terrorists Stalk the Dark Web for Deadlier Weaponry. The Cipher Brief, 17 January, https://www.thecipherbrief.com/terrorists-stalk-dark-web-deadlier-weaponry.
- Money: Bitcoin Mixing Service. Available at: https://mixer.money
- Redman, J. (2018). Chainalysis Raises $16Mn – Plans to Monitor Multiple Blockchains. com, 6 April, retrieved from: https://news.bitcoin.com/chainalysis-raises-16mn-plans-to-monitor-multiple-blockchains. (visited:10/11/2018).
- Salami, I. (2017). Terrorism Financing with Virtual Currencies – Can Regulatory Technology Solutions Combat this? Studies in Conflict & Terrorism, Available at: https://doi.org/10.1080/1057610X.2017.1365464
- See Moore, D., & Rid, T. (2016). For a taxonomy of high-level categories of activity over the Dark Web, Cryptopolitik and the Darknet. Survival, 58:1, February-March.
- Shacheng,, & Xixi, Z (2021). Evaluation of Potential Cryptocurrency Development Ability in Terrorist Financing. Policing, 15(4).
- Shah, A. (2007). The International Regulation of Informal Value Transfer System. Utrecht Law Review, 3(2).
- Suberg, W. (2017). Bitcoin Exchange ShapeShift Helps Police as WannaCry Attacker Converts to Monero,’ CoinTelegraph, 4 August. https://cointelegraph.com/news/bitcoin-exchange-shapeshift-helps-police-as-wannacry-attacker-converts-to-monero.
- Singletary, T, (2015). Dark Web and the Rise of Underground Networks, in Evolution of Cyber Technologies and Operations to 2035, Advances in Information Security 63, DOI 10.1007/978-3-319-23585-1_8
- Wallace, B. (2011). The Rise and Fall of Bitcoin. Wired, November 23, Available at: https://www.wired.com/2011/11/mf-bitcoin/
- Wardhana, A. T., & Nugroho, B. W. (2021). Abuse of Cryptocurrency to Funding International Terrorism Activities, Proceedings University Muhammadiyah Yogyakarta Undergraduate Conference, 1(1), 353–362. Retrieved from https://prosiding.umy.ac.id/grace/index.php/pgrace/article/view/190
- Instrument and Report
- Aldridge, Judith; Paoli, Giacomo Persi; Ryan, Nathan; Warnes, Richard (2017). Behind the curtain: the illicit trade of firearms, explosives and ammunition on the dark web, RAND Corporation, Available at: https://www.rand.org/pubs/research_reports/RR2091.html.
- Council of the EU (2018) ‘Money laundering and terrorist financing: new rules adopted,’ press release, 14 May, http://www.consilium.europa.eu/en/press/press-releases/2018/05/14/money-laundering-and-terrorist-financing-new-rules-adopted/.
- Counter-Terrorism Committee Executive Directorate (2022). Thematic summary assessment of gaps in implementing key countering the financing of terrorism provisions of Security Council resolutions, Available at: https://www.un.org/securitycouncil/ctc/content/thematic-summary-assessment-gaps-implementing-key-countering-financing-terrorism-provisions, (Visited: 2024/01/04)
- CTIF-CFI (2016). 23rd Annual Report. Belgian Financial Intelligence Processing Unit (CTIF-CFI), Available at: http://www.ctifcfi.be/website/images/EN/annual_report/ar2016en.pdf
- Cynthia Dion-Schwarz, David Manheim, Patrick B. Johnston, (2019), Terrorist use of cryptocurrency, Published by the RAND Corporation
- Egmont (2023). Report on Abuse of Virtual Assets for Terrorist Financing Purposes. Information Exchange Working Group (IEWG), pp. 7-8, Available at: https://egmontgroup.org/wp-content/uploads/2023/12/2023-July-HoFIU-06-IEWG-Project-Abuse-of-VA-for-TF-Summary-1.pdf, (Visited: 2023/12/03)
- European Banking Authority (2014) EBA Opinion on Virtual Currencies, 4 July, Available at: https://www.eba.europa.eu/documents/10180/657547/EBA-Op-201408+Opinion+on+Virtual+Currencies.pdf.
- European Central Bank (2012). Virtual Currency Schemes, Frankfurt, October, Available at: https://www.ecb.europa.eu/pub/pdf/other/virtualcurrencyschemes201210en.pdf.
- FATF (2010). Money Laundering Using New Payment Methods, FATF Report, Paris, October, Available at:https://www.fatfgafi.org/en/publications/Methodsandtrends/Moneylaunderingusingnewpaymentmethods.html (visited: 2023/10/11)
- FATF (2014). Virtual Currencies: Key Definitions and Potential AML/CFT Risks, Paris, Available at: http://www.fatf-gafi.org/media/fatf/documents/reports/Virtual-currency-key-definitions-and-potential-aml-cft-risks.pdf, (Visited: 2023/12/03)
- FATF (2019). Guidance for a Risk-Based Approach, Virtual Assets and Virtual Asset Service Providers. Available at: http://www.fatf-gafi.org/publications/fatfrecommendations/documents/Guidance-RBA-virtual-assets.html (visited: 2024/01/15)
- FATF (2020). Virtual Assets Red Flag Indicators of Money Laundering and Terrorist Financing, Available at: https://www.fatf-gafi.org/en/publications/Methodsandtrends/Virtual-assets-red-flag-indicators.html, (Visited: 2023/10/12)
- HM Treasury and the Home Office (2017). National risk assessment of money laundering and terrorist financing, London
- https://documents-dds-ny.un.org/doc/UNDOC/GEN/N23/189/01/PDF/N2318901.pdf?OpenElement
- Joint Counterterrorism Assessment Team (JCAT), (2021). Identifying and Preventing Illicit Use of Cryptocurrency by Terrorists, Available at: https://www.odni.gov/files/NCTC/documents/jcat/firstresponderstoolbox/119s_First_Responders_Toolbox_-_Identifying_and_Preventing_Illicit_Use_of_Cryptocurrency_by_Terrorists.pdf , (visited: 2024/02/01)
- Keatinge, Tom, Carlisle, David and Florence Keen (2018). Virtual currencies and terrorist financing: assessing the risks and evaluating responses, Policy Department for Citizens' Rights and Constitutional Affairs European Parliament
- Möser, Malte; Soska, Kyle; Hellman, Ethan; Lee, Kevin; Heffan, Henry; Srivastava, Shastvat; Hogan, Kyle; Hennessey, Jason; Miller, Andrew; Narayanan, Arvind and Christin, Nicolas, (2017). An Empirical Analysis of Traceability in the Monero Blockchain. to appear in Privacy Enhancing Technologies Symposium (PETS)
- Tierno, Paul, Miller, Rena S. and Liana W. Rosen, (2023). Terrorist Financing: Hamas and Cryptocurrency Fundraising, November 27, Available at: https://crsreports.congress.gov
- United States Department of Justice, (2015). ‘Virginia Teen Pleads Guilty to Providing Material Support to ISIS,’ Justice News, 11 June, Available at: https://www.justice.gov/opa/pr/virginia-teen-pleads-guilty-providing-material-support-isil.
- S/RES/1373 (2001). Available At: http://www.un.org/en/ga/search/view_doc.asp?symbol=S/RES/1373%282001%29
- https://ripjar.com/blog/6amld-6th-money-laundering-directive/ (visited: 2023/07/10)
- https://www.consilium.europa.eu/en/press/press-releases/2023/05/16/digital-finance-council-adopts-new-rules-on-markets-in-crypto-assets-mica/ (visited: 2023/10/25)
- Houben, R., & Snyers, A. (2018). Cryptocurrencies and Blockchain: Legal context and Implications for Financial Crime, Money Laundering and Tax Evasion, European Parliament, 2018, Available at: https://www.europarl.europa.eu/cmsdata/150761/TAX3%20Study%20on%20cryptocurrencies%20and%20blockchain.pdf (visited: 2023/10/25)
|