Share This

Terrorists use a wide variety of methods to fund their operations, obtain profits and carry out ideologically driven goals. This study mines open-source data to capture known product counterfeiting schemes linked to known extremists in the United States since 1990.

Read More