Notwithstanding inherent differences between the counterterrorist financing regime and the regulatory regime governing communication service providers, there are clear benefits in taking lessons learnt from longstanding efforts on terrorist financing into account when developing a response to the online terrorist threat.
Western governments are shedding their inhibitions about naming and shaming states suspected of infiltrating their critical national infrastructure. This is a good step, but should be just the beginning.
The closure of the Afghan/Pakistan border earlier this week and consequent targeting of NATO fuel supplies has highlighted a critical vulnerability for the International Security Assistance Forces: Fuel. But what can be done to overcome ISAF's Achilles heel?