Yellow Minimalist Doodle Did You Know Instagram Post (2)

The Digital Shift in Illicit Finance: A Critique of AML/CTF’s Obsolete Focus on Traditional Banking

By Jordan Tumwesigye

The global financial landscape has undergone radical changes over the last decade. On one hand, this landscape has been digitized, which has promoted greater financial inclusion and efficiency. On the other hand, the financial system has birthed a sophisticated “shadow” ecosystem. Despite this transformation, the pillars of Anti- Money Laundering (AML) and Counter-Terrorist Financing (CTF) remain largely rooted in a dated banking model. This reliance on a legacy framework has created a dangerous disconnect whereby regulators are still perfecting the art of monitoring bank transactions and wire transfers while illicit actors have migrated to decentralized, borderless, and automated digital rails.


The Migration of Shadow Capital
For decades, the “gold standard” of AML was the Know Your Customer (KYC) protocol at commercial banks. It was assumed that if you could control the gates of the traditional banking system, you could theoretically starve criminal enterprises of their oxygen. However, 2025 data from The Financial Times suggests a radical pivot with an estimated $158 billion in illicit cryptocurrency flows. This represents a significant increase from previous years, driven not just by individual hackers, but by state-aligned
actors and sophisticated underground banking networks.


Traditional banking relies on centralized intermediaries who act as “gatekeepers.” In the digital shift, these gatekeepers are being bypassed through peer-to-peer protocols that allow for lending, trading, and asset management without a central authority to conduct KYC. Moreover, digital assets like the ruble-pegged A7A5 or USD-pegged tokens that offer the liquidity of cash in an instant can be difficult to track. Lastly, techniques that confuse the trail of funds through jumping across different blockchains or using “tumblers” to blend illicit funds with legitimate ones can be difficult for these gatekeepers
to track.


Why Traditional AML/CFT is Failing
Traditional AML systems often rely on batch screening of transactions, which happens days after the transaction has been conducted. In a digital world of instant payments and “flash loans,” a criminal can move funds through ten different jurisdictions and three different asset classes in the time it takes a bank’s compliance software to flag a single suspicious wire. By the time a Suspicious Activity Report (SAR) is filed, the “money” has already been laundered and converted back into untraceable assets.
Secondly, AML regulations are inherently confined to defined geographical limits. Digital finance, however, is inherently agnostic to borders. A “Chinese-linked” syndicate can use Australian digital infrastructure to move Russian-sanctioned funds into a Caribbean

DeFi protocol. Traditional banking AML struggles with “cross-border complexity,” but for a digital-native launderer, there are no border restrictions. Legacy systems focus on physical identity: passports, utility bills, and face-to-face verification. In the digital shift, identity is increasingly algorithmic. A wallet address is not a person; it is a cryptographic key. While the blockchain is transparent, the link between the “key” and the “human” is where the system breaks down. Current AML frameworks are ill-equipped to handle unhosted crypto wallets, which allow individuals to act as their own banks.


Sanctions Evasion in 2025: A Brief Case Study on the Growing Influence of Digital Currency
The obsolescence of traditional banking focus was best illustrated in 2025 by the rise of state-sponsored sanctions evasion. Nations under heavy international sanctions no longer rely on back-channel bank transfers. Instead, they have integrated crypto-rails into their national economic strategies.
According to a January 2026 Report by TRM Labs, the A7 wallet cluster associated with Russian sanctions evasion handled nearly $39 billion in 2025 alone. These flows didn’t pass through the SWIFT system or Western correspondent banks. They moved through stablecoins and “underground” digital exchanges that operate entirely outside the reach of traditional banking supervisors.


Recommendations

Failure to adapt will not just lead to more financial crime, which will, in turn, render the global financial oversight system a relic of a pre-digital age.

  1. For one, it is important to acknowledge that humans cannot effectively monitor the volume of digital transactions. Compliance must therefore shift towards real-time analytics that use Artificial Intelligence to identify patterns of “chain-hopping” or “mule” behavior as they happen.
  2. The Financial Action Taskforce (FATF)’s “Travel Rule,” which emanates from Recommendation 16 should be enforced. The rule requires virtual asset service providers (VASPs) to share sender and receiver information, which must be globally enforced. As of late 2025, fewer than half of jurisdictions were actively enforcing it, creating “regulatory havens” for illicit capital.

Conclusion
This digital shift is not a future threat; it is the current reality. By remaining hyper-focused on the pipes of traditional banking, regulators are effectively guarding the front door while the back wall has been replaced with a high-speed digital tunnel.
To remain relevant, AML/CTF frameworks must evolve from a “checklist” mentality centered on bank accounts to a data-driven strategy centered on on-chain intelligence. The goal is no longer just to “Know Your Customer,” but to “Know Your Network.”

WhatsApp Image 2025-12-10 at 13.18.41

Supporting Safer Digital Participation at DataFest Africa 2025: Our Clinic and Masterclass in Action

In October 2025, our team had the honor of participating in DataFest Africa 2025, organised by Pollicy, one of the continent’s leading convenings on data, technology, and innovation. As part of this vibrant gathering of technologists, researchers, civil society actors, policymakers, and creatives, we hosted a Digital Security Clinic, offering on-site support, guidance, and practical tools to participants navigating today’s fast-evolving digital landscape.

Why the Clinic Mattered

As digital spaces continue to expand across Africa, so do the risks that come with them including data misuse, online harassment, cyberstalking, image-based abuse, misinformation, account takeovers, and digital surveillance. For many activists, journalists, developers, and young innovators attending DataFest, these threats are not abstract; they are lived realities that affect their work, mental well-being, and personal safety.

Our clinic was designed as a safe, confidential, and responsive support space where participants could:

  • Seek one-on-one guidance on digital security and privacy
  • Report or discuss technology-facilitated gender-based violence
  • Get support on securing devices, accounts, and data
  • Receive mental health referrals and psychosocial first support after online abuse
  • Learn practical safety strategies for their work and activism

What We Offered on the Ground

Throughout the festival, our team provided:

  • Personalized digital risk assessments
  • Guidance on strong passwords, two-factor authentication, and safe browsing
  • Support on responding to online harassment, doxxing, and impersonation
  • Advice on safe content creation and data protection
  • Offered updated and genuine software like antivirus, MS Office, MS Word
  • Referral to trusted psychosocial and legal response partners where needed

Participants included women in tech, youth innovators, journalists, human rights defenders, researchers, and community organizers, many of whom were encountering structured digital safety support for the first time.

Key Reflections from the Clinic

Several key themes emerged from our engagement:

  • Online harm is deeply connected to offline safety, livelihoods, and mental health.
  • Many participants had experienced harassment, impersonation, or extortion but had never received professional support.
  • There is a strong demand for localized, continuous digital safety clinics, not just one-off trainings.
  • Women and young people remain disproportionately impacted by online violence and data misuse.

Building Resilient Digital Communities

Our presence at DataFest Africa 2025 reaffirmed the urgent need to move beyond awareness-raising alone. Safety must be practical, accessible, survivor-centered, and embedded into innovation spaces. Digital rights, data protection, and online wellbeing are not optional add-ons; they are essential foundations for meaningful participation in the digital economy.

By hosting this clinic, we demonstrated that large tech and data convenings can and should integrate real-time protection and support mechanisms alongside conversations on innovation, AI, governance, and development.

Masterclass: Shaping Youth Futures Through Digital Ownership

In addition to the digital safety clinic, we hosted a featured masterclass titled “Shaping Youth Futures Through Digital Ownership” at the National ICT Innovation Hub, Nakawa. The session brought together young people, innovators, and ecosystem actors to explore how digital ownership can unlock opportunity, protection, and economic independence for African youth. Participants engaged deeply with what digital ownership truly means in today’s platform-dominated economy, emphasizing the importance of owning data, digital skills, content, and platforms as a foundation for sustainable digital participation.

The masterclass examined how young people can transition from being passive digital consumers to empowered digital creators and owners, while critically reflecting on the risks of digital exploitation, platform dependence, and unsafe monetization. It further highlighted the role of policy, infrastructure, and community networks in protecting young digital entrepreneurs. The session was co-led by Noelyn Nassuuna, Raymond Amumpaire, and Owilla Abiro Mercy, who collectively challenged participants to think beyond access toward control, agency, safety, and sustainability in the digital economy.

Looking Ahead

Following DataFest Africa 2025, we are strengthening our:

  • Mobile digital safety clinics
  • Survivor-centered referral pathways
  • Youth and women-focused digital resilience programming
  • Partnerships with tech platforms, mental health professionals, and legal responders

We remain committed to ensuring that no one has to choose between visibility and safety, innovation and wellbeing, or participation and protection in digital spaces.

16 days of activism 2026_DPI

Standing Up to Online Gender-Based Violence: Building Safer Digital Spaces for Women and Girls

During the 16 Days of Activism, we are starkly reminded that violence against women does not begin or end offline. It follows them into their phones, their social media accounts, and every digital space where they speak, work, lead, or express themselves. In Uganda, women journalists, politicians, activists, and even students are facing a rising wave of online attacks that are not simply rude comments but deliberate efforts to silence, intimidate, and erase them from public life.

These attacks take an emotional, psychological, and professional toll. They push many into self-censorship, and some into withdrawal entirely, a process that weakens civic participation and harms democracy for everyone.

The New Digital Battlefield: Understanding Online GBV

Today, online gender-based violence (OGBV) has taken new forms that are faster, more invasive, and often anonymous. The attacks are rarely random; they are tools used to control women’s participation in leadership, public discourse, and community organizing. When a woman is silenced online, her influence in other spaces also shrinks, which affects the entire civic space.

Types of Attacks Women Commonly Face:

  • Harassment, insults, threats, and humiliating messages.
  • Doxxing, where private information is leaked to intimidate.
  • Non-consensual intimate imagery and sexualized abuse.
  • Impersonation on social media to spread misinformation or damage reputations.
  • AI-generated deepfakes targeting women in politics or media.
  • Manipulated photos and voice notes meant to scandalize or shame.
  • Targeted phishing attacks disguised as personal or work-related messages.
  • Cyberstalking and obsessive monitoring of online activity.
  • Lastly, Trolling and Coordinated Swarming: Where large groups are mobilized to overwhelm a woman’s account with abusive content, making platforms unusable.

Empowerment in Action: DPI’s Practical Safety Toolkit

Defenders Protection Initiative continues to meet women who feel overwhelmed by online harassment but are unsure where to begin or how to protect themselves. Strengthening digital safety is not just a technical process; it is an act of empowerment and resilience-building. Practical tools and safer habits can drastically reduce exposure to attacks and increase women’s confidence as they navigate digital spaces.

Useful Tools and Practices Women Can Adopt:

CategoryTool/PracticeBenefit
Secure CommunicationSignal, Proton MailSafer, encrypted communication and private email.
Password & AccessBitwarden, Two-factor authentication (Aegis, Authy, Google Authenticator)Managing strong, unique passwords and preventing unauthorized account access.
Privacy & AnonymityBrave Browser, Tor BrowserImproved anti-tracking protection and anonymity for high-risk users.
Verification & ReportingInVID, Deepstar and Reality DefenderTools for verifying deepfakes or manipulated images before spreading them.
Platform SettingsRegularly updating social media privacy settings, restricting who can tag or message you, and turning off real-time location sharing on all platforms.Taking ownership of your digital boundaries.
DocumentationTime-Stamped Evidence: Document harmful posts using screenshots and URLs, ensuring dates and times are clearly captured for legal reporting.Crucial for Legal Action: Provides the verifiable, immutable evidence needed for platform reporting, legal proceedings, and engaging with law enforcement or human rights bodies.

Responding to online abuse requires preparation and community. Beyond the tools, women should be empowered to report using platform tools, block accounts that escalate harassment, and seek support from trusted networks or institutions.

A Shared Responsibility for a Safer Digital World

Online violence thrives in silence, which is why the 16 Days of Activism is a powerful reminder that protecting women’s voices is a shared responsibility.

At DPI, we continue to provide digital security training, digital forensics, account-recovery assistance, and psychosocial referrals so that no woman has to face OGBV alone.

But the fight is bigger than us:

  • Organizations must invest in digital safety policies and provide robust HR support for targeted staff.
  • Men must actively challenge harmful online behavior and report abuse when they see it.
  • Platforms must strengthen their moderation systems and hold abusers accountable.
  • And as a community, we must make the internet a place where women feel safe enough to lead, express themselves, and participate fully.

A safer digital world is possible, but only if we work together to create it.

We urge you to share this post and commit today to challenging digital violence.
#EndDigitalGBV #16DaysOfActivism

WhatsApp Image 2026-01-22 at 11.36.37 (1)

Strengthening Digital Safety, Legal Awareness, and Mental Well-Being for Women Politicians and Journalists ahead of the Uganda 2026 elections

Women journalists and women politicians increasingly operate in hostile digital and political environments where online harassment, surveillance, legal intimidation, and psychological pressure are becoming routine. To respond to these risks, Defenders Protection Initiative (DPI), in partnership with Pollicy, with support from Urgent Action Fund, conducted two tailored two-day capacity-building trainings focused on digital safety, legal implications and compliance, and mental health.

The trainings were delivered separately for women journalists and women politicians, recognising the distinct risk landscapes they navigate while grounding both engagements in shared principles of safety, rights protection, and resilience.

Addressing Real and Escalating Digital Threats

Participants shared experiences of online harassment, coordinated smear campaigns, account takeovers, surveillance, doxxing, and threats that often translate into offline harm. These attacks undermine professional work, personal safety, and emotional well-being. The trainings were designed to be practical and grounded, equipping participants with tools and strategies they could immediately apply in their work and daily lives.

Key Focus Areas of the Trainings

Over the two days, the sessions combined technical learning, legal literacy, and psychosocial support through interactive and participant-centred approaches:

1. Digital Safety Tools and Practices
Participants were introduced to safe and trusted digital tools for secure communication, strong account protection, password management, and safe data handling. Hands-on exercises supported participants in assessing personal and organisational risk and adopting safer digital practices without fear or overwhelm.

2. Legal Implications and Compliance
The training unpacked relevant legal and regulatory frameworks affecting digital engagement, journalism, and political participation. Participants explored compliance obligations, responsible online conduct, and ways to protect themselves legally while continuing to exercise freedom of expression and civic participation.

3. Mental Health and Psychosocial Well-Being
Recognising the emotional toll of digital attacks, dedicated sessions focused on mental health, burnout, and collective care. Participants discussed coping mechanisms, peer support, and referral pathways for psychosocial and mental health support, reinforcing the importance of well-being as a core component of protection.

Creating Safe and Supportive Learning Spaces

DPI intentionally created safe, feminist, and survivor-centered spaces where women could share their experiences openly, learn collectively, and rebuild their confidence. The approach affirmed that digital safety is not only technical or legal, but it is also deeply linked to dignity, agency, and mental well-being.

Outcomes and the Way Forward

By the end of the training, participants reported increased confidence in:

  • Using secure digital tools and safer online practices
  • Understanding legal risks and compliance responsibilities
  • Responding to online harassment and intimidation
  • Prioritising mental health and seeking support when needed

Through collaboration with Pollicy and the support of the Urgent Action Fund, DPI delivered a holistic intervention that recognises digital safety, legal protection, and mental health as interconnected pillars for women’s participation in journalism and politics.

Defenders Protection Initiative remains committed to strengthening the safety, resilience, and leadership of women human rights defenders, journalists, and political actors, ensuring they can continue to engage in public life safely, confidently, and with dignity.

U.S. Ruling on NSO Sends Warning as Pegasus Targets Ugandan Journalists

By Noelyn Nassuuna | 8 May 2025

In a historic decision on May 6, 2025, a U.S. jury in California ordered NSO Group to pay $168 million in damages for deploying its Pegasus spyware to hack WhatsApp’s infrastructure. This unprecedented verdict—$447,719 in compensatory damages and over $167 million in punitive damages—marks the first time the notorious Israeli spyware company is held financially accountable in court for its hacking operations.

This ruling is a major victory for global digital rights defenders and a critical warning to companies enabling unlawful surveillance. For years, NSO Group’s Pegasus spyware has been linked to grave human rights violations, including the targeting of journalists, activists, and dissidents worldwide. Meta, the parent company of WhatsApp, pursued a six-year legal battle to expose these abuses and protect its users. The judgment follows a landmark January 2025 summary ruling that found NSO guilty of violating U.S. and California hacking laws and breaching WhatsApp’s Terms of Service.

“This verdict sends a clear message to spyware companies that targeting people through U.S.-based platforms will come with a high price,” said Michael De Dora, U.S. Policy and Advocacy Manager at Access Now.

But while the courtroom victory occurred in the United States, its impact reverberates far beyond. Just days before the judgment, Ugandan investigative journalist Canary Mugume took to X (formerly Twitter) to reveal that Pegasus spyware had attempted to infiltrate his device. His post sent shockwaves through Uganda’s media and civil society sectors, especially as the nation edges closer to its 2026 general elections.

This is not the first time Pegasus has been used to target journalists globally. In Uganda, such incidents signal a chilling escalation in the digital threats facing the press. The implications are grave: surveillance software like Pegasus doesn’t just spy on individuals—it compromises entire newsrooms, sources, and the right to information.

“Apple sent this notification to me indicating that I am being targeted by a mercenary spyware. Most of these are used by Governments to hack into phones of journalists, high-profile figures and activists. They last sent this in 2021, there’s a pattern – electoral season.”

In past years, several journalists and human rights defenders in Uganda have reported suspicious digital intrusions, but rarely with hard evidence pointing to a tool as sophisticated and invasive as Pegasus. The spyware is known for its ability to silently infiltrate phones, access messages, camera, microphone, and more—all without the user’s knowledge.

At Defenders Protection Initiative (DPI), we continue to raise alarm and awareness over the growing use of surveillance technologies to intimidate, silence, or endanger the work of journalists, activists, and civil society organizations. The risks are particularly heightened during politically sensitive periods such as elections, where access to reliable information and protection of press freedom are critical for democratic integrity.

The recent U.S. court ruling is a reminder: accountability is possible. It is also a call to action for governments, tech companies, and civil society in Uganda and across Africa to:

  • Strengthen digital security protocols for journalists and human rights defenders
  • Demand transparency and oversight over surveillance technologies
  • Challenge spyware vendors through legal, policy, and public channels

We stand in solidarity with journalists like Canary Mugume and urge all media professionals to report digital threats and seek expert support. DPI remains committed to supporting journalists and human rights defenders through digital security trainings, emergency response, and legal support.

As elections approach, the protection of digital rights is not just a tech issue—it is a human rights imperative.

The Guardians of Peace: The Crucial Role of Human Rights Defenders in Building a Peaceful World

By Noelyn Tracy Nassuuna

International Peace Day has come and gone, but the mission of building and sustaining peace continues every single day, especially for human rights defenders (HRDs) around the world. These courageous individuals are often on the front lines, advocating for justice, equality, and human dignity in the face of adversity. Their work is crucial in addressing the root causes of conflict and promoting long-lasting peace.

Holding Regulators Accountable for Data Privacy and Protection in Uganda’s NGO Sector -DPI

By Helen Namyalo Kimbugwe and Noelyn Tracy Nassuuna

As Uganda heads toward a pivotal election season, the release of sensitive financial statements for Non-Governmental Organizations (NGOs) like Chapter Four Uganda has sparked intense debate. These disclosures carry significant implications for donors, NGOs, and the public, shaping trust, transparency, and operational stability.

What does this mean for NGOs operating in Uganda, their donors, and the communities they serve? How can transparency be balanced with protection in such politically charged times?

To delve deeper into these issues, download the full article now and stay informed about the future of civil society in Uganda.

WhatsApp Image 2024-06-24 at 12.51.09

Protection of Environmental Defenders: Safeguarding Fundamental Rights and Environmental Sustainability 

Land and environmental defenders are some of the most passionate and committed people who unfortunately experience significant reprisals, as reported through our Seek Support portal. Instances of arbitrary arrests, harassment, physical attacks, and threats have hampered their work and forced many to withdraw from advocacy.

The survival of our environment and the defence of fundamental rights are interlinked with the protection of environmental advocate. Prioritising these crucial areas of protection is necessary to achieve these interconnected goals:

  1. Legal Protection: Instituting robust legal frameworks that explicitly safeguard the rights of LED proponents against discrimination, harassment, and violence. 
  2. Access to Justice: Guaranteeing access to justice for LEDs. This involves providing adequate legal resources and support to ensure that perpetrators are brought to justice.
  3. Context-Specific Responses: Recognizing the dynamic challenges faced by environmental defenders, it is crucial to tailor responses to their specific contexts and provide specialised training, resources, and protection mechanisms to address evolving threats.
  4. Inclusion in Climate Policy Formulation: Incorporating environmental protectors into the formulation of climate policies ensures that their voices are heard and their expertise is utilised. This inclusion not only strengthens policy effectiveness but also enhances the legitimacy of environmental governance.
  5. Recognition of Cultural Leaders and Custodians: Acknowledging the rights of cultural leaders and customary landowners as custodians of the land is essential. Their traditional knowledge and stewardship play a vital role in sustainable land management and conservation efforts.

Explore the diverse channels and tools of protection available to LEDs from DPI:

  • Land and Environmental Task Force (LEDTAF): A coalition of diverse organisations providing collective leverage for coordinated response mechanisms for LEDs. Services include legal aid, relocation and rapid response among others.
  • Kyotos (Fireside Chats): Community fireside chats provide a relaxed setting for dialogue, bringing together communities and relevant stakeholders to share information, mediate issues, and address grievances.
  • Digital Security and Security Management Training: To individuals and organisations to enhance operational effectiveness and ensure safety during advocacy efforts.
  • Talk to Your Regulator: Closing the awareness gap on NGO legal frameworks to improve operational efficiency and regulatory compliance for defenders and organisations in the environmental rights landscape.