Headlines
  • At least five ballistic missile launches from Iran have been detected by the Israelis since midnight.
  • Mehrabad Airport in Tehran is hit by strikes
  • The Prince Sultan Air Base was the target of a ballistic missile that Saudi Arabia's military intercepted and destroyed, according to the country's defense ministry.
  • Heavy gunfire on Friday injured three peacekeepers from the United Nations Interim Force in Lebanon inside their base in southwest Lebanon.
  • To put an end to the bloodshed, UN Secretary-General António Guterres urged serious diplomatic negotiations..
  • In a social media post, President Trump said that "no deal" other than "unconditional surrender" will be with Iran.
  • Iran reportedly receives intelligence from Russia on US targets.

More Details

Malaysia: Mahathir Announces Program to Combat Terrorism Financing

Ali Nufael and Hadi Azmi 
Kuala Lumpur

Malaysian Prime Minister Mahathir Mohamad on Tuesday announced the launching of a public-private partnership where financial institutions can share information with law enforcers to combat money laundering and terrorism financing.

Speaking at the 11th International Financial Crime and Terrorism Financing conference, Mahathir said the initiative would allow for more effective detection of suspicious transactions.

“Everyone needs to play their part against financial crime so that Malaysia can transform into a value-driven developed nation. Shared prosperity can only be achieved through shared responsibility,” he told participants.

The initiative is jointly undertaken by the central bank, the securities commission, financial institutions and law enforcers. Mahathir promised that personal data and confidentiality would not be compromised in the effort to track down illegal transactions, using the European Union General Data Protection Regulation as a benchmark.

Nor Shamsiah Mohd Yunus, governor of Bank Negara Malaysia, the country’s central bank, called on banks and other financial institutions to strengthen their policies to counter money laundering and terrorism financing.

“Reporting institutions must strengthen their internal governance and controls to preserve financial integrity, not because Bank Negara tells them so, but because it is the right thing to do,” Shamsiah said at the conference.

“As a regulator, Bank Negara can only do so much to protect the financial system against terrorism financing risk. Reporting institutions, as responsible corporate citizens, must also play their parts to safeguard the financial system and the economy.”

Mahathir said the effort must be continuous.

“This will ultimately enable Malaysia to effectively play its role in the global fight against financial crime and terrorism financing. We must be persistent and remain focused in delivering this agenda,” he said.

The latest U.S. State Department Country Report on Terrorism said Malaysia “remained a source, transit point, and, to a significantly lesser extent, destination country for terrorist groups” such as Islamic State, Abu Sayyaf, Al-Qaeda and Jemaah Islamiyah.

The report noted that Bank Negara had issued a policy directive last year aimed at ensuring that effective measures were in place against money laundering and terrorism financing risks associated with the use of digital currencies and to increase the transparency of digital currency activities in Malaysia.

It requires all entities and persons involved in the exchange of digital currencies into money and vice versa, as well as the exchange of one digital currency for another, to register with the central bank. The move also established requirements for suspicious transaction reporting and record keeping.

Terrorist transit center designation

While Mahathir and Shamsiah discussed the new initiative, Malaysia’s counter-terrorism chief Ayob Khan Mydin Pitchay blamed the lax travel visa system for the country’s image as a transit center for terrorists.

“There is no visa required for entry into this country for many foreign nationals, therefore their citizens, including terrorists, have easy access,” he told conference attendees.

“However, since 2013 we have apprehended 38 foreign terrorists in transit,” he said, adding “some of them have been charged in court and some have been deported back to their home countries.”

Ayob said his team remains vigilant to take on any terror elements, adding police are tracking ideologically radical groups not involved in militant activities but are considered high risk.

“There is but a thin line separating the terror groups from radical groups,” he said citing the Hizbut-Tahrir group as an example.

The group’s objective is to set up an Arab caliphate in the Middle East with Sharia law, with the aim of emancipating Palestine.

“For example Hizbut Tahrir – this group rejects democratic ideas and wants to establish an Islamic state,” Ayob said. “Their ideology is extreme but not up to the level of terrorism so we have to consider this factor because of its risks.”

The U.S. counterterrorism report also credited Malaysia with doing due diligence in monitoring, detaining, deporting and prosecuting suspected terror group supporters.

It also credited Malaysia for cooperating with the United States and other countries to enhance its border security capabilities at airports and at the Sulu Sea, to defeat messaging by terror groups on social media and to increase prosecution of terrorists.

Copyright ©2015,BenarNews. Used with the permission of BenarNews. https://www.benarnews.org/english/

Identify the Dog Breed

Identify dog and cat breeds using pictures.ideal match for you.Consider about these facts before purchasing or adopting a pet.
Read More

Fileless Malware

A type of malicious software known as “fileless malware” infects a computer by using reliable apps. As it doesn’t rely on files and leaves no trace, it is difficult to detect and remove.
Read More

Ragdoll Cats

Large and sturdy, ragdoll cats have a soft, semi-long coat and blue eyes originated in Maine, United States. Coat colors are gold, silver, white, and tortoiseshell.
Read More

Process Hollowing

Using the covert malware injection technique known as “process hollowing,” an attacker suspends a legitimate process, removes its original code, and replaces it with malicious code before the process resumes. Due to this, the virus can operate as a legitimate process and avoid being discovered by security programs.
Read More

If you want to contact us

For latest updates

[jetpack_subscription_form show_only_email_and_button=”true” custom_background_button_color=”#fcb900″ custom_text_button_color=”undefined” submit_button_text=”Subscribe” submit_button_classes=”wp-block-button__link has-text-color has-background has-luminous-vivid-amber-background-button-color” show_subscribers_total=”false” ]

From our Archive

Related Article

“Iranian Authorities Use Live Fire, Arbitrary…

In response to the nationwide protests that started on December 28, Iranian authorities have drastic ...
January 7, 2026

UN Urges Iran to Stop Executing…

Despite years of physical and sexual abuse during her marriage as a child bride, Goli Kouhkan, a 25- ...
December 4, 2025

Myanmar Junta Says it Seized 30…

Myanmar’s junta said on Monday it raided one of the country’s most notorious cyberscam centers a ...
October 21, 2025

Myanmar Junta Admits it’s Unable to…

The European Union’s Special Representative for Human Rights Kajsa Ollongren said on Thursday that ...
October 17, 2025

South Korea Issues Travel Ban After…

South Korea issued a “code-black” travel ban for parts of Cambodia on Oct. 15 and dispatched a t ...
October 16, 2025

US, UK Sanction Cambodian Conglomerate, Alleging…

The U.S. and British governments on Tuesday announced a sweeping crackdown on cyber-scam networks in ...
October 15, 2025

Other Article

Pick of the Day

UN Permanent Representative of Iran Briefs…

Amir Saeid Iravani, Permanent Representative of the Islamic Republic of Iran to the United Nations, ...
March 7, 2026
Bizzare News

Malaysian Man Holds Record for Having…

Malaysian Prathab Muniandy has ten more teeth than the typical human. This indicates that he has the ...
March 6, 2026
Pet Corner

Identify the Dog Breed

Identify dog and cat breeds using pictures.ideal match for you.Consider about these facts before pur ...
Prevent Cyber Crime

Fileless Malware

A type of malicious software known as "fileless malware" infects a computer by using reliable apps. ...
Pick of the Day

UN Security Council Meets on Energy,…

Chris Wright, Secretary of Energy of the United States and President of the United Nations Security ...
Bizzare News

Just Before it Collapses, New Jersey…

A horrifying collapse happened minutes after four Jersey Shore police officers were captured on came ...
March 5, 2026

Top