The Mack Attack

Thought-provoking clap-trap for the skeptic-minded

Friday, June 23, 2006



Your bank records spied on

The Bush administration, relying on a presidential declaration of emergency, has secretly been tapping into a vast global database of confidential financial transactions for nearly five years, according to U.S. government and industry officials.
Initiated shortly after Sept. 11, 2001, the surveillance program has used a broad new interpretation of the Treasury Department's administrative powers to bypass traditional banking privacy protections. It has swept in large volumes of international money transfers, including many made by U.S. citizens and residents, in an effort to track the locations, identities and activities of suspected terrorists.
Current and former counterterrorism officials said the program works in parallel with the previously reported surveillance of international telephone calls, faxes and e-mails by the National Security Agency, which has eavesdropped without warrants on more than 5,000 Americans suspected of terrorist links. Together with a hundredfold expansion of the FBI's use of "national security letters" to obtain communications and banking records, the secret NSA and Treasury programs have built unprecedented government databases of private transactions, most of them involving people who prove irrelevant to terrorism investigators.
Stuart Levey, undersecretary of the Treasury for terrorism and financial intelligence, said in an interview last night that the newly disclosed program -- the existence of which the government sought to conceal -- has used the agency's powers of administrative subpoena to compel an international banking consortium to open its records. The Brussels-based cooperative, known as the Society for Worldwide Interbank Financial Telecommunication, or SWIFT, links about 7,800 banks and brokerages and handles billions of transactions a year.
Terrorism investigators had sought access to SWIFT's database since the 1990s, but other government and industry authorities balked at the potential blow to confidence in the banking system. After the 2001 attacks, President Bush overrode those objections and invoked his powers under the International Emergency Economic Powers Act to "investigate, regulate or prohibit" any foreign financial transaction linked to "an unusual and extraordinary threat."
Levey and other officials emphasized that the government has confined its financial surveillance to legitimate terrorism investigations and tightly targeted searches.
After identifying a suspect, Levey said, "you can do a search, and you can determine whom he sent money to, and who sent money to him."
"The way the SWIFT data works, you would have all kinds of concrete information -- addresses, phone numbers, real names, account numbers, a lot of stuff we can really work with, the kind of actionable information that government officials can really follow up on," Levey said.
He spoke about the program after it became clear the New York Times was planning to publish an article about it. The Times and other news organizations posted articles online last night.
Levey maintained that the government has "put into place very robust controls to make sure we are only using this information for anti-terrorism purposes."
He added: "We can only search the data we receive in furtherance of a terrorism lead. In fact, the analysts who have access to the data can't even access the database unless they type in the search they want to do and articulate why it's connected to terrorism."
The program is "on rock-solid legal ground," Levey said, and is based on the IEEPA, which he said "specifically gives us the authority to conduct this type of investigation if there is an emergency declared by the president."
In addition, the administration informed major central banks, including the Federal Reserve and the European Central Bank, of the program. "They were all briefed so they could exercise appropriate oversight," Levey said. "We have kept it confidential but made sure the appropriate people knew about it," including members of Congress involved in intelligence matters, he said.
The White House complained last night that the disclosure could hurt anti-terrorism activities.
"We are disappointed that once again the New York Times has chosen to expose a classified program that is working to protect Americans," spokeswoman Dana Perino said. "We know that al-Qaeda watches for any clue as to how we are fighting the war on terrorism and then they adapt, which increases the challenge to our intelligence and law enforcement officials."
Levey said it was no secret that investigators tried to follow terrorist money flows, but had been "trying to keep confidential . . . precisely how we do that." Because SWIFT is not a well-known source of financial information, "we're very disappointed that this source has now been revealed, because it will make our job much more difficult."
Levey's boss, outgoing Treasury Secretary John W. Snow, underlined those arguments in a statement the department issued late yesterday. Treasury's Terrorist Finance Tracking Program, he said, is an essential tool in the war on terror that has helped government officials "locate operatives and their financiers, chart terrorist networks, help bring them to justice, and save lives."
"It is not 'data mining,' or trolling through the private financial records of Americans. It is not a 'fishing expedition,' but rather a sharp harpoon aimed at the heart of terrorist activity," he said.
Levey declined to discuss instances in which the data gleaned from SWIFT had aided the crackdown on terrorism. He said that information is classified but added he could confirm that the information has been used to "confirm the identity of a major Iraqi terrorist facilitator."
Asked whether any high-ranking administration officials had expressed reservations about the program, Levey said: "Not that I've ever heard. This is a program which, to my knowledge, has been universally embraced and praised."
Intelligence analysts from the CIA and the FBI, working with Levey's office, have been poring over the financial transactions for the past several years in search of more links to al-Qaeda operatives. Officials said investigators now seek financial data on individuals and companies whose names first appear in documents, intercepted communications and other evidence gathered by intelligence agencies around the world.
"You can't type in a random name of someone" and search his data, said one intelligence official who spoke on the condition of anonymity. "The program only works for names already within the intelligence system that were collected elsewhere and are identified as being part of an open investigation."
That was not the case when the program began in the weeks after Sept. 11, 2001, when Bush signed Executive Order 13224 going after al-Qaeda's finances. Officials said far more information was collected early on, often on people who had nothing to do with al-Qaeda but whose Muslim names or businesses were similar to those used by suspected members of al-Qaeda. That method flooded the intelligence community with reams of material that was laborious to go through and repeatedly misled investigators.
"It has narrowed over time as our expertise has increased," one official said in describing a "higher bar" for searches that now depend on intelligence collected elsewhere.
Intelligence officials were eager to distance this program from the NSA's eavesdropping operation, saying repeatedly that the technology employed does not allow for the broad sweeps the NSA can conduct.
In a statement, SWIFT said it "responded to compulsory subpoenas for limited sets of data from the Office of Foreign Assets Control of the United States Department of the Treasury. Our fundamental principle has been to preserve the confidentiality of our users' data while complying with the lawful obligations in countries where we operate. Striking that balance has guided SWIFT through this process with the United States Department of the Treasury."


The Treasury Department today mounted a staunch defense of a previously secret program to search a global financial database for terrorism-related transactions, saying the effort has been an effective weapon and that its disclosure can only help the world's terrorists.
In a news conference, Treasury Secretary John W. Snow and Stuart Levey, the undersecretary for terrorism and financial intelligence, insisted that the program has strong safeguards to protect the privacy of ordinary Americans' financial transactions. They said subpoenas of records from the global database are strictly limited to those of suspected terrorists.
They also said the program has led to the apprehension of terrorists and thus saved lives, but they declined to provide any examples, saying that information remains classified.
The program has continued to be effective despite a trend toward the use by terrorists of informal money-transfer networks and cash couriers instead of banks, Levey said.
"This terrorist tracking program administered through the Treasury Department . . . is really government at its best," Snow said. "This is a program that works. This is a program that makes Americans and the world safer."
The program, launched by the Bush administration shortly after the Sept. 11, 2001, terrorist attacks, uses the Treasury Department's administrative subpoena powers to obtain records from a Brussels-based international banking consortium known as the Society for Worldwide Interbank Financial Telecommunication, or SWIFT. The consortium links about 7,800 banks and brokerages in 200 countries and handles billions of transactions a year, accounting for more than 80 percent of the international messaging traffic on funds transfers.
After the 2001 attacks, President Bush invoked his powers under the International Emergency Economic Powers Act to "investigate, regulate or prohibit" any foreign financial transaction linked to "an unusual and extraordinary threat." His order for Treasury to gain access to SWIFT's database overrode objections from other government and banking industry authorities who worried that sharing the information would erode public confidence in the banking system.
According to current and former counterterrorism officials, the "terrorist finance tracking program," as Snow called it, works in tandem with another previously secret surveillance program in which the National Security Agency monitors international telephone calls, faxes and e-mails, The Washington Post reported today. Under the NSA program, the agency has eavesdropped on more than 5,000 Americans suspected of terrorist links without obtaining warrants. In a related effort, the NSA has also built a massive database of foreign and domestic telephone calls with the aim of tracking calling patterns to detect terrorist activity.
Combined with a huge expansion of the FBI's use of "national security letters" to obtain communications and banking records, the secret NSA and Treasury programs have built unprecedented government databases of private transactions, most of them involving people who prove irrelevant to terrorism investigators, Post staff writers Barton Gellman, Paul Blustein and Dafna Linzer reported.
The money flows revealed in the SWIFT records "don't lie," Snow told reporters today. "They tell a story," and ultimately "they lead to the terrorists themselves."
The program is "part of an overall governmental effort to map the terrorist networks, to apprehend the terrorists both here and around the world," Snow said. "By following the money, we've been able to locate operatives, we've been able to locate their financiers, we've been able to chart the terrorist networks, and we've been able to bring the terrorists to justice," he said. "There is no doubt that the program is an effective weapon in the larger war on terrorism."
Although the department has "been open and above-board" about the fact that it follows terrorist-related financial flows, the disclosure of the surveillance program involving SWIFT is "different," Snow said. "These disclosures go to the sources and the methods that are used. That can only help the terrorists. That can only make our job more difficult."
Treasury officials first spoke publicly about the program last night as the New York Times was preparing to publish a story about it in today's editions. The Times and other news organizations, including The Washington Post, posted articles about the program on their Web sites last night.
Snow said it was a "great disappointment" and "regrettable" that the program was revealed despite Treasury's efforts to keep it secret. "What the disclosures do is fundamentally . . . undermine and degrade an important source of information, make that source of information less useful." He added, "If people are sending money to help al-Qaeda, we want to know about it."
Snow said that "very significant protocols and safeguards" govern the cooperation between SWIFT and the Treasury Department, ensuring that all the data are kept "in an extremely secure environment," with access limited only to "people with appropriate security clearances." He said all inquiries go through a process that ensures they are "tied to a terrorist lead" and that all are "subject to review by SWIFT itself." The consortium has representatives, called "scrutineers," who observe the entire process and have the right to intervene to stop any improper inquiry, the Treasury secretary said.
As Snow and Levey described the program, it began with narrow subpoenas that SWIFT was not able to comply with because it lacked the ability to extract the specific information from its broad database. So SWIFT gave Treasury access to all of its data, and the two sides worked together to extract the limited records on the individuals or entities under investigation.
"The SWIFT subpoena is powerful but narrow, as it allows us access only to that information that is related to terrorism investigations," Levey said. "We are not permitted to browse through this data, nor can we search it for any non-terrorism investigation. In practice, this means that we have access to only a minute fraction of the data we obtain from SWIFT."
He noted that if suspected terrorist sends or receives money from someone, "you know that there's a real link between those two people." And anyone who wires money through a bank "needs to provide a name, address, account numbers and the like, exactly the kind of concrete information" that facilitates an investigation.
Levey said the records involve predominantly "overseas transfers" -- including those to or from the United States -- and do not contain "information on ordinary transactions within the United States," such as deposits, withdrawals, checks and electronic bill payments. Most domestic U.S. financial transactions are not handled by SWIFT, Levey said.
He said the program does not amount to data mining because it is limited to "targeted searches on individual targets," who are cited in the subpoenas by name along with a specific connection to an ongoing investigation.
"This is a very targeted search capability," Levey said.
He said he cannot say how many Americans have been affected by the program because SWIFT does not organize its information in a way to provide that information. But he said the number of searches carried out so far was in the "tens, maybe hundreds of thousands."
To date, auditors have "found consistently that the government is not abusing this data," Levey said. He said that in one instance, an audit found that a search was "inappropriate" and that as a result, the person who conducted it "was no longer allowed to work on this program." The information from the search was never disseminated, he added. He did not provide any other details.
Although "we have seen a trend toward informal transfers of money as well as cash couriers" to finance terrorist networks, Levey said, "this program remained powerful and valuable" because terrorists also have continued to use banks and may not have been aware of the role of SWIFT in tracking transactions.
"Just because there's a trend toward one way of moving money doesn't mean they don't move money in other ways," he said.

0 Comments:

Post a Comment

<< Home

web page hit counter
Travelocity Discount Travel