Terrorist Finance Tracking Program

Last updated

The Terrorist Finance Tracking Program (TFTP) is a United States government program to access financial transactions on the international SWIFT network that was revealed by The New York Times , The Wall Street Journal and The Los Angeles Times in June 2006. It was part of the Bush administration's War on Terrorism. After the covert action was disclosed, the so-called SWIFT Agreement was negotiated between the United States and the European Union.

Contents

Overview

A series of articles published on June 23, 2006, by the New York Times, the Wall Street Journal and the Los Angeles Times revealed that the United States government, specifically the US Treasury and the CIA, had developed methods to access the SWIFT transaction database after the September 11th attacks. [1] [2] [3]

According to the June 2006 New York Times article, the program helped lead to the capture of an al-Qaeda operative known as Hambali in 2003, believed to be the mastermind of the 2002 Bali bombing, as well as helped identify a Brooklyn man convicted in 2005 for laundering money for an al-Qaeda operative in Pakistan. [4] The Treasury Department and White House responded to the leak the day before it was published, claiming that the leak damaged counterterrorism activities. They also referred to the program as the "Terrorist Finance Tracking Program" ("TFTP"), similar to the Terrorist Surveillance Program in the NSA wiretapping controversy. [5]

The Terrorist Finance Tracking Program was viewed by the Bush administration as another tool in the "Global War on Terrorism". The administration contends the program allows additional scrutiny that could prove instrumental in tracking transactions between terrorist cells. Some have raised concerns that the program might also be a violation of United States and European financial privacy laws, because individual search warrants to access financial data were not obtained in advance. [6] In response to the claim that the program violates US law, some have noted that the U.S. Supreme Court in United States v. Miller (1976) has ruled that there is not an expected right to privacy for financial transaction records held by third parties and that "the Fourth Amendment does not prohibit the obtaining of information revealed to a third party and conveyed by him to Government authorities, even if the information is revealed on the assumption that it will be used only for a limited purpose and the confidence placed in the third party will not be betrayed". [7]

Immediately following the disclosure, SWIFT released a press statement asserting that they gave information to the United States in compliance with Treasury Department subpoenas, but claimed that "SWIFT received significant protections and assurances as to the purpose, confidentiality, oversight and control of the limited sets of data produced under the subpoenas". [8]

European privacy laws

On 27 June 2006, it was revealed by the media that Belgium's central bank, the National Bank of Belgium, had known about the US government's access to the SWIFT databases since 2002. [9] The Belgian Christian Democratic and Flemish party claimed on June 28 that the actions of the CIA with SWIFT were in breach of Belgian privacy laws. The Belgian parliamentary committee that deals with the workings of the Belgian State Security Service (Comité I) reported that SWIFT was indeed in violation of Belgian and European privacy laws. [10]

In addition, the New York branch of the Dutch Rabobank is said to have delivered information on its European customers to the US government, in contempt of European privacy laws. The Dutch Data Protection Authority claims that Dutch banks could face fines if they hand over data on their customers to the US government. [11]

Consequently, the European Union (EU) obtained an agreement that they could send an investigating magistrate as High Representative of the EU to the United States in order to monitor the TFTP activities. This magistrate, Jean-Louis Bruguière, had a permanent office in Washington, D.C., at the Department of Treasury. [12]

Disclosures by former National Security Agency contractor Edward Snowden alleged the NSA was systematically undermining the SWIFT Agreement. No denial was issued by the American side, and the European Parliament passed a non-binding vote calling for the suspension of the agreement. [13] [14] A suspension would however require the consent of a two-thirds majority of EU governments. [15]

EU-U.S. relations

After European concerns with wholesale SWIFT data export were raised, it became necessary for the United States to negotiate a treaty with the EU in order to be able to continue accessing the SWIFT database.[ vague ] The Agreement between the European Union and the United States of America on the processing and transfer of Financial Messaging Data from the European Union to the United States for the purposes of the Terrorist Finance Tracking Program was negotiated during 2009.[ citation needed ] The treaty was first rejected by the European Parliament, however after a few months and a visit by US Vice President Joe Biden to the parliament, the European Commission introduced a proposal with strengthened safeguards, which was then adopted. [16] [17] [18] [19]

Scope

The scope of the treaty is to use financial payment messaging data to prevent, investigate, detect, and prosecute conduct pertaining to terrorism or terrorist financing. Terrorism is defined as "acts which involves violence or are otherwise dangerous to human life or create a risk of damage to property or infrastructure with the intent to intimidate a population or government or an international institution to act or abstain from acting or to seriously destabilize or destroy fundamental structures of a country or international organization."[ citation needed ]

Process

The United States Treasury serves production orders to a designated provider of financial data. SWIFT is the only designated provider today. The request shall identify as clearly as possible the data necessary for the purpose of the treaty. The request should clearly substantiate the necessity of the data, and be tailored as narrowly as possible. Payments within the Single Euro Payments Area are excluded.[ citation needed ]

Safeguards

The U.S. Treasury shall process the data only for the purpose of the treaty and data mining is not allowed. The data must be secured and cannot be interconnected with any other database. Access to data shall be limited to investigations of terrorism. All searches must be based upon preexisting information or evidence of connection with terrorism. Information may only be shared with law enforcement, public security, or counterterrorism authorities in the United States or the EU.[ citation needed ]

Citizen's rights

Any person has the right to obtain a confirmation through the data protection authority in the EU member state that the person's data protection rights have been respected. Any person has the right to seek the rectification, erasure or blocking of his or her personal data where the data is inaccurate or the processing contravenes the treaty.[ citation needed ]

European TFTP

EU may request the aid of the United States to build up a European TFTP.[ citation needed ]

History

2013

2012

  • February 26: Danish newspaper Berlingske reported that U.S. authorities evidently have sufficient control over SWIFT to seize money being transferred between two EU countries (Denmark and Germany), since they have seized around $26,000 which were being transferred from a Danish to a German bank. The money was a payment by a Danish businessman for a batch of Cuban cigars previously imported to Germany by a German supplier. As justification for the seizure, the U.S. Treasury stated that the Danish businessman has violated the United States embargo against Cuba. [20]

2011

  • October 25
    • European Data Protection Supervisor communication entitled Terrorist Finance Tracking System (TFTS) - European Commission Communication of 13 July 2011 (2011-0699) to Cecilia Malmström, Commissioner for Home Affairs, European Commission: [21]
      • "We support all the points made by the Article 29 Working Party in its letter of 29 September, based on its specific experience in analysing and monitoring the original agreement between the United States and the EU regarding the Terrorist Finance Tracking Programme (the "U.S. TFTP agreement"), which is the source of the developments of the Terrorist Finance Tracking System ("TFTS") at EU level".
      • "We would like to complement the observations of the WP29, especially in relation to the context in which the TFTS is envisaged, about [the question of] its necessity and proportionality, the procedural guarantees that should be introduced and finally with regard to its consequences on the existing US TFTP agreement".
    • European Data Protection Supervisor offers Comments on the Communication from the Commission to the European Parliament, the Council, the European Economic and Social Committee and the Committee of the Regions of 13 July 2011: "A European terrorist finance tracking system: Available options": [22]
      • [The] main reason for the development of a European terrorist finance tracking system ('EU TFTS') has its source in the present US TFTP agreement (and in particular its Article 11) and in the Council Decision of 13 July 2010 ("the Decision"). Currently, under TFTP, data are sent in bulk to the US, to be stored and filtered according to requests of the U.S. Treasury Department. This has raised serious criticism, especially by the European Parliament (and the EDPS and WP29), notably with regard to the necessity and proportionality of the 'bulk' data flows.
      • If the filtering of data is performed within the EU under TFTS, according to criteria which should be particularly strict (in order to comply with the necessity and proportionality tests), the data sent to the United States would be restricted as a result. This is essential in order to meet the EU data protection requirements, even if the data would not totally meet the (broad) requests of U.S. authorities.
  • September 29

2010

  • November 19:
    • Article 29 Working Party communication entitled EU-US General Agreement (D(2010) 837566) to Vice-President Viviane Reding, Commissioner for Justice, Fundamental Rights and Citizenship, European Commission: [23]
      • On 26 May 2010 the European Commission presented the draft negotiating mandate for an agreement between the European Union and the United States of America on the protection of personal data when transferred and processed for the purpose of preventing, investigating, detecting or prosecuting criminal offences, including terrorism, in the framework of police cooperation and judicial cooperation in criminal matters (hereafter: the EU-US general agreement). The Article 29 Working Party understands the negotiating mandate has been under discussion in both the Council and the European Parliament in recent months and may be adopted by the Justice and Home Affairs Council in early December. The Working Party regrets that it has not been consulted on the content of the negotiating mandate for this agreement, since these negotiations with the US are bound to be one of the most important steps within the area of data protection the EU is to take in the coming years.
  • July 13: Council Decision
    • EDPS: In the Decision, the Council agreed to the conclusion of the agreement between the EU and the US while at the same time inviting the Commission to submit to the European Parliament and to the Council a legal and technical framework for the extraction of data on EU territory. Furthermore, in giving its approval to the conclusion of the agreement on 8 July 2010, the European Parliament explicitly acknowledged the commitment by the Council and the Commission to set up the legal and technical framework allowing for the extraction of data on EU soil. This commitment would in the mid-term ensure the termination of bulk data transfers to the U.S. authorities. The requirement for a prior filtering of data within the EU is supported by the EDPS, as it would prevent the sending of bulk data to a third country. However, the Communication goes beyond the acknowledged purpose of filtering data in the EU, as it clearly indicates that the "system should not be set up just to provide relevant information to US authorities", as the authorities of the Member States "have a real interest in the results of such a system as well". The Communication therefore seems to legitimise the setting up of a whole new TFTS scheme, in an EU specific context, on the basis of the existing TFTP agreement. In other words, the Communication seems to justify the introduction of a new system which invades the privacy of EU citizens for the benefit of the authorities of EU Member States while using as a justification the assessment of utility of a system conceived and implemented to allow the US authorities to pursue their own investigation linked to terrorism. The EDPS has strong doubts about this approach, which does not appear to respect the principles of necessity and proportionality (as developed below). [22]
  • May 26: European Commission presents draft mandate.
    • "The Article 29 Working Party understands the negotiating mandate has been under discussion in both the Council and the European Parliament in recent months and may be adopted by the Justice and Home Affairs Council in early December. The Working Party regrets that it has not been consulted." - EDPS. [23]

2001-2006

  • November 22, 2006: Article 29 Working Party adopts Opinion 10/2006 on the processing of personal data by the Society for Worldwide Interbank Financial Telecommunication (SWIFT). [24]
    • [The] Article 29 Working Party emphasizes that even in the fight against terrorism and crime fundamental rights must remain guaranteed. It insists therefore on the respect of global data protection principles.
    • The Article 29 Working Party calls upon SWIFT and the financial institutions to take measures in order to remedy the currently illegal state of affairs without delay.
  • September 2006: The Belgian government declared that the SWIFT dealings with U.S. government authorities were, in fact, a breach of Belgian and European privacy laws.
  • June/July 2006
At the end of June and beginning of July 2006, press coverage in the European and US media questioned the role and responsibilities of the Society for Worldwide Interbank Financial Telecommunication (SWIFT) in relation to the transfer of personal data to the Office of Foreign Assets Control (OFAC) of the United States Department of the Treasury ("UST"). SWIFT is a Belgian based cooperative active in the processing of financial messages. It was revealed that personal data, collected and processed via the SWIFT network for international money transfers using the bank identification code ("BIC") or "SWIFT" code, had been provided to the UST since the end of 2001 on the basis of subpoenas under American law for terrorism investigation purposes. - Article 29 Working Party. [24]

New York Times' disclosure controversy

A number of Republicans in the U.S. House of Representatives criticized the New York Times for reporting on the program, [25] and Representative Peter T. King, then the House Homeland Security Committee chairman, called on the Bush administration to seek criminal charges against the Times under the Espionage Act of 1917 and other related federal statutes. [26] The Los Angeles Times and the Wall Street Journal divulged information about the TFTP at the same time. [27] The New York Times itself argued in a June 28, 2006 editorial that its reporting about the TFTP is protected by the First Amendment and serves a vital role, providing "information the public needs to make things right again". The New York Times editorial further argued that terrorists would have to be "fairly credulous" to believe their finances were not being tracked and that the reporting bore "no resemblance to security breaches, like disclosure of troop locations, that would clearly compromise the immediate safety of specific individuals. [28]

Some have also questioned whether the information in the original June 23, 2006 newspaper articles was even secret, despite its U.S. government classification, because of previous newspaper articles discussing SWIFT. Specifically, a 1998 Washington Post article, in the wake of the U.S. embassy bombings, mentioned that the "CIA and agents with Treasury's Financial Crimes Enforcement Network also will try to lay tripwires to find out when bin Laden moves funds by plugging into the computerized systems of bank transaction monitoring services – operated by the Federal Reserve and private organizations called SWIFT and CHIPS – that record the billions of dollars coursing through the global banking system daily." [29] Also, a September 21, 2001 Baltimore Sun article mentioned SWIFT "headquartered in Belgium" and conjectured about the ability of the U.S. National Security Agency "to follow the money through its electronic intercepts of such transactions". [30] Still others have questioned the secrecy of the TFTP because the Bush administration has made public announcements that it planned to track terrorist-related finances. For example, in a speech shortly after the September 11th attacks, George W. Bush elaborated on the Administration's intention to track terrorist funding, saying "if [financial institutions] fail to help us by sharing information or freezing accounts, the Department of the Treasury now has the authority to freeze their bank's assets and transactions in the United States". [31]

However, critics of the decision to disclose the classified program's existence, including U.S. Treasury Secretary John W. Snow, responded by arguing that there is a vast difference between stating general intentions to track terrorist finances and actually revealing the exact means employed to do so. Some of these critics called attention to the New York Times itself making no mention of either SWIFT or the Terrorist Finance Tracking Program in a November 29, 2005 article ironically detailing the Bush administration's apparent lack of progress in tracking terrorist finances. [32] Moreover, in an editorial on the press's obligations in wartime, the Wall Street Journal clarified the basic differences between its approach to the story and that of the New York Times. [33] As for Secretary Snow, he disagreed with executive editor of The New York Times Bill Keller's claim that terrorists are now exclusively using "other means" [34] to transfer funds, by stating that terrorists "have continued to [use] the formal financial system, which has made this program incredibly valuable". [35] Testifying before the House Financial Services Subcommittee on Oversight and Investigations on July 11, 2006, Stuart Levey, the Department of the Treasury's Under Secretary for Terrorism and Financial Intelligence, stated:

"Since being asked to oversee this program by then-Secretary Snow and then-Deputy Secretary Bodman almost two years ago, I have received the written output from this program as part of my daily intelligence briefing. For two years, I have been reviewing that output every morning. I cannot remember a day when that briefing did not include at least one terrorism lead from this program. Despite attempts at secrecy, terrorist facilitators have continued to use the international banking system to send money to one another, even after September 11th. This disclosure compromised one of our most valuable programs and will only make our efforts to track terrorist financing—and to prevent terrorist attacks—harder. Tracking terrorist money trails is difficult enough without having our sources and methods reported on the front page of newspapers." [36]

On October 22, 2006, Public Editor of The New York Times Byron Calame stated that he did not think the article should have been published, reversing his strong support of the Times in his June 2 column. "I haven't found any evidence in the intervening months that the surveillance program was illegal...The lack of appropriate oversight—to catch any abuses in the absence of media attention—was a key reason I originally supported publication. I think, however, that I gave it too much weight". [37]

In September 2006, however, the Belgian government declared that the SWIFT dealings with U.S. government authorities were, in fact, a breach of Belgian and European privacy laws. New York Times editor Bill Keller responded to Calame's “revisionist epiphany” in a letter published on November 6, 2006. Keller felt that Calame's premise that “the press should not reveal sensitive secret information unless there is a preponderance of evidence that the information exposes illegal or abusive actions by the government” set too high a bar. Keller explained, “The banking story landed in the context of a national debate about the concentration of executive power. The Swift program was the latest in a series of programs carried out without the customary checks and balances—in this case, Congressional oversight. Key members of Congress who would normally be apprised of such a program and who would be expected to monitor its safeguards only learned of the program because we did”. [38]

See also

Further reading

Related Research Articles

<span class="mw-page-title-main">SWIFT</span> Financial telecommunication network

The Society for Worldwide Interbank Financial Telecommunication (Swift), legally S.W.I.F.T. SC, is a Belgian banking cooperative providing services related to the execution of financial transactions and payments between limited banks worldwide. Its principal function is to serve as the main messaging network through which limited international payments are initiated. It also sells software and services to financial institutions, mostly for use on its proprietary "SWIFTNet", and assigns ISO 9362 Business Identifier Codes (BICs), popularly known as "Swift codes".

<span class="mw-page-title-main">Mass surveillance</span> Intricate surveillance of an entire or a substantial fraction of a population

Mass surveillance is the intricate surveillance of an entire or a substantial fraction of a population in order to monitor that group of citizens. The surveillance is often carried out by local and federal governments or governmental organizations, such as organizations like the NSA, but it may also be carried out by corporations. Depending on each nation's laws and judicial systems, the legality of and the permission required to engage in mass surveillance varies. It is the single most indicative distinguishing trait of totalitarian regimes. It is also often distinguished from targeted surveillance.

<span class="mw-page-title-main">Europol</span> European Union law enforcement agency

Europol, officially the European Union Agency for Law Enforcement Cooperation, is the law enforcement agency of the European Union (EU). Established in 1998, it is based in The Hague, Netherlands, and serves as the central hub for coordinating criminal intelligence and supporting the EU's member states in their efforts to combat various forms of serious and organized crime, as well as terrorism.

<span class="mw-page-title-main">Privacy International</span>

Privacy International (PI) is a UK-based registered charity that defends and promotes the right to privacy across the world. First formed in 1990, registered as a non-profit company in 2002 and as a charity in 2012, PI is based in London. Its current executive director, since 2012, is Dr Gus Hosein.

A passenger name record (PNR) is a record in the database of a computer reservation system (CRS) that contains the itinerary for a passenger or a group of passengers travelling together. The concept of a PNR was first introduced by airlines that needed to exchange reservation information in case passengers required flights of multiple airlines to reach their destination ("interlining"). For this purpose, IATA and ATA have defined standards for interline messaging of PNR and other data through the "ATA/IATA Reservations Interline Message Procedures - Passenger" (AIRIMP). There is no general industry standard for the layout and content of a PNR. In practice, each CRS or hosting system has its own proprietary standards, although common industry needs, including the need to map PNR data easily to AIRIMP messages, has resulted in many general similarities in data content and format between all of the major systems.

In general, compliance means conforming to a rule, such as a specification, policy, standard or law. Compliance has traditionally been explained by reference to the deterrence theory, according to which punishing a behavior will decrease the violations both by the wrongdoer and by others. This view has been supported by economic theory, which has framed punishment in terms of costs and has explained compliance in terms of a cost-benefit equilibrium. However, psychological research on motivation provides an alternative view: granting rewards or imposing fines for a certain behavior is a form of extrinsic motivation that weakens intrinsic motivation and ultimately undermines compliance.

Data retention defines the policies of persistent data and records management for meeting legal and business data archival requirements. Although sometimes interchangeable, it is not to be confused with the Data Protection Act 1998.

The International Safe Harbor Privacy Principles or Safe Harbour Privacy Principles were principles developed between 1998 and 2000 in order to prevent private organizations within the European Union or United States which store customer data from accidentally disclosing or losing personal information. They were overturned on October 6, 2015, by the European Court of Justice (ECJ), which enabled some US companies to comply with privacy laws protecting European Union and Swiss citizens. US companies storing customer data could self-certify that they adhered to 7 principles, to comply with the EU Data Protection Directive and with Swiss requirements. The US Department of Commerce developed privacy frameworks in conjunction with both the European Union and the Federal Data Protection and Information Commissioner of Switzerland.

The USA PATRIOT Act was passed by the United States Congress in 2001 as a response to the September 11, 2001 attacks. It has ten titles, each containing numerous sections. Title III: International Money Laundering Abatement and Financial Anti-Terrorism Act of 2001 is actually an act of Congress in its own right as well as being a title of the USA PATRIOT Act, and is intended to facilitate the prevention, detection and prosecution of international money laundering and the financing of terrorism. The title's sections primarily amend portions of the Money Laundering Control Act of 1986 and the Bank Secrecy Act of 1970.

<span class="mw-page-title-main">Office of Intelligence and Analysis (Treasury Department)</span> Agency of the United States Department of the Treasury

The Office of Intelligence and Analysis (OIA) is a component of the United States Department of the Treasury responsible for the receipt, analysis, collation, and dissemination of foreign intelligence and counterintelligence information related to the operation and responsibilities of the Treasury Department.

The USA PATRIOT Act was passed by the United States Congress in 2001 as a response to the September 11 attacks in 2001. It has ten titles, with the third title written to prevent, detect, and prosecute international money laundering and the financing of terrorism.

Financial intelligence (FININT) is the gathering of information about the financial affairs of entities of interest, to understand their nature and capabilities, and predict their intentions. Generally the term applies in the context of law enforcement and related activities. One of the main purposes of financial intelligence is to identify financial transactions that may involve tax evasion, money laundering or some other criminal activity. FININT may also be involved in identifying financing of criminal and terrorist organisations. Financial intelligence can be broken down into two main areas, collection and analysis. Collection is normally done by a government agency, known as a financial intelligence organisation or Financial Intelligence Unit (FIU). The agency will collect raw transactional information and Suspicious activity reports (SAR) usually provided by banks and other entities as part of regulatory requirements. Data may be shared with other countries through intergovernmental networks. Analysis, may consist of scrutinizing a large volume of transactional data using data mining or data-matching techniques to identify persons potentially engaged in a particular activity. SARs can also be scrutinized and linked with other data to try to identify specific activity.

al-Aqsa Foundation International charitable organization (est. 1997)

The al-Aqsa Foundation is an international charity established in 1997. The head office of the foundation was located in Germany until it was closed by the German authorities in July 2002. The organisation is known to have local branch offices in the Netherlands, Denmark, Belgium, Sweden, Pakistan, South Africa, Yemen and elsewhere.

<span class="mw-page-title-main">Stuart A. Levey</span> American government official

Stuart A. Levey was the first Under Secretary for Terrorism and Financial Intelligence within the United States Department of the Treasury. He was sworn in on July 21, 2004 as a political appointee of President George W. Bush. President Barack Obama asked Levey to remain in his position and Levey was one of only a small number of Senate-confirmed Bush appointees who served in the Obama Administration. After leaving the government, Levey joined the private sector as chief legal officer of HSBC, CEO of Diem Association and chief legal officer of Oracle.

<span class="mw-page-title-main">Data Retention Directive</span> European Union directive on storing telephony communications

The Data Retention Directive, later declared invalid by the European Court of Justice, was at first passed on 15 March 2006 and regulated data retention, where data has been generated or processed in connection with the provision of publicly available electronic communications services or of public communications networks. It amended the Directive on Privacy and Electronic Communications. According to the Data Retention Directive, EU member states had to store information on all citizens' telecommunications data for a minimum of six months and at most twenty-four months, to be delivered on demand to police authorities.

<span class="mw-page-title-main">Jan Philipp Albrecht</span> German politician

Jan Philipp Albrecht is a German politician of the Alliance '90/The Greens, part of The Greens-European Free Alliance. From 2018 to 2022, he served as Minister for Energy, Agriculture, the Environment, Nature and Digitalization of Schleswig-Holstein. From 2009 until 2018, he was a Member of the European Parliament. He is specialized in the field of civil rights, data protection and democracy.

There have been a number of international sanctions against Iran imposed by a number of countries, especially the United States, and international entities. Iran was the most sanctioned country in the world until it was surpassed by Russia, following Russia's invasion of neighboring Ukraine in February 2022.

<span class="mw-page-title-main">Foreign Account Tax Compliance Act</span> 2010 U.S. tax law

The Foreign Account Tax Compliance Act (FATCA) is a 2010 U.S. federal law requiring all non-U.S. foreign financial institutions (FFIs) to search their records for customers with indicia of a connection to the U.S., including indications in records of birth or prior residency in the U.S., or the like, and to report such assets and identities of such persons to the United States Department of the Treasury. FATCA also requires such persons to report their non-U.S. financial assets annually to the Internal Revenue Service (IRS) on form 8938, which is in addition to the older and further redundant requirement to report them annually to the Financial Crimes Enforcement Network (FinCEN) on form 114. Like U.S. income tax law, FATCA applies to U.S. residents and also to U.S. citizens and green card holders residing in other countries.

The Agreement between the United States of America and the European Union on the use and transfer of Passenger Name Records to the United States Department of Homeland Security is an international agreement between the United States of America and the European Union that was signed on 14 December 2011 for the purpose of providing passenger name records (PNR) from air carriers operating passenger flights to the United States Department of Homeland Security to "ensure security and to protect the life and safety of the public".

Qatar has been accused of allowing terror financiers to operate within its borders, which has been one of the justifications for the Qatar diplomatic crisis that started in 2017 and ended in 2021. In 2014, David S. Cohen, then United States Under Secretary of the Treasury for Terrorism and Financial Intelligence, accused Qatari authorities of allowing financiers who were on international blacklists to live freely in the country: "There are U.S.- and UN-designated terrorist financiers in Qatar that have not been acted against under Qatari law." Accusations come from a wide variety of sources including intelligence reports, government officials, and journalists.

References

  1. Lichtblau, Eric and Risen, James. "Bank Data Is Sifted by U.S. in Secret to Block Terror", New York Times, June 22, 2006. Retrieved June 23, 2006.
  2. Simpson, Glenn R. "U.S. Treasury Tracks Financial Data In Secret Program", Wall Street Journal, June 22, 2006. Retrieved June 23, 2006.
  3. Meyer, Josh and Miller, Greg. "Secret U.S. Program Tracks Global Bank Transfers", Los Angeles Times. June 22, 2006. Retrieved June 23, 2006.
  4. Lichtblau, Eric & Risen, James (June 23, 2006). "Bank Data Is Sifted by U.S. in Secret to Block Terror". New York Times . Retrieved 2006-07-10.
  5. Blustein, Paul, Gellman, Barton, and Linzer, Dafna. "Bank Records Secretly Tapped", Washington Post, June 23, 2006. Retrieved June 23, 2006.
  6. Bilefsky, Dan (June 28, 2006). "Rights group complains". The Boston Globe.
  7. U.S. Supreme Court. United States v. Miller, 425 U.S. 435 (1976), Argued January 12, 1976. Decided April 21, 1976. Retrieved July 1, 2006.
  8. "Swift Press Release on the Program [ dead link ], Los Angeles Times, June 22, 2006. Retrieved June 23, 2006.
  9. NBB 'aware' of Swift's actions since 2002, Expatica, June 27, 2006. Retrieved June 27, 2006.
  10. Brand, Constant (2005-09-28). "Belgian PM: Data Transfer Broke Rules". Washington Post . Retrieved May 25, 2010.
  11. "Bank wacht boete bij zwijgen over informeren VS" (in Dutch). NRC Handelsblad. 2007-03-10.
  12. Article 29 Data Protection Working Party, Press Release - Hearings of SWIFT representatives and Judge Bruguière, 8 April 2009
  13. 1 2 "MEPs call for suspension of EU-US bank data deal in response to NSA snooping | News | European Parliament". www.europarl.europa.eu. 23 October 2013. Retrieved 15 November 2023.
  14. 1 2 Ermert, Monika (23 October 2013). "European Parliament: No More Bank Data Transfers To US For Anti-Terror Investigations". ip-watch.org. Intellectual Property Watch. Retrieved November 2, 2013.
  15. "Merkel to seek intelligence rule book with US". EUobserver. 25 October 2013. Retrieved 15 November 2023.
  16. "Procedure File: 2009/0190(NLE) | Legislative Observatory | European Parliament". oeil.secure.europarl.europa.eu. Retrieved 15 November 2023.
  17. "Remarks by Vice President Biden to the European Parliament". whitehouse.gov. 6 May 2010. Retrieved 15 November 2023.
  18. "EuropeanVoice.com: MEPs vote to suspend SWIFT agreement with US, 23 October 2013" . Retrieved 15 November 2023.
  19. "Procedure File: 2010/0178(NLE) | Legislative Observatory | European Parliament". oeil.secure.europarl.europa.eu. Retrieved 15 November 2023.
  20. Simon Bendtsen & Peter Suppli Benson (26 February 2012). "Dansk politimand fanget i amerikansk terrornet". Berlingske (in Danish). Retrieved 26 February 2012.
  21. Letter edps.europa.eu
  22. 1 2 Consultation and comments edps.europa.eu
  23. 1 2 Commissioner agreement ec.eu
  24. 1 2 European Commission document [ dead link ]
  25. O’Connor, Patrick and Allen, Jonathan. "GOP bill targets NY Times Archived 2006-10-20 at the Wayback Machine ", The Hill, June 28, 2006. Retrieved June 28, 2006.
  26. Devlin Barrett. "Lawmaker Wants Times Prosecuted", The Washington Post, June 26, 2006. Retrieved July 3, 2006.
  27. Editors. "Bush's hypocrisy once again comes into focus", The Albuquerque Tribune, June 29, 2006. Retrieved June 29, 2006.
  28. Editors. "Patriotism and the Press", New York Times, June 28, 2006. Retrieved July 3, 2006.
  29. Mintz, John (August 28, 1998). "Bin Laden's Finances Are Moving Target". The Washington Post . Retrieved 2006-07-11.
  30. Shane, Scott (September 21, 2001). "Authorities trying to track money back to bin Laden". Baltimore Sun . Retrieved 2007-12-29.
  31. "President Freezes Terrorists' Assets". 14 October 2004. Archived from the original on 2004-10-14. Retrieved 15 November 2023.
  32. Lichtblau, Eric (November 29, 2005). "U.S. Lacks Strategy to Curb Terror Funds, Agency Says". New York Times . Retrieved 2006-07-08.
  33. "Opinion & Reviews - Wall Street Journal".
  34. Keller, Bill. "Letter From Bill Keller on The Times's Banking Records Report" New York Times, June 25, 2006. Retrieved June 25, 2006.
  35. Snow, John W. "Letter to the Editors of The New York Times by Treasury Secretary Snow Archived 2006-09-23 at the Wayback Machine ", June 26, 2006. Retrieved June 26, 2006
  36. Levey, Stuart "Testimony of Stuart Levey, Under Secretary Terrorism and Financial Intelligence U.S. Department of the Treasury Before the House Financial Services Subcommittee on Oversight and Investigations Archived 2006-09-23 at the Wayback Machine ", July 11, 2006. Retrieved July 23, 2006
  37. Calame, Byron (October 22, 2006). "Can 'Magazines' of The Times Subsidize News Coverage?". New York Times. Retrieved May 25, 2010.
  38. Calame, Byron (November 6, 2006). "Bill Keller Responds to Column on Swift Mea Culpa". New York Times. Retrieved May 25, 2010.