The Terrorist Finance Tracking Program (TFTP) is a United States government program to access financial transactions on the international SWIFT network that was revealed by The New York Times , The Wall Street Journal and The Los Angeles Times in June 2006. It was part of the Bush administration's War on Terrorism. After the covert action was disclosed, the so-called SWIFT Agreement was negotiated between the United States and the European Union.
A series of articles published on June 23, 2006, by the New York Times, the Wall Street Journal and the Los Angeles Times revealed that the United States government, specifically the US Treasury and the CIA, had developed methods to access the SWIFT transaction database after the September 11th attacks. [1] [2] [3]
According to the June 2006 New York Times article, the program helped lead to the capture of an al-Qaeda operative known as Hambali in 2003, believed to be the mastermind of the 2002 Bali bombing, as well as helped identify a Brooklyn man convicted in 2005 for laundering money for an al-Qaeda operative in Pakistan. [4] The Treasury Department and White House responded to the leak the day before it was published, claiming that the leak damaged counterterrorism activities. They also referred to the program as the "Terrorist Finance Tracking Program" ("TFTP"), similar to the Terrorist Surveillance Program in the NSA wiretapping controversy. [5]
The Terrorist Finance Tracking Program was viewed by the Bush administration as another tool in the "Global War on Terrorism". The administration contends the program allows additional scrutiny that could prove instrumental in tracking transactions between terrorist cells. Some have raised concerns that the program might also be a violation of United States and European financial privacy laws, because individual search warrants to access financial data were not obtained in advance. [6] In response to the claim that the program violates US law, some have noted that the U.S. Supreme Court in United States v. Miller (1976) has ruled that there is not an expected right to privacy for financial transaction records held by third parties and that "the Fourth Amendment does not prohibit the obtaining of information revealed to a third party and conveyed by him to Government authorities, even if the information is revealed on the assumption that it will be used only for a limited purpose and the confidence placed in the third party will not be betrayed". [7]
Immediately following the disclosure, SWIFT released a press statement asserting that they gave information to the United States in compliance with Treasury Department subpoenas, but claimed that "SWIFT received significant protections and assurances as to the purpose, confidentiality, oversight and control of the limited sets of data produced under the subpoenas". [8]
On 27 June 2006, it was revealed by the media that Belgium's central bank, the National Bank of Belgium, had known about the US government's access to the SWIFT databases since 2002. [9] The Belgian Christian Democratic and Flemish party claimed on June 28 that the actions of the CIA with SWIFT were in breach of Belgian privacy laws. The Belgian parliamentary committee that deals with the workings of the Belgian State Security Service (Comité I) reported that SWIFT was indeed in violation of Belgian and European privacy laws. [10]
In addition, the New York branch of the Dutch Rabobank is said to have delivered information on its European customers to the US government, in contempt of European privacy laws. The Dutch Data Protection Authority claims that Dutch banks could face fines if they hand over data on their customers to the US government. [11]
Consequently, the European Union (EU) obtained an agreement that they could send an investigating magistrate as High Representative of the EU to the United States in order to monitor the TFTP activities. This magistrate, Jean-Louis Bruguière, had a permanent office in Washington, D.C., at the Department of Treasury. [12]
Disclosures by former National Security Agency contractor Edward Snowden alleged the NSA was systematically undermining the SWIFT Agreement. No denial was issued by the American side, and the European Parliament passed a non-binding vote calling for the suspension of the agreement. [13] [14] A suspension would however require the consent of a two-thirds majority of EU governments. [15]
After European concerns with wholesale SWIFT data export were raised, it became necessary for the United States to negotiate a treaty with the EU in order to be able to continue accessing the SWIFT database.[ vague ] The Agreement between the European Union and the United States of America on the processing and transfer of Financial Messaging Data from the European Union to the United States for the purposes of the Terrorist Finance Tracking Program was negotiated during 2009.[ citation needed ] The treaty was first rejected by the European Parliament, however after a few months and a visit by US Vice President Joe Biden to the parliament, the European Commission introduced a proposal with strengthened safeguards, which was then adopted. [16] [17] [18] [19]
The scope of the treaty is to use financial payment messaging data to prevent, investigate, detect, and prosecute conduct pertaining to terrorism or terrorist financing. Terrorism is defined as "acts which involves violence or are otherwise dangerous to human life or create a risk of damage to property or infrastructure with the intent to intimidate a population or government or an international institution to act or abstain from acting or to seriously destabilize or destroy fundamental structures of a country or international organization."[ citation needed ]
The United States Treasury serves production orders to a designated provider of financial data. SWIFT is the only designated provider today. The request shall identify as clearly as possible the data necessary for the purpose of the treaty. The request should clearly substantiate the necessity of the data, and be tailored as narrowly as possible. Payments within the Single Euro Payments Area are excluded.[ citation needed ]
The U.S. Treasury shall process the data only for the purpose of the treaty and data mining is not allowed. The data must be secured and cannot be interconnected with any other database. Access to data shall be limited to investigations of terrorism. All searches must be based upon preexisting information or evidence of connection with terrorism. Information may only be shared with law enforcement, public security, or counterterrorism authorities in the United States or the EU.[ citation needed ]
Any person has the right to obtain a confirmation through the data protection authority in the EU member state that the person's data protection rights have been respected. Any person has the right to seek the rectification, erasure or blocking of his or her personal data where the data is inaccurate or the processing contravenes the treaty.[ citation needed ]
EU may request the aid of the United States to build up a European TFTP.[ citation needed ]
A number of Republicans in the U.S. House of Representatives criticized the New York Times for reporting on the program, [25] and Representative Peter T. King, then the House Homeland Security Committee chairman, called on the Bush administration to seek criminal charges against the Times under the Espionage Act of 1917 and other related federal statutes. [26] The Los Angeles Times and the Wall Street Journal divulged information about the TFTP at the same time. [27] The New York Times itself argued in a June 28, 2006 editorial that its reporting about the TFTP is protected by the First Amendment and serves a vital role, providing "information the public needs to make things right again". The New York Times editorial further argued that terrorists would have to be "fairly credulous" to believe their finances were not being tracked and that the reporting bore "no resemblance to security breaches, like disclosure of troop locations, that would clearly compromise the immediate safety of specific individuals. [28]
Some have also questioned whether the information in the original June 23, 2006 newspaper articles was even secret, despite its U.S. government classification, because of previous newspaper articles discussing SWIFT. Specifically, a 1998 Washington Post article, in the wake of the U.S. embassy bombings, mentioned that the "CIA and agents with Treasury's Financial Crimes Enforcement Network also will try to lay tripwires to find out when bin Laden moves funds by plugging into the computerized systems of bank transaction monitoring services – operated by the Federal Reserve and private organizations called SWIFT and CHIPS – that record the billions of dollars coursing through the global banking system daily." [29] Also, a September 21, 2001 Baltimore Sun article mentioned SWIFT "headquartered in Belgium" and conjectured about the ability of the U.S. National Security Agency "to follow the money through its electronic intercepts of such transactions". [30] Still others have questioned the secrecy of the TFTP because the Bush administration has made public announcements that it planned to track terrorist-related finances. For example, in a speech shortly after the September 11th attacks, George W. Bush elaborated on the Administration's intention to track terrorist funding, saying "if [financial institutions] fail to help us by sharing information or freezing accounts, the Department of the Treasury now has the authority to freeze their bank's assets and transactions in the United States". [31]
However, critics of the decision to disclose the classified program's existence, including U.S. Treasury Secretary John W. Snow, responded by arguing that there is a vast difference between stating general intentions to track terrorist finances and actually revealing the exact means employed to do so. Some of these critics called attention to the New York Times itself making no mention of either SWIFT or the Terrorist Finance Tracking Program in a November 29, 2005 article ironically detailing the Bush administration's apparent lack of progress in tracking terrorist finances. [32] Moreover, in an editorial on the press's obligations in wartime, the Wall Street Journal clarified the basic differences between its approach to the story and that of the New York Times. [33] As for Secretary Snow, he disagreed with executive editor of The New York Times Bill Keller's claim that terrorists are now exclusively using "other means" [34] to transfer funds, by stating that terrorists "have continued to [use] the formal financial system, which has made this program incredibly valuable". [35] Testifying before the House Financial Services Subcommittee on Oversight and Investigations on July 11, 2006, Stuart Levey, the Department of the Treasury's Under Secretary for Terrorism and Financial Intelligence, stated:
"Since being asked to oversee this program by then-Secretary Snow and then-Deputy Secretary Bodman almost two years ago, I have received the written output from this program as part of my daily intelligence briefing. For two years, I have been reviewing that output every morning. I cannot remember a day when that briefing did not include at least one terrorism lead from this program. Despite attempts at secrecy, terrorist facilitators have continued to use the international banking system to send money to one another, even after September 11th. This disclosure compromised one of our most valuable programs and will only make our efforts to track terrorist financing—and to prevent terrorist attacks—harder. Tracking terrorist money trails is difficult enough without having our sources and methods reported on the front page of newspapers." [36]
On October 22, 2006, Public Editor of The New York Times Byron Calame stated that he did not think the article should have been published, reversing his strong support of the Times in his June 2 column. "I haven't found any evidence in the intervening months that the surveillance program was illegal...The lack of appropriate oversight—to catch any abuses in the absence of media attention—was a key reason I originally supported publication. I think, however, that I gave it too much weight". [37]
In September 2006, however, the Belgian government declared that the SWIFT dealings with U.S. government authorities were, in fact, a breach of Belgian and European privacy laws. New York Times editor Bill Keller responded to Calame's “revisionist epiphany” in a letter published on November 6, 2006. Keller felt that Calame's premise that “the press should not reveal sensitive secret information unless there is a preponderance of evidence that the information exposes illegal or abusive actions by the government” set too high a bar. Keller explained, “The banking story landed in the context of a national debate about the concentration of executive power. The Swift program was the latest in a series of programs carried out without the customary checks and balances—in this case, Congressional oversight. Key members of Congress who would normally be apprised of such a program and who would be expected to monitor its safeguards only learned of the program because we did”. [38]
The Society for Worldwide Interbank Financial Telecommunication (Swift), legally S.W.I.F.T. SC, is a Belgian banking cooperative providing services related to the execution of financial transactions and payments between limited banks worldwide. Its principal function is to serve as the main messaging network through which limited international payments are initiated. It also sells software and services to financial institutions, mostly for use on its proprietary "SWIFTNet", and assigns ISO 9362 Business Identifier Codes (BICs), popularly known as "Swift codes".
Mass surveillance is the intricate surveillance of an entire or a substantial fraction of a population in order to monitor that group of citizens. The surveillance is often carried out by local and federal governments or governmental organizations, such as organizations like the NSA, but it may also be carried out by corporations. Depending on each nation's laws and judicial systems, the legality of and the permission required to engage in mass surveillance varies. It is the single most indicative distinguishing trait of totalitarian regimes. It is also often distinguished from targeted surveillance.
Europol, officially the European Union Agency for Law Enforcement Cooperation, is the law enforcement agency of the European Union (EU). Established in 1998, it is based in The Hague, Netherlands, and serves as the central hub for coordinating criminal intelligence and supporting the EU's member states in their efforts to combat various forms of serious and organized crime, as well as terrorism.
Privacy International (PI) is a UK-based registered charity that defends and promotes the right to privacy across the world. First formed in 1990, registered as a non-profit company in 2002 and as a charity in 2012, PI is based in London. Its current executive director, since 2012, is Dr Gus Hosein.
A passenger name record (PNR) is a record in the database of a computer reservation system (CRS) that contains the itinerary for a passenger or a group of passengers travelling together. The concept of a PNR was first introduced by airlines that needed to exchange reservation information in case passengers required flights of multiple airlines to reach their destination ("interlining"). For this purpose, IATA and ATA have defined standards for interline messaging of PNR and other data through the "ATA/IATA Reservations Interline Message Procedures - Passenger" (AIRIMP). There is no general industry standard for the layout and content of a PNR. In practice, each CRS or hosting system has its own proprietary standards, although common industry needs, including the need to map PNR data easily to AIRIMP messages, has resulted in many general similarities in data content and format between all of the major systems.
In general, compliance means conforming to a rule, such as a specification, policy, standard or law. Compliance has traditionally been explained by reference to the deterrence theory, according to which punishing a behavior will decrease the violations both by the wrongdoer and by others. This view has been supported by economic theory, which has framed punishment in terms of costs and has explained compliance in terms of a cost-benefit equilibrium. However, psychological research on motivation provides an alternative view: granting rewards or imposing fines for a certain behavior is a form of extrinsic motivation that weakens intrinsic motivation and ultimately undermines compliance.
Data retention defines the policies of persistent data and records management for meeting legal and business data archival requirements. Although sometimes interchangeable, it is not to be confused with the Data Protection Act 1998.
The International Safe Harbor Privacy Principles or Safe Harbour Privacy Principles were principles developed between 1998 and 2000 in order to prevent private organizations within the European Union or United States which store customer data from accidentally disclosing or losing personal information. They were overturned on October 6, 2015, by the European Court of Justice (ECJ), which enabled some US companies to comply with privacy laws protecting European Union and Swiss citizens. US companies storing customer data could self-certify that they adhered to 7 principles, to comply with the EU Data Protection Directive and with Swiss requirements. The US Department of Commerce developed privacy frameworks in conjunction with both the European Union and the Federal Data Protection and Information Commissioner of Switzerland.
The USA PATRIOT Act was passed by the United States Congress in 2001 as a response to the September 11, 2001 attacks. It has ten titles, each containing numerous sections. Title III: International Money Laundering Abatement and Financial Anti-Terrorism Act of 2001 is actually an act of Congress in its own right as well as being a title of the USA PATRIOT Act, and is intended to facilitate the prevention, detection and prosecution of international money laundering and the financing of terrorism. The title's sections primarily amend portions of the Money Laundering Control Act of 1986 and the Bank Secrecy Act of 1970.
The Office of Intelligence and Analysis (OIA) is a component of the United States Department of the Treasury responsible for the receipt, analysis, collation, and dissemination of foreign intelligence and counterintelligence information related to the operation and responsibilities of the Treasury Department.
The USA PATRIOT Act was passed by the United States Congress in 2001 as a response to the September 11 attacks in 2001. It has ten titles, with the third title written to prevent, detect, and prosecute international money laundering and the financing of terrorism.
Financial intelligence (FININT) is the gathering of information about the financial affairs of entities of interest, to understand their nature and capabilities, and predict their intentions. Generally the term applies in the context of law enforcement and related activities. One of the main purposes of financial intelligence is to identify financial transactions that may involve tax evasion, money laundering or some other criminal activity. FININT may also be involved in identifying financing of criminal and terrorist organisations. Financial intelligence can be broken down into two main areas, collection and analysis. Collection is normally done by a government agency, known as a financial intelligence organisation or Financial Intelligence Unit (FIU). The agency will collect raw transactional information and Suspicious activity reports (SAR) usually provided by banks and other entities as part of regulatory requirements. Data may be shared with other countries through intergovernmental networks. Analysis, may consist of scrutinizing a large volume of transactional data using data mining or data-matching techniques to identify persons potentially engaged in a particular activity. SARs can also be scrutinized and linked with other data to try to identify specific activity.
The al-Aqsa Foundation is an international charity established in 1997. The head office of the foundation was located in Germany until it was closed by the German authorities in July 2002. The organisation is known to have local branch offices in the Netherlands, Denmark, Belgium, Sweden, Pakistan, South Africa, Yemen and elsewhere.
Stuart A. Levey was the first Under Secretary for Terrorism and Financial Intelligence within the United States Department of the Treasury. He was sworn in on July 21, 2004 as a political appointee of President George W. Bush. President Barack Obama asked Levey to remain in his position and Levey was one of only a small number of Senate-confirmed Bush appointees who served in the Obama Administration. After leaving the government, Levey joined the private sector as chief legal officer of HSBC, CEO of Diem Association and chief legal officer of Oracle.
The Data Retention Directive, later declared invalid by the European Court of Justice, was at first passed on 15 March 2006 and regulated data retention, where data has been generated or processed in connection with the provision of publicly available electronic communications services or of public communications networks. It amended the Directive on Privacy and Electronic Communications. According to the Data Retention Directive, EU member states had to store information on all citizens' telecommunications data for a minimum of six months and at most twenty-four months, to be delivered on demand to police authorities.
Jan Philipp Albrecht is a German politician of the Alliance '90/The Greens, part of The Greens-European Free Alliance. From 2018 to 2022, he served as Minister for Energy, Agriculture, the Environment, Nature and Digitalization of Schleswig-Holstein. From 2009 until 2018, he was a Member of the European Parliament. He is specialized in the field of civil rights, data protection and democracy.
There have been a number of international sanctions against Iran imposed by a number of countries, especially the United States, and international entities. Iran was the most sanctioned country in the world until it was surpassed by Russia, following Russia's invasion of neighboring Ukraine in February 2022.
The Foreign Account Tax Compliance Act (FATCA) is a 2010 U.S. federal law requiring all non-U.S. foreign financial institutions (FFIs) to search their records for customers with indicia of a connection to the U.S., including indications in records of birth or prior residency in the U.S., or the like, and to report such assets and identities of such persons to the United States Department of the Treasury. FATCA also requires such persons to report their non-U.S. financial assets annually to the Internal Revenue Service (IRS) on form 8938, which is in addition to the older and further redundant requirement to report them annually to the Financial Crimes Enforcement Network (FinCEN) on form 114. Like U.S. income tax law, FATCA applies to U.S. residents and also to U.S. citizens and green card holders residing in other countries.
The Agreement between the United States of America and the European Union on the use and transfer of Passenger Name Records to the United States Department of Homeland Security is an international agreement between the United States of America and the European Union that was signed on 14 December 2011 for the purpose of providing passenger name records (PNR) from air carriers operating passenger flights to the United States Department of Homeland Security to "ensure security and to protect the life and safety of the public".
Qatar has been accused of allowing terror financiers to operate within its borders, which has been one of the justifications for the Qatar diplomatic crisis that started in 2017 and ended in 2021. In 2014, David S. Cohen, then United States Under Secretary of the Treasury for Terrorism and Financial Intelligence, accused Qatari authorities of allowing financiers who were on international blacklists to live freely in the country: "There are U.S.- and UN-designated terrorist financiers in Qatar that have not been acted against under Qatari law." Accusations come from a wide variety of sources including intelligence reports, government officials, and journalists.