Staff Report to the Commission

Автор работы: Пользователь скрыл имя, 11 Ноября 2012 в 15:08, контрольная работа

Описание

The Commission staff organized its work around specialized studies, or monographs,
prepared by each of the teams. We used some of the evolving draft material for these
studies in preparing the seventeen staff statements delivered in conjunction with the
Commission’s 2004 public hearings. We used more of this material in preparing draft
sections of the Commission’s final report.

Работа состоит из  1 файл

National Commission on Terrorist Attacks.docx

— 342.49 Кб (Скачать документ)

scrutiny without legitimate basis, and could even extend to refusing to service customers

meeting a certain profile. Of course, religion, nation of origin, or ethnicity can and should

be taken into consideration, along with many other factors, in the subjective judgment as

to whether a certain transaction or account is suspicious. Our point is that profiling—by

itself—is both an unfair and an ineffective way for financial institutions to attack terrorist

financing.

52 FinCEN, SAR Bulletin, no. 4 (Jan. 2002). Typically, they included structuring multiple deposits or other

transactions to be below the $10,000 reporting threshold, collecting funds through a variety of financial

channels then funneling them to a small number of foreign beneficiaries, or a volume of financial activity

inconsistent with the stated purpose of the account.

National Commission on Terrorist Attacks Upon the United States

58

That being said, there may be utility in having financial institutions examine transactions

for indicia of terrorist financing. It certainly assists in preventing open and notorious

fund-raising and forces terrorists and their sympathizers to raise and move money

clandestinely, thereby raising the costs and risks involved. The deterrent value in such

activity is significant and, while it cannot be measured in any meaningful way, ought not

to be discounted.

Financial Institutions Have a Role in Combating Terrorist

Financing in the United States

The inability of financial institutions to detect terrorist operatives or terrorist fund-raising

does not relegate the private sector to the sidelines in the fight against terrorism. To the

contrary, there are a number of things that financial institutions can do right now. There

also are a number of things that could be done in the future, if current law or government

policies are changed. This section addresses what can be done now and assesses some

possibilities for the future.

Now: Helping the government find the terrorists

Financial tracking

Although financial institutions lack information that can enable them to identify

terrorists, they have information that can be absolutely vital in finding terrorists. If the

government can determine where a terrorist suspect banks, his account opening

documents can provide his address, and his ATM and credit card usage can show where

he is and what he is doing. Again, the 9/11 plot provides a good example. Had the U.S.

government been able in August 2001 to learn that hijackers Nawaf al Hazmi and Khalid

al Mihdhar had accounts in their names at small New Jersey banks, it could have found

them. The hijackers actively used these accounts, through ATM, debit card, and cash

transactions, until September 10. Among other things, they used the debit cards to pay for

hotel rooms—activity that would have enabled the FBI to locate them, had the FBI been

able to get the transaction records fast enough. Moreover, al Hazmi used his debit card on

August 27 to buy tickets on Flight 77 for himself, his brother, and fellow Flight 77

hijacker Salem al Hazmi.

If the FBI had found either al Mihdhar or Nawaf al Hazmi, it could have found the other.

They not only shared a common bank but frequently were together when conducting

transactions. After locating al Mihdhar and al Hazmi, the FBI could have potentially

linked them through financial records to the other Flight 77 hijackers. For example, as

noted, Nawaf al Hazmi used his debit card on August 27 to buy plane tickets for himself

and his brother, linking those two hijackers. Nawaf al Hazmi and Flight 77 pilot Hani

Hanjour had opened separate savings accounts at the same small New Jersey bank at the

same time and both gave the same address. On July 9, 2001, the other Flight 77 muscle

hijacker, Majed Moqed, opened an account at another small New Jersey bank at the same

Terrorist Financing Staff Monograph

59

time as Nawaf al Hazmi, and used the same address. Given timely access to the relevant

records and sufficient time to conduct a follow-up investigation, the FBI could have

shown that Hani Hanjour, Majed Moqed, and Salem al Hazmi were connected to

potential terrorist operatives al Mihdhar and Nawaf al Hazmi. No one can say where the

investigation would have gone from there, but financial records could potentially have

been used, along with other information—including perhaps information found in the

possession of or provided by the Flight 77 hijackers—to link the Flight 77 hijackers to

the others and, perhaps, disrupt the plot.

Unfortunately, this theoretical investigation would not have worked quite as smoothly in

the world that existed before September 11. First, an agent attempting to locate the

hijackers would have needed to know where to look. There are thousands of financial

institutions in the United States, and making an inquiry of each one of them, regardless of

the exigency of the situation, would not have been a realistic enterprise. Even an

experienced agent tasked to find al Mihdhar or al Hazmi would have been unlikely to

think to use financial tracking; and an agent who did probably would have first called

those institutions with which he or she had some personal relationship—probably big

banks.

Moreover, before 9/11 financial investigations almost always moved at a slow,

methodical pace. In a typical investigation, a financial institution received a grand jury

subpoena or a National Security Letter (NSL) from a federal prosecutor or agent. The

subpoena had a return date—the date by which the bank was required to produce the

records requested. In a typical investigation, the bank searched its records and produced

hard copies of the material requested. Banks and other financial institutions then needed

substantial time to locate and produce records, even in response to a lawful subpoena.

Financial institutions had been prohibited from giving law enforcement certain records

absent compulsory legal process.

Before 9/11, the U.S government did not think in terms of financial tracking, certainly

not systematically and on an urgent basis. The terrorist attacks changed this thinking.

Since 9/11, the government uses financial information to search out terrorist networks so

that a known suspect like al Mihdhar could be quickly located. There are now two

primary approaches for doing this: FBI outreach that has enhanced private sector

cooperation and Section 314(a) of the USA PATRIOT Act.

The FBI’s Terrorist Financing Operations Section (TFOS) has taken the existing legal

rules, which were developed within the context of traditional after-the-fact investigation

of financial crimes, and created a systematic approach to gain expedited access to

financial data in emergencies. To facilitate emerging situations, the FBI has compiled a

list of high-level contacts within the financial community—banks, brokerage houses,

credit card vendors, and money services businesses—to whom it can turn to get financial

information on an expedited basis at any time, including nights, weekends, and holidays.

The FBI serves them on an expedited basis with a subpoena or other legal process to get

the relevant data. In true emergencies, the FBI can get information quickly to locate an

individual or find links among co-conspirators.

National Commission on Terrorist Attacks Upon the United States

60

Applying the post-9/11 FBI approach to the pre-9/11 search for al Mihdhar and al Hazmi

strongly suggests the current system would have enabled the hijackers to be quickly

located. Indeed, the recently retired founder and chief of TFOS stated that given the same

circumstances today, the FBI would find al Mihdhar “in a heartbeat.”53 Corroborating this

contention, FBI has successfully used its system a number of times to locate terrorist

suspects and prevent terrorist attacks. For example, after the FBI received information

that certain potential terrorists had infiltrated the United States, TFOS put into practice

the process it had developed to track the suspects through their financial transactions. The

TFOS process proved successful in obtaining useful data in a very compressed time

frame. Although the subjects proved not to be terrorists, the system demonstrated its

capability. The FBI’s ability to do near real-time financial tracking has enabled it to

locate terrorist operatives in a foreign country and prevent terrorist attacks there on

several occasions. The system also helped crack a major criminal case, played a role in

clearing certain persons wrongly accused of terrorism, and has proved very valuable in

vetting potential threats.

The second approach to obtaining basic financial information on an expedited basis is

through a regulation issued under Section 314(a) of the USA PATRIOT Act. By this

regulation, the Department of Treasury requires financial institutions upon the

government’s request to search their records and determine if they have any information

involving specific individuals. Financial institutions must report any positive matches to

law enforcement within two weeks after the request for information. If there are matches,

law enforcement must follow up with a subpoena to obtain the actual transaction records

as discussed above. In an emergency, law enforcement can ask Treasury to require banks

to respond more quickly to the request, sometimes in two days, a procedure that they

have used on several occasions thus far.

In practice, this process enables law enforcement to find out if an individual of interest

has accounts or has conducted transactions in any one of thousands of financial

institutions across the country. It saves an investigator hundreds of hours that would have

otherwise been spent on a bank-by-bank inquiry—an inquiry that would not have been

done under the old system owing to time and resource constraints. One agent told the

Commission staff that the new procedure so far has produced “tremendous results.” She

cited an instance in which a terrorism investigation resulted in the discovery of two bank

accounts using conventional investigative techniques. Then, as a result of the Section 314

process, investigators were able to identify 19 other accounts across the country—

accounts that they would have never been able to find otherwise.54

53 By contrast, he said that while it would have been theoretically possible to use financial tracking to find

the hijackers before 9/11, the probability of doing so in a timely fashion would have been extremely low.

54 One concern about the Section 314 process is the possibility that a request to thousands of financial

institutions will cause the information to be leaked. In a Las Vegas criminal investigation in October 2002

and a New York terrorism case in March 2003, the media published the fact of the law enforcement

requests. In the New York case, the New York Post even called the subjects to ask them why the FBI was

making the request. As a result, the FBI conducts a risk-benefit analysis before making each request. There

are civil and criminal penalties in the event of a disclosure, and Treasury includes a warning with every

request. There is no guarantee, however, that such warnings will be sufficient to deter leaks.

Terrorist Financing Staff Monograph

61

Account opening and customer identification procedures/data

retention

Financial institutions play a critical role in any effort to find terrorists under either the

FBI’s system or Section 314. To fulfill this role properly in the life-and-death

emergencies that can arise, financial institutions must (1) know their customers by their

real names and possess other essential identifying information, (2) have the ability to

access this information in a timely fashion, and (3) quickly provide this information to

the government in a format in which it can be effectively used.

Section 326 of the USA PATRIOT Act requires that financial institutions “enhance the

financial footprint” of their customers by ensuring effective measures for verifying their

identity. Section 326 recognized that effective customer identification may deter the use

of financial institutions by terrorist financiers and money launderers and also assist in

leaving an audit trail that law enforcement can use to identify and track terrorist suspects

when they conduct financial transactions. In May 2003 the Department of the Treasury

issued regulations implementing the statute, setting forth the type of information that

must be collected as well as the acceptable methods for verifying identity.

The need for accurate identifying information puts a premium on financial institutions

having effective account opening procedures that vet the true identify of each customer,

to the extent possible. A name search for Khalid al Mihdhar will not find him if he is

banking under another name. Obviously, banks cannot be expected to detect perfectly

forged passports and other identification documents; but terrorists rarely are perfect, and

training in spotting false identification documents could help bank personnel catch the

most egregious examples. In addition, bank personnel must ensure that account

documents reflect the full and accurate name of the customer, even if that name is long.55

Equally important, banks must obtain and accurately record key identifying information

about their customers, including date of birth, Social Security number, and passport

number. Many names are so common that nationwide searches for them would generate

so many false positives as to be useless in an emergency. At times, however, the FBI can

obtain and provide other identifying information, such as a passport number, which can

be crucial in narrowing the search—provided that the institution where the subject is a

customer has that information.

The need to locate terrorist operatives in the most exigent circumstances means that

financial institutions must be able to access their data quickly. Quick retrieval can be a

problem for some financial institutions, where years of piecemeal information-system

upgrades have created a dysfunctional structure that greatly complicates the task of

determining if a particular person is a customer. For example, an official of one midsize

55 Shortening the name could mean that the account will be missed if the FBI is seeking a permutation

different than the one used. For example, Ali Abdul Aziz Ali, a.k.a. Ammar al Baluchi, a key facilitator of

the 9/11 attacks, would not be found if a bank listed him only as Abdul Aziz Ali and the FBI was looking

for Ammar al Baluchi.

National Commission on Terrorist Attacks Upon the United States

62

regional bank told Commission staff that his institution must email 28 different people to

respond to a Section 314(a) request. Some banks simply lack electronic searching

capability altogether. An FBI agent with a leading role in the Bureau’s financial-tracking

effort said that many financial institutions can search their data only manually, which is

both resource-intensive and painfully slow in an emergency. Ideally, financial

institutions should be able to do quick electronic searches by customer name, by other

identifying information such as Social Security number or date of birth, or even by

address or employment. Many financial institutions lack this ability today.

Once a financial institution has informed the government that a suspect is a customer and

has received appropriate legal process, it can assist law enforcement greatly by providing

continuous updates about the suspect’s transactions. For example, the information that

the suspect just used his credit card to rent a hotel room, book an airline flight, or rent a

Ryder truck can be essential in an emergency. Many sophisticated financial institutions

can provide the FBI with near “real-time”  information on a suspect’s activities, but other

institutions entirely lack this capability, owing to technical limitations.

Finally, upon receipt of legal process, financial institutions must be able to communicate

the relevant account information to the government officials quickly and efficiently. For

many types of information, this means in electronic format. Although the FBI has long

lagged behind the rest of the country in information systems technology, it has made

tremendous strides since 9/11 in using available technology to find terrorists suspects,

especially through TFOS’s financial-tracking efforts. In many cases, emergency tracking

can be streamlined if information is provided to TFOS in electronic format. Many

financial institutions lack this capability, however.

The FBI’s ability to find terrorist suspects in an emergency through financial tracking

depends in large part on the private sector’s voluntary cooperation. By all reports, the

financial sector’s cooperation has been immense since 9/11, but there is a risk that

cooperation will decrease as the terrorist attacks fade into history and antiterrorism efforts

become just another cost center for financial institutions. Government misuse of

emergency procedures in non-emergency situations could also substantially reduce the

likelihood that the private sector will respond when its help is truly needed to save lives.

To avoid this problem, it is critical that law enforcement and the financial community

maintain good lines of communication. This communication is important at all levels.

Industry groups and major national institutions must meet regularly with national law

enforcement leaders, such as the senior agents running FBI TFOS and the director of

FinCEN, to focus on larger strategic issues. At the same time, FBI field offices need to

reach out to smaller regional financial institutions, which they may need to contact in an

emergency.

This is not to say that financial institutions should become simply another appendage of

law enforcement. To the contrary, under either the FBI approach or Section 314(a),

without legal process financial institutions can answer only one basic question: does X

have an account at your bank? Everything beyond this question requires legal process

under current law. It is hard to see why any privacy or liberty concerns should be raised

Terrorist Financing Staff Monograph

63

about the private sector and financial institutions working together to develop streamlined

procedures for providing critical data quickly in an emergency—pursuant to a lawful

subpoena or other process.

The future: What more can be done?

A number of proposals have been made in recognition that the traditional BSA approach

is inadequate to address the challenges of terrorist financing.

Sharing classified information with bank personnel: A bad idea

The BSA model fails with respect to terrorist financing because the government—not the

financial institutions—has the information that can best identify the terrorist operatives or

fund-raisers. Some have proposed correcting that problem by providing security

clearances to financial institution personnel and then providing these cleared officials

with classified intelligence about terrorist financing. The idea is that the cleared bank

personnel, armed with intelligence to give them a better idea of what they are looking for,

will be able to ferret out the terrorists among their customers.56

The idea of clearing financial institution personnel may be attractive on its face,

particularly to those unfamiliar with the nature of financial intelligence. The proposal

would likely do little, however, to help banks combat terrorist financing and creates a

number of serious privacy and civil liberty concerns. Most intelligence on terrorist

financing is not actionable—it does not identify specific terrorist financiers and their

accounts with sufficient precision to allow actions to disrupt the activity. The intelligence

tends to be limited and speculative, and it frequently relies on dubious sources of

information. It can be valuable to trained intelligence experts, who can evaluate it in the

context of the broad spectrum of available information, but not to bank compliance

directors, who will necessarily lack the time and current knowledge to properly evaluate

it. Even if bank personnel have time and expertise, the intelligence rarely will yield

information that they would find useful, such as names of specific account holders.

To the extent that the intelligence community can generate specific names or accounts,

such information can usually be shared with banks in an unclassified way. Banks can be

told to be aware of person X from country Y without needing to know how that

information was obtained. If the intelligence community develops patterns or trends, this

information presumably also can be shared with financial institutions without need for

security clearances.

56 See, e.g., testimony of former National Security Council official Richard A. Clarke, Senate Banking,

Housing and Urban Development Committee (October 22, 2003) (clearing bank compliance personnel will

“bring us back great benefits because then they’ll know what to look for”). Representatives of financial

institutions made similar recommendations to Commission staff.

National Commission on Terrorist Attacks Upon the United States

64

Providing intelligence about terrorist financing to bank personnel raises serious privacy

and civil liberty issues. People may be named in intelligence reports, but many of the

allegations within these reports are unproven. Some reports prove to be entirely baseless.

Turning these reports over to private citizens like bank personnel runs the risk that

entirely unsubstantiated allegations may lead banks to shut customer accounts or take

other adverse action. Even assuming that the classified information itself is never leaked,

the names of people identified in the intelligence cannot be kept secret. When the bank

compliance officer who receives the secret intelligence asks for scrutiny of a customer’s

accounts for no apparent reason, other bank personnel will likely surmise that classified

information drove this request.

Supporters of giving security clearances to bank personnel point out that the U.S.

government regularly clears private citizens, such as employees of defense contractors.

There are, however, few if any instances in which the U.S. government provides

classified information potentially adverse to U.S. citizens to private actors for the specific

purpose of causing those private actors to subject the U.S. citizens to greater scrutiny.57

Creating such an unusual and potentially dangerous situation cannot be justified by the

minimal benefits that sharing classified information might produce.

Broad government access to private data: Perhaps someday

A more radical, but perhaps far more effective, proposal would give government

authorities direct unfettered access to private financial data for the limited purpose of

Информация о работе Staff Report to the Commission