[House Hearing, 112 Congress]
[From the U.S. Government Printing Office]
TERRORIST FINANCING SINCE 9/11: ASSESSING AN EVOLVING AL-QAEDA AND
STATE SPONSORS OF TERRORISM
=======================================================================
HEARING
before the
SUBCOMMITTEE ON COUNTERTERRORISM
AND INTELLIGENCE
of the
COMMITTEE ON HOMELAND SECURITY
HOUSE OF REPRESENTATIVES
ONE HUNDRED TWELFTH CONGRESS
SECOND SESSION
__________
MAY 18, 2012
__________
Serial No. 112-93
__________
Printed for the use of the Committee on Homeland Security
[GRAPHIC] [TIFF OMITTED]
Available via the World Wide Web: http://www.gpo.gov/fdsys/
__________
U.S. GOVERNMENT PRINTING OFFICE
78-153 WASHINGTON : 2013
-----------------------------------------------------------------------
For sale by the Superintendent of Documents, U.S. Government Printing
Office Internet: bookstore.gpo.gov Phone: toll free (866) 512-1800; DC
area (202) 512-1800 Fax: (202) 512-2104 Mail: Stop IDCC, Washington, DC
20402-0001
COMMITTEE ON HOMELAND SECURITY
Peter T. King, New York, Chairman
Lamar Smith, Texas Bennie G. Thompson, Mississippi
Daniel E. Lungren, California Loretta Sanchez, California
Mike Rogers, Alabama Sheila Jackson Lee, Texas
Michael T. McCaul, Texas Henry Cuellar, Texas
Gus M. Bilirakis, Florida Yvette D. Clarke, New York
Paul C. Broun, Georgia Laura Richardson, California
Candice S. Miller, Michigan Danny K. Davis, Illinois
Tim Walberg, Michigan Brian Higgins, New York
Chip Cravaack, Minnesota Cedric L. Richmond, Louisiana
Joe Walsh, Illinois Hansen Clarke, Michigan
Patrick Meehan, Pennsylvania William R. Keating, Massachusetts
Ben Quayle, Arizona Kathleen C. Hochul, New York
Scott Rigell, Virginia Janice Hahn, California
Billy Long, Missouri Vacancy
Jeff Duncan, South Carolina
Tom Marino, Pennsylvania
Blake Farenthold, Texas
Robert L. Turner, New York
Michael J. Russell, Staff Director/Chief Counsel
Kerry Ann Watkins, Senior Policy Director
Michael S. Twinchek, Chief Clerk
I. Lanier Avant, Minority Staff Director
------
SUBCOMMITTEE ON COUNTERTERRORISM AND INTELLIGENCE
Patrick Meehan, Pennsylvania, Chairman
Paul C. Broun, Georgia, Vice Chair Brian Higgins, New York
Chip Cravaack, Minnesota Loretta Sanchez, California
Joe Walsh, Illinois Kathleen C. Hochul, New York
Ben Quayle, Arizona Janice Hahn, California
Scott Rigell, Virginia Vacancy
Billy Long, Missouri Bennie G. Thompson, Mississippi
Peter T. King, New York (Ex (Ex Officio)
Officio)
Kevin Gundersen, Staff Director
Zachary Harris, Subcommittee Clerk
Hope Goins, Minority Subcommittee Director
C O N T E N T S
----------
Page
Statements
The Honorable Patrick Meehan, a Representative in Congress From
the State of Pennsylvania, and Chairman, Subcommittee on
Counterterrorism and Intelligence:
Oral Statement................................................. 1
Prepared Statement............................................. 3
The Honorable Brian Higgins, a Representative in Congress From
the State of New York, and Ranking Member, Subcommittee on
Counterterrorism and Intelligence.............................. 4
Witnesses
Mr. Jonathan Schanzer, Vice President of Research, Foundation for
Defense of Democracies:
Oral Statement................................................. 6
Prepared Statement............................................. 8
Mr. John A. Cassara, Private Citizen:
Oral Statement................................................. 9
Prepared Statement............................................. 11
Mr. Dennis M. Lormel, President and CEO, DML Associates, LLC:
Oral Statement................................................. 16
Prepared Statement............................................. 17
Ms. Sue E. Eckert, Senior Fellow, Watson Institute for
International Studies, Brown University:
Oral Statement................................................. 22
Prepared Statement............................................. 23
Appendix
Questions From Chairman Patrick Meehan for Jonathan Schanzer..... 31
Questions From Chairman Patrick Meehan for John A. Cassara....... 35
Questions From Chairman Patrick Meehan for Dennis M. Lormel...... 42
Questions From Chairman Patrick Meehan for Sue E. Eckert......... 50
Questions From Ranking Member Brian Higgins for Sue E. Eckert.... 53
TERRORIST FINANCING SINCE 9/11: ASSESSING AN EVOLVING AL-QAEDA AND
STATE SPONSORS OF TERRORISM
----------
Friday, May 18, 2012
U.S. House of Representatives,
Committee on Homeland Security,
Subcommittee on Counterterrorism and Intelligence,
Washington, DC.
The subcommittee met, pursuant to call, at 11:17 a.m., in
Room 311, Cannon House Office Building, Hon. Patrick Meehan
[Chairman of the subcommittee] presiding.
Present: Representatives Meehan, Long, and Higgins.
Mr. Meehan. The Committee on Homeland Security Subcommittee
on Counterterrorism and Intelligence will come to order.
The subcommittee is meeting today to hear testimony
regarding the evolution of al-Qaeda and state sponsors of
terrorism in regards to terrorism financing since September 11.
I now recognize myself for an opening statement.
I would like to welcome everyone to today's hearing of the
Subcommittee on Counterterrorism and Intelligence examining the
United States Government's approach to combating terrorist
financing more than a decade after the September 11 attacks. I
look forward to hearing from today's expert witnesses--and I
mean expert--on the unique role of terrorist financing and what
it plays in the war on terrorism and on the evolving trends in
this field.
The September 11 hijackers used United States and foreign
financial institutions to hold, move, and retrieve their money.
They deposited money into United States accounts via wire
transfer and deposits of travellers checks and cash that was
brought from overseas. They kept funds in foreign accounts,
which they accessed through ATMs and credit card transactions
here in the homeland. According to the September 11 Commission,
the plot cost al-Qaeda somewhere in the rage of $400,000 to
$500,000, of which approximately $300,000 passed through the
hijacker's bank accounts here in the United States.
After the attacks, the United States publicly declared that
the fight against al-Qaeda financing was as critical as the
fight against al-Qaeda itself. The charge of the United States
intelligence and law enforcement communities was clear: If we
choke off the terrorists' money, we limit their ability to
conduct mass casualty attacks.
Within months of the attacks, the Department of Defense,
the FBI, the CIA, and, perhaps most importantly, the Department
of Treasury launched a swift and unprecedented crackdown on
domestic and international terrorist financing. I am very
pleased, in fact, some of the very people who are responsible
for that are sitting on our expert panel today.
Since then, the Treasury's Office of Terrorism and
Financial Intelligence has played a critical intelligence and
enforcement role against terrorist financing through its dual
aims of safeguarding the United States financial system against
illicit use and combating rogue nation's terrorist
facilitators, money launderers, drug kingpins, and other
National security threats.
The Department of Treasury and the intelligence community's
successes against al-Qaeda financing and fundraising is without
question. In 2005, the 9/11 Commission issued a report card
that evaluated progress the Government had made in implementing
that group's recommendations. It gave the Government an A-. Not
too many A-'s at this day or any day in Government, but it gave
it an A- in combating terrorist financing, the best mark on the
scorecard.
But despite our successes, and this is important, we can't
become complacent. Because al-Qaeda and its affiliates continue
to expand their geographic reach worldwide. State sponsors of
terrorism like Iran and Syria are highly sophisticated, and
they continue to take advantage of the United States and
international financial systems in order to skirt international
sanctions.
The United States military and counterterrorism efforts
have largely decimated core al-Qaeda leadership in Afghanistan
and Pakistan, and the group is under significant financial
strain and is struggling to secure steady financing to plan and
execute attacks against the United States homeland and Western
interests.
The terrorist enemies we now face are more diverse,
diffuse, and decentralized than ever. Al-Qaeda and their
affiliates have concluded that, to bring America down, they
will attack with, ``smaller but more frequent operations,''
what some may refer to as the strategy of a thousand cuts. The
aim is to bleed the enemy, meaning us, to death.
In June 2011, the Obama administration released a National
Strategy for Counterterrorism, where the evolution of terrorist
financing was documented: AQAP receiving charitable donations
in Yemen, FARC, and the Taliban drug trafficking, Hezbollah's
drug and criminal activities, AQAM's link to drug trafficking
an kidnapping, and the role of Boko Haram and al-Shabaab in
kidnapping for ransom and extortion.
Hezbollah facilitators were particularly savvy in skirting
U.S. restrictions on terrorist financing and have been charged
in a number of high-profile criminal schemes. As a former
United States Attorney in Philadelphia, I initiated
investigations into Hezbollah's fund-raising activities that
included attempts to transport stolen laptop computers,
passports, and Sony PlayStation systems. A separate intricate
Hezbollah scheme illustrates the interconnectedness of these
networks where a Lebanese bank laundered money from Colombian
drug cartels and mixed it with proceeds from used car sales
that were bought in the United States and then sold in Africa.
The cash was then moved back into Lebanon and poured into
Hezbollah's coffers. Clearly, these groups are highly
innovative and motivated, and we must be up to the challenge.
Terrorist groups and state sponsors of terrorism turning to
criminal activities to set up additional networks to acquire
logistical support and to raise financial resources is another
evolving trend which could point to future activities of
terrorist financing.
Given this shifting trend and the relatively low amounts of
money required to undertake an attack, the United States
Government may need to recalibrate some of its tactics and
examine how the intelligence and law enforcement communities
and I believe also the financial entities--the private
financial entities will adapt their strategies in order to
address remaining vulnerabilities in combating terrorist
financing.
I thank the witnesses for the time to be with us today, and
I look forward to hearing from this distinguished panel.
[The statement of Mr. Meehan follows:]
Statement of Chairman Patrick Meehan
May 18, 2012
welcome
I'd like to welcome everyone to today's hearing of the Subcommittee
on Counterterrorism and Intelligence examining the U.S. Government's
approach to combating terrorist financing more than a decade after the
9/11 attacks.
I look forward to hearing from today's expert witnesses on the
unique role terrorist financing plays in the war on terrorism and on
the evolving trends in this field.
post-september 11 actions
The September 11 hijackers used U.S. and foreign financial
institutions to hold, move, and retrieve their money. They deposited
money into U.S. accounts via wire transfers and deposits of cash or
travelers checks brought from overseas. They kept funds in foreign
accounts, which they accessed through ATMs and credit card transactions
here in the homeland. According to the 9/11 Commission, the plot cost
al-Qaeda somewhere in the range of $400,000-$500,000, of which
approximately $300,000 passed through the hijackers' bank accounts in
the United States.
After the attacks, the United States publicly declared that the
fight against al-Qaeda financing was as critical as the fight against
al-Qaeda itself. The charge of the U.S. intelligence and law
enforcement communities was clear: If we choke off the terrorists'
money, we limit their ability to conduct mass casualty attacks.
Within months of the attacks, the Department of Defense, the FBI,
the CIA, and perhaps most importantly the Department of the Treasury,
launched a swift and unprecedented crackdown on domestic and
international terrorist financing.
Since then, Treasury's Office of Terrorism and Financial
Intelligence has played a critical intelligence and enforcement role
against terrorist financing through its dual aims of safeguarding the
U.S. financial system against illicit use and combating rogue nations,
terrorist facilitators, money launderers, drug kingpins, and other
National security threats.
today's hearing
The Department of the Treasury and the intelligence community's
successes against al-Qaeda financing and fundraising is without
question. In 2005, the 9/11 Commission issued a ``report card'' that
evaluated progress the Government had made in implementing the group's
recommendations. It gave the Government an ``A-'' in combating
terrorist financing--the best mark on the report card.
Despite our successes, we must not become complacent. Al-Qaeda and
its affiliates continue to expand their geographic reach worldwide.
State sponsors of terrorism like Iran and Syria are highly
sophisticated and continue to take advantage of the U.S. and
international financial systems in order to skirt international
sanctions.
new terrorist tools used in the fight
Since U.S. military and counterterrorism efforts have largely
decimated core al-Qaeda leadership in Afghanistan and Pakistan, the
group is under significant financial strain and is struggling to secure
steady financing to plan and execute attacks against the U.S. homeland
and Western interests.
The terrorist enemies we now face are more diverse, diffuse, and
decentralized than ever. Al-Qaeda and their affiliates have concluded
that to bring America down they will attack us with ``smaller, but more
frequent operations in what some may refer to as the strategy of a
thousand cuts. The aim is to bleed the enemy to death.''
This was the aim with the AQAP cargo bomb plot of October 2010,
where the group boasted that the overhead cost for the attack was only
$4,200 and would provoke the U.S. and Western countries to respond with
``billions of dollars in new security measures.''
In June 2011, the Obama administration released a National Strategy
for Counterterrorism, where the evolution of terrorist financing were
document: AQAP receiving charitable donations in Yemen; FARC and
Taliban drug trafficking, Hezbollah's drug and criminal activities,
AQIM's links to drug trafficking and kidnapping, and the role of Boko
Haram and al-Shabaab in kidnapping for ransom and extortion.
Hezbollah facilitators are particularly savvy in skirting U.S.
restrictions on terrorist financing and have been charged in a number
of high-profile criminal schemes. As a former U.S. Attorney in
Philadelphia, I initiated investigations into Hezbollah's fundraising
activities that included attempts to transport stolen laptop computers,
passports, and Sony PlayStation systems. A separate intricate Hezbollah
scheme illustrates the interconnectedness of these networks, where a
Lebanese bank laundered money from Colombian drug cartels and mixed it
with proceeds from used cars bought in the United States and then sold
in Africa where the cash was moved back to Lebanon and poured into
Hezbollah's coffers. Clearly these groups are highly innovative and
motivated and we must be up to the challenge.
Terrorist groups and state sponsors of terrorism turning to
criminal activities to set up additional networks, to acquire
logistical support, and to raise financial resources is another
evolving trend which could point to the future of terrorist financing.
Given this shifting trend, and the relatively low amounts of money
required to undertake an attack, the U.S. Government may need to
recalibrate some of its tactics and examine how the intelligence and
law enforcement communities will adapt their strategies in order to
address remaining vulnerabilities in combating terror financing.
conclusion
I thank the witnesses for taking the time to be with us today and I
look forward to hearing from this distinguished panel.
Mr. Meehan. The Chairman now recognizes the distinguished
Ranking Member of the Subcommittee on Counterterrorism, the
gentleman from New York, Mr. Higgins, for any statement he may
have.
Mr. Higgins. Thank you, Mr. Chairman.
Just briefly, in reference to your opening statement, we
have learned in prior hearings that Hezbollah, which is a
terrorist organization, a Shia Muslim group committed to
violent jihad, acts as a proxy for Venezuela, for Syria, and
for Iran. They have a presence in the 20-country region of
Latin America. Additionally, they have a presence in 15
American cities, including four major cities in Canada. We have
also been told that we are not to be too concerned about this,
that their activities are limited to fund-raising. Well, I see
the fund-raising activities by a terrorist group as an act of
terrorism, at least, at least in a preliminary way.
So those are some of the concerns that I have. But, in the
interest of time, I will submit my opening statement for the
record, so that we can get to the expert witnesses. Thank you
for being here.
Thank you, Mr. Chairman. I yield back.
Mr. Meehan. Thank you.
Other Members of the committee are reminded that opening
statements may be submitted for the record.
We are pleased to have a distinguished panel of witnesses
before us today, on this important topic.
Dr. Jonathan Schanzer is the vice president of research at
the Foundation for Defense of Democracies. He worked as a
terrorism finance analyst at the United States Department of
Treasury, where he played an integral role in the designation
of numerous terrorist financiers.
Dr. Schanzer has also worked for several other United
States-based think tanks, including the Washington Institute
for Near East Policy and Jewish Policy Center and the Middle
East Forum. He studied Middle East history in four countries
and most recently received his Ph.D. from King's College in
London where he wrote his dissertation on the U.S. Congress and
its efforts to combat terrorism in the 20th Century.
Mr. John Cassara enjoyed a 26-year career in the Federal
Government intelligence and law enforcement community as an
expert in anti-money laundering and terrorist financing. He
worked at the Department of Treasury's Financial Crimes
Enforcement Network, and this was the first institution set up
to take on the issue of terrorist financing, and at the United
States Financial Intelligence Unit. He was detailed to work in
the Office of Terrorism Finance and Financial Intelligence at
the Department of Treasury and the Department of State's Bureau
of International Narcotics and Law Enforcement Affairs and
Anti-Money Laundering Section. That had to be quite a business
card.
During his law enforcement investigative career, Mr.
Cassara conducted a large number of money laundering, fraud,
intellectual property rights, smuggling, and diversion of
weapon and high technology investigations. Just the scope of
that demonstrates the numerous schemes that are possible. These
investigations took place in Africa, the Middle East, and
Europe for a variety of Federal agencies, including directing
the first truly international money laundering task force and
serving as an undercover arms dealer.
Mr. Dennis Lormel is the president and CEO of DML
Associates, a full-service investigative consultancy. Mr.
Lormel retired from the Federal Bureau of Investigation in 2003
after 30 years of Government service and almost 28 as a special
agent in the FBI.
In December, 2000, he was appointed the chief of the FBI's
Financial Crimes Program. Following the terrorist attacks of
September, 2001, Mr. Lormel established and directed the FBI's
Terrorist Financing Initiative, which evolved into the
Terrorist Financing Operations Section within the
Counterterrorism Division. Since leaving law enforcement, he
has provided risk advisory consulting services and has served
as an advisor to the Congressional Anti-Terrorist Financing
Task Force.
The Honorable Sue Eckert is a senior fellow at the Thomas
J. Watson Institute at Brown University, where her research is
concentrated on making United Nations sanctions more effective
through targeting and combating the financing of terrorism.
Prior to joining Brown University, Ms. Eckert was employed
at the Institute of International Economics; and from 1993
until 1997, Ms. Eckert was appointed by President Clinton and
confirmed by the Senate as the assistant secretary of commerce
for export administration. Previously, she served on the
professional staff of the House of Representatives Committee on
Foreign Affairs. In addition, she has worked with business
groups and served on numerous working groups and committees
addressing security and technology issues.
I am very grateful for this panel. You bring in expertise
on an issue which I think is dramatically under-appreciated by
most Americans, and few realize the importance of this as we
conduct investigations and do our best to protect not just this
Nation but Western interests from around the world from
terrorist activity and threats.
A critical element is the ability to understand how they
are funded, how they are supported, how they operate, and we
have seen a remarkably changing capacity for them to do it. You
have been there at the front end of this. We really need your
insights to understand how things have evolved and what we
ought to be looking for to continue to do the best job that we
can to be on top of the ability to control their ability to
carry out acts of terrorism against us.
So, at this point, I appreciate your being here. We are
going to be called again to votes at 11:50, but we want to get
the benefit of your testimony. We are going to do as much as we
can to probe on questions as soon as we complete that. So I ask
you to do your best to focus on the essence of your testimony
and see if we can stay within the 5-minute period.
So the Chairman now recognizes Dr. Schanzer to testify.
STATEMENT OF JONATHAN SCHANZER, VICE PRESIDENT OF RESEARCH,
FOUNDATION FOR DEFENSE OF DEMOCRACIES
Mr. Schanzer. Chairman Meehan, Ranking Member Higgins, and
Members of the subcommittee, on behalf of the Foundation for
Defense of Democracies I thank you for the opportunity to
testify.
I base my testimony today on my experience as an analyst at
the U.S. Treasury's Office of Intelligence and Analysis, where
I worked from 2004 to 2007 and was directly involved in
designating several terrorist financiers.
Mr. Chairman, after the September 11 attacks, the U.S.
Treasury immediately went to work uncovering terrorist funds.
On September 23, President George W. Bush issued an Executive
Order designating terrorist entities that threatened America.
That list quickly grew and became a powerful tool for capturing
terrorist money.
The 9/11 Commission report at least in 2004 gave Treasury
high marks for its efforts, but in denying terrorists the use
of the formal banking sector, we have driven terror financing
underground, and we are now victims of our own success.
Terrorists have adapted in part by hatching cheaper plots. It
cost al-Qaeda of the Arabian Peninsula, AQAP, just $4,200 to
place two bombs on cargo planes in October, 2010. The group
bragged openly of this, underscoring that it is nearly
impossible now to stop such low-cost operations.
Other terrorist groups rely heavily on bulk cash smuggling
to evade detection with couriers delivering suitcases full of
cash to terrorist masterminds. Still others engage in trade-
based money launderings, where they plow illicit cash into
legitimate businesses to further finance terrorist activities.
Broadly speaking, terrorist financiers are increasingly
shifting to criminal activity. Earlier this year, U.S.
authorities indicted a vast Hezbollah network of money
laundering, cocaine deals, and more, exposing 30 U.S.-based car
dealerships that helped the group move cash. Similarly, Senator
Dianne Feinstein recently noted how the Taliban relies heavily
on profits from the heroin trade to finance its operations.
If this trend continues, it is reasonable to assume that
criminal investigations will play an increasingly prominent
role in U.S. efforts to counter terror finance. For its part,
Treasury must continue to issue designations, even if fewer of
them lead to actually capturing cash. The naming and shaming of
terrorist financiers lets them know that they are being
watched, and that helps to stem the flow of cash that can
finance attacks on the homeland or against allies abroad.
Designations can also expose key nodes of terrorist groups.
That has been critical in exposing al-Qaeda's relationship with
Iran. In July 2011, Treasury designated al-Qaeda leader Yasin
al-Suri and five others who moved money and recruits to
Pakistan, the Gulf, and Iraq. Treasury declared that al-Suri's
network operates as part of a ``secret deal'' between al-Qaeda
and the Iranian Government.
In January 2009, Treasury designated four other al-Qaeda
operatives in Iran. All of them, including Osama bin Laden's
son, Sa'ad bin Laden, served on al-Qaeda's executive council.
Of course, none of this comes as a surprise. The 9/11
Commission in 2004 expressed concern over the Iran-al-Qaeda
operational relationship, noting that it requires ``further
investigation by the U.S. Government.'' Treasury is doing just
that, and it shares its findings through the designation
process.
Remarkably, Treasury's robust counterterrorism program is
the only one of its kind in the world. None of America's allies
come close to our investment in human and financial resources
to combat terror finance. This can be blamed on a combination
of tight budgets and a lack of political will.
Though the international Financial Action Task Force, or
FATF, recently beefed up its standard, it is insufficient. FATF
allows members to self or mutually evaluate, operates according
to recommendations, and enables states like Saudi Arabia and
Qatar to give themselves high marks regardless of the
realities. The system is full of holes, and terrorists
predictably gravitate to the areas of weakest authority.
Looking ahead, Treasury's policy shop, the Office of
Terrorism Finance and Financial Crimes, TFFC, needs to prompt
both allies and adversaries to do more to combat terror
finance. But, for the short term, the most glaring challenge is
the threat of a nuclear Iran. On this front, Treasury has had a
real impact. Tehran now faces tougher sanctions than ever
before, and the regime is cash-strapped. Though Teheran
continues to push forward with its nuclear program, the regime
reportedly finds it increasingly difficult to bankroll
terrorist proxies, Hamas, and Hezbollah to the extent that it
had in the past. Admittedly, we may now be past the point where
economics can prevent a nuclear Iran, but Treasury's efforts
have nevertheless been instructive. They demonstrate that, if
properly applied, sanctions can truly diminish a state
sponsor's ability to finance terror.
Mr. Chairman, there are many other challenges on the
terrorism financing front that I did not have time to address
today. If I have missed anything you wish to discuss, I am
happy to answer your questions; and on behalf of the Foundation
for Defensive Democracies, I thank you for inviting me today.
[The statement of Mr. Schanzer follows:]
Prepared Statement of Jonathan Schanzer
May 18, 2012
Chairman Meehan, Ranking Member Higgins, and Members of the
subcommittee, on behalf of the Foundation for Defense of Democracies,
thank you for the opportunity to testify.
I base my testimony today on my experience as an analyst at the
U.S. Treasury Office of Intelligence and Analysis, where I worked from
2004 to 2007, and was directly involved in designating several
terrorist financiers.
Mr. Chairman, after the September 11 attacks, the U.S. Treasury
immediately went to work uncovering terrorist funds. On September 23,
President George W. Bush issued an Executive Order designating
terrorist entities that threatened America.\1\ That list grew quickly
and became a powerful tool for capturing terrorist money.
---------------------------------------------------------------------------
\1\ ``Executive Order on Terrorist Financing,'' September 23, 2001,
http://georgewbush-whitehouse.archives.gov/news/releases/2001/09/print/
20010924-1.html.
---------------------------------------------------------------------------
The 9/11 Commission report, released in 2004, gave Treasury high
marks for its efforts.\2\ But in denying terrorists the use of the
formal banking sector, we have driven terror finance underground, and
we are now victims of our own success.
---------------------------------------------------------------------------
\2\ http://govinfo.library.unt.edu/911/report/index.htm.
---------------------------------------------------------------------------
Terrorists have adapted, in part, by hatching cheaper plots. It
cost al-Qaeda of the Arabian Peninsula just $4,200 to place two bombs
on cargo planes in October 2010. The group bragged openly of this,
underscoring that it is nearly impossible to stop such low-cost
operations.\3\
---------------------------------------------------------------------------
\3\ See the November 2010 issue of AQAP's Inspire magazine: http://
info.publicintelligence.net/InspireNovember2010.pdf.
---------------------------------------------------------------------------
Other terrorist groups rely heavily on bulk cash smuggling to evade
detection, with couriers delivering suitcases full of cash to terrorist
masterminds.\4\ Still others engage in trade-based money laundering,
where they plow illicit cash into legitimate businesses to further
finance terrorist activities.\5\
---------------------------------------------------------------------------
\4\ John Diamond, ``Terror Funding Shifts To Cash,'' USA Today,
June 18, 2006, http://www.usatoday.com/news/washington/2006-06-18-
terror-cash_x.htm.
\5\ Avi Jorisch, Tainted Money: Are We Losing the War on Money
Laundering and Terrorism Financing? (VA: Red Cell Publishing, 2009),
pp. 95-104.
---------------------------------------------------------------------------
Broadly speaking, terrorist financiers are increasingly shifting to
criminal activity. Earlier this year, U.S. authorities indicted a vast
Hezbollah network for money laundering, cocaine deals, and more--
exposing 30 U.S.-based car dealerships that helped the group move
cash.\6\ Similarly, Senator Dianne Feinstein recently noted how the
Taliban relies heavily on profits from the heroin trade to finance its
operations.\7\
---------------------------------------------------------------------------
\6\ United States of America vs. Lebanese Canadian Bank, et al.
http://www.justice.gov/dea/pubs/pressrel/pr121511_filed-complaint.pdf.
\7\ ``GOP lawmaker concerned over strength of Taliban,'' Los
Angeles Times, May 4, 2012. http://latimesblogs.latimes.com/world_now/
2012/05/washington-us-intelligence-afghanistan-taliban-stronger-
president-obama.html.
---------------------------------------------------------------------------
If this trend continues, it's reasonable to assume that criminal
investigations will play an increasingly prominent role in U.S. efforts
to counter terror finance.
For its part, Treasury must continue to issue designations, even if
fewer of them lead to capturing terrorist cash. The naming and shaming
of terrorist financiers lets them know they're being watched. And that
helps us stem the flow of cash that can finance attacks on the homeland
or against allies abroad.
Designations also expose key nodes of terrorist groups. This has
been critical in exposing al-Qaeda's relationship with Iran.
In July 2011, Treasury designated al-Qaeda leader Yasin al-Suri and
five others who moved money and recruits to Pakistan, the Gulf, and
Iraq. Treasury declared that al-Suri's network operates as part of a
``secret deal'' between al-Qaeda and the Iranian government.\8\
---------------------------------------------------------------------------
\8\ ``Treasury Targets Key Al-Qa'ida Funding and Support Network
Using Iran as a Critical Transit Point,'' July 28, 2011, Page Content
http://www.treasury.gov/press-center/press-releases/Pages/tg1261.aspx.
---------------------------------------------------------------------------
In January 2009, Treasury designated four other al-Qaeda operatives
in Iran. All of them, including Osama bin Laden's son, Sa'ad bin Laden,
served on al-Qaeda's executive council.\9\
---------------------------------------------------------------------------
\9\ ``Treasury Targets Al Qaida Operatives in Iran,'' January 16,
2009. http://www.treasury.gov/press-center/press-releases/Pages/
hp1360.aspx.
---------------------------------------------------------------------------
Of course, none of this comes as a surprise. The 9/11 Commission in
2004 expressed concern over the Iran-al-Qaeda operational relationship,
noting that it required ``further investigation by the U.S.
government.'' Treasury is doing just that, and it shares its findings
through the designation process.
Remarkably, Treasury's robust counter-terrorist program is the only
one of its kind in the world. None of America's allies come close to
our investment in human and financial resources to combat terror
finance. This can be blamed on a combination of tight budgets and a
lack of political will.
Though the international Financial Action Task Force (FATF)
recently beefed up its standards,\10\ it is insufficient. FATF allows
member states to self-evaluate, and operates according to
``recommendations,''\11\ enabling states like Saudi Arabia and Qatar to
give themselves high marks, regardless of the realities. The system is
full of holes, and terrorists predictably gravitate to the areas of
weakest authority.
---------------------------------------------------------------------------
\10\ Amit Kumar, ``The Revised FATF Standards: A Shot in the Arm
for Countering the Financing of Terrorism Efforts,'' April 16, 2012,
Center for National Policy, http://cnponline.org/ht/display/
ViewBloggerThread/i/37450/pid/35636.
\11\ See the FATF mandate here: http://www.fatf-gafi.org/media/
fatf/documents/FINAL%20FATF%20MANDATE%202012-2020.pdf.
---------------------------------------------------------------------------
Looking ahead, Treasury's policy shop--the Office of Terrorism
Finance and Financial Crimes\12\--needs to prompt both allies and
adversaries to do more to combat terror finance. But for the short
term, the most glaring challenge is the threat of a nuclear Iranian.
---------------------------------------------------------------------------
\12\ See: http://www.treasury.gov/about/organizational-structure/
offices/Pages/Office-of-Terrorist-Financing-and-Financial-Crimes.aspx.
---------------------------------------------------------------------------
On this front, Treasury has had a real impact. Tehran now faces
tougher sanctions than ever before, and the regime is cash-strapped.
Though Tehran continues to push forward with its nuclear program, the
regime reportedly finds it increasingly difficult to bankroll terrorist
proxies Hamas and Hezbollah to the extent it had in the past.
Admittedly, we may now be past the point where economics can
prevent a nuclear Iran. But Treasury's efforts have nevertheless been
instructive. They demonstrate that, if applied properly, sanctions can
truly diminish a state sponsor's ability to finance terror.
Mr. Chairman, there are many other challenges on the terrorism
financing front that I did not have time to address today. If I have
missed anything you wish to discuss, I am happy to answer your
questions.
On behalf of the Foundation for Defense of Democracies, I thank you
again for inviting me here today.
Mr. Meehan. Thank you, Doctor. Very grateful for your
testimony.
The Chairman now recognizes Mr. Cassara to testify.
STATEMENT OF JOHN A. CASSARA, PRIVATE CITIZEN
Mr. Cassara. Chairman Meehan, Ranking Member Higgins, and
Members of the subcommittee. Thank you for the opportunity to
testify today. It is an honor for me to be here. While there
are no simple solutions to all of the challenges identified by
this subcommittee, I believe there are three realistic and
cost-effective steps we should take.
Mr. Chairman, I believe you used the term ``recalibrate
tactics.'' I think that is a very, very good way of putting it.
I have broadly categorized my proposed recalibrations, if you
will, as transparency, technology, and draining the swamp. The
three are intertwined and complementary. I elaborate upon them
in my written statement. Because of time constraints, I will
just briefly summarize them.
Let's begin with transparency. Shortly after the September
11 terrorist attacks, I had a very interesting conversation
with a Pakistani businessman involved in the gray markets and
the underworld of crime. He told me something I will never
forget. He said: Mr. John, don't you understand that criminals
and terrorists are moving money and transferring value right
under your noses? But the West doesn't see it. Your enemies are
laughing at you. His words infuriated me because I knew he was
right. I worked overseas for years with frequent travels to the
Arabian Peninsula, Africa, South Asia. I became intrigued with
the opaque, indigenous, but very effective ways of transferring
money and value so different from our own. For example, the
Pakistani businessman was referring to various forms of what we
would loosely call trade-based money laundering. It involves
the transfer of value via commodities and trade goods.
In addition to simple but effective customs fraud, trade-
based value transfer is often used to provide counter-
valuation, or a way of balancing the books in many global
underground financial systems, including some that are used to
finance terror. Without going into detail, some of these trade-
based value schemes are found in hawala networks, most other
regional forms of alternative remittance systems, the Afghan
transit trade, suspect international Lebanese Hezbollah
networks, trading syndicates, and non-bank lawless regimes in
the Horn of Africa.
Now, in theory, spotting anomalies in trade data and
overlapping these anomalies with financial data transportation
data, travel data, would allow us to kind of peer into these
underground networks by in effect going in through the back
door.
When a buyer and seller are working together, the price of
a good or a service can be whatever they want it to be. There
is no invoice police. Now, this is a very simple example. This
pen, it is a nice pen. Let's say it cost roughly $50. Buyer and
seller, via, say, false invoicing could overvalue this to say
it is worth $100. Simply, similarly, they could undervalue it
to show it is worth say $10, or say even $1. Now, why is this
important? Well, to move money out of a country, participants
import goods at overvalued prices or export goods at
undervalued prices. To move money into a country, the
participants import goods at undervalued prices, or export
goods at overvalued prices. For the most part, all of this
avoids countries' financial transparency reporting
requirements. We are not picking this up. This vulnerability is
what Osama bin Laden himself once himself called cracks in the
Western financial system.
I once had a conversation with an Iranian freight forwarder
in Dubai and I was talking about this type of money laundering,
trade manipulation, over- and under-invoicing. He says to me:
Mr. John, money laundering, but that is what we do. Precisely,
it is the way of life out there. It is the way they do
business.
Now, in order to help combat this type of trade-based money
laundering the Department of Homeland Security's Immigrations
and Customs Enforcement, or ICE, established the world's first
trade transparency unit, or TTU. There are approximately eight
additional TTUs in the Western hemisphere and more planned.
Congress can help promote transparency by ensuring the U.S. TTU
has sufficient resources to systematically examine trade fraud
in the United States for reasons of both National security and
to enhance our revenue. Our TTU should be encouraged to further
expand the TTU network overseas, particularly in areas where
adversaries operate, and we should also promote trade
transparency overseas by building it into the U.S. trade
agenda.
Let me briefly switch now and talk about technology. Over
the last few years, there have been tremendous advances in the
amount of data collected and available for analysis. Just a few
examples include financial, trade, and transport data.
Communications and social networking are growing exponentially.
Industry calls these record sets of information big data.
Concurrently, there have been major advances in data
warehousing, data mining, and advanced analytics. I am not a
technical person; however, I am excited about some of the new
tools and resources that have been recently developed to
exploit big data and help the modern criminal investigator. Yet
those tools are not in our investigators' hands, not at the
Federal, State, or local level. I am convinced the only way we
are going to realistically stay abreast of some of these
challenges we face in financial crimes and terror finance is to
use technology as a force multiplier.
Now, if we are talking about financial data, we have to
talk about Treasury's Financial Crimes Enforcement Network,
FinCEN. FinCEN is mandated to collect, analyze, and disseminate
financial intelligence. FinCEN is the gatekeeper and should be
the U.S. Government's premier financial crimes resource.
However, as I documented in my first book, ``Hide and Seek:
Intelligence, Law Enforcement, and the Stalled War on Terrorist
Finance,'' FinCEN has never lived up to its early promise and
potential. The expertise and managerial will simply do not
exist to fully exploit the data and----
Mr. Meehan. I am going to have to, because we are going to
get called. It is all worth developing in our follow-up
questions. Let me ask if I can: Is there a quick point you want
to make in summary?
Mr. Cassara. No, I refer the committee to my statement, and
my statement elaborates on these points.
[The statement of Mr. Cassara follows:]
Prepared Statement of John A. Cassara
May 18, 2012
Chairman Meehan, Ranking Member Sanchez, and Members of the
Subcommittee on Counterterrorism and Intelligence, thank you for the
opportunity to testify today. It is an honor for me to be here.
In 2005, I retired after a 26-year career as a case officer for the
Central Intelligence Agency and as a special agent for the U.S.
Department of Treasury. I believe I am the only individual to have ever
been both a covert case officer and a Treasury special agent.
Much of my career with Treasury was involved with combating
international money laundering and terror finance. I currently work as
a contractor and consultant for a number of U.S. departments, agencies,
and business enterprises, although the views that I express here are
only my views and not necessarily representative of these
organizations. I have been fortunate to continue my domestic and
international travels primarily providing training and technical
assistance in financial crimes enforcement. I have written three books
on terror finance and numerous articles. I have direct experience with
many of the issues being discussed here today.
A few days after the most successful terrorist attack in U.S.
history, President George W. Bush stated, ``Money is the lifeblood of
terrorist operations. Today we are asking the world to stop payment.''
We are meeting here this morning in part to ask whether that request
has been fulfilled and, if not, what more can and should be done.
The short answer is both ``yes'' and ``no.'' Completely eradicating
terror finance is impossible. There is no magic bullet. Yet after 10
years of concerted effort, it is now harder, costlier, and riskier for
terrorists to raise and transfer funds, both in the United States and
around the world. That's the good news. Unfortunately, there is no
doubt that our financial countermeasures have not been as smart or
efficient as they could be and that we will continue to face new
challenges in the coming years.
The learning curve has been steep. For example, in the years
immediately after September 11, most policymakers within the Treasury
Department were convinced that ``financial intelligence'' or Bank
Secrecy Act (BSA) data was the key to following the terrorist money
trail. They had misplaced faith in the approximately in (2012 numbers)
17 million pieces of financial data that are filed annually with
Treasury, including approximately 1 million Suspicious Activity Reports
(SARs). This is in addition to the countless millions of additional
pieces of financial information filed around the world. This data comes
from a wide variety of sources, including banks, money service
businesses, and individuals.
``Financial intelligence,'' also known as ``BSA data,'' or
``financial transparency reporting requirements'' was initiated during
the early years of the ``War on Drugs'' when enormous amounts of
illicit proceeds from the international narcotics trade regularly
sloshed around Western financial institutions. So it is important to
understand the financial reports were not originally designed to combat
terror finance where small amounts of both illicit and licit monies are
commonly used. It shouldn't really be a surprise that out of the tens
of millions of pieces of financial intelligence filed annually in the
United States and around the world not one piece of financial
intelligence was filed on any of the 19 September 11 hijackers. And
even if there had been, the United States did not have the programs and
management structures in place that would have detected the suspicious
financial activity. I say this with confidence because I worked at
Treasury's Financial Crimes Enforcement Network (FinCEN) at the time. I
demonstrated the failings in my first book, Hide & Seek: Intelligence,
Law Enforcement and the Stalled War on Terror Finance (Potomac Books,
2006). The same dearth of financial intelligence has subsequently held
true for major terrorist attacks from Bali to Baghdad.
Although the last 10 years have demonstrated that financial
intelligence here and abroad is not the panacea for counter-terrorist
finance, much of the financial data does contain excellent information
and some has proved vital in ``connecting the dots.'' The data is
invaluable in money laundering and other investigations. That being
said, it is not being effectively exploited.
Over the past 10 years, our adversaries' operational and financial
tactics have evolved. We are faced with immense challenges. The
situation is made worse by the comparatively small amounts of funding
involved with terror finance. For example, it is estimated that
September 11 cost al-Qaeda approximately $300,000-$500,000. Even this
relatively small amount towers over the recent attempt to hide
explosives in a printer cartridge aboard an air cargo flight to the
United States. Al-Qaeda in the Arabian Peninsula boasted in its on-line
magazine that, ``It is such a good bargain for us to spread fear
amongst the enemy and keep him on his toes in exchange for a few months
work and a few thousand dollars.''
While there are no simple solutions to all of the challenges
identified by this subcommittee, I believe there are some
straightforward and cost-effective steps we should take. I have broadly
categorized them as technology, transparency, and draining the swamp.
The three are intertwined and complimentary.
technology
Over the last few years, there have been tremendous advances in the
amount of data collected and available for analysis. Just a few
examples include financial, trade, transport, and travel data.
Communications and social networking are growing exponentially.
Industry calls these record sets of information, ``big data.'' I will
not discuss the collection of classified data.
Concurrently, there have been major advances in data mining and
advanced analytical capabilities that can help organizations derive the
``intelligence'' from this vast amount of data. Data warehousing and
retrieval are enhanced by cutting-edge technologies that search, mine,
analyze, link, and detect anomalies, suspicious behaviors, and related
or interconnected activities and people. Fraud frameworks can be
deployed to help concerned Government agencies and departments detect
suspicious activity using scoring engines that can both rate, with high
degrees of statistical accuracy, behaviors that warrant further
investigation while generating alerts when something of importance
changes. Predictive analytics use elements involved in a successful
case or investigation and overlays these elements on other data sets to
detect previously unknown behaviors or activities, enhancing and
expanding an investigator's knowledge, efforts, productivities while
more effectively deploying resources. Social network analytics helps
investigators detect and prevent criminal activity by going beyond
individual transactions to analyze all related activities in various
mediums and networks uncovering previously unknown relationships.
Visual analytics is a high-performance, in-memory solution for
exploring massive amounts of data very quickly. It enables users to
spot patterns, identify opportunities for further analysis, and convey
visual results via web reports or the iPad. Moreover, it is now
possible to engineer ``red flag indicators'' in financial reports--both
within the Government and in commercial enterprises that file the
information--that will identify likely suspect methodologies such a
hawala or trade-based money laundering.
Unfortunately, while the Federal Government is beginning to
incorporate these advanced analytical capabilities, it lags far behind
in its deployment of commercially available and viable technologies. As
a subset, the Federal financial investigative resources trail even
further behind. FinCEN is mandated to collect, house, analyze, and
disseminate financial intelligence. FinCEN should be the U.S.
Government's premier financial crimes resource. However, FinCEN has
never lived up to its early promise and potential. One important
problem with FinCEN is that although it has attempted to implement a
number of data mining activities over the years, they have not been
successful. Recently, progress has been made developing and employing
new analytical tools. However, the FinCEN analysts are only able to use
perhaps 10 percent of their new analytical capacity. The expertise and
managerial will simply do not exist to fully exploit many of the tools
now finally at their disposal.
Within the next few years, it is estimated that approximately 500-
700 million additional pieces of financial information in the form of
wire transfer data will be routed annually to FinCEN. If FinCEN is not
able to successfully analyze the current 1 million BSA filings it
receives annually it is highly doubtful that it will succeed with this
new tasking. Yet law enforcement and intelligence professionals should
have access to the data and be able to interpret it. Technology will be
the force multiplier and the only realistic solution to effectively
exploit current and new streams of financial data.
In order to move forward, we must move to get around the FinCEN
impediment. I propose that we ``downstream'' both financial information
and analytics platforms directly to end-users in the law enforcement
community. For example, the financial data and an accompanying user-
friendly analytics platform could be made directly accessible to
various task forces, U.S. attorney offices, regional Suspicious
Activity Report (SAR) review teams, appropriate Federal, State, and
local law enforcement departments and agencies. Since FinCEN is
mandated by the Department of Treasury to administer the Bank Secrecy
Act (BSA) and accompanying data, FinCEN could license and control the
release of the data and the analytics platform.
Moreover, in my discussions with members of the U.S. intelligence
and defense communities, frustration is often expressed that they do
not have direct access to appropriate and targeted financial databases
that intersect with their international areas of responsibility.
Instead of looking for ways to increase the dissemination of necessary
data, legal advisors within Treasury work to impede the release of
information. While I certainly understand and endorse privacy and other
concerns, the technology exists today to engineer safeguards into the
dissemination of the data to prevent abuse. I urge that our colleagues
be given increased access to this vital information in order to help
safeguard our security.
transparency
Shortly after the September 11 terrorist attacks, I had a
conversation with a Pakistani businessman involved with the underworld
of crime. He was involved in the gray markets of South Asia and the
Middle East. He said, ``Mr. John, don't you know that the criminals and
the terrorists are moving money and transferring value right under your
noses? But the West doesn't see it. Your enemies are laughing at you.''
His words infuriated me because I knew he was right. I worked
overseas for years with frequent travels to the Arabian peninsula,
Africa, and South Asia. For the most part, U.S. officials could not
understand or identify the opaque, indigenous, but very effective ways
of transferring money and value so different from our own. For example,
the above Pakistani businessman was referring to various forms of what
we loosely call ``trade-based money laundering.'' It involves the
transfer of ``value'' via commodities and trade goods. In addition to
customs fraud, trade-based value transfer is often used to provide
``counter-valuation'' or a way of balancing the books in many global
underground financial systems--including some that have been used to
finance terror.
In theory, by promoting trade transparency and using technology to
spot anomalies in trade data (and overlapping those flagged anomalies
with financial, travel, transportation, law enforcement, and other
databases) we may be able to use trade as a ``back door'' to enter into
previously hidden underground financial networks.
Trade-based money laundering scams take a wide variety of forms.
For example, it could be simple barter or a commodity-for-commodity
exchange. In certain parts of Afghanistan and Pakistan, for example,
the going rate for a kilo of heroin is a color television set. Drug
warlords exchange one commodity they control (opium) for others that
they desire (luxury and sports utility vehicles). In the United States
and Mexico, weapons go south and drugs come north. However, generally
speaking, money laundering and value transfer through simple invoice
fraud and manipulation are most common. The key element here is the
misrepresentation of the trade good to transfer value between importer
and exporter. The quantity, quality, and description of the trade goods
can be manipulated. The shipment of the actual goods and the
accompanying documentation provide cover for ``payment'' or the
transfer of money. The manipulation occurs either through over- or
under-valuation, depending on the objective to be achieved. To move
money out of a country, participants import goods at overvalued prices
or export goods at undervalued prices. To move money into a country
participants, import goods at undervalued prices or export goods at
overvalued prices. For the most part, all of this avoids countries'
financial intelligence reporting requirements.
Trade-based value transfer is found in every country around the
world. I believe it is the ``new frontier'' in international money
laundering and counter-terrorist finance countermeasures. Without going
into detail, trade-based value transfer is found in hawala networks,
most other regional ``alternative remittance systems,'' the misuse of
the Afghan Transit Trade, Iran/Dubai commercial connections, suspect
international Lebanese/Hezbollah trading syndicates, non-banked lawless
regimes such as Somalia, etc.
I have written extensively about trade-based money laundering. I
invented the concept of trade-transparency units (TTUs), which is now
part of the U.S. Government National Anti-Money Laundering Strategy. I
am delighted that the Department of Homeland Security's Immigration and
Customs Enforcement (ICE) has adopted this concept by establishing the
world's first TTU. There are approximately eight additional TTUs in the
Western Hemisphere and more TTUs are planned.
In addition to being an innovative countermeasure to trade-based
money laundering and value transfer, systematically cracking down on
trade-fraud is a revenue enhancer for participating governments.
Frankly, it is for this reason that many countries outside of the
United States have expressed interest in the concept. In essence, these
governments understand that they are not collecting the appropriate
amount of duties on the goods because the values on the invoices are
mis-stated. Finding new revenue, without actually having to raise tax
rates, is an economic imperative.
TTUs are already proving to be valuable resources for our
government and international partners. For example, in 2008 the United
States and Mexico partnered in the creation of a TTU in Mexico City.
Such efforts should be promoted and expanded. Congress can help by
ensuring that the TTUs have sufficient resources to systematically
examine trade fraud in the United States for reasons of both National
security and to enhance our revenue. We should also promote trade
transparency overseas by building it into the U.S. trade agenda.
drain the swamp
Since the end of the Cold War, there has been a dramatic decline in
the number of countries that support and finance targeted acts of
terrorism in order to achieve their national objectives. Today, Iran is
the major ``state sponsor'' of terrorism. In the early days of al-
Qaeda, the terrorist group received much of its financial resources
from Osama bin Laden's personal family wealth, along with contributions
from wealthy Saudi and other donors. Today, al-Qaeda and other jihadist
groups have been forced to disperse and receive little centralized
direction or funding. This is the good news.
With the decline of the above historical model--that is, groups
with centralized command and control receiving most of their money from
``state sponsors,'' evil regimes, and wealthy donors--terrorists and
their supporters must increasingly rely on self-finance. In many cases,
a symbiosis is developing between organized crime and terrorist
organizations, and this sort of link has been observed around the
world. As I detail in a book I co-authored with former Treasury
official Avi Jorisch, On the Trail of Terror Finance: What Law
Enforcement and Intelligence Officers Need to Know (Red Cell Publishing
2010) we have observed individual terrorists and terrorist groups
involvement with narcotics trafficking, intellectual property rights
violations or trafficking in counterfeit goods, cigarette smuggling,
robberies, credit card scams, fraud, trafficking in stolen cars,
kidnapping for ransom, extortion, and other serious crimes.
Unfortunately, self-finance in this way is much harder to detect,
track, and disrupt.
Given the above, ``draining the swamp'' or cracking down at home
and abroad on local and transnational financial crime might eventually
become one of the most effective strategies to combat terrorism. Even
the U.S. military and international peacekeeping forces operating in
lawless states have come to recognize that their adversaries, many with
terrorist links, increasingly engage in traditional crime to help
finance their activities.
For this strategy to succeed, law enforcement, intelligence, and
military organizations must learn to look beyond the immediate
circumstances of a given local crime. Whether they are confronted with
narcotics trafficking, organized robbery, human trafficking or other
activities, street cops, criminal investigators, and analysts alike
must learn to ask whether these seemingly isolated acts have more
sinister ties. Officials, both in the United States and overseas, must
learn to ``ask the next question'' during the course of routine
investigations: Where is the money going?
Yet most law enforcement officers get caught up in the quick
statistic. That is how they are recognized and rewarded. They are not
interested, often times not allowed, and do not have the networks to
determine if the local crime they uncovered has broader implications.
In my travels around the United States and overseas, I have
observed first-hand how little law enforcement groups actually know
about following the money. It is particularly shocking because outside
of crimes of passion, criminals and criminal organizations engage in
criminal activity because of greed; i.e., money. For example, Karachi,
Pakistan's largest city and economic hub, is heavily infiltrated by
militants and terrorists making money through criminal activities such
as cigarette smuggling, selling counterfeit goods, bank robbery, street
robbery, kidnapping for ransom, and other heinous crimes. Mr.
Sharfuddin Memon, a director of a Karachi citizens' crime watch group,
described the motivations behind this activity: ``The world thinks this
is about religion, but that's a mistake. It's about money and power.
Faith has nothing to do with it.''
I urge Congress to support effective training programs that educate
law enforcement and intelligence officers on the importance of ``asking
the next question'' and following the money trail. I also believe we
should make much more concerted efforts--using various means--to work
with international public media and other communications networks and
brand terrorists for what they are: International thugs. They should
not be allowed to glorify themselves. The last 10 years have
demonstrated that criminals are using jihad as a concept to legitimize
their activities. By using publicity, transparency, and draining the
swamp we will delegitimize them.
As I said at the outset, our enemies are adept at exploiting the
weaknesses in the U.S. financial reporting system. Osama bin Laden once
called these ``cracks in the Western financial system.'' Their
financial behavior has evolved. I also mentioned new financial threats
on the horizon. Some of these include pre-paid gift and stored value
cards; service-based laundering; mobile payments commonly referred to
as ``m-payments'' or the use of cell phones to store, receive, and
transmit money; digital currencies; virtual currencies in the on-line
virtual world, etc. Unfortunately, time does not permit a full review.
However, many of these and other financial threats and countermeasures
that may merit scrutiny by this subcommittee were articulated over 5
years ago in the 2007 National Money Laundering Strategy written by the
Departments of Treasury, Justice, and Homeland Security. The document
was a blueprint for further action in the areas of financial crimes and
threat finance. Unfortunately, in many areas, little or nothing has
been done. I urge the subcommittee to review the document and ask hard
questions about progress to date.
``Without money there is no terrorism.'' While this is a simplistic
formula, our adversaries know that they need money to survive and fund
their operations. They are proving adept and creative at finding new
ways to access this lifeblood. I have profound respect for our
intelligence and enforcement communities. The challenges they face in
following illicit financial trails are immense.
I appreciate the opportunity to appear before you today and I'm
happy to elaborate on my experiences and to answer any questions you
may have.
Mr. Meehan. Anybody who is watching these hearings should
appreciate the tremendous amount of work that went into the
written testimony, which is far more expansive, and I think
lays out for those who are studying this issue.
Mr. Lormel, let me turn to you for 5 minutes before we--and
Ms. Eckert. Thank you.
STATEMENT OF DENNIS M. LORMEL, PRESIDENT AND CEO, DML
ASSOCIATES, LLC
Mr. Lormel. Thank you, sir. I appreciate----
Mr. Meehan. May want to push your button.
Mr. Lormel. Sorry. I appreciate the fact you are having
this hearing and I admire your desire to continue this. It is
very heartening to see that the committee wants to address this
topic. It is very important.
I was in a unique position on 9/11. I was in a position of
leadership in the FBI where I got to follow the money, and I
saw first-hand in the 3 years that I was there how well we used
proactive techniques. One of the things that you are interested
in are investigative techniques and tactics. How we succeed is
being proactive. How we succeed is to look at financial
information and how we can take financial intelligence and use
it from a strategic, tactical, and historic standpoint, and use
that in furtherance of investigative initiatives. We did it
then. The Government is doing it today, and they do it pretty
well, but we can do things better than what we do, and I hope
that the committee can come away with that sense in going back
and looking and assessing the Government on some of these
issues.
In any event, let me start with the Government and the
private sector in terms of perspectives. Perspective is very
important, and the Government and private sector have some good
partnerships, but we can partner better. One of the things we
have to look at is the Bank Secrecy Act and the important of
bank secrecy information and how we can use that in furtherance
of investigative developments and initiatives. Quite frankly,
when you look at the Bank Secrecy Act you are looking at
identifying suspicious activities in terms of who, what, when,
where, how. When it comes to the private sector they are
interested in the how. The Government is interested in the why.
So we have to blend those two and bring them together better
than we do. Terrorists, and you said it in your statement, Mr.
Higgins said it, and I have heard it here with the other
panelists, of how challenged we are in terms of moneys being
used differently and smaller denominations of moneys being
used. So the Government is more challenged in terms of
identifying terrorist financing. That goes to the fact that
again, going back to the financial sector, it is possible to
identify terrorist financing, but it is not probable. The
lesser amounts that are used, the more challenging it gets, and
it plays then to the importance of the partnerships between the
public and private sector, and again, bringing the why and how
together to be able to accomplish these things.
I testified on October 3, 2001, and I was asked
specifically to testify about what the biggest vulnerabilities
in the financial sector were. I said the biggest
vulnerabilities were wire transfers, correspondent banking, and
money services businesses. Today, I kind of look at this a
little differently. I say that the problems we have are
basically two-fold. You have criminal problems, crime problems,
and you have got problems in terms of facilitation tools. The
crime problems are fraud and money laundering, and money
laundering in the greater context of all types of activities
that require money being laundered back through the financial
industry. Then the facilitation tools would be things like wire
transfers, correspondent banking, money service businesses. If
you--I am sorry, not money-service businesses, illegal money
remitters.
The Iranian sanctions, for instance, if you look at wire
transfers, correspondent banking, shell companies, those are
things that they take advantage of. Illegal money remitters, to
me, is the biggest problem we have in the financial sector. The
banks don't recognize who their clients are, customers are that
have illegal money remittance operations. Then electronic
mechanisms. That is the wave of the future. We have tremendous
capabilities. We are getting away from cash. The more we get
away from cash and the more like cash these mechanisms become,
the more vulnerable we are to money laundering. I think if you
look at Africa as a flashpoint, that is a good case in point of
how terrorists are using these mechanisms to be able to launder
money.
I think there are some very good partnerships, again, and
one in particular, is JPMorgan Chase and the Department of
Homeland Security investigations. They have partnered to
strategically collect information and, through targeted
transaction monitoring, have really done a tremendous job in
dealing with human smuggling. We can do the same thing in
terrorist finance, but it takes a more concerted effort. So
those are things that we need to look at.
In my written statement, I put in it some recommendations,
Chairman, about certain things that we need to do.
[The statement of Mr. Lormel follows:]
Prepared Statement of Dennis M. Lormel
May 18, 2012
Good morning Chairman Meehan and distinguished Members of the
committee. Thank you for inviting me to testify at this hearing.
Terrorist financing is a subject that is extremely important to me.
This topic does not receive the attention it deserves. I greatly
appreciate the fact that you are taking the time to delve into this
subject.
There are few events in a lifetime that evoke deep-seated emotion
and vivid recollection. The terrorist attacks against the United States
by al-Qaeda on September 11, 2001 (9/11), are clearly one of those
historic moments that remain frozen in our minds. I poignantly remember
my personal reaction then and how it affects me now. September 11
changed my life, as it did for so many of us. As the agent in charge of
the FBI's Financial Crimes Program at that time, I was in a unique
situation where I was afforded an opportunity to respond in a manner
few other people could. I was in a position to ``follow the money.'' I
witnessed, first-hand, investigative successes which disrupted or
deterred funding intended to support terrorist activities. I am an
ardent believer that terrorist financing is a critical component of the
war against terrorism.
By way of background, immediately after 9/11, I was responsible for
the formation and oversight of the FBI-led, multi-agency, Financial
Review Group, which evolved into a formal Section within the FBI's
Counterterrorism Section, known as the Terrorist Financing Operations
Section (TFOS). Since retiring from the FBI, I have provided consulting
services regarding fraud, money laundering, and terrorist financing.
Many of my clients are in the financial services sector.
My Government investigative and private sector consulting
experience has provided me a rare opportunity to understand two very
distinct perspectives. For over 30 years, I had a law enforcement
perspective. In that capacity, my perspective was Government- and
investigative-driven. For the last 9 years, in my current position as a
consultant, my perspective has shifted to one that is industry- and
compliance-driven. This provides me with a unique understanding of the
responsibilities, sensitivities, challenges, and frustrations
experienced by the Government and financial sectors in dealing with
anti-money laundering (AML) and terrorist financing considerations.
There is a notable difference in perspectives. This is one of the many
challenges we face in dealing with terrorist financing and other
criminal problems.
Identifying suspicious activity in financial institutions,
especially involving terrorist financing, is extremely challenging.
This is where understanding perspective is critically important. When
it comes to identifying and reporting suspicious activity, you must
consider the ``who, what, where, when, why, and how.'' Law enforcement
typically focuses on the ``why'' as the most important element while
financial institutions are most concerned about the ``how.'' This is
one of the areas where collaboration between law enforcement and
financial institutions is not as consistent as it could be. Law
enforcement frequently shares ``war stories'' about investigative
successes with industry. However, they do not often provide specific
information about ``how'' financial institutions were used by the bad
guys. The Internal Revenue Service is one agency that does provide this
type of information to financial institutions at industry training
forums.
In order to succeed, individual terrorists, such as lone wolves,
and terrorist groups must have access to money. They require funding in
order to operate and succeed. Invariably, their funding sources will
flow through financial institutions. To function, terrorists must have
continuous access to money. Regardless of how nominal or extensive, the
funding flow is operationally critical. Terrorists, like criminals,
raise, move, store, and spend money in furtherance of their illicit
activity. This is why Bank Secrecy Act (BSA) reporting requirements are
essential to our National Security. This fact becomes more compelling
in view of the actuality that finance is one of the two most
significant vulnerabilities to terrorist and criminal organizations.
Terrorist financing is not adequately understood and extremely
difficult to identify, especially when funding flows are more nominal.
This is where Government, through the interagency community engaged in
terrorist financing, must interact more efficiently with the financial
services sector to identify terrorist financing. It is possible for
financial institutions to identify terrorist financing, but it is
highly improbable. We must take continual actions that increase the
probability factor, thereby increasing the possibility of identifying
funding flows. The challenge confronting the Government and banking
community is to improve the effectiveness of the process. This is where
the Government needs to be more effective and efficient in the ``how''
of assisting financial institutions in identifying suspicious activity.
Government should develop better feedback mechanisms to financial
institutions about ``how'' terrorists use financial institutions and
provide them with typologies that financial institutions could use for
transactional monitoring.
The interagency community that has jurisdiction and responsibility
for terrorist financing should be commended for their contributions.
Terrorist financing is one area where the Government excelled following
9/11 and where they continue to perform admirably.
Terrorist financing is every bit as challenging today as it was in
the immediate aftermath of 9/11. Law enforcement, regulators, and
intelligence agencies here, in the United States (U.S.), and abroad,
have achieved noteworthy and meaningful accomplishments. New proactive
and progressive methodologies have been developed and implemented in
furtherance of such efforts. When the Government succeeds in
implementing and executing proactive methodologies, the ability of
terrorists to carry out operations is diminished. However, lingering
concerns and the resiliency of terrorists to adapt to change, coupled
with the ease of exploitation of systemic vulnerabilities in the
financial sector, will perpetuate the challenge of addressing the
issues presented by terrorist financing.
Despite the gains we've made, the financial services sector is as
inherently vulnerable today as it was on 9/11. On October 3, 2001, as a
senior executive in the FBI, I testified before the House Financial
Services Committee. One of the issues I addressed was vulnerabilities
or high-risk areas in the financial services sector. I testified that
wire transfers, correspondent banking, fraud, and money services
businesses were the biggest areas of vulnerability to the financial
services industry at that time.
Today, I have refined the vulnerabilities in two categories: Crime
problems and facilitation tools. The most significant crime problems we
currently face in the financial services industry are fraud and money
laundering. Fraud was magnified during the recent financial crisis and
continues to represent a significant threat to our economy. Money
laundering encompasses all other criminal activity where the proceeds
of crime are laundered through financial institutions. The key
facilitation tools used in furtherance of fraud and money laundering
are: Wire transfers, correspondent banking, illegal money remitters,
shell companies, and electronic mechanisms.
Illegal money remitters represent one of the most significant
problems confronting banks. This has been an on-going challenge. Many
banks cannot identify customers who operate illegal money remittance
operations. On the surface, they appear to be a legitimate business.
However, if like the Carnival Ice Cream Shop in Brooklyn, New York,
they actually functioned as illegal money remitters funneling money to
high-risk countries. Consequently, terrorist and criminal groups have
used illegal money remitters in furtherance of their illicit
activities. There are a number of cases we can point to that illustrate
this problem to include the Time Square bombing case.
Sanctions against Iran have caused Iranian entities to regularly
use shell companies to hide beneficial ownership, as well as rely on
correspondent banking and wire transfers to illegally move funds. The
Lloyds Bank ``stripping'' case is a prime example of how correspondent
banking was used by Iran as a facilitation tool. In this matter, Lloyds
stripped SWIFT messaging information to hide Iranian bank
identification in order to avoid U.S. banking monitoring detection. The
Alavi Foundation case was an example of how Iran used shell companies
to hide beneficial ownership in a New York City office building. Both
cases involved the use of wire transfers.
The use of electronic payment mechanisms is an area of growing
concern regarding how terrorists move money due to the anonymity and
instant settlement it affords. Electronic payment mechanisms are
becoming more prolific and vulnerable to misuse by criminals and
terrorists. Africa is a venue of concern for the growing use of
electronic mechanisms.
The Government has made consistent incremental progress in
addressing terrorist financing. Individual agencies and entities
responsible for terrorist financing have matured and evolved. They have
individually and collectively developed investigative methodologies to
effectively deal with the constant and emerging challenges. Although on
an agency-by-agency level, we can point to enhanced capabilities, the
true measure of Government success is the ability of the interagency
community to work as a unified team, and to parlay their collective
investigative capabilities into a joint Government-wide terrorist
financing strategy. In the aftermath of 9/11, I was part of such a
working group that was led by David Aufhauser, then the General Counsel
at the Treasury Department. Mr. Aufhauser was a true leader who
marshaled the interagency collaborative initiative. He was an unsung
hero and visionary. I recommend that the committee periodically assess
the status of the interagency terrorist financing working group to
ensure that it is effectively coordinating the broader interagency
initiatives.
The face of terrorism since 9/11 has been altered significantly.
The last few years have seen tremendous change and instability in the
Middle East. Core al-Qaeda has been decimated and affiliate groups have
evolved into greater threats. Our homeland has experienced a growing
concern involving lone wolf terrorists and other home-grown threats.
These developing factors have modified terrorist financial typologies.
The evolving terrorist landscape has led to less costly terrorist
plots. As noted earlier, the more nominal amounts have been more
challenging to identify. This is due to the fact they are generally
more undetectable. For example, many lone wolf terrorists such as
Farooque Ahmed, who plotted to detonate a bomb on the Washington, DC
metro system, relied on money from their legitimate jobs to pay for
their illicit activity.
The Government must continuously identify and assess emerging
trends and develop case typologies they can share with financial
institutions. In so doing, the financial services sector can implement
transaction monitoring strategies to identify patterns of activity
consistent with the case typologies of criminals and terrorists. The
Government has not done this as consistently as they could have.
In general, law enforcement and the Financial Crimes Enforcement
Network (FinCEN) have done a good job in sharing information with the
financial services sector. However, they have not done as much as they
think they have or they could. I do not make this comment lightly. When
I was in the FBI, I thought I had maximized liaison relationships. It
was not until after my retirement from law enforcement and my
consulting work with the financial services sector that I realized I
could have done more. It was a matter of perspective. If only I knew
then, what I know now, I would have been dangerous. Law enforcement and
FinCEN should do a better job of listening and providing feedback to
financial institutions in the form of ``how'' terrorists and criminal
organizations use the financial system in furtherance of their illicit
activities.
What is important, especially in dealing with more minimal dollar
amounts, is identifying case typologies and using them to develop
targeted transaction monitoring strategies. This leads to the need for
more consistent collaboration between law enforcement and the financial
services sector. The model for this type of public- and private-sector
collaboration was set in recent years by JPMorgan Chase under the
leadership of compliance executive William Langford and senior
investigator Phil DeLuca. Working in conjunction with the ICE
Department of Homeland Security Investigations (HSI), JPMorgan Chase
was able to identify financial patterns for human smugglers and
traffickers. This was because HSI provided specific typologies to
JPMorgan Chase setting forth the ``how.'' This enabled JPMorgan Chase
to identify patterns of transactional activity and develop targeted
transactional monitoring. In so doing, JPMorgan Chase was able to
provide HSI with financial intelligence information which led to
successful criminal investigations. This initiative was greatly
supported by an informal task force involving DHI and the financial
services sector that was led by John Byrne and the Association of Anti
Money Laundering Specialists (ACAMS). Because of the successful impact
of this public-private partnership, ACAMS provided a special award to
JPMorgan Chase and HSI, which was presented at the recent Money
Laundering.com annual anti-money laundering conference. This is a great
example of how law enforcement, in this case HSI, provided the ``how''
to a financial institution, JPMorgan Chase, and how the bank used the
information to identify patterns of illicit activity. I recommend that
the committee look at this collaboration as a model of the type of
cooperative initiative that could be used to fight terrorist financing.
This type of initiative could be effectively used to identify
terrorist financing. There are a number of scenarios that could be
identified and targeted in a similar fashion. An example would be the
case of a lone wolf terrorist who leaves the United States and travels
to Pakistan to attend a terrorist training camp. During the time that
this individual attends the training camp, it is unlikely he or she
would incur any financial activity, virtually falling off the financial
grid. The combination of travel to Pakistan, a high-risk country for
terrorism, and a gap in financial activity, could be identified by
targeted financial monitoring in a financial institution.
One of the perceived impediments to banks in regard to targeted
transactional monitoring is the challenge of satisfying the regulators.
Regulators are not generally forward thinkers. They deal with black-
and-white issues and are more prone to a check-the-box mentality that
tends to stymie progressive and innovative thinking. In fairness to
regulators, their mandate is not to think outside the box but to ensure
that regulatory requirements are met by financial institutions. This is
a daunting task. There is often a perplexing triangle involving
financial institutions, law enforcement, and the regulators. BSA
reporting requirements were established to benefit law enforcement.
Unfortunately, financial institutions are generally more concerned with
placating their regulators than providing the ``why'' to law
enforcement. Financial institutions, law enforcement, and regulators
need to come to a better consensus about the balance of law enforcement
and regulatory considerations. This is an area that this committee or
the House Financial Services Committee should look into.
Certain countries pose a challenge to deal with in terms of their
capacity or political will to establish terrorist financing regimes.
Other countries, most notably Iran, pose a significant threat and are
indifferent to complying with international standards as they flaunt
their nuclear and/or other ambitions. The first step to deal with these
situations is to coordinate a strong interagency response at the
domestic level. This calls for relying on a combination of diplomatic,
regulatory, intelligence, military, and law enforcement responses. By
orchestrating a choreographed response strategy, pressure could be
leveraged against these countries. The second step is to coordinate
international responses and strategies with the Financial Action Task
Force (FATF), the United Nations and other international bodies.
There is a growing and troubling nexus between transnational
criminal organizations, drug cartels, and terrorist organizations. Each
has their own objective and is willing to deal with the others to
further their own interests. The Lebanese Canadian Bank investigation
manifests this emerging problem. It illustrated the alliance between
Hezbollah, a terrorist organization, the Joumaa drug trafficking and
money laundering organization in Lebanon, and the Los Zetas Mexican
drug cartel. This troubling alliance relied on drug trafficking and
trade-based money laundering, among other activities to facilitate the
illicit activities of three dangerous transnational groups. The
interagency community should closely assess the collaborative
operations of these organizations and develop strategies to deal with
other similar associations.
As noted earlier, it is possible to identify terrorist financing
but highly improbable. This is one area where collaboration and
partnership between the public and private sector are essential. In
2009, I wrote an article addressing how to increase the probability
through such collaboration. For the most part, the same points I
articulated then are applicable today. Accordingly, there are six steps
the Government and financial services industry should take to
collectively and unilaterally increase the probability of identifying
terrorist financing. They are:
1. The Government and financial sector must recognize the
importance of terrorist financing-specific training. This is a
dimension that is lacking on both sides, although more on the
part of financial institutions. Without specific training, the
ability to understand and disrupt terrorist financing is more
difficult to achieve.
2. The Government must develop a means to legally provide security
clearances to select personnel in financial institutions in
order to share limited intelligence information that could be
scrubbed against bank monitoring systems to identify account or
transactional information associated with terrorists. The FBI
has been discussing this challenging issue since 9/11, in
concert with select industry compliance leaders and experts.
3. A consistent and comprehensive feedback mechanism from law
enforcement must be developed that demonstrates the importance
of BSA reporting, especially the significance of Suspicious
Activity Reports (SARs). FinCEN's SAR Activity Review is a good
mechanism that provides insightful information. In addition,
specific feedback from law enforcement to financial
institutions concerning the value and benefit of BSA data,
including SAR filings, would have a dramatic impact on the
morale of individuals responsible for SAR reporting.
4. There must be an assessment by the Government of all SARs
related to or identifiable with terrorism cases. Such a review
would identify specific red flags that could be used as a
training mechanism and more importantly, could be factored into
identifying typologies that could be used for the monitoring/
surveillance capabilities of financial institutions. In
addition, a determination could be made as to why the financial
institution filed a SAR. In many instances, the SAR was filed
for violations other than terrorist financing. Understanding
what triggered the SAR filing; in tandem with how the SAR
ultimately was linked to terrorist interests would be
insightful.
5. In addition to assessing SARs, the Government and industry
should collectively identify and assess as many case studies,
of terrorist financing-related investigations, as can be
identified and legally publicly accessed. The case studies
should be compared to determine what types of commonalities and
patterns of activity exist. In addition, common red flags
should be easily discernible. This type of case study
assessment, coupled with the SAR analysis, would provide more
meaningful information to consider in identifying terrorist
financing characteristics, especially in cases involving more
nominal financial flows. This would enable financial
institutions to more effectively use surveillance and monitor
techniques to identify questionable transactional information.
6. A combination of BSA data, particularly SARs, combined with
empirical and anecdotal information would enable the Government
and financial sector to collectively and unilaterally conduct
trend analyses. This would be a significant factor in
identifying emerging trends. On a Government level, this would
contribute to implementing investigative and enforcement
strategies. On the institutional level, this would enable the
financial sector to implement strategies to mitigate risk.
Although the landscape has changed, and methodologies have evolved
since 9/11, terrorist financing remains the same. In essence,
terrorists must have access to funds when they need them in order to
operate. It is incumbent that Government agencies cooperate,
coordinate, and communicate on both an interagency level and with the
private sector in order to deny terrorists from moving and accessing
funds and thereby diminishing their ability to operate.
I would again like to thank the committee for affording me the
opportunity to participate in this forum. I would be happy to answer
any questions or to elaborate on my statement.
Mr. Meehan. Let me say one thing. Unfortunately, there is
just 6 minutes left in the vote that I must go vote on right
now. I am struggling with how best to do this. I think they are
going to give me a minute to sprint, so what I am going to do
is ask Ms. Eckert to do her testimony, and then I am going to
have to reconvene with the rest of the committee.
Let me go to Ms. Eckert's testimony and then I will give
you a closing comment and we will try to work from there, but I
want to make sure you get your opportunity to hit the essence,
Ms. Eckert. So the Chairman now recognizes Ms. Eckert.
STATEMENT OF SUE E. ECKERT, SENIOR FELLOW, WATSON INSTITUTE FOR
INTERNATIONAL STUDIES, BROWN UNIVERSITY
Ms. Eckert. Mr. Chairman, thank you very much for the
opportunity to be here, and I want to commend you and the
committee for focusing on this vitally important issue. I don't
think enough attention has been paid to it. Ten years with
experience in countering the financing of terrorism, I think it
is a very opportune time to focus on it.
I have a number of recommendations. So I am not going to
review what has been done with regard to al-Qaeda. There are
specific initiatives that I am part of that we are looking at,
the effectiveness of sanctions, for example, against Iran and
North Korea, other sponsors of terrorism. My comments in the
testimony and today are primarily focused on al-Qaeda.
I won't focus right now in terms of some of the unintended
consequences of the regime countering financing of terrorism,
but I think it is important to pay attention to some of those
because they have the potential to weaken what is a critically
important initiative both globally and Nationally.
So what I would do is just very briefly offer a couple of
points that I think that we need to take account of as we look
at strengthening the CFT measures.
First is, I think it is important to understand that we
need enhanced information analysis. There is still a great deal
we don't know. New electronic payment methods through cell
phones and stored value cards, digital currencies that some of
my colleagues have been talking about are very important to
focus on. We need to understand differences in terms of not
only the terrorist organizations, but how they move, raise, and
store funds. We need to develop metrics. In the past, the only
metrics that we have had are the number of designations and the
amount frozen. Those are clearly inadequate to--and they can be
misleading. We haven't seen a steady progress with regard to
that, but that doesn't mean that our terrorist financing
initiatives are not working.
Finally, I think one of the--for information, we need to
analyze the information that we have and evaluate it. The
private sector provides ample amount of information, but it
goes into a process, as one of my colleagues has said, and it
is not really utilized and not really analyzed except when it
gets to the law enforcement side.
So I think that there is an awful lot that can be done
within the current system to be able to discern patterns that
could assist financial institutions in identifying terrorist
financing.
The second major area is collaboration and information
sharing with the private sector. The central role in this is
the private sector. Governments don't freeze assets; the
private sectors do. There are a number of ways. We have all
talked about the need for greater collaboration, but I think
that the partnerships so far has been a pretty much one-way
flow of information.
I think there is more that can be done. Security clearances
for certain individuals in financial institutions; the British
have done it to great effect. What we need to do is to
understand that initiatives to enhance information will make
our law enforcement intelligence efforts smarter and more
effective.
Inadequate capacity in other countries. We cannot do this
alone. The United Nations has played a very important role,
Egmont and a number of the FATF have played important roles in
establishing this global regime, but more needs to be done to
provide assistance to other countries to be able to put in
place the necessary legal, administrative, and enforcement
mechanisms to carry out this prohibition in the financing of
terrorism.
Further, I think that it is time, 10 years later, really
for a critical assessment of effectiveness. In this regard
there has been, you know, a lot focused on some of the positive
things, but not necessarily the cost or limitations of the
current approach and whether or not we are focusing on where
the challenges are going and how the terrorists are raising
moneys now. It is still focused primarily on the formal
financial sector, and I think that we really need to take a
good hard look at what we are doing now. As you said, I had to
strike in my testimony the number of times I said recalibrate,
so I am pleased that we are thinking in the same vein.
But in short, there has been an impressive global effort to
regulate transport or movement of funds through formal sector
financial institutions, but al-Qaeda and other groups have
adapted and they continue to have access to funds. In order to
be effective we have to reassess and recalibrate policies and
create a genuine partnership with the private sector.
Thank you, sir.
[The statement of Ms. Eckert follows:]
Prepared Statement of Sue E. Eckert
May 18, 2012
Chairman Meehan, Ranking Member Higgins, and distinguished Members
of the subcommittee, thank you for the opportunity to appear before you
to discuss the critical issue of terrorist financing. As the disrupted
airline bombings plot out of Yemen last week indicates, terrorist
threats to the United States persist notwithstanding the death of Osama
bin Laden and decline of the hierarchical organization of al-Qaeda.
My comments are based on my previous experience as assistant
secretary of commerce responsible for regulating dual-use goods and
technology, as well as more recent academic initiatives to strengthen
the instrument of U.N. sanctions. Currently, my colleague at the
Graduate Institute in Geneva, Thomas Biersteker, and I are leading the
Targeted Sanctions Consortium, an international group of scholars and
practitioners conducting a comprehensive and comparative analysis of
the impacts and effectiveness of U.N. sanctions, including those
targeted on al-Qaeda and affiliated groups, as well as sanctions
against Iran and DPRK. I've also worked with the United Nations
Counterterrorism Implementation Task Force to explore the
identification of indicators that might be useful to financial
institutions in detecting potential terrorism financing activity. In
this regard, I've had the opportunity to interact with the private
sector, National regulators, and international counterterrorism
policymakers involved in the global effort to combat the financing of
al-Qaeda and affiliated groups. The views expressed however, are my
own, and not necessarily endorsed by any entity or colleagues with whom
I am affiliated.
Due to time constraints, this abbreviated statement focuses on
terrorism financing related primarily to al-Qaeda (AQ) and lays out
some considerations for ways forward. I am happy, however, to provide
an expanded statement based upon our book, Countering the Financing of
Terrorism, and more recent initiatives assessing the effectiveness of
U.N. sanctions.
evolving threat and means of financing
Al-Qaeda today is profoundly transformed from the group that
engineered the attacks on 11 September 2001. The once-hierarchical
organization evolved into a confederation of allied entities, and
subsequently into a general jihadi movement, with al-Qaeda core (AQC)
serving more as an inspirational vanguard, a source of legitimization
and justification for acts of global terrorism by affiliates, rather
than as a source of the planning, financing, and execution of terrorist
attacks. Regional affiliates such as AQ in the Arabian Peninsula
(AQAP), AQ in the Islamic Maghreb (AQIM), and al-Shabaab in Somalia,
now outnumber AQC remnants in Pakistan and remain committed to al-Qaeda
ideology. Even with new revelations about bin Laden's final activities
in Abbottabad, the AQ affiliates constitute the more significant
contemporary terrorist threat.
Likewise, the means by which terrorists finance activities have
changed, and today largely consist of criminal means conducted within a
state. Formal sector transactions and even the transnational movement
of funds by AQ have been severely constrained, in part due to the
success to the extensive global efforts to counter the financing of
terrorism (CFT). Formal sector financial institutions generally have
not been used for the transfer of funds across international borders to
AQ since 2003; rather, AQ affiliates have increasingly resorted to the
use of cash couriers and barter trade to move funds. Self-financed
criminal activities such as credit card and check fraud, theft,
extortion, and kidnapping for ransom represent more common methods
utilized by terrorists to finance their activities.\1\ Charitable
donations as a significant means of financing terrorism also appears to
have diminished, as recent evidence concerning the diversion from
Islamic charities is lacking (and most of the legal cases resulting in
successful convictions have been based more on violations of tax and
reporting rules, rather than terrorist financing). While informal value
transfer systems or hawala were used for the transfer of funds prior to
the attacks of 11 September and most recently by the Times Square
bomber, the overwhelming majority of such transfers are legitimate and
advance important social and global developmental functions.
---------------------------------------------------------------------------
\1\ Note that this is not the case with the Taliban which has
adapted over time in Afghanistan and Pakistan, in large part due to
territorial control facilitating revenues through taxation of drug
production, transiting goods, diversion of international assistance,
and ransom from kidnappings.
---------------------------------------------------------------------------
Recognition of the changing structure and financing of AQ and
affiliated groups is important, as effective strategies for countering
the financing of terrorism must similarly adapt to the current threat.
With more than a decade of CFT experience, now is an opportune time to
take stock of what has been accomplished in order to recalibrate U.S.
and international efforts to more effectively address the evolving
nature of terrorist financing. I commend the subcommittee for focusing
on this issue, and hope additional review will be undertaken.
In this regard, it is worth remembering that prior to 9/11, there
was little concerted attention focused on terrorist financing, with al-
Qaeda able to raise funds from donors in Gulf States and charitable
organizations and move them through financial institutions. Few
requirements other than those mandated by UNSCR 1267 existed to
restrict financing, with almost no emphasis on implementation (indeed,
country reports prior to 2001 largely consisted of one sentence--``We
have taken all necessary steps to comply with the resolution.'') In the
past decade, there has been a sea-change in the recognition and
implementation by Member States of legal, administrative, and
enforcement measures to combat terrorism financing.
cft developments and challenges
Since 9/11, we've witnessed an impressive global initiative to
disrupt financial support for terrorism. The United States has worked
diligently to launch a worldwide campaign to make it more difficult,
costly, and risky for AQ and affiliated groups to raise and move money
around the world. As a result, new and significant international
institutional frameworks have evolved to address CFT, including crucial
roles by the United Nations Security Council, the Financial Action Task
Force, the World Bank, IMF, Egmont Group, as well as private-sector
initiatives like the Wolfsberg Group. UN Security Council Resolutions
1267, 1373, and 1540 (and successor resolutions) provide the legal
basis and legitimacy for Member States to take necessary steps to put
into place National legal and administrative mechanisms to freeze
terrorist assets. Multilateral CFT efforts have been essential in
stemming terrorist funds.
The global CFT regime utilized preexisting policy instruments but
greatly expanded them. Through designations or listings of individuals,
organizations, and corporate entities and the freezing of their assets,
CFT efforts have primarily focused on preventing the use of formal
sector financial institutions for the trans-border transfer of funds
that could be used to support acts of terrorism. Initiatives to license
informal value transfer systems and register charities have also
resulted.
Notwithstanding the important accomplishments of terrorism
sanctions to date, complications and unintended consequences have
arisen. National and regional courts have faulted the U.N. process of
designating individuals as well as with the adequacy of procedures for
challenging those designations. Perceptions of unfairness in the
application of targeted sanctions and potential violation of due
process have generated concern and public opposition in several
countries, including among legislatures, threatening to undermine the
credibility and effectiveness of U.N.-targeted sanctions. The most
prominent case of Saudi businessman Yassin Abdullah Kadi, is still
under appeal at the European Court of Justice, but if successful could
force the European Union not to implement mandatory Chapter VII
sanctions thereby establishing a dangerous precedent and potentially
undermining U.N. terrorism sanctions. Notwithstanding important
procedural enhancements in recent years, however, legal challenges
persist. This problem cannot be ``solved'' definitively, but rather
must be managed to dissuade national or regional courts from
questioning the underlying security rationale for listings. Continued
review of U.N. designations and innovations in the delisting process
are necessary for the legitimacy of international CFT measures and the
future utility of the instrument of multilateral sanctions.
The freezing of assets or exclusion from the international
financial system are indeed powerful terrorist financing tools, but
such measures can have far-reaching consequences. Fears that there
would be a decline in charitable contributions to Muslim charities have
been realized to an extent, which could have implications for efforts
to address root causes of terrorism. Targeted financial sanctions are
not as targeted as they might initially appear; in the case of al
Barakaat, the collateral damage of freezing the assets of the broad
group of companies led to severe disruption of fund transfers to a
large portion of the Somali population. Concerns for the risks involved
with money service businesses (MSBs) resulted in the shuttering of
Somali MSBs in several states, leaving large diaspora communities
without viable means to transmit money cheaply and efficiently to
relatives since there is no functioning banking system in Somalia.
Moreover, the regulatory burden on financial institutions has
increased considerably. Compliance with enhanced reporting
requirements, new internal procedures to screen customers, and train
staff to block or freeze individual transactions have escalated costs
as responsibility for CFT implementation rests primarily with the
private sector. In addition, banks have terminated relationships with
perceived risky sectors--MSBs, embassy banking, and certain
correspondent banking relationships, resulting in the labeling of some
sectors as ``unbankable.'' The dramatic increase in the volume of
information submitted by financial institutions, including the millions
of SARs filed annually, which remain largely unanalyzed and continues
to be a source of frustration to financial institutions. Processing
information is far more important than simply accumulating it, and it
is important that regulation be prudently designed with this in mind.
Likewise, the success of CFT instruments ultimately depends on
parallel implementation by other countries. Despite progress since
September 11, serious deficiencies of capacity within Member States to
implement CFT measures exist (e.g. to criminalize terrorist financing,
prohibit financial support to terrorists, and freeze the assets of
those who commit or support terrorist acts). Implementation is uneven,
and in some states, capacity is virtually nonexistent. Enhanced
initiatives to assist countries in building the legal and
administrative infrastructure to implement and enforce financial
sanctions are necessary.
Overall, however, CFT efforts have constrained AQ and its
affiliates in their ability to access essential support. As noted by
the 1267 Monitoring Team in a recent report, financial sanctions have
among other things, restricted the ability of those listed to continue
to promote the objectives of AQ and their associates, alerted law
enforcement to the activities of listed parties, and signaled to the
world (and other potential financiers of terrorism) the resolve of the
international community to combat funding of terrorism. While far from
perfect and with much more that can and should be done to strengthen
CFT measures, it is important to keep these accomplishments in mind--
indeed, the glass is more than half full!
considerations for the second decade of cft initiatives
As the United States and the international community move forward
to strengthen CFT policies in the coming years, the following
considerations are useful to keep in mind:
The importance of realistic expectations as to what
financial sanctions can reasonably achieve. Terrorism will
continue, and AQ still exists (with access to funds). This does
not mean that TF initiatives are ineffective, but rather we
must be cognizant of the appropriate role of TF sanctions play
as but one element in a larger CT strategy.
When assessing the impact and effectiveness of CFT measures,
it is essential to appropriately define the purposes. An
innovation of the Targeted Sanctions Consortium's methodology
\2\ includes evaluating effectiveness of sanctions in terms of
multiple and differing purposes of sanctions, to: (1) Coerce or
change targets' behavior; (2) constrain terrorist activities
(or access to essential resources such as funds thereby raising
costs and forcing changes in strategy); and (3) signal/
stigmatize targets violating international norms through
terrorist acts.
---------------------------------------------------------------------------
\2\ For more information about the Targeted Sanctions Consortium, a
comprehensive, systematic, and comparative assessment of the impacts
and effectiveness of U.N. targeted sanctions regimes over the past 20
years, see http://graduateinstitute.ch/internationalgovernance/
UN_Targeted_Sanctions.html.
---------------------------------------------------------------------------
While progress has been made in CFT, terrorists are
constantly evolving the means by which they raise and use
funds; the international response needs to be dynamic as well.
The basic framework focusing on preventing the use of formal
sector institutions for cross-border transfers of funds remains
largely unchanged. New strategies and tools to address current
financing (e.g. cash couriers, stored-value instruments,
informal value transfer systems (IVTS), kidnapping etc.) are
necessary.
CFT measures are considered among the most ``effective''
sanctions, yet there is public perception that sanctions
generally are not effective. More needs to be done to
demonstrate and make the case regarding the effectiveness of TF
sanctions.
With terrorists' evolution of financing means, it is critical to
continually review and adapt U.S. and international CFT responses.
Military planners are famous for preparing for the last war, and it is
important that those concerned with countering the financing of
terrorism not make such a mistake. Al-Qaeda has changed. The nature of
its fundraising has changed. The ways in which it moves, stores, and
uses funds have changed. It is important that CFT efforts proceed from
this knowledge, rather than squander limited resources.
The following are general areas that could be considered in future
efforts to strengthen CFT measures:
Enhanced information and analysis
The old adage--the more you know, the more you realize how much you
don't know--applies amply to the subject of terrorist financing There
is still a great deal we do not know, for example, regarding the use of
informal value transfer systems, trade diversion, traditional cash
smuggling, and new electronic payment methods through cell phones,
stored value cards, and digital currencies. Notwithstanding greater
understanding regarding AQ's financing of terrorism, and ``despite all
of our sophistication, we have neither starved the beast nor produced
very good intelligence on how exactly these organizations continue to
finance themselves,'' as Lee Hamilton noted. There is a significant
need for the further research and analysis in this area.
Differentiate among groups and means to finance terrorist
operations
It is important that CFT initiatives distinguish between (and
differentiate among) groups committing acts of terrorism. Those acting
on a global scale, like AQ, have different needs and means of financing
themselves, particularly when they are compared to groups acting on a
local or regional scale. Territorial-based groups can extract resources
in ways that approximate the state (i.e. Taliban exacting tariffs or
quasi-taxes from the population). There are fundamental differences in
the goals, scope of operations, and the ultimate objectives of groups
acting globally and groups contained within a defined territorial
space. Extending existing CFT efforts aimed at al-Qaeda to other
circumstances risks diffusing the effort and decreasing effectiveness.
One size does not fit all.
Develop metrics
There are relatively few quantitative indicators and reliable
sources of information to assess CFT initiatives but it would be useful
to try to devise additional metrics of effectiveness. Metrics most
commonly associated with terrorist financing--the total number of
designations and the amount of money frozen--are inadequate and can be
misleading. As difficult as such an endeavor would be, it is important
to attempt to assess the effectiveness of CFT efforts. The consequences
of failing to do so are inappropriate and potentially ineffective
policies to thwart terrorist acts. Policymakers and academics alike
must demand better and more transparent sources of information in order
to more thoroughly understand and assess terrorist financing efforts.
Evaluate and analyze TF information
As noted by others, FinCEN receives nearly a million Suspicious
Activity Reports (SARs) from financial entities annually, of which less
than 1% relate to TF, yet little systematic analysis of the information
results. FinCEN generally passes SARs on to the FBI who integrates the
information into their database in order to identify trends and
suspicious transactions. However, the current system lacks requirements
for the systematic analysis of data to be able to discern patterns that
could assist FIs in screening for terrorist-related transactions.\3\
The same applies to sharing of case information at the international
level through which comprehensive analyses, lessons learned, policy-
useful conclusions and guidance for both Government agencies and the
private sector could possibly emerge. Is it an issue of resources or
lack of priority? What could and should be done to most effectively
mine the information reported by FIs? USG officials have previously
referenced the number of cases in which financial information from SARs
played a role; this information should be updated and made available.
---------------------------------------------------------------------------
\3\ An initiative by a group of researchers to collect and analyze
examples of terrorist financing (TF) through financial institutions in
order to discern indicators of terrorism finance was stymied by the
lack of access to information (sanitized SARs redacted of identifying
info which DoJ was willing to provide).
---------------------------------------------------------------------------
TF prosecutions
Successful prosecution on TF grounds are limited--in many cases of
suspected financing, convictions are easier to obtain on alternative
charges. Should we be concerned with the relatively small number of
successfully prosecuted TF cases? What are the obstacles, and are
legislative changes needed?
Collaboration/information sharing with financial sector
Despite 10 years of espousing the need for closer public-private
partnership to combat TF, the two-way exchange of information remains
limited--in most cases, it's the financial community providing input
with very little feedback. The FBI created a financial sector working
group that meets periodically, but compliance officials still complain
about a lack of information to help detect terrorist transactions.
Analysis of SARs information that aided in law enforcement
investigations could help FIs identify typologies and trends they
should be alert to.
The United Kingdom has instituted a system whereby select
representatives of financial institutions receive security clearances
so sensitive information regarding transactions can be shared. A
similar initiative has been discussed in the United States, but little
progress seems to have been made. Is this a good idea, and if not, why
not? What are other ways in which the USG can collaborate with
financial institutions? Are additional protections (i.e. safe harbor
provisions) needed?
Notwithstanding the absence of reliable terrorism financing
indicators, the information provided by financial institutions remains
critically important to intelligence and law enforcement efforts to
disrupt terrorism. When intelligence on possible terrorist activities
is shared with financial institutions, the information they provide is
often vital and unavailable from other sources. New initiatives to
enhance information sharing between governments and the private sector
should be prioritized.
Address inadequate CTF capacity in other countries
To be effective, CFT measures must be implemented in a comparable
manner by other countries. While the United Nations is an important
source of legitimacy (requiring Member States to criminalize the
financing of terrorism and to freeze the assets of individuals/entities
designated as terrorists) only Member States can put into place the
necessary legal, administrative, and enforcement measures to counter
TF. Even with successes as noted, there remain significant deficiencies
in the capabilities of many Member States to meet their international
CFT obligations (to criminalize terrorist financing, prohibit financial
support to terrorists, and freeze the assets of those who commit or
support terrorist acts). More needs to be done to provide adequate
assistance for MS to put into place the necessary legal,
administrative, and compliance measures, and current initiatives should
be enhanced
Great public awareness and understanding of CTF initiatives
There is a need for broader understanding of the importance and
utility of CFT measures, both designations and terrorist financing
tracking. Most information regarding the reasons for designations and
the effectiveness of the CFT in identifying networks or preventing acts
of terrorism is closely held by Government agencies. While protection
of sources and methods is necessary, excessive classification and lack
of documentation to justify designations undermines public confidence
in, and support for, the CFT regime.
Critical assessment of CFT effectiveness
Ultimately, the effectiveness of National and global efforts to
counter the financing of terrorism depends on the nature of the threat
(the assessment of risk) and the appropriateness of the response to
that threat (i.e. that the benefits of the policy response outweigh the
costs of the measures enacted). When it comes to an assessment of the
benefits of CFT efforts, there is strong evidence that it is more
difficult for AQ and affiliated groups to use the formal financial
sector to support operations today. The capacity of AQ and others to
commit acts of terrorism has been degraded. Yet there is little
systematic assessment of the costs and limitations of the current
approach. ``Staying the course'' of current policy may nor be the most
appropriate action, especially given the changing and adapting nature
of al-Qaeda.
Beyond these general areas, specific consideration should be given
to:
Charities.--Traditionally, al-Qaeda and other groups have utilized
charities, NGOs, and mosques to raise funds through direct
solicitations and diversion of donations intended for humanitarian
purposes. While the risk of abuse of the charitable sector remains
real, a differentiated approach, distinguishing between financing
humanitarian networks affiliated with resistance groups and financing
terrorism, is needed. Blanket condemnation of groups providing social
welfare services alienates Muslim constituencies and prevents aid from
reaching those most in need. Government efforts should focus on
assisting charities to be more transparent; clarifying what constitutes
financing of terrorism and association; designating independent bodies
to regulate and investigate charities; and accrediting charities or
developing indicators of trust/approval so that contributors know the
group can be trusted to deliver support to appropriate projects.
In addition, zakat contributions are central to the practice of
Islam, and a policy that places charitable giving to Islamic
organizations under general suspicion contributes to a perception that
the effort is directed against the entire Muslim community, rather than
a very small segment of that community. Not only is this profoundly
unfair, but it will ultimately undercut the effectiveness of other
counter-terrorism efforts. Special effort must be taken to reaffirm
support for charitable giving through transparent processes.
Informal Transfers.--Regulation of remittance vehicles is
necessary, but should be done in a way that is proportionate to risk
and appropriate to particular socio-economic environments. In countries
where informal systems exist alongside a well-functioning conventional
banking sector, hawala or other informal value transfer systems (IVTS)
should be registered and required to keep adequate records. In states
at risk of institutional collapse or states without functioning banking
systems, requirements beyond registration may not be feasible.
Governments should conduct outreach efforts to consult, engage, and
build consensus among IVTS operators with regard to the most
appropriate measures. Positive incentives should be created for
participants in the sector to implement regulatory frameworks. In this
regard, greater emphasis should be placed on the traceability of
transactions, rather than centralization of data and should be
sufficiently flexible so as not to drive IVTS underground.
Trade Diversion.--International trade is vulnerable to abuse by
terrorists, as well as other criminals, through false invoicing and the
use of commodities to move funds, yet relatively little attention has
been focused on this mechanism. Governments need a more concerted focus
on trade diversion, both through greater understanding of the threat
posed by lack of trade transparency and the techniques used, as well as
specific efforts directed at anticipating, detecting, and thwarting
attempts by terrorist groups or their supporters to take advantage of
this mechanism. Trade transparency units to analyze, share, and track
international trade data to identify anomalies have been formed, albeit
more slowly than hoped. Greater cooperation with the private sector
victimized by diversion schemes should be explored, and enhanced
priority placed on interagency cooperation and prosecution of trade
diversion cases.
Since 9/11, an impressive global effort to regulate the trans-
border movement of funds through formal sector financial institutions
has ensued, but AQ and other groups have adapted and developed
alternative means to raise and move funds to continue their terrorist
activities. In order to be effective, CFT policies continually must be
reassessed and recalibrated. Genuine partnership between the private
sector and Government is critical to effective CFT policies, and new
ways of sharing information and creating incentives for compliance must
be explored.
Thank you for the opportunity to discuss terrorist financing since
9/11--I look forward to questions and being of assistance to the
committee.
Mr. Meehan. Well, thank you each for your testimony. I am
very frustrated that we are competing with what was a very
dynamic schedule over in the House. I am going to at this point
in time recess the committee, and I have to be candid in saying
it is not likely we are going to be able to collect the
membership that I think this issue deserves. I am hoping that
we will recess and look for an opportunity to reconvene at a
point in time that will be convenient for you and us. I am
hoping that you would still be able to participate. The issue
we are discussing is too important to rush through in this
forum, and I think that you have laid the groundwork with your
testimony today that will allow us to have a jumping-off point
in any number of areas.
The service that you each have given to our country at the
critical time as we began this process was vital to the
protection of this Nation, but it is the continuing ability for
us to adapt as our enemy has adapted that is going to allow us
to protect this Nation in the future. Few people are talking
about this. You understand it. We have got to communicate this,
and do it effectively.
So I thank you. We will follow up at a later time, but at
this point in time, without objection, the subcommittee is in
recess subject to the call of the Chair.
The Chair indicates that we will consult with the Minority
in order to provide Members with adequate notice of when we
will convene.* Thank you for your testimony, and I look forward
to following up with you at an another forum in which we can
develop these issues far more broadly. Thank you.
---------------------------------------------------------------------------
* The subcommittee did not schedule a continuation of this hearing.
---------------------------------------------------------------------------
[Whereupon, at 11:55 a.m., the subcommittee was adjourned.]
A P P E N D I X
----------
Questions From Chairman Patrick Meehan for Jonathan Schanzer
Question 1a. With our military successes against al-Qaeda core
leadership in Afghanistan and Pakistan, there is a growing trend of al-
Qaeda affiliated groups and adherents filling the void and taking the
lead in launching attacks against the homeland.
Given the relatively low amount of money required to plan and
launch a terrorist attack, how realistic is it to expect U.S. and
international counterterrorism entities to identify funds that might be
used to undertake terrorism-related activity?
Answer. The 9/11 Commission's Executive Summary notes that the
United States must ``expect less from trying to dry up terrorist money
and more from following the money for intelligence, as a tool to hunt
terrorists, understand their networks, and disrupt their
operations.''\1\ I fully agree with this assessment. This does not mean
that we should stop trying to identify funds marked for terrorist
activity. But recent years have seen a decline in the identification or
seizure of such funds.
---------------------------------------------------------------------------
\1\ ``The 9/11 Commission Report--Executive Summary,'' National
Commission on Terrorist Attacks Upon the United States, July 2004,
http://govinfo.library.unt.edu/911/report/911Report_Exec.pdf.
---------------------------------------------------------------------------
Question 1b. What are some of the persistent challenges in
identifying and investigating an activity suspected of financing
terrorism? What are some of the trends in how terrorist groups
acquiring funds to support their objectives?
Answer. My sense is that there is just not enough collection being
done for this purpose. Indeed, there are too many other intelligence
challenges that our Government is working to meet. As always,
allocation of resources requires tough choices. In terms of trends, as
I noted in my prepared testimony, terrorists are increasingly
gravitating to organized crime to support their objectives. This
provides an opportunity for intelligence specialists to work hand-in-
hand with law enforcement.
Question 1c. Is the decision to pursue a terror financing
investigation based on the amount of money suspected of being acquired
for terrorism-related purposes? If so, what is the minimum monetary
amount of terrorism-related funds the U.S. Government assesses as
worthy of investigating?
Answer. I am no longer in a position to answer that. When I served
in Government, the specific amount was not a primary consideration.
Question 1d. Can you describe the decision-making process and
considerations by which the U.S. intelligence and law enforcement
communities decide whether to stop terrorism-financing related activity
and charge a suspect arrest or choose to allow the activity to continue
in hopes of following the trail of funds to a larger network of support
or to entities that may be planning a terrorist attack?
Answer. When I served in Government, the decision to designate was
one undertaken by an inter-agency working group. The different agencies
could, at times, disagree about the need for designation. This could
sometimes slow the process.
Question 2. President Obama recently signed an Executive Order
allowing the Treasury Department to freeze U.S.-based assets of persons
who the White House has identified as a ``threat to the peace,
security, and stability'' of Yemen.
Do you think this is an effective use of the designation authority?
Especially when a group such as Boko Haram--who have killed thousands
of civilians and are in constant contact with AQIM--remain
undesignated?
Answer. AQIM and Boko Haram are important targets. But governing is
about choosing priorities. In this case, I think the Yemeni
designations were the more pressing ones. Juan Zarate, a former Bush
administration counterterrorism adviser, also agrees that these
designations can ``help steer toward political stability in Yemen.''\2\
---------------------------------------------------------------------------
\2\ Arshad Mohammed and Jason Lange, ``U.S. Sends Warning to Saleh
Backers in Yemen,'' Reuters, May 16, 2012, http://www.reuters.com/
article/2012/05/17/us-usa-yemen-assets-idUSBRE84F1GS20120517.
---------------------------------------------------------------------------
Question 3a. In 2011, the U.S. Government revealed the findings of
a multi-year law enforcement operation to dismantle a complex,
transnational network involved in money laundering and drug
trafficking. The case involved Hezbollah, Mexican, and Colombian drug
trafficking organizations, the Taliban, Lebanon, Colombia, Panama,
several countries in West Africa, U.S. car buyers, a U.S. shipping
company, bulk cash couriers, plans for weapons trafficking deals, and
the Beirut-based Lebanese Canadian Bank (LCB).
Does the fact that groups such as Hezbollah and the Islamic
Revolutionary Guard Corps continue to use criminal ventures create
opportunities for U.S. enforcement mechanisms--such as our robust
counternarcotics tools--to roll up these vast networks?
Answer. Yes, the involvement of terrorist groups in criminal
ventures creates exploitable opportunities. David Aufhauser, former
general counsel of the U.S. Department of Treasury, notes that ``both
terrorist financing and traditional financial crimes have one thing in
common--they leave a financial footprint that allows us to trace
financial flows, unravel terrorist financing networks, and uncover
terrorist sleeper cells.''\3\ Our Government has tools at its disposal
to uncover that footprint.
---------------------------------------------------------------------------
\3\ David Aufhauser, ``The Threat of Terrorist Financing,'' United
States Senate Committee on the Judiciary, June 26, 2003, http://
www.au.af.mil/au/awc/awcgate/congress/terrorist_financing.htm.
---------------------------------------------------------------------------
I have also noted that when terrorist groups--particularly
religious ones--enter into the world of organized crime, it creates a
liability from the perspective of public relations. When pious
ideologies are sullied by criminal funds, this is something the U.S.
Government should exploit.
Question 3b. How does counterterrorism fit in this increasingly
interconnected underworld?
Answer. From what we have seen, Middle East terrorist groups
maintain a pious public face in their home territories, but engage with
the underworld in far-off places, such as Latin America or West Africa.
In a few cases, such as that of the Colombian FARC, groups directly
engage with the underworld to their own detriment.
Question 4a. The U.S. Government's on-going investigation of the
Lebanese Canadian Bank is of particular interest from a money
laundering perspective because it highlights the consequences of poor
compliance with anti-money laundering regulations in the formal
financial system.
Given the Lebanese Canadian Bank case, what more can be done to
protect the formal financial system from exploitation by terrorists?
Answer. This case exposed the weakness of the FATF system. The
system simply does not put enough pressure on countries that are less
motivated to fight terrorism. We need to strengthen the international
system. There needs to be tougher penalties for noncompliance.
Question 4b. How can the U.S. Government more effectively mitigate
the threats posed by trade-based money laundering and bulk cash
smuggling and other ways outside the formal financial sector?
Answer. This is also a problem that stems from the weakness of the
FATF system. We need to apply greater pressure on those countries where
trade-based money laundering and bulk cash smuggling is pervasive. The
primary problem is a lack of sustained effort. But, as always, even in
countries where there is a will, there may be a lack of resources.
Question 5. There is an increasing concern in the counterterrorism
and intelligence community that terrorist organizations are
increasingly using criminal activities that are outside of the formal
international financial system to raise funds to carry out attacks and
further their goals.
How important are terrorist funds derived from criminal activities
for the operational sustainability of major terrorist groups compared
to other non-criminal sources of funds, including state sponsors and
private sector donations?
Answer. The problem is pervasive. In 2003, the Orlando Sentinel
reported that according to Gen. James T. Hill, commander of the U.S.
Southern Command, ``Radical Islamic groups in the Middle East are
getting between $300 million and $500 million a year from various
criminal networks in Latin America.''\4\ Moreover, Brazil estimates
that ``more than US$6 billion a year in illegal funds is laundered in
the [tri-border area],'' according to a recent U.S. Government report.
The same report stated that ``Hizballah clearly derives a quite
substantial amount of income from its various illicit activities in the
TBA, in addition to financial support from the government of Iran and
income derived from narcotics trafficking in Lebanon's Al Beqa'a
Valley.''\5\
---------------------------------------------------------------------------
\4\ ``U.S. General: Islamic Rebels Get Cash From Latin America
Gangs,'' Orlando Sentinel, March 10, 2003, http://
articles.orlandosentinel.com/2003-03-10/news/0303100117_1_latin-
america-southern-command-miami.
\5\ ``Terrorist and Organized Crime Groups in the Tri-Border Area
(TBA) of South America,'' Federal Research Division--The Library of
Congress, December 2010, http://www.loc.gov/rr/frd/pdf-files/
TerrOrgCrime_TBA.pdf.
---------------------------------------------------------------------------
Question 6. Foreign Terrorist Organization designation by the
Secretary of State is an important tool our Government uses to deter
donations or contributions to and economic transactions with terrorist
organizations. There are currently 50 groups listed by the State
Department as designated Foreign Terrorist Organizations.
Which FTO-designated groups would you say are the best resourced
and most proficient at evading American and international financial
regulations? Which use the U.S. financial system the most?
Answer. Over time, just about every designated terrorist
organization has learned how to evade U.S. sanctions. They have largely
dropped out of the formal financial sector and severely limited their
exposure to institutions where the United States has jurisdiction. This
is why it has become harder to ``catch'' terrorist money.
Question 7. All of the witnesses mentioned in their prepared
testimony that the Government needs to interact with the financial
sector to identify terrorist financing.
How should the Government develop more effective case typologies
and feedback mechanisms about how terrorists use financial
institutions? Is this mostly an educational issue where we need to
empower financial institutions in order to monitor transactions for
suspicious or anomalous behavior?
Answer. America's financial institutions employ compliance
professionals to ensure that terrorists do not exploit their services.
A robust continuing education program is something that could be
considered.
Question 8a. The Financial Action Task Force on Money Laundering is
comprised of 36 member countries and territories and two international
organizations and was organized to develop and promote policies to
combat money laundering and terrorist financing. The FATF relies on a
combination of annual self-assessments and periodic mutual evaluations
that are completed by a team of FATF experts to provide information and
to assess the compliance of its members to the FATF guidelines.
What are the areas of greatest need for improvement in the FATF
surveillance process?
Answer. Special recommendations, rather than laws, create an
environment where compliance appears less than mandatory. Similarly,
mutual evaluations carry less weight than official oversight. FATF's
multilateral structure makes it easy for countries to do the minimum
required of them. This is a culture that, in my opinion, needs to be
addressed.
Question 8b. How does the United States evaluate the threats to the
global economy arising from money laundering, terrorist financing, and
financing the proliferation of weapons of mass destruction?
Answer. I don't believe I am equipped to answer this question.
Question 8c. How should we be prioritizing these threats and how
effectively has the FATF process been in addressing these threats?
Answer. I don't believe that FATF has been terribly effective in
addressing these threats. These are topics of conversation at FATF, but
not necessarily action items. As for the United States, our Government
continues to assess threats and makes decisions based on priorities. In
all of these areas, our Government has allocated significant resources.
Question 9. KPMG, a private consulting firm, released in October
2011 the findings of an anti-money laundering survey of major
international banks. They found that 80% of respondents reported an
increase in costs associated with anti-money laundering that averaged
around 45% since 2007. The major sources of cost increases identified
by the KMPG survey were: (1) Enhanced transaction monitoring, (2)
increased external reporting requirements to internal regulators and
external law enforcement agencies, and (3) increased anti-bribery and
anti-corruption activities.
In your opinion, are there sufficient resources devoted to
countering the financing of terrorism and money laundering?
Alternatively, are the resource costs associated with implementing such
financial regulations too burdensome on either the private or public
sectors?
Answer. According to a Congressional Research Service report,
``traditional anti-money-laundering tools appear to be of limited use
in disrupting terrorist financing.''\6\ Accordingly, it may not make
much sense to devote more resources to the anti-money-laundering
component of the problem. Critics also question the need for increased
funds going to the Treasury's counterterrorism efforts because less and
less cash has been frozen. But this fails to take into account how
effective Treasury has been in squeezing Iran with sanctions. This
effort, designed to help prevent Iran from attaining a nuclear weapon,
also happens to deprive the regime of the cash that it previously used
to finance terrorism. This has been a net positive. For this reason, I
believe the funding of Treasury's programs should continue.
---------------------------------------------------------------------------
\6\ Rensselaer Lee, ``Terrorist Financing: The U.S. and
International Response,'' Congressional Research Service, December 6,
2002, http://www.law.umaryland.edu/marshall/crsreports/crsdocuments/
RL31658_12062002.pdf.
---------------------------------------------------------------------------
Question 10. There has been growing concern at DHS, particularly
within ICE, about the widespread use of prepaid and stored value cards
as a way of smuggling illicit funds into the country which could fund
terror activity. Some estimates are that $1 billion annually is moved
into the country this way, with most of those funds nearly impossible
to track.
Would you agree that prepaid and stored value cards are a growing
danger to being able to target terrorist financiers? What steps would
you recommend DHS and the Department of the Treasury take to combat
this emerging trend?
Answer. According to Dennis Lormel, ``There is no empirical
statistical data establishing the nexus between credit card
exploitation and terrorism.'' Based on my experience, I largely agree
with this. When I served at Treasury, I personally saw cases that
proved to be rare exceptions.
Lormel also states that ``The focus for credit card fraud should be
placed on both the source and availability or distribution of funds.''
He notes that ``Al-Qaeda operatives commit credit card information
theft and fraud more on an individual basis than as a group or cell
activity; however, depending on the circumstances, they will commit
fraud as a group or cells.'' In contrast, he says that ``Because
Hezbollah functions like an organized crime family, their criminal
activities, which include credit card information theft and fraud, are
more likely to be group or cell oriented.''\7\ These are trends that
need to be examined moving forward.
---------------------------------------------------------------------------
\7\ Dennis Lormel, ``Terrorism and Credit Card Information Theft,''
Shift4 Corporation, September 2007, http://www.shift4.com/pdf/s4-
wp0806_terrorism-and-credit-card-information-theft.pdf.
---------------------------------------------------------------------------
Question 11a. On June 29, 2012, the Obama administration imposed
sanctions on a pair of informal money-exchange networks--known as
hawalas--in Afghanistan and Pakistan in what officials described as the
first use of the tactic to attack the financial underpinnings of
Taliban militants who rely on the system to fund their insurgency. The
Treasury Department said that the designations were coordinated with
similar measures adopted by the United Nations as part of a broad
effort to slow the flow of cash used by the Taliban to pay salaries and
purchase weapons for attacks in Afghanistan. The United Nations also
added the names of the same two institutions and their principal
backers to a list of groups officially associated with Taliban
militancy, meaning they will be subject to international sanctions as
well.
Considering how widespread their use is, how difficult is it for
U.S. Government to really get a handle on some of the terror financing
and money laundering activities being conducted under the hawala
system?
Answer. The hawala system is a tough challenge. While tens of
billions of dollars pass through hawaladars each year, a recent GAO
report states that ``officials and researchers we spoke with could not
provide estimates on the extent of terrorist use of informal banking
systems and other alternative financing mechanisms.''\8\
---------------------------------------------------------------------------
\8\ ``Terrorist Financing,'' Government Accountability Office,
November 2003, http://www.gao.gov/new.items/d04163.pdf.
---------------------------------------------------------------------------
According to the 9/11 Commission's monograph on terror financing,
the hawala system has become less of an issue when tracking the funds
of al-Qaeda. After we began actively tracking terror financiers,
operatives shifted to bulk cash smuggling.\9\
---------------------------------------------------------------------------
\9\ ``Monograph on Terror Financing,'' National Commission on
Terrorist Attacks Upon the United States, Accessed July 23, 2012.
http://www.9-11commission.gov/staff_statements/
911_TerrFin_Monograph.pdf.
---------------------------------------------------------------------------
And while hawalas may continue to pose a significant terror finance
threat, according to Robert Looney, ``a crackdown by Arab and South
Asian governments at the behest of Western governments is simply not
feasible. The vast majority of the money is from legal, legitimate
sources, and the hawala organizations are numerous and extremely
powerful.'' He correctly adds that, ``if the desire of the authorities
is to constrain or significantly reduce the importance of hawala
activity, this means reducing the economic incentives to use the Hawala
system. There is probably no better way to accomplish this than to
facilitate cheap, fast remittances across international boundaries, and
to do away with dual and parallel exchange markets, which are always an
incentive to keep transactions underground.''\10\
---------------------------------------------------------------------------
\10\ Robert E. Looney, ``Following the Terrorist Informal Money
Trail: The Hawala Financial Mechanism,'' Strategic Insights, Volume 1,
Issue 9 (November 2002), http://www.nps.edu/Academics/centers/ccc/
publications/OnlineJournal/2002/nov02/southAsia.html.
---------------------------------------------------------------------------
Question 11b. How could the United States be more effective in
targeting the hawala systems being used by drug traffickers to fuel the
Taliban insurgency in Afghanistan and Pakistan?
Answer. If we have not done so already, the U.S. Government needs
to establish assets within these hawala systems who could help identify
these individuals and entities.
Question 11c. Would closer collaboration with the United Nations
help our Government's ability to identify hawala networks engaged in
illegal behavior?
Answer. While the United Nations can be effective in some specific
instances, I don't have faith that it can have an impact here. The
problem of hawalas is a sensitive one. I believe there is little to no
chance that Member States would risk the political backlash that would
undoubtedly arise from targeting these informal financial networks that
effectively prop up the economies in some of the world's most neglected
places. In short, the United Nations fosters an environment where the
consensus determines policy. This will ensure that the United Nations
remains largely irrelevant in the fight against illicit hawala
transactions, and more broadly, terror finance, for years to come.
Questions From Chairman Patrick Meehan for John A. Cassara
Question 1a. With our military successes against al-Qaeda core
leadership in Afghanistan and Pakistan, there is a growing trend of al-
Qaeda affiliated groups and adherents filling the void and taking the
lead in launching attacks against the homeland.
Given the relatively low amount of money required to plan and
launch a terrorist attack, how realistic is it to expect U.S. and
international counterterrorism entities to identify funds that might be
used to undertake terrorism-related activity?
Answer. Detecting the rather miniscule amount of funds needed to
launch small-scale terrorist attacks is a daunting challenge. For
example, the attempted 2010 cargo plane bombing is estimated to have
cost our adversaries approximately $4,200. In my opinion, intelligence
from human sources, coupled with robust analytics, are probably our
best countermeasures.
Question 1b. What are some of the persistent challenges in
identifying and investigating an activity suspected of financing
terrorism? What are some of the trends in how terrorist groups
acquiring funds to support their objectives?
Answer. In my experience, policy makers' early over-reliance on
``financial intelligence'' to combat terror finance continues to be a
tremendous bureaucratic and operational roadblock. Regulations have
been the priority over field investigations. Another obstacle has been
our intelligence and law enforcement officers' unfamiliarity with
terror finance methodologies. A third impediment has been our over-
reliance on sanctions and designations. A fourth impediment has been
the decimation of Treasury enforcement after the creation of the
Department of Homeland Security. And, a fifth issue has been the
unwillingness to utilize known capabilities to assess the financial
intelligence that both industry and the Government spends tremendous
resources on to produce.
The most troublesome trend because it is so widespread is what I
call ``local crime'' to finance terror. Narcotics trafficking,
intellectual property rights violations, cigarette smuggling, etc. are
just a few examples. Yet this development also holds promise because by
cracking down on local crime--predicate offenses for money laundering--
we might also disrupt terrorist operations. I believe this premise
would hold true for domestic crime and encouraging problematic
countries to be more vigilant investigating predicate offenses.
Question 1c. Is the decision to pursue a terror financing
investigation based on the amount of money suspected of being acquired
for terrorism-related purposes? If so, what is the minimum monetary
amount of terrorism-related funds the U.S. Government assesses as
worthy of investigating?
Answer. I am not currently in a position to answer this question.
However, given evolving abilities to link actors and actions, what
might appear to be small dollar activities can now be traced to larger
networks of actors and activities, as we are seeing in medical fraud
for example. My hope is that FinCEN and other agencies aren't using
dollar values as the litmus test because it simply isn't a good
indicator of harm.
Question 1d. Can you describe the decision-making process and
considerations by which the U.S. intelligence and law enforcement
communities decide whether to stop terrorism-financing related activity
and charge a suspect arrest or choose to allow the activity to continue
in hopes of following the trail of funds to a larger network of support
or to entities that may be planning a terrorist attack?
Answer. I am not currently in a position to answer this question.
Question 2. President Obama recently signed an Executive Order
allowing the Treasury Department to freeze U.S.-based assets of persons
who the White House has identified as a ``threat to the peace,
security, and stability'' of Yemen.
Do you think this is an effective use of the designation authority?
Especially when a group such as Boko Haram--who have killed thousands
of civilians and are in constant contact with AQIM--remain
undesignated?
Answer. I believe sanctions and designations are one tool of many
that should be employed to combat terrorists and those that support
terrorists. However, in my opinion, the United States has relied far
too heavily on sanctions and designations. Sanctions, designations, and
other ``black lists'' are also not uniformly applied. In the years
immediately after 9/11, I participated in a number of interagency
discussions regarding targets of designations. The interagency time and
resources expended on this exercise produced few actual results. The
Government has finite resources and as a result of our fixation on
designations other countermeasures were shortchanged. I concur with an
unnamed retired diplomat who said, ``Sanctions (and designations)
always accomplish their principal objective, which is to make those who
impose them feel good.''
Question 3a. In 2011, the U.S. Government revealed the findings of
a multi-year law enforcement operation to dismantle a complex,
transnational network involved in money laundering and drug
trafficking. The case involved Hezbollah, Mexican and Colombian drug
trafficking organizations, the Taliban, Lebanon, Colombia, Panama,
several countries in West Africa, U.S. car buyers, a U.S. shipping
company, bulk cash couriers, plans for weapons trafficking deals, and
the Beirut-based Lebanese Canadian Bank (LCB).
Does the fact that groups such as Hezbollah and the Islamic
Revolutionary Guard Corps continue to use criminal ventures create
opportunities for U.S. enforcement mechanisms--such as our robust
counternarcotics tools--to roll up these vast networks?
Answer. Yes. See my response to 1b above.
Question 3b. How does counterterrorism fit in this increasingly
interconnected underworld?
Answer. Terrorism is increasingly financed by the underworld of
transnational crime. By lifting the veil of underworld finance and
operations, we can impact terror.
Question 4a. The U.S. Government's on-going investigation of the
Lebanese Canadian Bank is of particular interest from a money
laundering perspective because it highlights the consequences of poor
compliance with anti-money laundering regulations in the formal
financial system.
Given the Lebanese Canadian Bank case, what more can be done to
protect the formal financial system from exploitation by terrorists?
Answer. There are no short-term fixes to protect the formal
financial system from exploitation. Although imperfect, the best
international countermeasure regarding compliance measures in
international banking continues to be recommendations, programs,
policies, and mutual evaluations undertaken by the Financial Action
Task Force (FATF) and FATF-style regional bodies. I have witnessed
first-hand how countries respond to FATF-led international censure by
putting in place world-standard anti-money laundering and counter-
terrorist finance countermeasures.
Question 4b. How can the U.S. Government more effectively mitigate
the threats posed by trade-based money laundering and bulk cash
smuggling and other ways outside the formal financial sector?
Answer. See No. 13 below. Additionally, I have suggested in other
responses, the use of better technological solutions that can help the
Government stay at least current with developing threats, and will help
suggest optimal ways to mitigate, or prevent threats from being
realized.
Question 5. There is an increasing concern in the counterterrorism
and intelligence community that terrorist organizations are
increasingly using criminal activities that are outside of the formal
international financial system to raise funds to carry out attacks and
further their goals.
How important are terrorist funds derived from criminal activities
for the operational sustainability of major terrorist groups compared
to other non-criminal sources of funds, including state sponsors and
private-sector donations?
Answer. With the decline of the state sponsorship of terrorism and
efforts to crack down on private-sector donations, terrorist
organizations and lone-wolf terrorist actors increasingly rely on local
crime to finance their activities. I do not believe it is possible to
quantify the extent of any particular source of terrorist funds.
Question 6. Foreign Terrorist Organization designation by the
Secretary of State is an important tool our Government uses to deter
donations or contributions to and economic transactions with terrorist
organizations. There are currently 50 groups listed by the State
Department as designated Foreign Terrorist Organizations.
Which FTO designated groups would you say are the best resourced
and most proficient at evading American and international financial
regulations? Which use the U.S. financial system the most?
Answer. I am not currently in a position to answer this question.
Question 7. All of the witnesses mentioned in their prepared
testimony that the Government needs to interact with the financial
sector to identify terrorist financing.
How should the Government develop more effective case typologies
and feedback mechanisms about how terrorists use financial
institutions? Is this mostly an educational issue where we need to
empower financial institutions in order to monitor transactions for
suspicious or anomalous behavior?
Answer. I do not believe the burden of spotting potential terror
funding should be put on financial institutions. Rather, banks and
money service businesses should continue to file financial intelligence
and suspicious activity reports with the Department of Treasury. The
spotlight should be on the Financial Crimes Enforcement Network's
(FinCEN's) inability to effectively exploit the approximately 18
million pieces of financial intelligence it receives annually and to
identify suspect or anomalous behavior. FinCEN should also do a better
job of alerting reporting institutions to current money laundering and
terror finance schemes.
Question 8a. The Financial Action Task Force on Money Laundering is
comprised of 36 member countries and territories and two international
organizations and was organized to develop and promote policies to
combat money laundering and terrorist financing. The FATF relies on a
combination of annual self-assessments and periodic mutual evaluations
that are completed by a team of FATF experts to provide information and
to assess the compliance of its members to the FATF guidelines.
What are the areas of greatest need for improvement in the FATF
surveillance process?
Answer. I have spent many years working with the FATF, including
participating in many mutual evaluations. In my opinion, a serious
disconnect between ``process'' and ``results'' has developed. The
bottom-line metric in evaluating countries' anti-money laundering
``regimes'' is the number of successful arrests, prosecutions, and
convictions. With few exceptions, most countries fail in this regard.
Over the last 15 years, the emphasis has been on the process; i.e.
laws, rules, regulations, creation of financial intelligence, creation
of a financial intelligence unit, etc. Yet, the fixation on process or
form rather than substance, combined with lack of expertise,
corruption, and lack of political will all conspire against results. It
may also be that the tools being deployed in the surveillance process
are outdated and unable to provide the most insightful results.
Question 8b. How does the United States evaluate the threats to the
global economy arising from money laundering, terrorist financing, and
financing the proliferation of weapons of mass destruction?
Answer. I am not currently in a position to respond to this
question.
Question 8c. How should we be prioritizing these threats and how
effectively has the FATF process been in addressing these threats?
Answer. I am not currently in a position to respond to this
question.
Question 9. KPMG, a private consulting firm, released in October
2011 the findings of an anti-money laundering survey of major
international banks. They found that 80% of respondents reported an
increase in costs associated with anti-money laundering that averaged
around 45% since 2007. The major sources of cost increases identified
by the KMPG survey were: (1) Enhanced transaction monitoring, (2)
increased external reporting requirements to internal regulators and
external law enforcement agencies, and (3) increased anti-bribery and
anti-corruption activities.
In your opinion, are there sufficient resources devoted to
countering the financing of terrorism and money laundering?
Alternatively, are the resource costs associated with implementing such
financial regulations too burdensome on either the private or public
sectors?
Answer. In my opinion, per my response in 7a above, industry
already bears too much of the regulatory AML/CFT burden. Industry
produces an enormous amount of financial intelligence but there is very
little return on investment. The primary reason is that the information
that they spend so much money to generate is not systematically or
comprehensively (strategically or tactically) exploited by Treasury's
FinCEN. In that regard, I believe that FinCEN has been provided
sufficient financial resources, but would question how they have
utilized those resources. In particular, I don't believe they have made
the best investments to help them effectively understand the financial
intelligence that they already possess, nor to report that information
to other Government or private-sector entities. I also question whether
the Government has made proper investments in terms of recruiting,
retaining, and developing the analytic community, especially with
respect to evolving tools and capabilities.
Question 10. There has been growing concern at DHS, particularly
within ICE, about the widespread use of prepaid and stored value cards
as a way of smuggling illicit funds into the country which could fund
terror activity. Some estimates are that $1 billion annually is moved
into the country this way, with most of those funds nearly impossible
to track.
Would you agree that prepaid and stored value cards are a growing
danger to being able to target terrorist financiers? What steps would
you recommend DHS and the Department of the Treasury take to combat
this emerging trend?
Answer. I agree that prepaid and stored value cards are a growing
danger in targeting terrorist financiers and money launderers both in
the United States and overseas. I suggest Congress and the
administration review the 2007 National Money Laundering Strategy that
discusses prepaid and stored value cards and outlines countermeasures.
Unfortunately, after 5 years little has been done. I urge Congress and
the administration to hold FinCEN and others accountable for the lack
of action.
Question 11a. On June 29, 2012, the Obama administration imposed
sanctions on a pair of informal money-exchange networks--known as
hawalas--in Afghanistan and Pakistan in what officials described as the
first use of the tactic to attack the financial underpinnings of
Taliban militants who rely on the system to fund their insurgency. The
Treasury Department said that the designations were coordinated with
similar measures adopted by the United Nations as part of a broad
effort to slow the flow of cash used by the Taliban to pay salaries and
purchase weapons for attacks in Afghanistan. The United Nations also
added the names of the same two institutions and their principal
backers to a list of groups officially associated with Taliban
militancy, meaning they will be subject to international sanctions as
well.
Considering how widespread their use is, how difficult is it for
U.S. Government to really get a handle on some of the terror financing
and money laundering activities being conducted under the hawala
system?
Answer. The challenges involved in identifying the misuse of hawala
and similar informal underground value transfer operations is
enormous--both in the United States and overseas.
Question 11b. How could the United States be more effective in
targeting the hawala systems being used by drug traffickers to fuel the
Taliban insurgency in Afghanistan and Pakistan?
Answer. This is a complex question that requires a lengthy answer.
To summarize, in the Afghanistan and Pakistan context trade is the
primary vehicle used to provide ``counter-valuation'' between
hawaladars. We need to work with Afghanistan, Pakistan, and countries
in the surrounding region (including Iran) to promote the concept of
``trade-transparency.'' If we present the issue as a revenue enhancer
(combating customs fraud) the governments involved will be receptive.
Trade-transparency should be made part of the regional Afghan Transit
Trade Agreement. By promoting trade-transparency and combating customs
fraud, we will shine the spotlight on underground finance and disrupt
hawala operations. See the following article I wrote for more details:
http://www.johncassara.com/
index.php?option=com_content&view=article&id=24:the-afghan-transit-
trade-how-afpak-drug-lords-and-terrorists-are-moving-money-and-
transferring-value&catid=2:articles&Itemid=8.
Question 11c. Would closer collaboration with the United Nations
help our Government's ability to identify hawala networks engaged in
illegal behavior?
Answer. The short answer is no. In my experience, most countries do
not recognize hawala or other similar types of underground financial
systems or collect data or intelligence on financial networks.
Question 12. Mr. Cassara, in your prepared testimony you talked
about ``draining the swamp,'' or how cracking down at home on local and
transnational financial crime might become one of the most effective
strategies to combat terrorism. You said that law enforcement,
intelligence, and military organizations must learn to look beyond the
immediate circumstances of a given local crime because these isolated
acts could have more sinister ties.
How do you get State and local law enforcement to change this
mentality with regard to fighting crime domestically in teaching them
to ``ask the next question'' during the course of a routine
investigation and question where the money is going?
Answer. At the State and local level the three-step solution is
training, intelligence, and prioritization. Regarding training, I am
familiar with a number of first-rate training initiatives such as the
State and Local Anti-Terrorist Training (SLATT) program run by the
Institute for Intergovernmental Research (IIR) and sponsored by the
Bureau of Justice Assistance (see www.slatt.org). There are other
training initiatives as well. Effective training programs should be
expanded. Specifically, officers and analysts should be trained how to
recognize terror finance indicators. They should be made familiar with
the financial and analytical tools that they have available to them
(sometimes these tools are not available but that is another issue).
From personal experience in working with State and local law
enforcement, I am appalled by the lack of knowledge of financial crimes
and resources that could be made available. Once law enforcement
officers and analysts have a better understanding of terror finance
methodologies, they should use that information to task reporting
sources to develop operational intelligence. They should also make it a
matter of routine not to become fixated on the immediacy of the local
crime they are investigating (narcotics, stolen cars, organized theft
rings, human smuggling, etc) but rather to ``ask the next question,''
i.e., ``What about the money?'' Finally, Federal, State, and local law
enforcement administrations should not become absorbed with the quick
``statistic'' or easy bust. Rather, they should understand that money
laundering and terror finance investigations are a long-term investment
that often times fail. However, they are too important to short change
for more immediate returns. Much of this conundrum is budget-driven.
Scarce funding is provided based on perceived results; i.e. statistics.
Unfortunately, the individuals that look at the statistics cannot
differentiate between a quick case or an impact case because they are
often reported the same way.
Question 13a. Mr. Cassara, you mentioned in your prepared testimony
that by promoting trade transparency and using technology to spot
anomalies or discrepancies in trade data that intelligence or law
enforcement entities may already possess, we may be able to use trade
as a ``back door'' to enter into previously hidden financial networks.
Can you elaborate on this idea and how sharing information with
State and local law enforcement may aid in this process?
Answer. There are a large number of underground financial systems
in the United States; they are also known as ``parallel banking,''
``underground finance,'' ``informal value transfer systems, etc.''
Examples are hawala, the black market peso exchange, and the Chinese
fei-chien systems. While there are a number of ways that underground
financial brokers periodically balance their books, historically and
culturally trade is the preferred method of providing ``counter-
valuation.'' Over- and under-invoicing is the primary vehicle used.
Thus discrepancies or anomalies in trade-data could be indicators of
simple fraud or possibly the back door to underground financial
networks. So if a State or local law enforcement agency identifies a
business that does not make economic or market sense, caters to suspect
groups, or has a side business involved with remitting money or value
overseas, it could be an entry point into previously hidden financial
networks. Given the amount of data that law enforcement has access to,
transparency can be enhanced by the use of technologies that seek out
both anomalies, as well as previously undetected patterns. These
technologies can be used with vast amounts of data that can't possibly
be reviewed in relevant time periods (or at least not reviewed
accurately), nor, given the amount of data, can humans understand
correlations and causative relationships in the data. Technology can,
and can also begin to create statistically significant linkages between
transactions and actors. By using these technologies, which exist now,
we can better prioritize where our law enforcement should be spending
time, we have more meaningful information to share, and ultimately, we
can be much more productive and successful with our limited enforcement
resources.
Question 13b. In some ways isn't this the future of combating
terrorist financing?
Answer. Since Richard Nixon declared ``War on Drugs'' in 1970, our
primary countermeasure in following the dirty money trail has been
tracking financial flows through banks and non-bank financial
institutions. Our primary emphasis has been creating a domestic (Bank
Secrecy Act et al) and then later an international network (FATF
recommendations) of financial transparency reporting requirements.
I believe trade-based money laundering is the ``next frontier'' in
international money laundering and counter-terrorist finance. We should
work to put in place a similar domestic and international network of
trade-transparency. That said, the technologies that are critical to
understanding terrorist financing exist now, so I could say that the
future has arrived.
Question 14a. Mr. Cassara, you mentioned in your prepared testimony
that the Federal Government is lagging in its deployment of advanced
analytical fraud frameworks such as ``predictive,'' ``social network''
and ``visual'' analytics.
In your opinion, is this the result of a lack of manpower or funds
within the Government to deploy these cutting-edge technologies?
Answer. I am not really in a position to comment except to say, in
my experience, there is a critical lack of understanding about what
advanced analytics are and why they are relevant to the Federal
Government.
Question 14b. You rightly raise privacy and civil liberties
concerns in your testimony with regard to exploiting social network
analytics. Can you explain some of the technology that exists to
safeguard the dissemination of personal financial information to
prevent abuse?
Answer. I am not a technologist, but let me suggest a couple of
thoughts. First, many analytics don't actually rely on the movement of
data from databases. Instead, they utilize ``metadata'', which is data
about data. The reason this is important is that it provides an audit
trail as to what data has been used, how it has been used, and who has
had access to it. Warehouses utilizing analytics can be configured to
include access controls--the more sensitive the data, the higher the
clearance needed. Second, in many cases, analytics can be run in a
manner that either the data is anonymized or the source of the data
obscured. In the case of social analytics, the analytics are not
necessarily looking for the identity of the ``speaker,'' but searching
for specific content and sentiment. Visual analytics itself does not
raise privacy concerns because its focus is presenting visual depiction
of information derived from statistical analysis. It thus provides an
easier, less abstract way of understanding data. Finally, predictive
analytics has historically been misunderstood, particularly by the
privacy community. I would submit that with predictive analytics, the
data is allowed to speak for itself; rather than the analyst coming to
the data with preconceived ideas of what is important or causative,
predictive analytics allows the data to ``speak for itself,'' to reveal
previously unknown patterns, or to reveal those factors that are truly
important to an activity. In all of these cases, what is important to
note is that the statistics never label activities as definitively
fraudulent, or definitively linked to terrorist activity. What they do,
however, is provide the analyst or investigator with unbiased
information relating to abnormalities that require more human
investigation.
Question 15. Mr. Cassara, you also mentioned in your prepared
remarks that within the next few years, approximately 500-700 million
additional pieces of financial information in the form of wire transfer
data will be routed annually to FinCEN.
What are the implications for the Treasury Department and the
intelligence community missing out on this crucial financial
intelligence if the Government is not able to employ all available
technologies to exploit it and act upon it in a timely fashion?
Answer. Currently, FinCEN is tasked by the U.S. Government to
receive, analyze, warehouse, and disseminate approximately 18 million
pieces of financial intelligence. Currently FinCEN is not able to
fulfill this mission. The reasons are many and complex, but the primary
explanation is continued failed management. If FinCEN is not able to
successfully complete today's mission involving 18 million pieces of
financial intelligence, we should not expect that they can handle the
increased workload, which is certain to occur. I worked at FinCEN for 6
years. In my first book, ``Hide & Seek: Intelligence, Law Enforcement,
and the Stalled War on Terror Finance,'' I discussed the entrenched
FinCEN culture that remains the catalyst for mission failure. We can no
longer afford business as usual. The implications for the U.S. law
enforcement and intelligence communities are enormous. That is why in
my testimony I advanced the idea of a Financial Intelligence Unit ``in
a box'' or going further downstream with the data and the analytics
directly to the consumer (see No. 16 below).
Question 16. Mr. Cassara, in 2008, you raised concerns that
financial intelligence is not being adequately exploited when
Treasury's Financial Crimes Enforcement Network (FinCEN) analyzes and
shares the hundreds of thousands of Suspicious Activity Reports (SARs)
they come across every year. Last month, FinCEN reported that number of
suspicious activity reports filed by financial institutions had
increased last year by 13.5% to an all-time high.
Can you explain your concerns regarding SARs to the Committee and
elaborate on how you believe FinCEN should be most effectively
exploiting the valuable financial intelligence in those Suspicious
Activity Reports?
Answer. As noted above, SARS are filed at great cost to industry.
Unfortunately, they have not been effectively exploited. The reasons
are many including failed management, until recently a series of failed
data mining/analytical systems, lack of skilled analysts, a revolving
door of departing staff due to poor morale, and FinCEN turning itself
away from its original mission of supporting law enforcement to
emphasizing the regulation of the BSA. Under FinCEN's current
framework, in order to address the above question regarding the lack of
effective exploitation of SARS the other underlying problems will have
to be addressed. However, there is a new idea on the horizon. The
technology now exists to not only disseminate SARs and other financial
intelligence directly to law enforcement users but allow a state-of-
the-art analytics platform to accompany the data. Per law and
regulation, Treasury and FinCEN would still control the financial
intelligence but we could do an ``end run'' around the current
structure of FinCEN that acts as an impediment to effective
exploitation of SARs and other financial intelligence by disseminating
both the data and the analytical tools directly to the end-user. In
effect, we could send a Financial Intelligence Unit (FIU) ``in a box''
to approved users at the Federal, State, and local level.
Question 17. Mr. Cassara, you have written extensively about trade-
based money laundering and invented the concept of trade-transparency
units which is now a part of the U.S. Government's National Anti-Money
Laundering Strategy. In addition, the Department of Homeland Security's
Immigration and Customs Enforcement has adopted this concept by
establishing the world's first TTU.
Can you explain this concept a bit, and how DHS has implemented
their own TTU program through ICE?
Answer. FATF defines trade-based money laundering (TBML) as the
``process of disguising the proceeds of crime and moving value through
the use of trade transactions in an attempt to legitimize their illicit
origins.'' According to the U.S. State Department, this practice has
reached ``staggering'' proportions in recent years. Although the
problem is difficult to quantify precisely, TBML is found globally,
including in the United States. In fact, some experts believe the
majority of U.S. money being laundered abroad is moved out of the
country via undervalued exports. The U.S. Department of Treasury
estimates that the Black Market Peso Exchange, a single TBML
methodology found in the Western hemisphere, launders billions of drug
dollars every year.
Criminal and terrorist groups that abuse trade are assisted by a
number of factors:
The massive amount of global trade that takes place daily.
Financial diversity (i.e. the wide variety of financial
controls found in different countries, the diverse financial
arrangements made between governments, and the innumerable
different types of financial deals found in international
commerce).
The co-mingling of licit and illicit funds and trade items.
The low risk of detection.
Limited Government understanding and resources to detect
suspect trade transactions.
Trade-based money laundering scams take a wide variety of forms.
For example, it could be simple bartering or a commodity-for-commodity
exchange. In certain parts of Afghanistan and Pakistan the going rate
for a kilo of heroin is a color television set. Drug warlords exchange
one commodity they control (opium) for others that they desire (luxury
and sports utility vehicles). However, generally speaking, money
laundering through simple invoice fraud and manipulation is most
common. The key element of this technique is the misrepresentation of
the trade good in order to transfer value between importer and
exporter. The quantity, quality, and description of the trade goods can
be manipulated. The shipment of the actual goods and the accompanying
documentation provide cover for ``payment'' or the transfer of money.
In order to move money out of a country, practitioners import goods
at overvalued prices or export goods at undervalued prices. In order to
move money into a country, practitioners import goods at undervalued
prices or export goods at overvalued prices.
It is important to understand that when a buyer and seller are
working together, the price of the item can be whatever they want it to
be. As long as parties in an international trade transaction do not get
too greedy and cause noticeable trade anomalies, their chances of
detection by bankers, customs services, law enforcement, and other
authorities are miniscule.
Every country in the world has a customs service and keeps track of
what comes in and what goes out. In fact, in many parts of the world
customs duties are the primary source of Government revenue. So
although there are differences in the way governments gather and store
trade data, enough similarities exist to conduct effective analysis and
TBML investigations. Such investigations require three basic elements:
Access to import and export data. Moreover, if the trade
data can be augmented by combining it or overlaying it with
other data such as financial, travel, commercial, law
enforcement, etc. following the suspect activity will be
further enhanced.
The ability to promptly exchange data (adhering to standard
international safeguards and privacy concerns) with other
countries.
Expertise in analyzing and investigating TBML.
Recognizing the growing threat of TBML, in 2004 the Department of
Homeland Security's Immigration and Customs Enforcement (ICE)
established the world's first trade-transparency unit or TTU.
Subsequently, other TTUs have been created in Argentina, Brazil,
Paraguay, Colombia, Panama, Mexico, and other countries. As
demonstrated above, by comparing one country's targeted imports or
exports against the corresponding data of another country, trade
anomalies can be detected that could be indicative of customs fraud,
tax evasion, contraband smuggling, or trade-based money laundering. The
data could even be the back door into underground financial schemes
including those linked to terror finance. I am pleased that DHS is
beginning to look at how to augment this data analysis through the use
of robust technologies that can parse through enormous amounts of data
in very short time increments. Of course, data analysis will only go so
far. Investigations in the field are also needed.
The U.S. law enforcement and intelligence communities agree that
one of the most effective counter-measures against organized crime,
terrorists, systematic corruption, fraud, and many other types of
serious crime is to ``follow the money trail.'' In the years to come, I
am convinced we will increasingly learn to ``follow the value trail.''
Questions From Chairman Patrick Meehan for Dennis M. Lormel
Question 1a. With our military successes against al-Qaeda core
leadership in Afghanistan and Pakistan, there is a growing trend of al-
Qaeda affiliated groups and adherents filling the void and taking the
lead in launching attacks against the homeland.
Given the relatively low amount of money required to plan and
launch a terrorist attack, how realistic is it to expect U.S. and
international counterterrorism entities to identify funds that might be
used to undertake terrorism-related activity?
Answer. Nominal funding requirements to support terrorist activity
can be very challenging for U.S. and international counterterrorism
entities to identify. It is possible to identify such funding but
highly improbable. Counterterrorism entities need to develop and
implement investigative and analytical methodologies to increase the
probability factor. Few, if any, entities existed before 9/11 that were
dedicated to identifying, investigating, and disrupting terrorist
financing. Since then, many entities were established with the mission
to investigate terrorist financing. By using the combination of
financial intelligence, human intelligence, and signal intelligence,
mechanisms have been, and will continue to be, developed to identify
even nominal amounts of money. By analyzing case studies, ranging from
grand to simple, such as the Mumbai bombing and lone wolf schemes like
that of Farooque Ahmed, who planned to detonate a bomb in the
Washington, DC Metro Transit System, counterterrorism entities
responsible for terrorist financing can build typologies and develop
proactive and progressive investigative strategies.
Question 1b. What are some of the persistent challenges in
identifying and investigating an activity suspected of financing
terrorism? What are some of the trends in how terrorist groups
acquiring funds to support their objectives?
Answer. One of the persistent challenges I encountered in the FBI,
and that I would continue to be concerned about today is the timely
collection and assessment of financial intelligence. Did my FBI
Section, the Terrorist Financing Operations Section (TFOS), have
intelligence information that we did not identify that could have led
us to a plot or potential attack? We collected and assimilated a
tremendous amount of intelligence information that we endeavored to
turn into actionable intelligence for field investigators. This is
particularly important in cases where a lone wolf operative did not
have a record, was unknown to intelligence agencies, and used funds
from a legitimate job to finance terrorist plans. Time sensitivity in
these matters was always challenging.
A trend that has continued since 9/11, and has grown significantly
since then, has been the movement to criminal activity as a fund-
raising mechanism for terrorists. In the aftermath of 9/11, the United
States and our international partners made a concerted effort to cut
off the flow of legitimate money from wealthy donors and charities. The
more these efforts succeeded, the more terrorists were driven to
criminal activity. This continues today. It will be interesting to
assess the success of the sanctions against Iran and the revolution in
Syria, two State sponsors of terrorism. This will probably result in
the continued increase in criminal activity.
Question 1c. Is the decision to pursue a terror financing
investigation based on the amount of money suspected of being acquired
for terrorism-related purposes? If so, what is the minimum monetary
amount of terrorism-related funds the U.S. Government assesses as
worthy of investigating?
Answer. Terrorist financing investigations were not predicated on
monetary considerations when I ran TFOS at the FBI. Terrorist financing
investigations are probably still not and should never be predicated on
monetary thresholds. Such investigations should be predicated upon the
relation to terrorism and the potential threat represented. While I was
still at the FBI in 2003, a process was established whereby all
terrorism cases contained a financial investigative component.
Terrorist financing investigations should focus on identifying all
funding streams and disrupting terrorist activities through denying
terrorists money. For terrorists to succeed, they must have a source of
funds and access to their money when they need it. Disrupting the
sources and/or access to money makes it extremely difficult for
terrorists to succeed.
Question 1d. Can you describe the decision-making process and
considerations by which the U.S. intelligence and law enforcement
communities decide whether to stop terrorism-financing related activity
and charge a suspect arrest or choose to allow the activity to continue
in hopes of following the trail of funds to a larger network of support
or to entities that may be planning a terrorist attack?
Answer. Terrorist financing investigations are a component of
counterterrorism. They should be conducted in coordination with the
broader counterterrorism mission and in conjunction with terrorism
investigations. Terrorist financing is one tool in the arsenal.
Terrorist financing investigations should be conducted with other
investigative techniques to include undercover operations, use of
informants, and/or wiretaps and tracking telephone calls and/or emails.
The combination of these investigative techniques can be extremely
productive.
The decision to allow a terrorist financing or broader terrorism
investigation to continue or to take it down is extremely important. It
should be based on whether an attack is imminent or not. If an attack
is imminent, you need to take down the investigation immediately and
prevent the attack. If an attack is not imminent, you allow the
investigation to continue. In so doing, you can develop evidence to
identify additional co-conspirators and funding streams. As an example,
consider the Lebanese Canadian Bank investigation. Although Hezbollah
was involved, and is a violent terrorist organization, there was no
specific threat or imminent danger associated with the investigation.
In that situation, you allow the investigation to play out. In this
case, the investigation was a multi-year investigation. A number of
funding streams and co-conspirators were identified and dismantled.
Take a case such as the Time Square bomber. As a hypothetical, had law
enforcement and intelligence agencies been aware of Faisal Shahzad and
his plan to detonate a bomb in Time Square, they would have allowed the
plot to unfold up to the point of imminent danger. In that case, had
they been aware and determined there was no imminent danger, they
probably would have identified the funding source, through the Hawala
operator. Had there been imminent danger, or if imminent danger could
not be determined, they would have arrested Shahzad and developed
additional information and evidence in the aftermath of the take down.
When I ran TFOS at the FBI, we strove to take terrorist financing
investigations in two directions: Forward to the strike team and
backward to the point of financial origin. I believed there were three
funding tracks, and I wanted investigations to disrupt activities in
all three tracks. First, there was a fundraising track. Large sums of
money, from the hundreds of thousands to millions of dollars, would be
generated through mechanisms to include donations from wealthy donors,
charities, State Sponsors (Iran most notably), criminal activities and
other means. The money flowed into the terrorist organization for
organizational use. Second, funding would be provided in a track from
the organization, through a single facilitator or multiple
facilitators, and to an operation. The funding flow here would be less
than the flow into the organization. It would range from the hundreds
of thousands to a few thousand dollars. Our primary investigative
attention would be focused on the facilitators because that would take
us to both the organization and to the operatives. Third, there was a
track from the operation, through the facilitator(s), to the
operatives. The funding flow here would be in the thousands to the
hundreds of dollars.
In general, when conducting terrorist financing investigations in
the first track, the organizational track, you would be more inclined
to allow the investigation to continue over a longer period of time and
be more deliberate and methodical in your investigative methodology.
When conducting investigations into the second track (operations) and
the third track (operatives) you have to deal with a greater sense of
urgency and constantly assess whether an attack is imminent. Most of
these investigations were shorter term because, at some point, you had
to be concerned about the threat of attack.
Question 2. President Obama recently signed an Executive Order
allowing the Treasury Department to freeze U.S.-based assets of persons
who the White House has identified as a ``threat to the peace,
security, and stability'' of Yemen.
Do you think this is an effective use of the designation authority?
Especially when a group such as Boko Haram--who have killed thousands
of civilians and are in constant contact with AQIM--remain
undesignated?
Answer. If evidence exists to support designations, I am an ardent
supporter for the designation process. Such actions disrupt funding
flows and serve as a deterrent. Boko Haram is a violent and dangerous
group. They have been very active and pose a formidable threat in
Nigeria. With respect to designating other groups, I would not make
designation decisions by comparing one group, such as Boko Haram, to
other groups. A number of factors must be taken in consideration in the
decision process to include the level of overall terrorist threat,
threat to the United States, diplomatic considerations, and the need to
continue the classification and protection of intelligence information.
Question 3a. In 2011, the U.S. Government revealed the findings of
a multi-year law enforcement operation to dismantle a complex,
transnational network involved in money laundering and drug
trafficking. The case involved Hezbollah, Mexican and Colombian drug
trafficking organizations, the Taliban, Lebanon, Colombia, Panama,
several countries in West Africa, U.S. car buyers, a U.S. shipping
company, bulk cash couriers, plans for weapons trafficking deals, and
the Beirut-based Lebanese Canadian Bank (LCB).
Does the fact that groups such as Hezbollah and the Islamic
Revolutionary Guard Corps continue to use criminal ventures create
opportunities for U.S. enforcement mechanisms--such as our robust
counternarcotics tools--to roll up these vast networks?
Answer. All criminal activity undertaken by Hezbollah, the Islamic
Revolutionary Guard Corps and other terrorist organizations leave them
vulnerable to detection by law enforcement and intelligence services.
Law enforcement, particularly the DEA and FBI, deserve considerable
credit for conducting a well-disciplined, focused, and comprehensive
investigation that tied transnational criminal organizations together
with terrorist groups and a number of facilitation tools to include the
Lebanese Canadian Bank. Through comprehensive investigation and
financial tracing, multiple funding streams between Central America,
the United States, Lebanon, West Africa, and Europe were identified and
dismantled. There have been at least four other significant
investigations conducted by the FBI and other agencies that exposed
Hezbollah's involvement in raising large amounts of money through
criminal activities in the United States. The most notable of these
cases was the North Carolina cigarette smuggling case known as
Operation Smokescreen. A Hezbollah cell operated an elaborate scheme to
smuggle cigarettes from North Carolina to Michigan. This cell generated
approximately $25 million in illicit funds.
Question 3b. How does counterterrorism fit in this increasingly
interconnected underworld?
Answer. The nexus between criminal and terrorist organizations has
continued to grow. This trend will persist. As the U.S. Government and
our allies continue to exert pressure and cut off funding streams,
terrorists will further align themselves with criminal organizations
and participate in criminal activity to raise much-needed money.
Terrorists are extremely adaptable and consistently look for new
funding mechanisms. Many terrorist organizations have become engaged in
drug trafficking because drug trafficking is the most profitable
criminal activity. These terrorist groups are evolving into hybrid
criminal and terrorist organizations. As they do, their ideology tends
to give way to greed. Greed is a vulnerability law enforcement can
exploit, unlike ideology. This makes these groups more susceptible to
criminal investigation and prosecution.
Question 4a. The U.S. Government's on-going investigation of the
Lebanese Canadian Bank is of particular interest from a money
laundering perspective because it highlights the consequences of poor
compliance with anti-money laundering regulations in the formal
financial system.
Given the Lebanese Canadian Bank case, what more can be done to
protect the formal financial system from exploitation by terrorists?
Answer. There are some egregious examples of anti-money laundering
(AML) compliance breakdowns that facilitated terrorists being able to
exploit the formal financial system. The biggest failure in the
Lebanese Canadian Bank case was the complicity of the Lebanese Canadian
Bank with transnational organized criminal groups, a Mexican drug
cartel, and Hezbollah. First, there was a total failure by the bank to
have an AML program. This enabled criminal and terrorist elements to
place money in the formal financial system, the first step in the money
laundering process; and then to layer it, which is the second step, by
moving it to other financial institutions and giving it a sense of
legitimacy; and then in integrating the funds, the third step in the
money laundering process, by using the illicit, but seemingly
legitimate funds to purchase goods, in this case used cars from the
United States, and shipping them to Africa for sale as legitimate
transactions.
One way to help strengthen the formal financial system is to make a
comprehensive case study out of the Lebanese Canadian Bank and
specifically show financial institutions how they were exploited in
this case. By developing typologies that could be built into scenarios
that could be incorporated into rules for AML transaction monitoring,
we can improve the system. This case study should also be used as a
wide-ranging training exercise.
The Lebanese Canadian Bank case was exacerbated by the fact that
Lebanon does not recognize Hezbollah as a terrorist organization.
Therefore, banks in Lebanon, and banks in other countries that do not
consider Hezbollah to be a terrorist organization, are inclined to bank
Hezbollah. International consensus on who is a terrorist organization
has been a longstanding problem.
There are other cases that can be cited, such as HSBC. The Senate
Permanent Subcommittee on Investigations conducted a thorough
investigation and issued a formal report on July 17, 2012, in
conjunction with a public hearing involving executives from HSBC. The
hearing and report serve as tools for lessons learned and should
provide a deterrent to other institutions for serious shortcomings in
their AML programs.
It should be pointed out that an overwhelming number of banks
operating in the United States have outstanding AML programs. The AML
compliance professionals in these institutions take a great deal of
pride in their work ethic and dedication to rooting out money
laundering and terrorist financing. I have seen this first-hand, both
as an FBI agent and today as a consultant doing work in the financial
services industry.
Question 4b. How can the U.S. Government more effectively mitigate
the threats posed by trade-based money laundering and bulk cash
smuggling and other ways outside the formal financial sector?
Trade-based money laundering has had a long history as a successful
mechanism for criminals and terrorists. The Lebanese Canadian Bank case
demonstrates how criminals and terrorists collaborated in different
trade-based money laundering schemes to launder illicit funds.
Likewise, bulk cash smuggling has long been, and continues to be, a
significant problem for criminals and terrorists. In 2010 and 2011,
both the Treasury Department and FBI reported that bulk cash smuggling
was a huge terrorist financing concern.
In my view, one of the most significant problems and
vulnerabilities we are confronted with outside the formal banking
system in the United States is unlicensed and unregistered money
remitters. These illegal money remitters provide hawala-like services
and do not comply with Bank Secrecy Act (BSA) reporting requirements.
Many banks are unaware of how many of their clients operate as illegal
money remitters. This is in spite of rigorous due diligence
requirements. I believe that about 80% of money remitters in the United
States are illegal.
To the question of how the U.S. Government can more effectively
mitigate the threats of these informal mechanisms, the answer is two-
fold. First, the Government interagency community should conduct
targeted investigative initiatives addressing these problem areas.
Through interagency cooperation, communication, and coordination, the
Government should identify the highest-priority targets in these areas
and determine which agencies could make the best impact by taking the
lead and develop multi-agency strategies. Second, as a component of
these initiatives, the U.S. Government should bring in the private
sector and subject matter experts who could provide a different
perspective and different sets of information that could develop
valuable financial intelligence. Public-private partnerships like this
are woefully lacking.
Question 5. There is an increasing concern in the counterterrorism
and intelligence community that terrorist organizations are
increasingly using criminal activities that are outside of the formal
international financial system to raise funds to carry out attacks and
further their goals.
How important are terrorist funds derived from criminal activities
for the operational sustainability of major terrorist groups compared
to other non-criminal sources of funds, including state sponsors and
private sector donations?
Answer. Following the terrorist attacks of 9/11, the United States
and our allies made a concerted effort to deter donations to terrorists
from wealthy donors, charities, and other funding sources to include
State Sponsors. This was accomplished in the form of sanctions, OFAC
and State Department designations, and targeted investigations by law
enforcement and intelligence agencies. As a result, numerous funding
sources were shut off and terrorist groups had to develop alternative
funding mechanisms. They gravitated to criminal activity, which has
consistently expanded over the years. Drug trafficking, kidnapping,
extortion, counterfeit goods, and a variety of other crimes have become
a staple for terrorist organizations.
As mentioned earlier, terrorists must have a continuous flow of
funds available that they can immediately access in order to succeed.
As otherwise legitimate sources of funding have diminished, terrorists
have had to increasingly rely on criminal activity as a funding
mechanism.
As more sanctions and pressure are exerted on Iran, it is less
likely they will be able to maintain the level of State Sponsorship
provided to Hezbollah and other terrorist organizations. Likewise, as
Syria faces a regime overthrow, it is unlikely they will be able to
provide funding and support to terrorists. This will result in an even
steadier reliance on criminal activities by terrorist groups.
Question 6. Foreign Terrorist Organization designation by the
Secretary of State is an important tool our Government uses to deter
donations or contributions to and economic transactions with terrorist
organizations. There are currently 50 groups listed by the State
Department as designated Foreign Terrorist Organizations.
Which FTO-designated groups would you say are the best resourced
and most proficient at evading American and international financial
regulations? Which use the U.S. financial system the most?
Answer. When it comes to resources, proficiency and exploitation of
the U.S. financial system, as well as the global financial system,
Hezbollah is in a league by themselves. In my view, Hezbollah is not
only the most proficient terrorist organization; they are the most
competent criminal organization in the world. Their global
infrastructure could serve as a model for organized crime. Hezbollah
has an incredible world-wide infrastructure that enables them to
operate criminal enterprises and function as a serious terrorist
threat. Including the Lebanese Canadian Bank case, there are at least
five significant investigations involving Hezbollah operations that
touch on the United States that demonstrate Hezbollah's criminal
organizational skills. In aggregate, their activities represent
hundreds of millions of dollars in criminal activity having a U.S.
nexus.
In today's environment and especially with the sanctions
confronting them, Iran poses a significant challenge for the formal
financial system. Their ability to hide behind shell companies and
opaque beneficial ownership is a hindrance to meaningful sanctions. In
addition, Iran's ability to use foreign banks as correspondent banks
and to strip SWIFT messaging information from transactional records
enables them to circumvent OFAC screening requirements. This is a huge
problem that surfaced with Lloyds Bank a few years ago and currently
with Standard Charter Bank. This is an issue that must be dealt with
forcefully with offending institutions if we intend to have meaningful
sanctions against Iran.
Question 7. All of the witnesses mentioned in their prepared
testimony that the Government needs to interact with the financial
sector to identify terrorist financing.
How should the Government develop more effective case typologies
and feedback mechanisms about how terrorists use financial
institutions? Is this mostly an educational issue where we need to
empower financial institutions in order to monitor transactions for
suspicious or anomalous behavior?
Answer. In my written testimony for the record, I made six
recommendations about improving the possibility and probability of
identifying terrorist financing. Three of those recommendations address
how the Government should develop more effective case typologies and
feedback mechanisms for terrorist financing cases. They are:
``A consistent and comprehensive feedback mechanism from law
enforcement must be developed that demonstrates the importance of BSA
reporting, especially the significance of Suspicious Activity Reports
(SARs). FinCEN's SAR Activity Review is a good mechanism that provides
insightful information. In addition, specific feedback from law
enforcement to financial institutions concerning the value and benefit
of BSA data, including SAR filings, would have a dramatic impact on the
morale of individuals responsible for SAR reporting.
``There must be an assessment by the Government of all SARs related
to or identifiable with terrorism cases. Such a review would identify
specific red flags that could be used as a training mechanism and more
importantly, could be factored into identifying typologies that could
be used for the monitoring/surveillance capabilities of financial
institutions. In addition, a determination could be made as to why the
financial institution filed a SAR. In many instances, the SAR was filed
for violations other than terrorist financing. Understanding what
triggered the SAR filing; in tandem with how the SAR ultimately was
linked to terrorist interests would be insightful.
``In addition to assessing SARs, the Government and industry should
collectively identify and assess as many case studies, of terrorist
financing-related investigations, as can be identified and legally
publicly accessed. The case studies should be compared to determine
what types of commonalities and patterns of activity exist. In
addition, common red flags should be easily discernible. This type of
case study assessment, coupled with the SAR analysis, would provide
more meaningful information to consider in identifying terrorist
financing characteristics, especially in cases involving more nominal
financial flows. This would enable financial institutions to more
effectively use surveillance and monitor techniques to identify
questionable transactional information.''
Financial institutions are required by the BSA to monitor
transactions for and report suspicious activity. Overall, U.S. banks do
a good job of reporting suspicious activity. This process could be
improved through a meaningful feedback mechanism from the Government
where the Government emphasizes the importance of SAR reporting,
coupled with demonstrating ``how'' terrorists used financial
institutions to move, store, and spend money.
In addition, terrorist financing specific training would be
important. This was another of the six recommendations I spoke about in
my written testimony. Terrorist financing is not well understood. As I
stated in my testimony, ``(w)ithout specific training, the ability to
understand and disrupt terrorist financing is more difficult to
achieve.''
Question 8a. The Financial Action Task Force on Money Laundering is
comprised of 36 member countries and territories and two international
organizations and was organized to develop and promote policies to
combat money laundering and terrorist financing. The FATF relies on a
combination of annual self-assessments and periodic mutual evaluations
that are completed by a team of FATF experts to provide information and
to assess the compliance of its members to the FATF guidelines.
What are the areas of greatest need for improvement in the FATF
surveillance process?
Answer. The FATF mutual evaluation process is one of the most
significant accomplishments of the FATF 40 Recommendations regarding
money laundering and terrorist financing as it provides peer and public
pressure to enact and then operationalize AML laws. There are
approximately 170 jurisdictions who have adopted the FATF 40
Recommendations (FATF plus the FATF style regional bodies).
FATF revised the 40 Recommendations and the methodology for
assessment in February 2012. According to FATF, the FATF Standards have
been revised to strengthen global safeguards and further protect the
integrity of the financial system by providing governments with
stronger tools to take action against financial crime. At the same
time, these new standards will address new priority areas such as
corruption and tax crimes.
Ted Greenberg, a former Department of Justice and World Bank
official, is an expert on FATF. He was involved in writing the 40
Recommendations and has participated in the FATF evaluation process.
According to Mr. Greenberg, the current methodology has proven to be
repetitive in its application, not focused on assessment of
effectiveness, and failed to take account of corruption issues in law.
Mr. Greenberg believes the new process should focus on the main
weaknesses in each jurisdiction, why they are/are not effective and
make recommendations to fix the problem areas. He also believes the new
process must focus more on corruption issues and their impact on AML.
Question 8b. How does the United States evaluate the threats to the
global economy arising from money laundering, terrorist financing, and
financing the proliferation of weapons of mass destruction?
Answer. When I was responsible for TFOS at the FBI, I was the FBI's
representative on the Policy Coordinating Committee (PCC) for Terrorist
Financing. All Government agencies with a nexus to money laundering and
terrorist financing participated in that PCC. As an interagency group,
we evaluated the threats from money laundering and terrorist financing.
We collectively identified and prioritized the most significant
threats. The PCC was then chaired by David Aufhauser. During that time
period (2001-2003), Mr. Aufhauser served as General Counsel at the
Treasury Department. As I mentioned in my written testimony, ``Mr.
Aufhauser was a true leader who marshaled the interagency collaborative
initiative. He was an unsung hero and visionary.'' My understanding is
that this interagency working group is now directed by the National
Security Council. The group is no longer referred to as the PCC for
Terrorist Financing. I am not sure what it is currently identified as.
Question 8c. How should we be prioritizing these threats and how
effectively has the FATF process been in addressing these threats?
Answer. In the United States, the threats should continue to be
evaluated and prioritized by the interagency working group. Stopping
the flow of funds to terrorists should be an extremely high interagency
priority. Overall, the FATF evaluation process has been successful.
When FATF first started there was no peer evaluation process of money
laundering laws. In fact, few countries had AML laws. Since then, the
FATF evaluation process has been widely accepted and followed. FATF has
revised the evaluation process, which should result in an improved
process.
Question 9. KPMG, a private consulting firm, released in October
2011 the findings of an anti-money laundering survey of major
international banks. They found that 80% of respondents reported an
increase in costs associated with anti-money laundering that averaged
around 45% since 2007. The major sources of cost increases identified
by the KMPG survey were: (1) Enhanced transaction monitoring, (2)
increased external reporting requirements to internal regulators and
external law enforcement agencies, and (3) increased anti-bribery and
anti-corruption activities.
In your opinion, are there sufficient resources devoted to
countering the financing of terrorism and money laundering?
Alternatively, are the resource costs associated with implementing such
financial regulations too burdensome on either the private or public
sectors?
Answer. Overall, I do not believe sufficient resources are devoted
to countering the financing of terrorism and money laundering, both in
the private and public sectors. In the private sector, AML compliance
is considered a cost center, as opposed to a revenue center. As such,
AML compliance does not receive the support from business entities
within a financial institution that should be given. The HSBC case
illustrates this shortcoming. This problem was magnified during the
financial crisis when banks were reducing staff. Invariably compliance
staffs were cut before business staffs. The battle cry in AML
compliance was ``do more with less''. The only winner under those
circumstances is the money launderer. In the last few years, as the
economy improved, AML compliance resources have improved. However,
until the business entity (revenue center) versus compliance entity
(cost center) mentality is dealt with, AML compliance will not be
adequately resourced. As far as the Government is concerned, these are
lean budget times. Consequently, staffing is impacted. In general,
Government agencies responsible for investigating money laundering and
terrorist financing do not have the necessary staffing. However, the
Government has consistently done outstanding work in addressing the
money laundering and terrorist financing crime problems.
Question 10. There has been growing concern at DHS, particularly
within ICE, about the widespread use of prepaid and stored value cards
as a way of smuggling illicit funds into the country which could fund
terror activity. Some estimates are that $1 billion annually is moved
into the country this way, with most of those funds nearly impossible
to track.
Would you agree that prepaid and stored value cards are a growing
danger to being able to target terrorist financiers? What steps would
you recommend DHS and the Department of the Treasury take to combat
this emerging trend?
Answer. The use of prepaid cards has exploded and continues to gain
popularity at a rapid pace. There are many legitimate and convenient
uses of prepaid cards. However, prepaid cards have been a source of
vulnerability since they came on the market. Law enforcement has
constantly been concerned about criminals and terrorists using prepaid
cards in furtherance of their illicit activities. The problem is not
just a one-way problem. Prepaid cards coming into the country to
support a potential terrorist attack is a direct threat to National
security and should be considered a significant problem. There is also
a serious outbound problem. One area where this is extremely
problematic is with the Mexican drug cartels. Prepaid cards are being
purchased in the United States for shipment to Mexico with drug
proceeds.
The Treasury Department, through FinCEN, established rules
regarding prepaid cards in September 2011, which went into effect in
March 2012. The rules, while helpful, do not solve the problem. What is
needed is legislation making prepaid cards monetary instruments and
subjecting them to BSA reporting requirements. Most notably, prepaid
cards should be subject to reporting requirements when individuals
travel internationally.
The Treasury and Homeland Security Departments should work with the
interagency community, especially the interagency working group for
money laundering and terrorist financing to develop a Government-wide
investigative strategy to deal with the threat posed by prepaid cards
being exploited by terrorists. Likewise, the interagency community
should reach out to the private sector to form strategic partnerships
to address this crime problem.
Question 11a. On June 29, 2012, the Obama administration imposed
sanctions on a pair of informal money-exchange networks--known as
hawalas--in Afghanistan and Pakistan in what officials described as the
first use of the tactic to attack the financial underpinnings of
Taliban militants who rely on the system to fund their insurgency. The
Treasury Department said that the designations were coordinated with
similar measures adopted by the United Nations as part of a broad
effort to slow the flow of cash used by the Taliban to pay salaries and
purchase weapons for attacks in Afghanistan. The United Nations also
added the names of the same two institutions and their principal
backers to a list of groups officially associated with Taliban
militancy, meaning they will be subject to international sanctions as
well.
Considering how widespread their use is, how difficult is it for
U.S. Government to really get a handle on some of the terror financing
and money laundering activities being conducted under the hawala
system?
Answer. The problem of illegal money remitters operating in the
United States is one of the most significant and challenging facing the
U.S. Government. This is one of the biggest challenges facing the
financial services sector. Financial institutions do not know the
number of their customers who use their businesses to conduct illegal
money remittance operations. This is a form of hawala. The interagency
working group dealing with money laundering and terrorist financing
should conduct a targeted and coordinated investigative initiative on
two levels to identify and dismantle illegal money remittance
operations. On an international level, hawalas linked to terrorism
should be identified and targeted. The Government should employee
techniques to identify wire transfers to and from the United States
involving these hawalas, as well as telephone numbers and emails, among
other communication modes linked to the hawalas. From there,
investigation should focus on the identified illegal money remitters in
the United States. Coordinated take-downs of targeted hawalas in the
United States and abroad should take place. This would involve
coordination with our international partners. On a second level, there
should be an initiative to arrest a large number of illegal money
remitters in the United States for operating illegal (unlicensed and
unregistered) money remittance operations. This would generate
considerable media attention to this problem, be impactful and have a
deterrent effect on these types of businesses.
Question 11b. How could the United States be more effective in
targeting the hawala systems being used by drug traffickers to fuel the
Taliban insurgency in Afghanistan and Pakistan?
Answer. DEA has had the lead in the area of drug trafficking in
Afghanistan. DEA should develop investigative strategies with the
Department of Defense, law enforcement, and intelligence agencies.
Those strategies should be fully coordinated. The collective financial
intelligence from the various agencies should provide actionable
intelligence information to prioritize and target hawala dealers who
support the Taliban. The key is coordination, communication, and
cooperation.
Question 11c. Would closer collaboration with the United Nations
help our Government's ability to identify hawala networks engaged in
illegal behavior?
Answer. On a practical operational level, collaboration with the
United Nations would have little impact on U.S. investigative efforts.
On a policy level, especially in considering regulating hawalas,
collaboration with the United Nations and other international bodies
could be extremely beneficial.
Question 12. Mr. Lormel, in your written testimony you mentioned
the Lloyds Bank ``stripping'' case as a prime example of how
correspondent banking was used by Iran as a facilitation tool.
This was a pretty egregious example of Iran using the formal
banking system to skirt international financial system. Do you think
this was a one-off or an instance of a larger problem, particularly
with regard to SWIFT?
Answer. I believe the problem of ``stripping'' is much larger. It
is not a one-off situation. The Lloyds case was investigated jointly by
the District Attorney of New York (DANY) and the Department of Justice.
At the time the case was brought forward, DANY announced it was
investigating nine other banks for similar ``stripping'' activity. On
August 6, 2012, the New York State Department of Financial Services
announced it was investigating Standard Charter Bank for ``stripping''
information related to Iran.
SWIFT is not the problem. The problem is that certain banks have
chosen to do business with Iran. There is tremendous profit for the
banks in dealing with Iran, especially with the strong U.S. sanctions.
However, Iran needs access to U.S. dollars, therefore the banks who are
dealing with Iran must transact in the United States. They must have a
correspondent banking relationship with a U.S. bank to access U.S.
dollars. In the cases of Lloyds and Standard Charter, the banks knew
that if they provided the proper SWIFT messaging data, the identities
of the Iranian banks they were transacting with would have been
disclosed through their correspondent relationship with a U.S. bank.
They knew full well that if that occurred the U.S. bank would have
declined the transaction. The U.S. bank's OFAC monitoring system would
have identified the sanctioned Iranian bank and returned the
transaction. Therefore, Lloyds and Standard Charter ``stripped'' out
any reference or mention of the Iranian bank in the transaction,
circumventing the OFAC monitoring. This gave the appearance to the U.S.
bank that either Lloyds or Standard Charter were the originating bank
in the transaction.
Question 13a. Mr. Lormel, you suggested that providing security
clearances to select personnel in financial institutions in order to
share limited intelligence information that could be scrubbed against
bank monitoring systems to identify transactional information
associated with terrorists.
How would you envision this to work?
Answer. The Government provides security clearances to individuals
working in the defense contracting industry. This enables defense
contractors and consultants to work on classified projects, which is in
the Government's best interest. The same should be true in the
financial services industry. Financial institutions are a repository
for significant financial intelligence information. If the Government
could share selective classified information with a limited number of
vetted and cleared bank officials that information could be run through
transactional information. Hits in the transactional data, that
otherwise would not have been identified, would be reported back to the
agency providing the information. Legal process would have to be put in
place to ensure any information provided back to the Government did not
violate Bank Secrecy Act privacy provisions.
Question 13b. What would you think of sending members of Treasury's
Office of Financial Intelligence, or of the intelligence community, to
certain high-risk financial institutions, in essence detailing them
there for this purpose? Would this not also help with the challenge of
helping the financial sector to identify activity consistent with
typologies of terrorists?
Answer. The idea of detailing members of the Treasury's Office of
Financial Intelligence or from law enforcement is worth consideration.
It would be important to distinguish law enforcement and the
intelligence community in the sense that the CIA should be precluded
from collecting domestic intelligence, especially involving U.S.
persons. The FBI or other law enforcement agencies dealing with
classified intelligence would be the appropriate Government
representatives. However, before considering sending Government
personnel to select high-risk institutions, a number of impediments
would need to be resolved. The General Counsels from the financial
institution and Government agencies would need to assess the legality
and potential liabilities of such a relationship. Two other
considerations would need to be considered. First, by sending personnel
to select financial institutions would the Government be unwittingly
providing that institution with an unfair competitive advantage?
Second, does the Government have the resources to devote to this type
of initiative?
While I ran TFOS at the FBI, we actually had an operation with a
financial services provider, similar to what was suggested in the above
question. We worked through the impediments and formed a public-private
partnership that achieved extremely productive investigative results.
This was a terrific model of how the financial services sector and law
enforcement could form a strategic partnership in furtherance of
National security. Because of the sensitivity of that initiative, I
cannot comment about it any further.
Questions From Chairman Patrick Meehan for Sue E. Eckert
Question 1a. With our military successes against al-Qaeda core
leadership in Afghanistan and Pakistan, there is a growing trend of al-
Qaeda affiliated groups and adherents filling the void and taking the
lead in launching attacks against the homeland.
Given the relatively low amount of money required to plan and
launch a terrorist attack, how realistic is it to expect U.S. and
international counterterrorism entities to identify funds that might be
used to undertake terrorism-related activity?
Answer. Response was not received at the time of publication.
Question 1b. What are some of the persistent challenges in
identifying and investigating an activity suspected of financing
terrorism? What are some of the trends in how terrorist groups
acquiring funds to support their objectives?
Answer. Response was not received at the time of publication.
Question 1c. Is the decision to pursue a terror financing
investigation based on the amount of money suspected of being acquired
for terrorism-related purposes? If so, what is the minimum monetary
amount of terrorism-related funds the U.S. Government assesses as
worthy of investigating?
Answer. Response was not received at the time of publication.
Question 1d. Can you describe the decision-making process and
considerations by which the U.S. intelligence and law enforcement
communities decide whether to stop terrorism-financing related activity
and charge a suspect arrest or choose to allow the activity to continue
in hopes of following the trail of funds to a larger network of support
or to entities that may be planning a terrorist attack?
Answer. Response was not received at the time of publication.
Question 2. President Obama recently signed an Executive Order
allowing the Treasury Department to freeze U.S.-based assets of persons
who the White House has identified as a ``threat to the peace,
security, and stability'' of Yemen.
Do you think this is an effective use of the designation authority?
Especially when a group such as Boko Haram--who have killed thousands
of civilians and are in constant contact with AQIM--remain
undesignated?
Answer. Response was not received at the time of publication.
Question 3a. In 2011, the U.S. Government revealed the findings of
a multi-year law enforcement operation to dismantle a complex,
transnational network involved in money laundering and drug
trafficking. The case involved Hezbollah, Mexican and Colombian drug
trafficking organizations, the Taliban, Lebanon, Colombia, Panama,
several countries in West Africa, U.S. car buyers, a U.S. shipping
company, bulk cash couriers, plans for weapons trafficking deals, and
the Beirut-based Lebanese Canadian Bank (LCB).
Does the fact that groups such as Hezbollah and the Islamic
Revolutionary Guard Corps continue to use criminal ventures create
opportunities for U.S. enforcement mechanisms--such as our robust
counternarcotics tools--to roll up these vast networks?
Answer. Response was not received at the time of publication.
Question 3b. How does counterterrorism fit in this increasingly
interconnected underworld?
Answer. Response was not received at the time of publication.
Question 4a. The U.S. Government's on-going investigation of the
Lebanese Canadian Bank is of particular interest from a money
laundering perspective because it highlights the consequences of poor
compliance with anti-money laundering regulations in the formal
financial system.
Given the Lebanese Canadian Bank case, what more can be done to
protect the formal financial system from exploitation by terrorists?
Answer. Response was not received at the time of publication.
Question 4b. How can the U.S. Government more effectively mitigate
the threats posed by trade-based money laundering and bulk cash
smuggling and other ways outside the formal financial sector?
Answer. Response was not received at the time of publication.
Question 5. There is an increasing concern in the counterterrorism
and intelligence community that terrorist organizations are
increasingly using criminal activities that are outside of the formal
international financial system to raise funds to carry out attacks and
further their goals.
How important are terrorist funds derived from criminal activities
for the operational sustainability of major terrorist groups compared
to other non-criminal sources of funds, including state sponsors and
private-sector donations?
Answer. Response was not received at the time of publication.
Question 6. Foreign Terrorist Organization designation by the
Secretary of State is an important tool our Government uses to deter
donations or contributions to and economic transactions with terrorist
organizations. There are currently 50 groups listed by the State
Department as designated Foreign Terrorist Organizations.
Which FTO-designated groups would you say are the best resourced
and most proficient at evading American and international financial
regulations? Which use the U.S. financial system the most?
Answer. Response was not received at the time of publication.
Question 7. All of the witnesses mentioned in their prepared
testimony that the Government needs to interact with the financial
sector to identify terrorist financing.
How should the Government develop more effective case typologies
and feedback mechanisms about how terrorists use financial
institutions? Is this mostly an educational issue where we need to
empower financial institutions in order to monitor transactions for
suspicious or anomalous behavior?
Answer. Response was not received at the time of publication.
Question 8a. The Financial Action Task Force on Money Laundering is
comprised of 36 member countries and territories and two international
organizations and was organized to develop and promote policies to
combat money laundering and terrorist financing. The FATF relies on a
combination of annual self-assessments and periodic mutual evaluations
that are completed by a team of FATF experts to provide information and
to assess the compliance of its members to the FATF guidelines.
What are the areas of greatest need for improvement in the FATF
surveillance process?
Answer. Response was not received at the time of publication.
Question 8b. How does the United States evaluate the threats to the
global economy arising from money laundering, terrorist financing, and
financing the proliferation of weapons of mass destruction?
Answer. Response was not received at the time of publication.
Question 8c. How should we be prioritizing these threats and how
effectively has the FATF process been in addressing these threats?
Answer. Response was not received at the time of publication.
Question 9. KPMG, a private consulting firm, released in October
2011 the findings of an anti-money laundering survey of major
international banks. They found that 80% of respondents reported an
increase in costs associated with anti-money laundering that averaged
around 45% since 2007. The major sources of cost increases identified
by the KMPG survey were: (1) Enhanced transaction monitoring, (2)
increased external reporting requirements to internal regulators and
external law enforcement agencies, and (3) increased anti-bribery and
anti-corruption activities.
In your opinion, are there sufficient resources devoted to
countering the financing of terrorism and money laundering?
Alternatively, are the resource costs associated with implementing such
financial regulations too burdensome on either the private or public
sectors?
Answer. Response was not received at the time of publication.
Question 10. There has been growing concern at DHS, particularly
within ICE, about the widespread use of prepaid and stored value cards
as a way of smuggling illicit funds into the country which could fund
terror activity. Some estimates are that $1 billion annually is moved
into the country this way, with most of those funds nearly impossible
to track.
Would you agree that prepaid and stored value cards are a growing
danger to being able to target terrorist financiers? What steps would
you recommend DHS and the Department of the Treasury take to combat
this emerging trend?
Answer. Response was not received at the time of publication.
Question 11a. On June 29, 2012, the Obama administration imposed
sanctions on a pair of informal money-exchange networks--known as
hawalas--in Afghanistan and Pakistan in what officials described as the
first use of the tactic to attack the financial underpinnings of
Taliban militants who rely on the system to fund their insurgency. The
Treasury Department said that the designations were coordinated with
similar measures adopted by the United Nations as part of a broad
effort to slow the flow of cash used by the Taliban to pay salaries and
purchase weapons for attacks in Afghanistan. The United Nations also
added the names of the same two institutions and their principal
backers to a list of groups officially associated with Taliban
militancy, meaning they will be subject to international sanctions as
well.
Considering how widespread their use is, how difficult is it for
U.S. Government to really get a handle on some of the terror financing
and money-laundering activities being conducted under the hawala
system?
Answer. Response was not received at the time of publication.
Question 11b. How could the United States be more effective in
targeting the hawala systems being used by drug traffickers to fuel the
Taliban insurgency in Afghanistan and Pakistan?
Answer. Response was not received at the time of publication.
Question 11c. Would closer collaboration with the United Nations
help our Government's ability to identify hawala networks engaged in
illegal behavior?
Answer. Response was not received at the time of publication.
Questions From Ranking Member Brian Higgins for Sue E. Eckert
Question 1. Ms. Eckert, have Government officials identified any
specific indicators of terrorist financing? What are the triggers that
actually ``tip'' law enforcement into knowing that a specific group is
engaging in illegal financial schemes that are actually funding
terrorism? Would there be an exhaustive list given our diverse threat?
Answer. Response was not received at the time of publication.
Question 2. Ms. Eckert, what metrics are in place to actually
measure the success of the targeted sanctions and statutes put in place
to prevent terrorism funding since 9/11? What do we use to measure? We
cannot count the amount of lives saved, but we can assess dollar
figures and convictions, but these may also be misleading? What do you
suggest?
Answer. Response was not received at the time of publication.
Question 3. Ms. Eckert, earlier this year, the American Bar
Association had a panel discussing the disparate impact of terrorist
finance enforcement on charities and non-profits. Explain how this
enforcement has a disparate impact and what if anything that you know
that the Treasury and Department of Justice are doing to make sure that
their terrorist financing enforcement is fair?
Answer. Response was not received at the time of publication.
Question 4. The threat to the United States has diversified greatly
since 9/11. How have our terrorist financing enforcement mechanisms
adequately kept up with the diverse threat?
Answer. Response was not received at the time of publication.
NEWSLETTER
|
Join the GlobalSecurity.org mailing list
|
|