SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Politics : Politics for Pros- moderated -- Ignore unavailable to you. Want to Upgrade?


To: SirWalterRalegh who wrote (171954)7/1/2006 6:11:59 PM
From: Lane3  Respond to of 793838
 
People really cannot take the truth.

It's a good point, but you could make it about most anything, say global warming. It may explain how people could ignore the risk from the jihadis, but it doesn't provide evidence or argument for increasing anyone's perception of the risk from the jihadis.



To: SirWalterRalegh who wrote (171954)7/1/2006 7:35:07 PM
From: Ilaine  Read Replies (1) | Respond to of 793838
 
>>Copyright 2001 The New York Times Company
The New York Times

October 20, 2001 Saturday
Late Edition - Final

SECTION: Section B; Column 1; National Desk; Pg. 1

LENGTH: 967 words

HEADLINE: A NATION CHALLENGED: THE MONEY;
U.S. Seeking a Stronger Role For Banks on Terrorists' Cash

BYLINE: By KURT EICHENWALD and JOSEPH KAHN

DATELINE: WASHINGTON, Oct. 19

BODY:

Government and banking industry officials are working on a plan to allow banks to serve as a front line for law enforcement in detecting financial transactions by terrorist groups, people involved in the effort have said.

While the talks are at a preliminary stage, the two sides met last week in Midtown Manhattan to discuss ways to have the banking industry take part in detecting and stopping the transactions. If successful, the effort would represent a fundamental shift in the relationship between law enforcement and the banking industry, which until now has been responsible for submitting data to the government that is mostly used for investigations after a crime has occurred.

Most of the 20 chief executives who participated in the session, including those from banks like Citigroup and Bank of America, said that blocking terrorist financing before an attack would require them to overhaul their efforts to battle money laundering, a participant in the meeting said.

Terrorists tend to use the banking system to distribute relatively small amounts of money from large deposits overseas. Banks are geared to monitor accounts for the opposite type of activity, as when drug cartels collect relatively small proceeds from drug sales, disguise the origin of the money and move it into large accounts offshore.

Being on guard for terrorist activity will require new computer programs, new personnel and much more coordination with law enforcement, participants said.

"It will require significant investment," said a federal official who attended the meeting, "but everyone in that room agreed that it just had to be done."

Until now, the primary mechanism for dealing with financial transactions of terrorists and criminals has been reports filed by financial institutions on suspicious activities. The system generates hundreds of thousands of suspicious-activity reports each year, as well as 12 million currency-transaction reports for any transfer of more than $10,000.

The volume is so large, a senior government official said, that law enforcement officials mostly use the accumulated paperwork for retrospective investigations, not for blocking accounts or tracking suspects while terrorists are planning an attack.

The discussions between the government and the banking industry are intended to devise new red flags that can move through the system more quickly, as well as to allow banks to cooperate more fully to detect patterns of illicit activity, officials involved in the discussions said.

Already, the Treasury Department has set up a toll-free phone number so banks can report concerns more quickly. Some 15 to 20 banks are calling each day, government officials said.

"They are giving us much better information than we get" from the standard suspicious activity report, one official said. "We want all the red flags they see."

Financial institutions have been a major source of information in the investigation of the terrorist attacks on Sept. 11. Industry officials said the banks had been receiving an array of subpoenas from federal prosecutors investigating the case in different jurisdictions, including New York and New Jersey. In some cases, they have received subpoenas requesting the same information about the same individual from different federal prosecutors. Those subpoenas are seeking financial information about people who investigators believe have some connection to the hijackings.

Other government agencies have sent to banks lists of individuals and organizations with financial ties to Al Qaeda, the terrorist organization of Osama bin Laden. The government has demanded that the financial institutions freeze the accounts of any name on those lists.

The assorted demands from so many different government agencies has led to some confusion in the industry, officials said.

"There was a sense that we should do this in a more organized way," said Alan Sorcher, associate general counsel of the Securities Industry Association, a trade group. "There was some confusion on our part as to what they wanted."

To help overcome those difficulties, industry officials said, the Federal Bureau of Investigation has stationed agents in the offices of banks and securities firms. There, they work with the institution's compliance and legal departments to obtain relevant data quickly.

"It just helps in the coordination and allows us to get things done much more quickly," an industry official said.

People who have reviewed the collected information said that many of the names on government subpoenas have been matched with bank and credit card accounts, and investigators have obtained reams of related data. The banks have also found accounts linked to names on lists of individuals and organizations that the government says have financial ties to the terrorists.

But, in fact, people who apparently have no connection to Al Qaeda or the hijackings have found their accounts caught up in the financial dragnet. So far, officials said, at least two banks have frozen accounts of people with names that are similar to those on the government lists, but who apparently have no other connection to the case.

For example, Mohammad Ahmad, a Maryland employee of Lockheed Martin, had his account at Citibank blocked for several days after the first list of names of people with suspected financial ties to Al Qaeda came out on Sept. 24. One person on that list, a suspected financial agent of Mr. bin Laden, is Shaykh Sai-id. The Treasury Department said the person was also known as Mustafa Muhammad Ahmad.

Mr. Ahmad said he had to appeal to Citibank for several days before he was told why his account was frozen. Then, he said, he was required to prove that he was not on the government's asset-freeze list by submitting documentation to show that his name was different.



To: SirWalterRalegh who wrote (171954)7/1/2006 7:36:54 PM
From: Ilaine  Respond to of 793838
 
>>Copyright 2003 The New York Times Company
The New York Times

November 12, 2003 Wednesday
Late Edition - Final

SECTION: Section A; Column 6; National Desk; Pg. 12

LENGTH: 608 words

HEADLINE: F.B.I.'s Reach Into Records Is Set to Grow

BYLINE: By ERIC LICHTBLAU

DATELINE: WASHINGTON, Nov. 11

BODY:

A little-noticed measure approved by both the House and Senate would significantly expand the F.B.I.'s power to demand financial records, without a judge's approval, from car dealers, travel agents, pawnbrokers and many other businesses, officials said on Tuesday.

Traditional financial institutions like banks and credit unions are frequently subject to administrative subpoenas from the Federal Bureau of Investigation to produce financial records in terrorism and espionage investigations. Such subpoenas, which are known as national security letters, do not require the bureau to seek a judge's approval before issuing them.

The measure now awaiting final approval in Congress would significantly broaden the law to include securities dealers, currency exchanges, car dealers, travel agencies, post offices, casinos, pawnbrokers and any other institution doing cash transactions with "a high degree of usefulness in criminal, tax or regulatory matters."

Officials said the measure, which is tucked away in the intelligence community's authorization bill for 2004, gives agents greater flexibility and speed in seeking to trace the financial assets of people suspected of terrorism and espionage. It mirrors a proposal that President Bush outlined in a speech two months ago to expand the use of administrative subpoenas in terrorism cases.

Critics said the measure would give the federal government greater power to pry into people's private lives.

"This dramatically expands the government's authority to get private business records," said Timothy H. Edgar, legislative counsel for the American Civil Liberties Union. "You buy a ring for your grandmother from a pawnbroker, and the record on that will now be considered a financial record that the government can get."

The provision is in the authorization bills passed by both houses of Congress. Some Democrats have begun to question whether the measure goes too far and have hinted that they may try to have it pulled when the bill comes before a House-Senate conference committee. Other officials predicted that the measure would probably survive any challenges in conference and be signed into law by President Bush, in part because the provisions already approved in the House and the Senate are identical.

The intelligence committees considered the proposal at the request of George J. Tenet, the director of central intelligence, officials said. Officials at the C.I.A. and the Justice Department declined to comment on Tuesday about the measure.

A senior Congressional official who supports the provision said that "this is meant to provide agents with the same amount of flexibility in terrorism investigations that they have in other types of investigations."

"This was really just a technical change to reflect the new breed of financial institutions," the official added.

Asked what had prompted the measure, the official said: "This is coming from 3,000 dead people. There's an ever-expanding universe of places where terrorists can hide financial transactions, and it's only prudent and wise to anticipate where they might be and to give law enforcement the tools that they need to find them."

Christopher Wray, the Justice Department's assistant attorney general in charge of the criminal division, also addressed the issue last month at a Senate hearing.

Mr. Wray said that compared with the antiterrorism law that allowed agents to demand business records with court approval, the F.B.I.'s administrative subpoenas were more limited. The administrative subpoenas "do provide for production of some records," he said, but "they don't cover as many types of business records."

URL: nytimes.com

LOAD-DATE: November 12, 2003



To: SirWalterRalegh who wrote (171954)7/1/2006 7:38:03 PM
From: Ilaine  Respond to of 793838
 
>>Copyright 2004 The New York Times Company
The New York Times

May 27, 2004 Thursday
Late Edition - Final

SECTION: Section A; Column 1; National Desk; Pg. 24

LENGTH: 698 words

HEADLINE: Survey Finds U.S. Agencies Engaged in 'Data Mining'

BYLINE: By ROBERT PEAR

DATELINE: WASHINGTON, May 26

BODY:

A survey of federal agencies has found more than 120 programs that collect and analyze large amounts of personal data on individuals to predict their behavior.

The survey, to be issued Thursday by the General Accounting Office, an investigative arm of Congress, found that the practice, known as data mining, was ubiquitous.

In canvassing federal agencies, the accounting office found that 52 were systematically sifting through computer databases. These agencies reported 199 data mining projects, of which 68 were planned and 131 were in operation. At least 122 of the 199 projects used identifying information like names, e-mail addresses, Social Security numbers and driver's license numbers.

The survey provides the first authoritative estimate of the extent of data mining by the government. It excludes most classified projects, so the actual numbers are likely to be much higher.

The Defense Department made greatest use of the technique, with 47 data mining projects to track everything from the academic performance of Navy midshipmen to the whereabouts of ship parts and suspected terrorists.

Senator Daniel K. Akaka, Democrat of Hawaii, who requested the report by the accounting office, said: 'I am disturbed by the high number of data mining activities in the federal government involving personal information. The government collects and uses Americans' personal information and shares it with other agencies to an astonishing degree, raising serious privacy concerns.'

A federal advisory committee appointed by Defense Secretary Donald H. Rumsfeld said last week that Congress should pass laws to protect the civil liberties of Americans when the government scans computer records and data files for information about terrorists.

Newton N. Minow, chairman of the committee, said he and other panel members would formally present their report to Mr. Rumsfeld on Thursday.

The panel said federal agencies should generally be required to obtain court approval 'before engaging in data mining with personally identifiable information' on United States citizens. It also said that federal investigators should, if possible, work with anonymous data, stripped of personal identifiers, and use the minimum amount of data needed to achieve their purpose.

The panel was created to quell a political uproar over a Pentagon plan to hunt terrorists by monitoring e-mail messages and fishing through huge databases of financial, medical and travel information.

The accounting office defined data mining as the use of sophisticated technology, statistical analysis and modeling to uncover hidden patterns and subtle relationships in data, and to infer rules that allow for the prediction of future activity.

Of the 199 data mining projects, 54 use information from the private sector, like credit reports and records of credit card transactions. Seventy-seven projects use data obtained from other federal agencies, like student loan records, bank account numbers and taxpayer identification numbers.

In its catalog of data mining, the accounting office listed these projects:

$(6$)The Internal Revenue Service mines financial data to predict which individual tax returns have the greatest potential for fraud and which corporations are most likely to make improper use of tax shelters.

$(6$)The Defense Intelligence Agency mines data from the intelligence community and searches the Internet to identify people, including United States citizens, who are most likely to have connections to foreign terrorist activities.

$(6$)The Department of Homeland Security seeks clues to possible terrorist activity by looking for patterns in myriad records of crimes, arrests and unusual behavior, traffic tickets and incidents involving the possession of firearms.

James X. Dempsey, executive director of the Center for Democracy and Technology, a civil liberties group, said: 'In many cases, the private sector is subject to stricter standards than the government. The Fair Credit Reporting Act, for example, imposes limits on commercial uses of personal financial and other data, but there are virtually no limits on government uses.'

URL: nytimes.com

LOAD-DATE: May 27, 2004



To: SirWalterRalegh who wrote (171954)7/1/2006 7:41:35 PM
From: Ilaine  Read Replies (1) | Respond to of 793838
 
>>Copyright 2006 The New York Times Company
The New York Times

June 30, 2006 Friday
Late Edition - Final

SECTION: Section A; Column 2; Editorial Desk; Pg. 23

LENGTH: 858 words

HEADLINE: A Secret the Terrorists Already Knew

BYLINE: By Richard A. Clarke and Roger W. Cressey.

Richard A. Clarke and Roger W. Cressey, counterterrorism officials on the National Security Council under Presidents Bill Clinton and George W. Bush, are security consultants.

BODY:

COUNTERTERRORISM has become a source of continuing domestic and international political controversy. Much of it, like the role of the Iraq war in inspiring new terrorists, deserves analysis and debate. Increasingly, however, many of the political issues surrounding counterterrorism are formulaic, knee-jerk, disingenuous and purely partisan. The current debate about United States monitoring of transfers over the Swift international financial system strikes us as a case of over-reaction by both the Bush administration and its critics.

Going after terrorists' money is a necessary element of any counterterrorism program, as President Bill Clinton pointed out in presidential directives in 1995 and 1998. Individual terrorist attacks do not typically cost very much, but running terrorist cells, networks and organizations can be extremely expensive.

Al Qaeda, Hamas, Hezbollah and other terrorist groups have had significant fund-raising operations involving solicitation of wealthy Muslims, distribution of narcotics and even sales of black market cigarettes in New York. As part of a 'follow the money' strategy, monitoring international bank transfers is worthwhile (even if, given the immense number of transactions and the relatively few made by terrorists, it is not highly productive) because it makes operations more difficult for our enemies. It forces them to use more cumbersome means of moving money.

Privacy rights advocates, with whom we generally agree, have lumped this bank-monitoring program with the alleged National Security Agency wiretapping of calls in which at least one party is within the United States as examples of our government violating civil liberties in the name of counterterrorism. The two programs are actually very different.

Any domestic electronic surveillance without a court order, no matter how useful, is clearly illegal. Monitoring international bank transfers, especially with the knowledge of the bank consortium that owns the network, is legal and unobjectionable.

The International Economic Emergency Powers Act, passed in 1977, provides the president with enormous authority over financial transactions by America's enemies. International initiatives against money laundering have been under way for a decade, and have been aimed not only at terrorists but also at drug cartels, corrupt foreign officials and a host of criminal organizations.

These initiatives, combined with treaties and international agreements, should leave no one with any presumption of privacy when moving money electronically between countries. Indeed, since 2001, banks have been obliged to report even transactions entirely within the United States if there is reason to believe illegal activity is involved. Thus we find the privacy and illegality arguments wildly overblown.

So, too, however, are the Bush administration's protests that the press revelations about the financial monitoring program may tip off the terrorists. Administration officials made the same kinds of complaints about news media accounts of electronic surveillance. They want the public to believe that it had not already occurred to every terrorist on the planet that his telephone was probably monitored and his international bank transfers subject to scrutiny. How gullible does the administration take the American citizenry to be?

Terrorists have for many years employed nontraditional communications and money transfers -- including the ancient Middle Eastern hawala system, involving couriers and a loosely linked network of money brokers -- precisely because they assume that international calls, e-mail and banking are monitored not only by the United States but by Britain, France, Israel, Russia and even many third-world countries.

While this was not news to terrorists, it may, it appears, have been news to some Americans, including some in Congress. But should the press really be called unpatriotic by the administration, and even threatened with prosecution by politicians, for disclosing things the terrorists already assumed?

In the end, all the administration denunciations do is give the press accounts an even higher profile. If administration officials were truly concerned that terrorists might learn something from these reports, they would be wise not to give them further attention by repeatedly fulminating about them.

There is, of course, another possible explanation for all the outraged bloviating. It is an election year. Karl Rove has already said that if it were up to the Democrats, Abu Musab al-Zarqawi would still be alive. The attacks on the press are part of a political effort by administration officials to use terrorism to divide America, and to scare their supporters to the polls again this year.

The administration and its Congressional backers want to give the impression that they are fighting a courageous battle against those who would wittingly or unknowingly help the terrorists. And with four months left before Election Day, we can expect to hear many more outrageous claims about terrorism -- from partisans on both sides. By now, sadly, Americans have come to expect it.

URL: nytimes.com

LOAD-DATE: June 30, 2006



To: SirWalterRalegh who wrote (171954)7/2/2006 4:27:47 AM
From: KLP  Respond to of 793838
 
Who would believe that someone could cut the head off an alive innocent human being while screaming "god is great".

Not many people in the media, written and newspapers, mags, etc. have made much of a story about this. The question why not?