[House Hearing, 112 Congress]
[From the U.S. Government Publishing Office]



 
  TERRORIST FINANCING SINCE 9/11: ASSESSING AN EVOLVING AL-QAEDA AND 
                      STATE SPONSORS OF TERRORISM

=======================================================================

                                HEARING

                               before the

                    SUBCOMMITTEE ON COUNTERTERRORISM
                            AND INTELLIGENCE

                                 of the

                     COMMITTEE ON HOMELAND SECURITY
                        HOUSE OF REPRESENTATIVES

                      ONE HUNDRED TWELFTH CONGRESS

                             SECOND SESSION

                               __________

                              MAY 18, 2012

                               __________

                           Serial No. 112-93

                               __________

       Printed for the use of the Committee on Homeland Security
                                     

[GRAPHIC] [TIFF OMITTED]


                                     

      Available via the World Wide Web: http://www.gpo.gov/fdsys/

                               __________



                  U.S. GOVERNMENT PRINTING OFFICE
78-153                    WASHINGTON : 2013
-----------------------------------------------------------------------
For sale by the Superintendent of Documents, U.S. Government Printing 
Office Internet: bookstore.gpo.gov Phone: toll free (866) 512-1800; DC 
area (202) 512-1800 Fax: (202) 512-2104  Mail: Stop IDCC, Washington, DC 
20402-0001



                     COMMITTEE ON HOMELAND SECURITY

                   Peter T. King, New York, Chairman
Lamar Smith, Texas                   Bennie G. Thompson, Mississippi
Daniel E. Lungren, California        Loretta Sanchez, California
Mike Rogers, Alabama                 Sheila Jackson Lee, Texas
Michael T. McCaul, Texas             Henry Cuellar, Texas
Gus M. Bilirakis, Florida            Yvette D. Clarke, New York
Paul C. Broun, Georgia               Laura Richardson, California
Candice S. Miller, Michigan          Danny K. Davis, Illinois
Tim Walberg, Michigan                Brian Higgins, New York
Chip Cravaack, Minnesota             Cedric L. Richmond, Louisiana
Joe Walsh, Illinois                  Hansen Clarke, Michigan
Patrick Meehan, Pennsylvania         William R. Keating, Massachusetts
Ben Quayle, Arizona                  Kathleen C. Hochul, New York
Scott Rigell, Virginia               Janice Hahn, California
Billy Long, Missouri                 Vacancy
Jeff Duncan, South Carolina
Tom Marino, Pennsylvania
Blake Farenthold, Texas
Robert L. Turner, New York
            Michael J. Russell, Staff Director/Chief Counsel
               Kerry Ann Watkins, Senior Policy Director
                    Michael S. Twinchek, Chief Clerk
                I. Lanier Avant, Minority Staff Director

                                 ------                                

           SUBCOMMITTEE ON COUNTERTERRORISM AND INTELLIGENCE

                 Patrick Meehan, Pennsylvania, Chairman
Paul C. Broun, Georgia, Vice Chair   Brian Higgins, New York
Chip Cravaack, Minnesota             Loretta Sanchez, California
Joe Walsh, Illinois                  Kathleen C. Hochul, New York
Ben Quayle, Arizona                  Janice Hahn, California
Scott Rigell, Virginia               Vacancy
Billy Long, Missouri                 Bennie G. Thompson, Mississippi 
Peter T. King, New York (Ex              (Ex Officio)
    Officio)
                    Kevin Gundersen, Staff Director
                   Zachary Harris, Subcommittee Clerk
               Hope Goins, Minority Subcommittee Director


                            C O N T E N T S

                              ----------                              
                                                                   Page

                               Statements

The Honorable Patrick Meehan, a Representative in Congress From 
  the State of Pennsylvania, and Chairman, Subcommittee on 
  Counterterrorism and Intelligence:
  Oral Statement.................................................     1
  Prepared Statement.............................................     3
The Honorable Brian Higgins, a Representative in Congress From 
  the State of New York, and Ranking Member, Subcommittee on 
  Counterterrorism and Intelligence..............................     4

                               Witnesses

Mr. Jonathan Schanzer, Vice President of Research, Foundation for 
  Defense of Democracies:
  Oral Statement.................................................     6
  Prepared Statement.............................................     8
Mr. John A. Cassara, Private Citizen:
  Oral Statement.................................................     9
  Prepared Statement.............................................    11
Mr. Dennis M. Lormel, President and CEO, DML Associates, LLC:
  Oral Statement.................................................    16
  Prepared Statement.............................................    17
Ms. Sue E. Eckert, Senior Fellow, Watson Institute for 
  International Studies, Brown University:
  Oral Statement.................................................    22
  Prepared Statement.............................................    23

                                Appendix

Questions From Chairman Patrick Meehan for Jonathan Schanzer.....    31
Questions From Chairman Patrick Meehan for John A. Cassara.......    35
Questions From Chairman Patrick Meehan for Dennis M. Lormel......    42
Questions From Chairman Patrick Meehan for Sue E. Eckert.........    50
Questions From Ranking Member Brian Higgins for Sue E. Eckert....    53


  TERRORIST FINANCING SINCE 9/11: ASSESSING AN EVOLVING AL-QAEDA AND 
                      STATE SPONSORS OF TERRORISM

                              ----------                              


                          Friday, May 18, 2012

             U.S. House of Representatives,
                    Committee on Homeland Security,
         Subcommittee on Counterterrorism and Intelligence,
                                                    Washington, DC.
    The subcommittee met, pursuant to call, at 11:17 a.m., in 
Room 311, Cannon House Office Building, Hon. Patrick Meehan 
[Chairman of the subcommittee] presiding.
    Present: Representatives Meehan, Long, and Higgins.
    Mr. Meehan. The Committee on Homeland Security Subcommittee 
on Counterterrorism and Intelligence will come to order.
    The subcommittee is meeting today to hear testimony 
regarding the evolution of al-Qaeda and state sponsors of 
terrorism in regards to terrorism financing since September 11. 
I now recognize myself for an opening statement.
    I would like to welcome everyone to today's hearing of the 
Subcommittee on Counterterrorism and Intelligence examining the 
United States Government's approach to combating terrorist 
financing more than a decade after the September 11 attacks. I 
look forward to hearing from today's expert witnesses--and I 
mean expert--on the unique role of terrorist financing and what 
it plays in the war on terrorism and on the evolving trends in 
this field.
    The September 11 hijackers used United States and foreign 
financial institutions to hold, move, and retrieve their money. 
They deposited money into United States accounts via wire 
transfer and deposits of travellers checks and cash that was 
brought from overseas. They kept funds in foreign accounts, 
which they accessed through ATMs and credit card transactions 
here in the homeland. According to the September 11 Commission, 
the plot cost al-Qaeda somewhere in the rage of $400,000 to 
$500,000, of which approximately $300,000 passed through the 
hijacker's bank accounts here in the United States.
    After the attacks, the United States publicly declared that 
the fight against al-Qaeda financing was as critical as the 
fight against al-Qaeda itself. The charge of the United States 
intelligence and law enforcement communities was clear: If we 
choke off the terrorists' money, we limit their ability to 
conduct mass casualty attacks.
    Within months of the attacks, the Department of Defense, 
the FBI, the CIA, and, perhaps most importantly, the Department 
of Treasury launched a swift and unprecedented crackdown on 
domestic and international terrorist financing. I am very 
pleased, in fact, some of the very people who are responsible 
for that are sitting on our expert panel today.
    Since then, the Treasury's Office of Terrorism and 
Financial Intelligence has played a critical intelligence and 
enforcement role against terrorist financing through its dual 
aims of safeguarding the United States financial system against 
illicit use and combating rogue nation's terrorist 
facilitators, money launderers, drug kingpins, and other 
National security threats.
    The Department of Treasury and the intelligence community's 
successes against al-Qaeda financing and fundraising is without 
question. In 2005, the 9/11 Commission issued a report card 
that evaluated progress the Government had made in implementing 
that group's recommendations. It gave the Government an A-. Not 
too many A-'s at this day or any day in Government, but it gave 
it an A- in combating terrorist financing, the best mark on the 
scorecard.
    But despite our successes, and this is important, we can't 
become complacent. Because al-Qaeda and its affiliates continue 
to expand their geographic reach worldwide. State sponsors of 
terrorism like Iran and Syria are highly sophisticated, and 
they continue to take advantage of the United States and 
international financial systems in order to skirt international 
sanctions.
    The United States military and counterterrorism efforts 
have largely decimated core al-Qaeda leadership in Afghanistan 
and Pakistan, and the group is under significant financial 
strain and is struggling to secure steady financing to plan and 
execute attacks against the United States homeland and Western 
interests.
    The terrorist enemies we now face are more diverse, 
diffuse, and decentralized than ever. Al-Qaeda and their 
affiliates have concluded that, to bring America down, they 
will attack with, ``smaller but more frequent operations,'' 
what some may refer to as the strategy of a thousand cuts. The 
aim is to bleed the enemy, meaning us, to death.
    In June 2011, the Obama administration released a National 
Strategy for Counterterrorism, where the evolution of terrorist 
financing was documented: AQAP receiving charitable donations 
in Yemen, FARC, and the Taliban drug trafficking, Hezbollah's 
drug and criminal activities, AQAM's link to drug trafficking 
an kidnapping, and the role of Boko Haram and al-Shabaab in 
kidnapping for ransom and extortion.
    Hezbollah facilitators were particularly savvy in skirting 
U.S. restrictions on terrorist financing and have been charged 
in a number of high-profile criminal schemes. As a former 
United States Attorney in Philadelphia, I initiated 
investigations into Hezbollah's fund-raising activities that 
included attempts to transport stolen laptop computers, 
passports, and Sony PlayStation systems. A separate intricate 
Hezbollah scheme illustrates the interconnectedness of these 
networks where a Lebanese bank laundered money from Colombian 
drug cartels and mixed it with proceeds from used car sales 
that were bought in the United States and then sold in Africa. 
The cash was then moved back into Lebanon and poured into 
Hezbollah's coffers. Clearly, these groups are highly 
innovative and motivated, and we must be up to the challenge.
    Terrorist groups and state sponsors of terrorism turning to 
criminal activities to set up additional networks to acquire 
logistical support and to raise financial resources is another 
evolving trend which could point to future activities of 
terrorist financing.
    Given this shifting trend and the relatively low amounts of 
money required to undertake an attack, the United States 
Government may need to recalibrate some of its tactics and 
examine how the intelligence and law enforcement communities 
and I believe also the financial entities--the private 
financial entities will adapt their strategies in order to 
address remaining vulnerabilities in combating terrorist 
financing.
    I thank the witnesses for the time to be with us today, and 
I look forward to hearing from this distinguished panel.
    [The statement of Mr. Meehan follows:]
                  Statement of Chairman Patrick Meehan
                              May 18, 2012
                                welcome
    I'd like to welcome everyone to today's hearing of the Subcommittee 
on Counterterrorism and Intelligence examining the U.S. Government's 
approach to combating terrorist financing more than a decade after the 
9/11 attacks.
    I look forward to hearing from today's expert witnesses on the 
unique role terrorist financing plays in the war on terrorism and on 
the evolving trends in this field.
                       post-september 11 actions
    The September 11 hijackers used U.S. and foreign financial 
institutions to hold, move, and retrieve their money. They deposited 
money into U.S. accounts via wire transfers and deposits of cash or 
travelers checks brought from overseas. They kept funds in foreign 
accounts, which they accessed through ATMs and credit card transactions 
here in the homeland. According to the 9/11 Commission, the plot cost 
al-Qaeda somewhere in the range of $400,000-$500,000, of which 
approximately $300,000 passed through the hijackers' bank accounts in 
the United States.
    After the attacks, the United States publicly declared that the 
fight against al-Qaeda financing was as critical as the fight against 
al-Qaeda itself. The charge of the U.S. intelligence and law 
enforcement communities was clear: If we choke off the terrorists' 
money, we limit their ability to conduct mass casualty attacks.
    Within months of the attacks, the Department of Defense, the FBI, 
the CIA, and perhaps most importantly the Department of the Treasury, 
launched a swift and unprecedented crackdown on domestic and 
international terrorist financing.
    Since then, Treasury's Office of Terrorism and Financial 
Intelligence has played a critical intelligence and enforcement role 
against terrorist financing through its dual aims of safeguarding the 
U.S. financial system against illicit use and combating rogue nations, 
terrorist facilitators, money launderers, drug kingpins, and other 
National security threats.
                            today's hearing
    The Department of the Treasury and the intelligence community's 
successes against al-Qaeda financing and fundraising is without 
question. In 2005, the 9/11 Commission issued a ``report card'' that 
evaluated progress the Government had made in implementing the group's 
recommendations. It gave the Government an ``A-'' in combating 
terrorist financing--the best mark on the report card.
    Despite our successes, we must not become complacent. Al-Qaeda and 
its affiliates continue to expand their geographic reach worldwide. 
State sponsors of terrorism like Iran and Syria are highly 
sophisticated and continue to take advantage of the U.S. and 
international financial systems in order to skirt international 
sanctions.
                 new terrorist tools used in the fight
    Since U.S. military and counterterrorism efforts have largely 
decimated core al-Qaeda leadership in Afghanistan and Pakistan, the 
group is under significant financial strain and is struggling to secure 
steady financing to plan and execute attacks against the U.S. homeland 
and Western interests.
    The terrorist enemies we now face are more diverse, diffuse, and 
decentralized than ever. Al-Qaeda and their affiliates have concluded 
that to bring America down they will attack us with ``smaller, but more 
frequent operations in what some may refer to as the strategy of a 
thousand cuts. The aim is to bleed the enemy to death.''
    This was the aim with the AQAP cargo bomb plot of October 2010, 
where the group boasted that the overhead cost for the attack was only 
$4,200 and would provoke the U.S. and Western countries to respond with 
``billions of dollars in new security measures.''
    In June 2011, the Obama administration released a National Strategy 
for Counterterrorism, where the evolution of terrorist financing were 
document: AQAP receiving charitable donations in Yemen; FARC and 
Taliban drug trafficking, Hezbollah's drug and criminal activities, 
AQIM's links to drug trafficking and kidnapping, and the role of Boko 
Haram and al-Shabaab in kidnapping for ransom and extortion.
    Hezbollah facilitators are particularly savvy in skirting U.S. 
restrictions on terrorist financing and have been charged in a number 
of high-profile criminal schemes. As a former U.S. Attorney in 
Philadelphia, I initiated investigations into Hezbollah's fundraising 
activities that included attempts to transport stolen laptop computers, 
passports, and Sony PlayStation systems. A separate intricate Hezbollah 
scheme illustrates the interconnectedness of these networks, where a 
Lebanese bank laundered money from Colombian drug cartels and mixed it 
with proceeds from used cars bought in the United States and then sold 
in Africa where the cash was moved back to Lebanon and poured into 
Hezbollah's coffers. Clearly these groups are highly innovative and 
motivated and we must be up to the challenge.
    Terrorist groups and state sponsors of terrorism turning to 
criminal activities to set up additional networks, to acquire 
logistical support, and to raise financial resources is another 
evolving trend which could point to the future of terrorist financing.
    Given this shifting trend, and the relatively low amounts of money 
required to undertake an attack, the U.S. Government may need to 
recalibrate some of its tactics and examine how the intelligence and 
law enforcement communities will adapt their strategies in order to 
address remaining vulnerabilities in combating terror financing.
                               conclusion
    I thank the witnesses for taking the time to be with us today and I 
look forward to hearing from this distinguished panel.

    Mr. Meehan. The Chairman now recognizes the distinguished 
Ranking Member of the Subcommittee on Counterterrorism, the 
gentleman from New York, Mr. Higgins, for any statement he may 
have.
    Mr. Higgins. Thank you, Mr. Chairman.
    Just briefly, in reference to your opening statement, we 
have learned in prior hearings that Hezbollah, which is a 
terrorist organization, a Shia Muslim group committed to 
violent jihad, acts as a proxy for Venezuela, for Syria, and 
for Iran. They have a presence in the 20-country region of 
Latin America. Additionally, they have a presence in 15 
American cities, including four major cities in Canada. We have 
also been told that we are not to be too concerned about this, 
that their activities are limited to fund-raising. Well, I see 
the fund-raising activities by a terrorist group as an act of 
terrorism, at least, at least in a preliminary way.
    So those are some of the concerns that I have. But, in the 
interest of time, I will submit my opening statement for the 
record, so that we can get to the expert witnesses. Thank you 
for being here.
    Thank you, Mr. Chairman. I yield back.
    Mr. Meehan. Thank you.
    Other Members of the committee are reminded that opening 
statements may be submitted for the record.
    We are pleased to have a distinguished panel of witnesses 
before us today, on this important topic.
    Dr. Jonathan Schanzer is the vice president of research at 
the Foundation for Defense of Democracies. He worked as a 
terrorism finance analyst at the United States Department of 
Treasury, where he played an integral role in the designation 
of numerous terrorist financiers.
    Dr. Schanzer has also worked for several other United 
States-based think tanks, including the Washington Institute 
for Near East Policy and Jewish Policy Center and the Middle 
East Forum. He studied Middle East history in four countries 
and most recently received his Ph.D. from King's College in 
London where he wrote his dissertation on the U.S. Congress and 
its efforts to combat terrorism in the 20th Century.
    Mr. John Cassara enjoyed a 26-year career in the Federal 
Government intelligence and law enforcement community as an 
expert in anti-money laundering and terrorist financing. He 
worked at the Department of Treasury's Financial Crimes 
Enforcement Network, and this was the first institution set up 
to take on the issue of terrorist financing, and at the United 
States Financial Intelligence Unit. He was detailed to work in 
the Office of Terrorism Finance and Financial Intelligence at 
the Department of Treasury and the Department of State's Bureau 
of International Narcotics and Law Enforcement Affairs and 
Anti-Money Laundering Section. That had to be quite a business 
card.
    During his law enforcement investigative career, Mr. 
Cassara conducted a large number of money laundering, fraud, 
intellectual property rights, smuggling, and diversion of 
weapon and high technology investigations. Just the scope of 
that demonstrates the numerous schemes that are possible. These 
investigations took place in Africa, the Middle East, and 
Europe for a variety of Federal agencies, including directing 
the first truly international money laundering task force and 
serving as an undercover arms dealer.
    Mr. Dennis Lormel is the president and CEO of DML 
Associates, a full-service investigative consultancy. Mr. 
Lormel retired from the Federal Bureau of Investigation in 2003 
after 30 years of Government service and almost 28 as a special 
agent in the FBI.
    In December, 2000, he was appointed the chief of the FBI's 
Financial Crimes Program. Following the terrorist attacks of 
September, 2001, Mr. Lormel established and directed the FBI's 
Terrorist Financing Initiative, which evolved into the 
Terrorist Financing Operations Section within the 
Counterterrorism Division. Since leaving law enforcement, he 
has provided risk advisory consulting services and has served 
as an advisor to the Congressional Anti-Terrorist Financing 
Task Force.
    The Honorable Sue Eckert is a senior fellow at the Thomas 
J. Watson Institute at Brown University, where her research is 
concentrated on making United Nations sanctions more effective 
through targeting and combating the financing of terrorism.
    Prior to joining Brown University, Ms. Eckert was employed 
at the Institute of International Economics; and from 1993 
until 1997, Ms. Eckert was appointed by President Clinton and 
confirmed by the Senate as the assistant secretary of commerce 
for export administration. Previously, she served on the 
professional staff of the House of Representatives Committee on 
Foreign Affairs. In addition, she has worked with business 
groups and served on numerous working groups and committees 
addressing security and technology issues.
    I am very grateful for this panel. You bring in expertise 
on an issue which I think is dramatically under-appreciated by 
most Americans, and few realize the importance of this as we 
conduct investigations and do our best to protect not just this 
Nation but Western interests from around the world from 
terrorist activity and threats.
    A critical element is the ability to understand how they 
are funded, how they are supported, how they operate, and we 
have seen a remarkably changing capacity for them to do it. You 
have been there at the front end of this. We really need your 
insights to understand how things have evolved and what we 
ought to be looking for to continue to do the best job that we 
can to be on top of the ability to control their ability to 
carry out acts of terrorism against us.
    So, at this point, I appreciate your being here. We are 
going to be called again to votes at 11:50, but we want to get 
the benefit of your testimony. We are going to do as much as we 
can to probe on questions as soon as we complete that. So I ask 
you to do your best to focus on the essence of your testimony 
and see if we can stay within the 5-minute period.
    So the Chairman now recognizes Dr. Schanzer to testify.

  STATEMENT OF JONATHAN SCHANZER, VICE PRESIDENT OF RESEARCH, 
             FOUNDATION FOR DEFENSE OF DEMOCRACIES

    Mr. Schanzer. Chairman Meehan, Ranking Member Higgins, and 
Members of the subcommittee, on behalf of the Foundation for 
Defense of Democracies I thank you for the opportunity to 
testify.
    I base my testimony today on my experience as an analyst at 
the U.S. Treasury's Office of Intelligence and Analysis, where 
I worked from 2004 to 2007 and was directly involved in 
designating several terrorist financiers.
    Mr. Chairman, after the September 11 attacks, the U.S. 
Treasury immediately went to work uncovering terrorist funds. 
On September 23, President George W. Bush issued an Executive 
Order designating terrorist entities that threatened America. 
That list quickly grew and became a powerful tool for capturing 
terrorist money.
    The 9/11 Commission report at least in 2004 gave Treasury 
high marks for its efforts, but in denying terrorists the use 
of the formal banking sector, we have driven terror financing 
underground, and we are now victims of our own success. 
Terrorists have adapted in part by hatching cheaper plots. It 
cost al-Qaeda of the Arabian Peninsula, AQAP, just $4,200 to 
place two bombs on cargo planes in October, 2010. The group 
bragged openly of this, underscoring that it is nearly 
impossible now to stop such low-cost operations.
    Other terrorist groups rely heavily on bulk cash smuggling 
to evade detection with couriers delivering suitcases full of 
cash to terrorist masterminds. Still others engage in trade-
based money launderings, where they plow illicit cash into 
legitimate businesses to further finance terrorist activities.
    Broadly speaking, terrorist financiers are increasingly 
shifting to criminal activity. Earlier this year, U.S. 
authorities indicted a vast Hezbollah network of money 
laundering, cocaine deals, and more, exposing 30 U.S.-based car 
dealerships that helped the group move cash. Similarly, Senator 
Dianne Feinstein recently noted how the Taliban relies heavily 
on profits from the heroin trade to finance its operations.
    If this trend continues, it is reasonable to assume that 
criminal investigations will play an increasingly prominent 
role in U.S. efforts to counter terror finance. For its part, 
Treasury must continue to issue designations, even if fewer of 
them lead to actually capturing cash. The naming and shaming of 
terrorist financiers lets them know that they are being 
watched, and that helps to stem the flow of cash that can 
finance attacks on the homeland or against allies abroad.
    Designations can also expose key nodes of terrorist groups. 
That has been critical in exposing al-Qaeda's relationship with 
Iran. In July 2011, Treasury designated al-Qaeda leader Yasin 
al-Suri and five others who moved money and recruits to 
Pakistan, the Gulf, and Iraq. Treasury declared that al-Suri's 
network operates as part of a ``secret deal'' between al-Qaeda 
and the Iranian Government.
    In January 2009, Treasury designated four other al-Qaeda 
operatives in Iran. All of them, including Osama bin Laden's 
son, Sa'ad bin Laden, served on al-Qaeda's executive council.
    Of course, none of this comes as a surprise. The 9/11 
Commission in 2004 expressed concern over the Iran-al-Qaeda 
operational relationship, noting that it requires ``further 
investigation by the U.S. Government.'' Treasury is doing just 
that, and it shares its findings through the designation 
process.
    Remarkably, Treasury's robust counterterrorism program is 
the only one of its kind in the world. None of America's allies 
come close to our investment in human and financial resources 
to combat terror finance. This can be blamed on a combination 
of tight budgets and a lack of political will.
    Though the international Financial Action Task Force, or 
FATF, recently beefed up its standard, it is insufficient. FATF 
allows members to self or mutually evaluate, operates according 
to recommendations, and enables states like Saudi Arabia and 
Qatar to give themselves high marks regardless of the 
realities. The system is full of holes, and terrorists 
predictably gravitate to the areas of weakest authority.
    Looking ahead, Treasury's policy shop, the Office of 
Terrorism Finance and Financial Crimes, TFFC, needs to prompt 
both allies and adversaries to do more to combat terror 
finance. But, for the short term, the most glaring challenge is 
the threat of a nuclear Iran. On this front, Treasury has had a 
real impact. Tehran now faces tougher sanctions than ever 
before, and the regime is cash-strapped. Though Teheran 
continues to push forward with its nuclear program, the regime 
reportedly finds it increasingly difficult to bankroll 
terrorist proxies, Hamas, and Hezbollah to the extent that it 
had in the past. Admittedly, we may now be past the point where 
economics can prevent a nuclear Iran, but Treasury's efforts 
have nevertheless been instructive. They demonstrate that, if 
properly applied, sanctions can truly diminish a state 
sponsor's ability to finance terror.
    Mr. Chairman, there are many other challenges on the 
terrorism financing front that I did not have time to address 
today. If I have missed anything you wish to discuss, I am 
happy to answer your questions; and on behalf of the Foundation 
for Defensive Democracies, I thank you for inviting me today.
    [The statement of Mr. Schanzer follows:]
                Prepared Statement of Jonathan Schanzer
                              May 18, 2012
    Chairman Meehan, Ranking Member Higgins, and Members of the 
subcommittee, on behalf of the Foundation for Defense of Democracies, 
thank you for the opportunity to testify.
    I base my testimony today on my experience as an analyst at the 
U.S. Treasury Office of Intelligence and Analysis, where I worked from 
2004 to 2007, and was directly involved in designating several 
terrorist financiers.
    Mr. Chairman, after the September 11 attacks, the U.S. Treasury 
immediately went to work uncovering terrorist funds. On September 23, 
President George W. Bush issued an Executive Order designating 
terrorist entities that threatened America.\1\ That list grew quickly 
and became a powerful tool for capturing terrorist money.
---------------------------------------------------------------------------
    \1\ ``Executive Order on Terrorist Financing,'' September 23, 2001, 
http://georgewbush-whitehouse.archives.gov/news/releases/2001/09/print/
20010924-1.html.
---------------------------------------------------------------------------
    The 9/11 Commission report, released in 2004, gave Treasury high 
marks for its efforts.\2\ But in denying terrorists the use of the 
formal banking sector, we have driven terror finance underground, and 
we are now victims of our own success.
---------------------------------------------------------------------------
    \2\ http://govinfo.library.unt.edu/911/report/index.htm.
---------------------------------------------------------------------------
    Terrorists have adapted, in part, by hatching cheaper plots. It 
cost al-Qaeda of the Arabian Peninsula just $4,200 to place two bombs 
on cargo planes in October 2010. The group bragged openly of this, 
underscoring that it is nearly impossible to stop such low-cost 
operations.\3\
---------------------------------------------------------------------------
    \3\ See the November 2010 issue of AQAP's Inspire magazine: http://
info.publicintelligence.net/InspireNovember2010.pdf.
---------------------------------------------------------------------------
    Other terrorist groups rely heavily on bulk cash smuggling to evade 
detection, with couriers delivering suitcases full of cash to terrorist 
masterminds.\4\ Still others engage in trade-based money laundering, 
where they plow illicit cash into legitimate businesses to further 
finance terrorist activities.\5\
---------------------------------------------------------------------------
    \4\ John Diamond, ``Terror Funding Shifts To Cash,'' USA Today, 
June 18, 2006, http://www.usatoday.com/news/washington/2006-06-18-
terror-cash_x.htm.
    \5\ Avi Jorisch, Tainted Money: Are We Losing the War on Money 
Laundering and Terrorism Financing? (VA: Red Cell Publishing, 2009), 
pp. 95-104.
---------------------------------------------------------------------------
    Broadly speaking, terrorist financiers are increasingly shifting to 
criminal activity. Earlier this year, U.S. authorities indicted a vast 
Hezbollah network for money laundering, cocaine deals, and more--
exposing 30 U.S.-based car dealerships that helped the group move 
cash.\6\ Similarly, Senator Dianne Feinstein recently noted how the 
Taliban relies heavily on profits from the heroin trade to finance its 
operations.\7\
---------------------------------------------------------------------------
    \6\ United States of America vs. Lebanese Canadian Bank, et al. 
http://www.justice.gov/dea/pubs/pressrel/pr121511_filed-complaint.pdf.
    \7\ ``GOP lawmaker concerned over strength of Taliban,'' Los 
Angeles Times, May 4, 2012. http://latimesblogs.latimes.com/world_now/
2012/05/washington-us-intelligence-afghanistan-taliban-stronger-
president-obama.html.
---------------------------------------------------------------------------
    If this trend continues, it's reasonable to assume that criminal 
investigations will play an increasingly prominent role in U.S. efforts 
to counter terror finance.
    For its part, Treasury must continue to issue designations, even if 
fewer of them lead to capturing terrorist cash. The naming and shaming 
of terrorist financiers lets them know they're being watched. And that 
helps us stem the flow of cash that can finance attacks on the homeland 
or against allies abroad.
    Designations also expose key nodes of terrorist groups. This has 
been critical in exposing al-Qaeda's relationship with Iran.
    In July 2011, Treasury designated al-Qaeda leader Yasin al-Suri and 
five others who moved money and recruits to Pakistan, the Gulf, and 
Iraq. Treasury declared that al-Suri's network operates as part of a 
``secret deal'' between al-Qaeda and the Iranian government.\8\
---------------------------------------------------------------------------
    \8\ ``Treasury Targets Key Al-Qa'ida Funding and Support Network 
Using Iran as a Critical Transit Point,'' July 28, 2011, Page Content 
http://www.treasury.gov/press-center/press-releases/Pages/tg1261.aspx.
---------------------------------------------------------------------------
    In January 2009, Treasury designated four other al-Qaeda operatives 
in Iran. All of them, including Osama bin Laden's son, Sa'ad bin Laden, 
served on al-Qaeda's executive council.\9\
---------------------------------------------------------------------------
    \9\ ``Treasury Targets Al Qaida Operatives in Iran,'' January 16, 
2009. http://www.treasury.gov/press-center/press-releases/Pages/
hp1360.aspx.
---------------------------------------------------------------------------
    Of course, none of this comes as a surprise. The 9/11 Commission in 
2004 expressed concern over the Iran-al-Qaeda operational relationship, 
noting that it required ``further investigation by the U.S. 
government.'' Treasury is doing just that, and it shares its findings 
through the designation process.
    Remarkably, Treasury's robust counter-terrorist program is the only 
one of its kind in the world. None of America's allies come close to 
our investment in human and financial resources to combat terror 
finance. This can be blamed on a combination of tight budgets and a 
lack of political will.
    Though the international Financial Action Task Force (FATF) 
recently beefed up its standards,\10\ it is insufficient. FATF allows 
member states to self-evaluate, and operates according to 
``recommendations,''\11\ enabling states like Saudi Arabia and Qatar to 
give themselves high marks, regardless of the realities. The system is 
full of holes, and terrorists predictably gravitate to the areas of 
weakest authority.
---------------------------------------------------------------------------
    \10\ Amit Kumar, ``The Revised FATF Standards: A Shot in the Arm 
for Countering the Financing of Terrorism Efforts,'' April 16, 2012, 
Center for National Policy, http://cnponline.org/ht/display/
ViewBloggerThread/i/37450/pid/35636.
    \11\ See the FATF mandate here: http://www.fatf-gafi.org/media/
fatf/documents/FINAL%20FATF%20MANDATE%202012-2020.pdf.
---------------------------------------------------------------------------
    Looking ahead, Treasury's policy shop--the Office of Terrorism 
Finance and Financial Crimes\12\--needs to prompt both allies and 
adversaries to do more to combat terror finance. But for the short 
term, the most glaring challenge is the threat of a nuclear Iranian.
---------------------------------------------------------------------------
    \12\ See: http://www.treasury.gov/about/organizational-structure/
offices/Pages/Office-of-Terrorist-Financing-and-Financial-Crimes.aspx.
---------------------------------------------------------------------------
    On this front, Treasury has had a real impact. Tehran now faces 
tougher sanctions than ever before, and the regime is cash-strapped. 
Though Tehran continues to push forward with its nuclear program, the 
regime reportedly finds it increasingly difficult to bankroll terrorist 
proxies Hamas and Hezbollah to the extent it had in the past.
    Admittedly, we may now be past the point where economics can 
prevent a nuclear Iran. But Treasury's efforts have nevertheless been 
instructive. They demonstrate that, if applied properly, sanctions can 
truly diminish a state sponsor's ability to finance terror.
    Mr. Chairman, there are many other challenges on the terrorism 
financing front that I did not have time to address today. If I have 
missed anything you wish to discuss, I am happy to answer your 
questions.
    On behalf of the Foundation for Defense of Democracies, I thank you 
again for inviting me here today.

    Mr. Meehan. Thank you, Doctor. Very grateful for your 
testimony.
    The Chairman now recognizes Mr. Cassara to testify.

         STATEMENT OF JOHN A. CASSARA, PRIVATE CITIZEN

    Mr. Cassara. Chairman Meehan, Ranking Member Higgins, and 
Members of the subcommittee. Thank you for the opportunity to 
testify today. It is an honor for me to be here. While there 
are no simple solutions to all of the challenges identified by 
this subcommittee, I believe there are three realistic and 
cost-effective steps we should take.
    Mr. Chairman, I believe you used the term ``recalibrate 
tactics.'' I think that is a very, very good way of putting it. 
I have broadly categorized my proposed recalibrations, if you 
will, as transparency, technology, and draining the swamp. The 
three are intertwined and complementary. I elaborate upon them 
in my written statement. Because of time constraints, I will 
just briefly summarize them.
    Let's begin with transparency. Shortly after the September 
11 terrorist attacks, I had a very interesting conversation 
with a Pakistani businessman involved in the gray markets and 
the underworld of crime. He told me something I will never 
forget. He said: Mr. John, don't you understand that criminals 
and terrorists are moving money and transferring value right 
under your noses? But the West doesn't see it. Your enemies are 
laughing at you. His words infuriated me because I knew he was 
right. I worked overseas for years with frequent travels to the 
Arabian Peninsula, Africa, South Asia. I became intrigued with 
the opaque, indigenous, but very effective ways of transferring 
money and value so different from our own. For example, the 
Pakistani businessman was referring to various forms of what we 
would loosely call trade-based money laundering. It involves 
the transfer of value via commodities and trade goods.
    In addition to simple but effective customs fraud, trade-
based value transfer is often used to provide counter-
valuation, or a way of balancing the books in many global 
underground financial systems, including some that are used to 
finance terror. Without going into detail, some of these trade-
based value schemes are found in hawala networks, most other 
regional forms of alternative remittance systems, the Afghan 
transit trade, suspect international Lebanese Hezbollah 
networks, trading syndicates, and non-bank lawless regimes in 
the Horn of Africa.
    Now, in theory, spotting anomalies in trade data and 
overlapping these anomalies with financial data transportation 
data, travel data, would allow us to kind of peer into these 
underground networks by in effect going in through the back 
door.
    When a buyer and seller are working together, the price of 
a good or a service can be whatever they want it to be. There 
is no invoice police. Now, this is a very simple example. This 
pen, it is a nice pen. Let's say it cost roughly $50. Buyer and 
seller, via, say, false invoicing could overvalue this to say 
it is worth $100. Simply, similarly, they could undervalue it 
to show it is worth say $10, or say even $1. Now, why is this 
important? Well, to move money out of a country, participants 
import goods at overvalued prices or export goods at 
undervalued prices. To move money into a country, the 
participants import goods at undervalued prices, or export 
goods at overvalued prices. For the most part, all of this 
avoids countries' financial transparency reporting 
requirements. We are not picking this up. This vulnerability is 
what Osama bin Laden himself once himself called cracks in the 
Western financial system.
    I once had a conversation with an Iranian freight forwarder 
in Dubai and I was talking about this type of money laundering, 
trade manipulation, over- and under-invoicing. He says to me: 
Mr. John, money laundering, but that is what we do. Precisely, 
it is the way of life out there. It is the way they do 
business.
    Now, in order to help combat this type of trade-based money 
laundering the Department of Homeland Security's Immigrations 
and Customs Enforcement, or ICE, established the world's first 
trade transparency unit, or TTU. There are approximately eight 
additional TTUs in the Western hemisphere and more planned. 
Congress can help promote transparency by ensuring the U.S. TTU 
has sufficient resources to systematically examine trade fraud 
in the United States for reasons of both National security and 
to enhance our revenue. Our TTU should be encouraged to further 
expand the TTU network overseas, particularly in areas where 
adversaries operate, and we should also promote trade 
transparency overseas by building it into the U.S. trade 
agenda.
    Let me briefly switch now and talk about technology. Over 
the last few years, there have been tremendous advances in the 
amount of data collected and available for analysis. Just a few 
examples include financial, trade, and transport data. 
Communications and social networking are growing exponentially. 
Industry calls these record sets of information big data. 
Concurrently, there have been major advances in data 
warehousing, data mining, and advanced analytics. I am not a 
technical person; however, I am excited about some of the new 
tools and resources that have been recently developed to 
exploit big data and help the modern criminal investigator. Yet 
those tools are not in our investigators' hands, not at the 
Federal, State, or local level. I am convinced the only way we 
are going to realistically stay abreast of some of these 
challenges we face in financial crimes and terror finance is to 
use technology as a force multiplier.
    Now, if we are talking about financial data, we have to 
talk about Treasury's Financial Crimes Enforcement Network, 
FinCEN. FinCEN is mandated to collect, analyze, and disseminate 
financial intelligence. FinCEN is the gatekeeper and should be 
the U.S. Government's premier financial crimes resource. 
However, as I documented in my first book, ``Hide and Seek: 
Intelligence, Law Enforcement, and the Stalled War on Terrorist 
Finance,'' FinCEN has never lived up to its early promise and 
potential. The expertise and managerial will simply do not 
exist to fully exploit the data and----
    Mr. Meehan. I am going to have to, because we are going to 
get called. It is all worth developing in our follow-up 
questions. Let me ask if I can: Is there a quick point you want 
to make in summary?
    Mr. Cassara. No, I refer the committee to my statement, and 
my statement elaborates on these points.
    [The statement of Mr. Cassara follows:]
                 Prepared Statement of John A. Cassara
                              May 18, 2012
    Chairman Meehan, Ranking Member Sanchez, and Members of the 
Subcommittee on Counterterrorism and Intelligence, thank you for the 
opportunity to testify today. It is an honor for me to be here.
    In 2005, I retired after a 26-year career as a case officer for the 
Central Intelligence Agency and as a special agent for the U.S. 
Department of Treasury. I believe I am the only individual to have ever 
been both a covert case officer and a Treasury special agent.
    Much of my career with Treasury was involved with combating 
international money laundering and terror finance. I currently work as 
a contractor and consultant for a number of U.S. departments, agencies, 
and business enterprises, although the views that I express here are 
only my views and not necessarily representative of these 
organizations. I have been fortunate to continue my domestic and 
international travels primarily providing training and technical 
assistance in financial crimes enforcement. I have written three books 
on terror finance and numerous articles. I have direct experience with 
many of the issues being discussed here today.
    A few days after the most successful terrorist attack in U.S. 
history, President George W. Bush stated, ``Money is the lifeblood of 
terrorist operations. Today we are asking the world to stop payment.'' 
We are meeting here this morning in part to ask whether that request 
has been fulfilled and, if not, what more can and should be done.
    The short answer is both ``yes'' and ``no.'' Completely eradicating 
terror finance is impossible. There is no magic bullet. Yet after 10 
years of concerted effort, it is now harder, costlier, and riskier for 
terrorists to raise and transfer funds, both in the United States and 
around the world. That's the good news. Unfortunately, there is no 
doubt that our financial countermeasures have not been as smart or 
efficient as they could be and that we will continue to face new 
challenges in the coming years.
    The learning curve has been steep. For example, in the years 
immediately after September 11, most policymakers within the Treasury 
Department were convinced that ``financial intelligence'' or Bank 
Secrecy Act (BSA) data was the key to following the terrorist money 
trail. They had misplaced faith in the approximately in (2012 numbers) 
17 million pieces of financial data that are filed annually with 
Treasury, including approximately 1 million Suspicious Activity Reports 
(SARs). This is in addition to the countless millions of additional 
pieces of financial information filed around the world. This data comes 
from a wide variety of sources, including banks, money service 
businesses, and individuals.
    ``Financial intelligence,'' also known as ``BSA data,'' or 
``financial transparency reporting requirements'' was initiated during 
the early years of the ``War on Drugs'' when enormous amounts of 
illicit proceeds from the international narcotics trade regularly 
sloshed around Western financial institutions. So it is important to 
understand the financial reports were not originally designed to combat 
terror finance where small amounts of both illicit and licit monies are 
commonly used. It shouldn't really be a surprise that out of the tens 
of millions of pieces of financial intelligence filed annually in the 
United States and around the world not one piece of financial 
intelligence was filed on any of the 19 September 11 hijackers. And 
even if there had been, the United States did not have the programs and 
management structures in place that would have detected the suspicious 
financial activity. I say this with confidence because I worked at 
Treasury's Financial Crimes Enforcement Network (FinCEN) at the time. I 
demonstrated the failings in my first book, Hide & Seek: Intelligence, 
Law Enforcement and the Stalled War on Terror Finance (Potomac Books, 
2006). The same dearth of financial intelligence has subsequently held 
true for major terrorist attacks from Bali to Baghdad.
    Although the last 10 years have demonstrated that financial 
intelligence here and abroad is not the panacea for counter-terrorist 
finance, much of the financial data does contain excellent information 
and some has proved vital in ``connecting the dots.'' The data is 
invaluable in money laundering and other investigations. That being 
said, it is not being effectively exploited.
    Over the past 10 years, our adversaries' operational and financial 
tactics have evolved. We are faced with immense challenges. The 
situation is made worse by the comparatively small amounts of funding 
involved with terror finance. For example, it is estimated that 
September 11 cost al-Qaeda approximately $300,000-$500,000. Even this 
relatively small amount towers over the recent attempt to hide 
explosives in a printer cartridge aboard an air cargo flight to the 
United States. Al-Qaeda in the Arabian Peninsula boasted in its on-line 
magazine that, ``It is such a good bargain for us to spread fear 
amongst the enemy and keep him on his toes in exchange for a few months 
work and a few thousand dollars.''
    While there are no simple solutions to all of the challenges 
identified by this subcommittee, I believe there are some 
straightforward and cost-effective steps we should take. I have broadly 
categorized them as technology, transparency, and draining the swamp. 
The three are intertwined and complimentary.
                               technology
    Over the last few years, there have been tremendous advances in the 
amount of data collected and available for analysis. Just a few 
examples include financial, trade, transport, and travel data. 
Communications and social networking are growing exponentially. 
Industry calls these record sets of information, ``big data.'' I will 
not discuss the collection of classified data.
    Concurrently, there have been major advances in data mining and 
advanced analytical capabilities that can help organizations derive the 
``intelligence'' from this vast amount of data. Data warehousing and 
retrieval are enhanced by cutting-edge technologies that search, mine, 
analyze, link, and detect anomalies, suspicious behaviors, and related 
or interconnected activities and people. Fraud frameworks can be 
deployed to help concerned Government agencies and departments detect 
suspicious activity using scoring engines that can both rate, with high 
degrees of statistical accuracy, behaviors that warrant further 
investigation while generating alerts when something of importance 
changes. Predictive analytics use elements involved in a successful 
case or investigation and overlays these elements on other data sets to 
detect previously unknown behaviors or activities, enhancing and 
expanding an investigator's knowledge, efforts, productivities while 
more effectively deploying resources. Social network analytics helps 
investigators detect and prevent criminal activity by going beyond 
individual transactions to analyze all related activities in various 
mediums and networks uncovering previously unknown relationships. 
Visual analytics is a high-performance, in-memory solution for 
exploring massive amounts of data very quickly. It enables users to 
spot patterns, identify opportunities for further analysis, and convey 
visual results via web reports or the iPad. Moreover, it is now 
possible to engineer ``red flag indicators'' in financial reports--both 
within the Government and in commercial enterprises that file the 
information--that will identify likely suspect methodologies such a 
hawala or trade-based money laundering.
    Unfortunately, while the Federal Government is beginning to 
incorporate these advanced analytical capabilities, it lags far behind 
in its deployment of commercially available and viable technologies. As 
a subset, the Federal financial investigative resources trail even 
further behind. FinCEN is mandated to collect, house, analyze, and 
disseminate financial intelligence. FinCEN should be the U.S. 
Government's premier financial crimes resource. However, FinCEN has 
never lived up to its early promise and potential. One important 
problem with FinCEN is that although it has attempted to implement a 
number of data mining activities over the years, they have not been 
successful. Recently, progress has been made developing and employing 
new analytical tools. However, the FinCEN analysts are only able to use 
perhaps 10 percent of their new analytical capacity. The expertise and 
managerial will simply do not exist to fully exploit many of the tools 
now finally at their disposal.
    Within the next few years, it is estimated that approximately 500-
700 million additional pieces of financial information in the form of 
wire transfer data will be routed annually to FinCEN. If FinCEN is not 
able to successfully analyze the current 1 million BSA filings it 
receives annually it is highly doubtful that it will succeed with this 
new tasking. Yet law enforcement and intelligence professionals should 
have access to the data and be able to interpret it. Technology will be 
the force multiplier and the only realistic solution to effectively 
exploit current and new streams of financial data.
    In order to move forward, we must move to get around the FinCEN 
impediment. I propose that we ``downstream'' both financial information 
and analytics platforms directly to end-users in the law enforcement 
community. For example, the financial data and an accompanying user-
friendly analytics platform could be made directly accessible to 
various task forces, U.S. attorney offices, regional Suspicious 
Activity Report (SAR) review teams, appropriate Federal, State, and 
local law enforcement departments and agencies. Since FinCEN is 
mandated by the Department of Treasury to administer the Bank Secrecy 
Act (BSA) and accompanying data, FinCEN could license and control the 
release of the data and the analytics platform.
    Moreover, in my discussions with members of the U.S. intelligence 
and defense communities, frustration is often expressed that they do 
not have direct access to appropriate and targeted financial databases 
that intersect with their international areas of responsibility. 
Instead of looking for ways to increase the dissemination of necessary 
data, legal advisors within Treasury work to impede the release of 
information. While I certainly understand and endorse privacy and other 
concerns, the technology exists today to engineer safeguards into the 
dissemination of the data to prevent abuse. I urge that our colleagues 
be given increased access to this vital information in order to help 
safeguard our security.
                              transparency
    Shortly after the September 11 terrorist attacks, I had a 
conversation with a Pakistani businessman involved with the underworld 
of crime. He was involved in the gray markets of South Asia and the 
Middle East. He said, ``Mr. John, don't you know that the criminals and 
the terrorists are moving money and transferring value right under your 
noses? But the West doesn't see it. Your enemies are laughing at you.''
    His words infuriated me because I knew he was right. I worked 
overseas for years with frequent travels to the Arabian peninsula, 
Africa, and South Asia. For the most part, U.S. officials could not 
understand or identify the opaque, indigenous, but very effective ways 
of transferring money and value so different from our own. For example, 
the above Pakistani businessman was referring to various forms of what 
we loosely call ``trade-based money laundering.'' It involves the 
transfer of ``value'' via commodities and trade goods. In addition to 
customs fraud, trade-based value transfer is often used to provide 
``counter-valuation'' or a way of balancing the books in many global 
underground financial systems--including some that have been used to 
finance terror.
    In theory, by promoting trade transparency and using technology to 
spot anomalies in trade data (and overlapping those flagged anomalies 
with financial, travel, transportation, law enforcement, and other 
databases) we may be able to use trade as a ``back door'' to enter into 
previously hidden underground financial networks.
    Trade-based money laundering scams take a wide variety of forms. 
For example, it could be simple barter or a commodity-for-commodity 
exchange. In certain parts of Afghanistan and Pakistan, for example, 
the going rate for a kilo of heroin is a color television set. Drug 
warlords exchange one commodity they control (opium) for others that 
they desire (luxury and sports utility vehicles). In the United States 
and Mexico, weapons go south and drugs come north. However, generally 
speaking, money laundering and value transfer through simple invoice 
fraud and manipulation are most common. The key element here is the 
misrepresentation of the trade good to transfer value between importer 
and exporter. The quantity, quality, and description of the trade goods 
can be manipulated. The shipment of the actual goods and the 
accompanying documentation provide cover for ``payment'' or the 
transfer of money. The manipulation occurs either through over- or 
under-valuation, depending on the objective to be achieved. To move 
money out of a country, participants import goods at overvalued prices 
or export goods at undervalued prices. To move money into a country 
participants, import goods at undervalued prices or export goods at 
overvalued prices. For the most part, all of this avoids countries' 
financial intelligence reporting requirements.
    Trade-based value transfer is found in every country around the 
world. I believe it is the ``new frontier'' in international money 
laundering and counter-terrorist finance countermeasures. Without going 
into detail, trade-based value transfer is found in hawala networks, 
most other regional ``alternative remittance systems,'' the misuse of 
the Afghan Transit Trade, Iran/Dubai commercial connections, suspect 
international Lebanese/Hezbollah trading syndicates, non-banked lawless 
regimes such as Somalia, etc.
    I have written extensively about trade-based money laundering. I 
invented the concept of trade-transparency units (TTUs), which is now 
part of the U.S. Government National Anti-Money Laundering Strategy. I 
am delighted that the Department of Homeland Security's Immigration and 
Customs Enforcement (ICE) has adopted this concept by establishing the 
world's first TTU. There are approximately eight additional TTUs in the 
Western Hemisphere and more TTUs are planned.
    In addition to being an innovative countermeasure to trade-based 
money laundering and value transfer, systematically cracking down on 
trade-fraud is a revenue enhancer for participating governments. 
Frankly, it is for this reason that many countries outside of the 
United States have expressed interest in the concept. In essence, these 
governments understand that they are not collecting the appropriate 
amount of duties on the goods because the values on the invoices are 
mis-stated. Finding new revenue, without actually having to raise tax 
rates, is an economic imperative.
    TTUs are already proving to be valuable resources for our 
government and international partners. For example, in 2008 the United 
States and Mexico partnered in the creation of a TTU in Mexico City. 
Such efforts should be promoted and expanded. Congress can help by 
ensuring that the TTUs have sufficient resources to systematically 
examine trade fraud in the United States for reasons of both National 
security and to enhance our revenue. We should also promote trade 
transparency overseas by building it into the U.S. trade agenda.
                            drain the swamp
    Since the end of the Cold War, there has been a dramatic decline in 
the number of countries that support and finance targeted acts of 
terrorism in order to achieve their national objectives. Today, Iran is 
the major ``state sponsor'' of terrorism. In the early days of al-
Qaeda, the terrorist group received much of its financial resources 
from Osama bin Laden's personal family wealth, along with contributions 
from wealthy Saudi and other donors. Today, al-Qaeda and other jihadist 
groups have been forced to disperse and receive little centralized 
direction or funding. This is the good news.
    With the decline of the above historical model--that is, groups 
with centralized command and control receiving most of their money from 
``state sponsors,'' evil regimes, and wealthy donors--terrorists and 
their supporters must increasingly rely on self-finance. In many cases, 
a symbiosis is developing between organized crime and terrorist 
organizations, and this sort of link has been observed around the 
world. As I detail in a book I co-authored with former Treasury 
official Avi Jorisch, On the Trail of Terror Finance: What Law 
Enforcement and Intelligence Officers Need to Know (Red Cell Publishing 
2010) we have observed individual terrorists and terrorist groups 
involvement with narcotics trafficking, intellectual property rights 
violations or trafficking in counterfeit goods, cigarette smuggling, 
robberies, credit card scams, fraud, trafficking in stolen cars, 
kidnapping for ransom, extortion, and other serious crimes. 
Unfortunately, self-finance in this way is much harder to detect, 
track, and disrupt.
    Given the above, ``draining the swamp'' or cracking down at home 
and abroad on local and transnational financial crime might eventually 
become one of the most effective strategies to combat terrorism. Even 
the U.S. military and international peacekeeping forces operating in 
lawless states have come to recognize that their adversaries, many with 
terrorist links, increasingly engage in traditional crime to help 
finance their activities.
    For this strategy to succeed, law enforcement, intelligence, and 
military organizations must learn to look beyond the immediate 
circumstances of a given local crime. Whether they are confronted with 
narcotics trafficking, organized robbery, human trafficking or other 
activities, street cops, criminal investigators, and analysts alike 
must learn to ask whether these seemingly isolated acts have more 
sinister ties. Officials, both in the United States and overseas, must 
learn to ``ask the next question'' during the course of routine 
investigations: Where is the money going?
    Yet most law enforcement officers get caught up in the quick 
statistic. That is how they are recognized and rewarded. They are not 
interested, often times not allowed, and do not have the networks to 
determine if the local crime they uncovered has broader implications.
    In my travels around the United States and overseas, I have 
observed first-hand how little law enforcement groups actually know 
about following the money. It is particularly shocking because outside 
of crimes of passion, criminals and criminal organizations engage in 
criminal activity because of greed; i.e., money. For example, Karachi, 
Pakistan's largest city and economic hub, is heavily infiltrated by 
militants and terrorists making money through criminal activities such 
as cigarette smuggling, selling counterfeit goods, bank robbery, street 
robbery, kidnapping for ransom, and other heinous crimes. Mr. 
Sharfuddin Memon, a director of a Karachi citizens' crime watch group, 
described the motivations behind this activity: ``The world thinks this 
is about religion, but that's a mistake. It's about money and power. 
Faith has nothing to do with it.''
    I urge Congress to support effective training programs that educate 
law enforcement and intelligence officers on the importance of ``asking 
the next question'' and following the money trail. I also believe we 
should make much more concerted efforts--using various means--to work 
with international public media and other communications networks and 
brand terrorists for what they are: International thugs. They should 
not be allowed to glorify themselves. The last 10 years have 
demonstrated that criminals are using jihad as a concept to legitimize 
their activities. By using publicity, transparency, and draining the 
swamp we will delegitimize them.
    As I said at the outset, our enemies are adept at exploiting the 
weaknesses in the U.S. financial reporting system. Osama bin Laden once 
called these ``cracks in the Western financial system.'' Their 
financial behavior has evolved. I also mentioned new financial threats 
on the horizon. Some of these include pre-paid gift and stored value 
cards; service-based laundering; mobile payments commonly referred to 
as ``m-payments'' or the use of cell phones to store, receive, and 
transmit money; digital currencies; virtual currencies in the on-line 
virtual world, etc. Unfortunately, time does not permit a full review. 
However, many of these and other financial threats and countermeasures 
that may merit scrutiny by this subcommittee were articulated over 5 
years ago in the 2007 National Money Laundering Strategy written by the 
Departments of Treasury, Justice, and Homeland Security. The document 
was a blueprint for further action in the areas of financial crimes and 
threat finance. Unfortunately, in many areas, little or nothing has 
been done. I urge the subcommittee to review the document and ask hard 
questions about progress to date.
    ``Without money there is no terrorism.'' While this is a simplistic 
formula, our adversaries know that they need money to survive and fund 
their operations. They are proving adept and creative at finding new 
ways to access this lifeblood. I have profound respect for our 
intelligence and enforcement communities. The challenges they face in 
following illicit financial trails are immense.
    I appreciate the opportunity to appear before you today and I'm 
happy to elaborate on my experiences and to answer any questions you 
may have.

    Mr. Meehan. Anybody who is watching these hearings should 
appreciate the tremendous amount of work that went into the 
written testimony, which is far more expansive, and I think 
lays out for those who are studying this issue.
    Mr. Lormel, let me turn to you for 5 minutes before we--and 
Ms. Eckert. Thank you.

     STATEMENT OF DENNIS M. LORMEL, PRESIDENT AND CEO, DML 
                        ASSOCIATES, LLC

    Mr. Lormel. Thank you, sir. I appreciate----
    Mr. Meehan. May want to push your button.
    Mr. Lormel. Sorry. I appreciate the fact you are having 
this hearing and I admire your desire to continue this. It is 
very heartening to see that the committee wants to address this 
topic. It is very important.
    I was in a unique position on 9/11. I was in a position of 
leadership in the FBI where I got to follow the money, and I 
saw first-hand in the 3 years that I was there how well we used 
proactive techniques. One of the things that you are interested 
in are investigative techniques and tactics. How we succeed is 
being proactive. How we succeed is to look at financial 
information and how we can take financial intelligence and use 
it from a strategic, tactical, and historic standpoint, and use 
that in furtherance of investigative initiatives. We did it 
then. The Government is doing it today, and they do it pretty 
well, but we can do things better than what we do, and I hope 
that the committee can come away with that sense in going back 
and looking and assessing the Government on some of these 
issues.
    In any event, let me start with the Government and the 
private sector in terms of perspectives. Perspective is very 
important, and the Government and private sector have some good 
partnerships, but we can partner better. One of the things we 
have to look at is the Bank Secrecy Act and the important of 
bank secrecy information and how we can use that in furtherance 
of investigative developments and initiatives. Quite frankly, 
when you look at the Bank Secrecy Act you are looking at 
identifying suspicious activities in terms of who, what, when, 
where, how. When it comes to the private sector they are 
interested in the how. The Government is interested in the why. 
So we have to blend those two and bring them together better 
than we do. Terrorists, and you said it in your statement, Mr. 
Higgins said it, and I have heard it here with the other 
panelists, of how challenged we are in terms of moneys being 
used differently and smaller denominations of moneys being 
used. So the Government is more challenged in terms of 
identifying terrorist financing. That goes to the fact that 
again, going back to the financial sector, it is possible to 
identify terrorist financing, but it is not probable. The 
lesser amounts that are used, the more challenging it gets, and 
it plays then to the importance of the partnerships between the 
public and private sector, and again, bringing the why and how 
together to be able to accomplish these things.
    I testified on October 3, 2001, and I was asked 
specifically to testify about what the biggest vulnerabilities 
in the financial sector were. I said the biggest 
vulnerabilities were wire transfers, correspondent banking, and 
money services businesses. Today, I kind of look at this a 
little differently. I say that the problems we have are 
basically two-fold. You have criminal problems, crime problems, 
and you have got problems in terms of facilitation tools. The 
crime problems are fraud and money laundering, and money 
laundering in the greater context of all types of activities 
that require money being laundered back through the financial 
industry. Then the facilitation tools would be things like wire 
transfers, correspondent banking, money service businesses. If 
you--I am sorry, not money-service businesses, illegal money 
remitters.
    The Iranian sanctions, for instance, if you look at wire 
transfers, correspondent banking, shell companies, those are 
things that they take advantage of. Illegal money remitters, to 
me, is the biggest problem we have in the financial sector. The 
banks don't recognize who their clients are, customers are that 
have illegal money remittance operations. Then electronic 
mechanisms. That is the wave of the future. We have tremendous 
capabilities. We are getting away from cash. The more we get 
away from cash and the more like cash these mechanisms become, 
the more vulnerable we are to money laundering. I think if you 
look at Africa as a flashpoint, that is a good case in point of 
how terrorists are using these mechanisms to be able to launder 
money.
    I think there are some very good partnerships, again, and 
one in particular, is JPMorgan Chase and the Department of 
Homeland Security investigations. They have partnered to 
strategically collect information and, through targeted 
transaction monitoring, have really done a tremendous job in 
dealing with human smuggling. We can do the same thing in 
terrorist finance, but it takes a more concerted effort. So 
those are things that we need to look at.
    In my written statement, I put in it some recommendations, 
Chairman, about certain things that we need to do.
    [The statement of Mr. Lormel follows:]
                 Prepared Statement of Dennis M. Lormel
                              May 18, 2012
    Good morning Chairman Meehan and distinguished Members of the 
committee. Thank you for inviting me to testify at this hearing. 
Terrorist financing is a subject that is extremely important to me. 
This topic does not receive the attention it deserves. I greatly 
appreciate the fact that you are taking the time to delve into this 
subject.
    There are few events in a lifetime that evoke deep-seated emotion 
and vivid recollection. The terrorist attacks against the United States 
by al-Qaeda on September 11, 2001 (9/11), are clearly one of those 
historic moments that remain frozen in our minds. I poignantly remember 
my personal reaction then and how it affects me now. September 11 
changed my life, as it did for so many of us. As the agent in charge of 
the FBI's Financial Crimes Program at that time, I was in a unique 
situation where I was afforded an opportunity to respond in a manner 
few other people could. I was in a position to ``follow the money.'' I 
witnessed, first-hand, investigative successes which disrupted or 
deterred funding intended to support terrorist activities. I am an 
ardent believer that terrorist financing is a critical component of the 
war against terrorism.
    By way of background, immediately after 9/11, I was responsible for 
the formation and oversight of the FBI-led, multi-agency, Financial 
Review Group, which evolved into a formal Section within the FBI's 
Counterterrorism Section, known as the Terrorist Financing Operations 
Section (TFOS). Since retiring from the FBI, I have provided consulting 
services regarding fraud, money laundering, and terrorist financing. 
Many of my clients are in the financial services sector.
    My Government investigative and private sector consulting 
experience has provided me a rare opportunity to understand two very 
distinct perspectives. For over 30 years, I had a law enforcement 
perspective. In that capacity, my perspective was Government- and 
investigative-driven. For the last 9 years, in my current position as a 
consultant, my perspective has shifted to one that is industry- and 
compliance-driven. This provides me with a unique understanding of the 
responsibilities, sensitivities, challenges, and frustrations 
experienced by the Government and financial sectors in dealing with 
anti-money laundering (AML) and terrorist financing considerations. 
There is a notable difference in perspectives. This is one of the many 
challenges we face in dealing with terrorist financing and other 
criminal problems.
    Identifying suspicious activity in financial institutions, 
especially involving terrorist financing, is extremely challenging. 
This is where understanding perspective is critically important. When 
it comes to identifying and reporting suspicious activity, you must 
consider the ``who, what, where, when, why, and how.'' Law enforcement 
typically focuses on the ``why'' as the most important element while 
financial institutions are most concerned about the ``how.'' This is 
one of the areas where collaboration between law enforcement and 
financial institutions is not as consistent as it could be. Law 
enforcement frequently shares ``war stories'' about investigative 
successes with industry. However, they do not often provide specific 
information about ``how'' financial institutions were used by the bad 
guys. The Internal Revenue Service is one agency that does provide this 
type of information to financial institutions at industry training 
forums.
    In order to succeed, individual terrorists, such as lone wolves, 
and terrorist groups must have access to money. They require funding in 
order to operate and succeed. Invariably, their funding sources will 
flow through financial institutions. To function, terrorists must have 
continuous access to money. Regardless of how nominal or extensive, the 
funding flow is operationally critical. Terrorists, like criminals, 
raise, move, store, and spend money in furtherance of their illicit 
activity. This is why Bank Secrecy Act (BSA) reporting requirements are 
essential to our National Security. This fact becomes more compelling 
in view of the actuality that finance is one of the two most 
significant vulnerabilities to terrorist and criminal organizations.
    Terrorist financing is not adequately understood and extremely 
difficult to identify, especially when funding flows are more nominal. 
This is where Government, through the interagency community engaged in 
terrorist financing, must interact more efficiently with the financial 
services sector to identify terrorist financing. It is possible for 
financial institutions to identify terrorist financing, but it is 
highly improbable. We must take continual actions that increase the 
probability factor, thereby increasing the possibility of identifying 
funding flows. The challenge confronting the Government and banking 
community is to improve the effectiveness of the process. This is where 
the Government needs to be more effective and efficient in the ``how'' 
of assisting financial institutions in identifying suspicious activity. 
Government should develop better feedback mechanisms to financial 
institutions about ``how'' terrorists use financial institutions and 
provide them with typologies that financial institutions could use for 
transactional monitoring.
    The interagency community that has jurisdiction and responsibility 
for terrorist financing should be commended for their contributions. 
Terrorist financing is one area where the Government excelled following 
9/11 and where they continue to perform admirably.
    Terrorist financing is every bit as challenging today as it was in 
the immediate aftermath of 9/11. Law enforcement, regulators, and 
intelligence agencies here, in the United States (U.S.), and abroad, 
have achieved noteworthy and meaningful accomplishments. New proactive 
and progressive methodologies have been developed and implemented in 
furtherance of such efforts. When the Government succeeds in 
implementing and executing proactive methodologies, the ability of 
terrorists to carry out operations is diminished. However, lingering 
concerns and the resiliency of terrorists to adapt to change, coupled 
with the ease of exploitation of systemic vulnerabilities in the 
financial sector, will perpetuate the challenge of addressing the 
issues presented by terrorist financing.
    Despite the gains we've made, the financial services sector is as 
inherently vulnerable today as it was on 9/11. On October 3, 2001, as a 
senior executive in the FBI, I testified before the House Financial 
Services Committee. One of the issues I addressed was vulnerabilities 
or high-risk areas in the financial services sector. I testified that 
wire transfers, correspondent banking, fraud, and money services 
businesses were the biggest areas of vulnerability to the financial 
services industry at that time.
    Today, I have refined the vulnerabilities in two categories: Crime 
problems and facilitation tools. The most significant crime problems we 
currently face in the financial services industry are fraud and money 
laundering. Fraud was magnified during the recent financial crisis and 
continues to represent a significant threat to our economy. Money 
laundering encompasses all other criminal activity where the proceeds 
of crime are laundered through financial institutions. The key 
facilitation tools used in furtherance of fraud and money laundering 
are: Wire transfers, correspondent banking, illegal money remitters, 
shell companies, and electronic mechanisms.
    Illegal money remitters represent one of the most significant 
problems confronting banks. This has been an on-going challenge. Many 
banks cannot identify customers who operate illegal money remittance 
operations. On the surface, they appear to be a legitimate business. 
However, if like the Carnival Ice Cream Shop in Brooklyn, New York, 
they actually functioned as illegal money remitters funneling money to 
high-risk countries. Consequently, terrorist and criminal groups have 
used illegal money remitters in furtherance of their illicit 
activities. There are a number of cases we can point to that illustrate 
this problem to include the Time Square bombing case.
    Sanctions against Iran have caused Iranian entities to regularly 
use shell companies to hide beneficial ownership, as well as rely on 
correspondent banking and wire transfers to illegally move funds. The 
Lloyds Bank ``stripping'' case is a prime example of how correspondent 
banking was used by Iran as a facilitation tool. In this matter, Lloyds 
stripped SWIFT messaging information to hide Iranian bank 
identification in order to avoid U.S. banking monitoring detection. The 
Alavi Foundation case was an example of how Iran used shell companies 
to hide beneficial ownership in a New York City office building. Both 
cases involved the use of wire transfers.
    The use of electronic payment mechanisms is an area of growing 
concern regarding how terrorists move money due to the anonymity and 
instant settlement it affords. Electronic payment mechanisms are 
becoming more prolific and vulnerable to misuse by criminals and 
terrorists. Africa is a venue of concern for the growing use of 
electronic mechanisms.
    The Government has made consistent incremental progress in 
addressing terrorist financing. Individual agencies and entities 
responsible for terrorist financing have matured and evolved. They have 
individually and collectively developed investigative methodologies to 
effectively deal with the constant and emerging challenges. Although on 
an agency-by-agency level, we can point to enhanced capabilities, the 
true measure of Government success is the ability of the interagency 
community to work as a unified team, and to parlay their collective 
investigative capabilities into a joint Government-wide terrorist 
financing strategy. In the aftermath of 9/11, I was part of such a 
working group that was led by David Aufhauser, then the General Counsel 
at the Treasury Department. Mr. Aufhauser was a true leader who 
marshaled the interagency collaborative initiative. He was an unsung 
hero and visionary. I recommend that the committee periodically assess 
the status of the interagency terrorist financing working group to 
ensure that it is effectively coordinating the broader interagency 
initiatives.
    The face of terrorism since 9/11 has been altered significantly. 
The last few years have seen tremendous change and instability in the 
Middle East. Core al-Qaeda has been decimated and affiliate groups have 
evolved into greater threats. Our homeland has experienced a growing 
concern involving lone wolf terrorists and other home-grown threats. 
These developing factors have modified terrorist financial typologies.
    The evolving terrorist landscape has led to less costly terrorist 
plots. As noted earlier, the more nominal amounts have been more 
challenging to identify. This is due to the fact they are generally 
more undetectable. For example, many lone wolf terrorists such as 
Farooque Ahmed, who plotted to detonate a bomb on the Washington, DC 
metro system, relied on money from their legitimate jobs to pay for 
their illicit activity.
    The Government must continuously identify and assess emerging 
trends and develop case typologies they can share with financial 
institutions. In so doing, the financial services sector can implement 
transaction monitoring strategies to identify patterns of activity 
consistent with the case typologies of criminals and terrorists. The 
Government has not done this as consistently as they could have.
    In general, law enforcement and the Financial Crimes Enforcement 
Network (FinCEN) have done a good job in sharing information with the 
financial services sector. However, they have not done as much as they 
think they have or they could. I do not make this comment lightly. When 
I was in the FBI, I thought I had maximized liaison relationships. It 
was not until after my retirement from law enforcement and my 
consulting work with the financial services sector that I realized I 
could have done more. It was a matter of perspective. If only I knew 
then, what I know now, I would have been dangerous. Law enforcement and 
FinCEN should do a better job of listening and providing feedback to 
financial institutions in the form of ``how'' terrorists and criminal 
organizations use the financial system in furtherance of their illicit 
activities.
    What is important, especially in dealing with more minimal dollar 
amounts, is identifying case typologies and using them to develop 
targeted transaction monitoring strategies. This leads to the need for 
more consistent collaboration between law enforcement and the financial 
services sector. The model for this type of public- and private-sector 
collaboration was set in recent years by JPMorgan Chase under the 
leadership of compliance executive William Langford and senior 
investigator Phil DeLuca. Working in conjunction with the ICE 
Department of Homeland Security Investigations (HSI), JPMorgan Chase 
was able to identify financial patterns for human smugglers and 
traffickers. This was because HSI provided specific typologies to 
JPMorgan Chase setting forth the ``how.'' This enabled JPMorgan Chase 
to identify patterns of transactional activity and develop targeted 
transactional monitoring. In so doing, JPMorgan Chase was able to 
provide HSI with financial intelligence information which led to 
successful criminal investigations. This initiative was greatly 
supported by an informal task force involving DHI and the financial 
services sector that was led by John Byrne and the Association of Anti 
Money Laundering Specialists (ACAMS). Because of the successful impact 
of this public-private partnership, ACAMS provided a special award to 
JPMorgan Chase and HSI, which was presented at the recent Money 
Laundering.com annual anti-money laundering conference. This is a great 
example of how law enforcement, in this case HSI, provided the ``how'' 
to a financial institution, JPMorgan Chase, and how the bank used the 
information to identify patterns of illicit activity. I recommend that 
the committee look at this collaboration as a model of the type of 
cooperative initiative that could be used to fight terrorist financing.
    This type of initiative could be effectively used to identify 
terrorist financing. There are a number of scenarios that could be 
identified and targeted in a similar fashion. An example would be the 
case of a lone wolf terrorist who leaves the United States and travels 
to Pakistan to attend a terrorist training camp. During the time that 
this individual attends the training camp, it is unlikely he or she 
would incur any financial activity, virtually falling off the financial 
grid. The combination of travel to Pakistan, a high-risk country for 
terrorism, and a gap in financial activity, could be identified by 
targeted financial monitoring in a financial institution.
    One of the perceived impediments to banks in regard to targeted 
transactional monitoring is the challenge of satisfying the regulators. 
Regulators are not generally forward thinkers. They deal with black-
and-white issues and are more prone to a check-the-box mentality that 
tends to stymie progressive and innovative thinking. In fairness to 
regulators, their mandate is not to think outside the box but to ensure 
that regulatory requirements are met by financial institutions. This is 
a daunting task. There is often a perplexing triangle involving 
financial institutions, law enforcement, and the regulators. BSA 
reporting requirements were established to benefit law enforcement. 
Unfortunately, financial institutions are generally more concerned with 
placating their regulators than providing the ``why'' to law 
enforcement. Financial institutions, law enforcement, and regulators 
need to come to a better consensus about the balance of law enforcement 
and regulatory considerations. This is an area that this committee or 
the House Financial Services Committee should look into.
    Certain countries pose a challenge to deal with in terms of their 
capacity or political will to establish terrorist financing regimes. 
Other countries, most notably Iran, pose a significant threat and are 
indifferent to complying with international standards as they flaunt 
their nuclear and/or other ambitions. The first step to deal with these 
situations is to coordinate a strong interagency response at the 
domestic level. This calls for relying on a combination of diplomatic, 
regulatory, intelligence, military, and law enforcement responses. By 
orchestrating a choreographed response strategy, pressure could be 
leveraged against these countries. The second step is to coordinate 
international responses and strategies with the Financial Action Task 
Force (FATF), the United Nations and other international bodies.
    There is a growing and troubling nexus between transnational 
criminal organizations, drug cartels, and terrorist organizations. Each 
has their own objective and is willing to deal with the others to 
further their own interests. The Lebanese Canadian Bank investigation 
manifests this emerging problem. It illustrated the alliance between 
Hezbollah, a terrorist organization, the Joumaa drug trafficking and 
money laundering organization in Lebanon, and the Los Zetas Mexican 
drug cartel. This troubling alliance relied on drug trafficking and 
trade-based money laundering, among other activities to facilitate the 
illicit activities of three dangerous transnational groups. The 
interagency community should closely assess the collaborative 
operations of these organizations and develop strategies to deal with 
other similar associations.
    As noted earlier, it is possible to identify terrorist financing 
but highly improbable. This is one area where collaboration and 
partnership between the public and private sector are essential. In 
2009, I wrote an article addressing how to increase the probability 
through such collaboration. For the most part, the same points I 
articulated then are applicable today. Accordingly, there are six steps 
the Government and financial services industry should take to 
collectively and unilaterally increase the probability of identifying 
terrorist financing. They are:
    1. The Government and financial sector must recognize the 
        importance of terrorist financing-specific training. This is a 
        dimension that is lacking on both sides, although more on the 
        part of financial institutions. Without specific training, the 
        ability to understand and disrupt terrorist financing is more 
        difficult to achieve.
    2. The Government must develop a means to legally provide security 
        clearances to select personnel in financial institutions in 
        order to share limited intelligence information that could be 
        scrubbed against bank monitoring systems to identify account or 
        transactional information associated with terrorists. The FBI 
        has been discussing this challenging issue since 9/11, in 
        concert with select industry compliance leaders and experts.
    3. A consistent and comprehensive feedback mechanism from law 
        enforcement must be developed that demonstrates the importance 
        of BSA reporting, especially the significance of Suspicious 
        Activity Reports (SARs). FinCEN's SAR Activity Review is a good 
        mechanism that provides insightful information. In addition, 
        specific feedback from law enforcement to financial 
        institutions concerning the value and benefit of BSA data, 
        including SAR filings, would have a dramatic impact on the 
        morale of individuals responsible for SAR reporting.
    4. There must be an assessment by the Government of all SARs 
        related to or identifiable with terrorism cases. Such a review 
        would identify specific red flags that could be used as a 
        training mechanism and more importantly, could be factored into 
        identifying typologies that could be used for the monitoring/
        surveillance capabilities of financial institutions. In 
        addition, a determination could be made as to why the financial 
        institution filed a SAR. In many instances, the SAR was filed 
        for violations other than terrorist financing. Understanding 
        what triggered the SAR filing; in tandem with how the SAR 
        ultimately was linked to terrorist interests would be 
        insightful.
    5. In addition to assessing SARs, the Government and industry 
        should collectively identify and assess as many case studies, 
        of terrorist financing-related investigations, as can be 
        identified and legally publicly accessed. The case studies 
        should be compared to determine what types of commonalities and 
        patterns of activity exist. In addition, common red flags 
        should be easily discernible. This type of case study 
        assessment, coupled with the SAR analysis, would provide more 
        meaningful information to consider in identifying terrorist 
        financing characteristics, especially in cases involving more 
        nominal financial flows. This would enable financial 
        institutions to more effectively use surveillance and monitor 
        techniques to identify questionable transactional information.
    6. A combination of BSA data, particularly SARs, combined with 
        empirical and anecdotal information would enable the Government 
        and financial sector to collectively and unilaterally conduct 
        trend analyses. This would be a significant factor in 
        identifying emerging trends. On a Government level, this would 
        contribute to implementing investigative and enforcement 
        strategies. On the institutional level, this would enable the 
        financial sector to implement strategies to mitigate risk.
    Although the landscape has changed, and methodologies have evolved 
since 9/11, terrorist financing remains the same. In essence, 
terrorists must have access to funds when they need them in order to 
operate. It is incumbent that Government agencies cooperate, 
coordinate, and communicate on both an interagency level and with the 
private sector in order to deny terrorists from moving and accessing 
funds and thereby diminishing their ability to operate.
    I would again like to thank the committee for affording me the 
opportunity to participate in this forum. I would be happy to answer 
any questions or to elaborate on my statement.

    Mr. Meehan. Let me say one thing. Unfortunately, there is 
just 6 minutes left in the vote that I must go vote on right 
now. I am struggling with how best to do this. I think they are 
going to give me a minute to sprint, so what I am going to do 
is ask Ms. Eckert to do her testimony, and then I am going to 
have to reconvene with the rest of the committee.
    Let me go to Ms. Eckert's testimony and then I will give 
you a closing comment and we will try to work from there, but I 
want to make sure you get your opportunity to hit the essence, 
Ms. Eckert. So the Chairman now recognizes Ms. Eckert.

STATEMENT OF SUE E. ECKERT, SENIOR FELLOW, WATSON INSTITUTE FOR 
            INTERNATIONAL STUDIES, BROWN UNIVERSITY

    Ms. Eckert. Mr. Chairman, thank you very much for the 
opportunity to be here, and I want to commend you and the 
committee for focusing on this vitally important issue. I don't 
think enough attention has been paid to it. Ten years with 
experience in countering the financing of terrorism, I think it 
is a very opportune time to focus on it.
    I have a number of recommendations. So I am not going to 
review what has been done with regard to al-Qaeda. There are 
specific initiatives that I am part of that we are looking at, 
the effectiveness of sanctions, for example, against Iran and 
North Korea, other sponsors of terrorism. My comments in the 
testimony and today are primarily focused on al-Qaeda.
    I won't focus right now in terms of some of the unintended 
consequences of the regime countering financing of terrorism, 
but I think it is important to pay attention to some of those 
because they have the potential to weaken what is a critically 
important initiative both globally and Nationally.
    So what I would do is just very briefly offer a couple of 
points that I think that we need to take account of as we look 
at strengthening the CFT measures.
    First is, I think it is important to understand that we 
need enhanced information analysis. There is still a great deal 
we don't know. New electronic payment methods through cell 
phones and stored value cards, digital currencies that some of 
my colleagues have been talking about are very important to 
focus on. We need to understand differences in terms of not 
only the terrorist organizations, but how they move, raise, and 
store funds. We need to develop metrics. In the past, the only 
metrics that we have had are the number of designations and the 
amount frozen. Those are clearly inadequate to--and they can be 
misleading. We haven't seen a steady progress with regard to 
that, but that doesn't mean that our terrorist financing 
initiatives are not working.
    Finally, I think one of the--for information, we need to 
analyze the information that we have and evaluate it. The 
private sector provides ample amount of information, but it 
goes into a process, as one of my colleagues has said, and it 
is not really utilized and not really analyzed except when it 
gets to the law enforcement side.
    So I think that there is an awful lot that can be done 
within the current system to be able to discern patterns that 
could assist financial institutions in identifying terrorist 
financing.
    The second major area is collaboration and information 
sharing with the private sector. The central role in this is 
the private sector. Governments don't freeze assets; the 
private sectors do. There are a number of ways. We have all 
talked about the need for greater collaboration, but I think 
that the partnerships so far has been a pretty much one-way 
flow of information.
    I think there is more that can be done. Security clearances 
for certain individuals in financial institutions; the British 
have done it to great effect. What we need to do is to 
understand that initiatives to enhance information will make 
our law enforcement intelligence efforts smarter and more 
effective.
    Inadequate capacity in other countries. We cannot do this 
alone. The United Nations has played a very important role, 
Egmont and a number of the FATF have played important roles in 
establishing this global regime, but more needs to be done to 
provide assistance to other countries to be able to put in 
place the necessary legal, administrative, and enforcement 
mechanisms to carry out this prohibition in the financing of 
terrorism.
    Further, I think that it is time, 10 years later, really 
for a critical assessment of effectiveness. In this regard 
there has been, you know, a lot focused on some of the positive 
things, but not necessarily the cost or limitations of the 
current approach and whether or not we are focusing on where 
the challenges are going and how the terrorists are raising 
moneys now. It is still focused primarily on the formal 
financial sector, and I think that we really need to take a 
good hard look at what we are doing now. As you said, I had to 
strike in my testimony the number of times I said recalibrate, 
so I am pleased that we are thinking in the same vein.
    But in short, there has been an impressive global effort to 
regulate transport or movement of funds through formal sector 
financial institutions, but al-Qaeda and other groups have 
adapted and they continue to have access to funds. In order to 
be effective we have to reassess and recalibrate policies and 
create a genuine partnership with the private sector.
    Thank you, sir.
    [The statement of Ms. Eckert follows:]
                  Prepared Statement of Sue E. Eckert
                              May 18, 2012
    Chairman Meehan, Ranking Member Higgins, and distinguished Members 
of the subcommittee, thank you for the opportunity to appear before you 
to discuss the critical issue of terrorist financing. As the disrupted 
airline bombings plot out of Yemen last week indicates, terrorist 
threats to the United States persist notwithstanding the death of Osama 
bin Laden and decline of the hierarchical organization of al-Qaeda.
    My comments are based on my previous experience as assistant 
secretary of commerce responsible for regulating dual-use goods and 
technology, as well as more recent academic initiatives to strengthen 
the instrument of U.N. sanctions. Currently, my colleague at the 
Graduate Institute in Geneva, Thomas Biersteker, and I are leading the 
Targeted Sanctions Consortium, an international group of scholars and 
practitioners conducting a comprehensive and comparative analysis of 
the impacts and effectiveness of U.N. sanctions, including those 
targeted on al-Qaeda and affiliated groups, as well as sanctions 
against Iran and DPRK. I've also worked with the United Nations 
Counterterrorism Implementation Task Force to explore the 
identification of indicators that might be useful to financial 
institutions in detecting potential terrorism financing activity. In 
this regard, I've had the opportunity to interact with the private 
sector, National regulators, and international counterterrorism 
policymakers involved in the global effort to combat the financing of 
al-Qaeda and affiliated groups. The views expressed however, are my 
own, and not necessarily endorsed by any entity or colleagues with whom 
I am affiliated.
    Due to time constraints, this abbreviated statement focuses on 
terrorism financing related primarily to al-Qaeda (AQ) and lays out 
some considerations for ways forward. I am happy, however, to provide 
an expanded statement based upon our book, Countering the Financing of 
Terrorism, and more recent initiatives assessing the effectiveness of 
U.N. sanctions.
                 evolving threat and means of financing
    Al-Qaeda today is profoundly transformed from the group that 
engineered the attacks on 11 September 2001. The once-hierarchical 
organization evolved into a confederation of allied entities, and 
subsequently into a general jihadi movement, with al-Qaeda core (AQC) 
serving more as an inspirational vanguard, a source of legitimization 
and justification for acts of global terrorism by affiliates, rather 
than as a source of the planning, financing, and execution of terrorist 
attacks. Regional affiliates such as AQ in the Arabian Peninsula 
(AQAP), AQ in the Islamic Maghreb (AQIM), and al-Shabaab in Somalia, 
now outnumber AQC remnants in Pakistan and remain committed to al-Qaeda 
ideology. Even with new revelations about bin Laden's final activities 
in Abbottabad, the AQ affiliates constitute the more significant 
contemporary terrorist threat.
    Likewise, the means by which terrorists finance activities have 
changed, and today largely consist of criminal means conducted within a 
state. Formal sector transactions and even the transnational movement 
of funds by AQ have been severely constrained, in part due to the 
success to the extensive global efforts to counter the financing of 
terrorism (CFT). Formal sector financial institutions generally have 
not been used for the transfer of funds across international borders to 
AQ since 2003; rather, AQ affiliates have increasingly resorted to the 
use of cash couriers and barter trade to move funds. Self-financed 
criminal activities such as credit card and check fraud, theft, 
extortion, and kidnapping for ransom represent more common methods 
utilized by terrorists to finance their activities.\1\ Charitable 
donations as a significant means of financing terrorism also appears to 
have diminished, as recent evidence concerning the diversion from 
Islamic charities is lacking (and most of the legal cases resulting in 
successful convictions have been based more on violations of tax and 
reporting rules, rather than terrorist financing). While informal value 
transfer systems or hawala were used for the transfer of funds prior to 
the attacks of 11 September and most recently by the Times Square 
bomber, the overwhelming majority of such transfers are legitimate and 
advance important social and global developmental functions.
---------------------------------------------------------------------------
    \1\ Note that this is not the case with the Taliban which has 
adapted over time in Afghanistan and Pakistan, in large part due to 
territorial control facilitating revenues through taxation of drug 
production, transiting goods, diversion of international assistance, 
and ransom from kidnappings.
---------------------------------------------------------------------------
    Recognition of the changing structure and financing of AQ and 
affiliated groups is important, as effective strategies for countering 
the financing of terrorism must similarly adapt to the current threat. 
With more than a decade of CFT experience, now is an opportune time to 
take stock of what has been accomplished in order to recalibrate U.S. 
and international efforts to more effectively address the evolving 
nature of terrorist financing. I commend the subcommittee for focusing 
on this issue, and hope additional review will be undertaken.
    In this regard, it is worth remembering that prior to 9/11, there 
was little concerted attention focused on terrorist financing, with al-
Qaeda able to raise funds from donors in Gulf States and charitable 
organizations and move them through financial institutions. Few 
requirements other than those mandated by UNSCR 1267 existed to 
restrict financing, with almost no emphasis on implementation (indeed, 
country reports prior to 2001 largely consisted of one sentence--``We 
have taken all necessary steps to comply with the resolution.'') In the 
past decade, there has been a sea-change in the recognition and 
implementation by Member States of legal, administrative, and 
enforcement measures to combat terrorism financing.
                    cft developments and challenges
    Since 9/11, we've witnessed an impressive global initiative to 
disrupt financial support for terrorism. The United States has worked 
diligently to launch a worldwide campaign to make it more difficult, 
costly, and risky for AQ and affiliated groups to raise and move money 
around the world. As a result, new and significant international 
institutional frameworks have evolved to address CFT, including crucial 
roles by the United Nations Security Council, the Financial Action Task 
Force, the World Bank, IMF, Egmont Group, as well as private-sector 
initiatives like the Wolfsberg Group. UN Security Council Resolutions 
1267, 1373, and 1540 (and successor resolutions) provide the legal 
basis and legitimacy for Member States to take necessary steps to put 
into place National legal and administrative mechanisms to freeze 
terrorist assets. Multilateral CFT efforts have been essential in 
stemming terrorist funds.
    The global CFT regime utilized preexisting policy instruments but 
greatly expanded them. Through designations or listings of individuals, 
organizations, and corporate entities and the freezing of their assets, 
CFT efforts have primarily focused on preventing the use of formal 
sector financial institutions for the trans-border transfer of funds 
that could be used to support acts of terrorism. Initiatives to license 
informal value transfer systems and register charities have also 
resulted.
    Notwithstanding the important accomplishments of terrorism 
sanctions to date, complications and unintended consequences have 
arisen. National and regional courts have faulted the U.N. process of 
designating individuals as well as with the adequacy of procedures for 
challenging those designations. Perceptions of unfairness in the 
application of targeted sanctions and potential violation of due 
process have generated concern and public opposition in several 
countries, including among legislatures, threatening to undermine the 
credibility and effectiveness of U.N.-targeted sanctions. The most 
prominent case of Saudi businessman Yassin Abdullah Kadi, is still 
under appeal at the European Court of Justice, but if successful could 
force the European Union not to implement mandatory Chapter VII 
sanctions thereby establishing a dangerous precedent and potentially 
undermining U.N. terrorism sanctions. Notwithstanding important 
procedural enhancements in recent years, however, legal challenges 
persist. This problem cannot be ``solved'' definitively, but rather 
must be managed to dissuade national or regional courts from 
questioning the underlying security rationale for listings. Continued 
review of U.N. designations and innovations in the delisting process 
are necessary for the legitimacy of international CFT measures and the 
future utility of the instrument of multilateral sanctions.
    The freezing of assets or exclusion from the international 
financial system are indeed powerful terrorist financing tools, but 
such measures can have far-reaching consequences. Fears that there 
would be a decline in charitable contributions to Muslim charities have 
been realized to an extent, which could have implications for efforts 
to address root causes of terrorism. Targeted financial sanctions are 
not as targeted as they might initially appear; in the case of al 
Barakaat, the collateral damage of freezing the assets of the broad 
group of companies led to severe disruption of fund transfers to a 
large portion of the Somali population. Concerns for the risks involved 
with money service businesses (MSBs) resulted in the shuttering of 
Somali MSBs in several states, leaving large diaspora communities 
without viable means to transmit money cheaply and efficiently to 
relatives since there is no functioning banking system in Somalia.
    Moreover, the regulatory burden on financial institutions has 
increased considerably. Compliance with enhanced reporting 
requirements, new internal procedures to screen customers, and train 
staff to block or freeze individual transactions have escalated costs 
as responsibility for CFT implementation rests primarily with the 
private sector. In addition, banks have terminated relationships with 
perceived risky sectors--MSBs, embassy banking, and certain 
correspondent banking relationships, resulting in the labeling of some 
sectors as ``unbankable.'' The dramatic increase in the volume of 
information submitted by financial institutions, including the millions 
of SARs filed annually, which remain largely unanalyzed and continues 
to be a source of frustration to financial institutions. Processing 
information is far more important than simply accumulating it, and it 
is important that regulation be prudently designed with this in mind.
    Likewise, the success of CFT instruments ultimately depends on 
parallel implementation by other countries. Despite progress since 
September 11, serious deficiencies of capacity within Member States to 
implement CFT measures exist (e.g. to criminalize terrorist financing, 
prohibit financial support to terrorists, and freeze the assets of 
those who commit or support terrorist acts). Implementation is uneven, 
and in some states, capacity is virtually nonexistent. Enhanced 
initiatives to assist countries in building the legal and 
administrative infrastructure to implement and enforce financial 
sanctions are necessary.
    Overall, however, CFT efforts have constrained AQ and its 
affiliates in their ability to access essential support. As noted by 
the 1267 Monitoring Team in a recent report, financial sanctions have 
among other things, restricted the ability of those listed to continue 
to promote the objectives of AQ and their associates, alerted law 
enforcement to the activities of listed parties, and signaled to the 
world (and other potential financiers of terrorism) the resolve of the 
international community to combat funding of terrorism. While far from 
perfect and with much more that can and should be done to strengthen 
CFT measures, it is important to keep these accomplishments in mind--
indeed, the glass is more than half full!
        considerations for the second decade of cft initiatives
    As the United States and the international community move forward 
to strengthen CFT policies in the coming years, the following 
considerations are useful to keep in mind:
   The importance of realistic expectations as to what 
        financial sanctions can reasonably achieve. Terrorism will 
        continue, and AQ still exists (with access to funds). This does 
        not mean that TF initiatives are ineffective, but rather we 
        must be cognizant of the appropriate role of TF sanctions play 
        as but one element in a larger CT strategy.
   When assessing the impact and effectiveness of CFT measures, 
        it is essential to appropriately define the purposes. An 
        innovation of the Targeted Sanctions Consortium's methodology 
        \2\ includes evaluating effectiveness of sanctions in terms of 
        multiple and differing purposes of sanctions, to: (1) Coerce or 
        change targets' behavior; (2) constrain terrorist activities 
        (or access to essential resources such as funds thereby raising 
        costs and forcing changes in strategy); and (3) signal/
        stigmatize targets violating international norms through 
        terrorist acts.
---------------------------------------------------------------------------
    \2\ For more information about the Targeted Sanctions Consortium, a 
comprehensive, systematic, and comparative assessment of the impacts 
and effectiveness of U.N. targeted sanctions regimes over the past 20 
years, see http://graduateinstitute.ch/internationalgovernance/
UN_Targeted_Sanctions.html.
---------------------------------------------------------------------------
   While progress has been made in CFT, terrorists are 
        constantly evolving the means by which they raise and use 
        funds; the international response needs to be dynamic as well. 
        The basic framework focusing on preventing the use of formal 
        sector institutions for cross-border transfers of funds remains 
        largely unchanged. New strategies and tools to address current 
        financing (e.g. cash couriers, stored-value instruments, 
        informal value transfer systems (IVTS), kidnapping etc.) are 
        necessary.
   CFT measures are considered among the most ``effective'' 
        sanctions, yet there is public perception that sanctions 
        generally are not effective. More needs to be done to 
        demonstrate and make the case regarding the effectiveness of TF 
        sanctions.
    With terrorists' evolution of financing means, it is critical to 
continually review and adapt U.S. and international CFT responses. 
Military planners are famous for preparing for the last war, and it is 
important that those concerned with countering the financing of 
terrorism not make such a mistake. Al-Qaeda has changed. The nature of 
its fundraising has changed. The ways in which it moves, stores, and 
uses funds have changed. It is important that CFT efforts proceed from 
this knowledge, rather than squander limited resources.
    The following are general areas that could be considered in future 
efforts to strengthen CFT measures:
Enhanced information and analysis
    The old adage--the more you know, the more you realize how much you 
don't know--applies amply to the subject of terrorist financing There 
is still a great deal we do not know, for example, regarding the use of 
informal value transfer systems, trade diversion, traditional cash 
smuggling, and new electronic payment methods through cell phones, 
stored value cards, and digital currencies. Notwithstanding greater 
understanding regarding AQ's financing of terrorism, and ``despite all 
of our sophistication, we have neither starved the beast nor produced 
very good intelligence on how exactly these organizations continue to 
finance themselves,'' as Lee Hamilton noted. There is a significant 
need for the further research and analysis in this area.
            Differentiate among groups and means to finance terrorist 
                    operations
    It is important that CFT initiatives distinguish between (and 
differentiate among) groups committing acts of terrorism. Those acting 
on a global scale, like AQ, have different needs and means of financing 
themselves, particularly when they are compared to groups acting on a 
local or regional scale. Territorial-based groups can extract resources 
in ways that approximate the state (i.e. Taliban exacting tariffs or 
quasi-taxes from the population). There are fundamental differences in 
the goals, scope of operations, and the ultimate objectives of groups 
acting globally and groups contained within a defined territorial 
space. Extending existing CFT efforts aimed at al-Qaeda to other 
circumstances risks diffusing the effort and decreasing effectiveness. 
One size does not fit all.
            Develop metrics
    There are relatively few quantitative indicators and reliable 
sources of information to assess CFT initiatives but it would be useful 
to try to devise additional metrics of effectiveness. Metrics most 
commonly associated with terrorist financing--the total number of 
designations and the amount of money frozen--are inadequate and can be 
misleading. As difficult as such an endeavor would be, it is important 
to attempt to assess the effectiveness of CFT efforts. The consequences 
of failing to do so are inappropriate and potentially ineffective 
policies to thwart terrorist acts. Policymakers and academics alike 
must demand better and more transparent sources of information in order 
to more thoroughly understand and assess terrorist financing efforts.
            Evaluate and analyze TF information
    As noted by others, FinCEN receives nearly a million Suspicious 
Activity Reports (SARs) from financial entities annually, of which less 
than 1% relate to TF, yet little systematic analysis of the information 
results. FinCEN generally passes SARs on to the FBI who integrates the 
information into their database in order to identify trends and 
suspicious transactions. However, the current system lacks requirements 
for the systematic analysis of data to be able to discern patterns that 
could assist FIs in screening for terrorist-related transactions.\3\ 
The same applies to sharing of case information at the international 
level through which comprehensive analyses, lessons learned, policy-
useful conclusions and guidance for both Government agencies and the 
private sector could possibly emerge. Is it an issue of resources or 
lack of priority? What could and should be done to most effectively 
mine the information reported by FIs? USG officials have previously 
referenced the number of cases in which financial information from SARs 
played a role; this information should be updated and made available.
---------------------------------------------------------------------------
    \3\ An initiative by a group of researchers to collect and analyze 
examples of terrorist financing (TF) through financial institutions in 
order to discern indicators of terrorism finance was stymied by the 
lack of access to information (sanitized SARs redacted of identifying 
info which DoJ was willing to provide).
---------------------------------------------------------------------------
            TF prosecutions
    Successful prosecution on TF grounds are limited--in many cases of 
suspected financing, convictions are easier to obtain on alternative 
charges. Should we be concerned with the relatively small number of 
successfully prosecuted TF cases? What are the obstacles, and are 
legislative changes needed?
Collaboration/information sharing with financial sector
    Despite 10 years of espousing the need for closer public-private 
partnership to combat TF, the two-way exchange of information remains 
limited--in most cases, it's the financial community providing input 
with very little feedback. The FBI created a financial sector working 
group that meets periodically, but compliance officials still complain 
about a lack of information to help detect terrorist transactions. 
Analysis of SARs information that aided in law enforcement 
investigations could help FIs identify typologies and trends they 
should be alert to.
    The United Kingdom has instituted a system whereby select 
representatives of financial institutions receive security clearances 
so sensitive information regarding transactions can be shared. A 
similar initiative has been discussed in the United States, but little 
progress seems to have been made. Is this a good idea, and if not, why 
not? What are other ways in which the USG can collaborate with 
financial institutions? Are additional protections (i.e. safe harbor 
provisions) needed?
    Notwithstanding the absence of reliable terrorism financing 
indicators, the information provided by financial institutions remains 
critically important to intelligence and law enforcement efforts to 
disrupt terrorism. When intelligence on possible terrorist activities 
is shared with financial institutions, the information they provide is 
often vital and unavailable from other sources. New initiatives to 
enhance information sharing between governments and the private sector 
should be prioritized.
Address inadequate CTF capacity in other countries
    To be effective, CFT measures must be implemented in a comparable 
manner by other countries. While the United Nations is an important 
source of legitimacy (requiring Member States to criminalize the 
financing of terrorism and to freeze the assets of individuals/entities 
designated as terrorists) only Member States can put into place the 
necessary legal, administrative, and enforcement measures to counter 
TF. Even with successes as noted, there remain significant deficiencies 
in the capabilities of many Member States to meet their international 
CFT obligations (to criminalize terrorist financing, prohibit financial 
support to terrorists, and freeze the assets of those who commit or 
support terrorist acts). More needs to be done to provide adequate 
assistance for MS to put into place the necessary legal, 
administrative, and compliance measures, and current initiatives should 
be enhanced
Great public awareness and understanding of CTF initiatives
    There is a need for broader understanding of the importance and 
utility of CFT measures, both designations and terrorist financing 
tracking. Most information regarding the reasons for designations and 
the effectiveness of the CFT in identifying networks or preventing acts 
of terrorism is closely held by Government agencies. While protection 
of sources and methods is necessary, excessive classification and lack 
of documentation to justify designations undermines public confidence 
in, and support for, the CFT regime.
Critical assessment of CFT effectiveness
    Ultimately, the effectiveness of National and global efforts to 
counter the financing of terrorism depends on the nature of the threat 
(the assessment of risk) and the appropriateness of the response to 
that threat (i.e. that the benefits of the policy response outweigh the 
costs of the measures enacted). When it comes to an assessment of the 
benefits of CFT efforts, there is strong evidence that it is more 
difficult for AQ and affiliated groups to use the formal financial 
sector to support operations today. The capacity of AQ and others to 
commit acts of terrorism has been degraded. Yet there is little 
systematic assessment of the costs and limitations of the current 
approach. ``Staying the course'' of current policy may nor be the most 
appropriate action, especially given the changing and adapting nature 
of al-Qaeda.
    Beyond these general areas, specific consideration should be given 
to:
    Charities.--Traditionally, al-Qaeda and other groups have utilized 
charities, NGOs, and mosques to raise funds through direct 
solicitations and diversion of donations intended for humanitarian 
purposes. While the risk of abuse of the charitable sector remains 
real, a differentiated approach, distinguishing between financing 
humanitarian networks affiliated with resistance groups and financing 
terrorism, is needed. Blanket condemnation of groups providing social 
welfare services alienates Muslim constituencies and prevents aid from 
reaching those most in need. Government efforts should focus on 
assisting charities to be more transparent; clarifying what constitutes 
financing of terrorism and association; designating independent bodies 
to regulate and investigate charities; and accrediting charities or 
developing indicators of trust/approval so that contributors know the 
group can be trusted to deliver support to appropriate projects.
    In addition, zakat contributions are central to the practice of 
Islam, and a policy that places charitable giving to Islamic 
organizations under general suspicion contributes to a perception that 
the effort is directed against the entire Muslim community, rather than 
a very small segment of that community. Not only is this profoundly 
unfair, but it will ultimately undercut the effectiveness of other 
counter-terrorism efforts. Special effort must be taken to reaffirm 
support for charitable giving through transparent processes.
    Informal Transfers.--Regulation of remittance vehicles is 
necessary, but should be done in a way that is proportionate to risk 
and appropriate to particular socio-economic environments. In countries 
where informal systems exist alongside a well-functioning conventional 
banking sector, hawala or other informal value transfer systems (IVTS) 
should be registered and required to keep adequate records. In states 
at risk of institutional collapse or states without functioning banking 
systems, requirements beyond registration may not be feasible. 
Governments should conduct outreach efforts to consult, engage, and 
build consensus among IVTS operators with regard to the most 
appropriate measures. Positive incentives should be created for 
participants in the sector to implement regulatory frameworks. In this 
regard, greater emphasis should be placed on the traceability of 
transactions, rather than centralization of data and should be 
sufficiently flexible so as not to drive IVTS underground.
    Trade Diversion.--International trade is vulnerable to abuse by 
terrorists, as well as other criminals, through false invoicing and the 
use of commodities to move funds, yet relatively little attention has 
been focused on this mechanism. Governments need a more concerted focus 
on trade diversion, both through greater understanding of the threat 
posed by lack of trade transparency and the techniques used, as well as 
specific efforts directed at anticipating, detecting, and thwarting 
attempts by terrorist groups or their supporters to take advantage of 
this mechanism. Trade transparency units to analyze, share, and track 
international trade data to identify anomalies have been formed, albeit 
more slowly than hoped. Greater cooperation with the private sector 
victimized by diversion schemes should be explored, and enhanced 
priority placed on interagency cooperation and prosecution of trade 
diversion cases.
    Since 9/11, an impressive global effort to regulate the trans-
border movement of funds through formal sector financial institutions 
has ensued, but AQ and other groups have adapted and developed 
alternative means to raise and move funds to continue their terrorist 
activities. In order to be effective, CFT policies continually must be 
reassessed and recalibrated. Genuine partnership between the private 
sector and Government is critical to effective CFT policies, and new 
ways of sharing information and creating incentives for compliance must 
be explored.
    Thank you for the opportunity to discuss terrorist financing since 
9/11--I look forward to questions and being of assistance to the 
committee.

    Mr. Meehan. Well, thank you each for your testimony. I am 
very frustrated that we are competing with what was a very 
dynamic schedule over in the House. I am going to at this point 
in time recess the committee, and I have to be candid in saying 
it is not likely we are going to be able to collect the 
membership that I think this issue deserves. I am hoping that 
we will recess and look for an opportunity to reconvene at a 
point in time that will be convenient for you and us. I am 
hoping that you would still be able to participate. The issue 
we are discussing is too important to rush through in this 
forum, and I think that you have laid the groundwork with your 
testimony today that will allow us to have a jumping-off point 
in any number of areas.
    The service that you each have given to our country at the 
critical time as we began this process was vital to the 
protection of this Nation, but it is the continuing ability for 
us to adapt as our enemy has adapted that is going to allow us 
to protect this Nation in the future. Few people are talking 
about this. You understand it. We have got to communicate this, 
and do it effectively.
    So I thank you. We will follow up at a later time, but at 
this point in time, without objection, the subcommittee is in 
recess subject to the call of the Chair.
    The Chair indicates that we will consult with the Minority 
in order to provide Members with adequate notice of when we 
will convene.* Thank you for your testimony, and I look forward 
to following up with you at an another forum in which we can 
develop these issues far more broadly. Thank you.
---------------------------------------------------------------------------
    * The subcommittee did not schedule a continuation of this hearing.
---------------------------------------------------------------------------
    [Whereupon, at 11:55 a.m., the subcommittee was adjourned.]


                            A P P E N D I X

                              ----------                              

      Questions From Chairman Patrick Meehan for Jonathan Schanzer
    Question 1a. With our military successes against al-Qaeda core 
leadership in Afghanistan and Pakistan, there is a growing trend of al-
Qaeda affiliated groups and adherents filling the void and taking the 
lead in launching attacks against the homeland.
    Given the relatively low amount of money required to plan and 
launch a terrorist attack, how realistic is it to expect U.S. and 
international counterterrorism entities to identify funds that might be 
used to undertake terrorism-related activity?
    Answer. The 9/11 Commission's Executive Summary notes that the 
United States must ``expect less from trying to dry up terrorist money 
and more from following the money for intelligence, as a tool to hunt 
terrorists, understand their networks, and disrupt their 
operations.''\1\ I fully agree with this assessment. This does not mean 
that we should stop trying to identify funds marked for terrorist 
activity. But recent years have seen a decline in the identification or 
seizure of such funds.
---------------------------------------------------------------------------
    \1\ ``The 9/11 Commission Report--Executive Summary,'' National 
Commission on Terrorist Attacks Upon the United States, July 2004, 
http://govinfo.library.unt.edu/911/report/911Report_Exec.pdf.
---------------------------------------------------------------------------
    Question 1b. What are some of the persistent challenges in 
identifying and investigating an activity suspected of financing 
terrorism? What are some of the trends in how terrorist groups 
acquiring funds to support their objectives?
    Answer. My sense is that there is just not enough collection being 
done for this purpose. Indeed, there are too many other intelligence 
challenges that our Government is working to meet. As always, 
allocation of resources requires tough choices. In terms of trends, as 
I noted in my prepared testimony, terrorists are increasingly 
gravitating to organized crime to support their objectives. This 
provides an opportunity for intelligence specialists to work hand-in-
hand with law enforcement.
    Question 1c. Is the decision to pursue a terror financing 
investigation based on the amount of money suspected of being acquired 
for terrorism-related purposes? If so, what is the minimum monetary 
amount of terrorism-related funds the U.S. Government assesses as 
worthy of investigating?
    Answer. I am no longer in a position to answer that. When I served 
in Government, the specific amount was not a primary consideration.
    Question 1d. Can you describe the decision-making process and 
considerations by which the U.S. intelligence and law enforcement 
communities decide whether to stop terrorism-financing related activity 
and charge a suspect arrest or choose to allow the activity to continue 
in hopes of following the trail of funds to a larger network of support 
or to entities that may be planning a terrorist attack?
    Answer. When I served in Government, the decision to designate was 
one undertaken by an inter-agency working group. The different agencies 
could, at times, disagree about the need for designation. This could 
sometimes slow the process.
    Question 2. President Obama recently signed an Executive Order 
allowing the Treasury Department to freeze U.S.-based assets of persons 
who the White House has identified as a ``threat to the peace, 
security, and stability'' of Yemen.
    Do you think this is an effective use of the designation authority? 
Especially when a group such as Boko Haram--who have killed thousands 
of civilians and are in constant contact with AQIM--remain 
undesignated?
    Answer. AQIM and Boko Haram are important targets. But governing is 
about choosing priorities. In this case, I think the Yemeni 
designations were the more pressing ones. Juan Zarate, a former Bush 
administration counterterrorism adviser, also agrees that these 
designations can ``help steer toward political stability in Yemen.''\2\
---------------------------------------------------------------------------
    \2\ Arshad Mohammed and Jason Lange, ``U.S. Sends Warning to Saleh 
Backers in Yemen,'' Reuters, May 16, 2012, http://www.reuters.com/
article/2012/05/17/us-usa-yemen-assets-idUSBRE84F1GS20120517.
---------------------------------------------------------------------------
    Question 3a. In 2011, the U.S. Government revealed the findings of 
a multi-year law enforcement operation to dismantle a complex, 
transnational network involved in money laundering and drug 
trafficking. The case involved Hezbollah, Mexican, and Colombian drug 
trafficking organizations, the Taliban, Lebanon, Colombia, Panama, 
several countries in West Africa, U.S. car buyers, a U.S. shipping 
company, bulk cash couriers, plans for weapons trafficking deals, and 
the Beirut-based Lebanese Canadian Bank (LCB).
    Does the fact that groups such as Hezbollah and the Islamic 
Revolutionary Guard Corps continue to use criminal ventures create 
opportunities for U.S. enforcement mechanisms--such as our robust 
counternarcotics tools--to roll up these vast networks?
    Answer. Yes, the involvement of terrorist groups in criminal 
ventures creates exploitable opportunities. David Aufhauser, former 
general counsel of the U.S. Department of Treasury, notes that ``both 
terrorist financing and traditional financial crimes have one thing in 
common--they leave a financial footprint that allows us to trace 
financial flows, unravel terrorist financing networks, and uncover 
terrorist sleeper cells.''\3\ Our Government has tools at its disposal 
to uncover that footprint.
---------------------------------------------------------------------------
    \3\ David Aufhauser, ``The Threat of Terrorist Financing,'' United 
States Senate Committee on the Judiciary, June 26, 2003, http://
www.au.af.mil/au/awc/awcgate/congress/terrorist_financing.htm.
---------------------------------------------------------------------------
    I have also noted that when terrorist groups--particularly 
religious ones--enter into the world of organized crime, it creates a 
liability from the perspective of public relations. When pious 
ideologies are sullied by criminal funds, this is something the U.S. 
Government should exploit.
    Question 3b. How does counterterrorism fit in this increasingly 
interconnected underworld?
    Answer. From what we have seen, Middle East terrorist groups 
maintain a pious public face in their home territories, but engage with 
the underworld in far-off places, such as Latin America or West Africa. 
In a few cases, such as that of the Colombian FARC, groups directly 
engage with the underworld to their own detriment.
    Question 4a. The U.S. Government's on-going investigation of the 
Lebanese Canadian Bank is of particular interest from a money 
laundering perspective because it highlights the consequences of poor 
compliance with anti-money laundering regulations in the formal 
financial system.
    Given the Lebanese Canadian Bank case, what more can be done to 
protect the formal financial system from exploitation by terrorists?
    Answer. This case exposed the weakness of the FATF system. The 
system simply does not put enough pressure on countries that are less 
motivated to fight terrorism. We need to strengthen the international 
system. There needs to be tougher penalties for noncompliance.
    Question 4b. How can the U.S. Government more effectively mitigate 
the threats posed by trade-based money laundering and bulk cash 
smuggling and other ways outside the formal financial sector?
    Answer. This is also a problem that stems from the weakness of the 
FATF system. We need to apply greater pressure on those countries where 
trade-based money laundering and bulk cash smuggling is pervasive. The 
primary problem is a lack of sustained effort. But, as always, even in 
countries where there is a will, there may be a lack of resources.
    Question 5. There is an increasing concern in the counterterrorism 
and intelligence community that terrorist organizations are 
increasingly using criminal activities that are outside of the formal 
international financial system to raise funds to carry out attacks and 
further their goals.
    How important are terrorist funds derived from criminal activities 
for the operational sustainability of major terrorist groups compared 
to other non-criminal sources of funds, including state sponsors and 
private sector donations?
    Answer. The problem is pervasive. In 2003, the Orlando Sentinel 
reported that according to Gen. James T. Hill, commander of the U.S. 
Southern Command, ``Radical Islamic groups in the Middle East are 
getting between $300 million and $500 million a year from various 
criminal networks in Latin America.''\4\ Moreover, Brazil estimates 
that ``more than US$6 billion a year in illegal funds is laundered in 
the [tri-border area],'' according to a recent U.S. Government report. 
The same report stated that ``Hizballah clearly derives a quite 
substantial amount of income from its various illicit activities in the 
TBA, in addition to financial support from the government of Iran and 
income derived from narcotics trafficking in Lebanon's Al Beqa'a 
Valley.''\5\
---------------------------------------------------------------------------
    \4\ ``U.S. General: Islamic Rebels Get Cash From Latin America 
Gangs,'' Orlando Sentinel, March 10, 2003, http://
articles.orlandosentinel.com/2003-03-10/news/0303100117_1_latin-
america-southern-command-miami.
    \5\ ``Terrorist and Organized Crime Groups in the Tri-Border Area 
(TBA) of South America,'' Federal Research Division--The Library of 
Congress, December 2010, http://www.loc.gov/rr/frd/pdf-files/
TerrOrgCrime_TBA.pdf.
---------------------------------------------------------------------------
    Question 6. Foreign Terrorist Organization designation by the 
Secretary of State is an important tool our Government uses to deter 
donations or contributions to and economic transactions with terrorist 
organizations. There are currently 50 groups listed by the State 
Department as designated Foreign Terrorist Organizations.
    Which FTO-designated groups would you say are the best resourced 
and most proficient at evading American and international financial 
regulations? Which use the U.S. financial system the most?
    Answer. Over time, just about every designated terrorist 
organization has learned how to evade U.S. sanctions. They have largely 
dropped out of the formal financial sector and severely limited their 
exposure to institutions where the United States has jurisdiction. This 
is why it has become harder to ``catch'' terrorist money.
    Question 7. All of the witnesses mentioned in their prepared 
testimony that the Government needs to interact with the financial 
sector to identify terrorist financing.
    How should the Government develop more effective case typologies 
and feedback mechanisms about how terrorists use financial 
institutions? Is this mostly an educational issue where we need to 
empower financial institutions in order to monitor transactions for 
suspicious or anomalous behavior?
    Answer. America's financial institutions employ compliance 
professionals to ensure that terrorists do not exploit their services. 
A robust continuing education program is something that could be 
considered.
    Question 8a. The Financial Action Task Force on Money Laundering is 
comprised of 36 member countries and territories and two international 
organizations and was organized to develop and promote policies to 
combat money laundering and terrorist financing. The FATF relies on a 
combination of annual self-assessments and periodic mutual evaluations 
that are completed by a team of FATF experts to provide information and 
to assess the compliance of its members to the FATF guidelines.
    What are the areas of greatest need for improvement in the FATF 
surveillance process?
    Answer. Special recommendations, rather than laws, create an 
environment where compliance appears less than mandatory. Similarly, 
mutual evaluations carry less weight than official oversight. FATF's 
multilateral structure makes it easy for countries to do the minimum 
required of them. This is a culture that, in my opinion, needs to be 
addressed.
    Question 8b. How does the United States evaluate the threats to the 
global economy arising from money laundering, terrorist financing, and 
financing the proliferation of weapons of mass destruction?
    Answer. I don't believe I am equipped to answer this question.
    Question 8c. How should we be prioritizing these threats and how 
effectively has the FATF process been in addressing these threats?
    Answer. I don't believe that FATF has been terribly effective in 
addressing these threats. These are topics of conversation at FATF, but 
not necessarily action items. As for the United States, our Government 
continues to assess threats and makes decisions based on priorities. In 
all of these areas, our Government has allocated significant resources.
    Question 9. KPMG, a private consulting firm, released in October 
2011 the findings of an anti-money laundering survey of major 
international banks. They found that 80% of respondents reported an 
increase in costs associated with anti-money laundering that averaged 
around 45% since 2007. The major sources of cost increases identified 
by the KMPG survey were: (1) Enhanced transaction monitoring, (2) 
increased external reporting requirements to internal regulators and 
external law enforcement agencies, and (3) increased anti-bribery and 
anti-corruption activities.
    In your opinion, are there sufficient resources devoted to 
countering the financing of terrorism and money laundering? 
Alternatively, are the resource costs associated with implementing such 
financial regulations too burdensome on either the private or public 
sectors?
    Answer. According to a Congressional Research Service report, 
``traditional anti-money-laundering tools appear to be of limited use 
in disrupting terrorist financing.''\6\ Accordingly, it may not make 
much sense to devote more resources to the anti-money-laundering 
component of the problem. Critics also question the need for increased 
funds going to the Treasury's counterterrorism efforts because less and 
less cash has been frozen. But this fails to take into account how 
effective Treasury has been in squeezing Iran with sanctions. This 
effort, designed to help prevent Iran from attaining a nuclear weapon, 
also happens to deprive the regime of the cash that it previously used 
to finance terrorism. This has been a net positive. For this reason, I 
believe the funding of Treasury's programs should continue.
---------------------------------------------------------------------------
    \6\ Rensselaer Lee, ``Terrorist Financing: The U.S. and 
International Response,'' Congressional Research Service, December 6, 
2002, http://www.law.umaryland.edu/marshall/crsreports/crsdocuments/
RL31658_12062002.pdf.
---------------------------------------------------------------------------
    Question 10. There has been growing concern at DHS, particularly 
within ICE, about the widespread use of prepaid and stored value cards 
as a way of smuggling illicit funds into the country which could fund 
terror activity. Some estimates are that $1 billion annually is moved 
into the country this way, with most of those funds nearly impossible 
to track.
    Would you agree that prepaid and stored value cards are a growing 
danger to being able to target terrorist financiers? What steps would 
you recommend DHS and the Department of the Treasury take to combat 
this emerging trend?
    Answer. According to Dennis Lormel, ``There is no empirical 
statistical data establishing the nexus between credit card 
exploitation and terrorism.'' Based on my experience, I largely agree 
with this. When I served at Treasury, I personally saw cases that 
proved to be rare exceptions.
    Lormel also states that ``The focus for credit card fraud should be 
placed on both the source and availability or distribution of funds.'' 
He notes that ``Al-Qaeda operatives commit credit card information 
theft and fraud more on an individual basis than as a group or cell 
activity; however, depending on the circumstances, they will commit 
fraud as a group or cells.'' In contrast, he says that ``Because 
Hezbollah functions like an organized crime family, their criminal 
activities, which include credit card information theft and fraud, are 
more likely to be group or cell oriented.''\7\ These are trends that 
need to be examined moving forward.
---------------------------------------------------------------------------
    \7\ Dennis Lormel, ``Terrorism and Credit Card Information Theft,'' 
Shift4 Corporation, September 2007, http://www.shift4.com/pdf/s4-
wp0806_terrorism-and-credit-card-information-theft.pdf.
---------------------------------------------------------------------------
    Question 11a. On June 29, 2012, the Obama administration imposed 
sanctions on a pair of informal money-exchange networks--known as 
hawalas--in Afghanistan and Pakistan in what officials described as the 
first use of the tactic to attack the financial underpinnings of 
Taliban militants who rely on the system to fund their insurgency. The 
Treasury Department said that the designations were coordinated with 
similar measures adopted by the United Nations as part of a broad 
effort to slow the flow of cash used by the Taliban to pay salaries and 
purchase weapons for attacks in Afghanistan. The United Nations also 
added the names of the same two institutions and their principal 
backers to a list of groups officially associated with Taliban 
militancy, meaning they will be subject to international sanctions as 
well.
    Considering how widespread their use is, how difficult is it for 
U.S. Government to really get a handle on some of the terror financing 
and money laundering activities being conducted under the hawala 
system?
    Answer. The hawala system is a tough challenge. While tens of 
billions of dollars pass through hawaladars each year, a recent GAO 
report states that ``officials and researchers we spoke with could not 
provide estimates on the extent of terrorist use of informal banking 
systems and other alternative financing mechanisms.''\8\
---------------------------------------------------------------------------
    \8\ ``Terrorist Financing,'' Government Accountability Office, 
November 2003, http://www.gao.gov/new.items/d04163.pdf.
---------------------------------------------------------------------------
    According to the 9/11 Commission's monograph on terror financing, 
the hawala system has become less of an issue when tracking the funds 
of al-Qaeda. After we began actively tracking terror financiers, 
operatives shifted to bulk cash smuggling.\9\
---------------------------------------------------------------------------
    \9\ ``Monograph on Terror Financing,'' National Commission on 
Terrorist Attacks Upon the United States, Accessed July 23, 2012. 
http://www.9-11commission.gov/staff_statements/
911_TerrFin_Monograph.pdf.
---------------------------------------------------------------------------
    And while hawalas may continue to pose a significant terror finance 
threat, according to Robert Looney, ``a crackdown by Arab and South 
Asian governments at the behest of Western governments is simply not 
feasible. The vast majority of the money is from legal, legitimate 
sources, and the hawala organizations are numerous and extremely 
powerful.'' He correctly adds that, ``if the desire of the authorities 
is to constrain or significantly reduce the importance of hawala 
activity, this means reducing the economic incentives to use the Hawala 
system. There is probably no better way to accomplish this than to 
facilitate cheap, fast remittances across international boundaries, and 
to do away with dual and parallel exchange markets, which are always an 
incentive to keep transactions underground.''\10\
---------------------------------------------------------------------------
    \10\ Robert E. Looney, ``Following the Terrorist Informal Money 
Trail: The Hawala Financial Mechanism,'' Strategic Insights, Volume 1, 
Issue 9 (November 2002), http://www.nps.edu/Academics/centers/ccc/
publications/OnlineJournal/2002/nov02/southAsia.html.
---------------------------------------------------------------------------
    Question 11b. How could the United States be more effective in 
targeting the hawala systems being used by drug traffickers to fuel the 
Taliban insurgency in Afghanistan and Pakistan?
    Answer. If we have not done so already, the U.S. Government needs 
to establish assets within these hawala systems who could help identify 
these individuals and entities.
    Question 11c. Would closer collaboration with the United Nations 
help our Government's ability to identify hawala networks engaged in 
illegal behavior?
    Answer. While the United Nations can be effective in some specific 
instances, I don't have faith that it can have an impact here. The 
problem of hawalas is a sensitive one. I believe there is little to no 
chance that Member States would risk the political backlash that would 
undoubtedly arise from targeting these informal financial networks that 
effectively prop up the economies in some of the world's most neglected 
places. In short, the United Nations fosters an environment where the 
consensus determines policy. This will ensure that the United Nations 
remains largely irrelevant in the fight against illicit hawala 
transactions, and more broadly, terror finance, for years to come.
       Questions From Chairman Patrick Meehan for John A. Cassara
    Question 1a. With our military successes against al-Qaeda core 
leadership in Afghanistan and Pakistan, there is a growing trend of al-
Qaeda affiliated groups and adherents filling the void and taking the 
lead in launching attacks against the homeland.
    Given the relatively low amount of money required to plan and 
launch a terrorist attack, how realistic is it to expect U.S. and 
international counterterrorism entities to identify funds that might be 
used to undertake terrorism-related activity?
    Answer. Detecting the rather miniscule amount of funds needed to 
launch small-scale terrorist attacks is a daunting challenge. For 
example, the attempted 2010 cargo plane bombing is estimated to have 
cost our adversaries approximately $4,200. In my opinion, intelligence 
from human sources, coupled with robust analytics, are probably our 
best countermeasures.
    Question 1b. What are some of the persistent challenges in 
identifying and investigating an activity suspected of financing 
terrorism? What are some of the trends in how terrorist groups 
acquiring funds to support their objectives?
    Answer. In my experience, policy makers' early over-reliance on 
``financial intelligence'' to combat terror finance continues to be a 
tremendous bureaucratic and operational roadblock. Regulations have 
been the priority over field investigations. Another obstacle has been 
our intelligence and law enforcement officers' unfamiliarity with 
terror finance methodologies. A third impediment has been our over-
reliance on sanctions and designations. A fourth impediment has been 
the decimation of Treasury enforcement after the creation of the 
Department of Homeland Security. And, a fifth issue has been the 
unwillingness to utilize known capabilities to assess the financial 
intelligence that both industry and the Government spends tremendous 
resources on to produce.
    The most troublesome trend because it is so widespread is what I 
call ``local crime'' to finance terror. Narcotics trafficking, 
intellectual property rights violations, cigarette smuggling, etc. are 
just a few examples. Yet this development also holds promise because by 
cracking down on local crime--predicate offenses for money laundering--
we might also disrupt terrorist operations. I believe this premise 
would hold true for domestic crime and encouraging problematic 
countries to be more vigilant investigating predicate offenses.
    Question 1c. Is the decision to pursue a terror financing 
investigation based on the amount of money suspected of being acquired 
for terrorism-related purposes? If so, what is the minimum monetary 
amount of terrorism-related funds the U.S. Government assesses as 
worthy of investigating?
    Answer. I am not currently in a position to answer this question. 
However, given evolving abilities to link actors and actions, what 
might appear to be small dollar activities can now be traced to larger 
networks of actors and activities, as we are seeing in medical fraud 
for example. My hope is that FinCEN and other agencies aren't using 
dollar values as the litmus test because it simply isn't a good 
indicator of harm.
    Question 1d. Can you describe the decision-making process and 
considerations by which the U.S. intelligence and law enforcement 
communities decide whether to stop terrorism-financing related activity 
and charge a suspect arrest or choose to allow the activity to continue 
in hopes of following the trail of funds to a larger network of support 
or to entities that may be planning a terrorist attack?
    Answer. I am not currently in a position to answer this question.
    Question 2. President Obama recently signed an Executive Order 
allowing the Treasury Department to freeze U.S.-based assets of persons 
who the White House has identified as a ``threat to the peace, 
security, and stability'' of Yemen.
    Do you think this is an effective use of the designation authority? 
Especially when a group such as Boko Haram--who have killed thousands 
of civilians and are in constant contact with AQIM--remain 
undesignated?
    Answer. I believe sanctions and designations are one tool of many 
that should be employed to combat terrorists and those that support 
terrorists. However, in my opinion, the United States has relied far 
too heavily on sanctions and designations. Sanctions, designations, and 
other ``black lists'' are also not uniformly applied. In the years 
immediately after 9/11, I participated in a number of interagency 
discussions regarding targets of designations. The interagency time and 
resources expended on this exercise produced few actual results. The 
Government has finite resources and as a result of our fixation on 
designations other countermeasures were shortchanged. I concur with an 
unnamed retired diplomat who said, ``Sanctions (and designations) 
always accomplish their principal objective, which is to make those who 
impose them feel good.''
    Question 3a. In 2011, the U.S. Government revealed the findings of 
a multi-year law enforcement operation to dismantle a complex, 
transnational network involved in money laundering and drug 
trafficking. The case involved Hezbollah, Mexican and Colombian drug 
trafficking organizations, the Taliban, Lebanon, Colombia, Panama, 
several countries in West Africa, U.S. car buyers, a U.S. shipping 
company, bulk cash couriers, plans for weapons trafficking deals, and 
the Beirut-based Lebanese Canadian Bank (LCB).
    Does the fact that groups such as Hezbollah and the Islamic 
Revolutionary Guard Corps continue to use criminal ventures create 
opportunities for U.S. enforcement mechanisms--such as our robust 
counternarcotics tools--to roll up these vast networks?
    Answer. Yes. See my response to 1b above.
    Question 3b. How does counterterrorism fit in this increasingly 
interconnected underworld?
    Answer. Terrorism is increasingly financed by the underworld of 
transnational crime. By lifting the veil of underworld finance and 
operations, we can impact terror.
    Question 4a. The U.S. Government's on-going investigation of the 
Lebanese Canadian Bank is of particular interest from a money 
laundering perspective because it highlights the consequences of poor 
compliance with anti-money laundering regulations in the formal 
financial system.
    Given the Lebanese Canadian Bank case, what more can be done to 
protect the formal financial system from exploitation by terrorists?
    Answer. There are no short-term fixes to protect the formal 
financial system from exploitation. Although imperfect, the best 
international countermeasure regarding compliance measures in 
international banking continues to be recommendations, programs, 
policies, and mutual evaluations undertaken by the Financial Action 
Task Force (FATF) and FATF-style regional bodies. I have witnessed 
first-hand how countries respond to FATF-led international censure by 
putting in place world-standard anti-money laundering and counter-
terrorist finance countermeasures.
    Question 4b. How can the U.S. Government more effectively mitigate 
the threats posed by trade-based money laundering and bulk cash 
smuggling and other ways outside the formal financial sector?
    Answer. See No. 13 below. Additionally, I have suggested in other 
responses, the use of better technological solutions that can help the 
Government stay at least current with developing threats, and will help 
suggest optimal ways to mitigate, or prevent threats from being 
realized.
    Question 5. There is an increasing concern in the counterterrorism 
and intelligence community that terrorist organizations are 
increasingly using criminal activities that are outside of the formal 
international financial system to raise funds to carry out attacks and 
further their goals.
    How important are terrorist funds derived from criminal activities 
for the operational sustainability of major terrorist groups compared 
to other non-criminal sources of funds, including state sponsors and 
private-sector donations?
    Answer. With the decline of the state sponsorship of terrorism and 
efforts to crack down on private-sector donations, terrorist 
organizations and lone-wolf terrorist actors increasingly rely on local 
crime to finance their activities. I do not believe it is possible to 
quantify the extent of any particular source of terrorist funds.
    Question 6. Foreign Terrorist Organization designation by the 
Secretary of State is an important tool our Government uses to deter 
donations or contributions to and economic transactions with terrorist 
organizations. There are currently 50 groups listed by the State 
Department as designated Foreign Terrorist Organizations.
    Which FTO designated groups would you say are the best resourced 
and most proficient at evading American and international financial 
regulations? Which use the U.S. financial system the most?
    Answer. I am not currently in a position to answer this question.
    Question 7. All of the witnesses mentioned in their prepared 
testimony that the Government needs to interact with the financial 
sector to identify terrorist financing.
    How should the Government develop more effective case typologies 
and feedback mechanisms about how terrorists use financial 
institutions? Is this mostly an educational issue where we need to 
empower financial institutions in order to monitor transactions for 
suspicious or anomalous behavior?
    Answer. I do not believe the burden of spotting potential terror 
funding should be put on financial institutions. Rather, banks and 
money service businesses should continue to file financial intelligence 
and suspicious activity reports with the Department of Treasury. The 
spotlight should be on the Financial Crimes Enforcement Network's 
(FinCEN's) inability to effectively exploit the approximately 18 
million pieces of financial intelligence it receives annually and to 
identify suspect or anomalous behavior. FinCEN should also do a better 
job of alerting reporting institutions to current money laundering and 
terror finance schemes.
    Question 8a. The Financial Action Task Force on Money Laundering is 
comprised of 36 member countries and territories and two international 
organizations and was organized to develop and promote policies to 
combat money laundering and terrorist financing. The FATF relies on a 
combination of annual self-assessments and periodic mutual evaluations 
that are completed by a team of FATF experts to provide information and 
to assess the compliance of its members to the FATF guidelines.
    What are the areas of greatest need for improvement in the FATF 
surveillance process?
    Answer. I have spent many years working with the FATF, including 
participating in many mutual evaluations. In my opinion, a serious 
disconnect between ``process'' and ``results'' has developed. The 
bottom-line metric in evaluating countries' anti-money laundering 
``regimes'' is the number of successful arrests, prosecutions, and 
convictions. With few exceptions, most countries fail in this regard. 
Over the last 15 years, the emphasis has been on the process; i.e. 
laws, rules, regulations, creation of financial intelligence, creation 
of a financial intelligence unit, etc. Yet, the fixation on process or 
form rather than substance, combined with lack of expertise, 
corruption, and lack of political will all conspire against results. It 
may also be that the tools being deployed in the surveillance process 
are outdated and unable to provide the most insightful results.
    Question 8b. How does the United States evaluate the threats to the 
global economy arising from money laundering, terrorist financing, and 
financing the proliferation of weapons of mass destruction?
    Answer. I am not currently in a position to respond to this 
question.
    Question 8c. How should we be prioritizing these threats and how 
effectively has the FATF process been in addressing these threats?
    Answer. I am not currently in a position to respond to this 
question.
    Question 9. KPMG, a private consulting firm, released in October 
2011 the findings of an anti-money laundering survey of major 
international banks. They found that 80% of respondents reported an 
increase in costs associated with anti-money laundering that averaged 
around 45% since 2007. The major sources of cost increases identified 
by the KMPG survey were: (1) Enhanced transaction monitoring, (2) 
increased external reporting requirements to internal regulators and 
external law enforcement agencies, and (3) increased anti-bribery and 
anti-corruption activities.
    In your opinion, are there sufficient resources devoted to 
countering the financing of terrorism and money laundering? 
Alternatively, are the resource costs associated with implementing such 
financial regulations too burdensome on either the private or public 
sectors?
    Answer. In my opinion, per my response in 7a above, industry 
already bears too much of the regulatory AML/CFT burden. Industry 
produces an enormous amount of financial intelligence but there is very 
little return on investment. The primary reason is that the information 
that they spend so much money to generate is not systematically or 
comprehensively (strategically or tactically) exploited by Treasury's 
FinCEN. In that regard, I believe that FinCEN has been provided 
sufficient financial resources, but would question how they have 
utilized those resources. In particular, I don't believe they have made 
the best investments to help them effectively understand the financial 
intelligence that they already possess, nor to report that information 
to other Government or private-sector entities. I also question whether 
the Government has made proper investments in terms of recruiting, 
retaining, and developing the analytic community, especially with 
respect to evolving tools and capabilities.
    Question 10. There has been growing concern at DHS, particularly 
within ICE, about the widespread use of prepaid and stored value cards 
as a way of smuggling illicit funds into the country which could fund 
terror activity. Some estimates are that $1 billion annually is moved 
into the country this way, with most of those funds nearly impossible 
to track.
    Would you agree that prepaid and stored value cards are a growing 
danger to being able to target terrorist financiers? What steps would 
you recommend DHS and the Department of the Treasury take to combat 
this emerging trend?
    Answer. I agree that prepaid and stored value cards are a growing 
danger in targeting terrorist financiers and money launderers both in 
the United States and overseas. I suggest Congress and the 
administration review the 2007 National Money Laundering Strategy that 
discusses prepaid and stored value cards and outlines countermeasures. 
Unfortunately, after 5 years little has been done. I urge Congress and 
the administration to hold FinCEN and others accountable for the lack 
of action.
    Question 11a. On June 29, 2012, the Obama administration imposed 
sanctions on a pair of informal money-exchange networks--known as 
hawalas--in Afghanistan and Pakistan in what officials described as the 
first use of the tactic to attack the financial underpinnings of 
Taliban militants who rely on the system to fund their insurgency. The 
Treasury Department said that the designations were coordinated with 
similar measures adopted by the United Nations as part of a broad 
effort to slow the flow of cash used by the Taliban to pay salaries and 
purchase weapons for attacks in Afghanistan. The United Nations also 
added the names of the same two institutions and their principal 
backers to a list of groups officially associated with Taliban 
militancy, meaning they will be subject to international sanctions as 
well.
    Considering how widespread their use is, how difficult is it for 
U.S. Government to really get a handle on some of the terror financing 
and money laundering activities being conducted under the hawala 
system?
    Answer. The challenges involved in identifying the misuse of hawala 
and similar informal underground value transfer operations is 
enormous--both in the United States and overseas.
    Question 11b. How could the United States be more effective in 
targeting the hawala systems being used by drug traffickers to fuel the 
Taliban insurgency in Afghanistan and Pakistan?
    Answer. This is a complex question that requires a lengthy answer. 
To summarize, in the Afghanistan and Pakistan context trade is the 
primary vehicle used to provide ``counter-valuation'' between 
hawaladars. We need to work with Afghanistan, Pakistan, and countries 
in the surrounding region (including Iran) to promote the concept of 
``trade-transparency.'' If we present the issue as a revenue enhancer 
(combating customs fraud) the governments involved will be receptive. 
Trade-transparency should be made part of the regional Afghan Transit 
Trade Agreement. By promoting trade-transparency and combating customs 
fraud, we will shine the spotlight on underground finance and disrupt 
hawala operations. See the following article I wrote for more details: 
http://www.johncassara.com/
index.php?option=com_content&view=article&id=24:the-afghan-transit-
trade-how-afpak-drug-lords-and-terrorists-are-moving-money-and-
transferring-value&catid=2:articles&Itemid=8.
    Question 11c. Would closer collaboration with the United Nations 
help our Government's ability to identify hawala networks engaged in 
illegal behavior?
    Answer. The short answer is no. In my experience, most countries do 
not recognize hawala or other similar types of underground financial 
systems or collect data or intelligence on financial networks.
    Question 12. Mr. Cassara, in your prepared testimony you talked 
about ``draining the swamp,'' or how cracking down at home on local and 
transnational financial crime might become one of the most effective 
strategies to combat terrorism. You said that law enforcement, 
intelligence, and military organizations must learn to look beyond the 
immediate circumstances of a given local crime because these isolated 
acts could have more sinister ties.
    How do you get State and local law enforcement to change this 
mentality with regard to fighting crime domestically in teaching them 
to ``ask the next question'' during the course of a routine 
investigation and question where the money is going?
    Answer. At the State and local level the three-step solution is 
training, intelligence, and prioritization. Regarding training, I am 
familiar with a number of first-rate training initiatives such as the 
State and Local Anti-Terrorist Training (SLATT) program run by the 
Institute for Intergovernmental Research (IIR) and sponsored by the 
Bureau of Justice Assistance (see www.slatt.org). There are other 
training initiatives as well. Effective training programs should be 
expanded. Specifically, officers and analysts should be trained how to 
recognize terror finance indicators. They should be made familiar with 
the financial and analytical tools that they have available to them 
(sometimes these tools are not available but that is another issue). 
From personal experience in working with State and local law 
enforcement, I am appalled by the lack of knowledge of financial crimes 
and resources that could be made available. Once law enforcement 
officers and analysts have a better understanding of terror finance 
methodologies, they should use that information to task reporting 
sources to develop operational intelligence. They should also make it a 
matter of routine not to become fixated on the immediacy of the local 
crime they are investigating (narcotics, stolen cars, organized theft 
rings, human smuggling, etc) but rather to ``ask the next question,'' 
i.e., ``What about the money?'' Finally, Federal, State, and local law 
enforcement administrations should not become absorbed with the quick 
``statistic'' or easy bust. Rather, they should understand that money 
laundering and terror finance investigations are a long-term investment 
that often times fail. However, they are too important to short change 
for more immediate returns. Much of this conundrum is budget-driven. 
Scarce funding is provided based on perceived results; i.e. statistics. 
Unfortunately, the individuals that look at the statistics cannot 
differentiate between a quick case or an impact case because they are 
often reported the same way.
    Question 13a. Mr. Cassara, you mentioned in your prepared testimony 
that by promoting trade transparency and using technology to spot 
anomalies or discrepancies in trade data that intelligence or law 
enforcement entities may already possess, we may be able to use trade 
as a ``back door'' to enter into previously hidden financial networks.
    Can you elaborate on this idea and how sharing information with 
State and local law enforcement may aid in this process?
    Answer. There are a large number of underground financial systems 
in the United States; they are also known as ``parallel banking,'' 
``underground finance,'' ``informal value transfer systems, etc.'' 
Examples are hawala, the black market peso exchange, and the Chinese 
fei-chien systems. While there are a number of ways that underground 
financial brokers periodically balance their books, historically and 
culturally trade is the preferred method of providing ``counter-
valuation.'' Over- and under-invoicing is the primary vehicle used. 
Thus discrepancies or anomalies in trade-data could be indicators of 
simple fraud or possibly the back door to underground financial 
networks. So if a State or local law enforcement agency identifies a 
business that does not make economic or market sense, caters to suspect 
groups, or has a side business involved with remitting money or value 
overseas, it could be an entry point into previously hidden financial 
networks. Given the amount of data that law enforcement has access to, 
transparency can be enhanced by the use of technologies that seek out 
both anomalies, as well as previously undetected patterns. These 
technologies can be used with vast amounts of data that can't possibly 
be reviewed in relevant time periods (or at least not reviewed 
accurately), nor, given the amount of data, can humans understand 
correlations and causative relationships in the data. Technology can, 
and can also begin to create statistically significant linkages between 
transactions and actors. By using these technologies, which exist now, 
we can better prioritize where our law enforcement should be spending 
time, we have more meaningful information to share, and ultimately, we 
can be much more productive and successful with our limited enforcement 
resources.
    Question 13b. In some ways isn't this the future of combating 
terrorist financing?
    Answer. Since Richard Nixon declared ``War on Drugs'' in 1970, our 
primary countermeasure in following the dirty money trail has been 
tracking financial flows through banks and non-bank financial 
institutions. Our primary emphasis has been creating a domestic (Bank 
Secrecy Act et al) and then later an international network (FATF 
recommendations) of financial transparency reporting requirements.
    I believe trade-based money laundering is the ``next frontier'' in 
international money laundering and counter-terrorist finance. We should 
work to put in place a similar domestic and international network of 
trade-transparency. That said, the technologies that are critical to 
understanding terrorist financing exist now, so I could say that the 
future has arrived.
    Question 14a. Mr. Cassara, you mentioned in your prepared testimony 
that the Federal Government is lagging in its deployment of advanced 
analytical fraud frameworks such as ``predictive,'' ``social network'' 
and ``visual'' analytics.
    In your opinion, is this the result of a lack of manpower or funds 
within the Government to deploy these cutting-edge technologies?
    Answer. I am not really in a position to comment except to say, in 
my experience, there is a critical lack of understanding about what 
advanced analytics are and why they are relevant to the Federal 
Government.
    Question 14b. You rightly raise privacy and civil liberties 
concerns in your testimony with regard to exploiting social network 
analytics. Can you explain some of the technology that exists to 
safeguard the dissemination of personal financial information to 
prevent abuse?
    Answer. I am not a technologist, but let me suggest a couple of 
thoughts. First, many analytics don't actually rely on the movement of 
data from databases. Instead, they utilize ``metadata'', which is data 
about data. The reason this is important is that it provides an audit 
trail as to what data has been used, how it has been used, and who has 
had access to it. Warehouses utilizing analytics can be configured to 
include access controls--the more sensitive the data, the higher the 
clearance needed. Second, in many cases, analytics can be run in a 
manner that either the data is anonymized or the source of the data 
obscured. In the case of social analytics, the analytics are not 
necessarily looking for the identity of the ``speaker,'' but searching 
for specific content and sentiment. Visual analytics itself does not 
raise privacy concerns because its focus is presenting visual depiction 
of information derived from statistical analysis. It thus provides an 
easier, less abstract way of understanding data. Finally, predictive 
analytics has historically been misunderstood, particularly by the 
privacy community. I would submit that with predictive analytics, the 
data is allowed to speak for itself; rather than the analyst coming to 
the data with preconceived ideas of what is important or causative, 
predictive analytics allows the data to ``speak for itself,'' to reveal 
previously unknown patterns, or to reveal those factors that are truly 
important to an activity. In all of these cases, what is important to 
note is that the statistics never label activities as definitively 
fraudulent, or definitively linked to terrorist activity. What they do, 
however, is provide the analyst or investigator with unbiased 
information relating to abnormalities that require more human 
investigation.
    Question 15. Mr. Cassara, you also mentioned in your prepared 
remarks that within the next few years, approximately 500-700 million 
additional pieces of financial information in the form of wire transfer 
data will be routed annually to FinCEN.
    What are the implications for the Treasury Department and the 
intelligence community missing out on this crucial financial 
intelligence if the Government is not able to employ all available 
technologies to exploit it and act upon it in a timely fashion?
    Answer. Currently, FinCEN is tasked by the U.S. Government to 
receive, analyze, warehouse, and disseminate approximately 18 million 
pieces of financial intelligence. Currently FinCEN is not able to 
fulfill this mission. The reasons are many and complex, but the primary 
explanation is continued failed management. If FinCEN is not able to 
successfully complete today's mission involving 18 million pieces of 
financial intelligence, we should not expect that they can handle the 
increased workload, which is certain to occur. I worked at FinCEN for 6 
years. In my first book, ``Hide & Seek: Intelligence, Law Enforcement, 
and the Stalled War on Terror Finance,'' I discussed the entrenched 
FinCEN culture that remains the catalyst for mission failure. We can no 
longer afford business as usual. The implications for the U.S. law 
enforcement and intelligence communities are enormous. That is why in 
my testimony I advanced the idea of a Financial Intelligence Unit ``in 
a box'' or going further downstream with the data and the analytics 
directly to the consumer (see No. 16 below).
    Question 16. Mr. Cassara, in 2008, you raised concerns that 
financial intelligence is not being adequately exploited when 
Treasury's Financial Crimes Enforcement Network (FinCEN) analyzes and 
shares the hundreds of thousands of Suspicious Activity Reports (SARs) 
they come across every year. Last month, FinCEN reported that number of 
suspicious activity reports filed by financial institutions had 
increased last year by 13.5% to an all-time high.
    Can you explain your concerns regarding SARs to the Committee and 
elaborate on how you believe FinCEN should be most effectively 
exploiting the valuable financial intelligence in those Suspicious 
Activity Reports?
    Answer. As noted above, SARS are filed at great cost to industry. 
Unfortunately, they have not been effectively exploited. The reasons 
are many including failed management, until recently a series of failed 
data mining/analytical systems, lack of skilled analysts, a revolving 
door of departing staff due to poor morale, and FinCEN turning itself 
away from its original mission of supporting law enforcement to 
emphasizing the regulation of the BSA. Under FinCEN's current 
framework, in order to address the above question regarding the lack of 
effective exploitation of SARS the other underlying problems will have 
to be addressed. However, there is a new idea on the horizon. The 
technology now exists to not only disseminate SARs and other financial 
intelligence directly to law enforcement users but allow a state-of-
the-art analytics platform to accompany the data. Per law and 
regulation, Treasury and FinCEN would still control the financial 
intelligence but we could do an ``end run'' around the current 
structure of FinCEN that acts as an impediment to effective 
exploitation of SARs and other financial intelligence by disseminating 
both the data and the analytical tools directly to the end-user. In 
effect, we could send a Financial Intelligence Unit (FIU) ``in a box'' 
to approved users at the Federal, State, and local level.
    Question 17. Mr. Cassara, you have written extensively about trade-
based money laundering and invented the concept of trade-transparency 
units which is now a part of the U.S. Government's National Anti-Money 
Laundering Strategy. In addition, the Department of Homeland Security's 
Immigration and Customs Enforcement has adopted this concept by 
establishing the world's first TTU.
    Can you explain this concept a bit, and how DHS has implemented 
their own TTU program through ICE?
    Answer. FATF defines trade-based money laundering (TBML) as the 
``process of disguising the proceeds of crime and moving value through 
the use of trade transactions in an attempt to legitimize their illicit 
origins.'' According to the U.S. State Department, this practice has 
reached ``staggering'' proportions in recent years. Although the 
problem is difficult to quantify precisely, TBML is found globally, 
including in the United States. In fact, some experts believe the 
majority of U.S. money being laundered abroad is moved out of the 
country via undervalued exports. The U.S. Department of Treasury 
estimates that the Black Market Peso Exchange, a single TBML 
methodology found in the Western hemisphere, launders billions of drug 
dollars every year.
    Criminal and terrorist groups that abuse trade are assisted by a 
number of factors:
   The massive amount of global trade that takes place daily.
   Financial diversity (i.e. the wide variety of financial 
        controls found in different countries, the diverse financial 
        arrangements made between governments, and the innumerable 
        different types of financial deals found in international 
        commerce).
   The co-mingling of licit and illicit funds and trade items.
   The low risk of detection.
   Limited Government understanding and resources to detect 
        suspect trade transactions.
    Trade-based money laundering scams take a wide variety of forms. 
For example, it could be simple bartering or a commodity-for-commodity 
exchange. In certain parts of Afghanistan and Pakistan the going rate 
for a kilo of heroin is a color television set. Drug warlords exchange 
one commodity they control (opium) for others that they desire (luxury 
and sports utility vehicles). However, generally speaking, money 
laundering through simple invoice fraud and manipulation is most 
common. The key element of this technique is the misrepresentation of 
the trade good in order to transfer value between importer and 
exporter. The quantity, quality, and description of the trade goods can 
be manipulated. The shipment of the actual goods and the accompanying 
documentation provide cover for ``payment'' or the transfer of money.
    In order to move money out of a country, practitioners import goods 
at overvalued prices or export goods at undervalued prices. In order to 
move money into a country, practitioners import goods at undervalued 
prices or export goods at overvalued prices.
    It is important to understand that when a buyer and seller are 
working together, the price of the item can be whatever they want it to 
be. As long as parties in an international trade transaction do not get 
too greedy and cause noticeable trade anomalies, their chances of 
detection by bankers, customs services, law enforcement, and other 
authorities are miniscule.
    Every country in the world has a customs service and keeps track of 
what comes in and what goes out. In fact, in many parts of the world 
customs duties are the primary source of Government revenue. So 
although there are differences in the way governments gather and store 
trade data, enough similarities exist to conduct effective analysis and 
TBML investigations. Such investigations require three basic elements:
   Access to import and export data. Moreover, if the trade 
        data can be augmented by combining it or overlaying it with 
        other data such as financial, travel, commercial, law 
        enforcement, etc. following the suspect activity will be 
        further enhanced.
   The ability to promptly exchange data (adhering to standard 
        international safeguards and privacy concerns) with other 
        countries.
   Expertise in analyzing and investigating TBML.
    Recognizing the growing threat of TBML, in 2004 the Department of 
Homeland Security's Immigration and Customs Enforcement (ICE) 
established the world's first trade-transparency unit or TTU. 
Subsequently, other TTUs have been created in Argentina, Brazil, 
Paraguay, Colombia, Panama, Mexico, and other countries. As 
demonstrated above, by comparing one country's targeted imports or 
exports against the corresponding data of another country, trade 
anomalies can be detected that could be indicative of customs fraud, 
tax evasion, contraband smuggling, or trade-based money laundering. The 
data could even be the back door into underground financial schemes 
including those linked to terror finance. I am pleased that DHS is 
beginning to look at how to augment this data analysis through the use 
of robust technologies that can parse through enormous amounts of data 
in very short time increments. Of course, data analysis will only go so 
far. Investigations in the field are also needed.
    The U.S. law enforcement and intelligence communities agree that 
one of the most effective counter-measures against organized crime, 
terrorists, systematic corruption, fraud, and many other types of 
serious crime is to ``follow the money trail.'' In the years to come, I 
am convinced we will increasingly learn to ``follow the value trail.''
      Questions From Chairman Patrick Meehan for Dennis M. Lormel
    Question 1a. With our military successes against al-Qaeda core 
leadership in Afghanistan and Pakistan, there is a growing trend of al-
Qaeda affiliated groups and adherents filling the void and taking the 
lead in launching attacks against the homeland.
    Given the relatively low amount of money required to plan and 
launch a terrorist attack, how realistic is it to expect U.S. and 
international counterterrorism entities to identify funds that might be 
used to undertake terrorism-related activity?
    Answer. Nominal funding requirements to support terrorist activity 
can be very challenging for U.S. and international counterterrorism 
entities to identify. It is possible to identify such funding but 
highly improbable. Counterterrorism entities need to develop and 
implement investigative and analytical methodologies to increase the 
probability factor. Few, if any, entities existed before 9/11 that were 
dedicated to identifying, investigating, and disrupting terrorist 
financing. Since then, many entities were established with the mission 
to investigate terrorist financing. By using the combination of 
financial intelligence, human intelligence, and signal intelligence, 
mechanisms have been, and will continue to be, developed to identify 
even nominal amounts of money. By analyzing case studies, ranging from 
grand to simple, such as the Mumbai bombing and lone wolf schemes like 
that of Farooque Ahmed, who planned to detonate a bomb in the 
Washington, DC Metro Transit System, counterterrorism entities 
responsible for terrorist financing can build typologies and develop 
proactive and progressive investigative strategies.
    Question 1b. What are some of the persistent challenges in 
identifying and investigating an activity suspected of financing 
terrorism? What are some of the trends in how terrorist groups 
acquiring funds to support their objectives?
    Answer. One of the persistent challenges I encountered in the FBI, 
and that I would continue to be concerned about today is the timely 
collection and assessment of financial intelligence. Did my FBI 
Section, the Terrorist Financing Operations Section (TFOS), have 
intelligence information that we did not identify that could have led 
us to a plot or potential attack? We collected and assimilated a 
tremendous amount of intelligence information that we endeavored to 
turn into actionable intelligence for field investigators. This is 
particularly important in cases where a lone wolf operative did not 
have a record, was unknown to intelligence agencies, and used funds 
from a legitimate job to finance terrorist plans. Time sensitivity in 
these matters was always challenging.
    A trend that has continued since 9/11, and has grown significantly 
since then, has been the movement to criminal activity as a fund-
raising mechanism for terrorists. In the aftermath of 9/11, the United 
States and our international partners made a concerted effort to cut 
off the flow of legitimate money from wealthy donors and charities. The 
more these efforts succeeded, the more terrorists were driven to 
criminal activity. This continues today. It will be interesting to 
assess the success of the sanctions against Iran and the revolution in 
Syria, two State sponsors of terrorism. This will probably result in 
the continued increase in criminal activity.
    Question 1c. Is the decision to pursue a terror financing 
investigation based on the amount of money suspected of being acquired 
for terrorism-related purposes? If so, what is the minimum monetary 
amount of terrorism-related funds the U.S. Government assesses as 
worthy of investigating?
    Answer. Terrorist financing investigations were not predicated on 
monetary considerations when I ran TFOS at the FBI. Terrorist financing 
investigations are probably still not and should never be predicated on 
monetary thresholds. Such investigations should be predicated upon the 
relation to terrorism and the potential threat represented. While I was 
still at the FBI in 2003, a process was established whereby all 
terrorism cases contained a financial investigative component. 
Terrorist financing investigations should focus on identifying all 
funding streams and disrupting terrorist activities through denying 
terrorists money. For terrorists to succeed, they must have a source of 
funds and access to their money when they need it. Disrupting the 
sources and/or access to money makes it extremely difficult for 
terrorists to succeed.
    Question 1d. Can you describe the decision-making process and 
considerations by which the U.S. intelligence and law enforcement 
communities decide whether to stop terrorism-financing related activity 
and charge a suspect arrest or choose to allow the activity to continue 
in hopes of following the trail of funds to a larger network of support 
or to entities that may be planning a terrorist attack?
    Answer. Terrorist financing investigations are a component of 
counterterrorism. They should be conducted in coordination with the 
broader counterterrorism mission and in conjunction with terrorism 
investigations. Terrorist financing is one tool in the arsenal. 
Terrorist financing investigations should be conducted with other 
investigative techniques to include undercover operations, use of 
informants, and/or wiretaps and tracking telephone calls and/or emails. 
The combination of these investigative techniques can be extremely 
productive.
    The decision to allow a terrorist financing or broader terrorism 
investigation to continue or to take it down is extremely important. It 
should be based on whether an attack is imminent or not. If an attack 
is imminent, you need to take down the investigation immediately and 
prevent the attack. If an attack is not imminent, you allow the 
investigation to continue. In so doing, you can develop evidence to 
identify additional co-conspirators and funding streams. As an example, 
consider the Lebanese Canadian Bank investigation. Although Hezbollah 
was involved, and is a violent terrorist organization, there was no 
specific threat or imminent danger associated with the investigation. 
In that situation, you allow the investigation to play out. In this 
case, the investigation was a multi-year investigation. A number of 
funding streams and co-conspirators were identified and dismantled. 
Take a case such as the Time Square bomber. As a hypothetical, had law 
enforcement and intelligence agencies been aware of Faisal Shahzad and 
his plan to detonate a bomb in Time Square, they would have allowed the 
plot to unfold up to the point of imminent danger. In that case, had 
they been aware and determined there was no imminent danger, they 
probably would have identified the funding source, through the Hawala 
operator. Had there been imminent danger, or if imminent danger could 
not be determined, they would have arrested Shahzad and developed 
additional information and evidence in the aftermath of the take down.
    When I ran TFOS at the FBI, we strove to take terrorist financing 
investigations in two directions: Forward to the strike team and 
backward to the point of financial origin. I believed there were three 
funding tracks, and I wanted investigations to disrupt activities in 
all three tracks. First, there was a fundraising track. Large sums of 
money, from the hundreds of thousands to millions of dollars, would be 
generated through mechanisms to include donations from wealthy donors, 
charities, State Sponsors (Iran most notably), criminal activities and 
other means. The money flowed into the terrorist organization for 
organizational use. Second, funding would be provided in a track from 
the organization, through a single facilitator or multiple 
facilitators, and to an operation. The funding flow here would be less 
than the flow into the organization. It would range from the hundreds 
of thousands to a few thousand dollars. Our primary investigative 
attention would be focused on the facilitators because that would take 
us to both the organization and to the operatives. Third, there was a 
track from the operation, through the facilitator(s), to the 
operatives. The funding flow here would be in the thousands to the 
hundreds of dollars.
    In general, when conducting terrorist financing investigations in 
the first track, the organizational track, you would be more inclined 
to allow the investigation to continue over a longer period of time and 
be more deliberate and methodical in your investigative methodology. 
When conducting investigations into the second track (operations) and 
the third track (operatives) you have to deal with a greater sense of 
urgency and constantly assess whether an attack is imminent. Most of 
these investigations were shorter term because, at some point, you had 
to be concerned about the threat of attack.
    Question 2. President Obama recently signed an Executive Order 
allowing the Treasury Department to freeze U.S.-based assets of persons 
who the White House has identified as a ``threat to the peace, 
security, and stability'' of Yemen.
    Do you think this is an effective use of the designation authority? 
Especially when a group such as Boko Haram--who have killed thousands 
of civilians and are in constant contact with AQIM--remain 
undesignated?
    Answer. If evidence exists to support designations, I am an ardent 
supporter for the designation process. Such actions disrupt funding 
flows and serve as a deterrent. Boko Haram is a violent and dangerous 
group. They have been very active and pose a formidable threat in 
Nigeria. With respect to designating other groups, I would not make 
designation decisions by comparing one group, such as Boko Haram, to 
other groups. A number of factors must be taken in consideration in the 
decision process to include the level of overall terrorist threat, 
threat to the United States, diplomatic considerations, and the need to 
continue the classification and protection of intelligence information.
    Question 3a. In 2011, the U.S. Government revealed the findings of 
a multi-year law enforcement operation to dismantle a complex, 
transnational network involved in money laundering and drug 
trafficking. The case involved Hezbollah, Mexican and Colombian drug 
trafficking organizations, the Taliban, Lebanon, Colombia, Panama, 
several countries in West Africa, U.S. car buyers, a U.S. shipping 
company, bulk cash couriers, plans for weapons trafficking deals, and 
the Beirut-based Lebanese Canadian Bank (LCB).
    Does the fact that groups such as Hezbollah and the Islamic 
Revolutionary Guard Corps continue to use criminal ventures create 
opportunities for U.S. enforcement mechanisms--such as our robust 
counternarcotics tools--to roll up these vast networks?
    Answer. All criminal activity undertaken by Hezbollah, the Islamic 
Revolutionary Guard Corps and other terrorist organizations leave them 
vulnerable to detection by law enforcement and intelligence services. 
Law enforcement, particularly the DEA and FBI, deserve considerable 
credit for conducting a well-disciplined, focused, and comprehensive 
investigation that tied transnational criminal organizations together 
with terrorist groups and a number of facilitation tools to include the 
Lebanese Canadian Bank. Through comprehensive investigation and 
financial tracing, multiple funding streams between Central America, 
the United States, Lebanon, West Africa, and Europe were identified and 
dismantled. There have been at least four other significant 
investigations conducted by the FBI and other agencies that exposed 
Hezbollah's involvement in raising large amounts of money through 
criminal activities in the United States. The most notable of these 
cases was the North Carolina cigarette smuggling case known as 
Operation Smokescreen. A Hezbollah cell operated an elaborate scheme to 
smuggle cigarettes from North Carolina to Michigan. This cell generated 
approximately $25 million in illicit funds.
    Question 3b. How does counterterrorism fit in this increasingly 
interconnected underworld?
    Answer. The nexus between criminal and terrorist organizations has 
continued to grow. This trend will persist. As the U.S. Government and 
our allies continue to exert pressure and cut off funding streams, 
terrorists will further align themselves with criminal organizations 
and participate in criminal activity to raise much-needed money. 
Terrorists are extremely adaptable and consistently look for new 
funding mechanisms. Many terrorist organizations have become engaged in 
drug trafficking because drug trafficking is the most profitable 
criminal activity. These terrorist groups are evolving into hybrid 
criminal and terrorist organizations. As they do, their ideology tends 
to give way to greed. Greed is a vulnerability law enforcement can 
exploit, unlike ideology. This makes these groups more susceptible to 
criminal investigation and prosecution.
    Question 4a. The U.S. Government's on-going investigation of the 
Lebanese Canadian Bank is of particular interest from a money 
laundering perspective because it highlights the consequences of poor 
compliance with anti-money laundering regulations in the formal 
financial system.
    Given the Lebanese Canadian Bank case, what more can be done to 
protect the formal financial system from exploitation by terrorists?
    Answer. There are some egregious examples of anti-money laundering 
(AML) compliance breakdowns that facilitated terrorists being able to 
exploit the formal financial system. The biggest failure in the 
Lebanese Canadian Bank case was the complicity of the Lebanese Canadian 
Bank with transnational organized criminal groups, a Mexican drug 
cartel, and Hezbollah. First, there was a total failure by the bank to 
have an AML program. This enabled criminal and terrorist elements to 
place money in the formal financial system, the first step in the money 
laundering process; and then to layer it, which is the second step, by 
moving it to other financial institutions and giving it a sense of 
legitimacy; and then in integrating the funds, the third step in the 
money laundering process, by using the illicit, but seemingly 
legitimate funds to purchase goods, in this case used cars from the 
United States, and shipping them to Africa for sale as legitimate 
transactions.
    One way to help strengthen the formal financial system is to make a 
comprehensive case study out of the Lebanese Canadian Bank and 
specifically show financial institutions how they were exploited in 
this case. By developing typologies that could be built into scenarios 
that could be incorporated into rules for AML transaction monitoring, 
we can improve the system. This case study should also be used as a 
wide-ranging training exercise.
    The Lebanese Canadian Bank case was exacerbated by the fact that 
Lebanon does not recognize Hezbollah as a terrorist organization. 
Therefore, banks in Lebanon, and banks in other countries that do not 
consider Hezbollah to be a terrorist organization, are inclined to bank 
Hezbollah. International consensus on who is a terrorist organization 
has been a longstanding problem.
    There are other cases that can be cited, such as HSBC. The Senate 
Permanent Subcommittee on Investigations conducted a thorough 
investigation and issued a formal report on July 17, 2012, in 
conjunction with a public hearing involving executives from HSBC. The 
hearing and report serve as tools for lessons learned and should 
provide a deterrent to other institutions for serious shortcomings in 
their AML programs.
    It should be pointed out that an overwhelming number of banks 
operating in the United States have outstanding AML programs. The AML 
compliance professionals in these institutions take a great deal of 
pride in their work ethic and dedication to rooting out money 
laundering and terrorist financing. I have seen this first-hand, both 
as an FBI agent and today as a consultant doing work in the financial 
services industry.
    Question 4b. How can the U.S. Government more effectively mitigate 
the threats posed by trade-based money laundering and bulk cash 
smuggling and other ways outside the formal financial sector?
    Trade-based money laundering has had a long history as a successful 
mechanism for criminals and terrorists. The Lebanese Canadian Bank case 
demonstrates how criminals and terrorists collaborated in different 
trade-based money laundering schemes to launder illicit funds. 
Likewise, bulk cash smuggling has long been, and continues to be, a 
significant problem for criminals and terrorists. In 2010 and 2011, 
both the Treasury Department and FBI reported that bulk cash smuggling 
was a huge terrorist financing concern.
    In my view, one of the most significant problems and 
vulnerabilities we are confronted with outside the formal banking 
system in the United States is unlicensed and unregistered money 
remitters. These illegal money remitters provide hawala-like services 
and do not comply with Bank Secrecy Act (BSA) reporting requirements. 
Many banks are unaware of how many of their clients operate as illegal 
money remitters. This is in spite of rigorous due diligence 
requirements. I believe that about 80% of money remitters in the United 
States are illegal.
    To the question of how the U.S. Government can more effectively 
mitigate the threats of these informal mechanisms, the answer is two-
fold. First, the Government interagency community should conduct 
targeted investigative initiatives addressing these problem areas. 
Through interagency cooperation, communication, and coordination, the 
Government should identify the highest-priority targets in these areas 
and determine which agencies could make the best impact by taking the 
lead and develop multi-agency strategies. Second, as a component of 
these initiatives, the U.S. Government should bring in the private 
sector and subject matter experts who could provide a different 
perspective and different sets of information that could develop 
valuable financial intelligence. Public-private partnerships like this 
are woefully lacking.
    Question 5. There is an increasing concern in the counterterrorism 
and intelligence community that terrorist organizations are 
increasingly using criminal activities that are outside of the formal 
international financial system to raise funds to carry out attacks and 
further their goals.
    How important are terrorist funds derived from criminal activities 
for the operational sustainability of major terrorist groups compared 
to other non-criminal sources of funds, including state sponsors and 
private sector donations?
    Answer. Following the terrorist attacks of 9/11, the United States 
and our allies made a concerted effort to deter donations to terrorists 
from wealthy donors, charities, and other funding sources to include 
State Sponsors. This was accomplished in the form of sanctions, OFAC 
and State Department designations, and targeted investigations by law 
enforcement and intelligence agencies. As a result, numerous funding 
sources were shut off and terrorist groups had to develop alternative 
funding mechanisms. They gravitated to criminal activity, which has 
consistently expanded over the years. Drug trafficking, kidnapping, 
extortion, counterfeit goods, and a variety of other crimes have become 
a staple for terrorist organizations.
    As mentioned earlier, terrorists must have a continuous flow of 
funds available that they can immediately access in order to succeed. 
As otherwise legitimate sources of funding have diminished, terrorists 
have had to increasingly rely on criminal activity as a funding 
mechanism.
    As more sanctions and pressure are exerted on Iran, it is less 
likely they will be able to maintain the level of State Sponsorship 
provided to Hezbollah and other terrorist organizations. Likewise, as 
Syria faces a regime overthrow, it is unlikely they will be able to 
provide funding and support to terrorists. This will result in an even 
steadier reliance on criminal activities by terrorist groups.
    Question 6. Foreign Terrorist Organization designation by the 
Secretary of State is an important tool our Government uses to deter 
donations or contributions to and economic transactions with terrorist 
organizations. There are currently 50 groups listed by the State 
Department as designated Foreign Terrorist Organizations.
    Which FTO-designated groups would you say are the best resourced 
and most proficient at evading American and international financial 
regulations? Which use the U.S. financial system the most?
    Answer. When it comes to resources, proficiency and exploitation of 
the U.S. financial system, as well as the global financial system, 
Hezbollah is in a league by themselves. In my view, Hezbollah is not 
only the most proficient terrorist organization; they are the most 
competent criminal organization in the world. Their global 
infrastructure could serve as a model for organized crime. Hezbollah 
has an incredible world-wide infrastructure that enables them to 
operate criminal enterprises and function as a serious terrorist 
threat. Including the Lebanese Canadian Bank case, there are at least 
five significant investigations involving Hezbollah operations that 
touch on the United States that demonstrate Hezbollah's criminal 
organizational skills. In aggregate, their activities represent 
hundreds of millions of dollars in criminal activity having a U.S. 
nexus.
    In today's environment and especially with the sanctions 
confronting them, Iran poses a significant challenge for the formal 
financial system. Their ability to hide behind shell companies and 
opaque beneficial ownership is a hindrance to meaningful sanctions. In 
addition, Iran's ability to use foreign banks as correspondent banks 
and to strip SWIFT messaging information from transactional records 
enables them to circumvent OFAC screening requirements. This is a huge 
problem that surfaced with Lloyds Bank a few years ago and currently 
with Standard Charter Bank. This is an issue that must be dealt with 
forcefully with offending institutions if we intend to have meaningful 
sanctions against Iran.
    Question 7. All of the witnesses mentioned in their prepared 
testimony that the Government needs to interact with the financial 
sector to identify terrorist financing.
    How should the Government develop more effective case typologies 
and feedback mechanisms about how terrorists use financial 
institutions? Is this mostly an educational issue where we need to 
empower financial institutions in order to monitor transactions for 
suspicious or anomalous behavior?
    Answer. In my written testimony for the record, I made six 
recommendations about improving the possibility and probability of 
identifying terrorist financing. Three of those recommendations address 
how the Government should develop more effective case typologies and 
feedback mechanisms for terrorist financing cases. They are:
    ``A consistent and comprehensive feedback mechanism from law 
enforcement must be developed that demonstrates the importance of BSA 
reporting, especially the significance of Suspicious Activity Reports 
(SARs). FinCEN's SAR Activity Review is a good mechanism that provides 
insightful information. In addition, specific feedback from law 
enforcement to financial institutions concerning the value and benefit 
of BSA data, including SAR filings, would have a dramatic impact on the 
morale of individuals responsible for SAR reporting.
    ``There must be an assessment by the Government of all SARs related 
to or identifiable with terrorism cases. Such a review would identify 
specific red flags that could be used as a training mechanism and more 
importantly, could be factored into identifying typologies that could 
be used for the monitoring/surveillance capabilities of financial 
institutions. In addition, a determination could be made as to why the 
financial institution filed a SAR. In many instances, the SAR was filed 
for violations other than terrorist financing. Understanding what 
triggered the SAR filing; in tandem with how the SAR ultimately was 
linked to terrorist interests would be insightful.
    ``In addition to assessing SARs, the Government and industry should 
collectively identify and assess as many case studies, of terrorist 
financing-related investigations, as can be identified and legally 
publicly accessed. The case studies should be compared to determine 
what types of commonalities and patterns of activity exist. In 
addition, common red flags should be easily discernible. This type of 
case study assessment, coupled with the SAR analysis, would provide 
more meaningful information to consider in identifying terrorist 
financing characteristics, especially in cases involving more nominal 
financial flows. This would enable financial institutions to more 
effectively use surveillance and monitor techniques to identify 
questionable transactional information.''
    Financial institutions are required by the BSA to monitor 
transactions for and report suspicious activity. Overall, U.S. banks do 
a good job of reporting suspicious activity. This process could be 
improved through a meaningful feedback mechanism from the Government 
where the Government emphasizes the importance of SAR reporting, 
coupled with demonstrating ``how'' terrorists used financial 
institutions to move, store, and spend money.
    In addition, terrorist financing specific training would be 
important. This was another of the six recommendations I spoke about in 
my written testimony. Terrorist financing is not well understood. As I 
stated in my testimony, ``(w)ithout specific training, the ability to 
understand and disrupt terrorist financing is more difficult to 
achieve.''
    Question 8a. The Financial Action Task Force on Money Laundering is 
comprised of 36 member countries and territories and two international 
organizations and was organized to develop and promote policies to 
combat money laundering and terrorist financing. The FATF relies on a 
combination of annual self-assessments and periodic mutual evaluations 
that are completed by a team of FATF experts to provide information and 
to assess the compliance of its members to the FATF guidelines.
    What are the areas of greatest need for improvement in the FATF 
surveillance process?
    Answer. The FATF mutual evaluation process is one of the most 
significant accomplishments of the FATF 40 Recommendations regarding 
money laundering and terrorist financing as it provides peer and public 
pressure to enact and then operationalize AML laws. There are 
approximately 170 jurisdictions who have adopted the FATF 40 
Recommendations (FATF plus the FATF style regional bodies).
    FATF revised the 40 Recommendations and the methodology for 
assessment in February 2012. According to FATF, the FATF Standards have 
been revised to strengthen global safeguards and further protect the 
integrity of the financial system by providing governments with 
stronger tools to take action against financial crime. At the same 
time, these new standards will address new priority areas such as 
corruption and tax crimes.
    Ted Greenberg, a former Department of Justice and World Bank 
official, is an expert on FATF. He was involved in writing the 40 
Recommendations and has participated in the FATF evaluation process. 
According to Mr. Greenberg, the current methodology has proven to be 
repetitive in its application, not focused on assessment of 
effectiveness, and failed to take account of corruption issues in law. 
Mr. Greenberg believes the new process should focus on the main 
weaknesses in each jurisdiction, why they are/are not effective and 
make recommendations to fix the problem areas. He also believes the new 
process must focus more on corruption issues and their impact on AML.
    Question 8b. How does the United States evaluate the threats to the 
global economy arising from money laundering, terrorist financing, and 
financing the proliferation of weapons of mass destruction?
    Answer. When I was responsible for TFOS at the FBI, I was the FBI's 
representative on the Policy Coordinating Committee (PCC) for Terrorist 
Financing. All Government agencies with a nexus to money laundering and 
terrorist financing participated in that PCC. As an interagency group, 
we evaluated the threats from money laundering and terrorist financing. 
We collectively identified and prioritized the most significant 
threats. The PCC was then chaired by David Aufhauser. During that time 
period (2001-2003), Mr. Aufhauser served as General Counsel at the 
Treasury Department. As I mentioned in my written testimony, ``Mr. 
Aufhauser was a true leader who marshaled the interagency collaborative 
initiative. He was an unsung hero and visionary.'' My understanding is 
that this interagency working group is now directed by the National 
Security Council. The group is no longer referred to as the PCC for 
Terrorist Financing. I am not sure what it is currently identified as.
    Question 8c. How should we be prioritizing these threats and how 
effectively has the FATF process been in addressing these threats?
    Answer. In the United States, the threats should continue to be 
evaluated and prioritized by the interagency working group. Stopping 
the flow of funds to terrorists should be an extremely high interagency 
priority. Overall, the FATF evaluation process has been successful. 
When FATF first started there was no peer evaluation process of money 
laundering laws. In fact, few countries had AML laws. Since then, the 
FATF evaluation process has been widely accepted and followed. FATF has 
revised the evaluation process, which should result in an improved 
process.
    Question 9. KPMG, a private consulting firm, released in October 
2011 the findings of an anti-money laundering survey of major 
international banks. They found that 80% of respondents reported an 
increase in costs associated with anti-money laundering that averaged 
around 45% since 2007. The major sources of cost increases identified 
by the KMPG survey were: (1) Enhanced transaction monitoring, (2) 
increased external reporting requirements to internal regulators and 
external law enforcement agencies, and (3) increased anti-bribery and 
anti-corruption activities.
    In your opinion, are there sufficient resources devoted to 
countering the financing of terrorism and money laundering? 
Alternatively, are the resource costs associated with implementing such 
financial regulations too burdensome on either the private or public 
sectors?
    Answer. Overall, I do not believe sufficient resources are devoted 
to countering the financing of terrorism and money laundering, both in 
the private and public sectors. In the private sector, AML compliance 
is considered a cost center, as opposed to a revenue center. As such, 
AML compliance does not receive the support from business entities 
within a financial institution that should be given. The HSBC case 
illustrates this shortcoming. This problem was magnified during the 
financial crisis when banks were reducing staff. Invariably compliance 
staffs were cut before business staffs. The battle cry in AML 
compliance was ``do more with less''. The only winner under those 
circumstances is the money launderer. In the last few years, as the 
economy improved, AML compliance resources have improved. However, 
until the business entity (revenue center) versus compliance entity 
(cost center) mentality is dealt with, AML compliance will not be 
adequately resourced. As far as the Government is concerned, these are 
lean budget times. Consequently, staffing is impacted. In general, 
Government agencies responsible for investigating money laundering and 
terrorist financing do not have the necessary staffing. However, the 
Government has consistently done outstanding work in addressing the 
money laundering and terrorist financing crime problems.
    Question 10. There has been growing concern at DHS, particularly 
within ICE, about the widespread use of prepaid and stored value cards 
as a way of smuggling illicit funds into the country which could fund 
terror activity. Some estimates are that $1 billion annually is moved 
into the country this way, with most of those funds nearly impossible 
to track.
    Would you agree that prepaid and stored value cards are a growing 
danger to being able to target terrorist financiers? What steps would 
you recommend DHS and the Department of the Treasury take to combat 
this emerging trend?
    Answer. The use of prepaid cards has exploded and continues to gain 
popularity at a rapid pace. There are many legitimate and convenient 
uses of prepaid cards. However, prepaid cards have been a source of 
vulnerability since they came on the market. Law enforcement has 
constantly been concerned about criminals and terrorists using prepaid 
cards in furtherance of their illicit activities. The problem is not 
just a one-way problem. Prepaid cards coming into the country to 
support a potential terrorist attack is a direct threat to National 
security and should be considered a significant problem. There is also 
a serious outbound problem. One area where this is extremely 
problematic is with the Mexican drug cartels. Prepaid cards are being 
purchased in the United States for shipment to Mexico with drug 
proceeds.
    The Treasury Department, through FinCEN, established rules 
regarding prepaid cards in September 2011, which went into effect in 
March 2012. The rules, while helpful, do not solve the problem. What is 
needed is legislation making prepaid cards monetary instruments and 
subjecting them to BSA reporting requirements. Most notably, prepaid 
cards should be subject to reporting requirements when individuals 
travel internationally.
    The Treasury and Homeland Security Departments should work with the 
interagency community, especially the interagency working group for 
money laundering and terrorist financing to develop a Government-wide 
investigative strategy to deal with the threat posed by prepaid cards 
being exploited by terrorists. Likewise, the interagency community 
should reach out to the private sector to form strategic partnerships 
to address this crime problem.
    Question 11a. On June 29, 2012, the Obama administration imposed 
sanctions on a pair of informal money-exchange networks--known as 
hawalas--in Afghanistan and Pakistan in what officials described as the 
first use of the tactic to attack the financial underpinnings of 
Taliban militants who rely on the system to fund their insurgency. The 
Treasury Department said that the designations were coordinated with 
similar measures adopted by the United Nations as part of a broad 
effort to slow the flow of cash used by the Taliban to pay salaries and 
purchase weapons for attacks in Afghanistan. The United Nations also 
added the names of the same two institutions and their principal 
backers to a list of groups officially associated with Taliban 
militancy, meaning they will be subject to international sanctions as 
well.
    Considering how widespread their use is, how difficult is it for 
U.S. Government to really get a handle on some of the terror financing 
and money laundering activities being conducted under the hawala 
system?
    Answer. The problem of illegal money remitters operating in the 
United States is one of the most significant and challenging facing the 
U.S. Government. This is one of the biggest challenges facing the 
financial services sector. Financial institutions do not know the 
number of their customers who use their businesses to conduct illegal 
money remittance operations. This is a form of hawala. The interagency 
working group dealing with money laundering and terrorist financing 
should conduct a targeted and coordinated investigative initiative on 
two levels to identify and dismantle illegal money remittance 
operations. On an international level, hawalas linked to terrorism 
should be identified and targeted. The Government should employee 
techniques to identify wire transfers to and from the United States 
involving these hawalas, as well as telephone numbers and emails, among 
other communication modes linked to the hawalas. From there, 
investigation should focus on the identified illegal money remitters in 
the United States. Coordinated take-downs of targeted hawalas in the 
United States and abroad should take place. This would involve 
coordination with our international partners. On a second level, there 
should be an initiative to arrest a large number of illegal money 
remitters in the United States for operating illegal (unlicensed and 
unregistered) money remittance operations. This would generate 
considerable media attention to this problem, be impactful and have a 
deterrent effect on these types of businesses.
    Question 11b. How could the United States be more effective in 
targeting the hawala systems being used by drug traffickers to fuel the 
Taliban insurgency in Afghanistan and Pakistan?
    Answer. DEA has had the lead in the area of drug trafficking in 
Afghanistan. DEA should develop investigative strategies with the 
Department of Defense, law enforcement, and intelligence agencies. 
Those strategies should be fully coordinated. The collective financial 
intelligence from the various agencies should provide actionable 
intelligence information to prioritize and target hawala dealers who 
support the Taliban. The key is coordination, communication, and 
cooperation.
    Question 11c. Would closer collaboration with the United Nations 
help our Government's ability to identify hawala networks engaged in 
illegal behavior?
    Answer. On a practical operational level, collaboration with the 
United Nations would have little impact on U.S. investigative efforts. 
On a policy level, especially in considering regulating hawalas, 
collaboration with the United Nations and other international bodies 
could be extremely beneficial.
    Question 12. Mr. Lormel, in your written testimony you mentioned 
the Lloyds Bank ``stripping'' case as a prime example of how 
correspondent banking was used by Iran as a facilitation tool.
    This was a pretty egregious example of Iran using the formal 
banking system to skirt international financial system. Do you think 
this was a one-off or an instance of a larger problem, particularly 
with regard to SWIFT?
    Answer. I believe the problem of ``stripping'' is much larger. It 
is not a one-off situation. The Lloyds case was investigated jointly by 
the District Attorney of New York (DANY) and the Department of Justice. 
At the time the case was brought forward, DANY announced it was 
investigating nine other banks for similar ``stripping'' activity. On 
August 6, 2012, the New York State Department of Financial Services 
announced it was investigating Standard Charter Bank for ``stripping'' 
information related to Iran.
    SWIFT is not the problem. The problem is that certain banks have 
chosen to do business with Iran. There is tremendous profit for the 
banks in dealing with Iran, especially with the strong U.S. sanctions. 
However, Iran needs access to U.S. dollars, therefore the banks who are 
dealing with Iran must transact in the United States. They must have a 
correspondent banking relationship with a U.S. bank to access U.S. 
dollars. In the cases of Lloyds and Standard Charter, the banks knew 
that if they provided the proper SWIFT messaging data, the identities 
of the Iranian banks they were transacting with would have been 
disclosed through their correspondent relationship with a U.S. bank. 
They knew full well that if that occurred the U.S. bank would have 
declined the transaction. The U.S. bank's OFAC monitoring system would 
have identified the sanctioned Iranian bank and returned the 
transaction. Therefore, Lloyds and Standard Charter ``stripped'' out 
any reference or mention of the Iranian bank in the transaction, 
circumventing the OFAC monitoring. This gave the appearance to the U.S. 
bank that either Lloyds or Standard Charter were the originating bank 
in the transaction.
    Question 13a. Mr. Lormel, you suggested that providing security 
clearances to select personnel in financial institutions in order to 
share limited intelligence information that could be scrubbed against 
bank monitoring systems to identify transactional information 
associated with terrorists.
    How would you envision this to work?
    Answer. The Government provides security clearances to individuals 
working in the defense contracting industry. This enables defense 
contractors and consultants to work on classified projects, which is in 
the Government's best interest. The same should be true in the 
financial services industry. Financial institutions are a repository 
for significant financial intelligence information. If the Government 
could share selective classified information with a limited number of 
vetted and cleared bank officials that information could be run through 
transactional information. Hits in the transactional data, that 
otherwise would not have been identified, would be reported back to the 
agency providing the information. Legal process would have to be put in 
place to ensure any information provided back to the Government did not 
violate Bank Secrecy Act privacy provisions.
    Question 13b. What would you think of sending members of Treasury's 
Office of Financial Intelligence, or of the intelligence community, to 
certain high-risk financial institutions, in essence detailing them 
there for this purpose? Would this not also help with the challenge of 
helping the financial sector to identify activity consistent with 
typologies of terrorists?
    Answer. The idea of detailing members of the Treasury's Office of 
Financial Intelligence or from law enforcement is worth consideration. 
It would be important to distinguish law enforcement and the 
intelligence community in the sense that the CIA should be precluded 
from collecting domestic intelligence, especially involving U.S. 
persons. The FBI or other law enforcement agencies dealing with 
classified intelligence would be the appropriate Government 
representatives. However, before considering sending Government 
personnel to select high-risk institutions, a number of impediments 
would need to be resolved. The General Counsels from the financial 
institution and Government agencies would need to assess the legality 
and potential liabilities of such a relationship. Two other 
considerations would need to be considered. First, by sending personnel 
to select financial institutions would the Government be unwittingly 
providing that institution with an unfair competitive advantage? 
Second, does the Government have the resources to devote to this type 
of initiative?
    While I ran TFOS at the FBI, we actually had an operation with a 
financial services provider, similar to what was suggested in the above 
question. We worked through the impediments and formed a public-private 
partnership that achieved extremely productive investigative results. 
This was a terrific model of how the financial services sector and law 
enforcement could form a strategic partnership in furtherance of 
National security. Because of the sensitivity of that initiative, I 
cannot comment about it any further.
        Questions From Chairman Patrick Meehan for Sue E. Eckert
    Question 1a. With our military successes against al-Qaeda core 
leadership in Afghanistan and Pakistan, there is a growing trend of al-
Qaeda affiliated groups and adherents filling the void and taking the 
lead in launching attacks against the homeland.
    Given the relatively low amount of money required to plan and 
launch a terrorist attack, how realistic is it to expect U.S. and 
international counterterrorism entities to identify funds that might be 
used to undertake terrorism-related activity?
    Answer. Response was not received at the time of publication.
    Question 1b. What are some of the persistent challenges in 
identifying and investigating an activity suspected of financing 
terrorism? What are some of the trends in how terrorist groups 
acquiring funds to support their objectives?
    Answer. Response was not received at the time of publication.
    Question 1c. Is the decision to pursue a terror financing 
investigation based on the amount of money suspected of being acquired 
for terrorism-related purposes? If so, what is the minimum monetary 
amount of terrorism-related funds the U.S. Government assesses as 
worthy of investigating?
    Answer. Response was not received at the time of publication.
    Question 1d. Can you describe the decision-making process and 
considerations by which the U.S. intelligence and law enforcement 
communities decide whether to stop terrorism-financing related activity 
and charge a suspect arrest or choose to allow the activity to continue 
in hopes of following the trail of funds to a larger network of support 
or to entities that may be planning a terrorist attack?
    Answer. Response was not received at the time of publication.
    Question 2. President Obama recently signed an Executive Order 
allowing the Treasury Department to freeze U.S.-based assets of persons 
who the White House has identified as a ``threat to the peace, 
security, and stability'' of Yemen.
    Do you think this is an effective use of the designation authority? 
Especially when a group such as Boko Haram--who have killed thousands 
of civilians and are in constant contact with AQIM--remain 
undesignated?
    Answer. Response was not received at the time of publication.
    Question 3a. In 2011, the U.S. Government revealed the findings of 
a multi-year law enforcement operation to dismantle a complex, 
transnational network involved in money laundering and drug 
trafficking. The case involved Hezbollah, Mexican and Colombian drug 
trafficking organizations, the Taliban, Lebanon, Colombia, Panama, 
several countries in West Africa, U.S. car buyers, a U.S. shipping 
company, bulk cash couriers, plans for weapons trafficking deals, and 
the Beirut-based Lebanese Canadian Bank (LCB).
    Does the fact that groups such as Hezbollah and the Islamic 
Revolutionary Guard Corps continue to use criminal ventures create 
opportunities for U.S. enforcement mechanisms--such as our robust 
counternarcotics tools--to roll up these vast networks?
    Answer. Response was not received at the time of publication.
    Question 3b. How does counterterrorism fit in this increasingly 
interconnected underworld?
    Answer. Response was not received at the time of publication.
    Question 4a. The U.S. Government's on-going investigation of the 
Lebanese Canadian Bank is of particular interest from a money 
laundering perspective because it highlights the consequences of poor 
compliance with anti-money laundering regulations in the formal 
financial system.
    Given the Lebanese Canadian Bank case, what more can be done to 
protect the formal financial system from exploitation by terrorists?
    Answer. Response was not received at the time of publication.
    Question 4b. How can the U.S. Government more effectively mitigate 
the threats posed by trade-based money laundering and bulk cash 
smuggling and other ways outside the formal financial sector?
    Answer. Response was not received at the time of publication.
    Question 5. There is an increasing concern in the counterterrorism 
and intelligence community that terrorist organizations are 
increasingly using criminal activities that are outside of the formal 
international financial system to raise funds to carry out attacks and 
further their goals.
    How important are terrorist funds derived from criminal activities 
for the operational sustainability of major terrorist groups compared 
to other non-criminal sources of funds, including state sponsors and 
private-sector donations?
    Answer. Response was not received at the time of publication.
    Question 6. Foreign Terrorist Organization designation by the 
Secretary of State is an important tool our Government uses to deter 
donations or contributions to and economic transactions with terrorist 
organizations. There are currently 50 groups listed by the State 
Department as designated Foreign Terrorist Organizations.
    Which FTO-designated groups would you say are the best resourced 
and most proficient at evading American and international financial 
regulations? Which use the U.S. financial system the most?
    Answer. Response was not received at the time of publication.
    Question 7. All of the witnesses mentioned in their prepared 
testimony that the Government needs to interact with the financial 
sector to identify terrorist financing.
    How should the Government develop more effective case typologies 
and feedback mechanisms about how terrorists use financial 
institutions? Is this mostly an educational issue where we need to 
empower financial institutions in order to monitor transactions for 
suspicious or anomalous behavior?
    Answer. Response was not received at the time of publication.
    Question 8a. The Financial Action Task Force on Money Laundering is 
comprised of 36 member countries and territories and two international 
organizations and was organized to develop and promote policies to 
combat money laundering and terrorist financing. The FATF relies on a 
combination of annual self-assessments and periodic mutual evaluations 
that are completed by a team of FATF experts to provide information and 
to assess the compliance of its members to the FATF guidelines.
    What are the areas of greatest need for improvement in the FATF 
surveillance process?
    Answer. Response was not received at the time of publication.
    Question 8b. How does the United States evaluate the threats to the 
global economy arising from money laundering, terrorist financing, and 
financing the proliferation of weapons of mass destruction?
    Answer. Response was not received at the time of publication.
    Question 8c. How should we be prioritizing these threats and how 
effectively has the FATF process been in addressing these threats?
    Answer. Response was not received at the time of publication.
    Question 9. KPMG, a private consulting firm, released in October 
2011 the findings of an anti-money laundering survey of major 
international banks. They found that 80% of respondents reported an 
increase in costs associated with anti-money laundering that averaged 
around 45% since 2007. The major sources of cost increases identified 
by the KMPG survey were: (1) Enhanced transaction monitoring, (2) 
increased external reporting requirements to internal regulators and 
external law enforcement agencies, and (3) increased anti-bribery and 
anti-corruption activities.
    In your opinion, are there sufficient resources devoted to 
countering the financing of terrorism and money laundering? 
Alternatively, are the resource costs associated with implementing such 
financial regulations too burdensome on either the private or public 
sectors?
    Answer. Response was not received at the time of publication.
    Question 10. There has been growing concern at DHS, particularly 
within ICE, about the widespread use of prepaid and stored value cards 
as a way of smuggling illicit funds into the country which could fund 
terror activity. Some estimates are that $1 billion annually is moved 
into the country this way, with most of those funds nearly impossible 
to track.
    Would you agree that prepaid and stored value cards are a growing 
danger to being able to target terrorist financiers? What steps would 
you recommend DHS and the Department of the Treasury take to combat 
this emerging trend?
    Answer. Response was not received at the time of publication.
    Question 11a. On June 29, 2012, the Obama administration imposed 
sanctions on a pair of informal money-exchange networks--known as 
hawalas--in Afghanistan and Pakistan in what officials described as the 
first use of the tactic to attack the financial underpinnings of 
Taliban militants who rely on the system to fund their insurgency. The 
Treasury Department said that the designations were coordinated with 
similar measures adopted by the United Nations as part of a broad 
effort to slow the flow of cash used by the Taliban to pay salaries and 
purchase weapons for attacks in Afghanistan. The United Nations also 
added the names of the same two institutions and their principal 
backers to a list of groups officially associated with Taliban 
militancy, meaning they will be subject to international sanctions as 
well.
    Considering how widespread their use is, how difficult is it for 
U.S. Government to really get a handle on some of the terror financing 
and money-laundering activities being conducted under the hawala 
system?
    Answer. Response was not received at the time of publication.
    Question 11b. How could the United States be more effective in 
targeting the hawala systems being used by drug traffickers to fuel the 
Taliban insurgency in Afghanistan and Pakistan?
    Answer. Response was not received at the time of publication.
    Question 11c. Would closer collaboration with the United Nations 
help our Government's ability to identify hawala networks engaged in 
illegal behavior?
    Answer. Response was not received at the time of publication.
     Questions From Ranking Member Brian Higgins for Sue E. Eckert
    Question 1. Ms. Eckert, have Government officials identified any 
specific indicators of terrorist financing? What are the triggers that 
actually ``tip'' law enforcement into knowing that a specific group is 
engaging in illegal financial schemes that are actually funding 
terrorism? Would there be an exhaustive list given our diverse threat?
    Answer. Response was not received at the time of publication.
    Question 2. Ms. Eckert, what metrics are in place to actually 
measure the success of the targeted sanctions and statutes put in place 
to prevent terrorism funding since 9/11? What do we use to measure? We 
cannot count the amount of lives saved, but we can assess dollar 
figures and convictions, but these may also be misleading? What do you 
suggest?
    Answer. Response was not received at the time of publication.
    Question 3. Ms. Eckert, earlier this year, the American Bar 
Association had a panel discussing the disparate impact of terrorist 
finance enforcement on charities and non-profits. Explain how this 
enforcement has a disparate impact and what if anything that you know 
that the Treasury and Department of Justice are doing to make sure that 
their terrorist financing enforcement is fair?
    Answer. Response was not received at the time of publication.
    Question 4. The threat to the United States has diversified greatly 
since 9/11. How have our terrorist financing enforcement mechanisms 
adequately kept up with the diverse threat?
    Answer. Response was not received at the time of publication.