GMSS Money Laundering DA

advertisement
NEG
1NC
Money Laundering being successfully checked now
Schectman 15
(a reporter for Risk & Compliance Journal and previously wrote for CIO Journal, Joel, “U.S.
Official Says Money Launderers Have Been Hamstrung”, The Wall Street Journal, Jun 12, 2015,
http://blogs.wsj.com/riskandcompliance/2015/06/12/u-s-official-says-money-launderers-havebeen-hamstrung/, GCM)
The U.S. Treasury Department says its efforts to squeeze money launderers and terrorists out of
the U.S. financial system are working. Two Treasury Department assessments, released Friday,
found that new bank requirements, sanctions and a heightened culture of compliance had
effectively pushed illegal activity to the fringes of the financial system. Drug dealers and
terrorists are now often forced to rely on costly and inefficient ways of moving money, such as
shipments of hard cash, a senior Treasury official said on a conference call with reporters. The
Treasury assessment–the first in more than a decade–uncovered no new or emerging methods
used by criminals or terrorists, the official said. “[Money launderers] have been constrained in
their existing methods,” which include conspiring with employees at banks and using
unregistered foreign money transmitters, said the official, who the Treasury Department
requested not be named. Despite these successes, money launderers continue to use shell
companies to hide the purpose of transactions. One of the agency reports points out that under
state laws, businessmen can register corporate entities under an attorney’s name without
revealing the true owners. These corporate entities are sometimes used to covertly move illicit
funds, and skirt anti-money laundering rules, the report said. The Treasury Department is
pushing for legislation that would make sure beneficial ownership is recorded, the official said.
Mass data collection helps stop money laundering and drug trafficking
Heath 15
(An investigative reporter at USA TODAY, writing primarily about law and criminal justice- His work includes award-winning series on
misconduct by federal prosecutors and air pollution outside schools. He has a law degree from Georgetown University, Brad, “US
secretly tracked billions of calls for decades”, USA Today, April 8, 2015, http://www.usatoday.com/story/news/2015/04/07/deabulk-telephone-surveillance-operation/70808616/, ASN)
The DEA began assembling a data-gathering program in the 1980s as the government searched for new ways to battle Colombian drug cartels. Neither informants nor undercover agents had been enough to crack
the cartels' infrastructure. So the agency's intelligence arm turned its attention to the groups' communication networks. Calling records – often called "toll records" – offered one way to do that. Toll records are
, DEA agents had decades of
experience gathering toll records of people they suspected were linked to drug trafficking, albeit one
comparable to what appears on a phone bill – the numbers a person dialed, the date and time of the call, its duration and how it was paid for. By then
person at a time. In the late 1980s and early 1990s, officials said the agency had little way to make sense of the data their agents accumulated and almost no ability to use them to ferret out new cartel
The military responded
with a pair of supercomputers and intelligence analysts who had experience tracking the
communication patterns of Soviet military units. "What they discovered was that the incident of a communication was perhaps as important as the content of a communication," a
former Justice Department official said. The military installed the supercomputers on the fifth floor of the DEA's headquarters, across from a shopping mall in Arlington, Va. The system they
built ultimately allowed the drug agency to stitch together huge collections of data to map
trafficking and money laundering networks both overseas and within the USA. It allowed agents to link the call records
connections. Some agents used legal pads. "We were drowning in toll records," a former intelligence official said. The DEA asked the Pentagon for help.
its agents gathered domestically with calling data the DEA and intelligence agencies had acquired outside the USA. (In some cases, officials said the DEA paid employees of foreign telecom firms for copies of call
The result "produced
major international investigations that allowed us to take some big people," Constantine said, though he said he could not
logs and subscriber lists.) And it eventually allowed agents to cross-reference all of that against investigative reports from the DEA, FBI and Customs Service.
identify particular cases. In 1989, President George H.W. Bush proposed in his first prime-time address using "sophisticated intelligence-gathering and Defense Department technology" to disrupt drug trafficking.
the drug agency intensified its intelligence push, launching a
"kingpin strategy" to attack drug cartels by going after their finances, leadership and communication. In 1992, in the last months
Three years later, when violent crime rates were at record highs,
of Bush's administration, Attorney General William Barr and his chief criminal prosecutor, Robert Mueller, gave the DEA permission to collect a much larger set of phone data to feed into that intelligence
operation. Instead of simply asking phone companies for records about calls made by people suspected of drug crimes, the Justice Department began ordering telephone companies to turn over lists of all phone
calls from the USA to countries where the government determined drug traffickers operated, current and former officials said. Barr and Mueller declined to comment, as did Barr's deputy, George Terwilliger III,
"It has been apparent for a long time in both the law enforcement and intelligence
worlds that there is a tremendous value and need to collect certain metadata to support
legitimate investigations." The data collection was known within the agency as USTO (a play on the fact that it tracked calls from the U.S. to other countries). The DEA obtained
though Terwilliger said,
those records using administrative subpoenas that allow the agency to collect records "relevant or material to" federal drug investigations. Officials acknowledged it was an expansive interpretation of that
authority but one that was not likely to be challenged because unlike search warrants, DEA subpoenas do not require a judge's approval. "We knew we were stretching the definition," a former official involved in
the process said. Officials said a few telephone companies were reluctant to provide so much information, but none challenged the subpoenas in court. Those that hesitated received letters from the Justice
Department urging them to comply. After Sprint executives expressed reservations in 1998, for example, Warren, the head of the department's drug section, responded with a letter telling the company that
he initiative has been determined to be legally appropriate" and that turning over the call data
was "appropriate and required by law." The letter said the data would be used by authorities "to focus scarce investigative resources by means of sophisticated
"t
pattern and link analysis." The letter did not name other telecom firms providing records to the DEA but did tell executives that "the arrangement with Sprint being sought by the DEA is by no means unique to
Sprint" and that "major service providers have been eager to support and assist law enforcement within appropriate bounds." Former officials said the operation included records from AT&T and other telecom
companies. A spokesman for AT&T declined to comment. Sprint spokeswoman Stephanie Vinge Walsh said only that "we do comply with all state and federal laws regarding law enforcement subpoenas." Agents
said that when the data collection began, they sought to limit its use mainly to drug investigations and turned away requests for access from the FBI and the NSA. They allowed searches of the data in terrorism
cases, including the bombing of a federal building in Oklahoma City that killed 168 people in 1995, helping to rule out theories linking the attack to foreign terrorists. They allowed even broader use after Sept. 11,
2001. The DEA's public disclosure of its program in January came in the case of a man charged with violating U.S. export restrictions by trying to send electrical equipment to Iran. At first, officials said the DEA
gathered records only of calls to a handful of countries, focusing on Colombian drug cartels and their supply lines. Its reach grew quickly, and by the late 1990s, the DEA was logging "a massive number of calls,"
said a former intelligence official who supervised the program. Former officials said they could not recall the complete list of countries included in USTO, and the coverage changed over time. The Justice
Department and DEA added countries to the list if officials could establish that they were home to outfits that produced or trafficked drugs or were involved in money laundering or other drug-related crimes. The
Justice Department warned when it disclosed the program in January that the list of countries should remain secret "to protect against any disruption to prospective law enforcement cooperation." At its peak, the
operation gathered data on calls to 116 countries, an official involved in reviewing the list said. Two other officials said they did not recall the precise number of countries, but it was more than 100. That gave the
collection a considerable sweep; the U.S. government recognizes a total of 195 countries. At one time or another, officials said, the data collection covered most of the countries in Central and South America and
the Caribbean, as well as others in western Africa, Europe and Asia. It included Afghanistan, Pakistan, Iran, Italy, Mexico and Canada. The DEA often — though not always — notified foreign governments it was
collecting call records, in part to make sure its agents would not be expelled if the program was discovered. In some cases, the DEA provided some of that information to foreign law enforcement agencies to help
them build their own investigations, officials said. The DEA did not have a real-time connection to phone companies' data; instead, the companies regularly provided copies of their call logs, first on computer disks
and later over a private network. Agents who used the system said the numbers they saw were seldom more than a few days old. The database did not include callers' names or other identifying data. Officials said
agents often were able to identify individuals associated with telephone numbers flagged by the analysis, either by cross-referencing them against other databases or by sending follow-up requests to the phone
companies. To keep the program secret, the DEA sought not to use the information as evidence in criminal prosecutions or in its justification for warrants or other searches. Instead, its Special Operations Division
passed the data to field agents as tips to help them find new targets or focus existing investigations, a process approved by Justice Department lawyers. Many of those tips were classified because the DEA phone
searches drew on other intelligence data. That practice sparked a furor when the Reuters news agency reported in 2013 that the DEA trained agents to conceal the sources of those tips from judges and defense
lawyers. Reuters said the tips were based on wiretaps, foreign intelligence and a DEA database of telephone calls gathered through routine subpoenas and search warrants. As a result, "the government shortcircuited any debate about the legality and wisdom of putting the call records of millions of innocent people in the hands of the DEA," American Civil Liberties Union lawyer Patrick Toomey said.
Money Laundering erodes political and social systems affecting stability,
diminishes economic growth, and hurts basic individual liberties
Crime and Misconduct Commission 05
(The Crime and Corruption Commission (CCC) is a statutory body set up to combat and reduce
the incidence of major crime and corruption in the public sector in Queensland. Its functions and
powers are set out in the Crime and Corruption Act 2001, “Background intelligence brief Money
laundering,” Crime and Corruption Commission, July 2005, http://www.ccc.qld.gov.au/researchand-publications/publications/crime/money-laundering.pdf, GCM)
There are many reasons why money laundering is harmful in society. Some examples are listed
below. It makes crime pay. Money laundering allows drug traffickers, smugglers and other
criminals to accumulate economic power and expand their operations. This has the potential to
erode the political and social systems of a country, and could affect stability and the general rule
of law (Alweendo 2005). This in turn drives up the cost of law enforcement and the spin-off
costs of health care in the treatment of problems such as drug addiction. It has the potential to
undermine the financial community because of the sheer magnitude of the sums involved.
Money laundering on a grand scale has the potential to change the demand for cash, make
interest rates and exchange rates more volatile, and cause high inflation rates for a country.
Laundering diminishes economic development because it undermines legitimate business,
competition and government tax revenue, and therefore indirectly harms honest taxpayers and
reduces legitimate job opportunities. Money laundering Perceived ease of entry to a country
attracts an undesirable element across its borders, degrading quality of life and raising concerns
about national security (Solicitor General Canada 1998). The crimes perpetrated by these
undesirable elements erode basic individual liberties by threatening rights to life and
entitlements to own property. There are great incentives, therefore, for governments and
private enterprise to work together to combat money laundering locally and globally.
Economic decline risks extinction
Auslin & Lachman, 2009, The Global Economy Unravels, Forbes, [Resident Scholar –
American Enterprise Institute; Resident Fellow – American Enterprise Institute, Michael;
Desmond], March 6, p. http://www.aei.org/article/100187
What do these trends mean in the short and medium term? The Great Depression showed how social and global
chaos
followed hard on economic collapse. The mere fact that parliaments across the globe, from America to Japan, are
unable to make responsible, economically sound recovery plans suggests that they do not know what to do and are simply hoping
for the least disruption. Equally worrisome is the adoption of more statist economic programs around the globe, and the concurrent
decline of trust in free-market systems. The threat of instability is a pressing concern. China, until last year the world's fastest
growing economy, just reported that 20 million migrant laborers lost their jobs. Even in the flush times of recent years, China faced
upward of 70,000 labor uprisings a year. A
sustained downturn poses grave and possibly immediate threats
to Chinese internal stability. The regime in Beijing may be faced with a choice of repressing its own people or diverting
their energies outward, leading to conflict with China's neighbors. Russia, an oil state completely dependent on energy sales, has
had to put down riots in its Far East as well as in downtown Moscow. Vladimir Putin's rule has been predicated on squeezing civil
liberties while providing economic largesse. If that devil's bargain falls apart, then wide-scale
repression inside Russia,
along with a continuing threatening posture toward Russia's neighbors, is likely. Even apparently
stable societies face increasing risk and the threat of internal or possibly external conflict. As Japan's exports have plummeted by
nearly 50%, one-third of the country's prefectures have passed emergency economic stabilization plans. Hundreds of thousands of
temporary employees hired during the first part of this decade are being laid off. Spain's unemployment rate is expected to climb to
nearly 20% by the end of 2010; Spanish unions are already protesting the lack of jobs, and the specter of violence, as occurred in the
1980s, is haunting the country. Meanwhile, in Greece, workers have already taken to the streets. Europe
as a whole will
face dangerously increasing tensions between native citizens and immigrants, largely from poorer Muslim nations,
who have increased the labor pool in the past several decades. Spain has absorbed five million immigrants since 1999, while nearly
9% of Germany's residents have foreign citizenship, including almost 2 million Turks. The xenophobic labor strikes in the U.K. do not
bode well for the rest of Europe. A
prolonged global downturn, let alone a collapse, would dramatically raise
tensions inside these countries. Couple that with possible protectionist legislation in the United States, unresolved ethnic
and territorial disputes in all regions of the globe and a loss of confidence that world leaders actually know what they are doing.
The result may be a series of small explosions that coalesce into a big bang.
Uniqueness
Frontline
AML in the squo prevents money laundering
Sareena M. Sawhney 4/25/14 (CONSEQUENCES OF HAVING A POOR ANTI-MONEY LAUNDERING
PROGRAM, Sareena M. Sawhney, MBA, CFE, CAMS, MAFF, is a Director in the Litigation and
Corporate Financial Advisory Services Group at Marks Paneth LLP,
http://www.markspaneth.com/publications/consequences-of-having-a-poor-anti-moneylaundering-program, ZV)
Section 352 of the Patriot Act requires all financial institutions to establish AML programs
inclusive of the following: Establish internal policies, procedures, and controls to prevent money
laundering; Designate a money laundering compliance officer; Establish an ongoing training
program for awareness of money laundering; Establish an independent audit function to test
the programs. Section 326 of the Patriot Act expands on the Bank Secrecy Act by requiring
financial institutions to implement Customer Identification Programs (“CIPs”). The CIPs are to be
incorporated into financial institutions’ money laundering programs and should verify and
maintain records of any individual seeking to open an account. The Patriot Act also prohibits
foreign shell banks from maintaining correspondent accounts at any US financial institution.
“Shell banks” lack a physical presence[4] in any country. It is strongly encouraged that the US
institutions verify all the information provided by the foreign institution at least every two years.
Additionally, financial institutions are required to establish due diligence policies, procedures
and controls that are designed to detect money laundering through private and correspondent
bank accounts[5] held by non-US citizens. Brokers and dealers in securities must file with FinCEN
(Financial Crimes Enforcement Network) a report of any suspicious activity that involves funds
or assets of at least $5,000, and the broker-dealer knows, suspects or has reason to suspect that
the transaction involves illegal activity, evades regulations under the Bank Secrecy Act or has no
business or lawful purpose in which a particular customer would expect to engage in.
There is no guaranteed way to stop money laundering. – but constant vigilance
is key.
Chianuri 6/23/15,
(Certified Anti-Money Laundering Specialist (CAMS) from the Association of Certified Anti-Money
Laundering Specialists (ACAMS), Valerie, “Treasury Department Publishes National Money Laundering Risk
Assessment and National Terrorist Financing Risk Assessment”, Davis Wright Tremaine LLP, 6/23/15,
http://www.jdsupra.com/legalnews/treasury-department-publishes-national-92243/, GCM)
The Department acknowledged that there is no “silver bullet” to combating money laundering
and terrorist financing in its press release accompanying the NMLRA and the NTFRA
and stresses that institutions should not use these assessments as sole sources of
information for developing their compliance efforts. The responsibility for development of
comprehensive compliance programs resides squarely with the institutions which should remain
constantly vigilant to the new money laundering methods developed by criminals.
Extentions
1/3 of FBI’s criminal referrals were money laundering
Megan Wallin 6-24-15 (“NSA can still see you”, Megan Wallin is a young writer with a background in
the social sciences, http://baltimorepostexaminer.com/nsa-can-still-see-you/2015/06/24, ZV)
Between 2003 and 2005, government records show that 143, 074 letters were issued by FBI
agents approving their ability to obtain secure information from individuals. Of the 53 actual
criminal referrals resulting, 17 were for money laundering, 17 for illegal immigration charges, 19
involved cases of fraud, and not a single one was turned in for suspected terrorism. That’s right.
According to UCLA’s analysis of the records, titled “Surveillance Under the Patriot Act,” fewer
than five years after the 9/11 attacks, the findings produced no progress toward seeking out
terrorists
Links
Link – Generics
Electronic surveillance prevents crimes with different methods.
Solove 4, Daniel J. Solove, Reconstructing Electronic Surveillance Law, 72 Geo. Wash. L. Rev.
1264 (2004).
http://scholarship.law.gwu.edu/cgi/viewcontent.cgi?article=2088&context=faculty_publications
, TK
Electronic surveillance is one of the central tools of modern law enforcement. It can aid
significantly in the investigations of crimes, for it allows the government to watch and listen to people during their unguarded
moments, when they may speak about their criminal activity. Video cameras may capture criminals in the act and aid
in their identification and arrest. Surveillance can also assist in preventing crimes because it
enables the government to learn about criminal activity that is afoot and to halt it before it
happens. Few would argue that these are not significant benefits. Surveillance can also prevent crime in another way. In 1791, Jeremy Bentham
imagined a new architectural design for a prison which he called the Panopticon.17 As Michel Foucault describes it: [A]t the periphery,
an annular building; at the centre, a tower; this tower is pierced with wide windows that open onto the inner side of the ring; the peripheric building is
divided into cells, each of which extends the whole width of the building . . . . All that is needed, then, is to place a supervisor in a central tower and to
shut up in each cell a madman, a patient, a condemned man, a worker or a schoolboy. By the effect of backlighting, one can observe from the tower,
standing out precisely against the light, the small captive shadows in the cells of the periphery. They are like so many cages, so many small theatres, in
which each actor is alone, perfectly individualized and constantly visible.18 The Panopticon achieves
obedience and discipline by
having all prisoners believe they could be watched at any moment. Their fear of being watched
inhibits transgression. Surveillance can thus prevent crime by making people decide not to
engage in it at all. More generally, surveillance is good because it is a highly effective tool for maintaining social order. We want to
foster a society where people are secure from theft, vandalism, assault, murder, rape, and
terrorism. We thus desire social control, and surveillance can help achieve that end.
Link – CCTV
CCTV use is increasing and is able to monitor more areas
Kille and Maimino 14
(Director at the Harvard Kennedy School – seven year assistant editor at the Boston Phoenix – managing editor at the San Francisco
Bay Guardian – research on environment, energy, sustainability, transportation and urbanism, Leighton and Martin, “The effect of
CCTV on public safety: Research roundup”, Shorenstein Center on Media, Politics and Public Policy, February 11, 2014,
http://journalistsresource.org/studies/government/criminal-justice/surveillance-cameras-and-crime, ASN)
Millions of closed-circuit television (CCTV) cameras are installed in streets and businesses throughout the world with the stated goal
of reducing crime and increasing public safety. The United Kingdom is one of the most enthusiastic proponents, with an estimated
1.9 million cameras in 2011 — one for every 32 U.K. residents — and the number continues to rise. Chicago reportedly has at least
15,000 cameras installed in one of the largest U.S. networks — which has prompted civil liberties groups to express strong concerns
— while in New York, cameras are increasingly found both on public transit as well as in businesses and even high-end residences.
The 9/11 attacks led many municipalities to start installing CCTV systems, but sometimes what’s put in
place goes beyond the original mandate: For example, Oakland, Calif., took $7 million of federal money intended for safeguarding its
port and is using it to create a citywide surveillance system instead. According to industry estimates, the
global video
surveillance market is expected to grow from $11.5 billion in 2008 to $37.7 billion in 2015. A 2013 New York
Times/CBS poll found that 78% of respondents supported the use of surveillance cameras in public
places, and authorities tend to point to spectacular successes — for example, crucial images
cameras provided of the Boston Marathon bombing suspects or the identification of those responsiblefor the
2005 London attacks. Still, concerns remain about systems’ potential to violate personal privacy as well as their overall costeffectiveness. A 2013 Chicago Tribune opinion piece quoted a city spokesman as saying that surveillance cameras helped solve 4,500
crimes over four years, but the writer notes that more than a million are estimated to have taken place over that time period —
meaning that the cameras’ contribution was 0.05% at best. CCTV cameras also have the potential of creating unintended effects,
good and bad. The “halo effect” refers to the potential for greater security in areas outside the view of cameras; this could be offset
by the “displacement effect,” which pushes antisocial activity to other parts of the city. Cameras could also promote a false sense of
security and lead citizens to take fewer precautions, or they could also cause more crimes to be reported, and thus lead to a
perceived increase in crime. And as with the 2013 revelations of widespread data collection by the U.S. National Security
Administration, the indiscriminate gathering of information on law-abiding citizens, however well-intentioned, has the potential for
misuse. The Washington Post reported in February 2014 that new
aerial video surveillance technologies are
being deployed that can monitor virtually everything in an area the size of a small city. A 2010
document from the European Forum for Urban Security, “Charter for a Democratic Use of Video-Surveillance,” provides a useful
overview of the issues at stake as well as a set of principles and tools to ensure that citizens’ rights are
respected with CCTV systems. These include: Necessity: The use of camera systems must be justified
empirically, ideally by an independent authority. Objectives and intended outcomes must be defined. Proportionality:
CCTV equipment must be appropriate for the problem it is intended to address. Technology should
“respond to the established objectives, without going further.” Data should be protected and the length of time it is retained be
clearly defined. Transparency: Citizens should know what the objectives of a CCTV system are, what its
installation and operational costs are, the areas being surveyed, and what the results are. Reports should occur regularly so citizens
can make informed decisions. Accountability:
Those in charge of public CCTV systems should be clearly
identified and accountable to the public, whether the systems are run by the government or private firms.
Independent oversight: An external body should be charged with ensuring that systems respect
the public’s rights and are achieving their stated objectives. Ideally citizens would have a voice in the oversight
process.
Link – DEA
Curtailing surveillance crushes DEA crime prevention.
Wing, 14
Nick Wing, Senior Viral Editor at The Huffington Post., 10/24/14(“The DEA Once
Turned A 14-Year-Old Into A Drug Kingpin. Welcome To The War On Drugs”,
The Huffington Post, October 24th, 2014,
http://www.huffingtonpost.com/2014/10/24/dea-war-ondrugs_n_6030920.html, Accessed: July 13th, 2015, DSF)
The DEA has been spying on U.S. citizens with a surveillance program more expansive than the
NSA's.
Just months after Edward Snowden unmasked the National Security Agency's massive domestic
spying program, The New York Times broke news of the Hemisphere Project, which pairs experts
from telecommunications giant AT&T with federal and local anti-drug officials, including DEA
agents. It gives law enforcement officials access to "every call that passes through an AT&T
switch -- not just those made by AT&T customers -- and includes calls dating back 26 years,"
according to the Times report. That's around 4 billion call records every day, each logged with
information on the location of callers. The official government slideshow describing the program
suggested it had been helpful in tracking drug dealers who frequently change phones, or use
disposable "burner" phones.
The White House attempted to allay privacy concerns about the Hemisphere Project last year,
noting that AT&T stores the collected data, unlike in the NSA's program, in which data is turned
over to the government. Federal officials can quickly access the records, however, often within
an hour of a subpoena.
Mass data collection helps stop money laundering and drug trafficking
Heath 15
(An investigative reporter at USA TODAY, writing primarily about law and criminal justice- His work includes award-winning series on
misconduct by federal prosecutors and air pollution outside schools. He has a law degree from Georgetown University, Brad, “US
secretly tracked billions of calls for decades”, USA Today, April 8, 2015, http://www.usatoday.com/story/news/2015/04/07/deabulk-telephone-surveillance-operation/70808616/, ASN)
The DEA began assembling a data-gathering program in the 1980s as the government searched for new ways to battle Colombian
drug cartels. Neither informants nor undercover agents had been enough to crack the cartels' infrastructure. So the agency's
intelligence arm turned its attention to the groups' communication networks. Calling records – often called "toll records" – offered
one way to do that. Toll records are comparable to what appears on a phone bill – the numbers a person dialed, the date and time
of the call, its duration and how it was paid for. By then,
DEA agents had decades of experience gathering toll
records of people they suspected were linked to drug trafficking, albeit one person at a time. In the late
1980s and early 1990s, officials said the agency had little way to make sense of the data their agents accumulated and almost no
ability to use them to ferret out new cartel connections. Some agents used legal pads. "We were drowning in toll records," a former
intelligence official said. The DEA asked the Pentagon for help. The
military responded with a pair of
supercomputers and intelligence analysts who had experience tracking the communication
patterns of Soviet military units. "What they discovered was that the incident of a communication was perhaps as important as
the content of a communication," a former Justice Department official said. The military installed the supercomputers on the fifth
floor of the DEA's headquarters, across from a shopping mall in Arlington, Va. The
system they built ultimately
allowed the drug agency to stitch together huge collections of data to map trafficking and
money laundering networks both overseas and within the USA. It allowed agents to link the call records its
agents gathered domestically with calling data the DEA and intelligence agencies had acquired outside the USA. (In some cases,
officials said the DEA paid employees of foreign telecom firms for copies of call logs and subscriber lists.) And it eventually allowed
agents to cross-reference all of that against investigative reports from the DEA, FBI and Customs Service. The result
"produced major international investigations that allowed us to take some big people," Constantine
said, though he said he could not identify particular cases. In 1989, President George H.W. Bush proposed in his first prime-time
address using "sophisticated intelligence-gathering and Defense Department technology" to disrupt drug trafficking. Three years
later, when violent crime rates were at record highs, the drug agency intensified its intelligence
push, launching a "kingpin strategy" to attack drug cartels by going after their finances,
leadership and communication. In 1992, in the last months of Bush's administration, Attorney General William Barr and
his chief criminal prosecutor, Robert Mueller, gave the DEA permission to collect a much larger set of phone data to feed into that
intelligence operation. Instead of simply asking phone companies for records about calls made by people suspected of drug crimes,
the Justice Department began ordering telephone companies to turn over lists of all phone calls from the USA to countries where
the government determined drug traffickers operated, current and former officials said. Barr and Mueller declined to comment, as
did Barr's deputy, George Terwilliger III, though Terwilliger said, "It
has been apparent for a long time in both the
law enforcement and intelligence worlds that there is a tremendous value and need to collect
certain metadata to support legitimate investigations." The data collection was known within the agency as
USTO (a play on the fact that it tracked calls from the U.S. to other countries). The DEA obtained those records using
administrative subpoenas that allow the agency to collect records "relevant or material to"
federal drug investigations. Officials acknowledged it was an expansive interpretation of that authority but one that was
not likely to be challenged because unlike search warrants, DEA subpoenas do not require a judge's approval. "We knew we were
stretching the definition," a former official involved in the process said. Officials said a few telephone companies were reluctant to
provide so much information, but none challenged the subpoenas in court. Those that hesitated received letters from the Justice
Department urging them to comply. After Sprint executives expressed reservations in 1998, for example, Warren, the head of the
department's drug section, responded with a letter telling the company that "the
initiative has been determined to be
legally appropriate" and that turning over the call data was "appropriate and required by law."
The letter said the data would be used by authorities "to focus scarce investigative resources by means of sophisticated pattern and
link analysis." The letter did not name other telecom firms providing records to the DEA but did tell executives that "the
arrangement with Sprint being sought by the DEA is by no means unique to Sprint" and that "major service providers have been
eager to support and assist law enforcement within appropriate bounds." Former officials said the operation included records from
AT&T and other telecom companies. A spokesman for AT&T declined to comment. Sprint spokeswoman Stephanie Vinge Walsh said
only that "we do comply with all state and federal laws regarding law enforcement subpoenas."
Agents said that when
the data collection began, they sought to limit its use mainly to drug investigations and turned
away requests for access from the FBI and the NSA. They allowed searches of the data in
terrorism cases, including the bombing of a federal building in Oklahoma City that killed 168
people in 1995, helping to rule out theories linking the attack to foreign terrorists. They allowed even
broader use after Sept. 11, 2001. The DEA's public disclosure of its program in January came in the case of a man charged with
violating U.S. export restrictions by trying to send electrical equipment to Iran. At first, officials said the DEA gathered records only of
calls to a handful of countries, focusing on Colombian drug cartels and their supply lines. Its reach grew quickly, and by the late
1990s, the DEA was logging "a massive number of calls," said a former intelligence official who supervised the program. Former
officials said they could not recall the complete list of countries included in USTO, and the coverage changed over time. The
Justice Department and DEA added countries to the list if officials could establish that they were
home to outfits that produced or trafficked drugs or were involved in money laundering or other
drug-related crimes. The Justice Department warned when it disclosed the program in January that the list of countries
should remain secret "to protect against any disruption to prospective law enforcement cooperation." At its peak, the operation
gathered data on calls to 116 countries, an official involved in reviewing the list said. Two other officials said they did not recall the
precise number of countries, but it was more than 100. That gave the collection a considerable sweep; the U.S. government
recognizes a total of 195 countries. At one time or another, officials said, the data collection covered most of the countries in Central
and South America and the Caribbean, as well as others in western Africa, Europe and Asia. It included Afghanistan, Pakistan, Iran,
Italy, Mexico and Canada. The DEA often — though not always — notified foreign governments it was collecting call records, in part
to make sure its agents would not be expelled if the program was discovered. In some cases, the DEA provided some of that
information to foreign law enforcement agencies to help them build their own investigations, officials said. The DEA did not have a
real-time connection to phone companies' data; instead, the companies regularly provided copies of their call logs, first on computer
disks and later over a private network. Agents
who used the system said the numbers they saw were
seldom more than a few days old. The database did not include callers' names or other
identifying data. Officials said agents often were able to identify individuals associated with
telephone numbers flagged by the analysis, either by cross-referencing them against other
databases or by sending follow-up requests to the phone companies. To keep the program secret, the DEA
sought not to use the information as evidence in criminal prosecutions or in its justification for warrants or other searches.
Instead, its Special Operations Division passed the data to field agents as tips to help them find
new targets or focus existing investigations, a process approved by Justice Department lawyers.
Many of those tips were classified because the DEA phone searches drew on other intelligence data. That practice sparked a furor
when the Reuters news agency reported in 2013 that the DEA trained agents to conceal the sources of those tips from judges and
defense lawyers. Reuters said the tips were based on wiretaps, foreign intelligence and a DEA database of telephone calls gathered
through routine subpoenas and search warrants. As a result, "the government short-circuited any debate about the legality and
wisdom of putting the call records of millions of innocent people in the hands of the DEA," American Civil Liberties Union lawyer
Patrick Toomey said.
DEA using wiretaps and pen registers to catch international drug cartels
Kenny 11, Michael Kenny, August 15, 2011, From Pablo to Osama: Counter-terrorism Lessons
from the War on Drugs, Survival: Global Politics and Strategy,
http://dx.doi.org/10.1080/00396338.2003.9688585, TK
Michael Kenney is assistant professor of public policy at the School of Public Affairs at
Pennsylvania State University, Harrisburg
The Colombian cocaine ‘cartels’3 can be traced back to the 1970s, when numerous entrepreneurs sought to exploit the
demand for cocaine in US illegal drug markets by transporting small quantities of the drug from Ecuador, Bolivia and Peru to
Colombia, where it underwent further refinement in makeshift laboratories before final shipment northwards. Over time and
through repeated exchange, numerous entrepreneurs developed far-flung transportation and distribution networks capable of
coordinating several multi-tonne cocaine shipments a year. These ‘wheel networks’ contained
a core group that
coordinated activities among functionally specific nodes, including cocaine base suppliers,
processing labs, transportation rings and distribution groups that delivered cocaine to
independent retailers and funnelled the profits to network leaders and investors.4 While core groups
were generally based in Colombia, support nodes were located in different countries, giving these networks a transnational
dimension. To
reduce their exposure to law-enforcement penetration, participants in cross-border
transportation or wholesale distribution activities were often compartmentalised into small
working groups or ‘cells’ that maintained close communication with core groups and followed
elaborate procedures for delivering large amounts of drugs to independent wholesalers and
conducting other hazardous activities. The core groups directed the transnational enterprise, providing security and
resolving disputes and securing resources from independent investors. They also gathered intelligence about government drug
enforcement efforts and served as the communications hub for the network, coordinating transactions among peripheral nodes. If
something went wrong, informal relations of vertical accountability ensured that peripheral nodes answered to the core, protecting
kingpins and investors from theft and other risks. Decision-making authority generally flowed out and downwards from the core,
beginning with one or more kingpins that directed the transnational enterprise. Below them were ‘managers’ responsible for line
functions, such as transportation and wholesale distribution. Beneath managers were cell workers that carried out much of the daily
work of the enterprise. Kingpins or their day-to-day administrators sought to maintain control over their operations through
frequent communication with overseas managers, often mediated through brokers that provided an additional layer of insulation
from law enforcement. The predominantly vertical direction of command authority – proceeding from the hub of the core group
along spokes to the most peripheral operatives – and its multiple vectors made the cartels ‘wheel networks’. By the mid-1980s, US
and Colombian officials were fully attuned to the danger represented by a handful of wheel networks, particularly the notorious
Medellín and Cali enterprises. With
US assistance, Colombian drug enforcers launched several
crackdowns against the leaders of these transnational enterprises between 1984 and 1988, destroying processing
labs, seizing cocaine shipments and arresting (and occasionally extraditing) lower and middle-level
traffickers. However, core-group kingpins were not greatly affected by these short-lived offensives, as their elaborate security
arrangements allowed them to continue their illicit activities relatively unimpeded. Throughout the 1980s, police officials discovered
numerous multi-tonne cocaine shipments in the US, indicating the growing capacity of Colombian trafficking networks. Yet even the
largest of these seizures failed to put a significant dent in drug availability. While the estimated average price of cocaine at the
‘dealer’ level dropped from $191 per gram in 1981 to $65 per gram in 1989, during the same period the estimated purity of cocaine
at the same transaction level rose from 60% to 80%. The US
Drug Enforcement Administration (DEA)’s
response, in 1992, was the kingpin strategy. Leveraging the DEA’s investigative and intelligence
strengths, this initiative involved the aggressive use of electronic surveillance technologies,
including wiretaps, pen registers and trap-and-trace devices. A kingpin was defined as the leader of an
international trafficking enterprise who directs the production, transportation, and distribution of large quantities of cocaine or
heroin, as well as the organisation’s financial operations. By ‘neutralising’ kingpins and dismantling their criminal infrastructures, the
DEA hoped that it would be able to ‘significantly reduce the availability of drugs in the United States’.5 Principal targets of the
kingpin strategy were the leaders of the Colombian cocaine cartels. The initial list included Pablo Escobar, José Santacruz Londoño,
Gilberto and Miguel Rodríguez Orejuela, Helmer Buitrago Herrera, and Iván and Jairo Urdinola Grajales. In
close cooperation
with the Colombian National Police (CNP), the DEA sought to disable their trafficking networks
by attacking their communications, transportation and finance systems. After just a year and a
half of operation, the DEA reported that kingpin investigations had led to the seizure of $210
million in drug proceeds, the confiscation of 144 aircraft and 91 boats, trucks and cars, and the
arrest of over 713 ‘significant’ traffickers.6 In Colombia, elite drug enforcement units destroyed
hundreds of cocaine processing labs, seized thousands of kilograms of cocaine base and cocaine
hydrochloride, eradicated hundreds of thousands of hectares of coca leaf plantings, and
arrested hundreds of traffickers. Remarkably, by 1996 all of the original kingpins were either dead or in jail, and their
trafficking networks severely disrupted. Notwithstanding reports that some entrepreneurs continued to manage scaled-down
smuggling operations from behind bars, a number of government officials crowed that the days of the cocaine cartels were over.
Some went even further. Following the arrest of Gilberto Rodríguez-Orejuela, Colombian prosecutor general Alfonso Valdivieso
exulted that ‘narco-trafficking is in the way of disappearing from Colombia’.7 In
a war marked by considerable
frustration for lawenforcement agencies, the state appeared to have earned a major victory.
Link – Drug crime
USFG surveillance k2 stop the worst of drug crime. - empirics
US Courts, 12
US Courts, 12/31/2012 (“Wiretap Report 2012”, This report covers intercepts
concluded between January 1, 2012, and December 31, 2012, and provides
supplementary information on arrests and convictions resulting from intercepts
concluded in prior years, uscourts.gov, December 31, 2012,
http://www.uscourts.gov/statistics-reports/wiretap-report-2012, Accessed:
July 13th, 2015, DSF)
Drug offenses were the most prevalent type of criminal offenses investigated using wiretaps.
Table 3 indicates that 87 percent of all applications for intercepts (2,967 wiretaps) in 2012 cited
illegal drugs as the most serious offense under investigation. Homicide, the second-most
frequently cited crime, was specified as the most serious offense in more than 3 percent of
applications. Racketeering, the third-most frequently cited crime, was specified in less than 3
percent of applications. Many applications for court orders revealed that multiple criminal
offenses were under investigation, but Table 3 includes only the most serious criminal offense
listed on an application.
In 2012, installed wiretaps were in operation for an average of 39 days, 3 days below the
average in 2011. The federal wiretap with the most intercepts occurred in the Western District
of Missouri, where a narcotics investigation involving cellular telephones resulted in the
interception of 34,261 messages over 60 days. The second-highest number of intercepts
stemmed from a cellular telephone wiretap for a narcotics investigation in the District of Maine.
This wiretap, active for 55 days, resulted in a total of 32,578 interceptions, including 18,500
incriminating interceptions.
Federal wire taps increasingly k2 quell big drug crime
US Courts, 12
US Courts, 12/31/2012 (“Wiretap Report 2012”, This report covers intercepts
concluded between January 1, 2012, and December 31, 2012, and provides
supplementary information on arrests and convictions resulting from intercepts
concluded in prior years, uscourts.gov, December 31, 2012,
http://www.uscourts.gov/statistics-reports/wiretap-report-2012, Accessed:
July 13th, 2015, DSF)
Data on individuals arrested and convicted as a result of interceptions reported as terminated
are presented in Table 6. As of December 31, 2012, a total of 3,743 persons had been arrested
(up 6 percent from 2011), and 455 persons had been convicted (down 2 percent from 2011).
Federal wiretaps were responsible for 34 percent of the arrests and 25 percent of the
convictions arising from wiretaps for this period. The Central District of California reported the
largest number of arrests (139) for a federal jurisdiction, and the Western District of Texas
reported the most convictions (27). The Central District of California also reported the most
arrests for an individual federal wiretap in 2012; a wiretap used in a murder investigation in that
district resulted in the arrest of 52 individuals and 4 convictions.
Link – Face Recognition
Face Recognition Key to solve crime
Ng, 6
Rudy Ng, University of California, Hastings College of the Law, J.D. Candidate, 2006; San
Francisco State University, M.S. in Biochemistry, 2001; University of California, Berkeley, B.A. in
Biochemistry, 1996. I would like to thank my family and friends for their loving support and
encouragement, especially Queenie Mak for editing this Note and for keeping me sane
throughout this adventure called law school., Spring 2006, copyright Hastings College of Law,
http://www.lexisnexis.com.proxy2.cl.msu.edu/hottopics/lnacademic/, Accessed: July 20th,
2015, DSF)
The concept of identifying people via their unique biometric identifiers is not a new idea. It has
long been recognized that a person's fingerprint is a unique way to identify that person. n1
However, some more recent advances in technology have called into question the
constitutionality of these new forms of biometric [*426] identification. n2 After the September
11, 2001, terrorist attacks, one of our primary concerns has been ensuring for our homeland
security. n3 New, more rigorous forms of biometric screening have been proposed and
implemented in some instances. n4 For example, San Francisco International Airport has
installed hand geometry identification stations for employees in some secure areas. n5 Before
being allowed to proceed into restricted areas, employees must place their hand on a biometric
reader, which scans their hand and compares it to images stored in a database. n6
Another area of concern is tracking known or suspected criminals. A proposed method to
achieve this is to use face recognition technology which can quickly scan an individual's facial
geometry from a surveillance video and attempt to match that person's face to a database of
millions of known or suspected criminals. n7 The science fiction movie Minority Report
illustrated the use of iris scanners not only to provide positive identification of individuals who
had been apprehended by the police, but also to identify ordinary citizens walking down the
street in order to project personalized advertisements to them. n8 The future may not be as far
away as we think. Foreign and domestic banks have experimented with the use of fingerprint
and iris scanning technologies in ATMs. n9 In addition, police in London, England have been
using face recognition technology as part of their Citywatch program aimed at reducing crime in
the community. n10 The question is how far we are willing to take this technology, especially in
regards to tracking known or suspected criminals.
[*427] In United States v. Kincade, n11 the Ninth Circuit upheld the constitutionality of the DNA
Analysis Backlog Elimination Act of 2000, which required certain convicted felons to submit
blood samples from which authorities could obtain their DNA profile. n12 Convicted felons' DNA
profiles are kept in a DNA data bank to either provide evidence against or exonerate them if
they were ever suspected of another crime. n13 This ruling by the Ninth Circuit could potentially
pave the way to requiring convicted felons to submit to the collection of other types of
biometric identification data, such as iris or face recognition scans. As with current DNA
databases, iris and face recognition data would then be stored in databases and shared with
authorities throughout the nation. n14 Tracking suspected criminals could be as easy as
matching an image of their face from a surveillance video at their local shopping mall to an
image in the face recognition database. n15 How far are we willing to invade the privacy rights
of individuals in the name of security?
These concerns are not restricted to convicted felons. While there are statutes in all fifty states
which require certain convicted felons to submit DNA samples so law enforcement can maintain
their DNA profile, n16 these DNA data banks are being supplemented with DNA profiles from
people who have been arrested but have not been convicted of crimes. n17 If people not
convicted of any crimes are being included in DNA data banks, then is this opening the door for
the collection of other types of biometric data, such as face or iris recognition data, from people
who are merely suspected of committing a crime? Is this the beginning of the slippery slope that
may lead us to a world where a person suspected of committing a crime has to seek out an
unscrupulous back-alley physician to perform an eye transplant surgery in order to maintain his
or her freedom and privacy, as in the movie Minority Report? Clearly there are other concerns
besides keeping our streets safer by making it easier for law enforcement personnel to identify
recidivist activities.
[*428] Part II of this note is an overview of biometric recognition technology, especially iris
scanning and face recognition technology. Part III provides an analysis of individual privacy rights
under the Fourth Amendment in relation to biometric technology, the compulsory DNA
sampling of convicted felons, and DNA databases, especially in light of recent Federal Court of
Appeals decisions and recently passed legislation. Part IV presents legislative considerations for
the collection of less invasive biometric data that is easier to collect and monitor passively, such
as facial recognition data. Finally, Part V provides a summary of the discussion.
Biometrics are highly important in crime-stopping activities. – Finger prints and
facial recognition
Ng, 6
Rudy Ng, University of California, Hastings College of the Law, J.D. Candidate, 2006; San
Francisco State University, M.S. in Biochemistry, 2001; University of California, Berkeley, B.A. in
Biochemistry, 1996. I would like to thank my family and friends for their loving support and
encouragement, especially Queenie Mak for editing this Note and for keeping me sane
throughout this adventure called law school., Spring 2006, copyright Hastings College of Law,
http://www.lexisnexis.com.proxy2.cl.msu.edu/hottopics/lnacademic/, Accessed: July 20th,
2015, DSF)
A. Biometrics
Biometrics refers to the automated methods of identifying a person based on their unique
physical characteristics. n18 In a typical application, an individual's physical traits are scanned by
a machine and then a comparison is made to a database containing previously stored
information about that individual. n19 This process is used to positively identify the individual
and is referred to as verification, or one-to-one matching. n20 For example, one-to-one
matching could be used at a security checkpoint before allowing individuals access to restricted
areas of a building. n21 Biometric scanning can also be used to identify a person by comparing
their biometric data to all of the records that have been stored in the database. n22 This process
is referred to as identification, or one-to-many matching. n23 For example, one-to-many
matching could be used to identify an unknown person by trying to match their biometric data
to the data of known individuals saved in a database. n24
B. Fingerprints
Historically, fingerprints have been the most common and widely accepted form of biometric
identification. n25 Fingerprint identification has been used by law enforcement since the early
twentieth century. n26 Fingerprint identification initially required the fingerprint examiner to go
through the tedious process of manually comparing ink fingerprints fixed onto fingerprint cards.
n27 This process was very time consuming and could often take months to complete. n28
However, the fingerprint identification process has been computerized and automated. n29 The
Federal Bureau of Investigation (FBI) now uses the Integrated Automated Fingerprint
Identification System (IAFIS). n30 IAFIS contains the fingerprints and corresponding criminal
history information for more than 47 million subjects, making it the largest biometric database
in the world. n31 The process of matching fingerprints, which used to take months to complete,
can now be performed in a few hours. n32 For example, the FBI can identify an unknown person
who left a latent fingerprint at a crime scene by comparing the crime scene fingerprint to the
IAFIS database. n33
Fingerprint identification involves comparing an individual's unique ridge formations or patterns
found on the fingertips. n34 These fingertip patterns include ridge formations called whorls,
arches and loops. n35 Fingerprint identification relies on the empirically validated assumptions
that no two persons have the exact same arrangement of ridge patterns on their fingertips, and
that an individual's fingerprints remain unchanged throughout their life. n36
[*430] An advantage of fingerprint identification is that it is widely accepted by the public and
law enforcement as an accurate and repeatable means for identifying individuals. n37 In
addition, finger scanning technology is a quick, non-invasive method of gathering biometric
data. n38 A disadvantage of finger imaging is that dirt, oils or cuts on a person's finger can lead
to errors in the results. n39
Link – FBI
FBI drones are key to solve a swath of crime
Cratty, 13
Carol Cratty, CNN Senior Producer, 6/19/15 (“FBI uses drones in U.S., says
Mueller”, CNN, June 19th 2015, http://security.blogs.cnn.com/2013/06/19/fbiuses-drones-in-u-s-says-mueller/, Accessed: July 13th, 2015, DSF)
FBI Director Robert Mueller acknowledged the law enforcement agency uses drone aircraft in
the United States for surveillance in certain difficult cases.
Mueller told the Senate Judiciary Committee on Wednesday that drones are used by the FBI in a
"very, very minimal way and very seldom."
He did not say how many unmanned surveillance vehicles (UAVs) the FBI has or how often they
have been used.
But a law enforcement official told CNN the FBI has used them a little more than a dozen times
but did not say when that started. The official said drones are useful in hostage and barricade
situations because they operate more quietly and are less visible than traditional aircraft such as
helicopters.
The FBI said it used a UAV earlier this year to monitor the situation where a boy was held
hostage in a bunker in Alabama.
Bureau spokesman Paul Bresson said their use allows "us to learn critical information that
otherwise would be difficult to obtain without introducing serious risk to law enforcement
personnel."
Link – Mass Data
Mass data collection helps stop money laundering and drug trafficking
Heath 15
(An investigative reporter at USA TODAY, writing primarily about law and criminal justice- His work includes award-winning series on
misconduct by federal prosecutors and air pollution outside schools. He has a law degree from Georgetown University, Brad, “US
secretly tracked billions of calls for decades”, USA Today, April 8, 2015, http://www.usatoday.com/story/news/2015/04/07/deabulk-telephone-surveillance-operation/70808616/, ASN)
The DEA began assembling a data-gathering program in the 1980s as the government searched for new ways to battle Colombian
drug cartels. Neither informants nor undercover agents had been enough to crack the cartels' infrastructure. So the agency's
intelligence arm turned its attention to the groups' communication networks. Calling records – often called "toll records" – offered
one way to do that. Toll records are comparable to what appears on a phone bill – the numbers a person dialed, the date and time
of the call, its duration and how it was paid for. By then,
DEA agents had decades of experience gathering toll
records of people they suspected were linked to drug trafficking, albeit one person at a time. In the late
1980s and early 1990s, officials said the agency had little way to make sense of the data their agents accumulated and almost no
ability to use them to ferret out new cartel connections. Some agents used legal pads. "We were drowning in toll records," a former
intelligence official said. The DEA asked the Pentagon for help. The
military responded with a pair of
supercomputers and intelligence analysts who had experience tracking the communication
patterns of Soviet military units. "What they discovered was that the incident of a communication was perhaps as important as
the content of a communication," a former Justice Department official said. The military installed the supercomputers on the fifth
floor of the DEA's headquarters, across from a shopping mall in Arlington, Va. The
system they built ultimately
allowed the drug agency to stitch together huge collections of data to map trafficking and
money laundering networks both overseas and within the USA. It allowed agents to link the call records its
agents gathered domestically with calling data the DEA and intelligence agencies had acquired outside the USA. (In some cases,
officials said the DEA paid employees of foreign telecom firms for copies of call logs and subscriber lists.) And it eventually allowed
agents to cross-reference all of that against investigative reports from the DEA, FBI and Customs Service. The result
"produced major international investigations that allowed us to take some big people," Constantine
said, though he said he could not identify particular cases. In 1989, President George H.W. Bush proposed in his first prime-time
address using "sophisticated intelligence-gathering and Defense Department technology" to disrupt drug trafficking. Three years
later, when violent crime rates were at record highs, the drug agency intensified its intelligence
push, launching a "kingpin strategy" to attack drug cartels by going after their finances,
leadership and communication. In 1992, in the last months of Bush's administration, Attorney General William Barr and
his chief criminal prosecutor, Robert Mueller, gave the DEA permission to collect a much larger set of phone data to feed into that
intelligence operation. Instead of simply asking phone companies for records about calls made by people suspected of drug crimes,
the Justice Department began ordering telephone companies to turn over lists of all phone calls from the USA to countries where
the government determined drug traffickers operated, current and former officials said. Barr and Mueller declined to comment, as
did Barr's deputy, George Terwilliger III, though Terwilliger said, "It
has been apparent for a long time in both the
law enforcement and intelligence worlds that there is a tremendous value and need to collect
certain metadata to support legitimate investigations." The data collection was known within the agency as
USTO (a play on the fact that it tracked calls from the U.S. to other countries). The DEA obtained those records using
administrative subpoenas that allow the agency to collect records "relevant or material to"
federal drug investigations. Officials acknowledged it was an expansive interpretation of that authority but one that was
not likely to be challenged because unlike search warrants, DEA subpoenas do not require a judge's approval. "We knew we were
stretching the definition," a former official involved in the process said. Officials said a few telephone companies were reluctant to
provide so much information, but none challenged the subpoenas in court. Those that hesitated received letters from the Justice
Department urging them to comply. After Sprint executives expressed reservations in 1998, for example, Warren, the head of the
department's drug section, responded with a letter telling the company that "the
initiative has been determined to be
legally appropriate" and that turning over the call data was "appropriate and required by law."
The letter said the data would be used by authorities "to focus scarce investigative resources by means of sophisticated pattern and
link analysis." The letter did not name other telecom firms providing records to the DEA but did tell executives that "the
arrangement with Sprint being sought by the DEA is by no means unique to Sprint" and that "major service providers have been
eager to support and assist law enforcement within appropriate bounds." Former officials said the operation included records from
AT&T and other telecom companies. A spokesman for AT&T declined to comment. Sprint spokeswoman Stephanie Vinge Walsh said
only that "we do comply with all state and federal laws regarding law enforcement subpoenas."
Agents said that when
the data collection began, they sought to limit its use mainly to drug investigations and turned
away requests for access from the FBI and the NSA. They allowed searches of the data in
terrorism cases, including the bombing of a federal building in Oklahoma City that killed 168
people in 1995, helping to rule out theories linking the attack to foreign terrorists. They allowed even
broader use after Sept. 11, 2001. The DEA's public disclosure of its program in January came in the case of a man charged with
violating U.S. export restrictions by trying to send electrical equipment to Iran. At first, officials said the DEA gathered records only of
calls to a handful of countries, focusing on Colombian drug cartels and their supply lines. Its reach grew quickly, and by the late
1990s, the DEA was logging "a massive number of calls," said a former intelligence official who supervised the program. Former
officials said they could not recall the complete list of countries included in USTO, and the coverage changed over time. The
Justice Department and DEA added countries to the list if officials could establish that they were
home to outfits that produced or trafficked drugs or were involved in money laundering or other
drug-related crimes. The Justice Department warned when it disclosed the program in January that the list of countries
should remain secret "to protect against any disruption to prospective law enforcement cooperation." At its peak, the operation
gathered data on calls to 116 countries, an official involved in reviewing the list said. Two other officials said they did not recall the
precise number of countries, but it was more than 100. That gave the collection a considerable sweep; the U.S. government
recognizes a total of 195 countries. At one time or another, officials said, the data collection covered most of the countries in Central
and South America and the Caribbean, as well as others in western Africa, Europe and Asia. It included Afghanistan, Pakistan, Iran,
Italy, Mexico and Canada. The DEA often — though not always — notified foreign governments it was collecting call records, in part
to make sure its agents would not be expelled if the program was discovered. In some cases, the DEA provided some of that
information to foreign law enforcement agencies to help them build their own investigations, officials said. The DEA did not have a
real-time connection to phone companies' data; instead, the companies regularly provided copies of their call logs, first on computer
disks and later over a private network. Agents
who used the system said the numbers they saw were
seldom more than a few days old. The database did not include callers' names or other
identifying data. Officials said agents often were able to identify individuals associated with
telephone numbers flagged by the analysis, either by cross-referencing them against other
databases or by sending follow-up requests to the phone companies. To keep the program secret, the DEA
sought not to use the information as evidence in criminal prosecutions or in its justification for warrants or other searches.
Instead, its Special Operations Division passed the data to field agents as tips to help them find
new targets or focus existing investigations, a process approved by Justice Department lawyers.
Many of those tips were classified because the DEA phone searches drew on other intelligence data. That practice sparked a furor
when the Reuters news agency reported in 2013 that the DEA trained agents to conceal the sources of those tips from judges and
defense lawyers. Reuters said the tips were based on wiretaps, foreign intelligence and a DEA database of telephone calls gathered
through routine subpoenas and search warrants. As a result, "the government short-circuited any debate about the legality and
wisdom of putting the call records of millions of innocent people in the hands of the DEA," American Civil Liberties Union lawyer
Patrick Toomey said.
Link – NSA Metadata
NSA metadata used to help other domestic crime fighting agencies.
McGovern, 14
Ray McGovern, works with Tell the Word, a publishing arm of the ecumenical Church of the
Saviour in inner-city Washington. He was an Army officer and CIA analyst for a total of 30 years
and is now on the Steering Group of Veteran Intelligence Professionals for Sanity (VIPS), 6/2/14
(“How NSA Can Secretly Aid Criminal Cases”, Consortium News, June 12, 2014,
https://consortiumnews.com/2014/06/12/how-nsa-can-secretly-aid-criminal-cases/, Acessed:
July 19, 2015, DSF)
Though the NSA says its mass surveillance of Americans targets only “terrorists,” the spying may
turn up evidence of other illegal acts that can get passed on to law enforcement which hides the
secret source through a ruse called “parallel construction,” writes ex-CIA analyst Ray McGovern.
Rarely do you get a chance to ask a just-retired FBI director whether he had “any legal qualms”
about what, in football, is called “illegal procedure,” but at the Justice Department is called
“parallel construction.”
Government wordsmiths have given us this pleasant euphemism to describe the use of the
National Security Agency’s illegal eavesdropping on Americans as an investigative tool to pass on
tips to law enforcement agencies which then hide the source of the original suspicion and
“construct” a case using “parallel” evidence to prosecute the likes of you and me.
For those interested in “quaint” things like the protections that used to be afforded us by the
Fourth and Fifth Amendments to the Constitution, information about this “parallel construction”
has been in the public domain, including the “mainstream media,” for at least a year or so.
So, I welcomed the chance to expose this artful practice to still more people with cameras
rolling at a large conference on “Ethos & Profession of Intelligence” at Georgetown University
on Wednesday, during the Q & A after former FBI Director Robert Mueller spoke.
Mueller ducked my question regarding whether he had any “legal qualms” about this “parallel
construction” arrangement. He launched into a discursive reply in which he described the
various “authorities” enjoyed by the FBI (and the CIA), which left the clear impression not only
that he was without qualms but that he considered the practice of concealing the provenance of
illegally acquired tip-off information somehow within those professed “authorities.”
Bottom line? Beware, those of you who think you have “nothing to hide” when the NSA scoops
up your personal information. You may think that the targets of these searches are just potential
“terrorists.” But the FBI, Internal Revenue Service, Drug Enforcement Administration and
countless other law enforcement bodies are dipping their cursors into the huge pool of mass
surveillance.
And, chances are that if some of your scooped-up data gets shared with law enforcement and
the Feds conclude that you’ve violated some law, you’ll never become aware of how they got
onto you in the first place. They’ll just find some “parallel” evidence to nail you.
After all, it’s altogether likely for a great majority of us that some dirt can be retrieved with the
NSA’s voluminous files an inviting starting point. AT&T, for example, apparently has kept
metadata about its customers, as well as all other traffic going through its switches, for the past
27 years.
For those who are Caesar’s-wife pure and whose loved ones also approach perfection,
“constructing” a prosecutable case may be more of a challenge. But relax not. If for some reason
the government decides to get you – if you’ve popped up as somehow an obstacle to “national
security” – it is not impossible. Even in recent decades, critics of government policies have
ended up facing dredged-up, if not trumped-up, criminal charges over some past indiscretion or
misdeed.
Learning Curve
It has been my good fortune this year to sponge up data and wisdom – in equal measure – from
NSA alumni like Bill Binney, Kirk Wiebe, Tom Drake, and Ed Loomis, who in early January
authored “NSA Insiders Reveal What Went Wrong.”
More recently (on May 31), Bill and I took part in a panel discussion in New York, so this freshly
sponged-up learning still dwelled in my frontal lobe when I was interviewed by RT on June 5, the
anniversary of the first-published disclosure from Edward Snowden.
When asked how “ordinary people” in the U.S. were being affected by the disclosures about
bulk collection, I passed along what I had recently learned from Bill and other whistleblowers
regarding how law enforcement is masking illegal surveillance to the severe detriment of
defendants’ constitutional rights.
Former FBI Division Counsel in Minneapolis Coleen Rowley – who, with Jesselyn Radack, Tom
Drake and me, visited Snowden in Russia last October – told me of two legal doctrines
established many decades ago: the “exclusionary rule” and the rule regarding the “fruit of the
poisonous tree.”
These were designed to force over-zealous law enforcement officers to adhere to the
Constitution by having judges throw out cases derived from improperly obtained evidence. To
evade this rule, law enforcement officials who have been on the receiving end of NSA’s wiretap
data must conceal what tipped off an investigation.
After the Tip-Off
Among the revelations over the past year was DEA’s definition of “parallel construction” as “the
use of normal [read legal] investigative techniques to re-create the information received by
DEA’s Special Ops Division” from NSA or other sources that can’t be acknowledged. Some of
these sources may be confidential informants whose identities need protecting, but the NSA’s
massive database has become a very inviting place to trawl for valuable leads.
As Reuters reported last August, “A secretive U.S. Drug Enforcement Administration unit is
funneling information from intelligence intercepts, wiretaps, informants and a massive database
of telephone records to authorities across the nation to help them launch criminal investigations
of Americans.
“Although these cases rarely involve national security issues, documents reviewed by Reuters
show that law enforcement agents have been directed to conceal how such investigations truly
begin – not only from defense lawyers but also sometimes from prosecutors and judges.
“The undated documents show that federal agents are trained to ‘recreate’ the investigative
trail to effectively cover up where the information originated, a practice that some experts say
violates a defendant’s Constitutional right to a fair trial. If defendants don’t know how an
investigation began, they cannot know to ask to review potential sources of exculpatory
evidence – information that could reveal entrapment, mistakes or biased witnesses.”
So, in this way, the NSA’s warrantless surveillance can result in illegal law enforcement. And the
FBI, the DEA and other organs of the deep state have become quite good at it, thank you very
much.
Here’s how it works: NSA’s domestic surveillance – though supposedly restricted to detecting
terrorism – gets wind of some potentially illegal activity unrelated to terrorism. So, NSA passes
the information on to the relevant law enforcement agency. It could be a vehicle transporting
illegal drugs or a transfer of suspicious funds or pretty much anything.
This evidence then sparks an investigation, but the original information can’t be used legally
because it was acquired illegally for “national security” purposes. After the tip, “parallel” law
enforcement techniques are introduced to collect other evidence and arrest and charge the
suspects/defendants.
The arrest is made to appear the splendid result of traditional detective techniques. However, if
the court learns of the initial shenanigans, the defendant may be released because her/his
constitutional rights were violated.
To avoid that possibility, the government simply perjures itself during the court discovery
process by concealing the key role played by the NSA database, exculpatory evidence that could
weaken or destroy the government’s case.
Last week a journalist asked me why I thought Congress’ initial outrage – seemingly genuine in
some quarters – over bulk collection of citizens’ metadata had pretty much dissipated in just a
few months. What started out as a strong bill upholding Fourth Amendment principles ended up
much weakened with only a few significant restraints remaining against NSA’s flaunting of the
Constitution?
Let me be politically incorrect and mention the possibility of blackmail or at least the fear among
some politicians that the NSA has collected information on their personal activities that could be
transformed into a devastating scandal if leaked at the right moment.
Do not blanch before the likelihood that the NSA has the book on each and every member of
Congress, including extramarital affairs and political deal-making. We know that NSA has
collected such information on foreign diplomats, including at the United Nations in New York, to
influence votes on the Iraq War and other issues important to U.S. “national security.”
We also know how the late FBI Director J. Edgar Hoover used much more rudimentary
technology a half century ago to develop dossiers on the personal indiscretions of political and
ideological opponents. It makes sense that people with access to the NSA’s modern surveillance
tools would be sorely tempted to put these new toys to use in support of their own priorities.
I happened to be with a highly accomplished attorney – one not involved in security law – when
we saw TV reporting that the Solicitor General of the United States had misled the U.S. Supreme
Court. My lawyer friend kept shaking his head, with his mouth agape: “Now THAT is not
supposed to happen” is all he could muster.
Other than the Supreme Court justices themselves, the Solicitor General is among the most
influential members of the legal community. Indeed, the Solicitor General has been called the
“tenth justice”as a result of the relationship of mutual trust that tends to develop between the
justices and the Solicitor General.
Thus, while it is sad, it is hardly surprising that no one took Solicitor General Donald Verrilli Jr. to
the woodshed. There are seldom penalties in Washington for playing fast and loose with the
truth.
Verrilli, sworn in as Solicitor General three years ago, assured the Court in the “Clapper v.
Amnesty International USA” case that defendants would be informed of evidence coming from
NSA. The Department of Justice had reviewed his draft testimony and did not tell Verrilli that
this was not the truth.
In the case, a majority of the Supreme Court justices decided to wait until a criminal defendant
was actually convicted with the admitted use of NSA evidence before ruling on whether this
violates the Fourth Amendment and the requirement of court warrants based on “probable
cause” before police searches can be conducted.
The result of the Supreme Court’s decision was that the challenge to the constitutionality of
NSA’s mass collection was abruptly stopped, and the mass surveillance continued. But Verrilli
subsequently found out that his assurances had been false, and there ensued an argument with
the Department of Justice, which opposed revealing use of NSA sources in any court.
Verrilli apparently prevailed partially, with the government subsequently notifying a few
defendants in ongoing terrorism cases that NSA sources were used.
Separation of Powers?
We cannot escape some pretty dismal conclusions here. Not only have the Executive and
Legislative branches been corrupted by establishing, funding, hiding and promoting
unconstitutional surveillance programs for over 12 years, but the Judicial branch has been
corrupted, too.
The discovery process in criminal cases is now stacked in favor of the government through its
devious means for hiding unconstitutional surveillance and using it in ways beyond the narrow
declared purpose of thwarting terrorism.
Moreover, federal courts at the district, appeals and Supreme Court levels have allowed the
government to evade legal accountability by insisting that plaintiffs must be able to prove what
often is not provable, that they were surveilled through highly secretive NSA means. And, if the
plaintiffs make too much progress, the government can always get a lawsuit thrown out by
invoking “state secrets.”
The Separation of Powers designed by the Constitution’s Framers to prevent excessive
accumulation of power by one of the branches has stopped functioning amid the modern
concept of “permanent war” and the unwillingness of all but a few hearty souls to challenge the
invocation of “national security.” Plus, the corporate-owned U.S. media, with very few
exceptions, is fully complicit.
Thus, a massive, intrusive power now looms over every one of us – and especially those few
brave individuals with inside knowledge who might be inclined to inform the rest of us about the
threat. Whistleblowers, like Chelsea Manning and Edward Snowden, face decades in prison for
divulging important secrets to the American people. And so the legal rot continues.
The concept of a “United Stasi of America,” coined by Pentagon Papers whistleblower Daniel
Ellsberg a year ago, has been given real meaning by the unconstitutional behavior and
dereliction of duty on the part of both the George W. Bush and Obama administrations.
Just days after the first published disclosure from Snowden, Ellsberg underscored that the NSA,
FBI and CIA now have surveillance capabilities that East Germany’s Stasi secret police could
scarcely have imagined.
What, We Worry?
Last June, Mathew Schofield of McClatchy conducted an interesting interview of Wolfgang
Schmidt, a former lieutenant colonel in the Stasi, in Berlin. With the Snowden revelations
beginning to tumble out into the media, Schofield described Schmidt as he pondered the sheer
magnitude of domestic spying in the United States.
Schmidt: “You know, for us, this would have been a dream come true.”
Schofield continues: “In those days, his department was limited to tapping 40 phones at a time,
he recalled. Decide to spy on a new victim and an old one had to be dropped, because of a lack
of equipment. He finds breathtaking the idea that the U.S. government receives daily reports on
the cellphone usage of millions of Americans and can monitor the Internet traffic of millions
more.”
“So much information, on so many people,” says Schmidt who, at that point, volunteers a stern
warning for Schofield and the rest of us:
“It is the height of naiveté to think that, once collected, this information won’t be used. This is
the nature of secret government organizations. The only way to protect the people’s privacy is
not to allow the government to collect their information in the first place.” [emphasis added]
(For those who missed it, “The Lives of Others,” a 2006 film, offers a chilling depiction of the
Stasi, a far more capable incarnation of which may soon be coming to your home or
neighborhood with assistance of “parallel construction.”)
Take note, those of you who may still feel fearless, those of you with “nothing to hide.”
NSA metadata key to solve domestic crime
Powell, 13
Stewart M. Powell, writer for Connecticut Post, 8/4/13 (“NSA handing over
non-terror intelligence”, CT Post, Updated 9:37 pm, Sunday, August 4, 2013,
http://www.ctpost.com/local/article/NSA-handing-over-non-terrorintelligence-4706227.php, Accessed: July 19th, 2015, DSF)
WASHINGTON --
The National Security Agency is handing the Justice Department information,
derived from its secret electronic eavesdropping programs, about suspected criminal activity
unrelated to terrorism. This little-known byproduct of counterterrorism surveillance continues
amid controversy over the NSA's wide-ranging collection of domestic communications
intelligence, including Americans' telephone calling records and Internet use. It is unclear
whether the referrals have been built upon the content of telephone calls and emails.
Administration officials have previously assured Congress that NSA surveillance focuses on socalled metadata and in the main does not delve into the content of individual calls or email
messages.Also, some in the legal community question the constitutionality of criminal
prosecutions stemming from intelligence-agency eavesdropping. Current and former federal
officials say the NSA limits non-terrorism referrals to serious criminal activity inadvertently
detected during domestic and foreign surveillance. The NSA referrals apparently have included
cases of suspected human trafficking, sexual abuse and overseas bribery by U.S.-based
corporations or foreign corporate rivals that violate the Foreign Corrupt Practices Act. "We can't
task the collection of information for those purposes, and the Department of Justice can't ask us
to collect evidence of that kind of a crime," said Robert Litt, general counsel for the Office of the
Director of National Intelligence. "If the intelligence agency uncovers evidence of any crime
ranging from sexual abuse to FCPA, they tend to turn that information over to the Department
of Justice," Litt told an audience at the Brookings Institution recently. "But the Department of
Justice cannot task the intelligence community to do that." Litt declined to discuss NSA referrals
to the Justice Department when asked about the practice by Hearst Newspapers after a Senate
Judiciary Committee hearing last week. The super-secret NSA surveillance disclosed by fugitive
leaker Edward Snowden has already sparked a public outcry and congressional hearings, and
threatened congressional intervention to limit the programs. Litt's acknowledgement that the
NSA is handing off intelligence to federal prosecutors could further stoke controversy and calls
for action on Capitol Hill. "If the information from surveillance or wiretaps is used by the NSA
inconsistently with the warrant or other permission from the FISA court, certainly there would
be a violation of law," said Sen. Richard Blumenthal, D-Conn., a former U.S. attorney and state
attorney general. "Unfortunately we have no access to the FISA court opinions or orders that
may authorize this activity because they're largely secret. This presents yet another clear and
powerful reason that we need more transparency in the FISA court." Sen. John Cornyn, R-Texas,
a former Texas Supreme Court judge and state attorney general, said, "There's certainly room to
improve the process and to reassure the American people that their privacy rights are being
protected while at the same time making sure that we have the tools in place to keep us safe."
After intelligence-based information is referred to the FBI, the domestic law enforcement
agency would have to prove probable cause to a federal judge to obtain a warrant to conduct
electronic surveillance or a physical search as part of any domestic criminal investigation. But
some lawyers, particularly in the criminal defense community, see that process as
constitutionally flawed. "The NSA intercepts, whether they are mail covers, metadata or what
have you, are in essence general warrants," said Harold Haddon, a prominent criminal defense
attorney from Denver. Using information from those warrants as the basis for a criminal
prosecution "is a bright-line Fourth Amendment violation," Haddon said, referring to the
constitutional protection against unreasonable search and seizure.
NSA data mining can help stop cybercrime
Micheals, 2013, Michaels is a military writer for USA TODAY and has covered wars around the
world. He is a former Marine infantry officer and author of the book "A Chance in Hell: The men
who triumphed over Iraq's deadliest city and turned the tide of war.", Jim, NSA data mining can
help stop cybercrime, analysts say, 4:50 p.m. EDT June 6, 2013,
http://www.usatoday.com/story/news/politics/2013/06/06/nsa-data-mining-cyber-crimedata/2397165/, js
The huge volume of telephone records turned over
to the U.S. government could help investigators
identify and deter a range of terrorist acts, including cyberattacks, analysts say. "Once you have this big
chunk of data and you have it forever… you can do all sorts of analytics with it using other data sources," said
Joseph DeMarco, former head of the cybercrime unit in the U.S. attorney's office in New York City. "A data set like this is the gift that
keeps on giving," said DeMarco, a partner at the law firm DeVore & DeMarco. The government obtained an order from the Foreign
Intelligence Surveillance Court ordering a Verizon subsidiary to turn over phone records to the National Security Agency. The records
do not include the content of phone calls and the order does not authorize eavesdropping. Still, the information
can be
helpful to investigators looking for patterns, linking people and networks. Also, phone numbers
can be attached to computers, allowing hackers to get into networks through telephone lines.
The data can also be viewed against other databases that help investigators see patterns and
links among people and networks. "All the data is critical," said Robert Rodriguez, a cybersecurity expert and
former Secret Service agent. The government considers many cyberattacks to be acts of terror, DeMarco said. "The definition of
terrorism includes cyberterrorism," he said. The court order also raises questions about the relationship between the government
and industry at a time when so much critical infrastructure, such as power grids and banking, is in the hands of industry and may be
vulnerable to cyberattack. In the Verizon case, the NSA got a court order to get the phone records. But to combat cyberattacks, the
government has been struggling with ways to compel more cooperation between government and industry. President Obama issued
an executive order this year aimed at encouraging the sharing of information, such as reports of attacks on industry and threat
information. The White House has said that legislation is also needed to develop a strong defense against cyberattacks. A key
provision lawmakers are considering would include civil protections so that private companies could not be held liable for turning
information over to the government. A similar provision was included in the 2008 reauthorization of the Foreign Intelligence
Surveillance Act, the 1978 law that created the court that approved the NSA's Verizon request.
Link – PATRIOT ACT and Money laundering
Anti-Money laundering tech helps mass surveillance - Means there is a clear
tradeoff with the plan
DeWeese 3
(a candidate for the Ohio Legislature, served as editor of two newspapers, and has owned several businesses, led the only privatelyfunded election-observation team to the Panamanian elections, invited to Cambridge University to debate the issue of the United
Nations before the Cambridge Union, serves as Founder and President of the American Policy Center and editor of The DeWeese
Report, Tom, “Total surveillance equals total tyranny”, American Policy Center, August 25, 2003,
http://americanpolicy.org/2003/08/25/total-surveillance-equals-total-tyranny/, ASN)
In the name of fighting terrorism a new kind of government is being implemented in Washington, D.C. We are witnessing the birth of
a powerful multi-billion dollar surveillance lobby consisting of an army of special interest groups, Washington lawyers, lobbyists, and
high-tech firms with wares to sell. The
personal rights of American citizens, protected until now by the Bill
of Rights, are the farthest thing from their minds as they seek to fill their pockets while enabling
government to monitor and control our lives to a degree unheard of prior to September 11,
2001. This army seeks riches as it pushes for laws and regulations to spy on and control the lives of law-abiding Americans. The
Government Electronics and Information Technology Association (GEIA) reports that there are
more than 100 federal entities involved in forging the largest conglomeration of governmentprivate contractor interests since the creation of the Pentagon. GEIA represents hundreds of corporate
members seeking to cash in on the Homeland Security-citizen-surveillance-spending spree. GEIA told the news media that the
“needed technologies include those providing digital surveillance, data mining, advanced encryption, smart cards, censors and early
warning and profiling tools.” In September 2002, dozens of major high tech companies formed the “Homeland Security Industries
Association”. A key objective of the association is to win a piece of the action for the creation of national ID cards for travelers. The
November 25 edition of Business Week reported that the
SAS Institute is among many corporations scrambling
to launch a whole new line of anti-money laundering software designed to help insurance
companies, investment banks and brokerage firms spy on their clients’ financial activities on
behalf of the government in compliance with the Patriot Act. According to Bert Ely, the head of a
consulting company for financial institutions, the new anti-money laundering provisions of the
Patriot Act will do nothing to stop the financing of international terrorists. At best, he says, the new
provisions will actually provide evil doers with a road map to avoid detection. What the new Patriot Act provisions are really about,
says Ely, is to have the United States fall into line with an international campaign being waged by the Organization for Economic
Cooperation and Development and the Financial Action Task Force against countries that serve as tax havens. The newly enacted
regulations are being applied in the name of fighting terrorism, but are really about a different agenda. In mid-September 2002, the
U.S. Department of Commerce and the Office of Homeland Security held an exposition in Washington. Medium and small firms from
across the nation were invited in to showcase the very latest in citizen surveillance wares. This tradeshow and others like it have
attracted hundreds of corporations who’ve shown their high-tech products to top government planners responsible for creating and
implementing new restrictions on privacy in the name of “national security.” PoliticalMoneyline says that 444 groups and individuals
have registered as lobbyists to deal with “terror” and “security” issues. IBM has opened a “Government Solutions Center” in Vienna,
Virginia. The high-tech Unisys Corporation has established a similar exhibition for inspection by federal surveillance planners, called
the “Homeland Security Center for Excellence.” Both
corporations are racing to cash in on billions of dollars
for facial recognition systems at airports, and in anticipation of “trusted traveler” cards, a hightech ID tied to extensive background checks and biometric identification. In February 2003, it
was discovered that the Department of Justice was drafting legislation to radically expand the
reach of the federal government into the lives of every American citizen. The official title of the
document is the “Domestic Security Enhancement Act of 2003. It’s been given the nickname,
Patriot 2. The bill has not yet been introduced in Congress and only a very few key government leaders including Vice President
Cheney and House Speaker Dennis Hastert have reviewed it. It is suspected by many that the delay in officially offering the bill to
Congress is a direct result of public attacks on the bill by privacy advocates, but it is feared that the Justice Department would get
very bold in rushing it through should another terrorist attack occur. Here are just a few of the more frightening provisions of Patriot
2.
By definition in the bill, almost any American citizen can arbitrarily be designated a terrorist.
Section 101 of this act will give the executive branch the power to declare any American a
“foreign power” and therefore not a citizen. Those designated will be exempt from the protections of the
Constitution. Keep in mind that the Patriot Act was passed by Congress, sight unseen, in the middle of an Anthrax scare. Every
member of Congress was warned that if they failed to pass it then the next terrorist attack would be on their hands. That’s why the
Patriot Act allows for wiretaps without warrants. And it’s why all the other surveillance a-go-go is in full swing. In
the name of
fighting terrorism, our government has gained the ability to see our every movement, inspect
every transaction, and walk into our homes without our knowing it. For those of you who feel protected;
who feel the government is just doing its job to defeat terrorism, I’m very sad to tell you that our government is not being honest
with us. Terrorism is the excuse, not the motivation, for the massive drive toward Big Brother. We are not being protected. We are
being wrapped in a cocoon of tyranny. All of the signs are there. Consider the power which we have now granted to the federal
government twenty years down the road, driven by more technological developments that we can’t even pretend to foresee.
Imagine the America that you are allowing the government to create for your children. What will their lives be like? Will they know
freedom or oppression? We are making those decisions for our children today. The only way to make sure that government doesn’t
abuse its power is to not grant it in the first place.
PATRIOT ACT is Key to effective counter-money laundering operations.
White Paper on the USA PATRIOT ACT, 14
White Paper on the USA PATRIOT ACT, 2014 (“The USA PATRIOT ACT”, Lexis Nexis, August 2014,
https://cert-www.lexisnexis.com/risk/intl/en/regulations/USA-Patriot-Act.pdf, Accessed: July
20th, 2015, DSF)
Money laundering is defined as the transfer of cash and valuables that are the product of and /
or intended for the facilitation and execution of a crime. The Act strengthens federal efforts
against money laundering in the areas of regulations, criminal sanctions and forfeiture. The
Act broadens the Secretary of the Treasury’s authority to regulate the activities of the
institutions that function within the United States financial system. This is especially true in
reference to foreign entities. The Act provides the position to promote the following
regulations:
• Securities brokers, commodity merchants, dealers, pool operators and advisors must file
(SARs) suspicious activity reports
• Businesses are required to report cash transactions that involve sums that are greater than
$10,000 to the IRS in addition to filing a SAR
• Additional “special measures” and “due diligence” requirements to combat foreign money
laundering
• Financial institutions are prohibited from maintaining a correspondent account for foreign
shell banks
• Financial institutions are prohibited from permitting their customers to hide their financial
activities by leveraging the institutions concentration account processes
An Effective Approach for News Screening 4




• Introducing new customer identification (CIP) standards in addition to recordkeeping, as well
as recommending effective processes to verify the identity of foreign customers
• Exhorting financial institutions as well as law enforcement in sharing information concerning
suspected terrorist activity and money laundering
• Institutingtherequirementthatfinancialinstitutionsmaintainantimoneylaunderingprograms,compliance personnel, employee training programs, internal
policies, procedures and controls as well as an independent audit feature
The Act introduced a series of new money laundering crimes and amendments, in addition to
increasing the penalties for previous offenses. Among these it:
• Prohibits laundering (in the United States) the proceeds from foreign crimes and or political
corruption
• Prohibits laundering the proceeds for supporting terrorist organizations as well as for
cybercrimes
• Increases the penalty for counterfeiting
• Sought to override a Supreme Court decision indicating that the confiscation of over $300,000
(for attempting to leave the country without reporting the funds to customs) was an
unconstitutionally exorbitant fine
• Allows for the authority to prosecute fraud committed overseas involving U.S.-based credit
cards
• Promotes the prosecution of money laundering in the location where the offense occurred
The Act created two types of forfeitures in addition to modifying several confiscations-related
procedures. The
Act allows the confiscation of an individual’s or entity’s property who either plans in or
participates in an act of international or domestic terrorism. The Act also allows for the
confiscation of property that is derived from or used to facilitate international or domestic
terrorism. Under the constitution’s due process, double jeopardy and the ex post facto clauses,
the scope of these provisions may be limited. From a procedural perspective the Act:
• Provides mechanisms to extend jurisdiction in cases concerning forfeiture proceedings over
individuals and entities
• Provides for property confiscation in the United States for a broader range of crimes
committed in violation of foreign law
• Allows the United States enforcement of foreign forfeiture orders
• Permits the seizure of foreign correspondent accounts that are held in United States financial
institutions for foreign banks who in turn hold forfeitable assets overseas
• Denies corporate entities the right to contest a confiscation if their principal shareholder is a
fugitive
Link – Pen Register/Trap and Trace
Pen register super useful in fighting crime
POV, 12
Point Of View, 1/1/12 (“Obtaining Electronic Communications and Records”, ALAMEDA COUNTY
DISTRICT ATTORNEY’S OFFICE, January 1st, 2012,
http://le.alcoda.org/publications/point_of_view/files/ELECTRONIC_RECORDSx.pdf, Accessed:
July 21st, 2015, DSF)
Every day, virtually every criminal in the U.S. (at least those who aren’t incarcerated) will use a
phone, send or receive email, surf the internet, or all four. So it is not surprising that many of
the records pertaining to these communications can help investigators solve crimes and assist
prosecutors in obtaining convictions. Among other things, they may reveal the identities of the
suspect’s accomplices, establish the dates and times of their contacts, and prove the suspect’s
whereabouts when a crime occurred. As the California Supreme Court observed, “[A] record of
telephone calls provides a virtual current biography.”2 In fact, electronic communication records
now permit officers to follow a suspect by obtaining realtime reports of the locations of the cell
phone towers that are receiving signals from his phone.
The question, then, is what are the legal requirements for obtaining these records?
Unfortunately, the answer is not crystal clear. And the reason is the same as the reason that
officers are having trouble figuring out the rules for obtaining copies of the communications
themselves (which was the subject of the previous article). Simply put, both subjects are
regulated by a federal law that was badly written and poorly organized, and which has not kept
pace with changes in technology.
Another consequence of this uncertainty is that overcautious service providers sometimes
demand legal process beyond that required by the law. As a result, officers who have complied
with all the legal requirements will sometimes be told by the provider that it’s not enough. And
this can result in delays that seriously impair investigations.
For example, homicide investigators in Hayward obtained a search warrant for a murder victim’s
AT&T records and voicemail. They needed this infor- mation because they had virtually no leads
in the case and they thought it would help if they knew the identities of the people who recently
spoke with the victim. But AT&T refused to turn over the records or tapes unless the officers
obtained a wiretap order. We challenged this in court, and won. But the incident cost time and
money, and it needlessly delayed the investigation.
Nevertheless, it is possible to make sense of this area of the law, and that is the purpose of this
article. But before we begin, there are four things that should be noted. First, there is a
significant differ- ence between communications (or “content”) and records, although a
summary will suffice here be- cause we discussed this issue at length in the accom- panying
article. A communication is the message that was sent or received, while a record consists of
information that is ancillary or incidental to its transmission, such as information about the subscriber, the phone numbers and email addresses of the senders and recipients of messages, and
exactly when those messages were made or received.3
Second, the rules for obtaining copies of elec- tronic communication records are set forth in the
federal Electronic Communications Privacy Act (ECPA). In particular, the section known as the
Stored Communications Act (SCA) covers the acquisition of subscriber and transaction records,
while data pertaining to pen registers and connec- tion traps are covered in a separate chapter
which also (arguably) covers the means by which officers can obtain cell tower location
records.5
DEA using wiretaps and pen registers to catch international drug cartels
Kenny 11, Michael Kenny, August 15, 2011, From Pablo to Osama: Counter-terrorism Lessons
from the War on Drugs, Survival: Global Politics and Strategy,
http://dx.doi.org/10.1080/00396338.2003.9688585, TK
Michael Kenney is assistant professor of public policy at the School of Public Affairs at
Pennsylvania State University, Harrisburg
The Colombian cocaine ‘cartels’3 can be traced back to the 1970s, when numerous entrepreneurs sought to exploit the
demand for cocaine in US illegal drug markets by transporting small quantities of the drug from Ecuador, Bolivia and Peru to
Colombia, where it underwent further refinement in makeshift laboratories before final shipment northwards. Over time and
through repeated exchange, numerous entrepreneurs developed far-flung transportation and distribution networks capable of
coordinating several multi-tonne cocaine shipments a year. These ‘wheel networks’ contained
a core group that
coordinated activities among functionally specific nodes, including cocaine base suppliers,
processing labs, transportation rings and distribution groups that delivered cocaine to
independent retailers and funnelled the profits to network leaders and investors.4 While core groups
were generally based in Colombia, support nodes were located in different countries, giving these networks a transnational
dimension. To
reduce their exposure to law-enforcement penetration, participants in cross-border
transportation or wholesale distribution activities were often compartmentalised into small
working groups or ‘cells’ that maintained close communication with core groups and followed
elaborate procedures for delivering large amounts of drugs to independent wholesalers and
conducting other hazardous activities. The core groups directed the transnational enterprise, providing security and
resolving disputes and securing resources from independent investors. They also gathered intelligence about government drug
enforcement efforts and served as the communications hub for the network, coordinating transactions among peripheral nodes. If
something went wrong, informal relations of vertical accountability ensured that peripheral nodes answered to the core, protecting
kingpins and investors from theft and other risks. Decision-making authority generally flowed out and downwards from the core,
beginning with one or more kingpins that directed the transnational enterprise. Below them were ‘managers’ responsible for line
functions, such as transportation and wholesale distribution. Beneath managers were cell workers that carried out much of the daily
work of the enterprise. Kingpins or their day-to-day administrators sought to maintain control over their operations through
frequent communication with overseas managers, often mediated through brokers that provided an additional layer of insulation
from law enforcement. The predominantly vertical direction of command authority – proceeding from the hub of the core group
along spokes to the most peripheral operatives – and its multiple vectors made the cartels ‘wheel networks’. By the mid-1980s, US
and Colombian officials were fully attuned to the danger represented by a handful of wheel networks, particularly the notorious
Medellín and Cali enterprises. With
US assistance, Colombian drug enforcers launched several
crackdowns against the leaders of these transnational enterprises between 1984 and 1988, destroying processing
labs, seizing cocaine shipments and arresting (and occasionally extraditing) lower and middle-level
traffickers. However, core-group kingpins were not greatly affected by these short-lived offensives, as their elaborate security
arrangements allowed them to continue their illicit activities relatively unimpeded. Throughout the 1980s, police officials discovered
numerous multi-tonne cocaine shipments in the US, indicating the growing capacity of Colombian trafficking networks. Yet even the
largest of these seizures failed to put a significant dent in drug availability. While the estimated average price of cocaine at the
‘dealer’ level dropped from $191 per gram in 1981 to $65 per gram in 1989, during the same period the estimated purity of cocaine
at the same transaction level rose from 60% to 80%. The US
Drug Enforcement Administration (DEA)’s
response, in 1992, was the kingpin strategy. Leveraging the DEA’s investigative and intelligence
strengths, this initiative involved the aggressive use of electronic surveillance technologies,
including wiretaps, pen registers and trap-and-trace devices. A kingpin was defined as the leader of an
international trafficking enterprise who directs the production, transportation, and distribution of large quantities of cocaine or
heroin, as well as the organisation’s financial operations. By ‘neutralising’ kingpins and dismantling their criminal infrastructures, the
DEA hoped that it would be able to ‘significantly reduce the availability of drugs in the United States’.5 Principal targets of the
kingpin strategy were the leaders of the Colombian cocaine cartels. The initial list included Pablo Escobar, José Santacruz Londoño,
Gilberto and Miguel Rodríguez Orejuela, Helmer Buitrago Herrera, and Iván and Jairo Urdinola Grajales. In
close cooperation
with the Colombian National Police (CNP), the DEA sought to disable their trafficking networks
by attacking their communications, transportation and finance systems. After just a year and a
half of operation, the DEA reported that kingpin investigations had led to the seizure of $210
million in drug proceeds, the confiscation of 144 aircraft and 91 boats, trucks and cars, and the
arrest of over 713 ‘significant’ traffickers.6 In Colombia, elite drug enforcement units destroyed
hundreds of cocaine processing labs, seized thousands of kilograms of cocaine base and cocaine
hydrochloride, eradicated hundreds of thousands of hectares of coca leaf plantings, and
arrested hundreds of traffickers. Remarkably, by 1996 all of the original kingpins were either dead or in jail, and their
trafficking networks severely disrupted. Notwithstanding reports that some entrepreneurs continued to manage scaled-down
smuggling operations from behind bars, a number of government officials crowed that the days of the cocaine cartels were over.
Some went even further. Following the arrest of Gilberto Rodríguez-Orejuela, Colombian prosecutor general Alfonso Valdivieso
exulted that ‘narco-trafficking is in the way of disappearing from Colombia’.7 In
a war marked by considerable
frustration for lawenforcement agencies, the state appeared to have earned a major victory.
Link – Police Body Cameras
Federal push for police body cameras helps with solving crimes such as
domestic violence because of the better evidence
Shepherd 14
(Reporter for Centralmaine – Covers Maine’s 2nd Congressional district – News and Politics reporter for the Kennebec Journal,
Michael, “Police Body Cameras Already Catching on in Central Maine”, Centralmaine.com, December 7, 2014,
http://www.centralmaine.com/2014/12/07/police-body-cameras-already-catching-on-in-central-maine/, ASN)
Gove’s department is one of the scattershot cities and towns
in central Maine that began using chest-worn
cameras department-wide well before a recent national push for police to adopt them. Three years
ago, Gardiner Police Chief James Toman said his department started using body cameras during traffic stops, crime scene visits and
most other interactions with the public. Now the department has seven of them. They cost $700 to $800 per unit, cheap compared
to the in-car units that Gardiner hasn’t had and would have had to pay thousands to install. Toman said officers
have
embraced the body cameras, which help them write reports, document cases and guard against
citizen complaints. “I think it’s one of the best things we’ve purchased, actually,” the chief said. Other area departments using
them include those in Wilton, Farmington, Richmond and Monmouth. They bought them in the last few years as a more portable
and cheaper alternative to dashboard cameras, which are more common. Meanwhile, larger Maine police agencies — including the
Maine State Police and departments in Portland, Bangor, Lewiston and Augusta — haven’t bought body cameras. Those
departments say they would consider using body cameras, but they cited cost as a main prohibitive factor. Departments
nationwide, though, will get help with that if President Barack Obama gets his way. Last week,
he asked Congress to spend $263 million over three years to give police cameras, training and
other resources in an effort to increase public confidence in law enforcement. Of that, the
federal government would use $75 million to help buy 50,000 body cameras for police through a
program that would match state and local funding. The proposal was a response to recent events in Ferguson,
Mo., where racial divides were highlighted after Michael Brown, an unarmed black 18-year-old suspected of robbery, was shot and
killed by white police officer Darren Wilson after a scuffle in August. Brown’s death sparked protests in the St. Louis suburb and
nationwide, prompting further debate about police use of riot gear, tear gas and armored vehicles to tamp down demonstrations.
After a grand jury decided in November not to charge Wilson in Brown’s death, protesters took to the streets again. Brown’s family
has said they would work “to ensure that every police officer working the streets in this country wears a body camera,” but Obama’s
proposal wouldn’t get close to that: 50,000 cameras would cover less than a tenth of the nation’s police officers, estimated at just
under 700,000 people. In Maine and across the nation, cameras in police cruisers are common, but not quite standard: In 2003, the
U.S. Department of Justice said 72 percent of state police and highway patrol cars had cameras, up from 11 percent in 2000. The
Maine State Police installed cruiser cameras in 1995, but like most agencies nationwide, they don’t use body cameras. A Justice
Department survey of a sampling of police agencies in July 2013 found that 75 percent of those departments didn’t use them. But
calls for them have grown louder of late, with New York City, Chicago and Philadelphia rolling out pilot programs. In some places,
police unions have opposed mandatory expansion of body camera use, but there’s little opposition to the concept among police in
Maine. The
American Civil Liberties Union, which generally opposes many government
surveillance programs, supports the concept of body cameras as long as individual privacy is
protected. Robert Schwartz, executive director of the Maine Chiefs of Police Association, said he didn’t oppose the idea, but
departments must set clear expectations for officers before using them. “There’s a lot of things to be discussed before you just put a
camera on,” he said. With body cameras, the onus is typically on the officer to turn them on. In Gardiner, Toman has issued a
written policy on body camera footage, which says officers
must switch their cameras on when exiting their
cruiser ahead of interactions. It can be switched off only after interactions. The policy says that
videos must be kept for at least three months in Gardiner, but if there’s an arrest, they are
maintained indefinitely and handed to prosecutors as evidence. Rachel Healy, a spokeswoman for the ACLU
of Maine, praised Gardiner’s policy overall, especially the part that makes officers leave cameras on throughout interactions. She
said she
would liked to have seen certain allowances made for recording inside homes and
disclosing the fact that officers often are recording, but she said Gardiner is well ahead of most
agencies. “In the end, when these ultimately will be routine and technology advances, these problems will work themselves out,”
Healy said. Gardiner is ahead of Wilton, whose department is more casual about using the cameras. Police Chief Heidi Wilcox said
there’s no written policy for her officers, who follow “best-use” practices when using body cameras. The
Waterville Police
Department doesn’t provide body cameras to its police, but Officer Damon Lefferts bought one
for his own use last year. He told the Morning Sentinel that it once helped him get evidence in a
domestic violence case. However, Police Chief Joseph Massey said last week that he’ll ask Lefferts to stop using it until the
department can develop protocols and determine how they would respond to public-access requests for his footage. Kennebec
County District Attorney Maeghan Maloney said “the
best evidence we have in a case is often from a body
camera,” saying that footage of victim interviews has led to convictions in domestic violence
cases. That worked in the case of David L. Dixon. Last year, he admitted to Gardiner police Sgt. Todd Pilsbury that he had choked
and “tried to kill” a woman. Pilsbury was wearing a body camera. Dixon eventually was found guilty and sentenced to six months in
jail. The footage, which the department provided to the Kennebec Journal for review, also showed an interview with the victim, who
had visible red marks around her neck.
Link – Stored Communications Act
SCA is super useful in fighting crime – Courts Say
POV, 12
Point Of View, 1/1/12 (“Obtaining Electronic Communications and Records”, ALAMEDA COUNTY
DISTRICT ATTORNEY’S OFFICE, January 1st, 2012,
http://le.alcoda.org/publications/point_of_view/files/ELECTRONIC_RECORDSx.pdf, Accessed:
July 21st, 2015, DSF)
Every day, virtually every criminal in the U.S. (at least those who aren’t incarcerated) will use a
phone, send or receive email, surf the internet, or all four. So it is not surprising that many of
the records pertaining to these communications can help investigators solve crimes and assist
prosecutors in obtaining convictions. Among other things, they may reveal the identities of the
suspect’s accomplices, establish the dates and times of their contacts, and prove the suspect’s
whereabouts when a crime occurred. As the California Supreme Court observed, “[A] record of
telephone calls provides a virtual current biography.”2 In fact, electronic communication records
now permit officers to follow a suspect by obtaining realtime reports of the locations of the cell
phone towers that are receiving signals from his phone.
The question, then, is what are the legal requirements for obtaining these records?
Unfortunately, the answer is not crystal clear. And the reason is the same as the reason that
officers are having trouble figuring out the rules for obtaining copies of the communications
themselves (which was the subject of the previous article). Simply put, both subjects are
regulated by a federal law that was badly written and poorly organized, and which has not kept
pace with changes in technology.
Another consequence of this uncertainty is that overcautious service providers sometimes
demand legal process beyond that required by the law. As a result, officers who have complied
with all the legal requirements will sometimes be told by the provider that it’s not enough. And
this can result in delays that seriously impair investigations.
For example, homicide investigators in Hayward obtained a search warrant for a murder victim’s
AT&T records and voicemail. They needed this infor- mation because they had virtually no leads
in the case and they thought it would help if they knew the identities of the people who recently
spoke with the victim. But AT&T refused to turn over the records or tapes unless the officers
obtained a wiretap order. We challenged this in court, and won. But the incident cost time and
money, and it needlessly delayed the investigation.
Nevertheless, it is possible to make sense of this area of the law, and that is the purpose of this
article. But before we begin, there are four things that should be noted. First, there is a
significant differ- ence between communications (or “content”) and records, although a
summary will suffice here be- cause we discussed this issue at length in the accom- panying
article. A communication is the message that was sent or received, while a record consists of
information that is ancillary or incidental to its transmission, such as information about the subscriber, the phone numbers and email addresses of the senders and recipients of messages, and
exactly when those messages were made or received.3
Second, the rules for obtaining copies of elec- tronic communication records are set forth in the
federal Electronic Communications Privacy Act (ECPA). In particular, the section known as the
Stored Communications Act (SCA) covers the acquisition of subscriber and transaction records,
while data pertaining to pen registers and connec- tion traps are covered in a separate chapter
which also (arguably) covers the means by which officers can obtain cell tower location
records.5
Link – Wiretapping (Generic)
Wiretapping is key to check organized crime
Wade, 15
Christian M. Wade, State house reporter, 1/9/15 (“Essex County DA Blodgett
calls for updated wiretap law”, Salem News, Janyary 1st, 2015,
http://www.salemnews.com/news/local_news/essex-county-da-blodgett-callsfor-updated-wiretap-law/article_ebfcb081-27a7-54e0-b768d45f0d2598f5.html, Accessed: July 13th 2015, DSF)
BOSTON — Law enforcement officials are planning another push to update the state’s
antiquated wiretapping laws to include cell phones, as part of a broader effort to target drug
gangs and human traffickers.
Such a measure would also expand the definition of organized crime beyond traditional mafia
activity and allow police to ask judges for wiretaps on narcotics and human trafficking networks.
“One of the biggest instruments in criminal activity these days is the cell phone,” said Essex
County District Attorney Jonathan Blodgett. “The drug cabals and the human traffickers —
they’re all doing it with their cell phones.”
Blodgett, who heads the Massachusetts District Attorneys Association, said the group will seek a
lawmaker to sponsor a measure broadening wiretap authority to include cases involving
homicides, firearms and drug distribution, even if not part of organized crime.
Link – Wiretapping (Money Laundering)
Wiretaps and other forms of surveillance help curb Money Laundering
Auten 13 (Matthew R. Auten is a J.D. Candidate, Pace University School of Law (2013); B.A., McGill
University (2002) - 2013- “Money Spending or Money Laundering: The Fine Line between Legal and Illegal
Financial Transactions” - http://www.lexisnexis.com.proxy2.cl.msu.edu/hottopics/lnacademic/)
To determine whether sufficient evidence to support a conviction for money laundering
has been produced by the prosecution, the most clear-cut cases rely on probative
statements made by the defendant.
http://www.lexisnexis.com.proxy2.cl.msu.edu/lnacui2api/frame.do?tokenKey=rsh20.976477.4087765907&target=results_DocumentContent&returnToKey=20_T22355215367&p
arent=docview&rand=1437401604139&reloadEntirePage=true - n37 Direct evidence of this
kind is often obtained through wiretaps, or through the testimony of co-conspirators. However,
more often than not, the prosecution relies on circumstantial evidence--often with the interpretive help of
an expert witness--to make their case that a dual-purpose transaction should be characterized as money
laundering. In some instances,
circumstantial evidence may provide a clear inference that a
particular dual-purpose transaction, or series of transactions, should be characterized as
money laundering, because the intent to conceal is clear. n41
Increase of wiretapping has resulted in more arrests of drug cartels
McCombs 14, Brady Mccombs Arizona Daily Star, 12-14-2010, "Wiretap use expands in fight
against drug lords," Arizona Daily Star, http://tucson.com/news/local/crime/wiretap-useexpands-in-fight-against-drug-lords/article_0d98c151-27b8-5cb5-888f-436c60487c12.htm, TK
Prosecutors had plenty of evidence against two members of the Dominguez drug smuggling
organization, but it was a recording of the defendants arranging a cocaine deal that nailed the
conviction. "Tell him to get me the job, the other kind, the Guero," said Ricardo Varela, using the slang term for cocaine in an exchange with
Maria Isabel Dominguez. "I'm going to tell him," she said. "I need one or two there," Varela said. "I'll go over and buy it from him." The
conversation was one of hundreds recorded in the summer of 2004 in a wiretap investigation by
the Counter Narcotics Alliance that led to the 2008 conviction of Varela and 35 others from the
organization. Dominguez pleaded guilty before trial. Though expensive and time-consuming, wiretap
investigations are on the rise in Arizona and across the nation because they help investigators catch
high-ranking targets and because, most importantly, the live recordings pack a punch in the
courtroom that can't be matched by regular testimony. "You see the lights come on and the jury realizing, 'Holy moly,
these guys were going to keep doing this until they got stopped,'" said Richard Wintory, who now heads the Arizona Attorney General's border crime
enforcement team but was the prosecutor in the Dominguez case as a deputy Pima County attorney. That wiretap was one of only 29 in Arizona in
2004. Since then, the number of wiretaps authorized by judges has nearly doubled to 55 in 2009, records from the Office of United States Courts show.
This year's total is expected to match or exceed last year's. Nationally,
wiretaps have doubled since 2000 and are up
one third in the last five years. "Wiretaps are devastatingly effective for law enforcement," said
Tucson defense attorney Walter Nash, who is considered one of the foremost experts on litigating against them. "Nobody will dispute that. It gives
them real-time evidence that can be the ball game." In Arizona, three-fourths are used to investigate drug cases and all tap into cell phones. Critics of
wiretapping say law-enforcement agencies seem to be rushing to use them when traditional law-enforcement tactics would suffice. That should worry
everyone, defense attorney Nash said, considering it's so intrusive. "I don't break any laws but - I don't know about you - I would be mighty
uncomfortable knowing somebody is listening to my conversation," Nash said. Real wiretap investigations don't resemble the ones you see in the
movies - they are expensive, time-consuming and strenuous. "It's not at all like the movies, where you see these knuckleheads in a van with
headphones on and cheeseburgers being eaten," Wintory said. "There is so much involved in these investigations." The work begins long before
investigators ever listen to a phone conversation. To get permission from a judge, they must show: • That the person they want to investigate is
committing or about to commit a serious crime. • That he or she is using phones to commit the crime, which requires showing a pattern of phones
being used repeatedly by suspected criminals. • That authorities have exhausted traditional methods and cannot further the investigation without a
wiretap. Police often come to Wintory's office wide-eyed about potential wiretap cases only to leave frowning when they realize they haven't used all
the traditional methods, which include surveillance, record checks, trash pickups and informants or undercover officers. This high standard is why the
American Civil Liberties Union isn't concerned about the increase in wiretaps, said the organization's legislative counsel, Chris Calabrese. Once a
wiretap application is sent to a judge, it's hardly ever rejected. Only two applications have been denied since 2000, compared with 17,278 approved,
show records from the Office of United States Courts. Critics call this proof that getting wiretaps is no more than a rubber-stamp process, but Wintory
said hundreds of wiretap applications never reach a judge; they fizzle in internal reviews by committees that meticulously inspect them, he said. Once a
judge approves a wiretap, suppressing the evidence it gathers is difficult, time-consuming and expensive for a defense attorney. For instance, Nash has
to contract investigators to prove the agency could have used tactics it said it couldn't, such as surveillance. Deciphering codes Once a wiretap has been
approved, the long hours begin. "It's not just somebody flipping a switch somewhere and listening in a room," said Glenn McCormick, deputy criminal
chief in charge of the U.S. Attorney Office's organized crime and drug enforcement task force section. Monitors, usually Spanish speakers, listen to
phone conversations, trying to make sense of what amounts to code language. Agents go to locations mentioned in the calls to watch houses or talk
with people discreetly to connect the dots between what they are hearing and what is actually happening. " Stops
are made, people are
arrested and what do you know, they find 20 pounds of meth in the car and the phone
conversation was talking about, 'You taking those 20 windows?' 'Yeah, we've got those 20
windows,'" McCormick said. Each wiretap authorization is good for 30 days, with extensions available for 30 additional days at a time.
Investigators sometimes get approvals to tap new phones they discover during an investigation. In 2009 in Arizona, wiretap cases
lasted an average of 71 days. Agents made an average of 145 intercepts per day. Arizona
wiretap cases cost an average of $203,800 in 2009, including four cases that exceeded $800,000.
A federal drug investigation that began in May 2008 and led to the arrest of 169 people cost
$821,067. A state case out of Maricopa County that began in October 2008 and hasn't yielded any arrests cost $978,720. The manpower - paying
people to listen, translate and transcribe the conversations and agents to conduct surveillance and make stops - accounted for 87 percent of the costs
in Arizona cases in 2009. Agencies are able to do more of them because they have more staff and funds. The U.S. Attorney's Office in Arizona has added
42 assistant U.S. attorneys since 2006, bringing the total to 152. State agencies tap into federal grants for border security and forfeiture money. Drug
cartels are well aware of the increase in wiretaps and try to thwart them by frequently
changing cell phone numbers, said Anthony Coulson, a recently retired assistant special agent in charge of the Drug Enforcement
Administration's Tucson office. For a while, cartels would only use a phone up to 20 times, knowing the Department of Justice required investigators to
show the use of a phone number 21 times in applications for wiretaps, Coulson said. That requirement has since changed .
Drug smuggling
organizations also try to use other means of communication or cut down on phone calls, but
cell phones are vital to their operations, Coulson said. "There is no other way to do it," he said. "You can't do it through
telepathy." No independent monitoring During a wiretap investigation, agents are to make reasonable attempts not to listen to conversations
unrelated to the criminal activity being investigated. That doesn't always happen, defense attorney Nash said. Sometimes authorities listen in on
privileged conversations between a lawyer and client, or to irrelevant banter such as two teenagers chatting, he said. But Wintory says officers get so
many warnings about the law that they've missed out on key conversations when an overly careful officer switched off a recording because he thought
he wasn't allowed to listen in. The
wiretap model "is the most scrupulously respectful process of civil
liberties that has ever been created" Wintory said. Wiretaps are an important tool in the
difficult fight against powerful drug-trafficking organizations, he said: "They give us the opportunity to reach out
through those phone lines, jerk them up by the nape of their necks and drag them back to Tucson to face justice."
DEA using wiretaps and pen registers to catch international drug cartels
Kenny 11, Michael Kenny, August 15, 2011, From Pablo to Osama: Counter-terrorism Lessons
from the War on Drugs, Survival: Global Politics and Strategy,
http://dx.doi.org/10.1080/00396338.2003.9688585, TK
Michael Kenney is assistant professor of public policy at the School of Public Affairs at
Pennsylvania State University, Harrisburg
The Colombian cocaine ‘cartels’3 can be traced back to the 1970s, when numerous entrepreneurs sought to exploit the
demand for cocaine in US illegal drug markets by transporting small quantities of the drug from Ecuador, Bolivia and Peru to
Colombia, where it underwent further refinement in makeshift laboratories before final shipment northwards. Over time and
through repeated exchange, numerous entrepreneurs developed far-flung transportation and distribution networks capable of
coordinating several multi-tonne cocaine shipments a year. These ‘wheel networks’ contained
a core group that
coordinated activities among functionally specific nodes, including cocaine base suppliers,
processing labs, transportation rings and distribution groups that delivered cocaine to
independent retailers and funnelled the profits to network leaders and investors.4 While core groups
were generally based in Colombia, support nodes were located in different countries, giving these networks a transnational
dimension. To
reduce their exposure to law-enforcement penetration, participants in cross-border
transportation or wholesale distribution activities were often compartmentalised into small
working groups or ‘cells’ that maintained close communication with core groups and followed
elaborate procedures for delivering large amounts of drugs to independent wholesalers and
conducting other hazardous activities. The core groups directed the transnational enterprise, providing security and
resolving disputes and securing resources from independent investors. They also gathered intelligence about government drug
enforcement efforts and served as the communications hub for the network, coordinating transactions among peripheral nodes. If
something went wrong, informal relations of vertical accountability ensured that peripheral nodes answered to the core, protecting
kingpins and investors from theft and other risks. Decision-making authority generally flowed out and downwards from the core,
beginning with one or more kingpins that directed the transnational enterprise. Below them were ‘managers’ responsible for line
functions, such as transportation and wholesale distribution. Beneath managers were cell workers that carried out much of the daily
work of the enterprise. Kingpins or their day-to-day administrators sought to maintain control over their operations through
frequent communication with overseas managers, often mediated through brokers that provided an additional layer of insulation
from law enforcement. The predominantly vertical direction of command authority – proceeding from the hub of the core group
along spokes to the most peripheral operatives – and its multiple vectors made the cartels ‘wheel networks’. By the mid-1980s, US
and Colombian officials were fully attuned to the danger represented by a handful of wheel networks, particularly the notorious
Medellín and Cali enterprises. With
US assistance, Colombian drug enforcers launched several
crackdowns against the leaders of these transnational enterprises between 1984 and 1988, destroying processing
labs, seizing cocaine shipments and arresting (and occasionally extraditing) lower and middle-level
traffickers. However, core-group kingpins were not greatly affected by these short-lived offensives, as their elaborate security
arrangements allowed them to continue their illicit activities relatively unimpeded. Throughout the 1980s, police officials discovered
numerous multi-tonne cocaine shipments in the US, indicating the growing capacity of Colombian trafficking networks. Yet even the
largest of these seizures failed to put a significant dent in drug availability. While the estimated average price of cocaine at the
‘dealer’ level dropped from $191 per gram in 1981 to $65 per gram in 1989, during the same period the estimated purity of cocaine
at the same transaction level rose from 60% to 80%. The US
Drug Enforcement Administration (DEA)’s
response, in 1992, was the kingpin strategy. Leveraging the DEA’s investigative and intelligence
strengths, this initiative involved the aggressive use of electronic surveillance technologies,
including wiretaps, pen registers and trap-and-trace devices. A kingpin was defined as the leader of an
international trafficking enterprise who directs the production, transportation, and distribution of large quantities of cocaine or
heroin, as well as the organisation’s financial operations. By ‘neutralising’ kingpins and dismantling their criminal infrastructures, the
DEA hoped that it would be able to ‘significantly reduce the availability of drugs in the United States’.5 Principal targets of the
kingpin strategy were the leaders of the Colombian cocaine cartels. The initial list included Pablo Escobar, José Santacruz Londoño,
Gilberto and Miguel Rodríguez Orejuela, Helmer Buitrago Herrera, and Iván and Jairo Urdinola Grajales. In
close cooperation
with the Colombian National Police (CNP), the DEA sought to disable their trafficking networks
by attacking their communications, transportation and finance systems. After just a year and a
half of operation, the DEA reported that kingpin investigations had led to the seizure of $210
million in drug proceeds, the confiscation of 144 aircraft and 91 boats, trucks and cars, and the
arrest of over 713 ‘significant’ traffickers.6 In Colombia, elite drug enforcement units destroyed
hundreds of cocaine processing labs, seized thousands of kilograms of cocaine base and cocaine
hydrochloride, eradicated hundreds of thousands of hectares of coca leaf plantings, and
arrested hundreds of traffickers. Remarkably, by 1996 all of the original kingpins were either dead or in jail, and their
trafficking networks severely disrupted. Notwithstanding reports that some entrepreneurs continued to manage scaled-down
smuggling operations from behind bars, a number of government officials crowed that the days of the cocaine cartels were over.
Some went even further. Following the arrest of Gilberto Rodríguez-Orejuela, Colombian prosecutor general Alfonso Valdivieso
exulted that ‘narco-trafficking is in the way of disappearing from Colombia’.7 In
a war marked by considerable
frustration for lawenforcement agencies, the state appeared to have earned a major victory.
Impact
Crime Bad (Deontology)
Crime is psychologically destructive –
Wolff, 5
Jonathan Wolff, Dean of Arts and Humanities and Professor of Philosophy, University College
London, 2005 (“What’s So Bad About Crime?”, Bentham Lecture UCL, November 30th, 2005,
https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=4&ved=0CDUQFjADahU
KEwjl17Pt6ezGAhVHig0KHZTLCrg&url=http%3A%2F%2Fwww.homepages.ucl.ac.uk%2F~uctyjow
%2FWBC.doc&ei=3YuuVaX1H8eUNpSXq8AL&usg=AFQjCNFuT2F_VHWzdADYp7oxpDA2lKh1AQ&
sig2=68O_yxrVLih1gd74Hc2oPQ, Accessed: July 21st, 2015, DSF)
All of this, though, rings rather hollow, and perhaps does more to discredit particular economic
indicators rather than show that crime is a good thing, after all. However I raise the question
‘what’s so bad about crime?’ not from the standpoint of an economist, but from the standpoint
of moral and political philosophy. Asking this question, and thereby placing crime in a broader
context, may help with two tasks; not only understanding what is so bad about crime, but
understanding what is so bad about anything at all. That is to say, any philosophical account of
human well-being will have to be able to give an account of what it is about crime which gives
rise to so much misery. Hence crime is an important testing ground for philosophical theory.
To understand what it is for a human life to go well or badly we need some sort of theoretical
approach. One standard answer is that a good life is one filled with happiness or satisfaction; a
different answer is that a good life is one that is well-resourced, in terms of income and wealth,
allowing a good standard of living. The two accounts are, of course, related insofar as resources
can buy happiness, but it is well-known that the correlation is imperfect. A life can be intolerable
even though well-resourced, and happy though poorly resourced, at least by normal standards,
for a whole range of reasons.
According to the first theory presumably what is wrong with crime is that it makes people
unhappy in some way. There is, no doubt, a great deal of truth in this. One has only to think of
the misery, to the point of despondency, in which a mugging or burglary can leave people. A
convicted housebreaker told me that he went straight after his parents were burgled and he
saw at first hand for the first time, how devastating this was for them, even though they hardly
lost anything. He said that he had no idea that breaking into people’s houses could have such an
effect, and it shocked him to find out what he must have been doing to people. Perhaps this was
because he formerly had implicitly held the second view of well-being; that a good-life is a wellresourced one, or, more likely that there is a strong correlation between possession of goods
and happiness. So if you steal from the rich, as he had been doing, or from the adequately
insured, this should not affect their well-being in any serious way. Yet the experience of this
burglar’s parents convinced him, I suppose, that this view was wrong.
The happiness view seems closer to the truth, yet it also seems in some way superficial. What it
doesn’t tell us is why crime makes people so unhappy. My own experience of having to deal
with a minor burglary is that, objectively, it is comparable to having to put together some badly
made self-assembly furniture with some missing pieces, while at the same time querying a utility
bill and investigating the mis-location of a recorded delivery parcel. Very nasty, but, in itself, no
worse than a visit from the Quality Assurance Agency. A mugging, in its purely physical aspects,
is about at the same level as a mid-scale sporting injury. A character in Ian McEwan’s Saturday,
expecting to receive a beating in the street, has a flash forward to the months of convalescence
and recovery that would follow. This would be to take a purely ‘objective’ aspect of crime. Yet
these objective aspects hardly seem to capture what we worry about, as McEwan’s novel
brilliantly illustrates. There is something about being a victim of crime which goes much deeper
than this. Hence fear of crime is not, or at least not always, for example, fear of the average
expected objective effects of crime.
Jeremy Bentham, as so often, clarifies the issue:
The great point is, to clear the country of those crimes, each instance of which is sufficient to
awaken and keep alive, in every breast within a certain circle, the fear of boundless injury to
person or property, as well as of destruction to life itself – in comparison of this wide-spreading
– this almost universally extending mischief – this fear of boundless injury – the sum of the
mischiefs resulting in each instance from losses and other injuries actually sustained would be
found relatively inconsiderable. Jeremy Bentham Panoptican Versus New South Wales (p. 244)
Money Laundering BAD – Laundry List of Reasons
Money Laundering erodes political and social systems affecting stability,
diminishes economic growth, and hurts basic individual liberties
Crime and Misconduct Commission 05
(The Crime and Corruption Commission (CCC) is a statutory body set up to combat and reduce
the incidence of major crime and corruption in the public sector in Queensland. Its functions and
powers are set out in the Crime and Corruption Act 2001, “Background intelligence brief Money
laundering,” Crime and Corruption Commission, July 2005, http://www.ccc.qld.gov.au/researchand-publications/publications/crime/money-laundering.pdf, GCM)
There are many reasons why money laundering is harmful in society. Some examples are listed
below. It makes crime pay. Money laundering allows drug traffickers, smugglers and other
criminals to accumulate economic power and expand their operations. This has the potential to
erode the political and social systems of a country, and could affect stability and the general rule
of law (Alweendo 2005). This in turn drives up the cost of law enforcement and the spin-off
costs of health care in the treatment of problems such as drug addiction. It has the potential to
undermine the financial community because of the sheer magnitude of the sums involved.
Money laundering on a grand scale has the potential to change the demand for cash, make
interest rates and exchange rates more volatile, and cause high inflation rates for a country.
Laundering diminishes economic development because it undermines legitimate business,
competition and government tax revenue, and therefore indirectly harms honest taxpayers and
reduces legitimate job opportunities. Money laundering Perceived ease of entry to a country
attracts an undesirable element across its borders, degrading quality of life and raising concerns
about national security (Solicitor General Canada 1998). The crimes perpetrated by these
undesirable elements erode basic individual liberties by threatening rights to life and
entitlements to own property. There are great incentives, therefore, for governments and
private enterprise to work together to combat money laundering locally and globally.
Money Laundering - Turns Democracy
Money Laundering damages the integrity of the entire society, and undermines
democracy.
FATF 15 (Financial Action Task Force - The Financial Action Task Force (FATF) is an inter-governmental
body established in 1989 by the Ministers of its Member jurisdictions. The objectives of the FATF are to
set standards and promote effective implementation of legal, regulatory and operational measures for
combating money laundering, terrorist financing and other related threats to the integrity of the
international financial system. – “How does Money laundering Affect Business?” - http://www.fatfgafi.org/pages/faq/moneylaundering/- KR)
The integrity of the banking and financial services marketplace depends heavily on the perception that it functions
within a framework of high legal, professional and ethical standards. A reputation for integrity is the one of
the most valuable assets of a financial institution. If funds from criminal activity can be easily
processed through a particular institution – either because its employees or directors have been bribed or
because the institution turns a blind eye to the criminal nature of such funds – the institution could be drawn
into active complicity with criminals and become part of the criminal network itself. Evidence of
such complicity will have a damaging effect on the attitudes of other financial intermediaries and
of regulatory authorities, as well as ordinary customers. As for the potential negative macroeconomic consequences of
unchecked money laundering, one can cite inexplicable changes in money demand, prudential risks to bank soundness,
contamination effects on legal financial transactions, and increased volatility of international capital flows and
exchange rates due to unanticipated cross-border asset transfers. Also, as it rewards corruption and crime,
successful money laudering damages the integrity of the entire society and undermines
democracy and the rule of the law.
Money Laundering – Developing Countries
Money Laundering damages developing countries internally
World Bank 03 (World Bank is s a vital source of financial and technical assistance to developing
countries around the world, World Bank, “The Adverse Implications for Developing Countries,” 3/30/3,
http://www1.worldbank.org/finance/assets/images/02-chap02-f.qxd.pdf) RR
Criminal enterprises and terrorist financing operations succeed largely to the extent that they
are able to sanitize and conceal their proceeds by moving them through national and
international financial systems. The absence of, or a lax or corrupt, anti-money laundering
regime in a particular country permits criminals and those who finance terrorism financing to
operate, using their financial gains to expand their criminal pursuits and fostering illegal
activities such as corruption, drug trafficking, illicit trafficking and exploitation of human beings,
arms trafficking, smuggling, and terrorism. While money laundering and the financing of
terrorism can occur in any country, they have particularly significant economic and social
consequences for developing countries, because those markets tend to be small and, therefore,
more susceptible to disruption from criminal or terrorist influences. Money laundering and
terrorist financing also have significant economic and social consequences for countries with
fragile financial systems because they too are susceptible to disruption from such influences.
The economy, society, and ultimately the security of countries used as money-laundering
platforms are all imperiled. Money laundering helps make criminal activities profitable. Thus, to
the extent that a country is viewed as a haven for money laundering, it is likely to attract
criminals and promote corruption. If money laundering is prevalent in a country, it generates
more crime and corruption. It also enhances the use of bribery in critical gateways, such as:
lawyers and accountants, the legislature, police authorities, the courts. A reputation as a money
laundering or terrorist financing haven, alone, could cause significant adverse consequences for
development in a country. Foreign financial institutions may decide to limit their transactions
with institutions from money laundering havens; subject these transactions to extra scrutiny,
making them more expensive; or terminate correspondent or lending relationships altogether.
Even legitimate businesses and enterprises from money laundering havens may suffer from
reduced access to world markets or access at a higher cost due to extra scrutiny of their
ownership, organization and control systems.
Money Laundering impedes growth of countries and shows criminals that
money laundering pays off leading to more fraud and corporate embezzling
Layton 06
(Julia Layton holds a B.A. in English literature from Duke University and a M.F.A. in creative
writing from the University of Miami, Julia Layton, “How Money Laundering Works,”
HowStuffWorks.com, June 01, 2006, http://money.howstuffworks.com/moneylaundering5.htm, GCM)
Depending on which international agency you ask, criminals launder anywhere between $500
billion and $1 trillion worldwide every year. The global effect is staggering in social, economic
and security terms. On the socio-cultural end of the spectrum, successfully laundering money
means that criminal activity actually does pay off. This success encourages criminals to continue
their illicit schemes because they get to spend the profit with no repercussions. This means
more fraud, more corporate embezzling (which means more workers losing their pensions when
the corporation collapses), more drugs on the streets, more drug-related crime, lawenforcement resources stretched beyond their means and a general loss of morale on the part
of legitimate business people who don't break the law and don't make nearly the profits that
the criminals do. The economic effects are on a broader scale. Developing countries often bear
the brunt of modern money laundering because the governments are still in the process of
establishing regulations for their newly privatized financial sectors. This makes them a prime
target. In the 1990s, numerous banks in the developing Baltic states ended up with huge, widely
rumored deposits of dirty money. Bank patrons proceeded to withdraw their own clean money
for fear of losing it if the banks came under investigation and lost their insurance. The banks
collapsed as a result. Other major issues facing the world's economies include errors in
economic policy resulting from artificially inflated financial sectors. Massive influxes of dirty cash
into particular areas of the economy that are desirable to money launderers create false
demand, and officials act on this new demand by adjusting economic policy. When the
laundering process reaches a certain point or if law-enforcement officials start to show interest,
all of that money that will suddenly disappear without any predictable economic cause, and that
financial sector falls apart. Some problems on a more local scale relate to taxation and smallbusiness competition. Laundered money is usually untaxed, meaning the rest of us ultimately
have to make up the loss in tax revenue. Also, legitimate small businesses can't compete with
money-laundering front businesses that can afford to sell a product for cheaper because their
primary purpose is to clean money, not turn a profit. They have so much cash coming in that
they might even sell a product or service below cost. The majority of global investigations focus
on two prime money-laundering industries: Drug trafficking and terrorist organizations. The
effect of successfully cleaning drug money is clear: More drugs, more crime, more violence. The
connection between money laundering and terrorism may be a bit more complex, but it plays a
crucial role in the sustainability of terrorist organizations. Most people who financially support
terrorist organizations do not simply write a personal check and hand it over to a member of the
terrorist group. They send the money in roundabout ways that allow them to fund terrorism
while maintaining anonymity. And on the other end, terrorists do not use credit cards and
checks to purchase the weapons, plane tickets and civilian assistance they need to carry out a
plot. They launder the money so authorities can't trace it back to them and foil their planned
attack. Interrupting the laundering process can cut off funding and resources to terrorist groups.
Money Laundering - Econ
Money Laundering hurts the economy severely- list of reasons
FIU 15 (The Financial Intelligence Unit is assigned to conduct research on the causes and consequences
of money laundering and terrorist financing through participation in projects, FIU, “Consequences of
Money Laundering,” 7/20/15,
http://www.fiumauritius.org/index.php?option=com_content&view=article&id=1&Itemid=2&lang=en) RR
Money laundering impairs the development of the legitimate private sector through the supply of
products priced below production cost, making it therefore difficult for legitimate activities to
compete. Criminals may also turn enterprises, which were initially productive into sterile ones to launder
their funds leading ultimately to a decrease in the overall productivity of the economy. Furthermore, the
laundering of money can also cause unpredictable changes in money demand as well as great volatility in
international capital flows and exchange rates. While the financial sector is an essential constituent in the financing of
the legitimate economy, it can be a low-cost vehicle for criminals wishing to launder their funds.
Consequently, the flows of large sums of laundered funds poured in or out of financial institutions might
undermine the stability of financial markets. In addition, money laundering may damage the reputation of financial
institutions involved in the scheming resulting to a loss in trust and goodwill with stakeholders. In worst-case scenarios, money
laundering may also result in bank failures and financial crises. Money laundering also reduces tax
revenue as it becomes difficult for the government to collect revenue from related transactions, which frequently take place in
the underground economy. The socio-economic effects of money laundering are various because as dirty money generated from
criminal activities are laundered into legitimate funds; they are used to expand existing criminal operations and finance new ones.
Further to that money laundering may lead to the transfer of economic power from the market,
the government and the citizens to criminals, abetting therefore crimes and corruption.
Money Laundering is devastating to the private sector, and can destabilize the
economy.
FIU 13 (FIU is the financial intelligence unit, it has published numerous works regarding issues and risks
in the finance world-“Consequences of money Laundering”http://www.fiumauritius.org/index.php?option=com_content&view=article&id=18%3Amoneylaundering&catid=3&lang=en&limitstart=3-KR)
Money laundering impairs the development of the legitimate private sector through the supply of
products priced below production cost, making it therefore difficult for legitimate activities to
compete. Criminals may also turn enterprises which were initially productive into sterile ones to
launder their funds leading ultimately to a decrease in the overall productivity of the economy.
Furthermore, the laundering of money can also cause unpredictable changes in money demand as well
as great volatility in international capital flows and exchange rates. While the financial sector is an essential constituent
in the financing of the legitimate economy, it can be a low-cost vehicle for criminals wishing to launder their funds.
Consequently, the flows of large sums of laundered funds poured in or out of financial institutions
might undermine the stability of financial markets. In addition, money laundering may damage the reputation
of financial institutions involved in the scheming resulting to a loss in trust and goodwill with stakeholders. In worst
case scenarios, money laundering may also result in bank failures and financial crises. Money
laundering also reduces tax revenue as it becomes difficult for the government to collect revenue from related
transactions which frequently take place in the underground economy. The socio-economic effects of money
laundering are various because as dirty money generated from criminal activities are laundered into
legitimate funds; they are used to expand existing criminal operations and finance new ones.
Further to that money laundering may lead to the transfer of economic power from the market, the
government and the citizens to criminals, abetting therefore crimes and corruption.
Money Laundering has terrible consequences for Econ growth
Pahuja 09 (Rajana Pahuja is an investment banker, who has interest in Macroeconomic events MBA,
Asian Institute of Management – “Effects of Money Laundering on economy” - http://fenotes.blogspot.com/2009/10/effects-of-money-laundering-on-economy.html - KR)
1. Direct Effects: Money laundering distorts
the investments and depresses the productivity. Diverting
resources to less-productive activity, and by facilitating domestic corruption and crime, which in turn depress
economic growth. For developing countries, the diversion of such scarce resources to less productive domestic
assets or luxury imports is a serious detriment to economic growth. 2. Effect on Corporate competitiveness and
Taxation: Money laundering has a bearing on taxation and small business competition. Laundered
money is usually untaxed, meaning that the rest of the people ultimately have to make up the loss
in tax revenue. Furthermore, legitimate small businesses cannot compete with money launderingfront businesses that can afford to sell a product cheaply because their primary purpose is to clean
money, not turn profit. 3. Effect on Interest and Exchange Rates: Money Laundering has adverse consequences on
the interest rates and the exchange rate volatility particularly in developing nations and dollarized nations. It
complicates the government effort to manage the economic policies. It affects the income distribution,
contaminated the legal transactions, and has potential to destabilize the economy by inefficient
movements, which reduces the GDP growth.4. Effect on Foreign Investment:Although developing economies cannot
afford to be too selective about the sources of capital they attract, but postponing action is dangerous. There is a
damping effect on foreign direct investment when a country’s commercial and financial sectors
are perceived to be subject to the control and influence of organized crime. For business friendly
environment these impedances have to be weeded out.
Impacts of Money Laundering on Cost of Capital
Pahuja 09 (Rajana Pahuja is an investment banker, who has interest in Macroeconomic events MBA,
Asian Institute of Management – “Effects of Money Laundering on economy” - http://fenotes.blogspot.com/2009/10/effects-of-money-laundering-on-economy.html - KR)
When Money Laundering takes place, the capital is reduced due to which the supply curve of
capital moves towards the left. In this case due to the scarcity of the capital (credit crunch even when the central
bank is infusing cash in the financial system) available the cost of capital increases. As can be seen from the
various money-laundering mechanism typologies reports, money laundered through channels other than
financial institutions is often placed in what are known as "sterile" investments, or investments that do not
generate additional productivity for the broader economy.
Impacts of Money Laundering on Financial Sector
Pahuja 09 (Rajana Pahuja is an investment banker, who has interest in Macroeconomic events MBA,
Asian Institute of Management – “Effects of Money Laundering on economy” - http://fenotes.blogspot.com/2009/10/effects-of-money-laundering-on-economy.html - KR)
Since financial institutions are critical to economic growth, reputation and
confidence plays an important
part in the developing countries. 1. Customer Confidence: Reputation and integrity are valuable assets of a
financial institution and the perceived risk to depositors and investors from institutional fraud and corruption
is an obstacle to such trust. When customers are defrauded by the corrupt individuals within the
institutions it causes loss of business for the financial institutions. Prudential risks to bank soundness,
contamination effects on legal financial transactions, and increased volatility of international capital flows and
exchange rates due to unanticipated cross-border asset transfers. 2. Dampening of Entrepreneurial environment:
Strong financial systems are incubators of entrepreneurial growth. For developing nations, technological
change is often associated with the investment and new machinery. To adopt the more productive technologies from
advanced nations requires entrepreneurship. At the most fundamental level, innovation and technology thrive when
property rights are clear and taxes and other drains on profits (such as corruption) are low and predictable. 3.
Investment: The nations in which crime and corruption are prevalent, investors are reluctant to invest and obtain the
ownership. 4. Money Laundering erodes financial institutions themselves due to vulnerability to
corruption by criminal elements seeking to gain further influence over their money-laundering
channels.
Money laundering damages the financial sectors/institutions that are key to
economic growth
Bartlett 2002 (Prior to joining Dewey & LeBoeuf LLP, Mr. Bartlett advised on the economic
aspects of national security issues and served on the U.S. Secretary of State's Policy Planning
Staff, Brent L., THE NEGATIVE EFFECTS OF MONEY LAUNDERING ON ECONOMIC DEVELOPMENT,
May 2002, http://mcta.org.au/wp-content/uploads/2014/06/the-negative-effects-of-moneylaundering-on-economy.pdf, JS)
money laundering on economic development are difficult to quantify, yet it is clear that
such activity damages the financial-sector institutions that are critical to economic growth, reduces
productivity in the economy's real sector by diverting resources and encouraging crime and
corruption, which slow economic growth, and can distort the economy's external sector—international trade and
The negative economic effects of
capital flows—to the detriment of long-term economic development. Developing countries' strategies to establish offshore financial
centers (OFCs) as vehicles for economic development are also impaired by significant money-laundering activity through OFC
channels. Effective anti-money-laundering policies, on the other hand, reinforce a variety of other good-governance policies that
help sustain economic development, particularly through the strengthening of the financial sector. A broad range of recent
economic analyses points to the conclusion that strong developing-country financial
l institutions—such as banks, nonbank
financial institutions (NBFIs), and equity markets—are critical to economic growth. Such institutions allow for
the concentration of capital resources from domestic savings—and perhaps even funds from abroad—
and the efficient allocation of such resources to investment projects that generate sustained
economic development. Money laundering impairs the development of these important financial institutions for two
reasons. First, money laundering erodes financial institutions themselves. Within these institutions, there is often
a correlation between money laundering and fraudulent activities undertaken by employees. At
higher volumes of money-laundering activity, entire financial institutions in developing countries are vulnerable
to corruption by criminal elements seeking to gain further influence over their moneylaundering channels. Second, particularly in developing countries, customer trust is fundamental to the growth of sound
financial institutions, and the perceived risk to depositors and investors from institutional fraud and corruption is an obstacle to such
trust.
Money laundering is serious harm-2 reasons
Levi, 2002(David M. Rubenstein Senior Fellow for Energy and the Environment and Director of
the Maurice R. Greenberg Center for Geoeconomic Studies, Micheal, “Money laundering and its
regulation”, ANNALS, AAPSS, July 2002, http://ann.sagepub.com/content/582/1/181.full.pdf JS)
Laundering can be considered important for three reasons: 1. It facilitates crime by capacitating
crime groups and networks to self-finance, diversify, and grow. 2. It can have a corrosive impact
on financial institutions and other parties. However, there is an element of paradox here. For centuries, onshore and offshore
bankers have been tolerantly laundering proceeds of many crimes and from many countries without obvious harm to them or to their economies.
Criminal (as opposed to moral) corruption of bankers and trust/company formation agents in some jurisdictions has been made necessary as a
consequence of the criminalization of laundering and of regulations intended to stop willful blindness. Given those regulations, laundering
can
be harmful to the financial system of laundering countries and creates serious reputational risk
irrespective of the impacts on domestic crime there. In the Third World (including the former Soviet Union), the issues are
more complex. Their economies vitally need investment capital, and if launderers provided venture capital without eliminating indigenous people from
this function (economically and/or physically), then this might not be harmful. However, in practice, criminal funds can be used to create a license to
operate piratically in a hollow state rather than for productive purposes, and criminally owned banks created to launder funds can also be used to
defraud the public (though to do so will terminate their usefulness as laundering vehicles since normally they will close down as a result). 3. A third
measure of harm is the extent of laundering, though this depends on which crimes are included and on harm to legitimate capital; unfortunately, there
is no consensus on what this is. Figures of $300 billion to $500 billion for international flows are banded around and become &dquo;facts by
repetition,&dquo; but there is very little evidence to justify them (van Duyne 1998; van Duyne and de Miranda 1999). For an FATF exercise that ended
in fundamental disagreement, Walker (1999) heroically attempted to construct money flows into all-crime and drug laundering guesstimation
exercises, while Reuter (2000) made a sophisticated attempt to construct global expenditure on drugs as the sum of national estimates; outside the
United States, national expenditure data are deeply unreliable, and even in the United States, the range is a broad $40 billion to $100 billion. Moreover,
money laundered in year 1 may have to be relaundered in year 2, when it may have to be invested. Finally, criminal business costs (including protection
and salaries to terrorist or crime gang members) and lifestyle expenditures-both high in multilayered drug business-have to be subtracted from the
crime proceeds data before we reach the laundering figures, which are anyway dependent on the savings ratios of offenders. (Part of the business costs
take the form of income for others and flow directly into the GNP.)
Money laundering enables crime and corruption, leading to economic decline
Bartlett 2002 (Prior to joining Dewey & LeBoeuf LLP, Mr. Bartlett advised on the economic
aspects of national security issues and served on the U.S. Secretary of State's Policy Planning
Staff, Brent L., THE NEGATIVE EFFECTS OF MONEY LAUNDERING ON ECONOMIC DEVELOPMENT,
May 2002, http://mcta.org.au/wp-content/uploads/2014/06/the-negative-effects-of-moneylaundering-on-economy.pdf, JS)
Money laundering also facilitates crime and corruption within developing economies, which is
antithetical to sustainable economic growth. Just as an efficient financial sector is a key "input" to other productive
processes in a developing economy— such as manufacturing—an efficient money-laundering channel is a key "input" to
crime because the financial proceeds from crime are less valuable to the criminal (in a sense, an "unfinished
product") than are laundered funds. The less expensive the money-laundering "input" to crime is as a result of lax antimoney-laundering policies, the more "productive" (active) the criminal element will be, just as in any industry or business. As
numerous studies
have demonstrated from statistical and anecdotal evidence, substantial crime and
corruption act as a brake on economic development, while other studies have shown that anti-money-laundering
policies can deter such activity.
ATA’s
AT London center of money laundering
Lammy will stop the money laundering going on in London.
Hanning and Connett 15
(James and David, July 4, http://www.independent.co.uk/news/uk/crime/london-is-now-theglobal-moneylaundering-centre-for-the-drug-trade-says-crime-expert-10366262.html, “London
is now the global money-laundering centre for the drug trade, says crime expert”, twm)
Labour MP David Lammy, who met Mr Saviano last week, said the UK needed to take “very seriously” his
claims about its financial services’ role in the international drugs trade. Mr Lammy, who is seeking to
become Mayor of London in 2016, said: “We are rightly proud of our financial services industry in this country, but we cannot afford
to be complacent. “I
am particularly concerned that London’s inflated property prices are fuelled by
dirty money and I will do everything in my power as mayor to ensure that money laundering and
tax evasion are rooted out by the authorities.”
AFF
US isn’t key – London is the center of money laundering.
Hanning and Connett 15
(James and David, July 4, http://www.independent.co.uk/news/uk/crime/london-is-now-theglobal-moneylaundering-centre-for-the-drug-trade-says-crime-expert-10366262.html, “London
is now the global money-laundering centre for the drug trade, says crime expert”, twm)
The City of London
is the money-laundering centre of the world’s drug trade, according to an
internationally acclaimed crime expert. UK banks and financial services have ignored so-called
“know your customer” rules designed to curb criminals’ abilities to launder the proceeds of
crime, Roberto Saviano warned. Mr Saviano, author of the international bestseller Gomorrah, which exposed the workings of the
Neapolitan crime organisation Camorra, said: “The British treat it as not their problem because there aren’t
corpses on the street.” His warning follows a National Crime Agency (NCA) threat assessment which stated: “We assess that
hundreds of billions of US dollars of criminal money almost certainly continue to be laundered
through UK banks, including their subsidiaries, each year.”
Money laundering is a very small part of domestic surveillance.
Jenifer Fenton 7-17-2015( Activits: US overstates encryption threat, underreports wiretap
figures, Executive Producer Talk to Al Jazeera at Al Jazeera Media Network,
http://america.aljazeera.com/articles/2015/7/17/overstating-encryption-threatunderreporting-wiretap-numbers.html ZV)
But the most “prevalent type of criminal offense investigated using wiretaps” – 89 percent – was
drug offenses. Four percent were related to homicide and the others included smuggling and
money laundering, according to the Wiretap Report. “They are conflating two different sets of
issues and they are doing it intentionally,” said Gidari.
Effective control in the united states will push money laundering to other
countries – means all of their impacts are still triggered.
Financial Action Task Force 15
(an inter-governmental body established in 1989 by the Ministers of its Member jurisdictions, FATF, 2015, http://www.fatfgafi.org/pages/faq/moneylaundering/, ASN)
Launderers are continuously looking for new routes for laundering their funds. Economies
with growing or developing
financial centres, but inadequate controls are particularly vulnerable as established financial
centre countries implement comprehensive anti-money laundering regimes. Differences
between national anti-money laundering systems will be exploited by launderers, who tend to
move their networks to countries and financial systems with weak or ineffective
countermeasures. Some might argue that developing economies cannot afford to be too selective about the sources of capital
they attract. But postponing action is dangerous. The more it is deferred, the more entrenched organised
crime can become. As with the damaged integrity of an individual financial institution, there is a
damping effect on foreign direct investment when a country’s commercial and financial sectors
are perceived to be subject to the control and influence of organized crime. Fighting money laundering
and terrorist financing is therefore a part of creating a business friendly environment which is a precondition for lasting economic
development.
Non unique – US not stopping money laundering now
Hanning and Connett 15
(James and David, July 4, http://www.independent.co.uk/news/uk/crime/london-is-now-theglobal-moneylaundering-centre-for-the-drug-trade-says-crime-expert-10366262.html, “London
is now the global money-laundering centre for the drug trade, says crime expert”, ellipses in
original, twm)
Interviewed by The Independent on Sunday, Mr Saviano said of the international drugs trade that “Mexico is its heart and London is
its head”. He said the cheapness and the ease of laundering dirty money through UK-based banks gave London a key role in drugs
trade. “Antonio Maria Costa
of the UN Office on Drugs and Crime found that drug trafficking
organisations were blatantly recycling dirty money through European and American banks, but no
one takes any notice,” he said. “He found that banks were welcoming dirty money because they need cash,
liquidity during the financial crisis. The figures are too big to be rejected …. Yet there was no reaction.”
London and Austria block EU efforts to fight money laundering.
Hanning and Connett 15
(James and David, July 4, http://www.independent.co.uk/news/uk/crime/london-is-now-theglobal-moneylaundering-centre-for-the-drug-trade-says-crime-expert-10366262.html, “London
is now the global money-laundering centre for the drug trade, says crime expert”, twm)
He accused the
British Government, together with Austria, of consistently blocking anti-moneylaundering moves by the European Union. “They will carry on like that until someone gets killed
here by the Russians or the Italians. ” he said. Mr Saviano said he feared one reason was because
banks are a key source of political funding. “Every time there’s an election campaign, I wonder if someone will come
forward and start a campaign on money laundering ... but it never happens. The reason, I am convinced but I don’t have the proof, is
that a
good part of the money that comes from money laundering goes into the election
campaign. Not illegally, legally, because it can come in because of a lack of regulation.”
Non-unique criminal organizations are too embedded - in some instances they
are running their own banks.
Hanning and Connett 15
(James and David, July 4, http://www.independent.co.uk/news/uk/crime/london-is-now-theglobal-moneylaundering-centre-for-the-drug-trade-says-crime-expert-10366262.html, “London
is now the global money-laundering centre for the drug trade, says crime expert”, twm)
Twenty years ago, drug money was laundered offshore because the top international banks
“were afraid of opening their doors to dirty money, they were afraid of losing control”, he said.
“The more criminal capital comes in, the more criminals there are on the boards. The Mafia set
up its own bank, Michele Sindona’s Banca Privata Finanziaria, and the other banks would have
nothing to do with them,” he said. “Not any more. Now, because of the problem of cash, they
can’t wait to get the Mafia organisations in.”
Impact turn - Less money laundering will actually hurt economies.
Quinn 13
(freelance journalist in Guadalajara where he writes about technology, real estate and security
issues faced by international companies, “ Mexico’s new anti-money laundering law is bad for
business”, Quartz, October 29, 2013, http://qz.com/139570/mexicos-new-anti-moneylaundering-law-is-bad-for-business/, GCM)
Money laundering in Mexico is big business: $10 billion in drug money was washed there in
2012, according to global risk management firm Kroll. Even so, Mexico’s latest attempt to crack
down on the crime puts a hefty burden on the private sector in a country that’s been slow to
target known launderers. The law went into effect in July and focuses on “vulnerable activities,” or industries like gaming,
jewelry, automobile, art and real estate that are often targets for money laundering because they
handle large amounts of cash. The requirements vary per sector, but for most, cash transactions over a
certain amount (pdf) must be reported to the government. In certain cases, identification is required for
purchases regardless of the form of payment. Jewelers will have to maintain files for customers who make purchases valued at more
than 52,000 pesos, or roughly $4,000. This
create challenges for jewelers who deal with international
clients, said Miguel Cotero Ochoa, the president of the state of Jalisco’s Jewelry Chamber. Those clients will likely turn to
other countries that don’t require such bureaucratic entanglements, he said. “We support the
authorities in their effort to combat this problem. However, some of the regulations in the law
leave us out of the global competition,” Cotero Ochoa said in an interview in Spanish. A consultant in Mexico
City estimated the requirements will likely cost businesses in the affected industries 3-8% of
their income (link in Spanish). Businesses are required to train employees and maintain an archive of those transactions that
meet the law’s requirements, said Cotero Ochoa. “The majority of our companies are small firms and the
requirements and regulations the secretary of finance is placing are going to be impossible—or
very complicated—to fulfill,” he said. The jewelry industry plans to work with authorities to modify the
law based on some of their concerns, Cotero Ochoa said. And they’re not the only ones challenging it.
Large retail chains in Mexico, including department stores like El Palacio de Hierro, Liverpool,
Sears, and Sanborns, have already taken legal action (link in Spanish) claiming that the law violates
their constitutional rights of equality and non-discrimination, free economic competition and tax
equity. They, along with members of the real estate and automotive industries, argue that their businesses have
been unfairly targeted while British bank HSBC was fined a mere $27.5 million in Mexico for its
lax money-laundering controls.
Download