FROM THE OFFICE OF PUBLIC AFFAIRS February 16, 2005 Testimony of Chairman Kelly, Ranking Member Gutierrez, and distinguished members of the Subcommittee, thank you for this opportunity to appear before you today and discuss the abuses by terrorists of non-traditional means of financing and the U.S. government's efforts to combat them. This is an important and complex issue, and I applaud the Subcommittee for its continued focus on the changing face of terrorist financing. The Treasury Department particularly appreciates the leadership you have provided, Madam Chair, on this and related issues. Since September 11th, we have concentrated our attention on financially isolating those who support terrorism while building systems and capacities in the international financial system to heighten the risk and cost associated with moving tainted capital. Through an unprecedented global effort to shut down flows of money to Al Qaida and like-minded terrorist groups, it is now harder, costlier and riskier for terrorists to raise funds for their attacks. Terrorist assets and conduits of funding have been frozen, shut down or otherwise neutralized. Key facilitators have been captured or killed; otherwise sympathetic donors have been deterred or isolated, and through training and technical assistance we have increased the capacity of our global partners to combat terrorist financing. In addition to concentrating on the formal mechanisms used by terrorists and criminals to hide sources and eventual uses of money, we have known and addressed the various informal ways that terrorist groups around the world raise and move money. We have applied a consistent approach to dealing with the relevant systemic risks attendant to different sectors of the international financial system - both formal and informal - in order to bring greater transparency and accountability to financial transactions globally. To this end, we have supported and encouraged the worldwide expansion of the regulatory oversight to previously unregulated sectors, garnered more information from the newly regulated communities, and applied enforcement pressure where needed to help ensure compliance. In many respects, these efforts have shone the light of day on previously unseen or untended corners of the financial world. Throughout this period, there has been a growing realization internationally that securing the financial system and all vulnerable sectors - in addition to targeting the sources of terrorist support - is an essential element of our fight against terrorism and financial crimes. We must continue to build upon this strategy and systemic platform to reduce the risks associated with the movement of money in the less formal sectors of the international financial system. Al Qaida and like-minded terrorist groups and their supporters will constantly search for the weak links in the preventative systems that are put in place in the THE EVOLVING THREAT In the world of counter-terrorism, we are constantly facing new challenges and evolving threats. In this realm, we know that terrorist groups of all stripes use a variety of mechanisms to raise and move money. Al Qaida has used charities and deep-pocket donors to raise and move money. Hamas holds fundraising events, where like-minded individuals are invited to contribute funds ultimately meant for terrorist activities. The terrorist cell that launched the devastating attacks on These are just some examples that point to the real challenges that we face. Now more than ever, it is clear that terrorist financing is not a monolithic force - but part and parcel of a nexus comprised of adept financial criminals, corruptible financial institutions, and complex ideological and financial networks. The terrorist financing threat is evolving. Terrorist financiers are constantly adjusting to international efforts to obstruct them and consistently depend on new and innovative ways to bankroll the terrorist infrastructure. As Al Qaida balkanizes, the organizations and those localized cells that are aligned with it are relying on additional and differentiated sources of financing to survive and proliferate. These sources, we have found, include the corruption or abuse of the charitable sector and various forms of financial crime. The means of moving money across borders also varies - to include the use of cash couriers and hawaladars. INFORMAL AND ALTERNATIVE FINANCIAL SYSTEMS VULNERABLE TO USE BY TERRORISTS AND CRIMINALS In the larger campaign against terrorist financing, the U.S. government has focused not simply on the formal financial systems used to raise and move money but on the alternative mechanisms relied upon by terrorist groups around the world to help support their activities. In a sense, as the U.S. government and its partners - in the public and private sectors -- have made it more difficult for terrorist financiers and money launderers to use banks, terrorist groups have begun to rely even more so upon less formal methods to move money. One of the alternatives terrorists have employed to move money is frequently termed as alternative remittance systems (ARS) -- also known as informal value transfer systems (IVTS), parallel banking, or underground banking. In a sense, referring to these alternative systems as "non-traditional" is somewhat misplaced. It is more precise to think of these as systems outside of any regulated financial system at all. In fact, many of the so-called "non-traditional" systems we are talking about today are quite traditional within the cultures and norms of daily business in various corners of the world. There are a variety of non-traditional "systems." Some of them, such as hawala and the Black Market Peso Exchange, are well-known to this Subcommittee. Others, such as trafficking in precious gems and the laundering of diamonds are gaining increased recognition. These diverse systems, however, do have commonalities. Virtually all of them may use trade to transfer value or provide counter valuation in order to "balance the books." In addition, we have found that these networks operate and depend on trust. Unfortunately, this high degree of trust, often based on long-standing ethnic, family, clan or tribal ties, obstructs those trying to understand and investigate these networks and design effective policies and countermeasures to terrorist and criminal abuse. Our approach with these sectors has been to bring them into the light of the regulatory world - through laws and outreach - and to enforce, with the help of the appropriate agencies, including the federal regulatory agencies and the Department of Justice and the Department of Homeland Security, those laws and regulations accordingly to ensure a culture of compliance with recordkeeping, due diligence, and broad anti-money laundering controls. Increased transparency and accountability, concomitantly, enhances our ability to target corrupted actors within these systems. Charities Perhaps the most important non-traditional method used by terrorist organizations to raise and move funds and otherwise support terrorist activity is through the corruption and abuse of charities. Numerous instances have come to light in which mechanisms of charitable giving have been used to provide a cover for the financing of terror. In certain cases the charity itself was a mere sham that existed simply to funnel money to terrorists. However, often the abuse of charity has occurred without the knowledge of donors, or even of members of the management and staff of the charity itself. Besides direct financial support, some charities also provide cover and logistical support for the movement of terrorist operatives, and others facilitate terrorist recruitment by disseminating terrorist agendas or ideologies. Curtailing such corruption and abuse is a critical element of our general national and international strategy to combat terrorist financing, as underscored in the 2002 and 2003 National Money Laundering Strategies, numerous USG counter-terrorism strategies, and various international resolutions and standards. Efforts across the These successful targeted actions are the product of sustained interagency coordination and collaboration. We are also engaging in coordinated efforts to improve our systemic oversight, investigation, outreach and international capabilities. At the federal level, oversight and transparency of the charitable sector is a primary concern of the Tax Exempt and Government Entities Operating Division (TEGE) of the Internal Revenue Service (IRS). TEGE examines and recognizes charities that qualify for tax exempt status, based on information submitted by charities in their application forms and annual returns. The civil examiners in TEGE have a unique familiarity with the charitable sector and the reporting, recordkeeping and disclosure obligations of the sector under the federal income tax laws. This experience is critical to the criminal investigative efforts of the Criminal Investigative Division (CID) of the IRS. The IRS has established a number of mechanisms to ensure that TEGE and CID appropriately communicate and work together on potential cases involving terrorist financing. For example, TEGE has recently revised the application form for tax-exempt status for charities (Form 1023) to include more relevant investigative information for criminal investigators in terrorist financing and criminal cases. TEGE has also established a Finally, TEGE has created a Media Relations Screening Office to identify and examine public reports on abuses within the charitable sector. Experience gained during the past two years has also identified areas where CID can have a greater impact addressing terrorism related financial issues without duplicating the efforts of any other law enforcement agency. CID has created a Lead Development Center (LDC) to pilot a counter-terrorism project focusing on charitable abuse by using advanced analytical technology, along with subject matter experts, to support ongoing investigations and proactively identify potential patterns and perpetrators. The LDC is comprised of a staff of CID Special Agents, investigative analysts, and representatives from TEGE, who research investigative leads and field office inquiries concerning terrorism investigations. The LDC integrates its work within the larger The LDC also serves as a central point to de-conflict related investigations among multiple IRS field offices, and is developing distinctive analytical capabilities to include link analysis, data matching, and pro-active data modeling. Using data from tax-exempt organizations and other tax-related information that is protected by strict disclosure laws, the LDC can analyze information not available to or captured by other law enforcement agencies. By combining that data with public source information and data gathered by other criminal investigations, the LDC can perform a complete analysis of all financial data pertinent to specific targets and restrict its dissemination as required by the tax disclosure laws and the rules of grand jury secrecy. This research, technology, and intuitive modeling, coupled with CI's financial expertise, will help maximize the impact of CI resources against sophisticated terrorist organizations. In addition to these oversight, investigative, international, and information-sharing efforts, the Treasury Department is engaged in sustained outreach with the charitable sector to develop protective measures against potential terrorist and criminal abuse of the sector. In April 2004, the Treasury Department hosted an Initial Outreach Event with representatives from across the charitable sector to discuss Treasury's Anti-Terrorist Financing Guidelines: Voluntary Best Practices for U.S.-Based Charities and related issues of terrorist financing in the charitable sector. Based on this meeting, the Treasury Department is continuing to work with the sector to refine these guidelines and develop better feedback for the sector on terrorist financing issues. The Treasury Department is also working with private sector watchdog groups in the charitable sector to promote awareness of terrorist financing issues and to expand this oversight mechanism to vulnerable donor and charitable communities. Finally, Treasury is also working with other Hawalas Hawala is a "non-traditional" value transfer system, which does not rely on the physical movement of money in order to transfer value across borders between trusted hawaladars (or brokers). Instead, transactions are conducted between trusted networks or brokers in a manner that allows the fluid delivery of cash or valued goods to remote parts of the world, which are often not yet accessed by the banking system. These transactions tend to be recorded by hawaladars with some diligence for business recordkeeping purposes, and settlements of the debts owed are often conducted via trade transfers or bank transactions. Although overwhelmingly used for legitimate purposes such as the remittance of immigrant wages, hawala networks have also been utilized by those who finance terrorism, and their previously unregulated and informal status around the world made this sector particularly vulnerable to abuse. Treasury is confronting the potential misuse of this hawala system at multiple levels. This effort has been taken on in other international fora. In May 2002, the Central Bank of the Black Market Peso Exchange (BMPE) The BMPE - which is a trade-based system of moving value -- is another alternative value transfer system, used primarily in This trade-based innovation has now been relied upon for a generation. Drug money laundering used to be conducted simply through large deposits of cash into US banks that were then wire-transferred to Colombian institutions. But as This is a cycle of dangerous money laundering that The efforts to ferret out the illicit transactions among legitimate trade in the region are now enhanced by greater due diligence on currency exchange houses and suspicious trade transactions - as well as by heightened standards in the region related to money laundering and terrorist financing. Cash Couriers Another terrorist financing threat exists in the movement of bulk cash across borders, and particularly, the use of illicit cash couriers. As our efforts choke off terrorists' ability to abuse the formal financial sector and informal value transfer systems, Al Qaida and other terrorist groups have increasingly resorted to cash couriers to move their funds across borders in advance of terrorist objectives and operations. Treasury and the interagency community, particularly ICE, have worked with our international partners to identify and attack the illicit use of cash couriers and the smuggling of bulk cash. On Precious Commodities Several reports have underscored the vulnerability of the precious commodities sector as a possible means of terrorist financing. The illicit diamond trade provides an instructive illustration of how terrorists could abuse the precious commodities industry to fund their efforts. The diamond industry describes the movement or flow of diamonds from the point of origin to the point of final use as a "pipeline." Unfortunately, the legitimate diamond processing steps of mining, trading, cutting, polishing, and retailing can be abused by corrupt regimes and criminal organizations to place, layer, and integrate illicit diamonds. To combat these risks, we must improve the oversight and transparency of the diamond and precious commodity industries through the development of effective international standards and domestic regulation, and we must identify and disrupt illicit actors within the system through targeted actions. The The Kimberley Process defines guidelines in an effort to document the movement of rough stones through the diamond pipeline and to limit trade to countries participating in the Kimberly Process. The Kimberley Process requires that each shipment of rough diamonds being exported and crossing an international border be transported in a tamper-resistant container and accompanied by a government validated Kimberley Process Certificate, which is uniquely numbered and includes the description of the shipment's contents. The latest Kimberley Process plenary meeting that took place in The Treasury Department is responding to identified gaps in the prevention of financial crimes related to precious commodities, particularly concerns of potential terrorist financing, through sustained industry outreach and the development of effective regulation. In March 2004, William Fox, the Director of Treasury's Financial Crimes Enforcement Network (FinCEN), addressed the 3rd Annual Meeting of the World Diamond Council, in FinCEN published a notice of proposed rulemaking in the Federal Register on In addition to these outreach and oversight measures, Treasury is also working with the interagency community to identify and shut down illicit financiers who have penetrated the diamond and precious commodity industries in support of criminal activities. Under Executive Order 13348, the Department is pursuing economic sanctions against members of the former Charles Taylor regime and a number of its supporters who financed criminal and terrorist activity though engagement in the diamond and timber industries, including a key Arguably the largest private arms dealer in the world today, Bout uses his fleet of Soviet-era cargo aircraft to supply guns and bullets by the ton, as well as advanced equipment such as attack helicopters to anyone willing to pay his price. In All of these efforts - using a variety of tools available to us -- form part of a comprehensive strategy to deal with the vulnerabilities associated with the precious commodities market. Trade-Related Links We are determined to combat terrorist financing, regardless of the tactics our enemies choose to employ. As noted above, our varied efforts directed against the abuse of less formal systems and sectors are targeted in several different areas. Treasury recognizes that, similar to other fronts in the war against terrorist financing, there is no single solution or countermeasure. We must use all tools available to bring these sectors into the mainstream while ferreting out those bad actors and transactions that are abusing the systems that millions around the world rely upon for their well being. We have done this under the expansion of the Bank Secrecy Act - as laid out in the USA PATRIOT Act - and with our international engagement, which has led to better systems, capacity, and expectations of financial transparency and accountability. In all of this, we must recognize that our terrorist enemies and their supporters are not inert but can adapt to the weapons we deploy against them. With this in mind, we are looking to other financial systems and sectors around the world that could be used not only to skirt financial regulations but also to facilitate criminal activity and possibly terrorism. As I indicated earlier, we have helped usher the concept of financial transparency for the movement of currency and other financial products. Yet we have found that the "non-traditional" methods of transferring value we are concerned with are not adequately captured or monitored by "front door" financial reporting requirements and regulations. It may now be time to address creatively the "back door" of these systems - meaning the misuse of trade, which virtually all of the alternative remittance systems share in common. Our experiences demonstrate that an effective way to analyze and investigate suspect trade-based activity is to have systems in place that can monitor specific imports and exports to and from given countries. There is growing worldwide recognition of entrenched patterns of trade fraud. For example, the Kimberley Process was created - in part - due to findings that massive quantities of conflict diamonds from non-diamond producing West African countries were being exported to We will continue to work with our colleagues from throughout the CONCLUSION As the war against terrorism moves beyond the initial phases, we must continue to match the adaptations of terrorist financiers, money launderers, and other financial criminals with our own enhanced powers and steadfast resolve. Every day it becomes more apparent that following dirty money and attacking its illicit sources is an essential part of winning the financial war on terrorism. If we scatter the terrorists, deny them cash, and smother their attempts to funnel their ill-gotten gains through the international financial system, we can make their lives all the more miserable, and their despicable efforts all the more powerless. Madam Chairman, we appreciate the Subcommittee's continued support as we endeavor to further enhance our varied efforts to combat all types of terrorist financing. We look forward to continuing our work with you on these issues, and I am happy to answer your questions.
|
||