The USA PATRIOT Act and Punctuated Equilibrium

Total Page:16

File Type:pdf, Size:1020Kb

The USA PATRIOT Act and Punctuated Equilibrium Walden University ScholarWorks Walden Dissertations and Doctoral Studies Walden Dissertations and Doctoral Studies Collection 2016 The SU A PATRIOT Act and Punctuated Equilibrium Michael Sanders Walden University Follow this and additional works at: https://scholarworks.waldenu.edu/dissertations Part of the Law Commons, Other History Commons, and the Public Policy Commons This Dissertation is brought to you for free and open access by the Walden Dissertations and Doctoral Studies Collection at ScholarWorks. It has been accepted for inclusion in Walden Dissertations and Doctoral Studies by an authorized administrator of ScholarWorks. For more information, please contact [email protected]. Walden University College of Social and Behavioral Sciences This is to certify that the doctoral dissertation by Michael Sanders has been found to be complete and satisfactory in all respects, and that any and all revisions required by the review committee have been made. Review Committee Dr. Mark Stallo, Committee Chairperson, Public Policy and Administration Faculty Dr. Ross Alexander, Committee Member, Public Policy and Administration Faculty Dr. Tanya Settles, University Reviewer, Public Policy and Administration Faculty Chief Academic Officer Eric Riedel, Ph.D. Walden University 2016 Abstract The USA PATRIOT Act and Punctuated Equilibrium by Michael L. Sanders MS, Thomas A. Edison State College, 2012 BA, Thomas A. Edison State College, 2007 Dissertation Submitted in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy Public Policy and Administration Walden University August 2016 Abstract Currently, Title II of the Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism (USA PATRIOT Act) Act of 2001 appears to be stalled as a result of controversy over the intent and meaning of the law. Proponents of the title advocate the necessity of the act to combat modern terrorism, whereas opponents warn of circumventions of the Fourth Amendment of the U.S. Constitution. Using punctuated equilibrium as the theoretical foundation, the purpose of this case study was to explore the dialogue and legal exchanges between the American Civil Liberties Union and the Department of Justice related to the National Security Agency’s metadata collection program. In specific, the study sought to explore the nature of resistance to changes needed to mollify the controversies associated with Title II. Data for this study were acquired through publicly available documents and artifacts including transcripts of Congressional hearings, legal documents, and briefing statements from the US Department of Justice and the American Civil Liberties Union. These data were deductively coded according to the elements of PET and then subjected to thematic analysis. Findings indicate that supporters and opponents of the law are locked in a consistent ideological polarization, with supporters of the law touting the necessity of the authorizations in combatting terrorism and opponents arguing the law violates civil liberties. Neither side of the debate displayed a willingness to compromise or acknowledge the legitimacy of the other viewpoint. Legislators who accept the legitimacy of both researched viewpoints could create positive social change by refining the law to meet national security needs while preserving constitutional protections. The USA PATRIOT Act and Punctuated Equilibrium by Michael L. Sanders MS, Thomas A. Edison State College, 2012 BA, Thomas A. Edison State College, 2007 Dissertation Submitted in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy Public Policy Administration - Terrorism Mediation & Peace Walden University August 2016 Table of Contents List of Tables ................................................................................................................... viii Chapter 1: Introduction to the Study ....................................................................................1 Introduction ....................................................................................................................1 Background ....................................................................................................................1 Problem Statement .........................................................................................................4 Purpose of the Study ......................................................................................................5 Research Questions ........................................................................................................5 Central Research Question – Qualitative: ............................................................... 5 Subquestion 1 - Qualitative:.................................................................................... 5 Subquestion 2 - Qualitative:.................................................................................... 5 Subquestion 3 - Qualitative:.................................................................................... 5 Subquestion 4 - Qualitative:.................................................................................... 5 Subquestion 5 - Qualitative:.................................................................................... 6 Framework .....................................................................................................................6 Nature of the Study ........................................................................................................9 Assumptions .................................................................................................................10 USA PATRIOT Act Assumptions ........................................................................ 10 Methodology Assumptions ................................................................................... 10 Scope and Delimitations ..............................................................................................11 Limitations ...................................................................................................................13 Significance..................................................................................................................14 i Summary ......................................................................................................................15 Chapter 2: Literature Review .............................................................................................17 Introduction ..................................................................................................................17 Literature Search Strategy............................................................................................18 Punctuated Equilibrium ...............................................................................................19 Security Policy History ................................................................................................20 Early America ....................................................................................................... 21 Habeas Corpus ...................................................................................................... 27 Alien Immigration Act of 1903............................................................................. 30 Sedition Act of 1918 ............................................................................................. 31 Japanese Internment .............................................................................................. 34 Cold War ............................................................................................................... 37 Surveillance Scandals ..................................................................................................41 Teapot Dome ......................................................................................................... 42 Hoover’s Surveillances ......................................................................................... 45 Watergate .............................................................................................................. 50 Court Decisions ............................................................................................................51 Olmstead v. United States ..................................................................................... 52 Katz v. United States ............................................................................................. 52 (Keith) United States v. United States District Court for Eastern District of Michigan ................................................................................................... 54 Church Committee .......................................................................................................55 ii Foreign Intelligence Surveillance Act .........................................................................59 Foreign Intelligence Surveillance Court ............................................................... 60 Approval Rate ....................................................................................................... 61 FISA Application v. Fourth Amendment.............................................................. 63 Discovery .............................................................................................................. 65 USA PATRIOT Act – Title II ......................................................................................66
Recommended publications
  • NSA Fact Sheet on Section 215 of the PATRIOT
    Section 215 Section 215 of the USA PATRIOT Act of 2001, which amended Title V, Section 501 of the Foreign Intelligence Surveillance Act (FISA), “Access to Certain Business Records for Foreign Intelligence and International Terrorism Investigations” (50 U.S.C. sec. 1861) x This program concerns the collection only of telephone metadata. Under this program, the government does not acquire the content of any communication, the identity of any party to the communication, or any cell-site locational information. x This metadata is stored in repositories within secure networks, must be uniquely marked, and can only be accessed by a limited number of authorized personnel who have received appropriate and adequate training. x This metadata may be queried only when there is a reasonable suspicion, based on specific and articulated facts, that the identifier that will be used as the basis for the query is associated with specific foreign terrorist organizations. x The basis for these queries must be documented in writing in advance. x Fewer than two dozen NSA officials may approve such queries. x The documented basis for these queries is regularly audited by the Department of Justice. x Only seven senior officials may authorize the dissemination of any U.S. person information outside of NSA (e.g. to the FBI) after determining that the information is related to and is necessary to understand counterterrorism information, or assess its importance. x Every 30 days, the government must file with the Foreign Intelligence Surveillance Court a report describing the implementation of the program, to include a discussion of the application of the Reasonable Articulable Suspicion (RAS) standard, the number of approved queries and the number of instances that query results that contain U.S.
    [Show full text]
  • Mutual Watching and Resistance to Mass Surveillance After Snowden
    Media and Communication (ISSN: 2183-2439) 2015, Volume 3, Issue 3, Pages 12-25 Doi: 10.17645/mac.v3i3.277 Article “Veillant Panoptic Assemblage”: Mutual Watching and Resistance to Mass Surveillance after Snowden Vian Bakir School of Creative Studies and Media, Bangor University, Bangor, LL57 2DG, UK; E-Mail: [email protected] Submitted: 9 April 2015 | In Revised Form: 16 July 2015 | Accepted: 4 August 2015 | Published: 20 October 2015 Abstract The Snowden leaks indicate the extent, nature, and means of contemporary mass digital surveillance of citizens by their intelligence agencies and the role of public oversight mechanisms in holding intelligence agencies to account. As such, they form a rich case study on the interactions of “veillance” (mutual watching) involving citizens, journalists, intelli- gence agencies and corporations. While Surveillance Studies, Intelligence Studies and Journalism Studies have little to say on surveillance of citizens’ data by intelligence agencies (and complicit surveillant corporations), they offer insights into the role of citizens and the press in holding power, and specifically the political-intelligence elite, to account. Atten- tion to such public oversight mechanisms facilitates critical interrogation of issues of surveillant power, resistance and intelligence accountability. It directs attention to the veillant panoptic assemblage (an arrangement of profoundly une- qual mutual watching, where citizens’ watching of self and others is, through corporate channels of data flow, fed back into state surveillance of citizens). Finally, it enables evaluation of post-Snowden steps taken towards achieving an equiveillant panoptic assemblage (where, alongside state and corporate surveillance of citizens, the intelligence-power elite, to ensure its accountability, faces robust scrutiny and action from wider civil society).
    [Show full text]
  • Frank Church, And/ Or United States Senate Select Committee to Study Governmental Operations with Respect to Intelligence Activities, And/Or U.S
    This document is made available through the declassification efforts and research of John Greenewald, Jr., creator of: The Black Vault The Black Vault is the largest online Freedom of Information Act (FOIA) document clearinghouse in the world. The research efforts here are responsible for the declassification of hundreds of thousands of pages released by the U.S. Government & Military. Discover the Truth at: http://www.theblackvault.com NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE FORT GEORGE G. MEADE, MARYLAND 20755-6000 FOIA Case: 84652B 11 July 2017 JOHN GREENEWALD Dear Mr. Greenewald: This is our final response to your Freedom of Information Act (FOIA) request of 7 June 2016 for Intellipedia pages on the Church Committee, and/ or Frank Church, and/ or United States Senate Select Committee to Study Governmental Operations with Respect to Intelligence Activities, and/or U.S. Senate Select Committee on Intelligence. A copy of your request is enclosed. In our initial response to you, dated 8 June 2016, we informed you that this request was assigned case number 84652 and that there are no assessable fees for this request. We provided you with two responsive documents on 12 August 2016 and informed you that we continued to work on your case. The final responsive documents are enclosed. This Agency is authorized by statute to protect certain information concerning its activities (in this case, internal URLs) as well as the names of its employees. Such information is exempt from disclosure pursuant to the third exemption of the FOIA, which provides for the withholding of information specifically protected from disclosure by statute.
    [Show full text]
  • Executive Order 12,333: Unleashing the CIA Violates the Leash Law Sherri J
    Cornell Law Review Volume 70 Article 6 Issue 5 June 1985 Executive Order 12,333: Unleashing the CIA Violates the Leash Law Sherri J. Conrad Follow this and additional works at: http://scholarship.law.cornell.edu/clr Part of the Law Commons Recommended Citation Sherri J. Conrad, Executive Order 12,333: Unleashing the CIA Violates the Leash Law, 70 Cornell L. Rev. 968 (1985) Available at: http://scholarship.law.cornell.edu/clr/vol70/iss5/6 This Note is brought to you for free and open access by the Journals at Scholarship@Cornell Law: A Digital Repository. It has been accepted for inclusion in Cornell Law Review by an authorized administrator of Scholarship@Cornell Law: A Digital Repository. For more information, please contact [email protected]. EXECUTIVE ORDER 12,333: "UNLEASHING" THE CIA VIOLATES THE LEASH LAW "Security is like liberty in that many are the crimes committed in its name." On December 4, 1981, President Ronald Reagan promulgated Executive Order 12,333, establishing United States intelligence guidelines. 2 Restrictions on the Central Intelligence Agency (CIA) were instituted in the 1970s in response to disclosures of wide- spread wrongdoing.3 The Order reflects the President's determina- tion to "unleash" 4 America's intelligence community5 from those limitations. The Order allows the CIA, America's chief foreign in- telligence gathering entity, to direct domestic counterintelligence, foreign intelligence, covert operations, and law enforcement activity against United States citizens. 6 The drafters of the Order ignored the statutory limits on intelligence gathering activity codified in the National Security Act. 7 The President's action thus constitutes a statutorily impermissible license for renewed government intrusion, and the Order should be revoked.
    [Show full text]
  • The Hidden Costs of Terrorist Watch Lists
    University of Chicago Law School Chicago Unbound Journal Articles Faculty Scholarship 2013 The Hidden Costs of Terrorist Watch Lists Anya Bernstein Follow this and additional works at: https://chicagounbound.uchicago.edu/journal_articles Part of the Law Commons Recommended Citation Anya Bernstein, "The Hidden Costs of Terrorist Watch Lists," 61 Buffalo Law Review 461 (2013). This Article is brought to you for free and open access by the Faculty Scholarship at Chicago Unbound. It has been accepted for inclusion in Journal Articles by an authorized administrator of Chicago Unbound. For more information, please contact [email protected]. BUFFALO LAW REVIEW VOLUME 61 MAY 2013 NUMBER 3 The Hidden Costs of Terrorist Watch Lists ANYA BERNSTEIN† INTRODUCTION The No Fly List, which is used to block suspected terrorists from flying, has been in use for years. But the government still appears “stymied” by the “relatively straightforward question” of what people who “believe they have been wrongly included on” that list should do.1 In recent months, courts have haltingly started to provide their own answer, giving some individuals standing to sue to remove their names or receive additional process.2 This step is particularly important as the No Fly List continues † Bigelow Fellow and Lecturer in Law, The University of Chicago Law School. J.D., Yale Law School; Ph.D., Anthropology, The University of Chicago. Thanks to Daniel Abebe, Ian Ayres, Alexander Boni-Saenz, Anthony Casey, Anjali Dalal, Nicholas Day, Bernard Harcourt, Aziz Huq, Jerry Mashaw, Jonathan Masur, Nicholas Parrillo, Victoria Schwartz, Lior Strahilevitz, Laura Weinrib, Michael Wishnie, and James Wooten for helpful commentary.
    [Show full text]
  • The Role of the Media, Law, and National Resolve in the War on Terror
    Denver Journal of International Law & Policy Volume 33 Number 1 Winter - 2004 Sutton Colloquium Article 10 April 2020 The Role of the Media, Law, and National Resolve in the War on Terror Robert Hardaway Follow this and additional works at: https://digitalcommons.du.edu/djilp Recommended Citation Robert Hardaway, The Role of the Media, Law, and National Resolve in the War on Terror, 33 Denv. J. Int'l L. & Pol'y 104 (2004). This Article is brought to you for free and open access by Digital Commons @ DU. It has been accepted for inclusion in Denver Journal of International Law & Policy by an authorized editor of Digital Commons @ DU. For more information, please contact [email protected],[email protected]. THE ROLE OF THE MEDIA, LAW, AND NATIONAL RESOLVE IN THE WAR ON TERROR ROBERT HARDAWAY* I. INTRODUCTION In the aftermath of the terrorist attacks of September 11, 2001, the govern- ment of the United States took unprecedented steps to protect American lives and property.' Measures imposed included tightened security at nuclear power plants,2 airports,3 and numerous other government and private installations around the United States.4 Debate over an appropriate U.S. response centered on whether there was proof of a foreign state's complicity in the attacks. On September 15, 2001, a New York Times/CBS News poll revealed that eighty-five percent of Americans would Professor of Law, University of Denver Sturm College of Law. 1. See, e.g., Michael R. Gordon, After the Attacks: An Assessment, U.S. Force vs, Terrorists: From Reactive to Active, N.Y.
    [Show full text]
  • The USA PATRIOT Act: Preserving Life and Liberty (Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism)
    The Department of Justice's first priority is to prevent future terrorist attacks. Since its passage following the September 11, 2001 attacks, the Patriot Act has played a key part - and often the leading role - in a number of successful operations to protect innocent Americans from the deadly plans of terrorists dedicated to destroying America and our way of life. While the results have been important, in passing the Patriot Act, Congress provided for only modest, incremental changes in the law. Congress simply took existing legal principles and retrofitted them to preserve the lives and liberty of the American people from the challenges posed by a global terrorist network. The USA PATRIOT Act: Preserving Life and Liberty (Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism) Congress enacted the Patriot Act by overwhelming, bipartisan margins, arming law enforcement with new tools to detect and prevent terrorism: The USA Patriot Act was passed nearly unanimously by the Senate 98-1, and 357-66 in the House, with the support of members from across the political spectrum. The Act Improves Our Counter-Terrorism Efforts in Several Significant Ways: 1. The Patriot Act allows investigators to use the tools that were already available to investigate organized crime and drug trafficking. Many of the tools the Act provides to law enforcement to fight terrorism have been used for decades to fight organized crime and drug dealers, and have been reviewed and approved by the courts. As Sen. Joe Biden (D-DE) explained during the floor debate about the Act, "the FBI could get a wiretap to investigate the mafia, but they could not get one to investigate terrorists.
    [Show full text]
  • Tom Eagleton and the "Curse to Our Constitution"
    TOM EAGLETON AND THE “CURSE TO OUR CONSTITUTION” By William H. Freivogel Director, School of Journalism, Southern Illinois University Carbondale Associate Professor, Paul Simon Public Policy Institute This paper is scheduled for publication in St. Louis University Law Journal, Volume 52, honoring Sen. Eagleton. Introduction: If my friend Tom Eagleton had lived a few more months, I’m sure he would have been amazed – and amused in a Tom Eagleton sort of way - by the astonishing story of Alberto Gonzales’ late night visit to John Aschroft’s hospital bed in 2004 to persuade the then attorney general to reauthorize a questionable intelligence operation related to the president’s warrantless wiretapping program. No vignette better encapsulates President George W. Bush’s perversion of the rule of law. Not since the Saturday Night Massacre during Watergate has there been a moment when a president’s insistence on having his way resulted in such chaos at the upper reaches of the Justice Department. James Comey, the deputy attorney general and a loyal Republican, told Congress in May, 2007 how he raced to George Washington hospital with sirens blaring to beat Gonzeles to Ashcroft’s room.1 Comey had telephoned FBI Director Robert S. Mueller to ask that he too come to the hospital to back up the Justice Department’s view that the president’s still secret program should not be reauthorized as it then operated.2 Ashcroft, Comey and Mueller held firm in the face of intense pressure from White House counsel Gonzales and Chief of Staff Andrew Card. Before the episode was over, the three were on the verge of tendering their resignations if the White House ignored their objections; the resignations were averted by some last-minute changes in the program – changes still not public.3 Before Eagleton’s death, he and I had talked often about Bush and Ashcroft’s overzealous leadership in the war on terrorism.
    [Show full text]
  • Congressional Oversight of Intelligence: Background and Selected Options for Further Reform
    Congressional Oversight of Intelligence: Background and Selected Options for Further Reform December 4, 2018 Congressional Research Service https://crsreports.congress.gov R45421 SUMMARY R45421 Congressional Oversight of Intelligence: December 4, 2018 Background and Selected Options for Further Michael E. DeVine Reform Analyst in Intelligence and National Security Prior to the establishment of the Senate Select Committee on Intelligence (SSCI) and the House Permanent Select Committee on Intelligence (HPSCI) in 1976 and 1977, respectively, Congress did not take much interest in conducting oversight of the Intelligence Community (IC). The Subcommittees on the Central Intelligence Agency (CIA) of the congressional Armed Services Committees had nominal oversight responsibility, though Congress generally trusted that IC could more or less regulate itself, conduct activities that complied with the law, were ethical, and shared a common understanding of national security priorities. Media reports in the 1970s of the CIA’s domestic surveillance of Americans opposed to the war in Vietnam, in addition to the agency’s activities relating to national elections in Chile, prompted Congress to change its approach. In 1975, Congress established two select committees to investigate intelligence activities, chaired by Senator Frank Church in the Senate (the “Church Committee”), and Representative Otis Pike in the House (the “Pike Committee”). Following their creation, the Church and Pike committees’ hearings revealed the possible extent of the abuse of authority by the IC and the potential need for permanent committee oversight focused solely on the IC and intelligence activities. SSCI and HPSCI oversight contributed substantially to Congress’s work to legislate improvements to intelligence organization, programs, and processes and it enabled a more structured, routine relationship with intelligence agencies.
    [Show full text]
  • Supreme Court of the United States ______
    No. 13-58 In the Supreme Court of the United States ______ IN RE ELECTRONIC PRIVACY INFORMATION CENTER, Petitioner _______ On Petition for a Writ of Mandamus and Prohibition, Or a Writ of Certiorari to the Foreign Intelligence Surveillance Court _______ AMICUS CURIAE BRIEF OF FORMER MEMBERS OF THE CHURCH COMMITTEE AND LAW PROFESSORS IN SUPPORT OF PETITIONERS _______ LAURA K. DONOHUE ERWIN CHEMERINSKY Professor of Law (Counsel of Record) Georgetown University Dean, Distinguished Law Center Professor of Law 600 New Jersey Ave., NW University of California, Washington, DC 20001 Irvine School of Law (202) 662-9455 401 E. Peltason Dr. lkdonohue@ Suite 1000 law.georgetown.edu Irvine, CA 92697 (949) 824-7722 [email protected] August 12, 2013 i QUESTION PRESENTED Did the Foreign Intelligence Surveillance Court exceed its authority to authorize foreign intelligence surveillance under 50 U.S.C. §1861, when it directed Verizon Business Network Services to provide, on an ongoing basis, all call detail records of communications wholly within the United States to the National Security Agency? ii TABLE OF CONTENTS IDENTITY AND INTEREST OF AMICUS CURIAE ....................................................................... 1 SUMMARY OF ARGUMENT ..................................... 2 ARGUMENT ............................................................... 3 I. Congress introduced the Foreign Intelligence Surveillance Act to prevent intelligence agencies from engaging in broad domestic surveillance ..... 3 A. The NSA has a history of conducting broad domestic surveillance programs under the guise of foreign intelligence ............................. 5 1. The NSA understood foreign intelligence to involve the interception of communications wholly or partly outside the United States and not targeted at U.S. persons ................. 6 2. Project MINARET introduced to collect foreign intelligence information, ended up intercepting hundreds of U.S.
    [Show full text]
  • Keeping the US Hand Well Hidden: the Role of the Church Committee in Rethinking US Covert Intervention in the 1970S
    Keeping the US Hand Well Hidden: The Role of the Church Committee in Rethinking US Covert Intervention in the 1970s Julia Kropa A thesis submitted in partial fulfillment of the requirements for the degree of BACHELOR OF ARTS WITH HONORS DEPARTMENT OF HISTORY UNIVERSITY OF MICHIGAN April 2, 2018 Advised by Professor Victoria Langland TABLE OF CONTENTS Acknowledgments…………………………………………………………………………..ii Timeline……………………………………………………………………………………iii Introduction…………………………………………………………………………………1 Chapter 1: US Covert Involvement and the Death of General Schneider…………………14 The Election of 1970 and Escalation of US Involvement…………………………16 Creating an Atmosphere of Overthrow……………………………………………26 The Aftermath of General Schneider’s Death……………………………………..37 Chapter 2: The Formation of the Church Committee……………………………………..42 The Origins of the Church Committee…………………………………………….45 White House Opposition to the Church Committee……………………………….59 The Committee’s Purpose for Investigating Assassination Plots………………….66 Chapter 3: The Church Committee Investigates Assassination Plots……………………..70 The Church Committee’s Investigation…………………………………………...73 The Investigation Reaches the White House………………………………………81 The Committee’s Interim Report and its Findings………………………………...91 Conclusion…………………………………………………………………………………96 Appendix 1……………………………………………………………………………….102 Appendix 2……………………………………………………………………………….107 Bibliography……………………………………………………………………………...109 i Acknowledgments First and foremost, thank you to my advisor, Professor Victoria Langland, for her guidance and encouragement at every stage of this project from my initial thoughts to the end product. I would like to thank the LSA Honors Program and the History Department for generously providing funding for my research and writing. I am also thankful to my writing group, Maggie and Noah, for reading my many drafts and offering feedback at every step in the process. Many thanks to Emily for listening to me for a year and a half talking and brainstorming out loud, and for forcing me to always keep on working.
    [Show full text]
  • USA Patriot Act"
    Understanding Title III of the "USA Patriot Act" "United and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001” Candice Greenberg Federal Reserve Bank of New York USA Patriot Act zHR 3162: yThe "Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001" or "USA Patriot Act" or "Act" xEnacted October 26, 2001. z Most comprehensive AML legislation since 1970 Bank Secrecy Act. yMoney Laundering Control Act of 1986, Annunzio-Wylie Anti-Money Laundering of 1992. Title III: The "International Money Laundering Abatement and Anti- Terrorism Financing Act of 2001" z Broadly: Strengthening tools to prevent, detect, and prosecute international money laundering and the financing of terrorism. z Focus: Correspondent banking facilities, private banking services, and transactions involving offshore jurisdictions. z Goal: to prevent the U.S. financial system and U.S. clearing mechanisms to be used by parties suspected of terrorism, terrorist financing and money laundering. yUnique problems associated with detecting “terrorist financing”. Remember KYC? It's back. z Flashback - 1999 yTitle III - clear congressional mandate for subjecting certain high-risk jurisdictions, institutions, and classes of accounts and transactions to increased scrutiny and supervision. yLaw calls it "due diligence" and "enhanced due diligence". z Useful Definitions (with respect to banks only) yAccount yCorrespondent Account yPayable Through Account ySecretary
    [Show full text]