StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Terrorist Finance Tracking Program - Essay Example

Cite this document
Summary
The European adaption of this program too effect on August 1st 2010. The utilization of this tool on an international level is aimed to prevent future terrorist attacks and ensure the…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.4% of users find it useful
Terrorist Finance Tracking Program
Read Text Preview

Extract of sample "Terrorist Finance Tracking Program"

Running Head: TERROIST TRACKING September 10th Terrorist Finance Tracking Program The Terrorist Finance Tracking Program is a useful investigative tool for fighting terrorism. The European adaption of this program too effect on August 1st 2010. The utilization of this tool on an international level is aimed to prevent future terrorist attacks and ensure the safety of all citizens living in both the United States of America and Europe. The Terrorist Finance Tracking Program was created in the United States in regards to the September 11th 2001 terrorist attack.

This program utilizes a different methodology to fight terrorism. The United States government can use financial information in order to prosecute individuals that support terrorism through financial means. According to Terrorist Finance Tracking Program: Fact Sheet (2006),  The United States “Treasury department is uniquely positioned to track terrorist money flows and assist in the broader US Government effects to uncover terrorist cells and map terrorist networks here at home and around the world” (PP. 4). In order to ensure the success of this program utilizes SWIFT.

According to Legal Authorities Underlying the Terrorist Finance Tracking Program (n.d. ). “SWIFT-a Belgium-based company with U.S. offices that operates a worldwide messaging system used to transmit bank transaction information- seeking information on suspected international terrorists” (PP. 6).The United States government uses subpoenas in order to view this information. Based upon the terms of the subpoenas the United States government is allowed to view this information only in regards to suspected terrorist investigations.

The information obtained by SWIFT is legally obtained in accordance with The International Emergency Economic Powers Act. The International Emergency Economic Powers Act was established in 1977. The President only during a time of national emergency may put forth this act in order to investigate financial transfers by means of banks and other relevant financial transactions in regards to a foreign individual suspected of being associated or being a terrorist. In regards to the September 11th 2001 terrorist attacks former United States president George W.

Bush issued executive order 13224 declaring an international emergency as future terrorist attacks were suspected. Subpoenas issued are in compliance with the United States Constitution’s fourth amendment as investigations of potential terrorists and relevant documents to terrorism are obtainable through subpoenas issued by Congress. In addition neither The Foreign Intelligence Surveillance Act nor the Right to Financial Privacy Act are in violated through the utilization of subpoenas. According to Legal Authorities Underlying the Terrorist Finance Tracking Program (n.d.).

The SWIFT data is produced pursuant to a subpoena for records. Treasury is not engaged in “electronic surveillance” it is not acquiring any radio or wire communication and there does not exist a legitimate expectation of privacy with respect to financial records (PP 7). Prior to 2010 the servers used by SWIFT were located on grounds in the United States. This gave the United States jurisdiction over SWIFT. However, in 2009 some servers were re-located on European grounds. This moved caused for the enactment of the new Swift deal in which the United States needed European consent for the utilization of this information (EU adopts terrorist finance tracking program, 2010).

The utilization of The Terrorist Finance Tracking Program in conjunction with SWIFT has led to over 1,550 leads on European territory (Terrorist Finance Tracking Program: Question and Answers, n.d.). In addition information acquired through this program “helped European investigators track down suspects in the 2006 al-Qaeda-directed plot to blow up flights between EU (Europe) and the United States” (European Commission, 2010, PP. 12). Based upon these facts The Terrorist Financing Program is a beneficial program in order to ensure the safety of all people.

Although some may perceive this information as a violation of freedoms, no freedoms given under The United States Constitution allow for mass destruction of property and the taking of innocent lives. In conjunction with Europe the United States seek to ensure the safety of all individuals on international levels.ReferencesEU adopts terrorist finance tracking program. (2010). NewStatesman. Retrieved from http://www.newstatesman.com/banking-and-insurance/2010/07/tracking-program-swift-dataEuropean Commission. (2010). Striking balance between privacy and security.

 Retrieved from http://ec.europa.eu/news/justice/100325_en.htmTerrorist Finance Tracking Program: Fact Sheet. (2006). The Department of the Treasury. Retrieved from http://www.ustreas.gov/press/releases/js4340.htm Terrorist Finance Tracking Program: Question and Answers. (n.d.). The United States Department of the Treasury. Retrieved from http://useu.usmission.gov/media/pdfs/summary_qa_halfpg_62410.pdfLegal Authorities Underlying the Terrorist Finance Tracking Program. (n.d.). The Department of the Treasury.

 Retrieved from http://www.ustreas.gov/press/releases/reports/legalauthoritiesoftftp.pdf

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Terrorist Finance Tracking Program Essay Example | Topics and Well Written Essays - 500 words”, n.d.)
Terrorist Finance Tracking Program Essay Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/miscellaneous/1569712-terrorist-finance-tracking-program
(Terrorist Finance Tracking Program Essay Example | Topics and Well Written Essays - 500 Words)
Terrorist Finance Tracking Program Essay Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/miscellaneous/1569712-terrorist-finance-tracking-program.
“Terrorist Finance Tracking Program Essay Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/miscellaneous/1569712-terrorist-finance-tracking-program.
  • Cited: 0 times

CHECK THESE SAMPLES OF Terrorist Finance Tracking Program

Intelligence Success and Failures of Terrorist Attacks of 9-11

Intelligence Success and Failures of terrorist attacks of 9/11 Introduction Controversies about the success and failure of intelligence have become a relevant topic for discussion among the public and media in recent years.... intelligence agencies and officials had recognized the terrorist threats in advance, but were unable to gain intelligence reforms.... Islamic extremists and other terrorist groups had warned a number times that they are planning to kill American people arbitrarily in large number....
13 Pages (3250 words) Research Paper

Terrorism in the USA

The researcher of this descriptive essay mostly focuses on the discussion of the topic of terrorism and analyses the history of terrorism and examples of countries that have experienced different forms of terrorist attacks.... “One man's terrorist is another man's freedom fighter.... When there is an opposition that is violent, it can as well be termed as a terrorist group....
9 Pages (2250 words) Research Paper

Terrorism over the World

terrorist activities should be deprived of media attention and as long as media creates heroes and role models out of terrorists, it is tough to be eradicated.... After probably 1990, no other word ruled the world as did terrorism.... The distant terrorism in the form of guerrilla warfare in places like Palestine or South America, and Sri Lanka was comparatively a very small portion of the wider picture that Muslim terrorism has released in recent years, with disastrous effects....
6 Pages (1500 words) Essay

Crimes Against Information

However, Littleton  still regards hackers as dangerous and further implies imminent danger by questioning the ability of a hacker to become a cyber-terrorist.... otives and Methods of Cyber-TerroristsAn intent of cyber-terrorist includes causing a devastating amount of damage, while remaining elusive.... To illustrate the elusiveness of a cyber-terrorist, Littleton (1995) uses two examples from the late 1980's.... Today's juveniles have joined the cyber-terrorist realm by defacing Web sites....
6 Pages (1500 words) Essay

Main Ways to Defeat Terrorism

Attack the sources of finance for terrorists Lots of terrorism is funded by drugs and by religious charities.... We have to be very vigilant about the sources of money that terrorist use.... Money transferred from the Middle East could well be used to fund terrorists and terrorist acts.... We have to be very vigilant about the sources of money that terrorist use.... Money transferred from the Middle East could well be used to fund terrorists and terrorist acts....
2 Pages (500 words) Essay

Legal Aspects of Exploiting the Weaknesses of Terrorists

Nevertheless, the laws that the United States have on hand are generally sufficient. It does not need an authority to The September 11 bombing, popularly known as the 9/11 bombing in 2001 was only the worst terrorist attack in the United States homeland.... America must search for the terrorist breeding areas and destroy its network in-situ or on-site.... terrorist...
10 Pages (2500 words) Research Paper

Evaluation of Insecurity System

With such a capable program, DHS will have a powerful tool to identify and track terrorist movement within U.... Importance of TIDIS if further underscored by the fact that such a system will drastically improve cooperation between intelligence and law enforcement communities in identifying and tracking terrorists, a deficiency which was identified by 9/11 commission in its findings and attempted to be rectified through Intelligence Reform and Terrorist Prevention Act of 2004....
12 Pages (3000 words) Essay

Counter-Terrorism Propaganda on Social Media

Counter-terrorism is the military or political activities developed to thwart or prevent terrorist activities.... The aim of the terrorist is to pass the propaganda to the target population at the shortest time possible thus preference of the social media (Gates & Podder).... ISIS and Al-Qaeda are some of the terrorist group that extensively uses social media.... As a result, the terrorist group portrays as a captivating and powerful entity thus attracting some of the youths (Lia)....
6 Pages (1500 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us