Oversight Hearing: Law Enforcement and Terrorism : Hearing Before the Committee on the Judiciary, United States Senate, One Hundred Eighth Congress, First Session, July 23, 2003, Volume 4

Couverture
U.S. Government Printing Office, 2007 - 220 pages

À l'intérieur du livre

Autres éditions - Tout afficher

Expressions et termes fréquents

Fréquemment cités

Page 98 - Report of the Joint Inquiry into the Terrorist Attacks of September 11, 2001 — by the House Permanent Select Committee on Intelligence and the Senate Select Committee on Intelligence, July 24, 2003, available at http://news.findlaw.com/ usatoday/docs/91 Irpt (accessed April 1, 2004). 3. "US Steps into Asian Minefield," Australian Financial Review, October 12, 2001, p.
Page 218 - SARS, and money transmitting businesses, which include any person who engages as a business in the transmission of money, to register with FinCEN and file SARS. There are other provisions of the Act that have considerably aided our efforts to address the terrorist threat including: strengthening the existing ban on providing material support to terrorists and terrorist organizations; the authority to seize terrorist assets; and the power to seize money subject to forfeiture in a foreign bank account...
Page 165 - ... community outreach efforts. The General Accounting Office reviewed the Interview Project and concluded: How and to what extent the interview project - including investigative leads and increased presence of law enforcement in communities - helped the government combat terrorism is hard to measure ... More than half of the law enforcement officers that [the GAO] interviewed raised concerns about the quality of the questions or the value of the responses. According to the GAO, "Attorneys and advocates...
Page 89 - ... ceased to exist as a program name as of June 30, 2003. Accordingly, the FBI was designated to lead terrorist financing investigations and operations. It was agreed that DHS would focus its activities on protecting the integrity of US financial infrastructures. To that extent, the DHS implemented the ICE led Operation Cornerstone. Operation Cornerstone will identify vulnerabilities in financial systems through which criminals launder their illicit proceeds, bring the criminals to justice and work...
Page 30 - Department to assume primary responsibility for privacy policy, including: (1) assuring that the use of technologies sustain, and do not erode, privacy protections relating to the use, collection, and disclosure of personal information; (2) assuring that personal information contained in Privacy Act systems of records is handled in full compliance with fair information practices as set out in the Privacy Act of 1974...
Page 158 - The timeliness and accessibility of the data is contingent on a variety of factors including whether the acquisition of the information requires legal process, the search capabilities of the data provider, and the size and depth of the data request. The ability to access and obtain this type of information in a time sensitive and urgent manner has significantly enhanced the FBI's ability to identify, investigate and resolve immediate threat situations involving potential terrorist activity.
Page 63 - VISIT program will focus upon non-immigrants with visas from all the countries of the world, and thus does not discriminate on the basis of race, religion, or national origin.
Page 158 - TFOS has engaged in extensive coordination with authorities of numerous foreign governments in terrorist financing matters, leading to joint investigative efforts throughout the world. These joint investigations have successfully targeted the financing of several overseas Al Qaeda cells, including those located in Indonesia, Malaysia, Singapore, Spain, and Italy.
Page 167 - Since lives and liberties depend upon clarity, not obfuscation, and reason, not hyperbole, let me take this opportunity today to be clear: Each action taken by the Department of Justice, as well as the war crimes commissions considered by the President and the Department of Defense, is carefully drawn to target a narrow class of individuals — terrorists.
Page 159 - ... to exist and operate. Whether the funding and financial support is minimal or substantial, it leaves a financial trail that can be traced, tracked, and exploited for pro-active and reactive purposes. Being able to identify and track financial transactions and links after a terrorist act has occurred or terrorist activity has been identified represents only a small portion of the mission; the key lies in exploiting financial information in efforts to identify previously unknown terrorist cells,...

Informations bibliographiques