Secret U.S. Program Tracks Global Bank Transfers

QueEx

Rising Star
Super Moderator
<font size="5"><center>Secret U.S. Program Tracks Global Bank Transfers</font size>
<font size="4">The Treasury Dept. program, begun after the Sept. 11
attacks, attempts to monitor terrorist financing but
raises privacy concerns</font size></center>


Los Angeles Times
By Josh Meyer and Greg Miller
Times Staff Writers
June 23, 2006


WASHINGTON — The U.S. government, without the knowledge of many banks and their customers, has engaged for years in a secret effort to track terrorist financing by accessing a vast database of confidential information on transfers of money between banks worldwide.

The program, run by the Treasury Department, is considered a potent weapon in the war on terrorism because of its ability to clandestinely monitor financial transactions and map terrorist webs.

It is part of an arsenal of aggressive measures the government has adopted since the Sept. 11 terrorist attacks that yield new intelligence, but also circumvent traditional safeguards against abuse and raise concerns about intrusions on privacy.

Under this effort, Treasury routinely acquires information about bank transfers from the world's largest financial communication network, which is run by a consortium of financial institutions called the Society for Worldwide Interbank Financial Telecommunication, or SWIFT.

The SWIFT network carries up to 12.7 million messages a day containing instructions on many of the international transfers of money between banks. The messages typically include the names and account numbers of bank customers — from U.S. citizens to major corporations — who are sending or receiving funds.

Through the program, Treasury has built an enormous — and ever-growing — repository of financial records drawn from what is essentially the central nervous system of international banking.

In a major departure from traditional methods of obtaining financial records, the Treasury Department uses a little-known power — administrative subpoenas — to collect data from the SWIFT network, which has operations in the U.S., including a main computer hub in Manassas, Va. The subpoenas are secret and not reviewed by judges or grand juries, as are most criminal subpoenas.

"It's hard to overstate the value of this information," Treasury Secretary John W. Snow said Thursday in a statement he issued after The Times and other media outlets reported the existence of the Terrorist Finance Tracking Program.

SWIFT acknowledged Thursday in response to questions from The Times that it has provided data under subpoena since shortly after Sept. 11, 2001, a striking leap in cooperation from international bankers, who long resisted such law enforcement intrusions into the confidentiality of their communications.

But SWIFT said in a statement that it has worked with U.S. officials to restrict the use of the data to terrorism investigations.

The program is part of the Bush administration's dramatic expansion of intelligence-gathering capabilities, which includes warrantless eavesdropping on the international phone calls of some U.S. residents. Critics complain that these efforts are not subject to independent governmental reviews designed to prevent abuse, and charge that they collide with privacy and consumer protection laws in the United States.

Steven Aftergood, director of the Project on Government Secrecy at the Federation of American Scientists, said the SWIFT program raises similar issues. "It boils down to a question of oversight, both internal and external. And in the current circumstances, it is hard to have confidence in the efficacy of their oversight," he said. "Their policy is, 'Trust us,' and that may not be good enough anymore."

A former senior Treasury official expressed concern that the SWIFT program allows access to vast quantities of sensitive data that could be abused without safeguards. The official, who said he did not have independent knowledge of the program, questioned what becomes of the data, some of it presumably related to innocent banking customers.

"How do you separate the wheat from the chaff?" the former official said. "And what do you do with the chaff?"

More than a dozen current and former U.S. officials discussed the program on condition of anonymity, citing its sensitive nature.

The effort runs counter to the expectations of privacy and security that are sacrosanct in the worldwide banking community. SWIFT promotes its services largely by touting the network's security, and most of its customers are unaware that the U.S. government has such extensive access to their private financial information.

U.S. officials, some of whom expressed surprise the program had not previously been revealed by critics, acknowledged it would be controversial in the financial community. "It is certainly not going to sit well in the world marketplace," said a former counterterrorism official. "It could very likely undermine the integrity of SWIFT."

Bush administration officials asked The Times not to publish information about the program, contending that disclosure could damage its effectiveness and that sufficient safeguards are in place to protect the public.

Dean Baquet, editor of The Times, said: "We weighed the government's arguments carefully, but in the end we determined that it was in the public interest to publish information about the extraordinary reach of this program. It is part of the continuing national debate over the aggressive measures employed by the government."

Under the program, Treasury issues a new subpoena once a month, and SWIFT turns over huge amounts of electronic financial data, according to Stuart Levey, the department's undersecretary for terrorism and financial intelligence. The administrative subpoenas are issued under authority granted in the 1977 International Emergency Economic Powers Act.

The SWIFT information is added to a massive database that officials have been constructing since shortly after Sept. 11. Levey noted that SWIFT did not have the ability to search its own records. "We can, because we built the capability to do that," he said.

Treasury shares the data with the CIA, the FBI and analysts from other agencies, who can run queries on specific individuals and accounts believed to have terrorist connections, Levey said Thursday in an interview with The Times.

Levey said that "tens of thousands" of searches of the database have been done over the last five years.

The program was initially a closely guarded secret, but it has recently become known to a wider circle of government officials, former officials, banking executives and outside experts.

Current and former U.S. officials said the effort has been only marginally successful against Al Qaeda, which long ago began transferring money through other means, including the highly informal banking system common in Islamic countries.

The value of the program, Levey and others said, has been in tracking lower- and mid-level terrorist operatives and financiers who believe they have not been detected, and militant groups, such as Hezbollah, Hamas and Palestinian Islamic Jihad, that also operate political and social welfare organizations.

It's no secret that the Treasury Department tries to track terrorist financing, or that those efforts ramped up significantly after the Sept. 11 terrorist attacks. But the SWIFT program goes far beyond what has been publicly disclosed about that effort in terms of the amount of financial data that U.S. intelligence agencies can access.

The program also represents a major tactical shift. U.S. investigators long have been able to subpoena records on specific accounts or transactions when they could show cause — a painstaking process designed mainly for gathering evidence. But access to SWIFT enables them to follow suspicious financial trails around the globe, identifying new suspects without having to seek assistance from foreign banks.

SWIFT is a consortium founded in 1973 to replace telex messages. It has almost 7,900 participating institutions in more than 200 countries — including Bank of America, JP Morgan Chase Bank, Citibank and Credit Suisse. The network handled 2.5 billion financial messages in 2005, including many originating in countries such as Saudi Arabia, Pakistan and the United Arab Emirates that the United States scrutinizes closely for terrorist activity.

The system does not execute the actual transfer of funds between banks; that is carried out by the Federal Reserve and its international counterparts. Rather, banks use the network to transmit instructions about such transfers. For that reason, SWIFT's data is extremely valuable to intelligence services seeking to uncover terrorist webs.

CIA operatives trying to track Osama bin Laden's money in the late 1990s figured out clandestine ways to access the SWIFT network. But a former CIA official said Treasury officials blocked the effort because they did not want to anger the banking community.

Historically, "there was always a line of contention" inside the government, said Paul Pillar, former deputy director of the CIA's counterterrorism center. "The Treasury position was placing a high priority on the integrity of the banking system. There was considerable concern from that side about anything that could be seen as compromising the integrity of international banking."

Before Sept. 11, a former senior SWIFT executive said, providing access to its sensitive data would have been anathema to the Belgium-based consortium. But the attacks on the World Trade Center and the Pentagon led to a new mind-set in many industries, including telecommunications.

SWIFT said the Treasury Department's Office of Foreign Assets Control sent the first subpoena shortly after Sept. 11, seeking "limited sets of data" to learn about how Al Qaeda financed the attacks.

Unlike telephone lines and e-mail communications, the SWIFT network cannot be easily tapped. It uses secure log-ins and state-of-the-art encryption technology to prevent intercepted messages from being deciphered. "It is arguably the most secure network on the planet," said the former SWIFT executive who spoke on condition of anonymity. "This thing is locked down like Fort Knox."

SWIFT said it was responding to compulsory subpoenas and negotiated with U.S. officials to narrow them and to establish protections for the privacy of its customers. SWIFT also said it has never given U.S. authorities direct access to its network.

"Our fundamental principle has been to preserve the confidentiality of our users' data while complying with the lawful obligations in countries where we operate," SWIFT said in its statement.

Current and former U.S. officials familiar with the SWIFT program described it as one of the most valuable weapons in the financial war on terrorism, but declined to provide even anecdotal evidence of its successes.

A former high-ranking CIA officer said it has been a success, and another official said it has allowed U.S. counterterrorism officials to follow a tremendous number of leads. CIA officials pursue leads overseas, and the FBI and other agencies pursue leads in the United States, where the CIA is prohibited from operating.

Officials said the program is relied upon especially heavily when intelligence chatter from phone and e-mail intercepts suggested an imminent attack, conveying real-time intelligence for counterterrorism operations.

The former SWIFT executive said much can be learned from network messages, which require an actual name and address of both the sender and recipient, unlike phone calls and e-mails, in which terrorist operatives can easily disguise their identities.

"There is a good deal of detail in there," he said.

As the global war on terrorism has succeeded in taking out some senior terrorists and their financiers, particularly within Al Qaeda, the organization and its many affiliates have sought to move to hidden locations and to transfer their money through proxies such as charities, aid organizations and corporate fronts.

The officials said the SWIFT information can be used in "link analysis." That technique allows analysts to identify any person with whom a suspected terrorist had financial dealings — even those with no connection to terrorism. That information is then mapped and analyzed to detect patterns, shifts in strategy, specific "hotspot" accounts, and locations that have become new havens for terrorist activity.

The SWIFT program is just one of the Bush administration's post-Sept. 11 initiatives to collect intelligence that could include information on U.S. residents.

The National Security Agency, which can intercept communications around the world, is eavesdropping on the telephone calls and e-mails of some U.S. residents without obtaining warrants. And it has been accused of asking telecommunications companies to help create a database of the phone-call records of almost all Americans.

The Justice Department also has asked Internet companies to keep records of the websites customers visit and the people they e-mail for two years, rather than days or weeks, which would greatly expand the government's ability to track online activity.

Numerous lawsuits have been filed against the government and phone companies, challenging the NSA efforts. The government has asked courts to throw them out, invoking the "state secrets" privilege and arguing that trials would compromise national security. The NSA's interception of telephone calls also has been criticized for lacking an independent review process to ensure that the information is not abused.

The SWIFT program raises similar concerns, some critics say.

Privacy advocates have questioned "link analysis" because it can drag in innocent people who have routine financial dealings with terrorist suspects.

And no outside governmental oversight body, such as the Foreign Intelligence Surveillance Court or a grand jury, monitors the subpoenas served on SWIFT.

Levey said the program is subject to "robust" checks and balances designed to prevent misuse of the data. He noted that requests to access the data are reviewed by Treasury's assistant secretary for intelligence; that analysts can only access the data for terrorism-related searches; and that records are kept of each search and are reviewed by an outside auditor for compliance.

Levey said there had been one instance of abuse in which an analyst had conducted a search that did not meet the terrorist-related criteria. The analyst was subsequently denied access to the database, he said.

During the last five years, SWIFT officials have raised concerns about the scope of the program, particularly at the outset, when it was handing over virtually its entire database. The amount of data handed over each month has been winnowed down.

"The safeguards were not all there in September 2001," Levey acknowledged. "We started narrowing it from the beginning."

New safeguards have been added, he said, noting that SWIFT officials are now allowed to be present when analysts search the data and to raise objections with top officials.

Officials from other government agencies have raised the issue of accessing the records for other investigative purposes, but Levey said such proposals have been rejected — largely out of concern that doing so might erode support for the program.

Asked what would prevent the data from being used for other purposes in the future, Levey said doing so would likely trigger objections from SWIFT and the outside auditor.

A SWIFT representative said that Booz Allen Hamilton, an international consulting firm, is the auditor but provided no further details on how the oversight process works.

Although the searches focus on suspected terrorist activity overseas, U.S. officials acknowledged that they do delve into the financial activities of Americans, noting that privacy laws don't protect individuals believed to be acting as a "foreign terrorist agent."

Officials said the administration has briefed congressional intelligence committees on the SWIFT program. In contrast, information on the NSA wiretapping was shared only with key lawmakers. One senior congressional aide said the committees have "a good handle on what the executive branch is doing to track terrorist financing" and are generally supportive of those efforts.

But the operation seems to have been kept secret from key segments of the banking industry, including senior executives in the United States and overseas.

John McKessy, chairman of the SWIFT user group in the United States, said he was unaware of any such program. McKessy represents companies and institutions that are not members of the SWIFT cooperative but use its messaging system.

SWIFT noted that its published policies clearly indicate that it cooperates with law enforcement authorities and that the subpoenas were "discussed carefully within the board," made up of members from 25 major banks. SWIFT said it has also kept informed an oversight committee drawn from the central banks of the major industrial countries.

The SWIFT program plugs a gap in global efforts to track terrorism financing.

In the United States, law enforcement authorities can access bank records if they get permission through the legal process. The FBI also has various legal ways to get almost instantaneous access to financial records. And U.S. banking laws require financial institutions to file Suspicious Activity Reports, but authorities believe Al Qaeda and other terrorist groups know how to evade the activities that trigger such red flags.

U.S. officials, however, long have complained that they cannot get access to financial records overseas and that some requests for cooperation from foreign governments and financial institutions took months, while others were rebuffed.

"The sort of 18th century notions on this stuff drive me nuts," said one senior U.S. counterterrorism official. "Somebody can move money with the click of a mouse, but it takes me six months to find it. If that is the world in which we live, you have to understand the costs involved with that."

The Sept. 11 commission urged the government in its July 2004 report on the U.S. intelligence failures leading up to the terrorist attacks to put more emphasis on tracking the flow of funds, rather than seeking to disrupt them, to learn how terrorist networks are organized.

Lee Hamilton, a former congressman and co-chairman of the commission who said he has been briefed on the SWIFT program, said U.S. intelligence agencies have made significant progress in recent years, but are still falling short. "I still cannot point to specific successes of our efforts here on terrorist financing," he said.


http://www.latimes.com/news/nationw...3jun23,0,6482687.story?coll=la-home-headlines
 
<font size="5"><center>Officials Defend Financial Searches</font size>
<font size="4">Critics Assert Secret Program Invades Privacy</font size></center>

Washington Post
By Karen DeYoung
Washington Post Staff Writer
Saturday, June 24, 2006; Page A01

A secret program that allowed U.S. officials to examine hundreds of thousands of private banking records from around the world in search of terrorist ties has been "absolutely essential" to protecting the country from further attacks, Vice President Cheney said yesterday.

Outgoing Treasury Secretary John W. Snow said that the program, in effect since shortly after the Sept. 11, 2001, attacks, is the thing "I'm proudest of" in his tenure and insisted that strong safeguards protect the privacy of individual Americans. "It's really government at its best," Snow said at a news conference. "It's responsible government. It's effective government."

The comments by Cheney, Snow and other senior Bush administration officials were made the day after news organizations exposed the surveillance effort, in which the Treasury Department has subpoenaed data from an international banking cooperative that serves as a messaging service for overseas monetary transfers.

The revelations -- which Cheney and other officials said undermined an important counterterrorism tool -- prompted renewed criticism from Democrats and civil liberties groups that the administration is operating outside legal and congressional controls.

"It would be very disturbing to me to find out that this program represents yet another unilateral action and further abuse of executive authority without proper safeguards and oversight," said Rep. Barney Frank (Mass.), the senior Democrat on the Financial Services Committee. Others described the program as an invasion of privacy and called for hearings on possible violations of domestic and international law.

But far from giving ground, the administration mounted a muscular defense of the program, dispatching its principal Treasury Department supervisor to explain how it works. The tactic was in sharp contrast to the administration's refusal to provide details about other secret programs that had been revealed earlier by news organizations, including the National Security Agency's warrantless wiretaps of overseas calls made by U.S. citizens and residents.

At the White House, press secretary Tony Snow acknowledged that the program relies on an expansive interpretation of Treasury's powers that is unusual. "Well, so was September 11," he said.

The program falls well within the president's executive authority, Tony Snow asserted, and President Bush did not need to seek congressional authorization, although Snow said legislative oversight committees "know all about it."

There was some disagreement yesterday, however, over who had been briefed on the program and when. The White House referred reporters to Sen. Christopher S. Bond (R-Mo.), who said he had been informed about the secret effort four years ago, when he was named chairman of the Senate Appropriations subcommittee overseeing the Treasury Department. "I think it is a tremendous tool," Bond said.

Although the chairmen and senior Democrats on the two intelligence committees apparently were also briefed when the program began, there have been changes in the intelligence panels' leadership since 2001. The full committees -- and the current chairmen and senior Democrats in some cases -- learned of the program in May, when CIA and Treasury Department officials offered new briefings after learning that the New York Times was preparing an article on it, a Treasury official said.

Some lawmakers on the several committees that oversee the Treasury Department appeared to have been left in the dark. "No one ever called us, no one ever asked us. Nothing," said a spokesman for Rep. Carolyn B. Maloney (N.Y.), the senior Democrat on the House Financial Services subcommittee in charge of international monetary policy and technology.

U.S. counterterrorism officials obtained the financial records from an international banking cooperative called the Society for Worldwide Interbank Financial Telecommunications. SWIFT, as it is known, is owned and controlled by nearly 8,000 commercial banks in more than 20 countries that use its services.

SWIFT is headquartered in Brussels, but much of its operations are based in the United States, where knowledge of the government's secret access to its data was not widespread. Of officials at three large U.S. banks who agreed to speak about the program, only one said his institution had knowledge of it before yesterday.

"People around here are fine with this," said the official at a major New York bank, who spoke on the condition of anonymity. "It was done right." Treasury Undersecretary for Terrorism and Financial Intelligence Stuart Levey said yesterday that the central bank governors of major industrialized nations had also been briefed, although he did not say when that occurred.

In a lengthy news conference and in several television appearances, Levey described exposure of the program as "a great disappointment to me," saying the disclosures "fundamentally undermine and degrade an important source of information."

"The only beneficiaries of that are the terrorists," he said. "If people are sending money to help al-Qaeda, we want to know about it. The American people expect us to know about it."

SWIFT data "enabled us . . . to identify terror suspects that we didn't know, as well as to find addresses and other identifiers for those terrorists that we did know about. It provided key links in our investigations of al-Qaeda and other deadly terrorist groups," he said.

Levey declined to identify any terrorist apprehended as a result of the SWIFT data, but Tony Snow, the White House spokesman, said the information had helped capture Nurjaman Riduan Isamuddin, known as Hambali, an Indonesian described by Bush as "one of the world's most lethal terrorists" after his 2004 arrest in connection with the Bali bombing that killed 202 people the previous year.

"It's provided information on domestic terror cells," Snow said. "It helped identify a Brooklyn man convicted on terrorism-related charges last year."

SWIFT's extensive U.S. operations enabled Treasury to issue what the organization called "compulsory" subpoenas in this country, officials said yesterday. But Levey insisted that stringent safeguards were put in place to protect banking privacy and to ensure that U.S. intelligence had access only to the records of persons whose possible terrorist connections it could prove.

"We started with really narrowly crafted subpoenas all tied to terrorism," Treasury Secretary Snow said. But because SWIFT "didn't have the ability to extract the particular information from their broad database . . . they said, 'We'll give you all the data.' " Once a suspect was identified, U.S. officials had to present SWIFT with evidence of terrorist connections -- in the form of a name on a watch list, or a classified cable -- and were allowed to access information tied only to that name.

SWIFT auditors and Booz Allen Hamilton Inc., an independent firm contracted by the U.S. government, supervised all the searches, Levey said. "The audit reports have been issued periodically since the beginning of the program, and they have found consistently that the government is not abusing this data, that we are using it for counterterrorism purposes.

"There was one instance noted at one point in an audit that there had been one search that was done that was, in our view, inappropriate. . . . The person who conducted that search is no longer allowed to work on this program. And no information from any search that's even been questioned has ever been disseminated," Levey said. When information appeared that indicated a non-terrorist crime, such as money laundering or drug trafficking, he said the source of the information was "sanitized" before it was passed to other law enforcement agencies.

SWIFT manages data from millions of wire transfers and other monetary transactions each day. "We've done a large number of searches" since the program began, Levey said. "I don't know the exact number but it's . . . at least tens of thousands, maybe hundreds of thousands of searches."

Because SWIFT largely deals with financial data transfers across international borders, Levey said that U.S. transactions would be subject to surveillance only if they were to or from other countries.

A lawsuit filed yesterday in U.S. District Court in Chicago accused SWIFT of violating the privacy rights of Americans by disclosing private financial information to the government, Bloomberg News reported. The plaintiff named in the suit, Ian Walker, was described as a D.C. resident, although no further information was made available. The suit seeks statutory, compensatory and punitive damages on behalf of every American who made a domestic or international financial transaction after Sept. 11, 2001.

The program was criticized yesterday by privacy advocates and civil liberties groups. Anthony D. Romero, executive director of the American Civil Liberties Union, called it "contrary to the fundamental American value of privacy. . . . How many other secret spying programs has the Bush administration enacted without Congress, the courts or the public knowing?"

Bond dismissed any suggestion that many Americans are concerned that the administration is compromising their privacy. "They are not Big Brother techniques. They are permitted by law. And the people I serve are glad we are doing everything we can to make another 9/11 less likely," he said.

Staff writers Paul Blustein, Michael A. Fletcher, Dafna Linzer, Terence O'Hara and Jonathan Weisman contributed to this report.



http://www.washingtonpost.com/wp-dyn/content/article/2006/06/23/AR2006062300919.html
 
Why are they leaking all this info? First the phone taps(which were started before Bush took office) and now the money transfers. That is why it is called a secret program. Its like they want the terrorist to win.
 
cthomas0964 said:
Why are they leaking all this info? First the phone taps(which were started before Bush took office) and now the money transfers. That is why it is called a secret program. Its like they want the terrorist to win.
The question is -- how much is the public entitled to know, isn't it ??? If government is left to its own to decide what is and what isn't public information, the government tends to lean towards secrecy. There has to be state secrets, but the difficulty comes when the government leans towards secrecy at the expense of the public's right to know what its government is doing. Does anybody doubt that Al Qaeda knows that the government is tracking them in every way known to man ???

QueEx
 
<font size="5"><center>Piling On the New York Times With a Scoop</font size>
<font size="4">Story on Secret Program Further Rouses Critics</font size></center>

Washington Post
By Howard Kurtz
Washington Post Staff Writer
Wednesday, June 28, 2006; Page C01

President Bush calls the conduct of the New York Times "disgraceful." Vice President Cheney objects to the paper having won a Pulitzer Prize. A Republican congressman wants the Times prosecuted. National Review says its press credentials should be yanked. Radio commentator Tammy Bruce likens the paper to Julius and Ethel Rosenberg.

Even by modern standards of media-bashing, the volume of vitriol being heaped upon the editors on Manhattan's West 43rd Street is remarkable -- especially considering that the Los Angeles Times and Wall Street Journal also published accounts Friday of a secret administration program to monitor the financial transactions of terror suspects. So, in its later editions, did The Washington Post.

Times Executive Editor Bill Keller said in an interview yesterday that critics "are still angry at us" for disclosing the government's domestic eavesdropping program in December, "and I guess in their view, this adds insult to injury. . . . The Bush administration's reaction roused their base, but also roused the anti-Bush base as well," he said, noting an approximately even split in his e-mail.

Still, Keller added, "a lot of people have legitimate and genuine feelings about this, and I don't mean to belittle that."

For Republicans, the Times, with its national prominence and liberal editorial page opposed to the war in Iraq, is proving an increasingly irresistible target. They contend that exposing the classified banking program has badly undermined the administration's efforts to investigate and capture terrorists.

Sen. Pat Roberts of Kansas, chairman of the Intelligence Committee, yesterday asked John Negroponte, the national intelligence director, for a damage assessment following the Times story. Three other GOP senators joined Roberts at a news conference, with John Ensign of Nevada saying the paper "should have worked in cooperation with those authorities in our government to make sure that those who leaked were prosecuted." Arizona Rep. J.D. Hayworth circulated a letter to House Speaker Dennis Hastert calling for the paper's congressional credentials to be withdrawn. And New York Rep. Peter King continues to call for the Times -- which, he told Fox News, has an "arrogant, elitist, left-wing agenda" -- to be prosecuted for violating the 1917 Espionage Act.

Most Democratic lawmakers, meanwhile, lay low. Senate Minority Leader Harry Reid sidestepped a question yesterday about whether the Times should be prosecuted. Similarly, while the conservative blogosphere was on fire over the Times, many liberal Web sites ignored the controversy.

Keller said he spent more than an hour in late May listening to Treasury Secretary John Snow argue against publication of the story. He said that he also got a call from Negroponte, the national intelligence czar, and that three former officials also made the case to Times editors: Tom Kean and Lee Hamilton, chairmen of the 9/11 commission, and Democratic Rep. John Murtha of Pennsylvania -- an outspoken critic of the war in Iraq.

"The main argument they made to me, extensively and at length, besides that the program is valuable and legitimate, was that there are a lot of banks that are very sensitive to public opinion, and if this sees the light of day, they may stop cooperating," Keller said.

He acknowledged, as did the Times article, that there was no clear evidence that the banking program was illegal. But, he said, "there were officials who talked to us who were uncomfortable with the legality of this program, and others who were uncomfortable with the sense that what started as a temporary program had acquired a kind of permanence.

"I always start with the premise that the question is, why should we not publish? Publishing information is our job. What you really need is a reason to withhold information."

Such clashes between the government and the press are hardly new. President Kennedy pressed the Times successfully to withhold most details of the impending Bay of Pigs invasion. President Nixon created a "plumbers" unit to stop leaks. The Reagan administration threatened to prosecute news organizations for publishing national security information.

But rarely if ever has any White House mounted such a sustained public campaign against a single news organization. And a vast array of pundits on the right have responded by escalating their rhetoric.

Heather MacDonald, writing in the Weekly Standard, called the Times "a national security threat" that is "drunk" on its own power.

William Bennett, the former Reagan administration official and conservative radio host, said the "cumulative impact" of both Times stories, and The Post's disclosure of secret CIA prisons overseas, had brought the situation to a "critical mass." Conservatives, he said, now wonder: "Gosh, is there a secret operation we're running that won't be disclosed by the press?"

Bennett favors prosecuting journalists in national security cases, but believes that bringing espionage charges is not the best approach. He favors a leak investigation.

"If you go to these reporters and ask who their sources were, then they're in a Judy Miller situation," Bennett said, referring to the former Times reporter who spent 85 days behind bars for refusing to testify in the Valerie Plame leak investigation. "If they don't tell you, they go to jail. Some of us have been saying for a long time that the press is not above the law. Sooner or later you have to prove that."

Stephen Spruiell, who writes about the media for National Review Online, said there was a good reason for the comparatively muted reaction to the telephone eavesdropping story. "The divisive nature of that program tempered some of the criticism," he said. "Because the [banking] program is so defensible, you're seeing a much more vocal response."

Lucy Dalglish, executive director of the Reporters' Committee for Freedom of the Press, questioned how groundbreaking the Times banking report was. "Wouldn't you think any reasonably smart terrorist is going to know that his financial transactions are being tracked?" she asked.

For many people, Dalglish said, publishing secret information about a program that appears to be legal is "a risk they're not willing to take." But the "ugly" nature of the debate, she said, is exasperating: "I don't know how much more hate mail and vicious phone calls I can take."

Doyle McManus, Washington bureau chief of the Los Angeles Times, said his paper had the story nailed down last Wednesday but did not reach a final decision on running it "because, among other things, we hadn't sat down yet with people at Treasury to give them a full chance to tell us why we should or shouldn't do it." At the same time, he said, "we were leaning toward publishing."

At about 7 p.m. Thursday, McManus was meeting with Treasury Undersecretary Stuart Levey when another department staffer handed Levey a BlackBerry and he announced: "Well, the New York Times has posted its story" on its Web site.

While a Treasury official did tell him that it would be nice if the Los Angeles paper decided not to run the story as a "symbolic gesture," the discussion was rendered moot, McManus said. Levey then went on the record to defend the program, as he did with other newspapers, including The Post, which began playing catch-up that evening.

Dean Baquet, editor of the Los Angeles paper, noted in a letter published yesterday that "many readers have been sharply critical of our decision." He said he weighed the administration's arguments "against the fact that there is an intense and ongoing public debate about whether surveillance programs like these pose a serious threat to civil liberties."

The Wall Street Journal had been working on the banking story for a long period of time but did not reach the point of having enough information to publish until Thursday afternoon, according to a staffer who declined to be identified because the newspaper is making no public comment. The Journal does not know why Treasury officials made no appeal against publication in that paper, but editors assume that by then the officials were resigned to the fact that the details were coming out, the staffer said.

Despite the stories that appeared in competing papers, the New York Times is still bearing the brunt of the criticism at the White House, on Capitol Hill and throughout the media world.

Terence Smith, a former Timesman who until recently was PBS's media correspondent, said the paper is a "lightning rod when its critics are playing politics, and that's what's happening here. An institution like the Times is a God-given target, because it's seen by the conservative base as a liberal newspaper critical of the Bush administration."

http://www.washingtonpost.com/wp-dy...6062701708.html?referrer=email&referrer=email
 
Top 200: The Rise of Global Corporate Power
By Sarah Anderson and John Cavanagh
Corporate Watch
2000​

Introduction

There are now 40,000 corporations in the world whose activities cross national boundaries; these firms ply overseas markets through some 250,000 foreign affiliates.1 Yet, new calculations by the Institute for Policy Studies (IPS) indicate that the top 200 of these global firms account for an alarming and growing share of the world's economic activity.

Two hundred giant corporations, most of them larger than many national economies, now control well over a quarter of the world's economic activity. Philip Morris is larger than New Zealand, and it operates in 170 countries.2 Instead of creating an integrated global village, these firms are weaving webs of production, consumption, and finance that bring economic benefits to, at most, a third of the world's people. Two-thirds of the world (the bottom 20 percent of the rich countries and the bottom 80 percent of the poor countries) are either left out, marginalized, or hurt by these webs of activity.

IPS has conducted detailed analyses of the changing nature of global corporate power for over a decade. This new report uncovers an alarming acceleration in corporate concentration in individual sectors and in the overall power of the largest corporations in the world, and new data on the job-destroying activities of large firms.

The most alarming finding is that as corporate concentration has risen, corporate profits have soared, yet workers and communities are getting a shrinking piece of the growing pie. Figures from Business Week chronicle the explosion of corporate profits and CEO pay between 1990 and 1995 in the face of stagnating workers wages. The newest State of Working America by the Economic Policy Institute also reinforces our findings: median family income fell over 1 percent a year between 1989 and 1994 after four decades of expansion.3

Top 10 Findings

1. Of the 100 largest economies in the world, 51 are corporations; only 49 are countries. Wal-Mart-the number 12 corporation-is bigger than 161 countries, including Israel, Poland, and Greece.4 Mitsubishi is larger than the f ourth most populous nation on earth: Indonesia. General Motors is bigger than Denmark. Ford is bigger than South Africa. Toyota is bigger than Norway.


2. The combined sales of the world's Top 200 corporations are far greater than a quarter of the world's economic activity. Our calculations indicate that the Top 200's share of global economic activity has been growing rapidly over the past d ecade. In 1982, the Top 200 firms had sales that were the equivalent of 24.2 percent of the world's GDP. Today, that figure has grown to 28.3 percent of world GDP.


3. The Top 200 corporations' combined sales are bigger than the combined economies of all countries minus the biggest 9; that is they surpass the combined economies of 182 countries. At latest count, the world has 191 countries. If you subtr act the GDP of the big nine economies: the United States, Japan, Germany, France, Italy, the United Kingdom, Brazil, Canada, and China, the combined GDP's of the other 182 countries is $6.9 trillion. The combined sales of the Top 200 corporations is $7. 1 trillion.


4. The Top 200 have almost twice the economic clout of the poorest four-fifths of humanity. The world's economic income and wealth remain highly concentrated among the rich. Indeed, according to the United Nations, some 85 percent of the worl d's GDP is controlled by the richest fifth of humanity; only 15 percent is controlled by the poorest four-fifths.5 Hence, the poorer 4.5 billion people in the world account for only $3.9 trillion dollars of economic activity; this is only a little over half the combined revenues of the Top 200's $7.1 trillion.


5. The Top 200 have been net job destroyers in recent years. Their combined global employment is only 18.8 million, which is less than a third of one percent of the world's people. The world has just over 5.6 billion people.6 Of these, around 2.6 billion are in the workforce.7 Hence, the Top 200 employ less than three-fourths of one percent of the world's workers. Of the world's top five employers, four are U.S. (General Motors, Wal-Mart, PepsiCo, and Ford ), and one is German (Siemens). If one also includes the public sector in these calculations, the U.S. Postal Service is the world's biggest employer, at 870,160, roughly 160,000 more workers than GM's 709,000 workers.8


6. Not only are the world's largest corporations cutting workers, their CEOs often benefit financially from the job cuts. A total of 59 of the Global Top 200 are U.S. firms. Of these, 9 laid off at least 3,000 workers in 1995: AT&T, Boeing, Lockheed-Martin, BellSouth, Kmart, Chase Manhattan, GTE, Mobil, and Texaco. Even worse, the CEOs of these 9 made millions of dollars in the increased value of their stock options after announcing the layoffs. Indeed, on the day that the CEOs of these 9 firms announced the layoffs, the value of the stock options of their 9 CEOs rose $25,218,819.9


7. Japanese corporations have surpassed U.S. corporations in the ranking of the Top 200. Six of the top 10 firms are Japanese; only 3 are from the United States. Of the Top 200, the 58 Japanese firms account for almost 39 percent of total sales, while the U.S.'s 59 firms account for only 28 percent of total sales. The vast majority (186) of the Top 200 are headquartered in just 7 countries: Japan, the United States, Germany, France, the United Kingdom, the Netherlands, and Switzerland. South Korea and Brazil are the only developing countries to break into the Top 200.

8. Over half of the sales of the Top 200 are in just 5 economic sectors; and corporate concentration in these sectors is high. Half of the total sales of the Top 200 are in trading, automobiles, banking, retailing, and electronics. The concentrated economic power in these and other sectors is enormous.10 In autos, the top five firms account for almost 60 percent of global sales. In electronics, the top five firms have garnered over half of global sales. And, the top five firms have over 30 percent of global sales in airlines, aerospace, steel, oil, personal computers, chemical, and the media.11


9. When General Motors trades with itself, is that free trade?: One-third of world trade is simply transactions among various units of the same corporation.12 This figure has remained steady for the past few years, and is higher in certain countries.13 Two-fifths of Japanese exports, for example, are intra-firm.14 For manufacturing exports from Brazil, the figure is 44 percent.15

10. The Top 200 are creating a global economic apartheid, not a global village. The top eight telecommunications firms, for example, have been expanding global sales rapidly, yet over nine-tenths of humanity remains without phones. Television ads for AT&T and GTE give the impression that the telecommunications giants are bringing the world closer together. And yet while the top eight firms in this sector enjoyed sales of $290 million in 1995, 90.1 percent of all people live in a household that is not connected to a telephone line.16 Likewise in the financial sector, when banks boast of the new ease of global banking, they fail to mention the difficulties most of the world's people face in obtaining even a tiny loan. Close to 4.8 billion of the world's 5.6 billion people still live in countries where the average per capita gross national product is less than $1,000 a year; only a handful of these people have access to credit from transnational banks.17 This is despite the fact that the 31 banks in the Top 200 have combined assets of $10.4 trillion and sales of more than $800 billion.18

Conclusions

These findings offer a clear picture of the rising inequalities in the United States and the world between those who benefit from expanding corporate activity and those who are being left behind. This inequality, fueled by accelerated corporate concentration, deserves to be a central issue in the political debates of this period. This report stands as a challenge to both major political parties to address growing inequalities and the economic forces behind them.


SOURCE: http://www.globalpolicy.org/socecon/tncs/top200.htm

Listen here to Michael Parenti on Terrorism, Globilization & Conspiracy & a few other subjects...http://www.workingtv.com/parenti.html
 
May Commencement 2006 > Arthur Sulzberger's Address

May Commencement 2006 > Arthur Sulzberger's Address
May 21, 2006

Good morning and my most heartfelt congratulations.

As the father of two relatively recent college graduates, I know how important this moment is to all of you. Whether mother or father, you are now breathing a huge sigh of relief. Your child has the possibility of a future and, while the bills remain to be paid, at least they’ve stopped growing.

But as much as I’d like today to be about us parents, I know it’s not. It’s about the rest of you – our children and our future. So, to all of you – well done.

This is my first ever commencement speech and, depending on your reviews, maybe my last.

Worse, the truth is I even skipped my own graduation. It was a glorious day. My cousin and fellow graduate and I heard the road calling.
Motorcycles; speeches – no brainer. Thank goodness it’s gray and overcast today, so most of you are here.

So, given my lack of commencement experience I prepared for today the way good journalists are supposed to – I reported out the story. I read what generations of other commencement speakers had said and what themes they hit.

Ninety five percent of them come down to this: “Today you enter the real world. Follow your heart. Find what you love and do it.”

Who can argue with such wisdom? It’s sort of a motherhood and apple pie statement. It sounds so easy.

So let’s all tip our hat to the honesty of our favorite non-news caster, Jon Stewart of the Daily Show. Two years ago he told a graduating class at William and Mary:

“So how do you know what is the right path to choose to get the results you desire? The honest answer is this. You don’t. And accepting that greatly eases the anxiety of your life experience.”

As a journalist; as a media executive; as a human being -- I come to you fully aware of the need we all have to heed Mr. Stewart's words and ease our anxieties. The vagaries of life are enormous, and it is those very vagaries about which I want to talk with you.

I’ll start with an apology.

When I graduated from college in 1974, my fellow students and I had just ended the war in Vietnam and ousted President Nixon. Okay, that’s not quite true. Yes, the war did end and yes, Nixon did resign in disgrace – but maybe there were larger forces at play.

Either way, we entered the real world committed to making it a better, safer, cleaner, more equal place. We were determined not to repeat the mistakes of our predecessors. We had seen the horrors and futility of war and smelled the stench of corruption in government.

Our children, we vowed, would never know that.

So, well, sorry. It wasn’t supposed to be this way.

You weren’t supposed to be graduating into an America fighting a misbegotten war in a foreign land.

You weren’t supposed to be graduating into a world where we are still fighting for fundamental human rights, be it the rights of immigrants to start a new life; the rights of gays to marry; or the rights of women to choose.

You weren’t supposed to be graduating into a world where oil still drives policy and environmentalists have to relentlessly fight for every gain.

You weren’t. But you are. And for that I’m sorry.

Starting today, it will be more and more up to you to decide what world you will bequeath to your children (yes, most of you will be having children – it just goes with the territory).

As you continue to make the choices that define your life – and by the way, attending and graduating from college was a critical one – you also will be defining the world you live in. Think of it as your personal version of what in the scientific world (or perhaps the science fiction world) is known as the butterfly effect. The butterfly effect holds that the smallest of actions -- say, the flapping of the wings of a butterfly in the mountains of Bolivia -- can lead over time to enormous consequences -- say, a hurricane in Africa.

Each of you will face many crossroads, some of them seemingly small and inconsequential. You will choose at each point whether to be bold or hesitant; inclusive or elitist; generous or stingy. And each one of your choices will result not only in how people define you. Each one will help shape the world you make for the rest of us.

So I have a plea and I have a piece of advice. The advice is to focus on the small decisions, because they add up very quickly. And I don’t mean what job you take or what town you live in. Those will change as you change. I mean decisions like whether to pick up that overturned trash can or whether to stop for that stranded motorist. Those are the decisions that can change our world just as surely as a butterfly can create a hurricane.

Yes, it’s important that those of us at The New York Times have the courage of our own convictions and defend the rights of our journalists to protect their sources or, after much debate and discussion, publish the news that our government is bypassing it’s own legal systems to tap into phone calls made to and from the United States.

But those big decisions rest on a stable foundation which has been built by thousands of small decisions – from the way we protect our reporters and photographers in war-torn areas such as Iraq (and even then lose too many) to how we’ve shattered the glass ceiling that for too long stopped women from moving into the highest levels of leadership.

And my plea is: engage. Our world needs you. It needs your energy and your caring; it needs your commitment and your values. If we don’t get them our society – all of us – will continue to aimlessly drift, failing to make our country and our world a place that makes us proud.

Engage. Help make decisions. Vote. Read a newspaper (what, you thought the publisher of The New York Times wouldn’t get there?) Knowing what’s happening in your world, your country, your neighborhood is the critical precursor to being a citizen of a democracy. Each one of you who forsakes your role in keeping our democracy alive by either inaction or, perhaps worse, by action based on ignorance, threatens all the rest of us. So, read a newspaper and build a community.

As you already heard, I’m here in large part because I’m a rock climber. I work in New York City but I come to New Paltz to clear my head and batter my body against those beautiful cliffs up there. And this ties in to another bit of reporting I did in preparation for today. I found what may well be one of the shortest commencement speeches every given.

It was 1941. Following what was no doubt an excessive introduction, - sort of like mine - our speaker walked to the lectern, glared out at the assembled multitude and in his trademark bark intoned: “Never give in, never give in, never, never, never, never -- in nothing, great or small, large or petty -- never give in except to convictions of honor and good sense.”

And then Winston Churchill sat down.

With a philosophy like that, Sir Winston would have made one hell of a rock climber. Life is relentless. When you think you’ve made the crucial move – what in climbing parlance is called The Crux – it always throws you another one. And another. And another.

These are the vagaries of which I spoke earlier in these remarks. In my experience, the only way to prepare for them is inside each of you. It is not about the job you have or the money you make. It is about commitment and courage; it’s about caring and fortitude. It’s about supporting those around you and, just as importantly, it's about letting them support you. In the parlance of the climber, trust that you’re “on belay”.

Engage; get the small decisions right; never give in and please -- please – build us a world of which we can be proud. Go make a damn difference.

None of you wants to be standing where I am 30 years from now apologizing to the next generation of bright and shiny college graduates.

Thank you,

Arthur Sulzberger Jr.

http://www.newpaltz.edu/commencement/sulzberger.html
 
Back
Top