Choose the experimental features you want to try

This document is an excerpt from the EUR-Lex website

Document 52013DC0843

COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT AND THE COUNCIL on the Joint Report from the Commission and the U.S. Treasury Department regarding the value of TFTP Provided Data pursuant to Article 6 (6) of the Agreement between the European Union and the United States of America on the processing and transfer of Financial Messaging Data from the European Union to the United States for the purposes of the Terrorist Finance Tracking Program

/* COM/2013/0843 final */

52013DC0843

COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT AND THE COUNCIL on the Joint Report from the Commission and the U.S. Treasury Department regarding the value of TFTP Provided Data pursuant to Article 6 (6) of the Agreement between the European Union and the United States of America on the processing and transfer of Financial Messaging Data from the European Union to the United States for the purposes of the Terrorist Finance Tracking Program /* COM/2013/0843 final */


COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT AND THE COUNCIL

on the Joint Report from the Commission and the U.S. Treasury Department regarding the value of TFTP Provided Data pursuant to Article 6 (6) of the Agreement between the European Union and the United States of America on the processing and transfer of Financial Messaging Data from the European Union to the United States for the purposes of the Terrorist Finance Tracking Program

1. Legal basis

In accordance with Article 6 (6) of the Agreement Between the European Union and the United States of America on the Processing and Transfer of Financial Messaging Data From the European Union to the United States for the Purposes of the Terrorist Finance Tracking Program (the Agreement), the European Commission and the U.S. Treasury Department have prepared the joint report regarding the value of Terrorist Finance Tracking Program (TFTP) Provided Data ('Joint Report'), “with particular emphasis on the value of data retained for multiple years and relevant information obtained from the joint review conducted pursuant to Article 13.”

2. Procedural aspects

The modalities of this Report have been determined jointly by the European Commission and the U.S. Treasury Department, in line with Article 6 (6) of the Agreement.

The European Commission and the U.S. Treasury Department began discussions on the modalities, mandate, and methodology for the report in December 2012. On 25 February 2013 the EU and the U.S. assessment teams met in Washington, D.C. in order to discuss the preparation of the Report and convened a second meeting at the Europol premises in The Hague on 14 May 2013.  During the meeting in The Hague, the EU and the U.S. teams also met with Europol representatives to discuss the initial input from all parties and the next steps.

On the EU side, the European Commission held a classified meeting with representatives of the Member States on 13 May 2013. Member States and Europol have provided written contributions, which have been considered and reflected upon in the preparation of this Report.  To this end, Europol issued a questionnaire to all concerned Member States in order to collect relevant information for its input for this Report.  The questionnaire aimed at obtaining a current overview of the added value of TFTP Provided Data, in relation to specific cases investigated by competent authorities in relevant Member States.

Between 1 February and 24 May 2013, the U.S. assessement team interviewed counter terrorism investigators at a variety of agencies, reviewed counter terrorism cases in which the TFTP was used, and analysed over 1,000 TFTP reports to assess the value of TFTP-derived information. 

3. Scope

The information for the Report has been provided by the U.S. Treasury Department, Europol, and the Member States.  The Report focuses on how the TFTP Provided Data have been used and the value the data bring to counter terrorism investigations in the United States and the EU. The Report includes multiple concrete examples where TFTP data, including data retained for three years or more, have been valuable in counter terrorism investigations, in the United States and the EU, before and since the Agreement entered into force on 1 August 2010.  In addition to this Report, other examples of the usefulness and value of the TFTP data have been presented in the context of the two joint reviews, carried out in February 2011 and October 2012, pursuant to Article 13 of the Agreement.  As a whole, these factual and concrete sets of information constitute a considerable step forward in further explaining the functioning and the added value of the TFTP. 

The Report also describes the methodology for the assessment of retention periods by the U.S. Treasury Department and deletion of non-extracted data.

The Report demonstrates that TFTP Provided Data, including data retained for multiple years, have been delivering very important value for the counter terrorism efforts in the United States, Europe, and elsewhere.

With the present Communication, the Commission transmits the Joint Report in Annex to the European Parliament and the Council.

ANNEX

Joint Report from the Commission and the U.S. Treasury Department regarding the value of TFTP Provided Data pursuant to Article 6 (6) of the Agreement between the European Union and the United States of America on the processing and transfer of Financial Messaging Data from the European Union to the United States for the purposes of the Terrorist Finance Tracking Program

to the

Communication from the Commission to the European Parliament and the Council

on the Joint Report from the Commission and the U.S. Treasury Department regarding the value of TFTP Provided Data pursuant to Article 6 (6) of the Agreement between the European Union and the United States of America on the processing and transfer of Financial Messaging Data from the European Union to the United States for the purposes of the Terrorist Finance Tracking Program

Executive Summary

In accordance with Article 6 (6) of the Agreement Between the European Union and the United States of America on the Processing and Transfer of Financial Messaging Data From the European Union to the United States for the Purposes of the Terrorist Finance Tracking Program (the Agreement), the European Commission and the U.S. Treasury Department have prepared this joint report regarding the value of Terrorist Finance Tracking Program (TFTP) Provided Data, “with particular emphasis on the value of data retained for multiple years and relevant information obtained from the joint review conducted pursuant to Article 13.”

The information for the Report has been provided by the U.S. Treasury Department, Europol, and the Member States.  The Report focuses on how the TFTP Provided Data have been used and the value the data bring to counter terrorism investigations in the United States and the EU. The Report includes multiple concrete examples where TFTP data, including data retained for three years or more, have been valuable in counter terrorism investigations, in the United States and the EU, before and since the Agreement entered into force on 1 August 2010.  In addition to this Report, other examples of the usefulness and value of the TFTP data have been presented in the context of the two joint reviews, carried out in February 2011 and October 2012, pursuant to Article 13 of the Agreement.  As a whole, these factual and concrete sets of information constitute a considerable step forward in further explaining the functioning and the added value of the TFTP. 

The Report also describes the methodology for the assessment of retention periods by the U.S. Treasury Department and deletion of non-extracted data.

The Report demonstrates that TFTP Provided Data, including data retained for multiple years, have been delivering very important value for the counter terrorism efforts in the United States, Europe, and elsewhere.

2. Background

The TFTP was set up by the U.S. Treasury Department shortly after the terrorist attacks of 11 September 2001 when it begun issuing legally binding production orders to a provider of financial payment messaging services for financial payment messaging data stored in the United States that would be used exclusively in the fight against terrorism and its financing.  Until the end of 2009, the provider stored all relevant financial messages on two identical servers, located in Europe and the United States.  On 1 January 2010, the provider implemented its new messaging architecture, consisting of two processing zones – one zone in the United States and the other in the European Union.  In order to ensure the continuity of the TFTP under these new conditions, a new Agreement between the European Union and the United States on this issue was considered necessary.  After an initial version of the Agreement did not receive the consent of the European Parliament, a revised version was negotiated and agreed upon in the summer of 2010.  The European Parliament gave its consent to the Agreement on 8 July 2010, the Council approved it on 13 July 2010, and it entered into force on 1 August 2010.

The Agreement gives an important role to Europol, which is responsible for receiving a copy of data requests, along with any supplemental documentation, and verifying that these U.S. requests for data comply with certain conditions specified in Article 4 of the Agreement, including that they must be as narrowly tailored as possible in order to minimise the volume of data requested.  Once Europol confirms the request complies with the stated conditions, the data provider is authorised and required to provide the data to the U.S. Treasury Department.  Europol does not have direct access to the data submitted by the data provider to the U.S. Treasury Department and does not perform searches on the TFTP data.

The Agreement stipulates that TFTP searches must be narrowly tailored and based upon pre-existing information or evidence that demonstrates a reason to believe that the subject of a search has a nexus to terrorism or its financing. In line with Article 12 of the Agreement TFTP searches are monitored by independent overseers with the ability to question and block overly broad or any other searches that do not satisfy the strict safeguards and controls of Article 5 of the Agreement.

Article 13 of the Agreement provides for regular joint reviews of the safeguards, controls, and reciprocity provisions to be conducted by review teams from the European Union and the United States, including the European Commission, the U.S. Treasury Department, and representatives of two data protection authorities from EU Member States, and may also include security and data protection experts and persons with judicial experience.  Two joint reviews have already been carried out, with a third joint review envisaged for 2014.  Each of the joint reviews examined cases in which TFTP-derived information has been used for the prevention, investigation, detection, or prosecution of terrorism or its financing. 

During the first joint review conducted in February 2011, the U.S. Treasury Department provided numerous examples (classified) of high profile terrorism cases where TFTP-derived information had been used.  The first joint review report recognises the value of the TFTP and states that the “number of leads provided since the start of the program and since the entry into force of the Agreement indicates a continued benefit for preventing and combating terrorism and its financing across the world, with a particular focus on the U.S. and the EU.”[1]

During the second joint review of the Agreement, conducted in October 2012, the U.S. Treasury Department provided an annex containing 15 concrete examples of specific investigations in which TFTP data proved critical to counter terrorism investigations.[2]  The second joint review report concludes that “Europol and Member States have become increasingly aware of the value of TFTP data for their task to fight and prevent terrorism and its financing in the EU”[3] and, through the use of reciprocity arrangements, are “increasingly profiting from it.”[4]

Article 6 (6) of the Agreement requires that the European Commission and the U.S. Treasury Department prepare a joint report regarding the value of TFTP Provided Data within three years of the Agreement’s entry into force, with particular emphasis on the value of data retained for multiple years and relevant information obtained from the joint review conducted pursuant to Article 13. 

3. Procedural aspects

The modalities of this Report have been determined jointly by the European Commission and the U.S. Treasury Department, in line with Article 6 (6) of the Agreement.

The European Commission and the U.S. Treasury Department began discussions on the modalities, mandate, and methodology for the report in December 2012.  On 25 February 2013 the EU and the U.S. assessment teams met in Washington, D.C. in order to discuss the preparation of the Report and convened a second meeting at the Europol premises in The Hague on 14 May 2013.  During the meeting in The Hague, the EU and the U.S. teams also met with Europol representatives to discuss the initial input from all parties and the next steps.

On the EU side, the European Commission held a classified meeting with representatives of the Member States on 13 May 2013.  Member States and Europol have provided written contributions, which have been considered and reflected upon in the preparation of this Report.  To this end, Europol issued a questionnaire to all concerned Member States in order to collect relevant information for its input for this Report.  The questionnaire aimed at obtaining a current overview of the added value of TFTP Provided Data, in relation to specific cases investigated by competent authorities in relevant Member States.

Between 1 February and 24 May 2013, the U.S. assessement team interviewed counter terrorism investigators at a variety of agencies, reviewed counter terrorism cases in which the TFTP was used, and analysed over 1,000 TFTP reports to assess the value of TFTP-derived information. 

The examples discussed in this report are drawn from highly sensitive investigations that may be currently active.  As such, some of the information has been sanitised to protect these investigations.

4. Value of TFTP Provided Data

Since the inception of the TFTP in 2001, it has produced tens of thousands of leads and over 3,000 reports (which contain multiple TFTP leads) to counter terrorism authorities worldwide, including over 2,100 reports to European authorities.[5]

The TFTP has been used to investigate many of the most significant terrorist attacks and plots of the past decade, including:

During the period after the conclusion of the Agreement:

· the April 2013 Boston Marathon bombings;

threats with respect to the 2012 London Summer Olympic Games; the 2011 plot to assassinate the Saudi Arabian Ambassador to the United States; the July 2011 attacks in Norway conducted by Anders Breivik; and the October 2010 Nigerian Independence Day car bombings.

Prior to the conclusion of the Agreement:

the July 2010 attack against fans watching a World Cup match in Kampala, Uganda; the July 2009 Jakarta hotel attacks; multiple hijacking and hostage operations conducted by al-Shabaab – including the April 2009 hijacking of the Belgian vessel MV Pompei; the November 2008 Mumbai attacks; the September 2007 Islamic Jihad Union plot to attack locations in Germany; the 2007 plot to attack New York’s John F. Kennedy airport; the 2006 liquid bomb plot against transatlantic aircraft; the July 2005 bombings in London; the November 2005 Van Gogh terrorist-related murder; the March 2004 Madrid train bombings; and the October 2002 Bali bombings.

The EU and U.S. assessment teams heard from Europol and the U.S. Treasury Department, as well as other authorities, on the value of the TFTP.  Counter terrorism investigators noted that the TFTP contains unique, highly accurate information that is of significant value in tracking terrorist support networks and identifying new methods of terrorist financing.  In cases where little is known about a terrorism suspect beyond the individual’s name or bank account number, TFTP-derived information can reveal critical pieces of information, including locations, financial transactions, and associates.  The unique value of the TFTP lies in the accuracy of the banking information, since the persons concerned have a clear interest in providing accurate information to ensure that the money reaches its destination.

Most counter terrorism investigations rely on the collection, exchange, and analysis of significant quantities of information from multiple sources.  Based on the experience of implementing the Agreement, cooperation with Member State authorities in a high number of counter terrorism investigations, and general competence in matters relating to terrorism and financial intelligence, a very high value is placed on TFTP data as a unique instrument to provide timely, accurate, and reliable information about activities associated with suspected acts of terrorist financing and planning.

U.S. counter terrorism investigators from a variety of agencies benefiting from the TFTP-derived information provided pursuant to the Agreement were interviewed to determine the value of the program to their investigations.  The investigators surveyed agreed that the TFTP provides valuable information that can be used to identify and track terrorists and their support networks.  Furthermore, they noted that the TFTP provides key insight into the financial support networks of some of the world’s most dangerous terrorist organisations, including Al-Qaida, Al-Qaida in the Lands of the Islamic Maghreb (AQIM), Al-Qaida in the Arabian Peninsula (AQAP), Al Shabaab, Islamic Jihad Union (IJU), Islamic Movement of Uzbekistan (IMU), and Iran’s Islamic Revolutionary Guard Corps-Qods Force (IRGC-QF).  Investigators observed that TFTP-derived information allows them to identify new streams of financial support and previously unknown associates, link front entities and aliases with terrorist organisations, evaluate/corroborate existing intelligence, and provide information that can be used to identify new targets for investigation.  Several investigators interviewed noted that financial transaction information derived from the TFTP allows them to fill information gaps and make connections that would not have been seen in other sources. 

Terrorist groups depend on a regular cash flow for a variety of reasons, including the payment of operatives and bribes, arrangement of travel, training and recruitment of members, forging of documents, acquisition of weapons, and staging of attacks.  Counter terrorism investigators rely on multiple datasets to investigate and disrupt these operations.  However, there may be gaps in information that can prevent investigators from fully understanding these networks.  The TFTP provides investigators with accurate financial messaging information that may include account numbers, bank identification codes, names, addresses, transaction amounts, dates, email addresses, and phone numbers.  Using this information, investigators can map terrorist financial support networks, including identifying previously unknown associates.  In one case in 2012, for example, information derived from the TFTP detected that a known suspected terrorist was one of the signatories on an account of an organisation through which several suspicious transactions took place.  Subsequent TFTP checks also identified money flows between this organisation and another company suspected of providing material support to other terrorist entities in the concerned geographical area concerned.

TFTP-derived information may be used to provide leads that assist in identifying and locating persons involved with terrorist networks and providing evidence of financial activities in aid of terrorist attacks.  For example, it is possible to locate a suspect by checking when and where the suspect closed and/or opened a new bank account in a city or country other than his or her last known place of residence.  This is a clear indicator that the person may have moved.  However, even when a suspect does not change bank accounts but rather moves and continues using the ‘old’ account (e.g., through e-banking), it has been possible to detect the change of location by, for example, identifying payments for specific goods or services (e.g., for repairs or maintenance or other activities which are usually carried out where a person lives).  As a result of the precision of the TFTP data, even when suspects are very careful with their bank transactions, it has also been possible to locate them through the payments and purchases of their close associates.  The TFTP can provide key information about the movements of suspected terrorists and the nature of their expenditures.  Even the ‘non-activity’ of one or more bank accounts tied to a suspected terrorist, in terms of transactions, is a useful indicator of the possible departure of a suspect from a certain country.

Based on the TFTP, it has been possible to obtain information on U.S. and EU citizens and residents suspected of terrorism or terrorist financing in third countries where requests for mutual legal assistance were not responded to in a timely manner.  In one case in 2010, the TFTP helped to locate an EU resident suspected of a terrorist offence, who had disappeared from the EU.  The person turned out to be a new account holder in a country in the Middle East.  Further investigations confirmed that the person was indeed residing in this third country, thus allowing the targeting of investigative resources in support of a corresponding international arrest warrant.

In another case, the TFTP was used in the investigation of French national Rachid Benomari, a suspected Al-Qaida and al-Shabaab recruiter and fundraiser. Benomari along with two additional al-Shabaab operatives were arrested for illegally entering Kenya in July 2013. Benomari and his associates are wanted in the EU on terrorism-related charges, and an Interpol Red Notice has been issued for Benomari’s arrest. TFTP-derived information provided investigators with Benomari’s bank account number and identified previously-unknown financial associates. Treasury shared this information with Europol in response to an Article 10 request.

In numerous cases, counter terrorism investigators have used information obtained from the TFTP to provide accurate and timely leads that have advanced terrorism investigations.  For example, TFTP-derived information was used to help identify funding sources used in the 2011 plot to kill the Saudi Arabian Ambassador to the United States by Manssor Arbabsiar and the IRGC-QF.[6] Using the TFTP, investigators were able to identify a $100,000 transaction sent from a non-Iranian foreign bank to a bank in the United States, to an account of the person recruited by Arbabsiar to carry out the assassination.  Arbabsiar was arrested, and has subsequently pleaded guilty and been sentenced to 25 years in prison. 

The TFTP has also assisted in investigations of the al-Nusrah Front (ANF), which has been identified as an alias of Al-Qaida in Iraq by the United Nations Security Council’s Al-Qaida Sanctions Committee, as well as by the United States and the European Union, resulting in a mandatory UN-ordered freezing of any of its assets around the world.  Since September 2011, the ANF has claimed responsibility for over 1,100 terrorist attacks, killing and wounding many hundreds of Syrians. According to TFTP-derived information, a Middle East-based fundraiser for the ANF received the equivalent of more than 1.4 million Euros since 2012, donated in a variety of currencies from donors based in at least 20 different countries, including France, Germany, Ireland, the Netherlands, Spain, Sweden, and the United Kingdom. U.S. counter terrorism investigators have shared this information with global counter terrorism authorities, including authorities in Europe and the Middle East. In at least one case, a third country has requested additional TFTP searches to assist with its continuing investigation.

Treasury continues to use the TFTP to investigate EU-based terrorists training in Syria. Treasury counter terrorism analysts conducted TFTP searches on suspected terrorists Mohommod Hassin Nawaz and Hamaz Nawaz. The Nawaz brothers were arrested in Dover, UK by UK authorities on September 16, 2013 after travelling from Calais, France and were charged with terrorism offenses, including traveling to a terrorist training camp in Syria. TFTP-derived leads provided transaction information including account numbers, amounts, dates, and potential associates, including a suspected terrorist financer.

Terrorist organisations use multiple methods to fund their operations.  These methods may include money laundering, narcotics trafficking, theft, and the use of front organisations to raise funds.  TFTP-derived information can aid counter terrorism investigators in identifying the means employed by terrorists and their supporters to fund their operations.  Terrorist organisations often use front companies to establish a legitimate business presence so that they may evade sanctions and use the global financial system.  TFTP-derived information contains key information – including names, bank identification codes, transaction amounts, and dates – that can be used to link front organisations with terrorist groups.  The details of a transaction between a suspected front company and a known terrorist may contain the information investigators need to confirm that a supposedly legitimate organisation is raising funds on behalf of a terrorist organisation.  Furthermore, TFTP-derived information may identify previously unknown front organisations and individuals leading those organisations who are linked to terrorist groups.  The TFTP was used to provide leads for the investigation of the now-defunct U.S. branch of the Charitable Society for Social Welfare founded by Specially Designated Global Terrorist[7] Abd-al-Majid Al-Zindani.  Deceased AQAP operative Anwar al-Aulaqi served as vice president of the organisation.  The charity was described by U.S. federal prosecutors as a front organisation used to support Al-Qaida and Usama Bin Ladin. TFTP-derived information revealed transactions and associates linked to this organisation.

TFTP-derived information also contributed to the investigation of Iran’s Bank Saderat for its support to terrorism.  Bank Saderat was designated for its illicit activities, resulting in the freezing of its assets in the United States and the European Union, among other jurisdictions.  Bank Saderat, which had approximately 3,200 branch offices, has been used by the Government of Iran to channel funds to Hizballah and Hamas amongst others.  From 2001 to 2006, Bank Saderat transferred $50 million from the Central Bank of Iran through its subsidiary in London to its branch in Beirut for the benefit of Hizballah front organisations in Lebanon that support acts of violence. TFTP-derived information has been crucial to efforts by counter terrorism investigators to track Bank Saderat’s financial transactions to terrorist groups and its affiliations with financial institutions it uses to evade global sanctions.

Terrorist organisations often use deception to mask their illicit funding schemes.  TFTP-derived information helped to identify a funding stream used by Hizballah to launder drug money for its operations.  In this highly complex scheme, Hizballah would sell drugs in Europe and launder the funds with used cars purchased in the United States and subsequently sold in Africa.  The profits from the sale of the used cars and drugs would be sent to Lebanon and specific Lebanese exchange houses.  Treasury determined that the exchange houses were used by Hizballah to transfer funds for operations or back to the U.S. to buy more used cars.  As recently as early 2013, TFTP lead information allowed investigators to identify the movement of money between Hizballah, certain exchange houses, and used car dealerships in the United States.  Treasury continues to be concerned about the potential use of exchange houses to help access the financial system, and is actively pursuing counter terrorism leads and actions to detect and disrupt the use of the financial system to support terrorist activity. 

Financial transactions can also provide counter terrorism investigators with the information needed to identify individuals facilitating terrorist training.  Terrorist organisations require funding to allow associates to travel to training sites.  These transactions often indicate when a suspected terrorist has decided to become operational and affiliate with a group or organisation.  TFTP-derived information can provide investigators with the counter terrorism information they need, including dates of travel, transaction amounts, names, aliases, locations, and contact information, to track these individuals.  For example, the TFTP was used to help provide leads for the investigation of al-Shabaab facilitator Omar Awadh Omar.  Omar facilitated funding to al-Shabaab and is believed to have facilitated the movement of foreign fighters and supplies to Somalia.  Omar was allegedly involved in planning the 11 July 2010 attack against fans watching a World Cup match in Kampala, Uganda.  Al-Shabaab claimed responsibility for this attack, which killed 74 people.  The TFTP provided key lead information that was used to identify individuals in Omar’s support network and identify previously unknown accounts.  Omar is currently under arrest and awaiting trial in Uganda.  Omar was also designated by the U.S. Treasury Department pursuant to Executive Order 13536, which targets threats to the peace, security, and stability of Somalia.

Use of TFTP by the Member States and the EU

While the TFTP was developed by authorities in the United States, the Member States and the EU are permitted to use the TFTP for their own counter terrorism investigations through reciprocity clauses included in the Agreement.  According to Article 10 of the Agreement, the Member States, Europol, and Eurojust can request a search of information obtained through the TFTP, which Treasury will then conduct in accordance with the safeguards of Article 5.  Separately, pursuant to Article 9 of the Agreement, the U.S. Treasury Department spontaneously provides relevant information generated by the TFTP to concerned Member States, Europol, and Eurojust.

Since the entry into force of the Agreement, the Member States have become increasingly aware of the availability of the TFTP as an investigative tool.  Several Member States and Europol benefit on an ongoing basis from TFTP-derived information and the valuable investigative leads which they receive.  Over the last three years, in response to 158 total requests made by the Member States and the EU pursuant to Article 10, 924 investigative leads were obtained from the TFTP.[8]

For example, in the case of Spain, a total number of 11 requests, pursuant to Article 10, generated 93 investigative leads on natural and legal persons suspected of having a nexus to terrorism or its financing.  Out of 11 requests, three concerned domestic, separatist terrorist groups: two related to ETA[9], which generated 25 leads, and one related to Resistência Galega[10], which generated four leads.  As concerns Al-Qaida, Spain sent four requests and obtained 11 leads, whereas two requests related to Hizballah generated as many as 27 leads.  Furthermore, one request related to a separatist group PKK[11] generated 19 investigative leads and one request related a counter terrorism and counter proliferation investigation generated seven investigative leads.

During the same time period, pursuant to Article 9, the U.S. spontaneously provided the Member States and the EU with relevant information on 23 occasions, involving 94 investigative leads.[12]

The following cases,  which have been collected and provided by Europol, are illustrations of how the TFTP has been used by the Member States and of the investigative results triggered by the searches requested pursuant to Article 10 of the Agreement.[13]  They complement the information provided in section 4 of this Report, where some European examples have also been used to explain the role TFTP-derived information plays in counter terrorism investigations.  The choice of examples and the information provided had to respect the limits prescribed by the requirements of confidentiality and security. 

Case 1:  Islamist terrorist activities

Terrorist group/organisation:  Islamist terrorist activities (unknown/unnamed organisation)

Description of the case:  An investigation against a 40-year-old male suspected of being recruited for foreign armed service and membership in a terrorist organisation.  This person is further suspected of preparing and/or conducting terrorist attacks.

Feedback from the Member State:  Following an Article 10 request, the information leads corroborated previously known information, they were considered up-to-date, and the leads contained new links to terrorism/crime.

Timeframe of the leads:  2008-2011

Case 2:  Hamas

Terrorist group/organisation:  Hamas (Harakat al-Muqāwamah al-Islāmiyyah, "Islamic Resistance Movement") is the Palestinian Sunni Islamic or Islamist organisation, with an associated military wing, the Izz ad-Din al-Qassam Brigades, located in the Palestinian territories.  The European Union, Israel, the United States, Canada, and Japan classify Hamas as a terrorist organisation.

Description of the case:  An investigation into a Non Profit Organisation (NPO) sanctioned under the Member State’s legislation.  This NPO is a “sister” organisation of a similar NPO operating in another Member State, which was sanctioned for providing support to Hamas.  It was suspected that the organisation under investigation provided significant funding, via its “sister” entity, to support Hamas financially.

Feedback from the Member State:  Following an Article 10 request, the information leads corroborated known information, and were considered to be current.

Funds from the NPO were frozen prior to the launch of the Article 10 request; however, the TFTP-provided “transactions were reported to the Financial Intelligence Unit because of money laundering indications and these were later identified as funding for a terrorist organisation.”

Timeframe of the leads:  2011

Case 3:  PKK

Terrorist group/organisation:  The Kurdistan Workers’ Party (Partiya Karkerên Kurdistan or Parti Karkerani Kurdistan), commonly known as PKK, also known as KGK and formerly known as KADEK (Freedom and Democracy Congress of Kurdistan) or KONGRA-GEL (Kurdistan People’s Congress), is a Kurdish organisation which has since 1984 been fighting an armed struggle against the Turkish state for an autonomous Kurdistan and cultural and political rights for the Kurds in Turkey.  The group was founded on 27 November 1978 in the village of Fis, near Lice, and was led by Abdullah Öcalan.  The PKK is listed as a terrorist organisation internationally by states and organisations, including the European Union, the United Nations, NATO, and the United States.

Description of the case:  An investigation against an EU citizen who is suspected of being a supporter of Kongra Gel/PKK.  The suspect has extensive international travel habits, including several trips to locations of security interest.  It is suspected that the suspect acts as a fundraiser, financier, or facilitator for the proscribed terrorist organisation Kongra Gel/PKK.

Feedback from the Member State:  Following an Article 10 request, the information leads corroborated known information and also provided previously unknown international links and previously unknown contacts and suspects.

This case continues to be part of an active investigation and, as such, only limited further information can be disclosed for feedback purposes.  However, as a result of information obtained via the TFTP, financial enquiry could be more narrowly focused on previously unknown associates and locations, resulting in significant intelligence gaps being filled and the opening-up of new investigative opportunities.  Specifically, this gave the enquiry an international dimension that was previously suspected but not readily identifiable and therefore corroborated existing intelligence.  This in turn generated significant further enquiry and referrals to other law enforcement agencies with regard to the main subject of interest and financial associates.  It should be highlighted that the information provided via the TFTP would have been highly unlikely to have been discovered through other channels and was therefore of considerable benefit in this case.

Timeframe of the leads:  2004-2011

Case 4:  IJU

Terrorist group/organisation:  The Islamic Jihad Union (IJU), initially known as Islamic Jihad Group (IJG), is a terrorist organisation and has conducted attacks in Uzbekistan and attempted attacks in Germany.  IJU was founded in March 2002 by those separated from the Islamic Movement of Uzbekistan (IMU) in Pakistan’s Tribal Areas.  The organisation was responsible for failed attacks in Uzbekistan in 2004 and early 2005.  Then it changed its name, Islamic Jihad Group, into Islamic Jihad Union.  After this period, it became closer to core al Qaida.  Since its reorientation, the organisation’s focus shifted and it began plotting terror attacks in Pakistan and Western Europe, especially Germany.  Mirali in South Waziristan is the organisation’s base where Western recruits for attacks in the West are trained.

Description of the case:  An investigation against six individuals suspected of being members of the terrorist organisation IJU.  One of the suspects is believed to have travelled or will travel to receive terrorist-related training in a hostile location.  One individual is suspected to be responsible for financing, recruitment, and illegal immigration in the Member States.  This suspect’s current residence is unknown.

Feedback from the Member State:  Following an Article 10 request, the information leads corroborated previously known information.

Furthermore, the leads generated previously unknown information (foreign bank accounts, addresses, telephone numbers, etc.), unidentified international links, and previously unknown additional contacts and suspects.  The leads were considered to be up-to-date.

Timeframe of the leads:  2009-2012

Case 5:  Sikh terrorist activities

Terrorist group/organisation:  Sikh terrorist activities (unknown/unnamed organisation)

Description of the case:  An investigation into Sikh terrorist activities: An individual and the related business structure are suspected of accumulating large sums of cash and performing transfers of funds between multiple accounts and locations.  These monies are suspected of being used to support and even commission acts of terrorism.

Feedback from the Member State:  Following an Article 10 request, the information leads corroborated previously known information.  Furthermore, the leads generated previously unknown information (foreign bank accounts, addresses, telephone numbers, etc.), unidentified international links, and previously unknown contacts and suspects.  The leads were considered to be current.

The intelligence leads enabled a more accurate assessment of financial intelligence obtained earlier in the enquiry to be made.  Specifically, it had been identified that the subject had large sums of money credited to his bank account(s); however, the origin of these funds was not previously known.

No charges have been brought, but due to the sensitive nature of the investigation, limited further information can be disclosed for feedback purposes.  In this case, the TFTP was considered at an early stage due to the suspicion that the subject of interest may have a financial footprint outside the EU.  A swift and detailed response was received from the TFTP enquiry, which resulted in the identification of international financial activity and foreign business interests that proved of significant intelligence value.  In turn, a more informed assessment could be made of the activities of the subject of interest, in the context of the investigative aims and other intelligence held.  Again, the nature of the financial associations and transactions provided via the TFTP would have been unlikely to be discovered through other channels of enquiry and greatly assisted in the progression of the investigation and early assessment of the activity.

Timeframe of the leads:  2007-2012

Value of TFTP Provided Data retained for multiple years

Counter terrorism authorities demonstrated to the EU and U.S. assessment teams that financial data retained over multiple years, known as historical data, are of significant value to counter terrorism investigations.  Historical data allow investigators to identify funding trends, track group affiliations, and analyse methodology.  Due to the accuracy of TFTP data, investigators can use financial transactions to track terrorists and their supporters world-wide over multiple years.  Since the Agreement entered into force in August 2010, 45 percent of all TFTP data viewed by an analyst were three years or older. 

A terrorist may operate in a particular country for multiple years.  At some point, that individual may move to another country to conduct terrorist operations.  The individual may change all of their previous identifiers, including name, address, and phone number.  However, TFTP information retained within the time limits of Article 6 can link the individual to a bank account number that they have previously used.  Even when the terrorist has established new bank accounts, investigators may be able to link the individual with the new account – and any identifying information associated with it – by tracking transactions associated with accounts known to be used by the terrorist’s organisation.  In fact, the investigators surveyed for this report agreed that the reduction of the TFTP data retention period to anything less than five years would result in a significant loss of insight into the funding and operations of terrorist groups.

For example, TFTP-derived information was used to help track transactions of IJU operative Mevlut Kar.  Kar has provided more than 20 detonators to members of the IJU.  In January 2012, Kar was designated as a Specially Designated Global Terrorist by the United States, resulting in the freezing of any of his assets subject to U.S. jurisdiction.  TFTP-derived information retained in excess of four years was used to provide leads and track transactions between Kar and his supporters.  Kar is implicated in the 2007 European bomb plot targeting U.S. military installations and American citizens in Germany.  Kar is currently wanted by the Government of Lebanon, and an Interpol Red Notice has been issued for his arrest and extradition.  The Lebanese government has sentenced him in absentia to 15 years in prison for attempting to establish an Al-Qaida cell in Lebanon.  Without historical data, investigators would not have been able to obtain their significant insight into Kar’s operations. 

The U.S. Treasury Department conducted a review of over a thousand TFTP reports issued between 2005 and 2012.[14]  This analysis revealed that, over that seven-year period, 35 percent of the TFTP-derived leads contained data retained for at least three years. 

In addition to the prevalence of historical data among TFTP-derived leads, the review of TFTP reports from 2005 through 2012 reveals the relative importance of data retained in excess of three years in the reports.  As shown in the graph below, between 2005 and 2012, over 65 percent of reports compiled from TFTP-derived leads contained TFTP data retained in excess of three years.  For nearly 35 percent of reports, historical data comprised at least half of the report’s source material.  Since 2010, fully 10 percent of TFTP reports compiled by analysts pursuant to counter terrorism investigations relied solely on TFTP data retained in excess of three years.

Historical data were crucial to identifying the funding sources and methodology that supported Norwegian terrorist Anders Behring Breivik.  A day after the attacks of 22 July 2011 that killed 77 persons and wounded hundreds more, Europol provided the U.S. Treasury Department an emergency request pursuant to Article 10 of the Agreement related to the events.  On the same day, Treasury responded to Europol with 35 TFTP-derived leads detailing Breivik’s extensive financial activities and network that spanned nearly a dozen countries, most in Europe, but also including the United States and certain off-shore destinations.  Four of the 35 leads involved financial transactions conducted within the two years prior to the attacks, and one additional lead involved financial activity that occurred just over three years prior to the attacks.  The other 30 leads involved financial transactions conducted between four and eight years prior to the attacks[15], as Breivik built his international financial network, set up a company that produced phony educational credentials, also known as a “diploma mill,” established a farming operation that could obtain materials used for explosives, and worked with certain associates in other countries.

As the Norway attacks neared, Breivik apparently reduced his usage of the international financial system, perhaps to avoid detection.  Nevertheless, the older TFTP leads allowed investigators to rapidly identify Breivik’s funding streams and methodology, as well as his contacts and financial holdings in other countries, which was particularly critical at the time, when authorities were trying to determine whether he had acted alone or in concert with other unidentified operatives.   

In one of the other cases surveyed for the purposes of this report, investigators were able to use TFTP-derived information to track over 100 transactions between a suspected terrorist and supporters in multiple countries over the span of four years.  The suspected terrorist used accounts in several countries to solicit funds to support plans for a potential attack.  Further investigation of the transactions identified previously unknown associates and supporters.

In addition, in several cases surveyed for this report, investigators were able to track transactions between terrorist groups, including Al-Qaida, and new sources of funding.  In the majority of these cases, using information derived from TFTP data retained in excess of three years – and, in many instances for searches conducted prior to the July 2012 deletion, in excess of five years – led to separate investigations into previously unknown entities. 

In the illustrative examples of counter terrorism investigations in the EU included in Section 5 of this Report, the investigative leads generated by the TFTP were also several years old.

Retention and deletion of data

The Agreement contains several provisions related to data retention and deletion.  Article 6 (5) stipulates that during the term of the Agreement, the U.S. Treasury Department shall undertake an ongoing and at least annual evaluation to identify non-extracted data that are no longer necessary to combat terrorism or its financing, and, when identified, permanently delete them as soon as technologically feasible.  To this end a large-scale audit and analysis of the extracted data are conducted every year and analyse, on a quantitative and qualitative basis, the types and categories of data, including by geographic region, that have proven helpful for counter terrorism investigations.

The audit and analysis occur in several stages.  First, a comprehensive assessment is conducted of the extracted data to determine the message types and geographic regions that are the most and least responsive to TFTP searches.  Second, those message types and geographic regions from which data have been pulled the fewest times, quantitatively, are scrutinised to determine their qualitative component – namely, whether the relatively few responses returned nevertheless contained high-quality information or were of particular value for the purposes of the prevention, investigation, detection, or prosecution of terrorism or its financing.  Third, those message types and/or geographic regions that, from a quantitative or qualitative standpoint at the time of the evaluation, do not appear necessary to combat terrorism or its financing are removed from the future Article 4 Requests.  Where such message types and/or geographic regions are identified in non-extracted data, Treasury deletes them in accordance with Article 6 (1) of the Agreement. 

Pursuant to Article 6 (5) of the Agreement, the U.S. Treasury Department also conducts an ongoing evaluation to assess that data retention periods continue to be no longer than necessary to combat terrorism or its financing.  A comprehensive assessment consisting of investigator interviews, reviews of counter terrorism investigations, and an evaluation of current terrorist threats and activity is conducted regularly, in conjunction with the aforementioned annual review of the extracted data received, to ensure that TFTP data retention periods are relevant to ongoing counter terrorism efforts.  The three annual evaluations conducted since the Agreement entered into force, as well as the ongoing assessments, have all concluded that the current retention period of five years remains necessary for the investigations for which the TFTP is used.

Article 6 of the Agreement also provides that all non-extracted data (i.e., data that had not been extracted from the TFTP as part of a counter-terrorism investigation) received prior to 20 July 2007 shall be deleted no later than 20 July 2012.  The U.S. Treasury Department completed this deletion prior to the deadline, which was confirmed by independent auditors employed by the provider during the second joint review.[16]

Furthermore, the Agreement also stipulates that non-extracted data received on or after 20 July 2007 shall be deleted not later than five years from receipt.  The U.S. Treasury Department initially had intended to implement this provision via an annual deletion exercise with respect to non-extracted data that would hit the five-year deadline within that year.[17]  Following conversations during the second joint review, and at the recommendation of the EU joint review team, the U.S. Treasury Department revised its procedures to accommodate additional deletion exercises to ensure that all deletions of non-extracted data be fully completed by the five-year mark.  Thus, all non-extracted data received prior to 31 December 2008 already have been deleted.

Conclusion

The information contained in this Report clearly shows the significant value of the TFTP Provided Data in preventing and combatting terrorism and its financing.  The importance of the TFTP data is demonstrated by the insights given into the actual use of the TFTP-derived information in U.S. and European counter terrorism investigations accompanied by a number of concrete examples.  Whilst there are many more cases which strongly support the benefits of the TFTP, their disclosure would be detrimental to the unclosed enquiries.  The TFTP information and its accuracy enable the identification and tracking of terrorists and their support networks across the world.  It sheds light on the existing financial structures of terrorist organisations and allows for the identification of new streams of financial support, previously unknown associates, and new suspected terrorists.  The TFTP information can also help to evaluate and corroborate existing intelligence, confirm a person’s membership in the terrorist organisation, and fill information gaps. 

The Report looked into the value of data retained for multiple years and the intensity of their use.  Historical data may play a key role in the investigations of individuals who would often attempt to conceal their identifying information, including name, address, and phone number.  However, with the TFTP and the data retained in it, the investigators may be able to link an individual to a previously-used bank account number and identify correct personal information and linkages associated with it.  According to the available statistics on the TFTP reports issued between 2005 and 2012, 35 percent of the TFTP-derived leads contained data retained for three years or more.  Taking into account both the unique value of historical data and its prevalence among the TFTP leads, the reduction of the TFTP data retention period to anything less than five years would result in significant loss of insight into the funding and operations of terrorist groups. 

In accordance with the requirements of Article 6 of the Agreement, the U.S. Treasury Department has deleted all non-extracted data received prior to 31 December 2008.  The requests for data are defined on the basis of a regular and extensive evaluation of responsiveness of particular message types and geographic regions.  Moreover, the U.S. Treasury Department also conducts ongoing evaluations to assess that data retention periods continue to be no longer than necessary to combat terrorism or its financing. 

In parallel to the preparation of this Report, on request of the Commission, consultations have been launched under Article 19 of the Agreement with a view of media allegations about a potential breach of the terms of the Agreement by U.S. authorities. The information provided by the U.S. Treasury Department in its letters of 18 September and 8 November 2013 and during high level meetings on 7 October and 18 November 2013 has further clarified the implementation of the EU-U.S. TFTP Agreement and has not revealed any breach of the Agreement. The Commission and the U.S. Treasury have agreed to carry out the next Joint Review according to Article 13 of the Agreement in spring 2014.

[1]  First joint review report SEC(2011) 438 at p. 5.

[2]  Second joint review report SWD(2012) 454 at p. 38, Annex IV.

[3]  Second joint review report at p. 15.

[4]  Second joint review report at p. 17.

[5]  “Reports” have been used to share TFTP-derived information with EU Member States and third-country authorities, beginning long before the TFTP Agreement in 2010.  A TFTP “lead” refers to the summary of a particular financial transaction identified in response to a TFTP search that is relevant to a counter terrorism investigation.  Each TFTP report may contain many TFTP leads.

[6]  IRGC-QF has provided material support to the Taliban, Lebanese Hizballah, Hamas, Palestinian Islamic Jihad, and the Popular Front for the Liberation of Palestine General Command. IRGC-QF has also provided terrorist organisations with lethal support in the form of weapons, training, and funding, and has been responsible for numerous terrorist attacks.

[7]  The term “Specially Designated Global Terrorist” or “SDGT” refers to an individual or entity that is subject to sanctions pursuant to Executive Order 13224, the U.S. Government’s primary counter terrorism sanctions authority.

[8] These numbers are current as of August 20, 2013.

[9] ETA (Euskadi ta Askatasuna) – Basque Fatherland and Liberty.

[10] Resistência Galega – Galician Resistance.

[11] PKK (Partiya Karkerên Kurdistan) – Kurdistan Workers’ Party.

[12] These numbers are current as of August 22, 2013.

[13] The presentation of these examples is based on the descriptions provided by the concerned Member States.

[14]  The reports were randomly selected in order to obtain a representative sample of all TFTP reports produced during the period 2005 through 2012.  As noted earlier, a single TFTP report may contain multiple TFTP leads.

[15] TFTP data older than five years were still available at that time as according to Article 6 of the Agreement all non-extracted data received prior to 20 July 2007 had to be deleted not later than 20 July 2012.

[16]  Second joint review report at p. 10.

[17]  Second joint review report at p. 10.

Top