News & Commentary

08:44 AM
Kathy Burger
Kathy Burger
Connect Directly

Understanding The Banking System's Role In the Post-9/11 World

A new book outlines the role the U.S. Treasury Department has played in the war on terrorism.

This is a time of year filed with anniversaries and memories – the recall of events that have tremendous significance for the financial services industry, and that also illustrate just how critical banking and financial services are to the United States and nations around the world. This week marks the fifth anniversary of the failure of Lehman Brothers, one of the triggers of the global financial crisis. And today, of course, is the 12th anniversary of the September 11, 2001, terrorist attacks on the World Trade Center in New York City and on the Pentagon in Washington, D.C.

[Remembering When People Didn't Hate Banks]

The impact of 9/11 has been thoroughly reported, analyzed and debated, but it's worth noting on this 12th anniversary (and also when the prospect of U.S. military action against Syria is looming) the extent to which banking not only has been affected by the event, but also has been at the center of our nation's response to terrorism. The PATRIOT Act, the post-9/11 legislation that made data mining a common term, places a number of specific requirements on financial services companies. And the banking industry has played a significant role in sanctions and anti-money laundering efforts aimed at cutting off the funding of terroristic governments and organizations.

Details of these efforts are provided in a new book, Treasury's War: The Unleashing of a New Era of Financial Warfare, by Juan Zarate, a senior adviser to the Center for Strategic and International Studies (CSIS), and a former deputy assistant to the president and deputy national security adviser. In an interview this morning on NPR, Zarate talked about the role of the Treasury Department (which was the only government entity to receive an A grade in the 9/11 Commission's report on the tragedy) in fighting terrorism in the post-9/11 world.

According to Zarate, "It was clear that Al Quaeda had deep support in the Middle East … and also had the ability to raise and move money around the world." The Treasury Department determined "it had to deter those that would help Al Quaeda … by going after its money."

The new powers Treasury obtained, Zarate related, included "a broad array of tools, not just the ability to freeze assets … but [the ability to] threaten to freeze assets of those facilitating" terrorism. He singled out Section 311 of the PATRIOT Act includes Section 311, which has to do with anti-money laundering efforts. Zarate calls this a "Scarlet Letter" that has helped Treasury isolate banks and governments that are funding terrorism.

In the NPR interview, Zarate stressed his opinion that this kind of financial pressure is missing from the U.S.'s current efforts to address the crisis in Syria. "[We are] lacking a much more aggressive financial strategy against Syria," he said. "You can always turn the dial up or down on financial sanctions. We've done lot in the Treasury department, but you can always do more" -- for example, he added, potentially sanctioning Russian banks that are funding the Assad regime. Zarate continued, "Have we launched preemptive asset hunt? Why don't we do that now? These are all things that can be done even absent a UN mandate."

[Check out the Advanced Threat Confidential: 14 Lessons Learned from Real Cyber Attacks session at Interop on October 4.]

Katherine Burger is Editorial Director of Bank Systems & Technology and Insurance & Technology, members of UBM TechWeb's InformationWeek Financial Services. She assumed leadership of Bank Systems & Technology in 2003 and of Insurance & Technology in 1991. In addition to ... View Full Bio

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.