Feeds

EU backs renewal of anti-terror bank scrutiny deal

Follow the money

High performance access to file storage

The EU is in talks to renew an agreement allowing US authorities to scrutinise European banking transactions as part of US anti-terrorism efforts.

Existing arrangements dating from 2007 - which existed in much the same form but in secret before then - allow US anti-terror investigators to access European bank transfer transaction data maintained by Swift (Society of Worldwide Inter bank Financial Telecommunications) under controlled circumstances. Swift is due to move its primary internet servers from the US to a data centre in the Netherlands later this year, necessitating changes in a gentlemen's agreement that has existed since the 9/11 terrorism attack.

US security agencies have had access to Swift data under the Terrorist Finance Tracking Programme (TFTP) since 2001, but the programme only became public knowledge in June 2006, after the scheme was revealed in a New York Times story. The US Treasury made promises to the EU regarding the controls and safeguards to accompany the TFTP scheme in June 2007.

The US Treasury has the right to serve "administrative subpoenas" on SWIFT for the financial records of suspected individuals or organisations. The scheme is restricted exclusively to anti-terrorism investigations, according to the agreement at least.

An EU review carried out by Judge Jean-Louis Bruguière concluded in February 2009 that subpoenaed SWIFT message data is "adequately protected" and that the programme is justified in the fight against the financing of terrorism.

However, German politicians have expressed concerns about the scope of US scrutiny of international bank records and transactions, Der Spiegel reports.

EU Justice Commissioner Jacques Barrot responded on Monday by arguing it would be "extremely dangerous" to curtail the surveillance of banking transactions while stressing that US trench coats would not be given a blank cheque.

"The US authorities would continue to temporarily access the relevant data only after legal verification and under strict judicial control," he said, the BBC reports.

A spokesperson for SWIFT was unable to immediately provide El Reg with a timescale for re-negotiation of the TFTP arrangements or say when its main servers will be relocated to Europe. SWIFT, which is based in Belgium and co-operatively owned by 8,000 banks, handles 15 million bank transfers a day. ®

High performance access to file storage

More from The Register

next story
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Parent gabfest Mumsnet hit by SSL bug: My heart bleeds, grins hacker
Natter-board tells middle-class Britain to purée its passwords
Web data BLEEDOUT: Users to feel the pain as Heartbleed bug revealed
Vendors and ISPs have work to do updating firmware - if it's possible to fix this
OpenSSL Heartbleed: Bloody nose for open-source bleeding hearts
Bloke behind the cockup says not enough people are helping crucial crypto project
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Call of Duty 'fragged using OpenSSL's Heartbleed exploit'
So it begins ... or maybe not, says one analyst
Experian subsidiary faces MEGA-PROBE for 'selling consumer data to fraudster'
US attorneys general roll up sleeves, snap on gloves
NSA denies it knew about and USED Heartbleed encryption flaw for TWO YEARS
Agency forgets it exists to protect communications, not just spy on them
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.