revolution and the US security state collide ............................................................................................................................................................................................................................................ Money laundering and the proliferation of surveillance ............................................................................................................................................................................................................................................ PETER SHIELDS Bowling Green State University, USA ............................................................................................................................................................................................................................................ Abstract For law enforcement agencies, the information revolution is eroding their capacity to regulate money laundering, thereby undermining their ability to combat drug trafcking and terrorism. They argue that without enhanced surveillance powers, these problems will be exacerbated. This emphasis on the control problems precipitated by technology distorts our understanding of the relationship between the information revolution and money laundering, much of which has been fuelled not by technology but by the dynamic interaction between technology developments and ongoing changes in criminal justice policy and the US state. An alternative narrative is sketched: the escalation of the USs failed War on Drugs has been a key factor driving both money laundering and the proliferation of surveillance countermeasures. In this context, information and communication technologies have been key resources/sites of struggle for both money launderers and law enforcement. The expansion of surveillance powers will do little to curb illicit action. Indeed, the expansion may escalate laundering as well as erode citizens privacy. The article suggests that a similar new media & society Copyright 2005 SAGE Publications London, Thousand Oaks, CA and New Delhi Vol7(4):483512 [DOI: 10.1177/1461444805054110] ........................................................................................................................................................................................................................................................ 483 dynamic may be operating in the US states New War on Terrorism. Key words cyberpayment technologies drug trafcking information revolution law enforcement money laundering surveillance telecommunications networks terrorism INTRODUCTION In recent years, the widespread euphoria accompanying the ongoing information revolution has been paralleled and tempered by growing consternation that the revolution has also been a boon to the underworld. Law enforcement agencies and regulatory authorities, as well as many policymakers and journalists, have expressed alarm that developments in information and communication technology (ICT) have provided terrorists, drug trafckers, pedophiles and the like with unnerving new capacities and opportunities to commit crimes and evade law enforcement. Dire consequences are predicted for the political and social order if these developments are not checked. The loss-of-control theme and sense of impending crisis that pervades this discourse provides a powerful and seductively straightforward justication for an array of regulatory proposals and countermeasures which advocates believe will restore control, thereby safeguarding social and political order. More often than not, these proposals and countermeasures involve the ratcheting-up of electronic surveillance. Invariably, this has precipitated heated debate as to their implications for individual privacy and freedom of expression. Focusing on the US context, this article examines a prolic strand of this discourse, the argument that ICT developments are exacerbating greatly the problem of money laundering. Widely perceived in policy circles as the sine qua non of drug trafcking and terrorism, money laundering refers to the process by which criminals or criminal organizations seek to disguise the illicit nature of their proceeds by introducing them into the stream of legitimate commerce and nance (US Department of Treasury, 2000: 2). A US Ofce of Technology Assessment report asserts: Terrorists as well as drug trafckers and other criminal organizations need to launder money. It takes money for weapons and explosives. It takes money to get terrorists to their targets, and then into hiding (1995: 129). Accordingly, following the money trail is viewed by many law enforcement agencies and policymakers as a critical strategy in combating drug trafcking and terrorism. Indeed, since the attacks on the World Trade Center and the Pentagon, the Bush administration has portrayed anti-money-laundering initiatives as crucial weapons in its War on Terrorism. As the US Department of Treasury (2002: 3) recently asserted: Following the terrorist attacks ... we also New Media & Society 7(4) 484 recognize that the ght against money laundering is integral to the war against terrorism, and that effective anti-money-laundering practices will save innocent lives. Initially, law enforcement agencies complained that their follow-the- money strategy was being undercut by the electronic funds transfer systems that were deployed throughout the nancial sector of the world economy, beginning in the 1970s and 1980s. It is said that these high-speed, border- spanning telecommunications networks have provided money launderers with a swift, almost risk-free pipeline for moving and hiding vast amounts of illicit funds. Attempting to stem this clandestine ow, law enforcement agencies and regulatory authorities have responded by bolstering their ability to monitor nancial transactions systematically. More recently, alarm bells have been ringing over the fact that emerging cyberpayment systems are threatening to aggravate greatly law enforcements money laundering woes. Developed to address the perceived demands of e-commerce, these systems involve new forms of currency, such as stored value cards and network-based products (digital cash), which can be used to make payments over the internet. It is said these applications are likely to give rise to a whole new set of institutions and transactions, which drug trafckers and terrorists can use to circumvent current law- enforcement tracing methods. Law enforcement agencies are currently grappling with the question of how to extend their surveillance powers to these new forms of transactions. Is the information revolution really eroding law enforcements ability to regulate money laundering, thereby undermining the US states capacity to effectively combat problems such as drug trafcking and terrorism? Will more anti-money-laundering initiatives, including enhanced surveillance of nancial transactions, increase the US states capacity to control these problems? This article addresses these questions. It begins by outlining the money- laundering process and surveying the control problems that ICTs purportedly pose for law enforcement agencies. The various surveillance- intensive countermeasures ostensibly called forth by these control problems are also summarized. In the second part of the article, it is argued that law enforcements emphasis on the control problems precipitated by technology developments greatly oversimplies and distorts our understanding of the relationship between the information revolution and money laundering. That is, this loss-of-control narrative obscures the fact that much of the money-laundering problem has been fueled not by technology developments per se, but by the dynamic interaction between these technological developments and ongoing developments in criminal justice policy and associated changes in the US state. In so doing, the narrative masks the fact that the US state has contributed to some of the very problems (e.g. drug Shields: When the information revolution and the US security state collide 485 trafcking) that anti-money-laundering initiatives are supposed to address. An alternative narrative is sketched, one which places the US state at the center of analysis. 1 It is argued that the escalation of the US states failed War on Drugs has been a key factor driving both the money-laundering problem and the proliferation of surveillance countermeasures in the last decade or so. Within this context, ICTs have been key resources and sites of struggle for both money launderers and law enforcement. In sharp contrast to the loss-of-control narrative, this alternative narrative claims that the expansion of law enforcements surveillance powers will do little to curb money-laundering practices or the illicit drug trade. Indeed, the consequences of this expansion include the escalation of the money- laundering problem and the steady erosion of citizens civil liberties. The article concludes by suggesting that a similar dynamic may be operating in the US states War on Terrorism. MONEY LAUNDERING: SCOPE AND PROCESS Since the 1980s, there has been a boom in money laundering (Strange, 1998: 123). 2 The International Monetary Fund has estimated the global value of money laundering at between 2 and 5 percent of the worlds annual gross domestic product, a range which encompasses sums between $600 billion and $1.8 trillion (US Department of Treasury, 2002). The Financial Crimes Enforcement Network, a division of the US Department of Treasury, estimates that about $300 billion is laundered in or through the US annually (Richards, 1998). 3 Although there are many ways to launder money, the process generally involves three stages: placement, layering and integration (Solomon, 1997). At the placement stage, cash derived from criminal activities is slipped into the nancial system. This is not as easy as it might seem, since in many advanced capitalist societies banks and other nancial institutions are required to report large cash transactions, including deposits and the opening of accounts in the form of currency transaction reports in the US, $10,000 is the threshold gure (US Department of Treasury, 2002). Smurng is one tactic used to circumvent this requirement; numerous individuals are employed to make large numbers of small deposits (always under the $10,000 threshold). This facilitates the injection of large quantities of cash into the banking system without triggering the reporting system. Non-banking nancial institutions, such as casinos and bureaux de change, are also well suited to cash placement using this method. Shipping cash to banking jurisdictions which do not have compulsory reporting rules is another strategy that is used. However, there is signicant risk that law enforcement may interdict and seize these cross-border shipments. Once criminal proceeds have been placed in the nancial system, the next stage is that of layering. At this point, the illicit funds are circulated New Media & Society 7(4) 486 typically through various nancial institutions and across multiple jurisdictions in order to obscure their source and ownership. Certainly this process does not depend necessarily on ICTs, but the use of electronic funds transfers or wire transfers has emerged as by far the most common layering technique. In 1989, the American Bankers Association Money Laundering Task Force (1989) claimed that wire transactions, which are essentially unregulated, have emerged as the primary method by which high-volume launderers ply their trade. And in 2000, James Sloan, Director of the Financial Crimes Enforcement Network, observed: Electronic funds transfer systems are the fundamental building blocks for both the legitimate and illicit movement of money domestically and globally. The large-scale money laundering cases described by law enforcement also most universally involve a wire transfer component by which millions of dollars in drug and non-drug criminal nancial activity are camouaged. (Sloan, 2000: 2) The challenges posed by electronic funds transfer systems for law enforcement are discussed below. The integration stage is the last step in the money-laundering process. After moving through multiple transactions in the nancial system, the laundered funds are then integrated into the mainstream nancial world. Typically, this is done by purchasing numerous nancial instruments (e.g. stocks, bonds) or by investing in real estate and other legitimate businesses. ELECTRONIC FUNDS TRANSFERS In the US, individuals typically initiate electronic funds transfers through banks or money transmitter services (e.g. Western Union, Moneygram). The funds are transferred using one of the two major vehicles for electronic funds transfer: the Federal Reserve Wire Network (Fedwire) and the Clearing House Interbank Payment System (CHIPS). Fedwire, which primarily facilitates domestic transfers, connects the 12 Federal Reserve banks with approximately 11,700 banks in the US. International dollar transfers usually move through CHIPS. There are 115 large banks which participate in CHIPS, representing 29 countries. A third operation, the Brussels-based Society for Worldwide Interbank Financial Telecommunications (SWIFT), mainly functions as an international communication system, facilitating Fedwire and CHIPS transfers by transmitting nancial information such as payment instructions and statements (Baldwin, 1996). Taken together, these electronic funds transfer systems handle a massive volume of transactions. Each day more than 465,000 wire transfers, valued at more than $2 trillion are moved by Fedwire and CHIPS, and an estimated 222,000 transfer messages are sent by SWIFT (US Ofce of Technology Assessment, 1995). Reportedly, law enforcement agencies have had great difculty monitoring the ow of illicit funds over these wire transfer systems. This Shields: When the information revolution and the US security state collide 487 state of affairs is due partly to the manner in which banks have traditionally maintained records of funds transfers. Wire transfers commonly involve a series of transactions as the funds move from the originators account to the beneciarys account, a series which can often involve several intermediary banks. The separate payment orders necessary for each bank-to-bank transfer in the wire-transfer chain will contain different information; often, as the payment order is reformatted for the next phase of the transfer, the bank will omit identication of earlier participants, such as the sender or intermediate banks. Generally, in the past (in the US) the originators account number has been dropped from subsequent payment orders to keep this information condential (Hughes, 1992; Richards, 1998; US Ofce of Technology Assessment, 1995). Furthermore, when the transfers circulate through banks operating in countries which have strict customer condentiality laws, banks are not required to record the identity of the originator. Indeed, the recording of this information may be actively discouraged. This problem is of growing interest to US law enforcement, as a good deal of the money wired overseas for laundering is thought to ow back to the US, also by wire transfer, for investment (US Ofce of Technology Assessment, 1995). Recent national and international policy initiatives have sought to address these issues. These are briey discussed below. The way in which banks maintain wire transfer records makes the task of examining these transactions for law enforcement purposes a difcult one. The high volume of electronic funds transfers that occur daily is said to exacerbate the problem. The US Ofce of Technology Assessment sums up the comparative advantage of wire transfers systems to money launderers as follows: The fastest way to move millions of dollars out of sight of law enforcement is to use international wire transfers, even though this requires rst placing the money into a bank. With approximately 700,000 wire transfers every day, illegal transfers are easily hidden. Their audit trails are obscured within enormous databases that are generally safe from law enforcement investigators. By comparison, physically smuggling cash and even paper-based monetary instruments across national boundaries although often successful is slow and unacceptable risky. (1995: 1212) 4 ANTI-MONEY LAUNDERING INITIATIVES Generally speaking, anti-money-laundering initiatives have focused on information choke points or portals through which all funds earmarked for wire transfer must pass (Harte, 1995: 245). One set of choke points comprises the gateways to wire transfer systems the various nancial institutions that handle deposits (i.e. the placement stage). Another set is New Media & Society 7(4) 488 distributed throughout the electronic funds transfer systems themselves (i.e. the layering stage). Placement-stage surveillance initiatives Initial law enforcement surveillance of the placement stage involved regulations that require nancial banks to le currency transaction reports (CTRs) on all deposits of $10,000 or more. 5 In the aftermath of the attacks on the World Trade Center and the Pentagon, the USA Patriot Act of 2001 extended this requirement to a host of other institutions (e.g. casinos, money transmitter services such as Western Union, car dealers, mutual funds, insurance companies) (US Department of Treasury, 2002). Partly due to the smurng problem alluded to earlier, a second line of defense was added with the passage of the Money Laundering Suppression Act of 1994. This law requires all banks to le suspicious activity reports (SARs). As the name implies, these reports must be led when a bank knows or suspects that money laundering may be occurring. The $10,000 threshold is not required to trigger this reporting requirement. 6 Again, the USA Patriot Act has extended this requirement to a variety of other institutions (Sloan, 2003; US Department of Treasury, 2002: 43). In 1999, law enforcement agencies pushed for a third layer of mandatory reporting requirements, the so-called know-your-customer rules. The rules require all nancial institutions to develop detailed proles on their customers and determine the source of funds that may be incommensurate with a customers prole or typical bank activity (Hinterseer, 2002). 7 The initiative failed in the face of strong opposition from many nancial institutions and civil liberty groups. However, law enforcement agencies have persuaded many banks to implement the rules on a voluntary basis (Nojeim, 1999: 2). In addition, there has been a sustained attempt at internationalizing the mandatory reporting requirements. For example, the Kerry Amendment to the Anti-Drug Abuse Act of 1988 gave the US Government the power to deny foreign banks access to CHIPS, the US-controlled international wire transfer system. With this stick in hand, foreign governments were more apt to adopt the reporting requirements (Naylor, 2002; Sica, 2000). And for the last decade, the US Government has worked through the G7s Financial Action Task Force (FATF) to push other governments to adopt US-style reporting requirements and to establish mechanisms whereby such records may be made available to US law enforcement (Helleiner, 1999; Reinicke, 1998; Williams, 2001). 8 This effort has taken on a new urgency since the September 11 attacks (Financial Action Task Force, 2003; Sloan, 2003). Each of the reporting requirements referred to above qualitatively changes the relationships between nancial institutions and customers, and nancial institutions and law enforcement agencies: Shields: When the information revolution and the US security state collide 489 A CTR is the least problematic. If a certain threshold is reached, then the institution is required by a clear, externally imposed rule to gather specic information and pass it on to the authorities. The institutions role is passive it acts as a conduit for given types of data between client and government agency; the data is the same for all clients, and the client acts as a fully informed, conscious participant in the process ... [The nancial institutions] role with regard to a suspicious activity report is reactive. The client or the clients transaction exhibits certain characteristics that trigger a response. The bank is not an automatic conduit but a police informant. Despite efforts by law enforcement to draw up lists of objective characteristics of suspicious transactions, the banks decision is really based on subjective hunches ... Meantime the client is not informed. With know-your-client rules, the nancial institution notches up its role once again ... It has, in effect, been deputized by the law enforcement apparatus. Nor is it clear where the nancial institutions responsibilities stop. To really know a clients business, it is necessary to know the clients clients, and perhaps the clients clients clients the institution may go overboard ... And while all of this is happening, the client is left totally in the dark. (Naylor, 2002: 2712) The steady ratcheting-up of reporting requirements raises questions about how far nancial institutions will be expected to dig into their customers affairs, and just how much police work these institutions can be reasonably expected to perform. CTRs and SARs from 21,000 depository institutions and 200,000 non- bank nancial institutions are fed to the Financial Crimes Enforcement Network (FinCEN), a division of the US Department of Treasury (Wakeeld, 2000). 9 FinCEN was created in 1990 to serve as the nations central clearinghouse for intelligence and information-sharing on money laundering. The agency analyzes the millions of nancial transaction reports with the help of the Financial Articial Intelligence System (FAIS). Established in 1993, FAIS has reportedly enhanced FinCENs capacity to identify suspect patterns of money movements. As a former director of FinCEN observes: [The] AI system for the rst time permits all incoming [transaction records] to be screened against a set of rules aimed at nding the clues to wrongdoing ... It gives federal investigators ... the ability to link ostensibly disparate banking transactions which reveal patterns of nancial transactions that are known to be used to launder money. (Morris, 1996: 1) Using this method, analysts select suspects and accounts for further analysis. This includes matching them with information in a score of other government and commercial databases using link analysis (Kimery, 1993; US Ofce of Technology Assessment, 1995). 10 Critics have raised concerns that the manipulation and matching of information from many databases to reveal a complex pattern of nancial activity by an individual is a substantial intrusion of citizens privacy (Kimery, 1993; Nojeim, 1999). New Media & Society 7(4) 490 A related FinCEN initiative, the Gateway Project, permits myriad federal and state law enforcement agencies to gain direct electronic access to the agencys nancial transactions database. By the end of 1999, Gateway granted password access to more than 600 law enforcement users who led nearly 85,000 queries, an increase of 18 percent for the year before (Wakeeld, 2000). Civil liberty groups have expressed concerns about Gateways popularity within the law enforcement community. For example, they are critical of the fact that users do not have to demonstrate probable cause or even relevance to an ongoing investigation before gaining access to the database. As the argument runs, since targeted court orders or warrants are not required, users often use a vacuum cleaner approach when downloading data: They tend to suck up everything FinCEN has to offer by periodically downloading the entire harvest of new information (Nojeim, 1999: 4). The potential for abuse of this information is high, because the downloaded information can be kept indenitely and there are no guidelines on how it should or should not be used. This state of affairs is symptomatic of the conspicuous disinterest in privacy issues among those involved in money-laundering law enforcement. Peter Swire (1999: 480), the Clinton administrations Chief Counselor for Privacy, notes that throughout the 1990s there was no political pressure from above on the money-laundering law enforcement community to address the privacy concerns raised by the rapidly expanding web of money-laundering laws and the proliferation of high-tech surveillance techniques. Swires conclusion is based on interviews conducted with US prosecutors and others involved in money laundering law enforcement. Layering-stage surveillance initiatives Enhanced surveillance of the placement stage has yet to succeed in blocking money launderers access to wire transfer systems (US Ofce of Technology Assessment, 1995). Therefore, making these conduits less attractive to launderers has been a top law-enforcement priority. To this end, two strategies have been pursued. The rst involves improving law enforcements access to wire transfer records and to have the information content of the records increased and standardized. As discussed earlier, from a law- enforcement perspective these records have been relatively uninformative because of the sparse and inconsistent information contained in the payment orders which route funds through the various stages of the wire-transfer process. After a protracted struggle between law enforcement and the banking industry, new record-keeping rules were enacted in 1996. These rules require each bank in the wire-transfer process to include all identifying information in the payment order as sent to the next bank. The identifying information thus travels with the payment order from beginning to end (Baldwin, 1986; Solomon, 1997). Shields: When the information revolution and the US security state collide 491 While this regulation increases US law enforcements capacity to monitor wire transfers originating in the US, it does little to enhance its ability to monitor and trace incoming wire transfers from offshore banking havens. The banks in these jurisdictions may be compelled to protect their customers anonymity by not identifying the originator on a wire-transfer message. Again, the US Government, working through the FATF, has sought to persuade these havens to record this information and make it available to US law enforcement (US Ofce of Technology Assessment, 1995; Stessens, 2000). In the wake of September 11, FATF has stepped up its efforts to pressure countries to require banks and money transmitter services to include accurate and meaningful originator information ... on [electronic] funds transfers and related messages that are sent... Furthermore, [this] ... information should remain with the transfer or related message through the payment chain (Financial Action Task Force, 2002: 2). In essence, this is an attempt to internationalize the US Department of Treasurys 1996 record-keeping rules. While these record-keeping rules are designed to make it easier for law enforcement to nd and retrieve evidence that can be used against suspects, it does not address the detection of unsuspected operations (Baldwin, 1996). To address this problem, law enforcement agencies have proposed the real- time monitoring of wire transfer systems using articial intelligence applications. The proposed surveillance system would monitor wire-transfer trafc on a continuous basis, comparing messages to proles of illicit transfers. The sites for this monitoring system would be various choke points on the three main wire transfer systems: For CHIPS monitoring could be done ... at the 35 to 40 US participating banks, all in New York; most of the wire transfers pass through the 10 or 12 largest commercial banks ... [With respect to Fedwire] it would probably be most efcient to do any screening ... at the 12 Regional Federal Reserve Banks ... SWIFT transfer instructions are used by about 148 US banks and 300 US subsidiaries of foreign banks. Perhaps three-quarters of these transfer messages too are believed to go through a dozen very large banks. (US Ofce of Technology Assessment, 1995: 1345) Intrigued by this proposal, Congress asked the Ofce of Technology Assessment to evaluate its feasibility. The Ofce of Technology Assessment concluded that such a system was not possible at the time because law enforcement has yet to delineate distinct money-laundering patterns or proles against which to compare messages. It also raised concerns about the privacy implications of the proposed system: [It] conjures up the image of the computer state, where all data, no matter how innocuous or elliptical in itself, may be collected, aggregated, New Media & Society 7(4) 492 manipulated, and cross-related with other databases to the point where it becomes information with a context and no longer innocuous. (Ofce of Technology Assessment, 1995: 76) 11 CYBERPAYMENT TECHNOLOGY In essence, during the past decade or so (and with some success), US law enforcement agencies have struggled to engineer their surveillance interests into the interstices of the evolving nancial system. There is now widespread concern among these agencies that this surveillance infrastructure may be rendered useless by an emerging new class of payment systems which support the electronic transfer of value. These systems involve new forms of currency such as stored value cards (smart cards or electronic purse) and network-based products (digital cash), which can be used to make payments over the internet. In contrast to credit or debit cards, these new devices do not access a bank account or credit line, but represent the general liabilities of the issuer. When money is spent with them, there is usually an electronic link to the issuer or to a central database which keeps track of balances and transactions. But some ofine devices permit direct purse-to-purse payments without any authorization or interaction with a centralized location (Financial Crimes Enforcement Network, 2000; Good, 2000; Molander et al., 1998). Because these payment systems are still in the early stages of development, much of the commentary on their potential inuence on money laundering practices is tentative and suggestive rather than denitive. 12 One concern is that these new forms of money will make the detection of illicit funds much more difcult. Smart cards and digital cash often rely on complex encryption technologies that reduce the likelihood of transactions leaving a traceable electronic trail (Mussington et al., 1998; Rueda, 2001). In fact, the developers of these payment methods are keen to highlight encryption-enabled payer anonymity as a selling point of their products. Consequently, the worry is that money launderers could circulate millions of dollars of electronic money around the world with little risk of detection. In addition, regulatory initiatives may be rendered more difcult because the money ows associated with these new payment systems could bypass the central choke points which regulators have relied on for monitoring purposes. For example, the new forms of electronic money could permit launderers to avoid contact with established depository institutions, thus skirting the raft of reporting requirements and know-your-customer rules. And peer-to-peer internet transactions may provide money launderers with an alternative to electronic funds transfers systems (Fedwire, CHIPS, SWIFT), thus avoiding the choke points located on these systems (Financial Action Task Force, 1997; Helleiner, 1998; Weimer, 2000). Shields: When the information revolution and the US security state collide 493 For law enforcement agencies, the existence of an audit trail is the key. Their goal is to ensure that their surveillance interests are hardwired into the design of the still-nascent cyberpayment systems. Over the last few years, the strategy has been to nudge the industry in this direction without mandating a new regulatory scheme (Financial Action Task Force, 1996; Welling and Rickman, 1998). For example, in 1996 FATF convened a meeting in which law enforcement ofcials and regulators expressed their concerns to leading developers of new forms of electronic money. According to the FATF, these concerns were heeded: [T]he e-money industry representatives stated that they want and need more feedback from law enforcement in order to understand their concerns and to be able to incorporate possible solutions in their systems... For example, measures that are necessary for anti-money laundering purposes need to be considered alongside the safeguards that the industry is building in to preventing fraud and other security issues. (Financial Action Task Force, 1997: 14) Even if such exercises prove fruitless from a law enforcement perspective, it would appear unlikely that the US Government (or some other governments) will permit the introduction of payment systems based on totally anonymous digital cash. Grabosky and Smith (1998: 183) note that one option available to governments is to restrict the ability to issue electronic cash to traditional banks or other nancial institutions (e.g. credit card companies) that are already subject to regulatory supervision. This option is made more convenient by the fact that currently, traditional nancial institutions are playing a major role as sponsors of the emerging cyberpayment systems (Group of Ten, 2000; Weatherford, 1997). Of course, the more surveillance-intensive the design of the new payment systems, the greater the resistance may be on the part of many individuals and institutions to move to cyberpayment systems (Rahn, 2000). If the US Government was to endorse a policy prohibiting anonymous electronic cash, or a US banking policy is adopted that encourages a fully traceable electronic cash system, this may well lead to many other countries deploying similar surveillance-intensive systems. First, research and development on cyberpayment systems elsewhere in the world will be done with at least one eye on the US market, the largest in the world to date (Swire, 1999). Thus new technologies are likely to be consistent with the requirements of the US market. Second, since many international nancial transactions originate, terminate or pass through the domestic or international ofces of US nancial institutions, these banks or other institutions are likely to have systems in place, even for their foreign ofces, that will be consistent with US law (Swire, 1999). Third, as alluded to above, the US Government is not averse to coaxing other countries into adopting measures which support surveillance of the nancial system. New Media & Society 7(4) 494 THE LOSS-OF-CONTROL NARRATIVE What explains the exacerbation of the money-laundering problem and the associated proliferation of surveillance-intensive money-laundering countermeasures? The argument here is that it would be a mistake to view the information revolution as the sole or primary driver of these phenomena. Such a one-sided view obscures the ways in which developments in criminal justice policies and associated changes in the US state have fueled money laundering and law enforcements response to it. As is suggested below, the law enforcement establishment has been a primary beneciary of this state of affairs. In discussions about the inuence of ICT developments on money laundering and in the debates over the various anti-money-laundering initiatives, loss of control has been the dominant narrative. For law enforcement agencies and regulatory authorities, as well as many policymakers, academics and journalists, a central element of this storyline is that the information revolution has plunged law enforcement into crisis. That is, along with the liberalization of cross-border nancial ows, the rapid deployment of electronic funds transfer networks has permitted organized crime, particularly drug trafckers, to leap ahead in their internecine struggle with law enforcement. Specically, these networks are portrayed as undermining law enforcements follow-the-money approach to combating organized crime and winning the War on Drugs. In this narrative, emerging cyberpayment systems may well provide the underworld with an unassailable advantage. Referring to these technological developments, one commentator notes: [T]he contemporary nancial system has become a money launderers dream. Conversely, it is a nightmare for law enforcement agencies that have to work through a jurisdictional and bureaucratic morass in their efforts to follow and seize the money. (Williams, 2001: 110; see also Reinicke, 1998; Shelley, 1998) Without appropriate policy responses, the argument runs, there will be grave consequences for public safety and national security. The following comment from former FinCEN director, Stanley Morris, exemplies much of the policy discourse: History has shown us that as we invent new technologies, criminals are waiting on the periphery to use them credit cards produce credit card fraud; computers create computer hacking; and automatic teller machines produce unique opportunities for theft. In the same way, the possibility of virtually untraceable nancial dealings ... would create new, but this time, perhaps unparalleled problems for law enforcement. Those of us who have fought so hard to end bank secrecy as a convenient excuse around which criminals can cluster will have won little if we now turn to a world in which nancial institutions can easily be bypassed via the internet or use of the telephone Shields: When the information revolution and the US security state collide 495 lines. That leads to an important point about money laundering and related nancial crimes. They all involve taking acts that are themselves, in isolation, not only legal, but commonplace opening bank accounts, wiring funds, and exchanging currencies in international trade. Given that basic fact, we have few ways now to separate the malefactors from the businessmen. The new technologies will give us even fewer ways, unless we work with their developers. How should we do so? First, we will need partnerships with these new industries ... Without thoughtful and balanced attention to law enforcement concerns now before criminals begin to exploit the new technology the prospects [for abuse of this technology] by organized crime, money launderers, and other nancial criminals could be too great. (Morris, 1996: 45) 13 In this discourse, the emphasis is on the loss of state control and its consequences. The discourse also focuses on the technical changes that supposedly precipitated this loss of control, as well as on more recent technical developments that may undercut this control even more. A solution to the problem is embedded in the storyline: the state must regain control. Since the problem is in large part a technological one, the solution largely rests in the technical domain. Application of articial intelligence to nancial transaction databases, attempting to engineer an enhanced monitoring capability into wire transfer systems, the current strategy of building a similar surveillance capability into cyberpayment technologies all have been justied on the grounds that they will allow law enforcement to close the technology gap on criminals. Such initiatives, it is said, will result in law enforcement control over criminal activity being re-established. As Shelley asserts: Just as we pursue the drug problem by going to the source, the same may be said for crimes facilitated and perpetuated through high technology. The cure for the problem may be found in both the technology itself and the companies which control access to it. (1998: 620) Most of those who have opposed the proliferation of money-laundering countermeasures have done so without seriously questioning the loss-of- control narrative. For example, accepting the narrative, many nancial institutions focus on what they perceive as the unacceptable costs of the initiatives. For example, it is argued that the costs associated with standardizing payment order communication formats for policing purposes will eliminate the chief attraction of wire transfers as inexpensive, speedy, efcient payment mechanisms. US nancial institutions have voiced concern also that their global competitiveness may be undercut as customers seek to deposit their money in less surveillance-intensive environments. Further, focusing on costs, civil liberty advocates argue that the proliferation of surveillance-intensive anti-money-laundering initiatives has substantially eroded traditional presumptions of nancial privacy. Again, underscoring New Media & Society 7(4) 496 costs, other critics contend that the US states drive to export its surveillance-intensive countermeasures to other countries, particularly developing countries, unfairly undercuts the economic development strategies. 14 Most of these arguments contain important truths. However, the basic problem is that the general acceptance of the loss-of-control theme has led to a fundamental misunderstanding of the forces driving the money- laundering problem and US law enforcements responses to it. Specically, by characterizing the state as purely reactive, the loss-of-control narrative greatly understates the degree to which the US state has actually helped to create the conditions that have generated and exacerbated the money- laundering problem and the calls for enhanced surveillance powers. In large measure, this is due to the fact that the loss-of-control narrative takes the problem as a given (technical innovations are exacerbating the money- laundering problem). Only the means to its solution is in doubt (how much additional surveillance is necessary to bridge the technology gap between law enforcement and its criminal adversaries, and at what cost?). The result is that the narrative is bereft of any understanding or explanation of the key social forces and social contexts that have shaped the money-laundering problem. In what follows, an alternative narrative is sketched. This narrative reverses the terms of the argument. Instead of placing technology developments at the center of analysis, it begins with an examination of how the money- laundering problem has been constituted. It is within this broader inquiry that questions are asked about the role played by technological developments in exacerbating the money-laundering problem. 15 Two conceptual positions sensitize the analysis. The rst is found in a particular variant of state theory, which holds that the state does not simply react to external factors (e.g. technological changes, the pressure of various societal interests) but often makes policy based on its own irreducible interests. These include the political and bureaucratic interests of state actors, and law-enforcement and national security surveillance interests (Giddens, 1985; Mann, 1986; Mouzelis, 1990). This strand of theory suggests that it is important to examine how state actors have shaped and interacted with money- laundering practices and how developments in technology have enabled and constrained state actors as they pursue their interests. It also directs the analyst to examine the policies that state actors initiate in order to take advantage of technological developments or to respond to the control problems precipitated by technical change. The second position is found in some critical approaches to the study of social control and social deviance (Andreas, 2000; Marx, 1980). Contrary to the conventional notion that social deviance and rule-breaking behavior occurs because of lack of social control, these approaches suggest that in many situations the presence of Shields: When the information revolution and the US security state collide 497 social control can actually help to explain the rule-breaking behavior. In essence, the claim is that social controllers can often create, reproduce and escalate what they set out to control. Central to this position is the importance of examining the interdependence that may exist between law- breakers (i.e. money launderers, drug trafckers and terrorists) and the authorities (i.e. law enforcement and regulators). BEYOND LOSS-OF-CONTROL The thrust of the alternative narrative is that the escalation of the US states failed War on Drugs has been the key factor driving the money-laundering problem and law enforcements response to it. The inuence of the information revolution on money-laundering practices and anti-money- laundering initiatives must be assessed and weighed in relation to this dynamic. The War on Drugs In the post-Cold War era concerns about organized crime, particularly drug trafcking, have joined with terrorism to dominate the US domestic and international security agendas. This shift in priorities is reected in the fact that law enforcement has been the fastest (and one of the only) areas of federal government expansion in the last decade or so. Until very recently, the US states ongoing War on Drugs was the key factor driving this expansion (Andreas, 1999a; see also Sheptycki, 1996). Characterized by the language, strategies and tools of military deterrence, the US states approach is premised on the notion that the best way to solve the problems of drug abuse and addiction is to prohibit the supply of illicit drugs. That is, if law enforcement can restrict the growing, manufacturing, distribution and sale of illicit drugs, they will become scarce, their prices will rise, and drug consumption will stop. This approach has entailed a variety of policies: pressuring foreign governments to eliminate the production of coca, poppy and marijuana production; targeting drugs at or en route to US borders using planes, boats, border patrols and custom ofcers to interdict drug shipments; and going after drugs within the US by trying to locate, arrest and prosecute drug dealers and to seize drug supplies (Bertram et al., 1996). It has been evident for some years now that this supply-side approach has failed miserably; both the supply of drugs and levels of abuse and addiction remain high. Moreover, the collateral damage associated with the supply- side approach has been staggering: crime and health problems have been exacerbated, race and class divisions have deepened and law enforcement corruption in the US and in the source countries has intensied. In spite of this dismal record, the policy response to this failure has been to escalate the supply-side approach by getting tougher, by applying more funding and more repower to the problem. In the process, law enforcement agencies New Media & Society 7(4) 498 have thrived; agency budgets have grown and their tasks have expanded (Bertram et al., 1996). In short, these agencies have developed a strong material interest in continuation of this supply-side approach. As Andreas (1999b) has convincingly shown, the US states War on Drugs illustrates both the power and the limits of the state; even as the state fails to deter the illicit drug trade, there is no illicit drug trade without the state. The state shapes the drug trade in at least three ways. First, the state literally creates businesses for criminal organizations; state-created and enforced drug laws provide the very opening for (and high protability of) smuggling drugs. Just as alcohol prohibition helped to fuel the growth of organized crime in the US, drug prohibition has been a major impetus for the emergence of drug-trafcking organizations. Second, law enforcement plays an important role in shaping the illicit drug trade. For example, US law enforcement pressure on cocaine smuggling through South Florida in the early 1980s simply caused drug trafckers to shift to Mexican smuggling routes. More effective air interdiction efforts caused trafckers to rely more on commercial cargo shipping. Third, as law enforcement efforts escalate, many inefcient suppliers and distributors of illicit drugs are pushed out of business, replaced by others who are better organized and more sophisticated at evading law enforcement. Supply-side dynamics, money laundering and the follow-the-money approach The dynamics of the supply-side approach have contributed in a foundational way to the money-laundering problem. In its Annual Report for 19967, the FATF (1997) identied drug trafcking as the single biggest source of illegal proceeds. These illicit funds have been generated by illegal businesses that exist and ourish because of drug prohibition laws. Put differently, the US state indirectly helps to generate the illicit ow of funds that later become the target of law enforcement efforts to eradicate drug trafcking. Supply-side dynamics have also conditioned and shaped law enforcements anti-money-laundering practices and the calls for more surveillance powers. In the last decade or so, the follow-the-money approach has been portrayed repeatedly as an indispensable supply-side tool. A reading of the policy debates on the various surveillance initiatives surveyed above shows that the War on Drugs is by far the most cited justication for these initiatives. In fact, the follow-the-money approach was a creation of the War on Drugs. In the mid-1980s, the strategy of interdicting and conscating laundered proceeds emerged as a central supply-side technique; it was thought that taking assets accumulated by drug trafckers would remove simultaneously the motive (prot) and the means (operating capital) to commit further crimes (Naylor, 2002: 247). Congress provided the legal Shields: When the information revolution and the US security state collide 499 framework for this approach when it passed the Money Laundering Control Act of 1986, which made money laundering a crime in its own right for the rst time. Equally consequential was the passage of the Anti-Drug Abuse Act of 1988, which increased the penalties for money laundering to include forfeiture to law enforcement of any assets involved in illegal transactions related to money laundering (Maroldy, 1991; Stessens, 2000). In essence, this legislation gave law enforcement a nancial stake in the follow-the- money strategy. As a result, many law enforcement agencies across the US have become highly dependent on income from asset forfeiture, and there is evidence of goal displacement as enforcement agencies increasingly target forfeitable assets, which are associated with economically motivated crime rather than serious violent offenders (Blumenson and Nilsen, 1998). As evidence of the effectiveness of the follow-the-money approach, top law enforcement ofcials most often point to the huge amounts of laundered drug money seized from bank accounts and other sources in high-prole police actions such as Operation Casablanca, Operation Polar Cap, and Operation Greenback (e.g. US Department of Treasury, 1999, 2002). These statistics are used with other body count numbers the number of drug trafckers captured, the amount of drugs seized and destroyed, and so on as evidence of success in the War on Drugs, even as the ow of illicit funds and supply of illicit drugs ows unabated (Levi, 2002). Supply-side dynamics, ICT and the logic of escalation Certainly, the technologies associated with the information revolution have presented businesses in the illicit economy with opportunities for greater efciencies (International Narcotics Control Board, 2001). As already noted, drug trafckers have made heavy use of electronic funds transfer networks to launder prots more efciently and to evade law enforcement more easily. An appreciation of supply-side dynamics suggests that the emergence of the follow-the-money approach in the mid-1980s provided drug trafckers with an incentive to use electronic funds transfer networks for laundering prots. That is, as law enforcement efforts began a full-scale assault on traditional money laundering operations which involved smuggling illicit funds across borders, drug trafckers migrated to the recently-deployed electronic transfer networks. After all, these networks were widely publicized as being more difcult to police than traditional methods of layering. As a result, electronic funds transfer networks emerged as the most common method of laundering money, as discussed earlier. This development has been depicted as a major loss of state control in discussions concerning the impact of the information revolution on money laundering and in the policy debates on the various money-laundering countermeasures. Assuming the moral correctness and unproblematic nature New Media & Society 7(4) 500 of the supply-side approach, the problem is viewed primarily as a technological one; advances in ICT enable drug trafckers and other criminals to circumvent the law. Law enforcements surveillance initiatives are portrayed as defensive responses that will restore control. This is misleading. It glosses over the fact that the US states failed supply-side approach to the illicit drug trade has created the conditions which have led to the call for these surveillance initiatives. It is the very existence of the supply-side controls which has made it necessary for many drug trafckers to try to circumvent them, by drawing on recent ICT developments, for example. It is this dynamic, not technical innovation per se, which has exacerbated the money-laundering problem and called forth recent surveillance initiatives. These initiatives, which are the product of supply-side escalation, should be viewed as visible signs of the US states resolve that may well create the conditions for further escalation. For example, as noted above, by the late 1980s and early 1990s, drug trafcking organizations were heavily using electronic funds transfer systems to launder their prots. As law enforcement agencies began to meet this challenge by developing the capability to monitor the various choke points in electronic funds transfer processes, the more sophisticated drug trafckers responded by adopting a number of strategies to stay one step ahead of law enforcement. One strategy has been to reduce the risk of detection at the choke points. For example, money launderers have attempted to get on the list of businesses exempted from ling CTRs some types of businesses are automatically exempt because they generate large amounts of cash. Setting- up or purchasing such a business allows the launderer to make deposits that avoid scrutiny by FAIS (Naylor, 2002). As the risk of laundering money over electronic funds transfers systems has increased, a second strategy has been to develop new ways of smuggling cash across borders. Thus in the mid-1990s, FATF noted an appreciable rise in the amount of illicit funds moving covertly across borders: Criminals have shown great sophistication in these operations, often purchasing businesses engaged in the shipment of goods and hiding dirty money inside the product (1996: 5). Yet another strategy has been to shift some laundering operations to internet gambling sites. Typically, the launderer buys chips in order to gamble (e.g. with a credit card). While the launderer usually loses a percentage of the funds, this is a price they are willing to pay to clean the money. At the end of the gambling session, the launderer cashes in their chips and takes payment by means of a draft which can be paid into the launderers account. The payment will appear to come from a legitimate source the casino. Given that many internet gambling sites are located offshore, it is difcult for law enforcement to access the relevant records (Financial Action Task Force, 2001; Mueller, 2002; Philippsohn, 2001). Shields: When the information revolution and the US security state collide 501 Commenting on these sorts of evasive strategies, law enforcement ofcials simultaneously praise their own progress (e.g. the passage of various surveillance initiatives aimed at attacking money laundering on electronic funds transfer networks) while pointing to the emergence of these formidable new threats. These threats are used, in turn, to justify calls for further regulatory measures (e.g. Gest, 2003; Morris, 1997; Sloan, 2000). The point here is that drug trafckers who respond to drug enforcement supply-side techniques with alternative laundering techniques provide a rationale for more supply-side tools. Escalation, in other words, feeds on itself. In this upward spiral, the fact that the follow-the-money approach and the proliferation of surveillance initiatives have not reduced the ow of illicit funds or the supply of illicit drugs is not seen as a reason for questioning the approach. Rather, it is only interpreted as evidence that more surveillance, intelligence and forfeiture are required. Taking the loss-of-control narrative for granted, it is all too easy to accept that nancial privacy may need to be trimmed so the state can begin once again, through new surveillance powers, to regain control and so protect public safety and national security. The export of surveillance-intensive money laundering countermeasures to unwilling countries can be justied in a similar way in this narrative. In this scenario, whatever erosion of privacy (or national sovereignty) occurs is an unfortunate but necessary sacrice in what is a just war. By contrast, the alternative narrative sketched out above suggests that it is more accurate to view this erosion as yet another instance of collateral damage in the failed War on Drugs. This narrative also suggests that a fundamental shift in US drug policy would have important implications for the US states current policy of intensifying law-enforcement surveillance of the nancial system and the electronic networks that increasingly undergird the system. An alternative approach could involve putting greater emphasis on actions and resources that address the fundamental causes of the problem, namely the demand for drugs and the lack of economic opportunities in both developing countries and US urban centers (see Bertram et al., 1996). Given that the law enforcement establishment has developed a strong material interest in the supply-side approach in general, and the follow-the-money strategy in particular, there may be little chance of such a reversal in the near future. THE NEW WAR ON TERRORISM In the past year or so, the US states ongoing War on Drugs has been eclipsed by its new War on Terrorism. Immediately following the attacks on the World Trade Center and the Pentagon, attention quickly focused on how the attacks were nanced. Telecommunication technology appears to have played a signicant role. As the FATF recently observed: New Media & Society 7(4) 502 [E]xamination of the nancial connections between the September 11 hijackers and their overseas accounts showed that most of the individual transactions were small sums, that is, less than $10,000 and in most cases the operations consisted of nothing more than wire transfers. (2002: 6) Apparently, the funds were transferred to the US using the Al-Barakaat network, a money transmitter service based in the Persian Gulf region (Beckett, 2001). As discussed earlier, the Bush administration has portrayed anti-money- laundering initiatives as pivotal weapons in the new War on Drugs. It rushed to close the Al-Barakaat network and pushed Congress to enact sweeping new money laundering countermeasures. Congress obliged by passing Title III of the USA Patriot Act of 2001. The legislation adapts and builds on the anti-money laundering tools used to wage the War on Drugs (Hinterseer, 2002). For example, as alluded to earlier, the legislation conscripts into service numerous businesses that previously had limited or no involvement in the struggle against money laundering (Lyden, 2003: 219). With more traditional nancial institutions involved, these businesses are now required to le CTRs and suspicious transaction reports. The legislation also provides substantial incentives to err on the side of maximum reporting, since various institutions covered by the Act are held liable for failure to identify terrorist activities. Despite the heavier penalties at stake for failing to identify suspicious activities, no clearly dened standards for what constitutes suspicious activities have been developed (Lyden, 2003). Section 326 of the USA Patriot Act of 2001 also requires that nancial institutions develop a customer identication program. This new regulation mandates all nancial institutions to verify customers identities, maintain records relating to identity verication and determine whether customers appear on any list of suspected terrorists or terrorist organizations (Financial Crimes Enforcement Network, 2003). Banks are now required to know more about their overseas counterparts before agreeing to send and receive wire transfers from them (Stevenson and Wayne, 2002). And, as alluded to earlier, there has been an attempt to internationalize the US Department of Treasurys 1996 record-keeping rules associated with wire transfers. Mirroring previous debates, some industry actors have expressed concerns about the costs of these policies and regulations. One commentator summarizes the concerns as follows: The War on Terrorism is hitting nancial-service companies hard ... Every couple of months, the Treasury Department proposes rules that force banks to collect more data, dig deeper into databases, and rene their analyses, increasing the regulatory burden on an industry struggling to comply with existing rules. (Cuneo, 2003: 1) Shields: When the information revolution and the US security state collide 503 For some, this administrative burden could well decrease the competitiveness of US nancial institutions (Haggman, 2002; Quittner, 2002). As in previous debates, civil liberty advocates perceive the initiatives as posing serious dangers to citizens rights. For example, to further enhance law enforcements ability to detect suspicious activity, the USA Patriot Act of 2001 suspends normal bank secrecy rules so that nancial institutions can share information with one another regarding individuals who are suspected of possible terrorist or money-laundering activity. They can do so without facing any liability to their customers. For Schulhofer, this step will make more banks aware of more reasons for considering consumer transactions suspicious and will further increase the ow of reports to the government ... [T]he implications of this change for a customers ability to maintain condentiality vis-` a-vis competitors and private sector snoops are far-reaching and as yet barely understood. (2002: 53) In addition to law enforcement, agencies such as the Central Intelligence Agency (CIA) are able to receive suspicious activity reports under the provisions of the USA Patriot Act of 2001. It also provides law enforcement and intelligence agencies with easier access to individual credit reports without notice or third-party review. According to Murphy and Corrigan, these provisions put the CIA ... back in the business of spying on Americans, and law enforcement and intelligence agencies ... have access to a range of personal nancial information without ever showing good cause as to why such information is relevant to a particular investigation. (2001: 1) The justications for the post-September 11 initiatives have taken a familiar form. Law enforcement agencies are emphasizing a variation of the loss-of-control theme as the rationale for expanding their surveillance powers. A combination of technical factors (e.g. terrorists continued use of wire transfer systems and other laundering techniques) 16 and customer condentiality requirements are said to be obstructing effective intelligence- gathering, thus undermining effective control of the terrorist problem. The solution is to solve the technical and procedural problems and scale back privacy safeguards where necessary. Probing questions about the historic role that the US state and other social forces have played in conditioning and shaping the terrorist threat are declared unpatriotic and pushed into the shadows, as the struggle to gather more intelligence (in order to regain control) takes center stage. Clearly, the burgeoning surveillance capabilities designed into the nancial system over the last decade or so were unable to detect the ow of funds to the hijackers. Yet this not seen as a reason for questioning the wisdom of this approach. 17 Rather, it is only interpreted as evidence that more surveillance and more intelligence are required. New Media & Society 7(4) 504 Perhaps the lesson from the War on Drugs is that the emphasis on containment and control through technical means may lead to further escalation of law enforcements surveillance of nancial transactions, as those committed to attacking Americans nd new ways of moving their funds. As they nd ways to circumvent existing money laundering laws, no doubt law enforcements response will be to apply more of the same. And as the federal law enforcement establishment develops a deepening material interest in this escalation (e.g. budget growth may depend on it), this process may be difcult to reverse. Certainly, more erosion of nancial privacy can be expected if this scenario plays out. CONCLUSION Is the information revolution eroding the ability of law enforcement to regulate money laundering? Will enhanced surveillance of nancial transactions increase the US states capacity to control money laundering? The foregoing analysis suggests that the answer to this question is a good deal more complicated than the loss-of-control narrative suggests. To the extent that ICT developments have posed control problems for law enforcement in the last decade or so, this is in large measure due to the US states supply-side approach to the drug problem. This approach has provided the conditions for a vigorous dialectic between law enforcement on the one hand, and illicit businesses engaged in the production and distribution of illicit drugs on the other. Within this context, ICTs have emerged as key resources and sites of struggle. On the look out for more efcient and less risky ways of conducting their business, money launderers turned to electronic funds transfer networks. This certainly caused control problems for law enforcement agencies and regulatory authorities. These agencies and authorities responded by drawing on computer database technology and articial intelligence techniques, for example, in an attempt to detect ows of illicit electronic funds. Have these measures enhanced law enforcements regulatory capacity? The augmentation of law enforcements surveillance powers has done little to enhance its ability to curb money-laundering practices effectively. However, it does appear to have had a signicant effect on how money laundering is conducted; increased surveillance of electronic funds transfer networks has provided some money launderers (although certainly not all) with an incentive to nd alternative money-laundering techniques. At another level, however, this augmentation of surveillance powers has provided law enforcement agencies and regulatory authorities with greater control over legitimate nancial transactions, by stripping away traditional privacy protections. If cyberpayment systems catch on, the foregoing analysis suggests that money launderers will shift some of their operations to the new systems if the risks of doing so compare favorably with other laundering methods. Shields: When the information revolution and the US security state collide 505 If this shift occurs, we can expect a proliferation of law enforcement countermeasures. This will, in turn, provide an incentive for drug trafckers and terrorists engaged in money laundering to develop or exploit alternative laundering methods. Further erosion of nancial privacy is likely to occur as this scenario plays out, even as the regulations continue to have a minimal effect on curtailing money laundering. The loss-of-control narrative not only oversimplies the relationship between developments in ICT and money laundering, it also masks the root causes of much of the money laundering problem. Put differently, the technological determinism that resides at the heart of the loss-of-control narrative functions to narrow the scope of policy analysis ... to encompass only those changes within the established institutional structure (Melody, 1973; see also Jackson, 2002; Shields, 2002). The narratives heavy emphasis on technology development as the major force exacerbating the money- laundering problem has served to deect attention from the US states failed supply-side approach to the illicit drug trade in general, and its follow-the money strategy in particular. This has beneted those institutional interests that have gained most from these approaches the law enforcement establishment. The alternative narrative suggests that decision-makers need to confront the full range of policy options, including those that will ow logically from a reframing of the money laundering, drug trafcking and terrorism problems. As Rider (2002) notes: To date, we have not even started to frame the right questions, let alone devise the answers. Passing more laws or pouring more resources into the battle will not win the war. It requires a more thoughtful and measured balancing of the right response to the real threat. Dwelling on control crises ostensibly precipitated by the information revolution will contribute little to reducing the risk of a spiraling erosion of civil liberties. Indeed, as a central theme of the loss-of-control narrative, it may provide a key rationale for further erosions. Acknowledgements The author would like to thank two anonymous reviewers for their helpful comments. Notes 1 My analysis has been inspired in large part by Andreas (2000) study of the politics of border control in the United States. Andreas illuminates how the elaboration of a loss-of-control narrative functions to support the increase of border controls a policy which fails to deter the illegal drug trade or illegal immigration. 2 The practice of money laundering has been around for at least 3000 years (see Naylor, 2002). As discussed later in the article, the practice was criminalized in the US in the 1980s. New Media & Society 7(4) 506 3 For a discussion of the methodology underlying theses calculations see van Duyne (1998). 4 According to the US Ofce of Technology Assessment (1995), approximately 0.05 percent of all transfers on Fedwire, CHIPS and SWIFT (roughly 250 transactions a day) involve money laundering. 5 This was mandated by the Bank Secrecy Act of 1970. The legislation was not rigorously enforced until the mid-1980s when the War on Drugs was stepped up (Nadelmann, 1993). 6 To encourage these reports, the regulations include a safe harbor provision protecting nancial institutions and their employees from customers civil liability actions. 7 These rules would have required nancial institutions to: identify their customers; determine the source of funds for each customer; determine the normal and expected transactions of each customer; monitor each customers account activity and measure it against historical patterns; and report any transactions that are suspicious because they do not conform to historical patterns (Nojeim, 1999). 8 In recent years, FATF has waged a name and shame campaign against non- compliant countries. In essence, the campaign involves the publication of a list of countries whose detrimental practices seriously and unjustiably hamper the ght against money laundering (Financial Action Task Force, 2000). The idea is that through publication of this list, the countries named will have pressure exerted on them by the international community to adopt various money-laundering countermeasures. 9 Since 1987, the number of CTRs led has tended to increase by 12 percent a year. In 1994, 50 million CTRs alone were led and this gure was expected to double in the next three years. Meanwhile, between 1996 and 1999 the number of SARs increased from 49,786 to 120,506, before falling back in 2000 to 100,353 (Hinterseer, 2002). 10 Link analysis is a technique used to explore associations among a large number of objects of different types (e.g. people, bank accounts, businesses, cash deposits, wire transfers). 11 The US Ofce of Technology Assessment (1995) noted that the proposal would require the roll-back of current privacy protections under law. For example, the Electronic Communications Privacy Act of 1986 currently limits government access to wire transfer records, and specically bars a service provider from monitoring communications for evidence of criminal conduct. This provision would have to be changed or new legislation written to allow the proposed wire transfer monitoring. 12 For information on recent developments in smart cards see Mondex Internationals website (www.mondex.com). See www.digicash.com for details on digital cash products. The Group of Ten (2000) provides a thorough overview of cyberpayment pilot projects around the globe. 13 While these comments were made in the context of the debate on new cyberpayment systems, the debates over electronic funds transfer networks are suffused with similar rhetoric. For example, see US Ofce of Technology Assessment (1995). 14 An overview of much of this opposition discourse can be found in Hinterseer (2002), Naylor (2002), and Rahn (1999). 15 See Schlesinger (1987) for a discussion of this approach to studying the societal inuences of ICTs. Shields: When the information revolution and the US security state collide 507 16 Another technique which has received a good deal of press since September 11 involves the IndoPakistani hawala (or trust) systems. These systems came into being in part because formal banking services, at least for ordinary people, were so poor. The systems provide a cheap and trustworthy method for emigr e workers to send money to their families. Typically, transfers do not involve the movement of cash, are paperless and practically recordless. For a discussion of how the system works, see Grabosky and Smith (1998) and Naylor (2002). According to US law enforcement agencies, these systems are used by Al-Qaeda operatives to launder funds (e.g. Thachuk, 2002). 17 Given that the incoming transfers were kept under $10,000, the banks used by the hijackers did not le CTRs. However, as noted earlier, banks are mandated to le SARs on transactions under $10,000 if they have reason to believe that the transactions are suspicious. None of the banks detected unusual patterns in the hijackers accounts. Therefore no SARs were led with FinCEN (Risen, 2002). References American Bankers Association Money Laundering Task Force (1989) Toward a New National Drug Policy The Banking Industry Strategy, reprinted in Congressional Record 135(64), Sec. 5555. Andreas, P. (1999a) When Policies Collide: Market Reform, Market Prohibition, and the Narcotization of the Mexican Economy, in R.H. Firman and P. Andreas (eds) The Illicit Global Economy and State Power, pp. 12541. New York: Rowman & Littleeld. Andreas, P. (1999b) Smuggling Wars: Law Enforcement and Law Evasion in a Changing World, in T. Farer (ed.) Transnational Crime in the Americas, pp. 8598. New York: Routledge. Andreas, P. (2000) Border Games: Policing the USMexico Divide. Ithaca, NY: Cornell University Press. Baldwin, F.N. (1996) Money Laundering and Wire Transfers: When the New Regulation Takes Effect Will They Help?, Dickinson Journal of International Law 14(3): 41358. Beckett, P. (2001) Suspect Network Used Major US Banks to Make Wire Transfers, Wall Street Journal, 9 November, p. A4. Bertram, E., M. Blachman, K. Sharpe and P. Andreas (1996) Drug War Politics: The Price of Denial. Berkeley, CA: University of California Press. Blumenson, E. and A. Nilsen (1998) Policing for Prot: The Drug Wars Hidden Economic Agenda, University of Chicago Law Review 65(Winter): 35114. Cuneo, E.C. (2003) Beyond Compliance: Financial Companies Want to Turn Regulatory Burden into Competitive Advantage, Information Week, 24 February, URL (consulted July 2003): http://www.informationweek.com/story/ IWK20030223S0002 Financial Action Task Force (1996) FATFVII Report on Money Laundering Typologies, URL (consulted December 2002): http://www1.oecd.org/fatf/pdf/ TY1996_en.pdf Financial Action Task Force (1997) 199697 Report on Money Laundering Typologies, URL (consulted December 2002): http://www1.oecd.org/fatf/pdf/TY1997_en.pdf Financial Action Task Force (2000) Report on Non-Cooperative Countries and Territories,URL (consulted December 2002): http://www1.oecd.org/fatf/pdf/ NCCT_en.pdf New Media & Society 7(4) 508 Financial Action Task Force (2001) Annual Report 20002001, URL (consulted December 2002): http://www1.oecd.org/fatf/pdf//AR2001_en.pdf Financial Action Task Force (2002) Report on Money Laundering Typologies 20012002, URL (consulted December 2002): http://www1.oecd.org/fatf/pdf/ TY2002_en.pdf Financial Action Task Force (2003) Forty Recommendations, URL (consulted July 2003): http://www.oecd.org/dataoecd/12/26/2789371.pdf Financial Crimes Enforcement Network (2000) A Survey of Electronic Cash, Electronic Banking and Internet Gaming, URL (consulted December 2002): http:// www.ustreas.gov/ncen/e-cash.pdf Financial Crimes Enforcement Network (2003) National Money Laundering Strategy, URL (consulted August 2003): http://www.treas.gov/press/releases/reports/ js10102.pdf Gest, J. (2003) House Wants to Inhibit Offshore Internet Gambling, Los Angeles Times, 11 June, p. 38. Giddens, A. (1985) The Nation-state and Violence. Berkeley, CA: University of California Press. Good, B.A. (2000) The Changing Face of Money: Will Electronic Money Be Adopted in the United States? New York: Garland Publishing. Grabosky, P. and R.G. Smith (1998) Crime in the Digital Age. New Brunswick, NJ: Transaction Books. Group of Ten (2000) Electronic Money: Consumer Protection, Law Enforcement, Supervisory and Cross Border Issues, URL (consulted December 2002): http:// www.bis.org/publ/gten01.htm Haggman, M. (2002) Law Targeting Terrorist Funding Sources Proves to Be Windfall for Professional Services Firms, Palm Beach Daily Business Review, 1 July, p. 6. Harte, B. (1995) Banking, in R. Parlour (ed.) Butterworths International Guide to Money Laundering Law and Practice, pp. 24364. London: Butterworth. Helleiner, E. (1998) Electronic Money: A Challenge to the Sovereign State?, Journal of International Affairs 51(2): 387409. Helleiner, E. (1999) State Power and the Regulation of Illicit Activity in Global Finance, in R.H. Firman and P. Andreas (eds) The Illicit Global Economy and State Power, pp. 5390. New York: Rowman & Littleeld. Hinterseer, K. (2002) Criminal Finance: The Political Economy of Money Laundering in a Comparative Legal Context. The Hague: Kluwer. Hughes, S.J. (1992) Policing Money Laundering Through Funds Transfers: A Critique of Regulation Under the Bank Secrecy Act, Indiana Law Journal 67: 283331. International Narcotics Control Board (2001) United Nations, Report of the International Narcotics Control Board for 2001, URL (consulted December 2002): http://www.incb.org/e/ind_ar.htm Jackson, M. (2002) From Private to Public: Reexamining the Technological Basis for Copyright, Journal of Communication 52(2): 41633. Kimery, A.L. (1993) Big Brother Wants to Look into Your Bank Account, URL (consulted December 2002): http://www.wired.com/wired/archive/1.06/ big.brother_pr.html Levi, M. (2002) Money Laundering and its Regulation, Annals of the American Academy of Political and Social Science 582: 181200. Lyden, G.A. (2003) The International Money Laundering Abatement and Anti-terrorist Financing Act of 2001: Congress Wears a Blindfold While Giving Money Laundering Legislation a Facelift, Fordham Journal of Corporate and Financial Law 8(1): 20150. Shields: When the information revolution and the US security state collide 509 Mann, M. (1986) The Sources of Powers. Cambridge: Cambridge University Press. Maroldy, L.M.L. (1991) Recordkeeping and Reporting in an Attempt to Stop the Money Laundering Cycle: Why Blanket Recording and Reporting of Wire and Electronic Funds Transfers is not the Answer, Notre Dame Law Review 66(4): 863916. Marx, G. (1980) Ironies of Social Control: Authorities as Contributors to Deviance Through Escalation, Non-enforcement and Covert Facilitation, Social Problems 28(3): 22144. Melody, W.H. (1973) The Role of Advocacy in Public Policy Planning, in G. Gerbner, L.P. Gross and W.H. Melody (eds) Communication Technology and Social Policy: Understanding the New Cultural Revolution, pp. 16581. New York: Wiley and Sons. Molander, R.C., D.A. Mussington and P.A. Wilson (1998) Cyberpayments and Money Laundering: Problems and Promises. Santa Monica, CA: RAND Corporation. Morris, S., Financial Crimes Enforcement Network (1996) Testimony before the US House Appropriations Committee, Subcommittee on the Treasury, Postal Service, and General Government, 12 March (accessed via Lexis-Nexis). Morris, S., Financial Crimes Enforcement Network (1997) Testimony Before the US House Committee on Banking and Financial Services, Subcommittee on General Oversight and Investigations, 12 March, URL (consulted July 2003): http:// www.globalsecurity.org/security/library/congress/1997_h/hba38919_0.htm Mouzelis, N. (1990) Post-Marxist Alternatives: The Construction of Social Orders. New York: St Martins Press. Mueller, R., Federal Bureau of Investigation (2002) Testimony Before the US House Financial Services Committee, 19 September, URL (consulted December 2002): http://www.fbi.gov/congress/congress02/mueller091902.htm Murphy, L.W. and K. Corrigan (2001) American Civil Liberties Union, Letter Opposing the Financial Anti-Terrorism Act of 2001, 16 October, URL (consulted July 2003): http://archive.aclu.org/congress/1101601a.html Mussington, D.A., P.A. Wilson and R.C. Molander (1998) Exploring Money Laundering Vulnerabilities Through Emerging Cyberspace Technologies. Santa Monica, CA: RAND Corporation. Nadelmann, E.A. (1993) Cops Across Borders: The Internationalization of US Criminal Law Enforcement. University Park, PA: Pennsylvania State University Press. Naylor, R.T. (2002) Wages of Crime: Black Markets, Illegal Finance, and the Underworld Economy. Ithaca, NY: Cornell University Press. Nojeim, G.T., American Civil Liberties Union (1999) Testimony on Financial Privacy, Reporting Requirements Under the Bank Secrecy Act and the Know Your Customer Regulations before the US House Banking Committee, Subcommittee on General Oversight and Investigations, and Financial Institutions and Consumer Credit, 20 April, URL (consulted July 2003): http://www.aclu.org/Privacy/ Privacy.cfm?ID=8990&c =40 Philippsohn, S. (2001) Money Laundering on the Internet, Computer & Security 20(6): 48590. Quittner, J. (2002) Guaging the New Laws Consumer Impact, American Banker, 23 April, p. 11. Rahn, R.W. (1999) The End of Money and the Struggle for Financial Privacy. Seattle, WA: Discovery Institute. Rahn, R.W. (2000) Testimony on the Future of Electronic Payments before the US House Committee on Banking and Financial Services, Subcommittee on Domestic New Media & Society 7(4) 510 and International Monetary Policy, 19 September, URL (consulted July 2003): http://commdocs.house.gov/committees/bank/hba66988.000/hba66988_0.HTM Reinicke, W.H. (1998) Global Public Policy: Governing Without Government? Washington, DC: Brookings Institution Press. Richards, J.R. (1998) Transnational Criminal Organizations, Cybercrime and Money Laundering. New York: CRC Press. Rider, B. (2002) Organized Crime and Terrorism: Tracking and Attacking the Assets of Economic Crime and Terrorism, URL (consulted December 2002): http:// www.iccwbo.org/home/news_archives/2002/stories/barry%20rider.asp Risen, J. (2002) Traces of Terror: The Money Trail, New York Times, 16 July, p. A16. Rueda, A. (2001) The Implications of Strong Encryption Technology on Money Laundering, Albany Law Journal of Science and Technology 12(1): 142. Schlesinger, P. (1987) On National Identity: Some Conceptions and Misconceptions Criticized, Social Science Information 26(2): 21964. Schulhofer, S.J. (2002) The Enemy Within: Intelligence Gathering, Law Enforcement, and Civil Liberties in the Wake of September 11. New York: Century Foundation Press. Shelley, L.I. (1998) Crime and Corruption in the Digital Age, Journal of International Affairs 51(2): 60520. Sheptycki, J.W.E. (1996) Law Enforcement, Justice and Democracy in the Transnational Arena: Reections on the War on Drugs, International Journal of the Sociology of Law 24(1): 6175. Shields, P. (2002) Technology Determinism, the State and Telecom Surveillance, in R. Mansell, R. Samarajiva and A. Mahan (eds) Networking Knowledge for Information Societies: Institutions and Interventions, pp. 195201. Delft: Delft University Press. Sica, V. (2000) Cleaning the Laundry: States and the Monitoring of the Financial System, Millennium: Journal of International Studies 29(1): 4772. Sloan, J.F., Financial Crimes Enforcement Network (2000) Testimony before the US House Committee on Reform, Subcommittee on Criminal Justice, Drug Policy and Human Resources, 23 June (accessed via Lexis-Nexis). Sloan, J.F., Financial Crimes Enforcement Network (2003) Testimony before the US House Committee on Financial Services, Subcommittee on Oversight and Investigations, 11 March, URL (consulted July 2003): http://www.ncen.gov/ james_sloan_statement_031103.pdf Solomon, E.H. (1997) Virtual Money: Understanding the Power and Risks of Moneys High- speed Journey into Electronic Space. New York: Oxford University Press. Stessens, G. (2000) Money Laundering: A New International Law Enforcement Model. Cambridge: Cambridge University Press. Stevenson, R.W. and L. Wayne (2002) More Regulations to Thwart Money Laundering are Imposed, New York Times, 23 April, p. A13. Strange, S. (1998) Mad Money: When Markets Outgrow Governments. Ann Arbor, MI: University of Michigan Press. Swire, P. (1999) Financial Privacy and the Theory of High-Tech Government Surveillance, Washington University Law Quarterly 77(2): 461555. Thachuk, K.L. (2002) Terrorisms Financial Lifeline: Can it be Servered?, Strategic Forum 191(May): 17. Van Duyne, P.C. (1998) Money Laundering: Pavlovs Dog and Beyond, Howard Journal of Criminal Justice 37(4): 35974. US Department of Treasury (1999) National Money Laundering Strategy for 1999, URL (consulted December 2002): http://www.ustreas.gov/ofces/enforcement/ ml1999.pdf Shields: When the information revolution and the US security state collide 511 US Department of Treasury (2000) United States Department of TreasuryFinancial Crimes Enforcement Network 20002005 Strategic Plan, URL (consulted December 2002): http://www/treas.gov/ncen/nstrategicplan2000.pdf US Department of Treasury (2002) 2002 National Money Laundering Strategy, URL (consulted December 2002): http://www.ustreas.gov/ofces/enforcement/ml2002.pdf US Ofce of Technology Assessment (1995) Information Technologies for the Control of Money Laundering, URL (consulted December 2002): http:// www.wws.princeton.edu/~ota/ns20/year_f.html Wakeeld, J. (2000) Following the Money, URL (consulted December 2002): http:// www/govexec.com/features/1000/1000s5.htm Weatherford, J. (1997) The History of Money. New York: Crown Publishers. Weimer, W.J. (2000) Cyberlaundering: An International Cache for Microchip Money, DePaul Business Law Journal 13(1): 199245. Welling, S.N. and A.G. Rickman (1998) Cyberlaundering: the Risks, the Responses, Florida Law Review 50(2): 295343. Williams, P. (2001) Crime, Illicit Markets and Money Laundering, in P.J. Simmons and C. de Jonge Oudrat (eds) Managing Global Issues: Lessons Learned, pp. 10650. Washington, DC: Brookings Institution Press. PETER SHIELDS is a professor in the Department of Telecommunications at Bowling Green State University. He teaches and researches in the areas of telecommunication policy, the social implications of new media, and the implications of new media for national security and law enforcement. Address: 325 West Hall, Department of Telecommunications, Bowling Green State University, Bowling Green, OH, 43403 USA. [email: pshield@bgnet.bgsu.edu] New Media & Society 7(4) 512