Saturday, June 24, 2006

Deja vu all over again

Ah, the unsubstantiated assurances that their actions are legal, the attempts to hide their actions from the American public, the disdain for the media, the accusations that revelations hurt national security -- this really takes me back.

Vice President Dick Cheney said a secret program allowing U.S. officials to examine thousands of private banking records around the world was a legal and "absolutely essential" weapon in the war on terror, the New York Times reported on Saturday.

Speaking at a fund-raiser for Republican congressional candidates in Chicago on Friday, Cheney criticized the media for disclosing the program, which is run by the CIA in conjunction with the Treasury Department.

For nearly five years since the September 11 attacks, the Treasury Department has been tapping into records of the Brussels-based Society for Worldwide Interbank Financial Telecommunications, or SWIFT, for evidence of potential activity by terror groups.

The records examined mostly involve wire transfers and other methods of moving money overseas or into and out of the United States.

Cheney said the Bush administration knew it would likely be criticized for the program -- as it was for the warrant-less eavesdropping of phone calls -- but said it was necessary.

"They are conducted in accordance with the laws of the land," Cheney was quoted as saying in The New York Times. "They're carried out in a manner that is fully consistent with the constitutional authority of the president of the United States. They are absolutely essential in terms of protecting us against attacks."

The Times first reported on the financial tracking program this week in a story that Cheney said hampers U.S. security efforts.
Nothing like deflecting criticism of your questionable activities by accusing those who reveal it of hurting national security, which of course is simply a variation of the attacks questioning its critics' patriotism the administration launched on 9/12.

At this point, I would normally expect the administration to call for an investigation into the source of the leak. But with everyone's phone and e-mail records on file at the NSA, I guess that's not necessary anymore.

0 Comments:

Post a Comment

<< Home