|Headquarters||La Hulpe, Belgium|
Number of employees
The Society for Worldwide Interbank Financial Telecommunication (SWIFT), legally S.W.I.F.T. SCRL, provides a network that enables financial institutions worldwide to send and receive information about financial transactions in a secure, standardized and reliable environment. SWIFT also sells software and services to financial institutions, much of it for use on the SWIFTNet network, and ISO 9362. Business Identifier Codes (BICs, previously Bank Identifier Codes) are popularly known as "SWIFT codes".
As of 2018, around half of all high-value cross-border payments worldwide used the SWIFT network. As of 2015[update], SWIFT linked more than 11,000 financial institutions in more than 200 countries and territories, who were exchanging an average of over 32 million messages per day (compared to an average of 2.4 million daily messages in 1995). SWIFT transports financial messages in a highly secure way but does not hold accounts for its members and does not perform any form of clearing or settlement.
SWIFT does not facilitate funds transfer: rather, it sends payment orders, which must be settled by correspondent accounts that the institutions have with each other. Each financial institution, to exchange banking transactions, must have a banking relationship by either being a bank or affiliating itself with one (or more) so as to enjoy those particular business features.
SWIFT has been criticized for its inefficiency, with the Financial Times observing in 2018 that transfers frequently "pass through multiple banks before reaching their final destination, making them time-consuming, costly and lacking transparency on how much money will arrive at the other end." SWIFT has introduced its own improved service, called "Global Payments Innovation" (GPI), stating that as of 2018 it had been adopted by 165 banks, and was completing half of its payments in under 30 minutes.
SWIFT is a cooperative society under Belgian law owned by its member financial institutions with offices around the world. SWIFT's headquarters are in La Hulpe, Belgium, near Brussels. The chairman of SWIFT is Yawar Shah, originally from Pakistan, and its CEO, since July 2019, is Javier Pérez-Tasso, originally from Spain. SWIFT hosts an annual conference, called Sibos, specifically aimed at the financial services industry.
SWIFT has at various times attracted controversy for enabling the US government to monitor and in some cases interfere with intra-European transactions. (See: U.S. government involvement)
SWIFT was founded in Brussels in 1973 under the leadership of its inaugural CEO, Carl Reuterskiöld (1973–1989), and was supported by 239 banks in fifteen countries. It started to establish common standards for financial transactions and a shared data processing system and worldwide communications network designed by Logica and developed by the Burroughs Corporation. Fundamental operating procedures, rules for liability, etc., were established in 1975 and the first message was sent in 1977. SWIFT's first United States operating center was inaugurated by Governor John N. Dalton of Virginia in 1979.
SWIFT has become the industry standard for syntax in financial messages. Messages formatted to SWIFT standards can be read by, and processed by, many well-known financial processing systems, whether or not the message traveled over the SWIFT network. SWIFT cooperates with international organizations for defining standards for message format and content. SWIFT is also Registration authority (RA) for the following ISO standards: 
- ISO 9362: 1994 Banking – Banking telecommunication messages – Bank identifier codes
- ISO 10383: 2003 Securities and related financial instruments – Codes for exchanges and market identification (MIC)
- ISO 13616: 2003 IBAN Registry
- ISO 15022: 1999 Securities – Scheme for messages (Data Field Dictionary) (replaces ISO 7775)
- ISO 20022-1: 2004 and ISO 20022-2:2007 Financial services – Universal Financial Industry message scheme
The SWIFT secure messaging network is run from three data centers, one in the United States, one in the Netherlands and one in Switzerland. These centers share information in near real-time. In case of a failure in one of the data centers, another is able to handle the traffic of the complete network. SWIFT uses submarine communications cables to transmit its data.
SWIFT opened its third data center in Switzerland in 2009. In the same year SWIFT introduced new distributed architecture with two messaging zones: European and Trans-Atlantic, so data from European SWIFT members are no longer mirrored to the U.S. data center. European zone messages are stored in the Netherlands and in a part of the Switzerland operating center; Trans-Atlantic zone messages are stored in the United States and in a part of the Switzerland operating center that is segregated from the European zone messages. Countries outside of Europe were by default allocated to the Trans-Atlantic zone but could choose to have their messages stored in the European zone.
SWIFT moved to its current IP network infrastructure, known as SWIFTNet, from 2001 to 2005, providing a total replacement of the previous X.25 infrastructure. The process involved the development of new protocols that facilitate efficient messaging, using existing and new message standards. The adopted technology chosen to develop the protocols was XML, where it now provides a wrapper around all messages legacy or contemporary. The communication protocols can be broken down into:
SWIFT provides a centralized store-and-forward mechanism, with some transaction management. For bank A to send a message to bank B with a copy or authorization with institution C, it formats the message according to standard and securely sends it to SWIFT. SWIFT guarantees its secure and reliable delivery to B after the appropriate action by C. SWIFT guarantees are based primarily on high redundancy of hardware, software, and people.
SWIFTNet Phase 2
During 2007 and 2008, the entire SWIFT network migrated its infrastructure to a new protocol called SWIFTNet Phase 2. The main difference between Phase 2 and the former arrangement is that Phase 2 requires banks connecting to the network to use a Relationship Management Application (RMA) instead of the former bilateral key exchange (BKE) system. According to SWIFT's public information database on the subject, RMA software should eventually prove more secure and easier to keep up-to-date; however, converting to the RMA system meant that thousands of banks around the world had to update their international payments systems to comply with the new standards. RMA completely replaced BKE on 1 January 2009.
Products and interfaces
SWIFT means several things in the financial world:
- a secure network for transmitting messages between financial institutions;
- a set of syntax standards for financial messages (for transmission over SWIFTNet or any other network)
- a set of connection software and services allowing financial institutions to transmit messages over SWIFT network.
Under 3 above, SWIFT provides turn-key solutions for members, consisting of linkage clients to facilitate connectivity to the SWIFT network and CBTs or "computer based terminals" which members use to manage the delivery and receipt of their messages. Some of the more well-known interfaces and CBTs provided to their members are:
- SWIFTNet Link (SNL) software which is installed on the SWIFT customer's site and opens a connection to SWIFTNet. Other applications can only communicate with SWIFTNet through the SNL.
- Alliance Gateway (SAG) software with interfaces (e.g., RAHA = Remote Access Host Adapter), allowing other software products to use the SNL to connect to SWIFTNet
- Alliance WebStation (SAB) desktop interface for SWIFT Alliance Gateway with several usage options:
- administrative access to the SAG
- direct connection SWIFTNet by the SAG, to administrate SWIFT Certificates
- so-called Browse connection to SWIFTNet (also by SAG) to use additional services, for example Target2
- Alliance Access (SAA) and Alliance Messaging Hub (AMH) are the main messaging software applications by SWIFT, which allow message creation for FIN messages, routing and monitoring for FIN and MX messages. The main interfaces are FTA (files transfer automated, not FTP) and MQSA, a WebSphere MQ interface.
- The Alliance Workstation (SAW) is the desktop software for administration, monitoring and FIN message creation. Since Alliance Access is not yet capable of creating MX messages, Alliance Messenger (SAM) has to be used for this purpose.
- Alliance Web Platform (SWP) as new thin-client desktop interface provided as an alternative to existing Alliance WebStation, Alliance Workstation (soon)[when?] and Alliance Messenger.
- Alliance Integrator built on Oracle's Java Caps which enables customer's back office applications to connect to Alliance Access or Alliance Entry.
- Alliance Lite2 is a secure and reliable, cloud-based way to connect to the SWIFT network which is a light version of Alliance Access specifically targeting customers with low volume of traffic.
Treasury & Derivatives
Swift Ref, the global payment reference data utility, is SWIFT's unique reference data service. Swift Ref sources data direct from data originators, including central banks, code issuers and banks making it easy for issuers and originators to maintain data regularly and thoroughly. SWIFTRef constantly validates and cross-checks data across the different data sets.
SWIFT offers a secure person-to-person messaging service, SWIFTNet Mail, which went live on 16 May 2007. SWIFT clients can configure their existing email infrastructure to pass email messages through the highly secure and reliable SWIFTNet network instead of the open Internet. SWIFTNet Mail is intended for the secure transfer of sensitive business documents, such as invoices, contracts and signatories, and is designed to replace existing telex and courier services, as well as the transmission of security-sensitive data over the open Internet. Seven financial institutions, including HSBC, FirstRand Bank, Clearstream, DnB NOR, Nedbank, and Standard Bank of South Africa, as well as SWIFT piloted the service.
U.S. government involvement
Terrorist Finance Tracking Program
A series of articles published on 23 June 2006 in The New York Times, The Wall Street Journal, and the Los Angeles Times revealed a program, named the Terrorist Finance Tracking Program, which the US Treasury Department, Central Intelligence Agency (CIA), and other United States governmental agencies initiated after the 11 September attacks to gain access to the SWIFT transaction database.
After the publication of these articles, SWIFT quickly came under pressure for compromising the data privacy of its customers by allowing governments to gain access to sensitive personal information. In September 2006, the Belgian government declared that these SWIFT dealings with American governmental authorities were a breach of Belgian and European privacy laws.
In response, and to satisfy members' concerns about privacy, SWIFT began a process of improving its architecture by implementing a distributed architecture with a two-zone model for storing messages (see Operations centers).
Concurrently, the European Union negotiated an agreement with the United States government to permit the transfer of intra-EU SWIFT transaction information to the United States under certain circumstances. Because of concerns about its potential contents, the European Parliament adopted a position statement in September 2009, demanding to see the full text of the agreement and asking that it be fully compliant with EU privacy legislation, with oversight mechanisms emplaced to ensure that all data requests were handled appropriately. An interim agreement was signed without European Parliamentary approval by the European Council on 30 November 2009, the day before the Lisbon Treaty—which would have prohibited such an agreement from being signed under the terms of the Codecision procedure—formally came into effect. While the interim agreement was scheduled to come into effect on 1 January 2010, the text of the agreement was classified as "EU Restricted" until translations could be provided in all EU languages and published on 25 January 2010.
On 11 February 2010, the European Parliament decided to reject the interim agreement between the EU and the US by 378 to 196 votes. One week earlier, the parliament's civil liberties committee had already rejected the deal, citing legal reservations.
In March 2011, it was reported that two mechanisms of data protection had failed: EUROPOL released a report complaining that the USA's requests for information had been too vague (making it impossible to make judgments on validity) and that the guaranteed right for European citizens to know whether their information had been accessed by USA authorities had not been put into practice.
Sanctions against Iran
In January 2012, the advocacy group United Against Nuclear Iran (UANI) implemented a campaign calling on SWIFT to end all relations with Iran's banking system, including the Central Bank of Iran. UANI asserted that Iran's membership in SWIFT violated U.S. and EU financial sanctions against Iran as well as SWIFT's own corporate rules.
Consequently, in February 2012, the U.S. Senate Banking Committee unanimously approved sanctions against SWIFT aimed at pressuring the Belgian financial telecommunications network to terminate its ties with blacklisted Iranian banks. Expelling Iranian banks from SWIFT would potentially deny Iran access to billions of dollars in revenue and spending using SWIFT but not from using IVTS. Mark Wallace, president of UANI, praised the Senate Banking Committee.
Initially SWIFT denied it was acting illegally, but now says "it is working with U.S. and European governments to address their concerns that its financial services are being used by Iran to avoid sanctions and conduct illicit business." Targeted banks would be—amongst others—Saderat Bank of Iran, Bank Mellat, Post Bank of Iran and Sepah Bank. On 17 March 2012, following agreement two days earlier between all 27 member states of the Council of the European Union and the Council's subsequent ruling, SWIFT disconnected all Iranian banks from its international network that had been identified as institutions in breach of current EU sanctions and warned that even more Iranian financial institutions could be disconnected from the network.
U.S. control over transactions within the EU
On 26 February 2012 the Danish newspaper Berlingske reported that US authorities have sufficient control over SWIFT to seize money being transferred between two European Union (EU) countries (Denmark and Germany), since they succeeded in seizing around US$26,000 that was being transferred from a Danish businessman to a German bank. The transaction was automatically routed through the US, possibly because of the USD currency used in the transaction, which is how the United States was able to seize the funds. The money was a payment for a batch of Cuban cigars previously imported to Germany by a German supplier. As justification for the seizure, the U.S. Treasury stated that the Danish businessman had violated the United States embargo against Cuba.
Monitoring by the NSA
Der Spiegel reported in September 2013 that the National Security Agency (NSA) widely monitors banking transactions via SWIFT, as well as credit card transactions. The NSA intercepted and retained data from the SWIFT network used by thousands of banks to securely send transaction information. SWIFT was named as a "target", according to documents leaked by Edward Snowden. The documents revealed that the NSA spied on SWIFT using a variety of methods, including reading "SWIFT printer traffic from numerous banks". In April 2017, a group known as the Shadow Brokers released files allegedly from the NSA which indicate that the agency monitored financial transactions made through SWIFT.
Use in sanctions
As mentioned above SWIFT had disconnected all Iranian banks from its international network as a sanction against Iran. However, as of 2016 Iranian banks which are no longer on international sanctions lists were reconnected to SWIFT. Even though this enables movement of money from and to these Iranian banks, foreign banks remain wary of doing business with the country. Due to primary sanctions, transactions of U.S. banks with Iran or transactions in U.S. dollars with Iran both remained prohibited.
Similarly, in August 2014 the UK planned to press the EU to block Russian use of SWIFT as a sanction due to Russian military intervention in Ukraine. However, SWIFT refused to do so. SPFS, a Russia-based SWIFT equivalent, was created by the Central Bank of Russia as a backup measure.
Alternatives to the SWIFT system include:
- Ripple – sponsored by crypto firm Ripple Labs – although SWIFT argued that the scalability issues of blockchain solutions remained unsolved, confining them to bilateral and intra-bank applications.
- INSTEX – sponsored by the EU
- CIPS – sponsored by China
- SPFS – sponsored by Russia
In 2016 an $81 million theft from the Bangladesh central bank via its account at the New York Federal Reserve Bank was traced to hacker penetration of SWIFT's Alliance Access software, according to a New York Times report. It was not the first such attempt, the society acknowledged, and the security of the transfer system was undergoing new examination accordingly. Soon after the reports of the theft from the Bangladesh central bank, a second, apparently related, attack was reported to have occurred on a commercial bank in Vietnam.
Both attacks involved malware written to both issue unauthorized SWIFT messages and to conceal that the messages had been sent. After the malware sent the SWIFT messages that stole the funds, it deleted the database record of the transfers then took further steps to prevent confirmation messages from revealing the theft. In the Bangladeshi case, the confirmation messages would have appeared on a paper report; the malware altered the paper reports when they were sent to the printer. In the second case, the bank used a PDF report; the malware altered the PDF viewer to hide the transfers.
In May 2016, Banco del Austro (BDA) in Ecuador sued Wells Fargo after Wells Fargo honored $12 million in fund transfer requests that had been placed by thieves. In this case, the thieves sent SWIFT messages that resembled recently canceled transfer requests from BDA, with slightly altered amounts; the reports do not detail how the thieves gained access to send the SWIFT messages. BDA asserts that Wells Fargo should have detected the suspicious SWIFT messages, which were placed outside of normal BDA working hours and were of an unusual size. Wells Fargo claims that BDA is responsible for the loss, as the thieves gained access to the legitimate SWIFT credentials of a BDA employee and sent fully authenticated SWIFT messages.
In the first half of 2016, an anonymous Ukrainian bank and others—even "dozens" that are not being made public—were variously reported to have been "compromised" through the SWIFT network and to have lost money. The episode was investigated by ISACA (formerly known as the Information Systems Audit and Control Association).
- ABA routing transit number
- Bilateral key exchange and the new Relationship Management Application (RMA)
- Cross-Border Inter-Bank Payments System
- Electronic money
- International sanctions
- Internationalization of the renminbi
- ISO 9362, the SWIFT/BIC code standard
- ISO 15022
- ISO 20022
- Organisation for Economic Co-operation and Development (OECD)
- Sibos conference
- Terrorist Finance Tracking Program
- Value transfer system
- Farrell, Henry and Abraham Newman. 2019. Of Privacy and Power: The Transatlantic Struggle over Freedom and Security. Princeton University Press.
- Arnold, Martin (6 June 2018). "Ripple and Swift slug it out over cross-border payments". Financial Times. Archived from the original on 27 September 2019. Retrieved 28 October 2019.
- "Swift Company Information". SWIFT. 9 March 2010. Retrieved 7 December 2016.
- "Board members". SWIFT. 9 December 2015. Retrieved 4 May 2016.
- "Yawar Shah – 1996 – 40 Under Forty – Crain's New York Business". Retrieved 23 February 2014.
- "SWIFT Management". SWIFT. 7 October 2015. Retrieved 4 May 2016.
- "Javier Pérez-Tasso". SWIFT. Retrieved 15 November 2019.
- "Logica history".
- "Carl Reuterskiöld". SWIFT. March 2006. Retrieved 7 September 2012.
- "ISO Maintenance agencies and registration authorities]".
- "RFC 3615 – A Uniform Resource Name (URN) Namespace for SWIFT Fin".
- Sechrist, Michael (23 March 2010). "Cyberspace in Deep Water: Protecting Undersea Communication Cables By Creating an International Public-Private Partnership" (PDF). Belfer Center for Science and International Affairs.
For example, the Society for Worldwide Interbank Financial Telecommunication (SWIFT), which describes itself as “the global provider of secure financial messaging services,” uses undersea fiber-optic communications cables to transmit financial data between 208 countries
- "SWIFT: SIBOS issues" (PDF). SWIFT. 16 September 2008. Archived from the original (PDF) on 7 November 2015. p.12
- "Distributed architecture". SWIFT. 6 June 2008.
- "SWIFT History". SWIFT.
- "Accord". 26 November 2015.
- "SWIFTNet Mail now available".
- "SWIFTNet Mail pilot phase underway". Archived from the original on 1 December 2008.
- Brand, Constant (28 September 2005). "Belgian PM: Data Transfer Broke Rules". The Washington Post. Retrieved 23 May 2010.
- "European Parliament resolution of 17 September 2009 on the SWIFT Agreement". European Parliament. 17 September 2009.
- "European Parliament to vote on interim agreement at February session". European Parliament. 21 January 2010.
- Brand, Constant (11 February 2010). "Parliament rejects bank transfer data deal". European Voice.
- "Euro MPs block bank data deal with US". BBC News. 11 February 2010.
- "European parliament rejects SWIFT deal for sharing bank data with US". DW. Reuters. 11 February 2010.
- Schult, Christoph (16 March 2011). "Brussels Eyes a Halt to SWIFT Data Agreement". Der Spiegel.
- Gladstone, Rick (31 January 2012). "Iran Praises Nuclear Talks with Team from U.N." The New York Times. Retrieved 4 February 2012.
- Gladstone, Rick (3 February 2012). "Senate Panel Approves Potentially Toughest Penalty Yet Against Iran's Wallet". The New York Times. Retrieved 4 February 2012.
- Solomon, Jay; & Adam Entous (4 February 2012). "Banking Hub Adds to Pressure on Iran". The Wall Street Journal. Retrieved 4 February 2012.
- "Banking's SWIFT says ready to block Iran transactions". Reuters. 17 February 2012. Retrieved 17 February 2012.
- Torchia, Andrew (17 February 2016). "Iranian banks reconnected to SWIFT network after four-year hiatus". Reuters. Retrieved 21 April 2016.
- Bendtsen, Simon; Benson, Peter Suppli (26 February 2012). "Dansk politimand fanget i amerikansk terrornet" [Danish policeman caught in American terror net]. Berlingske Tidende (in Danish). Retrieved 26 February 2012.
- "US snubs out legal cigar transaction". The Copenhagen Post. 27 February 2012. Retrieved 12 April 2016.
- "'Follow the Money': NSA Spies on International Payments". Der Spiegel. 15 September 2013. Retrieved 18 September 2013.
- Baldwin, Clare (15 April 2017). "Hackers release files indicating NSA monitored global bank transfers". Reuters. Retrieved 15 April 2017.
- Lawler, Richard. "Shadow Brokers release also suggests NSA spied on bank transactions". Engadget. Retrieved 15 April 2017.
- "Iranian banks reconnected to SWIFT network after four-year hiatus". Reuters.
- Hutton, Robert; Ian Wishart (29 August 2014). "U.K. Wants EU to Block Russia From SWIFT Banking Network". Bloomberg News. Retrieved 31 August 2014.
- "SWIFT Sanctions Statement". swift.com (Press release).
- Turak, Natasha (23 May 2018). "Russia's central bank governor touts Moscow alternative to SWIFT transfer system as protection from US sanctions". CNBC. Retrieved 4 October 2018.
- International banking giant refuses to cut off Israel, despite boycott calls. Haaretz. 7 October 2014.
- Corkery, Michael, "Hackers’ $81 Million Sneak Attack on World Banking", The New York Times, 30 April 2016. Retrieved 1 May 2016.
- Corkery, Michael (12 May 2016). "Once Again, Thieves Enter Swift Financial Network and Steal". The New York Times. Retrieved 13 May 2016.
- Bergin, Tom; Layne, Nathan (20 May 2016). "Special Report: Cyber thieves exploit banks' faith in SWIFT transfer network". Reuters. Retrieved 24 May 2016.
- Metzger, Max (28 June 2016). "SWIFT robbers swoop on Ukrainian bank". SC Magazine UK. Retrieved 29 June 2016.