Course Hero Logo

CASE STUDY QUESTIONS.edited.docx - 1 The Terror Watch List...

Course Hero uses AI to attempt to automatically extract content from documents to surface to you and others so you can study better, e.g., in search results, to enrich docs, and more. This preview shows page 1 - 4 out of 8 pages.

1The Terror Watch List Database’s Troubles ContinueInstitution(s) affiliationNameDate
2concepts illustratedThe concepts demonstrated in this case are data security and privacy. There are caseswhere individuals have been misused and made readily available, violating individuals' privacyconcerns. For instance, the watchlist data in some cases have been made available for collecting,storing, and to some extent manipulating them, which is against an individual's privacy rights.There are some cases where the data collected by law enforcement agencies have been put toinappropriate use, such as harassment, which is against one's rights. Using individual data forwrong purposes makes them at threat since the data collected is always sensitive. Innocentindividuals who have found themselves listed on the watch list database may have been harassedat some point while undergoing extra screening at various checkpoints. In this case, their privacyrights may have been violated while screening to prove they mean no harm to others or are notterrorists. The measure applied while conducting extra screening for suspect individuals usuallyviolates their rights and makes their travel experience awful.consolidated terror watch and list benefitsIt was designed to serve as a source of information about suspected terrorists. The TSCdatabase comprises sensitive but unclassified data concerning suspected terrorists.The data inthis database includes; date of birth and the suspect's name, which can be made available to otherscreening agencies. The classified data concerning individuals in the watch list is persevered byintelligence and law enforcement agencies databases.The suspect remains in the watch list untilthe agency that listed them proves that their names are secure for deletion or removal from watchlist database. The benefits of the watch list are that it helps government agencies to detect the
3movement of suspected or known terrorists(Yanushkevich et al, 2019).Watchlist information isusually shared with other government agencies systems to enable them to detect terrorists. Theagencies that benefit from watch list information are; National Security Agency, FBI.Transportation Security Administration, CIA, State Department, Department of HomelandSecurity, custom and border. Airlines benefit from watchlists when conducting passengerscreening. Border department uses watchlist to screen individuals coming to U.S. other lawenforcement agencies uses this data to arrest an in criminal justice activities.

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 8 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Spring
Professor
proffevanssmart
Tags
Transportation Security Administration, No Fly List

Newly uploaded documents

Show More

Newly uploaded documents

Show More

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture