Case 6 Database - THE TERROR WATCH LIST DATABASES TROUBLE...

This preview shows page 1 - 4 out of 11 pages.

THE TERROR WATCH LIST DATABASE’S TROUBLE CONTINUE1Contents1.Issues ……………………………………………………………………………. 22.Facts …………………………………………………………………………….. 33.Analysis …………………………………………………………………………. 44.Conclusion ……………………………………………………………………….125.Reference ………………………………………………………………………...13
THE TERROR WATCH LIST DATABASE’S TROUBLE CONTINUE2Issues1.What concepts in this chapter are illustrated in this case?2.Why was the consolidated terror watch list created? What are the benefits of thelist?3.Describe some of the weaknesses of the watch list. What management,organization, and technology factors are responsible for these weaknesses?4.How effective is the system of watch lists describe in this case? Explain youranswer.5.If you were responsible for the management of the TSC watch list database, whatsteps would you take to correct some of these weaknesses?6.Do you believe that the terror watch list represents a significant threat toindividuals’ privacy or constitutional rights? Why or why not?7.A. What is Big Data Analytics? B. How could data analytics be used to buttressthe TSC watch list?
THE TERROR WATCH LIST DATABASE’S TROUBLE CONTINUE3database of suspected terrorists known as the terrorist watch list was created. Since itscreation, the list has ballooned to 400,000 people, recorded as 1.1 million names andaliases, and is continuing to grow at a rate of 200,000 records each year.Information on the list is distributed to a wide range of government agencysystems for use in efforts to deter or detect the movements of known or suspectedterrorists. For example, Airlines use data supplied by the TSA system in their NoFlyand Selectee lists for prescreening passengers, while the U.S. Customs and BorderProtection system uses the watch list data to help screen travelers entering the UnitedStates. The State Department system screens applicants for visas to enter the UnitedStates and U.S. residents applying for passports.However, those government agencies populate their watch lists by performingwide sweeps of information gathered on travelers, using many misspellings andalternate variations of the names of suspected terrorists. This often leads to theinclusion of people who do not belong on watch lists, known as “false positives.” Italso results in some people being listed multiple times under different spellings oftheir names. Many people are not belonging to terrorists finding that they are included

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 11 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Fall
Professor
reese
Tags
Data Management, Federal Bureau of Investigation, Terrorist Screening Center, Watchlist, No Fly List

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture