Free Essay

Trouble with the Terrorist Watch List Database Case Study

In:

Submitted By lydiajodoin
Words 947
Pages 4
Trouble with the Terrorist Watch List Database Case Study

1. What concepts in this chapter are illustrated in this case?

Many of the advantages (and shortcomings) of database management systems (DBMS) are illustrated by the terrorist watch list case study. For instance, the watch list solves some of the problems of traditional file environment by reducing redundancy (each agency with some responsibility for homeland security maintaining its own separate list). Also, ideally the list should minimize data inconsistency. DBMS includes tools for accessing and manipulating the information in the database (test, p. 245). This should be helpful on a terrorist watch list in which changes, deletions and retrieval of data may be required by multiple users.

2. Why was the consolidated terrorist watch list crated? What are the benefits of the list?

The list was created in the aftermath of the 9-11 attacks, when critics of US intelligence suggested that the lack of shared information among intelligence agencies was partially responsible for our vulnerability to attack. Specifically, the list was created “to organize and standardize information about suspected terrorists…into a single list to enhance communication between agencies.” Prior to creation of the list, these agencies “lacked a consistent process to share relevant information concerning the individual’s on each agency’s list.”

The benefits of the list include its daily updating, which keeps it current. Also, the same information on the list is distributed to many agencies in an effort to deter or detect the movements of known or suspected terrorists. This should aid law enforcement by insuring that all agencies receive identical data. Finally, each agency should receive subsets of the data on the master watch list which are relevant to their particular mission. This benefits the individual agencies by not flooding them with unnecessary information which would not be helpful to them in doing their job. In short, creation of the unified watch list “has been a positive step toward streamlining the process of locating and apprehending terrorists.” (p. 270).

3. Describe some of the weaknesses of the watch list. What management, organization and technology factors are responsible for these weaknesses?

According to the GAO, the list contains inaccuracies and policies for nomination and removal from the list are not uniform across agencies. This is important because the size of the list is growing exponentially (soon to hit a million names), and if some agencies do not keep current with their removal of names, the list will continue to contain names of individuals who should be of no interest to government intelligence. It is necessary to keep confidential the criteria for inclusion on the list, or real terrorists would be able to evade legitimate law enforcement inquiries. Yet that very confidentiality also leaves the list and the agencies open to criticism that the criteria for inclusion on the list are too minimal, thereby sweeping up people who are wholly innocent of any terrorist connections. Similarly, because the list is based on names, it may well be seen as an example of racial profiling, and the many “false positives” (including a US senator and a six year old boy) are widely known and reported. This leads to skepticism about the credibility of the entire list.
Management issues call attention to the quality and accuracy of the data in the list. A 2005 report found “inconsistent record counts, duplicate records, and records that lacked data fields or had unclear sources for their data.
Organizational issues include the traditional “turf wars” between agencies. Despite the integration and consolidation intended in the creation of the Department of Homeland Security, the Washington culture of struggles for power among agencies has not been eliminated, and in this case, “knowledge is power.” Sharing of information has happened “in an informal way and sometimes not at all.” (p. 271). Other organizational issues arise when private sector databases (those maintained by the airlines) must be accessed by public sector officials. Finally, organizational issues have arisen because not all organizations were equally scrupulous about screening names nominated for inclusion on the list.

Technology issues have arisen because of the sometimes cumbersome procedures for removal of a name from the list. The requests for removal have continued to outpace the actual removals.

4. If you were responsible for the management of the TSC watch list database, what steps would you take to correct some of these weaknesses?
One of the first steps which must be taken is the tightening up and speeding up of the processes required to remove an “innocent” person from the list. The failure to do so leaves the entire list’s usefulness and public reputation at risk. Second, each agency must be held accountable for the accuracy of information supplied to the list. Finally, greater care must be taken in the design of selection criteria for inclusion on the list.

5. Do you believe that the watch list represents a significant threat to individuals’ privacy or Constitutional rights? Why or why not?

The answer to this question depends entirely on your view of the importance of privacy in our current society. Some people believe that in the wake of 9-11, individual privacies must be sacrificed in order to protect the country as a whole. I am not one of those people. To me individual privacy rights are critically important (one of the reasons we live in Maine). I would not say that the existence of the list represents a threat to personal liberty, but I believe that the substandard management of the list does represent such a threat. Surely there is a way to maintain information about true terrorist threats, without including someone with tangential or coincidental relationships with terrorist forces.

Similar Documents

Premium Essay

Wach List

...technology; it’s their management. Do you agree? Why or why not?   4. Should producers of software-based services, such as ATMs, be held liable for economic injuries suffered when their systems fail?   5. Why is selecting computer hardware and software for the organization an important business decision? What management, organization, and technology issues should be considered when selecting computer hardware and software?   6. To what extent should end users be involved in the selection of a database management system and database design? MID-TERM GROUP PROJECT - Dropbox   In groups of 3 or 4 (groups of 5 for this Session), complete the case analysis outlined below. Week 4  Midterm Group Project     Business Problem-Solving Case: Trouble with the Terrorist Watch List Database   This is a group project and only one group paper will be accepted for the team.   Read the case study for chapter 6 (pages 241 -244).  Complete a 5 to 8 page paper addressing each of the five case study questions listed below. State the question then the answer for each question. You must have a "REFERENCE PAGE" using the APA format. This is the last page of the paper. References in the Reference Page must be cited in the paper (APA format). Minimally the textbook must be referenced. Double space 12 point, Times Roman, page number bottom center. First sentence in the first paragraph of the answer to the question must be indented five (5) spaces....

Words: 6259 - Pages: 26

Free Essay

Aviation Security

...Low-Probability Attacks TERRORISME AÉRIEN Contrecarrer des attaques improbables à impacts élevés A Thesis Submitted to the Division of Graduate Studies of the Royal Military College of Canada by Jacques Duchesneau, C.M., C.Q., C.D. In Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy April 2015 ©Jacques Duchesneau © This thesis may be used within the Department of National Defence but copyright for open publication remains the property of the author. ROYAL MILITARY COLLEGE OF CANADA COLLÈGE MILITAIRE ROYAL DU CANADA DIVISION OF GRADUATE STUDIES AND RESEARCH DIVISION DES ÉTUDES SUPÉRIEURES ET DE LA RECHERCHE This is to certify that the thesis prepared by / Ceci certifie que la thèse rédigée par JACQUES DUCHESNEAU, C.M., C.Q., C.D. AVIATION TERRORISM Thwarting High-Impact Low-Probability Attacks complies with the Royal Military College of Canada regulations and that it meets the accepted standards of the Graduate School with respect to quality, and, in the case of a doctoral thesis, originality, / satisfait aux règlements du Collège militaire royal du Canada et qu'elle respecte les normes acceptées par la Faculté des études supérieures quant à la qualité et, dans le cas d'une thèse de doctorat, l'originalité, for the degree of / pour le diplôme de PHILOSOPHIÆ DOCTOR IN WAR STUDIES Signed by the final examining committee: / Signé par les membres du comité examinateur de la soutenance de thèse __________________________...

Words: 155225 - Pages: 621

Premium Essay

Mis 301

...MIS 301 Introduction to Information Technology Management FALL 2010 - Unique Numbers: 03905, 03910, 03915 Instructor tructorBin Gu – bin.gu@mccombs.utexas.edu Dr. Information, Risk, & Operations Management (IROM) Dept. Office CBA 5.228 Office Hours MW 4:00-5:00 pm or by appointment Qian Tang - qian.tang@phd.mccombs.utexas.edu Teaching Assistant CBA 1.308B Office TBD Office Hours Course Description Information technology (IT) has transformed all aspects of 21st century business and everyday life. New IT investments continue to be staggering. Worldwide, over $2.5 trillion is invested in IT. In the U.S., over 50% of capital expenditures are related to IT. Information systems influence business processes, organizational structures, and the ways people do business, work, and communicate. Emerging technologies have triggered new forms of organization and business process innovation; they have also impacted organizational structure, culture, politics, decision making, and society as a whole. IT is transforming how physical products are designed, how services are bundled with products, and how individuals interact with businesses and with other individuals. A silent transformation is occurring as more and more physical products use embedded IT to improve customer experience and product performance. The pervasiveness of IT is expanding global trade and changing how and where work is performed. It is vital that future managers—in every area of business—have a...

Words: 3229 - Pages: 13

Free Essay

Cams

...Study Guide for the Certification Examination Fifth Edition ACAMS.org ACAMS.org/español ACAMSToday.org MoneyLaundering.com Study Guide for the Certification Examination Fifth Edition a publication of the association of certified anti-money laundering specialists Study Guide for the Certification Examination Fifth Edition Executive Vice President John J. Byrne, CAMS Editor Robert S. Pasley, CAMS Co-Editor Kevin M. Anderson, CAMS Contributors Joyce Broome, CAMS Heather Brown, CAMS Aub Chapman, CAMS Vasilios Chrisos, CAMS David Clark, CAMS Jurgen Egberink, CAMS Michael D. Kelsey, CAMS Saskia Rietbroek, CAMS Nancy J. Saur, CAMS Mansoor Siddiqi, CAMS Daniel Soto, CAMS Timothy White CAMS Production Assistant Catalina Martinez We would like acknowledge the following individuals for their contributions to the CAMS Exam, and the Online and Live Preparation Seminars: Kevin M. Anderson, CAMS Joyce Broome, CAMS Aub Chapman, CAMS David Clark, CAMS Josue Garcia, CAMS Hoi Luk, CAMS Ira Morales Mickunas, CAMS Robert S. Pasley, CAMS Karim Rajwani, CAMS Mansoor Siddiqi, CAMS Saskia Rietbroek, CAMS Ed Rodriguez, CAMS Nancy J. Saur, CAMS Wendy Steichen, CAMS Brian J. Stoeckert, CAMS Charles Taylor, CAMS Will Voorhees, CAMS Natalie Ware, CAMS Peter Warrack, CAMS Amy Wotapka, CAMS Crispin Yuen, CAMS Copyright © 2012 by the Association of Certified Anti-Money Laundering Specialists (ACAMS). Miami, USA. All rights...

Words: 105184 - Pages: 421

Premium Essay

Maritime Terrorism in Southeast Asia

...Maritime Domain" (2007). Non-published Research Reports. Paper 5. http://research.create.usc.edu/nonpublished_reports/5 This Article is brought to you for free and open access by CREATE Research Archive. It has been accepted for inclusion in Non-published Research Reports by an authorized administrator of CREATE Research Archive. For more information, please contact gribben@usc.edu. A BRIEF ANALYSIS OF THREATS AND VULNERABILITIES IN THE MARITIME DOMAIN1 N.O. BAKIR University of Southern California, Center for Risk and Economic Analysis of Terrorism Events (CREATE) 3710 McClintock Avenue, RTH 322, Los Angeles, CA 90089-2902 USA Abstract The attacks of September 11 have exposed the vulnerability of the American homeland against terrorism. Terrorists have already expressed their intentions to continue their aggression towards United States. Their goal is to incur maximum economic damage, inflict mass casualty, spread unprecedented fear among citizens and thus destabilize the nation to further their agenda. Many critical sites lay across US maritime borders, all of which could be potential targets to accomplish these goals. All these sites are simple elements of a complex body where the vulnerability of the whole system is a function of the vulnerability of the weakest element against an adaptive adversary. Ports, nuclear facilities, LNG facilities, urban areas, bridges, chemical plants and other critical infrastructure are all elements of this complex system. In this paper, we review...

Words: 14868 - Pages: 60

Free Essay

Case Study

...MIS Mini-cases -- 1 of 30 Cases for Use in Management Information Systems MIS Mini-cases -- 2 of 30 MIS Mini-cases -- 3 of 30 Case 01 -- Freeway Ford You are a management consultant working for Franklin Absolom, the majority stockholder for a group of 10 automobile dealerships. He has asked you to spend several days at Freeway Ford, a dealership that is not performing up to its potential. You are not to go ―looking for trouble‖: instead, your assignment is to find ways to help management at the dealership take advantage of opportunities. One day while you are talking with James Kahler, the sales manager for Freeway Ford, you realize that the dealership only uses transaction processing systems—it is not realizing the full potential of the information it has gathered for managerial decision making. For example, Freeway Ford knows the purchase date and owner of every car it sells, but it never contacts owner about routine maintenance. Freeway Ford know that people who purchase a new car generally trade it in for another new car 3 to 4 years later, but the dealership does not contact these previous customers. Another opportunity comes from used car purchasing and sales. Every car has a vehicle identification number (VIN), and the dealership uses this number to check for known problems with a used car before it makes a purchase. A data bank of car insurance claims histories and major repairs is kept on a set of CDs that is sent to the dealership each month. At the...

Words: 12946 - Pages: 52

Premium Essay

Scanning Applications

...of all kinds also continued to siphon significant sums from the pocketbooks of consumers. And in Newtown, Connecticut, 20 young children and six adults lost their lives in one of the worst mass shootings in American history, ending a year of violence that saw similar tragedies around the country. Working with its colleagues around the globe, the FBI is committed to taking a leadership role in protecting the nation. As you can see from this book—an annual compilation of stories from the FBI’s public website that provides a snapshot of Bureau milestones, activities, and accomplishments—we used the full range of our intelligence, investigative, and operational skills to address major threats during the year. We helped avert terrorist attacks and derail terrorist supporters, put cyber criminals and fraudsters behind bars, and...

Words: 67387 - Pages: 270

Free Essay

Ethical Issues Arising from the Real Time Tracking and Monitoring of People Using Gps-Based Location Services

...which have the ability to calculate the position, time and velocity of any GPS receiver. Ethical concerns arise when a person carrying a receiver has their location transmitted to second party. This type of tracking has a wide variety of applications including tracking dementia sufferers, tracking parolees and law enforcement. A literature review found that the ethics of GPS tracking has not been thoroughly assessed. This paper investigates the ethical issues arising from the real time tracking of people using GPS-based location services. Usability context analysis and an observational study were the methodology used in this study. Usability context analysis provided insight into GPS tracking over the contexts of care, control and convenience. Its current applications could be seen in the tracking of Alzheimer’s patients, parents tracking children, law enforcement, parolee and sex offenders, terrorist tracking, employee monitoring and...

Words: 20727 - Pages: 83

Free Essay

Core Concepts of Ais

...CORE CONCEPTS OF Accounting Information Systems Twelfth Edition Mark G. Simkin, Ph.D. Professor Department of Accounting and Information Systems University of Nevada Jacob M. Rose, Ph.D. Professor Department of Accounting and Finance University of New Hampshire Carolyn Strand Norman, Ph.D., CPA Professor Department of Accounting Virginia Commonwealth University JOHN WILEY & SONS, INC. VICE PRESIDENT & PUBLISHER SENIOR ACQUISITIONS EDITOR PROJECT EDITOR ASSOCIATE EDITOR SENIOR EDITORIAL ASSISTANT PRODUCTION MANAGER PRODUCTION EDITOR MARKETING MANAGER CREATIVE DIRECTOR SENIOR DESIGNER PRODUCTION MANAGEMENT SERVICES SENIOR ILLUSTRATION EDITOR PHOTO EDITOR MEDIA EDITOR COVER PHOTO George Hoffman Michael McDonald Brian Kamins Sarah Vernon Jacqueline Kepping Dorothy Sinclair Erin Bascom Karolina Zarychta Harry Nolan Wendy Lai Laserwords Maine Anna Melhorn Elle Wagner Greg Chaput Maciej Frolow/Brand X/Getty Images, Inc. This book was set in 10/12pt Garamond by Laserwords Private Limited, and printed and bound by RR Donnelley/Jefferson City. The cover was printed by RR Donnelley/Jefferson City. This book is printed on acid free paper. Founded in 1807, John Wiley & Sons, Inc. has been a valued source of knowledge and understanding for more than 200 years, helping people around the world meet their needs and fulfill their aspirations. Our company is built on a foundation of principles that include responsibility to the...

Words: 241803 - Pages: 968

Premium Essay

Essentials of Management Information Systems

...this chapter, you will be able to answer the following questions: 1. Why are information systems vulnerable to destruction, error, and abuse? What is the business value of security and control? What are the components of an organizational framework for security and control? What are the most important tools and technologies for safeguarding information resources? 2. 3. 4. ISBN 1-256-42913-9 232 Essentials of MIS, Ninth Edition, by Kenneth C. Laudon and Jane P. Laudon. Published by Prentice Hall. Copyright © 2011 by Pearson Education, Inc. C HAPTER O UTLINE Chapter-Opening Case: Boston Celtics Score Big Points Against Spyware 7.1 System Vulnerability and Abuse 7.2 Business Value of Security and Control 7.3 Establishing a Framework for Security and Control 7.4 Technologies and Tools for Protecting Information Resources 7.5 Hands-on MIS Projects Business Problem-Solving Case: Are We Ready for Cyberwarfare? BOSTON CELTICS SCORE BIG POINTS AGAINST SPYWARE While the Boston Celtics were fighting for a spot in the playoffs several years ago, another fierce battle was being waged by its information systems. Jay Wessel, the team’s vice president of technology, was trying to score points against computer spyware. Wessel and his IT staff manage about 100 laptops issued to coaches and scouts, and sales, marketing, and finance employees, and these machines were being overwhelmed by malware (malicious software). Like any sports franchise, the Celtics are on the road a...

Words: 21009 - Pages: 85

Premium Essay

Kkswmddkmdkemwekdemkedmkdemkmdkmdkew

...MODERN DATABASE MANAGEMENT / JfFFREY A. HOFFER . Warehousing Success 426 Data Warehouse Architectures 428 Generic Two-Level Architecture 428 Independent Data Mart Data Warehousing Environment 426 429 C O NTENTS Dependent Data Mart and Operational Data Store Architecture: A Three-Level Approach Logical Data Mart and Real-Time Data Warehouse Architecture 432 Three-Layer Data Architecture 435 Role of the Enterprise Data Model 435 Role of Metadata 436 Some Characteristics of Data Warehouse Data Status Versus Event Data 437 Transient Versus Periodic Data 438 An Example of Transient and Periodic Data 438 Transient Data 438 Periodic Data 439 Other Data VVarehouse Changes 440 The Reconciled Data Layer 441 Characteristics of Data after ETL 441 The ETL Process 442 Extract 442 Cleanse 444 Load and Index 446 Data Transformation 447 Data Transformation Functions 448 Record-Level Functions 448 Field-Level Functions 449 More Complex Transformations 451 Tools to Support Data Reconciliation 451 Data Quality Tools 451 Data Conversion Tools 452 Data Cleansing Tools 452 Selecting Tools 452 The Derived Data Layer 452 Characteristics of Derived Data 452 The Star Schema 453 Fact Tables and Dimension Tables 453 Example Star Schema 454 Surrogate Key 455 Grain of Fact Table 456 Duration of the Database 456 Size of the Fact Table 457 Modeling Date and Time 458 Variations of the Star Schema 458 Multiple Fact Tables 458 Factless Fact Tables...

Words: 80097 - Pages: 321

Premium Essay

Discrimination of Hindus

...Hindus  in  South  Asia  and  the  Diaspora:   A  Survey  of  Human  Rights   2011               www.HAFsite.org     March  12,  2012                   “All  human  beings  are  born  free  and  equal  in  dignity  and  rights.”   “One  should  never  do  that  to  another  which  one  regards  as  injurious  to   one’s  own  self.    This,  in  brief,  is  the  rule  of  dharma.    Yielding  to  desire  and   acting  differently,  one  becomes  guilty  of  adharma.”   “Thus,  trampling  on  every  privilege  and  everything  in  us  that  works  for   privilege,  let  us  work  for  that  knowledge  which  will  bring  the  feeling  of   sameness  towards  all  mankind.”   Swami  Vivekananda,  “The  Complete  works  of  Swam  Vivekananda,”  Vol  1,  p.  429     Mahabharata  XII:  113,  8     Universal  Declaration  of  Human  Rights,  1948,  Article  1     "All  men  are  brothers;  no  one  is  big,  no  one  is  small.  All  are  equal."   Rig  Veda,  5:60:5       ...

Words: 82692 - Pages: 331

Premium Essay

Moral

...Chapter 7 : Moral Issues 7. 1 The Environment 7. 2 Life 7. 3 Rearmament and War 7. 4 Business Ethics 7. 5 Sexuality and the Family 7. 6 Discrimination 7. 7 Freedom of Information 7. 8 Science and Technology Chapter Overview This chapter will discuss the contemporary moral issues. There are eight main sub-headings and examined in turn. Students may not only learn about moral facts, principles and theories, but also some important moral issues so that they will kept in phase with current issues in facing the challenge out there. This chapter also encourages students to ...

Words: 28274 - Pages: 114

Free Essay

The World of Cybercrimes

...Cybercrimes Cybercrimes are one of the most dangerous threats to our Nation. There are no boundaries when it comes to cybercrimes. A cybercrime is one of the fastest growing crime types of the century and includes criminal activity involving computers and the internet. Hacking a computer is not the only thing considered a cybercrime. Downloading movies and music illegally is also a cybercrime. Once thought as something that only the military or other government officials had to worry about, it is now on the rise since everyone has a computer and it is easy to find out how to hack into computer systems. With the rise of internet usage among businesses and private users, the risk of being a victim of cybercrime is huge. The Security Tracking Study performed by the Pomemon Institute states that 83 percent of multinational companies feel that within the past 12 months they have been a target of a cybercrime. Price Water House Coopers states that the number of businesses having a security breach is more along the lines of 92 percent. Cybercrimes are attacks on computer hardware and software, downloading illegal movies and music, online fraud involving financial crimes and corruption with an organization, crimes against children and the elderly, cyber bullying and fraudulent telemarketing events for charitable donations. What was once something only “hackers” did is now something anyone can do. The term hacker was originally described as “any technical effort to manipulate the normal...

Words: 8856 - Pages: 36

Premium Essay

B2B Advantages and Disadvantages

...This page intentionally left blank Te n t h E d i t i o n MODERN DATABASE MANAGEMENT Editorial Director: Sally Yagan Editor in Chief: Eric Svendsen Executive Editor: Bob Horan Editorial Project Manager: Kelly Loftus Editorial Assistant: Jason Calcano Director of Marketing: Patrice Lumumba Jones Marketing Manager: Anne Fahlgren Marketing Assistant: Melinda Jensen Senior Managing Editor: Judy Leale Project Manager: Becca Richter Senior Operations Supervisor: Arnold Vila Operations Specialist: Ilene Kahn Senior Art Director: Jayne Conte Cover Designer: Suzanne Behnke Cover Art: Fotolia © vuifah Manager, Visual Research: Karen Sanatar Permissions Project Manager: Shannon Barbe Media Project Manager, Editorial: Denise Vaughn Media Project Manager, Production: Lisa Rinaldi Supplements Editor: Kelly Loftus Full-Service Project Management: PreMediaGlobal Composition: PreMediaGlobal Printer/Binder: Edwards Brothers Cover Printer: Lehigh-Phoenix Color/Hagerstown Text Font: Palatino Credits and acknowledgments borrowed from other sources and reproduced, with permission, in this textbook appear on appropriate page within text. Microsoft® and Windows® are registered trademarks of the Microsoft Corporation in the U.S.A. and other countries. Screen shots and icons reprinted with permission from the Microsoft Corporation. This book is not sponsored or endorsed by or affiliated with the Microsoft Corporation. Copyright © 2011, 2009, 2007, 2005, 2002...

Words: 193467 - Pages: 774