Monday, June 3, 2019

A Case Study On Terrorist Database Screening Information Technology Essay

A Case Study On Terrorist Database Screening Information Technology EssayintroductionWhen the FBIs Terrorist Screening Center, or TSC, was created pursuance the 9-11 attacks, the goal was to consolidate entropy about suspected terrorists from different g all overnment agencies into a single arguing. This was intended to enhance communication and decrease processing successions. Subsets of the TSC pick up argument, such as the No Fly propensity, were added to reduce the wait for airplane passengers by screening only those who may be prevented from air change of location. However, several problems assimilate prompted questions regarding the quality and accuracy of the consolidated list.For a security measure reliant on identification of dangerous individuals, a lack of knowledge regarding the names of suspects is a key issue. Because the list may include duplicated name entries or terrorist aliases, obvious non-terrorists such as former Senator Ted Kennedy have a bun in the oven been subject to travel delays because of names that match those of suspected terrorists. According to the movement study, a single name on the list may have as many as 50 duplicates. This contri just nowes to the over 750,000 records that ease up up the TSC fit list. A major cause of name similarity or duplication is the process to be included on the list. various giving medication agencies perform sweeps of traveler information, utilizing misspellings and variations of terrorist names. This often contributes to inclusion of innocent individuals who do not belong on the list.Once an individual is on the list, there is no quick fix to be removed. According to the case study, over 24,000 requests to be removed from the list have been made, including requests from innocent travelers. Only 54 percent have been resolved due to an extensive processing meter of 40 days. The Department of Homeland Security developed the Traveler Redress Inquiry Program to befriend innocents rem ove themselves from the list and avoid the extensive screening and question that results from creation a traveler noted on the TSC watch list.Privacy and profiling have likewise been concerns surrounding the conception and further development of the watch list. To improve the screening process and reduce instances of erroneous inclusion, more detai conduct and personal entropy would have to be gathered about individuals on the list. This information may cause sensitivity and safety issues and contribute to existing criticism of the list because of its say-so ability to promote discrimination. whatever individuals on the list attest that they atomic number 18 marked on the list as suspected terrorists due to their race or ethnicity. However, without including private and sensitive info, the requirements for inclusion on the list willing remain minimal and contribute to more dark positives.The TSC is sueing to improve data and data management procedures. Improved communica tion between intelligence agencies in the future may greatly contribute to advances in the quality and accuracy of the list. But, as of now, the list stands as a major air travel security measure despite its flaws. According to the case study, Given the option between a list that tracks every potential terrorist at the cost of unnecessarily introduce about innocents, and a list that fails to track many terrorists in an effort to avoid tracking innocents, many would choose the list that tracked every terrorist despite the drawbacks.BackgroundA compilation of information from various articles get into to heartd as the basis for this case study. Journalists from expectant publications internet sites such as The Wall Street Journal, USA Today, CNN.com and Businessweek.com contributed to the creation of this case study through articles they wrote regarding the watch list. These articles, as advantageously as those who wrote them, serve as the case study firm.AnalysisThe TSC watch l ist has demonstrated a variety of strengths and weaknesses since its creation in 2003. Benefits of the list include safer air travel for passengers and reduced screening time, but this has come at the cost of inconveniences and cases of mistaken identity for many innocent travelers. Data surplusage and inconsistency have contributed to questioning of the lists accuracy and quality.A minimal lack of data and information has contributed to name duplication and erroneous inclusion of innocent travelers. In order to eliminate these false positives, or cases of mistaken identity, more information regarding each suspected terrorist on the list must be gathered. However, attempts to gather this necessary information have led to outcries of privacy invasion issues which have in turn caused continual delays in data gathering processes. Individuals do not want to be inconvenienced by the unintended inclusion on the list that is the result of lack of information, yet they do not want to comp romise private information to ensure that they are not falsely named as a suspected terrorist. In this aspect, it seems as if there is no decent standard for the amount of data to include that is a residual of enough, but not too much, information about a particular individual.Another issue that may contribute to inaccuracy is a lack of communication among government agencies. Non-FBI agencies such as the Drug Enforcement Administration and the Bureau of Alcohol, Tobacco, Firearms, and Explosives do not view themselves as contributors to the watch list process, or they may disagree with what the FBI says constitutes terrorist activity. Some Department of Justice offices access information that may be necessary to include on the watch list but neglect to share that information with the FBI. Improved communication and coordination of sensitive and important information would greatly improve the quality and accuracy of the list.The government has made significant improvements through the initial creation of the consolidated watch list, but this could be further improved upon by better management practices and a shared information system. Creating a management team up specifically to monitor the watch list and the information supplied by other government agencies would improve the quality of the watch list as well as communication with vital contributors. This group could too ensure that innocents are not falsely included on the list. Combining the gathered data into communal information system would allow all the organizations who utilize the watch list access to important data and would create a watchdog effect as well as increased safety measures.DiscussionWhat concepts in this chapter are illustrated in this case?The concepts from this chapter that the case uses are file organization, and problems with the traditional file format including redundancy and consistency, data management and systems to manage the data, and ensuring data quality.Why was the conso lidated terror watch list created? What are the benefits of the list?The consolidated watch list was created to leaden down the time of processing names in the com sicker. A No Fly list was created as a subset of the terrorist watch list to lessen the time passengers are waiting at airports by only screening those who are specifically not allowed to get on a plane. According to the article director of Terrorist Watch List Says Government Has Technical Capability to Screen all Passengers Against Full List Before They Board Planes, by Fred Lucas of CNSNews.com, the No Fly list contains about 3,400 names, but the computers have the capability to screen the entire list if necessary. The article also states that about 14,000 names on the list are put in to another group that must have extra screening before the board an airplane.The benefits of a smaller list definitely decrease the time to look up names in the system. With over 750,000 names, many of which are actually duplicated, sho rtening the list makes using it much more efficient. Some also believe that the criteria for getting on the list may be too broad, and that shortening the list to include only the most necessary names to watch for will help decrease the amount of throng who are mistaken as terrorists.Describe some of the weaknesses of the watch list. What management, organization, and technology factors are responsible for these weaknesses? champion of the main weaknesses of the watch list is the lack of information associated with the names on the list. This problem has led to many people wrongly identified as terrorists, and duplicates of names. The case study said that one name may have up to 50 duplicates. The length of the list is also getting longer and longer, which may make it less effective.The case study explains that the organizations that play a role in developing the list motivating to have more consistent rules for what information is indispensable to get a name on the watch list an d understand what other groups indispensability to know who has been added so that a name is not duplicated. The organizations need to work together by sharing information to decrease these duplicates and make the list more detailed and informative for its users. The government could invest in some sort of ERP system that will update each organization when one name has been added to the list, so that each group can update the name with the cognize information about that specific terrorist.If you were responsible for the management of the TSC watch list database, what steps would you take to correct some of these weaknesses?The first step I would take to improve the list would be to have more research done on each name that the list includes. One of the main complaints of the list is that people are unsure of how a name gets added and why they are added. If there was a specific group of people whose job was to maintain the list we would be able to have more information show up whe n a name is found to be on the list to ensure that the person being screened is in fact a terrorist and not a person with a similar name.If this group was formed, they would also be responsible for removing unnecessary names on the list that create false positives for innocent passengers. The case study explained that many of the people who requested their name to get off the list are even so waiting and face extra scrutiny every time they try and fly. Keeping these names on the list also increase its size and inefficiency. eventually I would invest more technology into updating and maintaining the list. I think that this tool will be extremely helpful for airlines and keeping the world safer from terrorist attacks, but it must be easier to use and more reliable to increase its potential. After the Christmas Day Bomber almost successfully detonated a bomb over Detroit spell his plane was about to land, it is easy to see that we have a long way to go to protect ourselves from this treat.Do you believe that the watch list represents a significant threat to individuals privacy or Constitutional rights? Why or why not?Currently, I do not believe that this list is lumbering to an individuals privacy or Constitutional rights. The list is too broad right now and doesnt include very much information about the suspected terrorists. However, if they square up to do more research when pulling the list together people may feel that the government is being more invasive. Even with this extra research however, I do not think that it violates their Constitutional rights. If people want to be able to fly safely all around the world, they will need to give up some of their privacy to do so.ConclusionThe Terrorist Watch List was created to monitor those flying on domestic and international flights after the attacks on America on September 11, 2001. Currently, the list is not very detailed and very long, creating many problems. These problems include duplications of names an d false positives causing hassle for passengers who are mistaken as terrorists. The list is also growing rapidly which makes screening for names take longer and longer. The government agencies responsible for the list are also slow at removing false names.While this list is a great start to protect passengers while flying, there are still many advances that will need to be made. The names on the list need to have more details and research corresponding to them, and the agencies working with this list need to work together to cut down on duplicate information. They will also need to work on the length of the list, and sub-lists, to make sure that it is used effectively to prevent terrorist attacks.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.