Search This Blog

Wednesday, December 7, 2011

TROUBLE WITH THE TERRORIST WATCH LIST DATABASE


1.   What concepts in this chapter are illustrated in this case?
The concept illustrated in this case is about managing data resourses. Managing data resources includes establishing an information policy, and ensuring data quality.  In this case, it tells about how they manage database about information on terrorists and how it being distributes to a wide range of government agency systems. Beside that, it also includes problems in managinf data resources.

2.   Why was the consolidated terror watch list created? What are the benefis of the list?
A database of suspected terrorists also known as the terrorist watch list created in response to criticisms that multiple agencies were maintaining separate lists and that these agencies lacked a consistent process to share relevant information concerning theindividuals on each agency’s list. The consolidated terror watch list created to collect and maintain terrorist information and nominate individual for inclusion in the Terrorist Screening Centre, TSC consoliated watch list. In order to create terror watch list, TSC was established to organize the standardize information about suspected terrorists between multple government agencies into a single list to enhance communication between agencies.
Some of the benefits from the watch list are it is easy to supply data for government systems. Beside that, the list can be distributed to a wide range of overnment agency systems for use in efforts to deter or detect the movements of known or suspected terrorist. At the same time, it can be used for prescreening passengers’ from all over the world that traveling and entering United State. Last but not lease, it can help to maintain country’s peacefulness.

3.   Describe some of the weaknesses of the watch list. What management, organization, and technology factors are responsible for these weaknesses?
Some of the weaknesses of the watch list are, the list contains inaccuracies and that policies for nomination and removal from the lists are not uniform between governmental departments. Moreover, there has also been public outcry resulting from the size of the list and well-publicized incidents of obvious non-terrorists finding that they are included on the list. Beside that, it also leads to the inclusion of people that do not belong on watch lists known as ‘false positives’. At the same time, there are also weaknesses on quality and accuracy of the data in the TSC consolidated watch list. It also being critisize that, whether or not a list that will soon grow to over a million entries could have any real usefulness or significance inapprehending terrorist.

4.   If you were responsible for the management of the TSC watch list database, what steps would you take to correct some of the weaknesses?
To correct some of the weaknesses of TSC watch list database, it requires a lot of effort and time in order to provide more sophisticated system. To avoid wrongful inclusion, not a simple and quick process but TSC could integrate the list with data in airline reservation system to include more specific information such as gender, middle name or date of birth in their reservation records. Therefore, these would decrease the probability of false matches. TSC also needs to quickly updating the list with new information and removing people from the list especially U.S. citizens or person who were no longer deemed a threat. This can be illustrated in the case of Yusuf Islam (formerly known as Cat Stevens) whose name was flagged as being on a no fly list and denial of entry into the United States. This shows that the watch list database does not provide accurate information because he is a citizen of the country. Therefore, TSC needs to conduct closer examination and integrate that list with those maintained by airlines, individual states and other localities using more information to differentiate individuals. Besides that, to improve the system, TSC could integrate with FBI to set up its standard and provide consistent procedures for nominating individuals to the list, performing modifications to information and not relaying those changes to other governmental offices.

5.   Do you believe that the watch list represents a significant threat to individual’s privacy or Constitutional rights? Why or why not?
This issue remains a big question mark due to its positive effects and drawbacks. The watch list database could provide even precise information by involving more personal data about individuals on the list. Therefore, this could be very useful for federal agencies to use this additional information to improve screening and help reduce the number of people who are unnecessarily for investigation and questioning. However, this issue had drawn criticism for potential privacy violations. This brings up the matter regarding the sensitivity and safety of the data it would collect. The responsible agencies should think of the consequences that the data may fall into wrong hands and the person may use the personal data to commit any unlawful acts or crimes if the system had been breached or hijacked.

No comments:

Post a Comment