1 / 7

Analyzing the Terror Watch List: Database Integration, Privacy Concerns, and Effectiveness

This case study explores the Terror Watch List Database and its significance in national security. Established in 2003, it consists of 12 integrated databases, aiding various agencies in identifying and tracking potential terrorists, with approximately 400,000 entries. It examines the Technical Screening Center (TSC), evaluating its organizational strengths and weaknesses, particularly in management and technology. The study also addresses the implications of this watch list on individual privacy rights, highlighting both the benefits of preventing terrorism and the potential for racial profiling and discrimination.

lidia
Télécharger la présentation

Analyzing the Terror Watch List: Database Integration, Privacy Concerns, and Effectiveness

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Group 5 Olga Garza Jesus Martinez Gerardo Landeros AJ Castillo David Price The Terror Watch List Database’s Case Study

  2. The Terror Watch List • Terrorist Screening Center (TSC) • Made up of 12 databases • Assist several agencies with terrorists • Database break off • Consists of 400,000 entries

  3. The Terror Watch List • TSA and “Secure” Flight • Delayed due to privacy concerns • Traveler Redress Inquiry Program (TRIP) • Removal of people wrongfully added • Other surveillance programs like NSA • Gather information about suspected terrorists

  4. Concepts in the chapter illustrated in the case • Combining multiple databases into one • 12 different databases • 10 of 12 have been processed • Usage of data warehouses • Serve agencies in need of information

  5. Creation of the TSC and it’s benefits • Organize information about suspected terrorists • Enhance agency communication • Previous attempts contained separate lists • Database created in 2003

  6. Weaknesses dealing with Management, Organization and Technology • Management • Not controlling the growth of TSC • Organization • Lack of knowledge in using database • Technology • Imperfect data leads to poor quality

  7. Does the watch list represent threat to individuals privacy or Constitutional rights? • Pros • Due to watch list terrorist are caught • Agencies are able to track terrorist • Cons • Concerns arise due to privacy issues • Promotes racial profiling and discrimination

More Related