1 / 7

The Terror W atch L ist Database’s Case Study

Group 5 Olga Garza Jesus Martinez Gerardo Landeros AJ Castillo David Price. The Terror W atch L ist Database’s Case Study. The Terror Watch List. Terrorist Screening Center (TSC) Made up of 12 databases Assist several agencies with terrorists Database break off

ronald
Download Presentation

The Terror W atch L ist Database’s Case Study

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Group 5 Olga Garza Jesus Martinez Gerardo Landeros AJ Castillo David Price The Terror Watch List Database’s Case Study

  2. The Terror Watch List • Terrorist Screening Center (TSC) • Made up of 12 databases • Assist several agencies with terrorists • Database break off • Consists of 400,000 entries

  3. The Terror Watch List • TSA and “Secure” Flight • Delayed due to privacy concerns • Traveler Redress Inquiry Program (TRIP) • Removal of people wrongfully added • Other surveillance programs like NSA • Gather information about suspected terrorists

  4. Concepts in the chapter illustrated in the case • Combining multiple databases into one • 12 different databases • 10 of 12 have been processed • Usage of data warehouses • Serve agencies in need of information

  5. Creation of the TSC and it’s benefits • Organize information about suspected terrorists • Enhance agency communication • Previous attempts contained separate lists • Database created in 2003

  6. Weaknesses dealing with Management, Organization and Technology • Management • Not controlling the growth of TSC • Organization • Lack of knowledge in using database • Technology • Imperfect data leads to poor quality

  7. Does the watch list represent threat to individuals privacy or Constitutional rights? • Pros • Due to watch list terrorist are caught • Agencies are able to track terrorist • Cons • Concerns arise due to privacy issues • Promotes racial profiling and discrimination

More Related