Preview

Terrorist Watchlist Database Case Study

Powerful Essays
Open Document
Open Document
1645 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Terrorist Watchlist Database Case Study
The Terrorist Watch List Database and Screening Center

Terrorist Watch List Database: A Case Study

Don E. Gregory

INFO 531: Management Information Systems

Abstract

Since the attacks on the World Trade Center, our nation has been at war with terrorism. We have approached this war on two fronts, one by attacking our enemies in armed combat, and two by enacting preventive measures to eliminate their harmful tactics. One such measure is known as the FBI’s Terrorist Watch List. The TWL is a large database of information on what are known as persons of interest or known terrorist. As with any large database the list has weaknesses and shortcomings, pros and cons, that contribute to its effectiveness and when information gathered is on individuals, leaves itself open to criticism and skepticism. Also as with any compilation of information, the database is ever evolving and changing, making it necessary for quality and audit controls to be in place. This paper discusses all these topics and more.

Terrorist Watch List Database: A Case Study

A data warehouse is a database that stores current and historical data of potential interest to decision makers throughout the company. [1] After the events of September 11, 2001, the US Government determined the need for a comprehensive single source to identify and deter all persons either suspected to engage in terrorist activities against the US. Thus, the Terrorist Watch List and Database were created, bringing together all the information from various government agencies who had previously been maintaining separate lists of persons, into the Watch List in a standard format and available to all. This database is an example of data warehousing.

Why was the list created and what are the benefits?

Purpose and reason for the list

Prior to the existence of the watch list database, multiple government agencies gathered information on



References: 1. Laudon, Kenneth C. and Jane P., (2012), Management Information Systems: Managing the Digital Firm, New Jersey: Pearson Prentice Hall. 2. Krouse, W.J. (2004). CRS Report for Congress Terrorist Identification, Screening, and Tracking Under Homeland Security Presidential Directive 6. http://congressionalresearch.com/RL32366/document.php 3. http://www.huffingtonpost.com/2012/10/02/terrorist-watch-list-database_n_1936515.html 4. http://www.homelandsecutitynewswire.com/questions-raised-about-effectiveness-terror-watch-list 5. http://usatoday30.usatoday.com/news/washington/2009-03-10-watchlist_N.htm 6. http://www.aclu.org/technology-and-liberty/watch-lists 7. http://www.fbi.gov/about-us/nsb/tsc/tsc_liberties 8. http://www.justice.gov/oig/reports/FBI/a0527/laws.htm 9.

You May Also Find These Documents Helpful

  • Better Essays

    Kudler Fine Foods

    • 1040 Words
    • 5 Pages

    Kenneth C. Laudon, J. P. (2012). Management Information Systems. Managing the Digital Firm (12th ed.). Pearson Education. Retrieved from https://ecampus.phoenix.edu/content/eBookLibrary2/content/eReader.aspx…

    • 1040 Words
    • 5 Pages
    Better Essays
  • Good Essays

    References: Laudon, K. C., & Laudon, J. P. (2012). Management information systems: Managing the digital…

    • 615 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Bsa310 Syllabus

    • 1752 Words
    • 8 Pages

    Laudon, K. C., & Laudon, J. P. (2012). Management information systems: Managing the digital firm (12th ed.). Upper Saddle River, NJ: Pearson/Prentice Hall.…

    • 1752 Words
    • 8 Pages
    Satisfactory Essays
  • Good Essays

    National Crime Information Center is a computer database that tracks fourteen different person files and seven kinds of property files and is available for use by numerous law enforcement branches at various levels of government. The computer system is thought to be the most comprehensive investigative tool in determining criminal backgrounds of individuals. This computerized database is in severe need of various types of upgrades that are estimated at $2 billion dollars.…

    • 781 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    study guide BSA310

    • 2044 Words
    • 15 Pages

    Laudon, K. C., & Laudon, J. P. (2012). Management information systems: Managing the digital firm (12th ed.). Upper Saddle River, NJ: Pearson/Prentice Hall.…

    • 2044 Words
    • 15 Pages
    Powerful Essays
  • Satisfactory Essays

    bsa 310 syl

    • 1960 Words
    • 8 Pages

    Laudon, K. C., & Laudon, J. P. (2012). Management information systems: Managing the digital firm (12th ed.). Upper Saddle River, NJ: Pearson/Prentice Hall.…

    • 1960 Words
    • 8 Pages
    Satisfactory Essays
  • Good Essays

    The creation of a national database applied by the Homeland Security Department would permit the states to communicate and distribute intelligence collected on different terrorists and criminal behaviors. Following the catastrophic events of September 11, 2001, just about every state implemented fusion centers to share intelligence on terrorist threats; conversely, a database resourceful enough has not been implemented to communicate the intelligence. The fusion centers can gain data and share the intelligence with the Department of Homeland Security but it cannot correspond with any other centers countrywide. Thus, if one state such as California gains intelligence on a potential terrorist group living nearby, the intelligence is transmitted to the Department of Homeland Security, but neighboring states are uninformed about the activity. The drawback with executing the system to synchronize information countrywide is that the fusion centers would have to gain funding from the federal government.…

    • 561 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Contraband In Prisons

    • 977 Words
    • 4 Pages

    This research seeks to understand what intelligence models or combination of models would efficiently work to effectively detect, deter, and prevent terrorist activities and organized criminal activity within the U.S. prison system. Each of the listed specialized units has an area of intelligence they cover. This could be from local gangs to terrorist organizations. In addition to gathering intelligence, the ability to properly analyze and share this information should be at the forefront of every…

    • 977 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    “ for decades the threat of terrorism and actual terrorist incidents inside the united states- in most cases, by home grown perpetrators- were treated like potential and actual crimes” (Nacos, B.L. 2012, pg.238). With a lack of proper means to correctly identify terrorism and the repercussions that followed, the FBI and local law enforcement were in charge of handling prevention and investigation. The magnitude of terrorism quickly proved too much for these agencies and emergency responders to handle. Lack of communication between agencies proved to be detrimental. The need for more protection, quicker response times and strategy called for the birth of a new branch. Soon after was the establishment of the Department of Homeland Security.…

    • 1191 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    JTTF participate have the ability to access all threats information and share specific information with relevant state and local agencies. Human Intelligence(HUMINT) is also another method used to disseminate information to local, national and international law enforcement agencies. Its used dominantly by state s level for information sharing as these help to gather information about terrorists. These strategies put in place after the September 11 attacked as been active and working though they have been some lone wolf attacked to the United States it has also uncover sever plot against the United States as well, like the Los Angeles bombing plot where terrorist attempted to use robbery to fund their campaign. Sharing information to local and law enforcement agencies as not be so unified till the aftermath of the September 11…

    • 455 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    References: Committee of Technical and Privacy Dimensions of Information for Terrorism Prevention and other National Goals…. National Research Council 2008…

    • 1507 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    Ethnic Group Conflict

    • 1786 Words
    • 8 Pages

    Cultural clashes, global wars, international misunderstandings, and ethnic conflicts have been occurring for decades. As early as the 1940s, constant hostility within the Middle East has resulted in suffering to human rights, education, and family structure (Huntington, Fronk & Chadwick, 2001). Culture seems to be implicated as the major contributor to conflict. The increasing modernization is strongly intertwined in this process, as it challenges traditional ideas, conservative values, and educational obstacles. How and why ethnic group conflicts occur will be illustrated in this paper by comparing and examining two ethnic groups at war. The concept of conformity and its relations to the ethnic groups will be explained as well as the kinship between social perception and social cognition. In addition, the necessary social perceptions for the resolution of the conflict will be discussed.…

    • 1786 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    Domestic Terrorism

    • 2686 Words
    • 11 Pages

    Terrorists may be left or right wing, from any religious background or any race. This is what makes identifying these groups of people very difficult. While law enforcement would like to say that a typical terrorist is a young, affluent, white male, for example, it is impossible to make that distinction. There is no profile that would fit terrorists in their entirety. It is possible for a terrorist from a certain group to fit a certain profile. A white supremacist group would have a certain type of person as a member. A black militant group would have a totally different type of person. With this being the case, it is important to identify the group of people rather than the individual. Some groups focus on a single issue such as anti-nuclear power or anti-fur trade while others call for greater…

    • 2686 Words
    • 11 Pages
    Powerful Essays
  • Powerful Essays

    the way up through the chain of federal agencies to include the Federal Bureau of Investigations…

    • 3116 Words
    • 20 Pages
    Powerful Essays
  • Satisfactory Essays

    ANSWER: In the aftermath of the 9-11 attacks, both critics and defenders of the information systems employed by the US intelligence community became concerned on how to prevent future terrorist incidents. Then a database of suspected terrorist known as the consolidated watch list was born. It is created in order to maintain separate list about terrorist and share relevant information concerning the individuals on each agency’s list.…

    • 308 Words
    • 2 Pages
    Satisfactory Essays