Preview

Define a Database and a Database Management System and Describe How It Solves the Problems of a Traditional File Environment.

Satisfactory Essays
Open Document
Open Document
308 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Define a Database and a Database Management System and Describe How It Solves the Problems of a Traditional File Environment.
2. Why was the consolidated watch list created? What are the benefits of the list?
ANSWER: In the aftermath of the 9-11 attacks, both critics and defenders of the information systems employed by the US intelligence community became concerned on how to prevent future terrorist incidents. Then a database of suspected terrorist known as the consolidated watch list was born. It is created in order to maintain separate list about terrorist and share relevant information concerning the individuals on each agency’s list.
Benefits of consolidated terror watch list 1. Classifying and organizing information: classified information about the people in watch list is maintained and the entire databases are well organized according to their name and date of birth. 2. Provided record by two sources: the NCTC and the FBI both the agencies provide information to identify terrorist. These agencies collect and maintain terrorist information and nominate individuals for inclusion in the consolidated watch list. 3. Updating information with time: the watch list database is updated daily with new nominations, modifications, to existing records and deletions. 4. Distributing information properly: Information on the list is distributed to a wide range of government agency for use in efforts to deter or detect the movements of known or suspected terrorist. 5. In airport: Airlines use this data for prescreening passengers the selectee lists. The US customs and border protections system uses bit to help screen travelers entering in the US.
Last but not the least in USA port, police station, VISA center these issues are very strict. They conduct a name based search of the individuals. When the computerized name-matching system generates a ‘hit’ against a watch list record, the airline or agency will review each potential match. All of these databases require certain minimum biographic or identifying data to accept records from the consolidated watch

You May Also Find These Documents Helpful

  • Better Essays

    9-11 Commission, Homeland Security, and Intelligence Reform. (n.d.). Retrieved from U.S.Senate Comitee on Homeland Security and Governmental Affairs: http://www.hsgac.senate.gov/issues/9-11-commission…

    • 1148 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    This research project focuses on the rise in domestic terrorism in the U.S. over the last decade, beginning with the 9/11 terrorist attacks. The 9/11 attacks provide a starting point to compare and contrast findings from subsequent acts of domestic terrorism in order to evaluate improvements (and lack thereof) over the same period of time. Findings include action and behavior trends by terrorists and intelligence community/law enforcement personnel in a number of high-profile terrorist cases. Gathered research can provide substantial proof as to the government’s (i.e. intelligence community’s) ability to prevent or at least capably respond to future acts of terrorism in the U.S.…

    • 17193 Words
    • 69 Pages
    Powerful Essays
  • Satisfactory Essays

    Prepare a set of guidelines to remind social care workers of best practice in handling information.…

    • 1638 Words
    • 8 Pages
    Satisfactory Essays
  • Good Essays

    The CIA had failed to alert INS and the FBI about their possible entrance into the United States. Khalid and Nawaf entered the United States unnoticed in Los Angeles on January 15, 2000 (9/11 Commission Report 2004, 355). The 9/11 Commission Report brought into place the Intelligence Reform and Terrorism Prevention Act of 2004; the IRTPA established the Office of the Director of National Intelligence who serves as the head of the intelligence community; “act as the principal adviser to the President, to the National Security Council. And the Homeland Security Council for intelligence matters related to the national security” (IRTPA 2004, Sec 102). The Directory of National Intelligence has access to all intelligence and is responsible for making sure that agencies are sharing information (IRTPA 2004, Sec 102). The goal of this paper is to examine the efforts made to ensure interagency information sharing and if those efforts have changed the how agencies share…

    • 598 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Cia Research

    • 1972 Words
    • 8 Pages

    The Central Intelligence Agency’s main responsibility is stated in its Vision statement: “We will provide knowledge and take action to ensure the national security of the United States and the preservation of American life and ideals” (www.cia.gov). The CIA’s job is to provide pertinent, timely, and un-biased foreign intelligence. They also act as an unseen force by conducting undercover action as ordered by the President in order to preempt threats or achieve objectives of the United States. The CIA is the only intelligence organization that is not subject to cabinet prerogative, making it reliable in it is unbiased in its reports, because it has no political agenda. There are six main types of intelligence by which the CIA collects information. Human intelligence (HUMINT) is information gathered by field operatives through overt and covert techniques (www.cia.gov). Communications intelligence (COMINT) is acquired from intercepted foreign communications (www.cia.gov). Electronic intelligence (ELINT) is information collected from foreign electro-magnetic non-communications transmissions by other than intended recipients (www.cia.gov). Imagery intelligence (IMINT) utilizes satellite photography and…

    • 1972 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    * The DHS and local and state agencies both concentrate on major crimes such as drug trafficking, gangs, and terrorism. Law enforcement’s effort to prevent terrorism coincides with the DHS mission for national security and has created a system called the Homeland Security Information Network, which gives access to state and local law enforcement agencies to collect and share information with other federal, state and local agencies in order to prevent criminal activity. This computer based was created to be used by state and local authorities to have real time access to national databases.…

    • 259 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    The intelligence may collect information notwithstanding that the law enforcement agency intends to use the information collected for purposes of a law enforcement investigation or counterintelligence investigation (Fritsch et al, 2015). Thus, this alters the traditional distinction between intelligence and law enforcement. So, the connection of these two government function raises questions concerning the methods of collection, targets of collection, and the use of the resulting information, corresponding with the development of Fourth Amendment jurisprudence.…

    • 1029 Words
    • 5 Pages
    Powerful Essays
  • Better Essays

    • A shared database of information which is relevant to the safety and welfare of children.…

    • 5747 Words
    • 23 Pages
    Better Essays
  • Better Essays

    Risk Management

    • 2368 Words
    • 10 Pages

    * Potential targets of terrorist activity such as government offices, law enforcement agencies, or politically sensitive businesses or services.…

    • 2368 Words
    • 10 Pages
    Better Essays
  • Powerful Essays

    To get a better understanding of the creation of this “super agency” details need to be giving about the agencies that will take part. The details will show history, how the agency works and how the agency affects counter-terrorism and intelligence gathering. The first agency that will be discussed is the FBI. The FBI originated in 1908 when Attorney General Charles J. Bonapart selected special agents to be the sole investigative force of the Department of Justice (Department of Justice). The FBI responsibilities include criminal law enforcement, domestic counterterrorism, and domestic…

    • 2750 Words
    • 11 Pages
    Powerful Essays
  • Good Essays

    war and terrorism

    • 833 Words
    • 4 Pages

    The Public Services who deal with the terrorism issues like to share their information with other countries terrorism authorities. By doing this all the Terrorism authorities will have intelligence as to what terrorist acts are taking place in other countries. This may help them to…

    • 833 Words
    • 4 Pages
    Good Essays
  • Best Essays

    Office of Public Affairs. Terrorism 2002 - 2005 Report. Policy and Guidelines. Washington, D.C.: Department of Justice - Federal Bureau of Investigation, 2007.…

    • 3643 Words
    • 15 Pages
    Best Essays
  • Best Essays

    Counter Terrorism

    • 2173 Words
    • 9 Pages

    As noted by Carera (2005), the theme of intelligence reform is still fresh in the United States, and with the creation of the Director of National Intelligence (DNI), we can appreciate how deep the concerns over intelligence failure in recent years have been. At the heart of this development lie issues of funding, structure and methodology, of which we are concerned with the last of the three. In order to address the issues surrounding the methodology of collecting intelligence for counter terrorism, we first look at definitions of the intelligence terminology referred to, along with an explanation of the current focus of the debate. We then identify how the modern terrorist threat differs from the traditional Cold War enemy, before suggesting reasons why over reliance on one form of intelligence gathering is wrong. We concentrate on a western perspective of intelligence, in particular, the experiences of the United States. This approach allows us to keep a focus on the issue without wandering into inappropriate areas of debate.…

    • 2173 Words
    • 9 Pages
    Best Essays
  • Good Essays

    Us Patriot Act

    • 7318 Words
    • 30 Pages

    The Patriot Act includes two very powerful tools to prevent future terrorist attacks. The first is information sharing provisions that allows the Department of Homeland Security to go on the offense "to substantially expand America 's information-sharing capabilities" (Ridge, Nov 2004). Increased collaboration between federal and state agencies is a critical concept of cooperation across all levels of the federal and state government. The second is investigative tools to identify, apprehend, and stop terrorists before they can complete their objectives. Tools to assist the Federal Air Marshals, Border Patrol officers, the United States Coast Guard, and…

    • 7318 Words
    • 30 Pages
    Good Essays
  • Powerful Essays

    The Patriot Act

    • 1398 Words
    • 6 Pages

    The act focused on four ways to improve counter-terrorism efforts. First, the Patriot Act allows investigators to use the tools that were already available to investigate organized crime and drug trafficking. It permits law enforcement officials to use surveillance against more crimes of terror, permits federal agents to track sophisticated terrorists trained to evade detection, and it allows law enforcement to conduct investigations without alerting terrorists, enables federal agents to ask a court for an order to obtain business records in cases involving national security and terrorism. Secondly, the Patriot Act facilitated information sharing and cooperation among government agencies so that they can better "connect the dots.", By removing significant legal barriers that prevented the law enforcement, intelligence, and national defense communities from talking and coordinating their work to protect national security. Thirdly, the Patriot Act updated the law to reflect new technologies and new threats; law enforcement officials were not able…

    • 1398 Words
    • 6 Pages
    Powerful Essays