The Terror Watch List Database Troubles Continue

Topics: Federal Bureau of Investigation, No Fly List, United States Department of Homeland Security Pages: 10 (2894 words) Published: September 16, 2013
< The Terror Watch List Database Troubles Continue >

Prepared by
Question 1: Saumya Medushani Pepera
Question 2+3: Nguyen Ngoc Tien
Question 4: Novina Magai
Question 5: Yang Xiaolin
Table of Contents

Executive Summary3
Introduction4
Q1. Why was the consolidated terror watch list created? What are the benefits of the list? 5 Q2. Describe weaknesses of the watch list. What management, organisations and technology factors are responsible for these weaknesses? What communication barriers exist between the organisations involved in the construction of the watch list?7 Q3. How effective is the system of watch list described in this case study?10 Q4. What steps could be taken to correct some of the weaknesses?12 Q5. How could more effective communication betweeen the organisations assist with the accuracy of the watch lists? What technologies could be used to improve this communication?14 Conclusion15

Recommendations16
References17
Appendices18

Executive Summary

.

Introduction

.

1. Why was the consolidated terror watch list created? What are the benefits of the list?

The terrorist watch list is a data base including suspected terrorist that trying to obtain visas, enter the country, board aircraft, or engage in other activities. The FBI’s Terrorist Screening Center (TSC) was established after the September 11 attacks in 2001, to organize and standardize information about suspected terrorists between multiple government agencies into a single list to enhance communications between agencies . The watch list created to collect and maintain terrorist information and nominate individual for inclusion in the Terrorist Screening Centre, TSC consolidated watch list. The watch list currently includes about 420,000 names, 8,000 of Americans, 16,000 of people not allowed to fly including 500 of Americans. The terrorist screen centre demonstrate, It is apparent once someone on list it is hard to get off it. They allow all government agencies to check the names against the same comprehensive list with the most accurate and up-to date information known suspected terrorists.

The consolidated terrorist watch list is one of the most effective counterterrorism tools for the US government. Multiple US government agencies are keeping individual lists and they unable to perform invariable process to share proper details. Nowadays, the government do watch list matching on the air lines including international carriers. The security benefit of this gives evidence that many ordinary passengers get mistakenly drawn into the no-fly filter of a particular airline. So inside the government they have to bring watch list matching process and must solve false issues where ordinary passengers have to explain that they are not the person on the list.

The other benefit of the list is: it is convenient way to supply information’s to the government process of collecting terrorist details. Other than this list can be circulate to wide range of government agencies to deter or detect the movement of known or suspected terrorists. And also it can be used for prescreening passengers from all over the world that travelling and entering United State. When person exits the country by plane, airline officers are to check that person against terror watch list. This is clearly helping to maintain country’s conciliatory. The terror watch list designed to prevent attacks by keeping a close watch on listed terrorists. 2. Describe the weaknesses of the watch list. What management, organisation and technology factors are responsible for these weaknesses? What communication barriers exist between the organisations involved in the construction of the watch list?

TSC watch list was created in order to support government agencies to investigate suspected...

References: • UniSA Lecture Notes 2012, ‘The terror watch list database troubles continue’, SAIBTCISB Lecture Series 2010, South Australia.
• Robbins, S, DeCenzo, D, Coulter, M, & Woods, M 2012, Management: The Essentials, Pearson. Sydney.
• Waddell, D. Devine, J, Jones, G. and George, J. 2007, Contemporary Management, Boston, McGraw Hill.
Button A, 2012, ‘How to Improve Information Communication Technology’, eHow, viewed 29 August 2012, < http://www.ehow.com/how_7701800_improve-information-communication-technology.html>.
Fenell Z, 2012, ‘How Has Technology Made Communication Better?’, eHow, viewed 29 August 2012, < http://www.ehow.com/facts_6175341_technology-made-communication-better_.html>.
• Salaverría, R 2005,  ‘An Immature Medium. Strengths and Weaknesses of Online Newspapers on September 11’, Gazette: The international journal for communication studies, vol 67.
• Homeland Security, 2011, ‘Risk management fundamental’, Homeland Security Risk Management Doctrine.
| |
Appendices
.
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Trouble with the Terrorist Watch List Database Essay
  • Terrorist Watch List Database Essay
  • Essay about Watch List
  • Trouble Essay
  • Essay on Database concepts
  • Database Essay
  • Database Essay
  • Essay about Database

Become a StudyMode Member

Sign Up - It's Free