You are on page 1of 10

Trouble with the Terrorist Watch List Database

EXECUTIVE SUMMARY
In this report we look at concepts of information systems that are relevant to Trouble with the Terrorist Watch List Database. We will also address why the watch list was created and what communication benefits it has. There have been a number of weaknesses addressed within the case study we will have a look at what management, organization and technology factors are responsible and what I would do to rectify these issues. Lastly have privacy and constitutional rights been threaded and the importance of business ethics.

INTRODUCTION

The world stood still on 11 September 2001 when devastating attacks were carried out on the World Trade Centers in New York City and the Pentagon in Washington D.C.
The FBIs Terrorist Screening Center or TSC was established to organize and standardize information about suspect terrorist between multiple government agency. A database of suspect terrorist known as the terrorist watch list was born in 2003. No- Fly list was added in database. The watch list has come under scrutiny due to the size and the inaccuracies it contains.

INFORMATION SYSTEM CONCEPTS ARE ILLUSTRATED IN THIS CASE?

It is collaboration of hardware, software, data, people and telecommunications networks. Information is data that has been put into a meaningful and useful context and communicated to a recipient who uses it to make decisions.

To Get information:- Data, that is entered into the system; name and date of birth.

MANAGEMENT INFORMATION SYSTEM

HOW THE INFORMATION SYSTEM WORKS

Please watch this Video.

What are the communication benefit of the Terror watch list

Advantages to networks as suggested by Beck et al. (2002, p 360):- increased productivity, Up-to-date information, Quick decision making

A standard license and registration check was carried out.

The great advantage as with the no-fly list.

THE WEAKNESSES OF THE


WATCH LIST.

Government agencies - a wide sweeps of information, various policies for nominations, misspellings and alternate variations of the names of terrorist suspects. False Positive ?

Example

U.S Marine Daniel Brown, Senator Ted Kennedy, John Anderson a 6 year old boy they all were stooped at airport because his name is similar to suspect or his name alias once used by suspected terrorist.

STEPS TO CORRECT SOME OF THE WEAKNESSES

I would like to do first research the data that has been included on the list;- why an individual has been included in the list, What suspicious behavior constituted their inclusion on the list, I would establish a protocol to ensure that a person is False positive should be removed from the list. Changing the details that are recorded for a suspect to included detailed descriptions of that individual.

As there are so many people travelling in today society, I would so look at developing a group that would screen passengers rather then on an airline level.

You might also like