SlideShare a Scribd company logo
Q#1 what concepts in this chapter are illustrated in this case?
The main goal of FBI‟s Terrorist Screening Center (TSC) is to consolidate multiple databases
into a single unified one. The second major concept which is taken from this chapter is to
provide information which is needed to all the agencies by using data warehouses. Agencies can
receive a data Marta subset of data that pertains to its precise task. The State Department screens
applicants for visas to enter the residents applying for passports, while local law informant
agencies use the FBI system to help with arrests, detentions, and other illegal justice activities.
The third major concept is to manage data and resources effectively and efficiently. Rule for the
data sharing, standarrdizing and classification has not been established by the information policy.
Data administration seems to be poor for the availability, usability, integrity, and security of the
data seems to be missing. With government regulations it would help increase the privacy,
security, data quality, and compliance. To decrease the number of inconsistent record, records
duplication and records that had unclear sources, data quality audits and data purification are
greatly needed.


Q#2 why was the consolidated terror watch list created? What are the benefits of the list?


In 2003 Government announced the creation of a “Terrorist Screening Center” aimed at
providing centralized access to a single, unified database of anti-terrorist information. Currently,
a dozen so-called “terrorist watch lists” are maintained by nine federal agencies. To organize and
standardize information about suspected terrorists between multiple government agencies into a
single list, the FBI‟s Terrorist Screening Center, or TSC, was established. It is also established to
enhance communications between agencies. Multiple agencies were maintaining separate lists
and that these agencies lacked a consistent process to share relevant information about the
individuals on each agency‟s list. A database of suspected terrorists known as the terrorist watch
list was born from these efforts in 2003 in response to criticisms that multiple agencies .

Benefits of consolidated terror watch list:
1. Classifying and organizing information.

2. Provided record by NCTC and by FBI

3. Updating information with time.

4. Distributing information properly.
Q#3 Describe some of the weaknesses of the watch list. What management, organization,
and technology factors are responsible for these weaknesses?
Management: policies for choice and removal are not standardized between legislative
departments. The size of the list is out of control it has grown to over 750,000 records since its
creation and is continuing to grow at a rate of 200,000 records each year since 2004. However,
obvious non-terrorists are included on the list. There is no simple or quick rectify process for
removal from the list. The watch list has drawn criticism because of its potential to support racial
profiling and inequity.


Organization: Integrating 12 different databases into one is a difficult process. Corresponding the
knowledge of how someone is added to the list is difficult. On the other hand, for innocent
people who are unnecessarily inconvenienced, the incapacity to ascertain how they came to be
on the list is shocking. Criteria for addition on the list may be too minimum. The government
agencies not have standard individuals to the list, performing modifications to information, and
relaying those changes to other governmental offices.


Technology: The poor quality of the record leads to erroneous data. The TSA needs to perform
an intensive data quality checking and data cleansing to help match imperfect data in airline
reservation systems with defective data on the watch lists. There is still more work to be done to
integrate that list with those maintained by airlines, individual states, and other localities using
more information to distinguish individuals.


Q#4 if you were responsible for the management of the TSC watch list database, what steps
would you takes to correct some of these weaknesses?


To make the data reliable, correct and for security of the data the quality audit should be held on
yearly basis. To remove many of the imperfections of the data the data cleansing software should
be used. Standardize procedures for nomination and removal from the lists Information policies
and data governance policies need to be developed. There should not records duplications,
inconsistent data there should not leave necessary data fields and the sources of data should be
consistent. Such policies should use which match the watch lists of government and the
individuals both.

Q#5 Do you believe that the watch list represents a significant threat to individuals’ privacy
or Constitutional rights? Why or why not?
I do not believe that the watch list represents a significant threat to an individual‟s privacy or
constitutional rights. I believe everyone has right to his own privacy, what an individual does is
their choice. We give up a little of our privacy every day with the decisions that we make it is
our choice how much privacy we give up. As the list is concentrated on terrorist suspects if we
are „doing the right thing‟ we should have no need to worry if our privacy is being invaded.

More Related Content

What's hot

Neo4j graphs in government
Neo4j graphs in governmentNeo4j graphs in government
Neo4j graphs in government
Neo4j
 
Cover Letter / Elvis Perez
Cover Letter / Elvis Perez Cover Letter / Elvis Perez
Cover Letter / Elvis Perez
Elvis O. Perez
 
The Sick State of Healthcare Data Breaches
The Sick State of Healthcare Data BreachesThe Sick State of Healthcare Data Breaches
The Sick State of Healthcare Data Breaches
LightCyber-Inc
 
E-Government - A Unit of Governmental Transparency
E-Government - A Unit of Governmental TransparencyE-Government - A Unit of Governmental Transparency
E-Government - A Unit of Governmental Transparency
The University of Texas (UTRGV)
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business
- Mark - Fullbright
 
Data Breach Response Checklist
Data Breach Response ChecklistData Breach Response Checklist
Data Breach Response Checklist
- Mark - Fullbright
 
FADV-ItsaCrime-Infographic-V4
FADV-ItsaCrime-Infographic-V4FADV-ItsaCrime-Infographic-V4
FADV-ItsaCrime-Infographic-V4
Kerri Lorch
 
Hippa breaches
Hippa breachesHippa breaches
Hippa breaches
ViSolve, Inc.
 
Collecting Social Media as Digital Evidence - PageFreezer Webinar
Collecting Social Media as Digital Evidence - PageFreezer WebinarCollecting Social Media as Digital Evidence - PageFreezer Webinar
Collecting Social Media as Digital Evidence - PageFreezer Webinar
Michael Riedijk
 
Information+security rutgers(final)
Information+security rutgers(final)Information+security rutgers(final)
Information+security rutgers(final)
Amy Stowers
 
Ona 2012
Ona 2012Ona 2012
Data security
Data securityData security
Data security
oco26
 
Safety of protected health information (phi)
Safety of protected health information (phi)Safety of protected health information (phi)
Safety of protected health information (phi)
Josette Pribilla
 
Forensic Accounting and Fraud Examination: Case Study - Online Pharmacy
Forensic Accounting and Fraud Examination: Case Study - Online PharmacyForensic Accounting and Fraud Examination: Case Study - Online Pharmacy
Forensic Accounting and Fraud Examination: Case Study - Online Pharmacy
Britta Bohlinger @ RisikoKlar.org
 
Third Annual Study on Patient Privacy
Third Annual Study on Patient PrivacyThird Annual Study on Patient Privacy
Third Annual Study on Patient Privacy
- Mark - Fullbright
 
GDPR: Are you EU Compliant?
GDPR: Are you EU Compliant? GDPR: Are you EU Compliant?
GDPR: Are you EU Compliant?
GreenRope
 
AI in the Singapore Health and Public Sector
AI in the Singapore Health and Public SectorAI in the Singapore Health and Public Sector
AI in the Singapore Health and Public Sector
Ashley Khor
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
essay-writing-help.us
 
Intelligence Analytics eBook: How DHS & the DOD are Leveraging Intelligence A...
Intelligence Analytics eBook: How DHS & the DOD are Leveraging Intelligence A...Intelligence Analytics eBook: How DHS & the DOD are Leveraging Intelligence A...
Intelligence Analytics eBook: How DHS & the DOD are Leveraging Intelligence A...
Elizabeth Mixson
 

What's hot (19)

Neo4j graphs in government
Neo4j graphs in governmentNeo4j graphs in government
Neo4j graphs in government
 
Cover Letter / Elvis Perez
Cover Letter / Elvis Perez Cover Letter / Elvis Perez
Cover Letter / Elvis Perez
 
The Sick State of Healthcare Data Breaches
The Sick State of Healthcare Data BreachesThe Sick State of Healthcare Data Breaches
The Sick State of Healthcare Data Breaches
 
E-Government - A Unit of Governmental Transparency
E-Government - A Unit of Governmental TransparencyE-Government - A Unit of Governmental Transparency
E-Government - A Unit of Governmental Transparency
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business
 
Data Breach Response Checklist
Data Breach Response ChecklistData Breach Response Checklist
Data Breach Response Checklist
 
FADV-ItsaCrime-Infographic-V4
FADV-ItsaCrime-Infographic-V4FADV-ItsaCrime-Infographic-V4
FADV-ItsaCrime-Infographic-V4
 
Hippa breaches
Hippa breachesHippa breaches
Hippa breaches
 
Collecting Social Media as Digital Evidence - PageFreezer Webinar
Collecting Social Media as Digital Evidence - PageFreezer WebinarCollecting Social Media as Digital Evidence - PageFreezer Webinar
Collecting Social Media as Digital Evidence - PageFreezer Webinar
 
Information+security rutgers(final)
Information+security rutgers(final)Information+security rutgers(final)
Information+security rutgers(final)
 
Ona 2012
Ona 2012Ona 2012
Ona 2012
 
Data security
Data securityData security
Data security
 
Safety of protected health information (phi)
Safety of protected health information (phi)Safety of protected health information (phi)
Safety of protected health information (phi)
 
Forensic Accounting and Fraud Examination: Case Study - Online Pharmacy
Forensic Accounting and Fraud Examination: Case Study - Online PharmacyForensic Accounting and Fraud Examination: Case Study - Online Pharmacy
Forensic Accounting and Fraud Examination: Case Study - Online Pharmacy
 
Third Annual Study on Patient Privacy
Third Annual Study on Patient PrivacyThird Annual Study on Patient Privacy
Third Annual Study on Patient Privacy
 
GDPR: Are you EU Compliant?
GDPR: Are you EU Compliant? GDPR: Are you EU Compliant?
GDPR: Are you EU Compliant?
 
AI in the Singapore Health and Public Sector
AI in the Singapore Health and Public SectorAI in the Singapore Health and Public Sector
AI in the Singapore Health and Public Sector
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
Intelligence Analytics eBook: How DHS & the DOD are Leveraging Intelligence A...
Intelligence Analytics eBook: How DHS & the DOD are Leveraging Intelligence A...Intelligence Analytics eBook: How DHS & the DOD are Leveraging Intelligence A...
Intelligence Analytics eBook: How DHS & the DOD are Leveraging Intelligence A...
 

Similar to Trouble with the terroriest

GAOUnited States General Accounting OfficeReport to the Ra.docx
GAOUnited States General Accounting OfficeReport to the Ra.docxGAOUnited States General Accounting OfficeReport to the Ra.docx
GAOUnited States General Accounting OfficeReport to the Ra.docx
budbarber38650
 
wp-analyzing-breaches-by-industry
wp-analyzing-breaches-by-industrywp-analyzing-breaches-by-industry
wp-analyzing-breaches-by-industry
Numaan Huq
 
Gabrielle HetlandAlthough the United States has a very stron.docx
Gabrielle HetlandAlthough the United States has a very stron.docxGabrielle HetlandAlthough the United States has a very stron.docx
Gabrielle HetlandAlthough the United States has a very stron.docx
hanneloremccaffery
 
wp-follow-the-data
wp-follow-the-datawp-follow-the-data
wp-follow-the-data
Numaan Huq
 
Marshaling Data for Enterprise Insights
Marshaling Data for Enterprise InsightsMarshaling Data for Enterprise Insights
Marshaling Data for Enterprise Insights
Booz Allen Hamilton
 
INFORMATION SECURITY STUDY REGARDING PII
INFORMATION SECURITY STUDY REGARDING PIIINFORMATION SECURITY STUDY REGARDING PII
INFORMATION SECURITY STUDY REGARDING PII
- Mark - Fullbright
 
This assignment covers chapter 8 and is due by 1000 p.m on Monday.docx
This assignment covers chapter 8 and is due by 1000 p.m on Monday.docxThis assignment covers chapter 8 and is due by 1000 p.m on Monday.docx
This assignment covers chapter 8 and is due by 1000 p.m on Monday.docx
christalgrieg
 
CSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentCSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local Government
Donald E. Hester
 
Case Study U.S. Office of Personnel Management Data Breach No
Case Study U.S. Office of Personnel Management Data Breach NoCase Study U.S. Office of Personnel Management Data Breach No
Case Study U.S. Office of Personnel Management Data Breach No
MaximaSheffield592
 
250 words agree or disagreePlease discuss the various limitation.docx
250 words agree or disagreePlease discuss the various limitation.docx250 words agree or disagreePlease discuss the various limitation.docx
250 words agree or disagreePlease discuss the various limitation.docx
vickeryr87
 
Trustworthy Records and Data: the Foundation for Transparency and Accountabil...
Trustworthy Records and Data: the Foundation for Transparency and Accountabil...Trustworthy Records and Data: the Foundation for Transparency and Accountabil...
Trustworthy Records and Data: the Foundation for Transparency and Accountabil...
Commonwealth Telecommunications Organisation
 
Connected communities open_data_govops_memo
Connected communities open_data_govops_memoConnected communities open_data_govops_memo
Connected communities open_data_govops_memo
JoseMacias86
 
CLASS MATTERS Hashimoto, Erica J . Journal of Criminal La.docx
CLASS MATTERS  Hashimoto, Erica J . Journal of Criminal La.docxCLASS MATTERS  Hashimoto, Erica J . Journal of Criminal La.docx
CLASS MATTERS Hashimoto, Erica J . Journal of Criminal La.docx
sleeperharwell
 
Data Breach Response Checklist
Data Breach Response ChecklistData Breach Response Checklist
Data Breach Response Checklist
- Mark - Fullbright
 
IA article (Margaret S. Marangione) (1)
IA article (Margaret S. Marangione) (1)IA article (Margaret S. Marangione) (1)
IA article (Margaret S. Marangione) (1)
Margaret Marangione
 
Chinoy Paper 2016 - WDQC-MakingtheMostofWorkforceData-web
Chinoy Paper 2016 - WDQC-MakingtheMostofWorkforceData-webChinoy Paper 2016 - WDQC-MakingtheMostofWorkforceData-web
Chinoy Paper 2016 - WDQC-MakingtheMostofWorkforceData-web
Mala Chinoy
 
Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?
Druva
 
LIS 60030 Final Project
LIS 60030 Final ProjectLIS 60030 Final Project
LIS 60030 Final Project
Laura Levy
 
Ethical issues and social issues related to systems upload
Ethical issues and social issues related to systems uploadEthical issues and social issues related to systems upload
Ethical issues and social issues related to systems upload
waiforchi Wagiteerhh
 
An Overview of the Major Compliance Requirements
An Overview of the Major Compliance RequirementsAn Overview of the Major Compliance Requirements
An Overview of the Major Compliance Requirements
DoubleHorn
 

Similar to Trouble with the terroriest (20)

GAOUnited States General Accounting OfficeReport to the Ra.docx
GAOUnited States General Accounting OfficeReport to the Ra.docxGAOUnited States General Accounting OfficeReport to the Ra.docx
GAOUnited States General Accounting OfficeReport to the Ra.docx
 
wp-analyzing-breaches-by-industry
wp-analyzing-breaches-by-industrywp-analyzing-breaches-by-industry
wp-analyzing-breaches-by-industry
 
Gabrielle HetlandAlthough the United States has a very stron.docx
Gabrielle HetlandAlthough the United States has a very stron.docxGabrielle HetlandAlthough the United States has a very stron.docx
Gabrielle HetlandAlthough the United States has a very stron.docx
 
wp-follow-the-data
wp-follow-the-datawp-follow-the-data
wp-follow-the-data
 
Marshaling Data for Enterprise Insights
Marshaling Data for Enterprise InsightsMarshaling Data for Enterprise Insights
Marshaling Data for Enterprise Insights
 
INFORMATION SECURITY STUDY REGARDING PII
INFORMATION SECURITY STUDY REGARDING PIIINFORMATION SECURITY STUDY REGARDING PII
INFORMATION SECURITY STUDY REGARDING PII
 
This assignment covers chapter 8 and is due by 1000 p.m on Monday.docx
This assignment covers chapter 8 and is due by 1000 p.m on Monday.docxThis assignment covers chapter 8 and is due by 1000 p.m on Monday.docx
This assignment covers chapter 8 and is due by 1000 p.m on Monday.docx
 
CSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentCSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local Government
 
Case Study U.S. Office of Personnel Management Data Breach No
Case Study U.S. Office of Personnel Management Data Breach NoCase Study U.S. Office of Personnel Management Data Breach No
Case Study U.S. Office of Personnel Management Data Breach No
 
250 words agree or disagreePlease discuss the various limitation.docx
250 words agree or disagreePlease discuss the various limitation.docx250 words agree or disagreePlease discuss the various limitation.docx
250 words agree or disagreePlease discuss the various limitation.docx
 
Trustworthy Records and Data: the Foundation for Transparency and Accountabil...
Trustworthy Records and Data: the Foundation for Transparency and Accountabil...Trustworthy Records and Data: the Foundation for Transparency and Accountabil...
Trustworthy Records and Data: the Foundation for Transparency and Accountabil...
 
Connected communities open_data_govops_memo
Connected communities open_data_govops_memoConnected communities open_data_govops_memo
Connected communities open_data_govops_memo
 
CLASS MATTERS Hashimoto, Erica J . Journal of Criminal La.docx
CLASS MATTERS  Hashimoto, Erica J . Journal of Criminal La.docxCLASS MATTERS  Hashimoto, Erica J . Journal of Criminal La.docx
CLASS MATTERS Hashimoto, Erica J . Journal of Criminal La.docx
 
Data Breach Response Checklist
Data Breach Response ChecklistData Breach Response Checklist
Data Breach Response Checklist
 
IA article (Margaret S. Marangione) (1)
IA article (Margaret S. Marangione) (1)IA article (Margaret S. Marangione) (1)
IA article (Margaret S. Marangione) (1)
 
Chinoy Paper 2016 - WDQC-MakingtheMostofWorkforceData-web
Chinoy Paper 2016 - WDQC-MakingtheMostofWorkforceData-webChinoy Paper 2016 - WDQC-MakingtheMostofWorkforceData-web
Chinoy Paper 2016 - WDQC-MakingtheMostofWorkforceData-web
 
Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?
 
LIS 60030 Final Project
LIS 60030 Final ProjectLIS 60030 Final Project
LIS 60030 Final Project
 
Ethical issues and social issues related to systems upload
Ethical issues and social issues related to systems uploadEthical issues and social issues related to systems upload
Ethical issues and social issues related to systems upload
 
An Overview of the Major Compliance Requirements
An Overview of the Major Compliance RequirementsAn Overview of the Major Compliance Requirements
An Overview of the Major Compliance Requirements
 

Recently uploaded

Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 

Recently uploaded (20)

Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 

Trouble with the terroriest

  • 1. Q#1 what concepts in this chapter are illustrated in this case? The main goal of FBI‟s Terrorist Screening Center (TSC) is to consolidate multiple databases into a single unified one. The second major concept which is taken from this chapter is to provide information which is needed to all the agencies by using data warehouses. Agencies can receive a data Marta subset of data that pertains to its precise task. The State Department screens applicants for visas to enter the residents applying for passports, while local law informant agencies use the FBI system to help with arrests, detentions, and other illegal justice activities. The third major concept is to manage data and resources effectively and efficiently. Rule for the data sharing, standarrdizing and classification has not been established by the information policy. Data administration seems to be poor for the availability, usability, integrity, and security of the data seems to be missing. With government regulations it would help increase the privacy, security, data quality, and compliance. To decrease the number of inconsistent record, records duplication and records that had unclear sources, data quality audits and data purification are greatly needed. Q#2 why was the consolidated terror watch list created? What are the benefits of the list? In 2003 Government announced the creation of a “Terrorist Screening Center” aimed at providing centralized access to a single, unified database of anti-terrorist information. Currently, a dozen so-called “terrorist watch lists” are maintained by nine federal agencies. To organize and standardize information about suspected terrorists between multiple government agencies into a single list, the FBI‟s Terrorist Screening Center, or TSC, was established. It is also established to enhance communications between agencies. Multiple agencies were maintaining separate lists and that these agencies lacked a consistent process to share relevant information about the individuals on each agency‟s list. A database of suspected terrorists known as the terrorist watch list was born from these efforts in 2003 in response to criticisms that multiple agencies . Benefits of consolidated terror watch list: 1. Classifying and organizing information. 2. Provided record by NCTC and by FBI 3. Updating information with time. 4. Distributing information properly.
  • 2. Q#3 Describe some of the weaknesses of the watch list. What management, organization, and technology factors are responsible for these weaknesses? Management: policies for choice and removal are not standardized between legislative departments. The size of the list is out of control it has grown to over 750,000 records since its creation and is continuing to grow at a rate of 200,000 records each year since 2004. However, obvious non-terrorists are included on the list. There is no simple or quick rectify process for removal from the list. The watch list has drawn criticism because of its potential to support racial profiling and inequity. Organization: Integrating 12 different databases into one is a difficult process. Corresponding the knowledge of how someone is added to the list is difficult. On the other hand, for innocent people who are unnecessarily inconvenienced, the incapacity to ascertain how they came to be on the list is shocking. Criteria for addition on the list may be too minimum. The government agencies not have standard individuals to the list, performing modifications to information, and relaying those changes to other governmental offices. Technology: The poor quality of the record leads to erroneous data. The TSA needs to perform an intensive data quality checking and data cleansing to help match imperfect data in airline reservation systems with defective data on the watch lists. There is still more work to be done to integrate that list with those maintained by airlines, individual states, and other localities using more information to distinguish individuals. Q#4 if you were responsible for the management of the TSC watch list database, what steps would you takes to correct some of these weaknesses? To make the data reliable, correct and for security of the data the quality audit should be held on yearly basis. To remove many of the imperfections of the data the data cleansing software should be used. Standardize procedures for nomination and removal from the lists Information policies and data governance policies need to be developed. There should not records duplications, inconsistent data there should not leave necessary data fields and the sources of data should be
  • 3. consistent. Such policies should use which match the watch lists of government and the individuals both. Q#5 Do you believe that the watch list represents a significant threat to individuals’ privacy or Constitutional rights? Why or why not? I do not believe that the watch list represents a significant threat to an individual‟s privacy or constitutional rights. I believe everyone has right to his own privacy, what an individual does is their choice. We give up a little of our privacy every day with the decisions that we make it is our choice how much privacy we give up. As the list is concentrated on terrorist suspects if we are „doing the right thing‟ we should have no need to worry if our privacy is being invaded.