Terrorist Watch List Database: A Case Study
Don E. Gregory
INFO 531: Management Information Systems
Abstract
Since the attacks on the World Trade Center, our nation has been at war with terrorism. We have approached this war on two fronts, one by attacking our enemies in armed combat, and two by enacting preventive measures to eliminate their harmful tactics. One such measure is known as the FBI’s Terrorist Watch List. The TWL is a large database of information on what are known as persons of interest or known terrorist. As with any large database the list has weaknesses and shortcomings, pros and cons, that contribute to its effectiveness and when information gathered is on individuals, leaves itself open to criticism and skepticism. Also as with any compilation of information, the database is ever evolving and changing, making it necessary for quality and audit controls to be in place. This paper discusses all these topics and more.
Terrorist Watch List Database: A Case Study
A data warehouse is a database that stores current and historical data of potential interest to decision makers throughout the company. [1] After the events of September 11, 2001, the US Government determined the need for a comprehensive single source to identify and deter all persons either suspected to engage in terrorist activities against the US. Thus, the Terrorist Watch List and Database were created, bringing together all the information from various government agencies who had previously been maintaining separate lists of persons, into the Watch List in a standard format and available to all. This database is an example of data warehousing.
Why was the list created and what are the benefits?
Purpose and reason for the list
Prior to the existence of the watch list database, multiple government agencies gathered information on
References: 1. Laudon, Kenneth C. and Jane P., (2012), Management Information Systems: Managing the Digital Firm, New Jersey: Pearson Prentice Hall. 2. Krouse, W.J. (2004). CRS Report for Congress Terrorist Identification, Screening, and Tracking Under Homeland Security Presidential Directive 6. http://congressionalresearch.com/RL32366/document.php 3. http://www.huffingtonpost.com/2012/10/02/terrorist-watch-list-database_n_1936515.html 4. http://www.homelandsecutitynewswire.com/questions-raised-about-effectiveness-terror-watch-list 5. http://usatoday30.usatoday.com/news/washington/2009-03-10-watchlist_N.htm 6. http://www.aclu.org/technology-and-liberty/watch-lists 7. http://www.fbi.gov/about-us/nsb/tsc/tsc_liberties 8. http://www.justice.gov/oig/reports/FBI/a0527/laws.htm 9.