Hasil (
Bahasa Indonesia) 1:
[Salinan]Disalin!
Detroit on Christmas Day 2009, had not made it ontothe no-fly list. Although Abdulmutallab’s father hadreported concern over his son’s radicalization to theU.S. State Department, the Department did notrevoke Adbulmutallab’s visa because his name wasmisspelled in the visa database, so he was allowed toenter the United States. Faisal Shahzad, the TimesSquare car bomber, was apprehended on May 3,2010, only moments before his Emirates airline flightto Dubai and Pakistan was about to take off. Theairline had failed to check a last-minute update to theno-fly list that had added Shahzad’s name.Sources: Scott Shane, “Lapses Allowed Suspect to Board Plane,”The New York Times, May 4, 2010; Mike McIntire, “Ensnared byError on Growing U.S. Watch List,” The New York Times, April 6,2010; Eric Lipton, Eric Schmitt, and Mark Mazzetti, “Review of JetBomb Plot Shows More Missed Clues,” The New York Times,January 18, 2010; Lizette Alvarez, “Meet Mikey, 8: U.S. Has Himon Watch List,” The New York Times, January 14, 2010; EricLichtblau, “Justice Dept. Finds Flaws in F.B.I. Terror List,” The NewYork Times, May 7, 2009; Bob Egelko, “Watch-list Name ConfusionCauses Hardship,” San Francisco Chronicle, March 20, 2008;“Reports Cite Lack of Uniform Policy for Terrorist Watch List,” TheWashington Post, March 18, 2008; Siobhan Gorman, “NSA’sDomestic Spying Grows as Agency Sweeps Up Data,” The WallStreet Journal, March 10, 2008; Ellen Nakashima, and ScottMcCartney, “When Your Name is Mud at the Airport,” The WallStreet Journal, January 29, 2008.242 Part Two Information Technology InfrastructureCASE STUDY QUESTIONS1. What concepts in this chapter are illustrated inthis case?2. Why was the consolidated terror watch listcreated? What are the benefits of the list?3. Describe some of the weaknesses of the watchlist. What management, organization, andtechnology factors are responsible for theseweaknesses?4. How effective is the system of watch listsdescribed in this case study? Explain your answer.5. If you were responsible for the management ofthe TSC watch list database, what steps would youtake to correct some of these weaknesses?6. Do you believe that the terror watch listrepresents a significant threat to individuals’privacy or Constitutional rights? Why or why not?
Sedang diterjemahkan, harap tunggu..