Categories
Writers Solution

Challenge Founded in 2011, Skycaps Cloud Services is sharply focused on public-sector The FBI’s Terrorist Screening Center

THE CASE
Challenge Founded in 2011, Skycaps Cloud Services is sharply focused on public-sector The FBI’s Terrorist Screening Center, or TSC, was established to consolidate information about suspected terrorists from multiple government agencies into a single list to enhance inter-agency communication. A database of suspected terrorists known as the terrorist watch list was created. Multiple U.S. government agencies had been maintaining separate lists and these agencies lacked a consistent process to share relevant information. Records in the TSC database contain sensitive but unclassified information on terrorist identities, such as name and date of birth, that can be shared with other screening agencies. Classified information about the people in the watch list is maintained in other law enforcement and intelligence agency databases. Recrds for the watchlist database are provided by two sources: The National Counterterrorism Center (NCTC) managed by the Office of the Director of National Intelligence provides identifying information on individuals with ties to international terrorism. The FBI provides identifying information on individuals with ties to purely domestic terrorism. These agencies collect and maintain terrorist information and nominate individuals for inclusion in the TSC’s consolidated watch list. They are required to follow strict procedures established by the head of the agency concerned and approved by the U.S. Attorney General. TSC staff must review each record submitted before it is added to the database. An individual will remain on the watch list until the respective department or agency that nominated that person to the list determines that the person should be removed from the list and deleted from the database The TSC watch list database is updated daily with new nominations, modifications to existing records, and deletions. Since its creation, the list has ballooned to 400,000 people, recorded as 1.1 million names and aliases, and is continuing to grow at a rate of 200,000 records each year. Information on the list is distributed to a wide range of government agency systems for use in efforts to deter or detect the movements of known or suspected terrorists. Recipient agencies include the FBI, CIA, National Security Agency (NSA), Transportation Security Administration (TSA), Department of Homeland Security, State Department, Customs and Border I 240 Part Two Information Technology Infrastructure Protection, Secret Service, U.S. Marshals Service, and the White House. Airlines use data supplied by the TSA system in their NoFly and Selectee lists for prescreening passengers, while the U.S. Customs and Border Protection system uses the watchlist data to help screen travelers entering the United States. The State Department system screens applicants for visas to enter the United States and U.S. residents applying for passports, while state and local law enforcement agencies use the FBI system to help with arrests, detentions, and other criminal justice activities. Each of these agencies receives the subset of data in the watch list that pertains to its specific mission. When an individual makes an airline reservation, arrives at a U.S. port of entry, applies for a U.S. visa, or is stopped by state or local police within the United States, the frontline screening agency or airline conducts a name-based search of the individual against the records from the terrorist watch list database. When the computerized name-matching system generates a “hit” (a potential name match) against a watch list record, the airline or agency will review each potential match. Matches that are clearly positive or exact matches that are inconclusive (uncertain or difficult to verify) are referred to the applicable screening agency’s intelligence or operations center and to the TSC for closer examination. In turn, TSC checks its databases and other sources, including classified databases maintained by the NCTC and FBI to confirm whether the individual is a positive, negative, or inconclusive match to the watch list record. TSC creates a daily report summarizing all positive matches to the watch list and distributes them to numerous federal agencies. The process of consolidating information from disparate agencies has been a slow and painstaking one, requiring the integration of at least 12 different databases. Two years after the process of integration took place, 10 of the 12 databases had been processed. The remaining two databases (the U.S. Immigration and Customs Enforcement’s Automatic Biometric Identification System and the FBI’s Integrated Automated Fingerprint Identification System) are both fingerprint databases. There is still more work to be done to optimize the list’s usefulness. Reports from both the Government Accountability Office and the Office of the Inspector General assert that the list contains inaccuracies and that government departmental policies for nomination and removal from the lists are not uniform. There has also been public outcry resulting from the size of the list and well-publicized incidents of obvious non-terrorists finding that they are included on the list. Information about the process for inclusion on the list must necessarily be carefully protected if the list is to be effective against terrorists. The specific criteria for inclusion are not public knowledge. We do know, however, that government agencies populate their watch lists by performing wide sweeps of information gathered on travelers, using many misspellings and alternate variations of the names of suspected terrorists. This often leads to the inclusion of people who do not belong on watch lists, known as “false positives.” It also results in some people being listed multiple times under different spellings of their names. While these selection criteria may be effective for tracking as many potential terrorists as possible, they also lead to many more erroneous entries on the list than if the process required more finely tuned information to add new entries. Notable examples of ‘false positives’ include Michael Hicks, an 8-year-old New Jersey Cub Scout who is continually stopped at the airport for additional screening and the late senator Ted Kennedy, who had been repeatedly delayed in the past because his name resembles an alias once used by a suspected terrorist. Like Kennedy, Hicks may have been added because his name is the same or similar to a different suspected terrorist. These incidents call attention to the quality and accuracy of the data in the TSC consolidated terrorist watch list. In June 2005, a report by the Department of Justice’s Office of the Inspector General found inconsistent record counts, duplicate records, and records that lacked data fields or had unclear sources for their data. Although TSC subsequently enhanced its efforts to identify and correct incomplete or inaccurate watch list records, the Inspector General noted in September 2007 that TSC management of the watch list still showed some weaknesses. Given the option between a list that tracks every potential terrorist at the cost of unnecessarily tracking some innocents, and a list that fails to track many terrorists in an effort to avoid tracking innocents, many would choose the list that tracked every terrorist despite the drawbacks. But to make matters worse for those already inconvenienced by wrongful inclusion on the list, there is currently no simple and quick redress process for innocents that hope to remove themselves from it. The number of requests for removal from the watch list continues to mount, with over 24,000 requests recorded (about 2,000 each month) and only 54 percent of them resolved. The average time to process a request in 2008 was 40 days, which was not (and still is not) fast enough to keep pace with the number of requests for removal coming in.
QUESTIONS:
a. Analyze weaknesses of the watch list. What management, organization, and technology factors are responsible for these weaknesses? (first write what is watch list, second write in what basis the watch list prepared, third you have to make a heading of the weaknesses and in this weakness for example one of the weaknesses about the typical errors and why these typical errors acquired and because of these typical errors what are the main problems will acquire. So when you talk about each weakness you have to say the weakness and why it acquired and because of this weakness what are the main problems will acquire. So you have to mention 5 weaknesses).
b. Assume that you were responsible for the management of the TSC watch list database, recommend steps that would you take to correct some of these weaknesses.
(here you have to write the solutions for the above weaknesses)

GET SOLUTION FOR THIS ASSIGNMENT, Get Impressive Scores in Your Class

CLICK HERE TO MAKE YOUR ORDER

TO BE RE-WRITTEN FROM THE SCRATCH

GET SOLUTION FOR THIS ASSIGNMENT

CLICK HERE TO MAKE YOUR ORDER

TO BE RE-WRITTEN FROM THE SCRATCH

NO PLAGIARISM

  • Original and non-plagiarized custom papers- Our writers develop their writing from scratch unless you request them to rewrite, edit or proofread your paper.
  • Timely Deliveryprimewritersbay.com believes in beating the deadlines that our customers have imposed because we understand how important it is.
  • Customer satisfaction- Customer satisfaction. We have an outstanding customer care team that is always ready and willing to listen to you, collect your instructions and make sure that your custom writing needs are satisfied
  • Confidential- It’s secure to place an order at primewritersbay.com We won’t reveal your private information to anyone else.
  • Writing services provided by experts- Looking for expert essay writers, thesis and dissertation writers, personal statement writers, or writers to provide any other kind of custom writing service?
  • Enjoy Please Note-You have come to the most reliable academic writing site that will sort all assignments that that you could be having. We write essays, research papers, term papers, research proposals. Challenge Founded in 2011, Skycaps Cloud Services is sharply focused on public-sector The FBI’s Terrorist Screening Center

Get Professionally Written Papers From The Writing Experts 

Green Order Now Button PNG Image | Transparent PNG Free Download on SeekPNG Our Zero Plagiarism Policy | New Essays
Categories
Writers Solution

Huawei is a telecommunications company that was founded in China and rose surprisingly fast in recent time and currently has 16% of the cellphone market

Term Project Proposal

1a) The issue:

Huawei is a telecommunications company that was founded in China and rose surprisingly fast in recent time and currently has 16% of the cellphone market and almost 95% of the 5G network market due to their lower prices, technological advancement and fast implementation of networks globally forming partnerships with foreign government and fulfilling network contracts for them.

Chinese telecommunications company Huawei is under scrutiny around the globe as of (2018) over concerns that its close ties with the Chinese government presents national security threats to the U.S., Europe and allied countries due to the company having to submit any data they get from consumers using their products to the Chinese government by law.

This creates security compromises for the consumers, introducing various privacy risks as well as risks of espionage by the Chinese government towards other foreign governments and its citizens.

Huawei was planning to establish 5G networks worldwide in various countries including the UK, Australia, Canada and others. Huawei being the leading expert on 5G network technologies until the ban by the Trump, president of the USA towards Huawei led to the media picking up the story, eventually creating a negative chain reaction towards Huawei’s brand image and their trustworthiness.

Huawei’s handling of the matter using external communication strategies has been abysmal and is what led them to having the crisis they have now. Huawei has not tried to communicate externally to the stakeholders, consumers or foreign governments except for having the Chinese government respond to Trump’s ban towards them by introducing reciprocal increases in trade deficits against America’s agricultural businesses.

1b) Three different points of view on the situation:

i. Timothy Heath, senior international defense research analyst at the RAND Corporation, believes it is entirely plausible that the firm’s phones could be used to spy.

ii. On Aug 7 of 2019, Trump says he doesn’t want to do business with Huawei due to the “national security threat” it represents.

iii. During a keynote by Huawei chairman Guo Ping, he stated that “there is no evidence, nothing”, adding that the vendor had never planted backdoors in its equipment and would not permit third parties to meddle with its kit. Guo said, according to Business Insider: “Carriers are responsible for the secure operations of their own networks. Carriers can prevent outside attacks.”

1c)

This case study will attempt to assess and analyze Huawei’s internal and external communicative strategies and responses that have been used and peer through people’s responses towards the company using a global view outlook that has been generated throughout the case both using traditional and electronic media.

The most effective communication strategy to be deployed in response to this crisis is to offer a swift apology for the all the parties affected by this situation and to begin to monitor the issues identified by the stakeholders on the various traditional and non traditional media platforms and elucidate using those media outlets to the stakeholders and potential customers on why the equipment used by the company has no potential way to be used as spying tools by providing proof of those claims using verifiable non-affiliated outside sources to test the equipment used by Huawei and put the interested public and stakeholders minds at peace. The company should also revaluate and revamp their security protocols up to the standards of each different country they plan to operate in, to reduce any risk of unlawful data collection.

2a) Starting with a news conference to offer an apology to all affected parties and then explaining in short but detailed responses the main potential issue claimed by the governments and other entities involved and how the company will seek to rectify the situation. The company will then allow government security agencies in countries they operate in full access to what they need to inspect the potential security risks present against the company. If any security hazards are confirmed as present, the company will then revamp the security systems and technology used until the official security agencies approve of the changes being done up to the standards required.

b) This paper is intended to reach potential Huawei customers, official government entities and current Huawei customers. The main objectives of the piece is to ease the stress induced to customers due to the current media frenzy on the ongoing case by focusing on the security protocols used by the company, how they work exactly and then sharing how the security and privacy of the stakeholders is held as a top priority by the company. Moving forward, the company will set out an objective to repair and extract away any potential hardware or software issues that can be used to collect data unlawfully, following through with a proven statement by the governing security agencies in charging of verifying if the issues have been resolved.

c) Various traditional and non-traditional media outlets such as TV(news), radio talk shows, internet blogs and social media sites will be monitored for either positive or negative responses towards the strategies implemented by the company to track if the changes created are on the right track in reducing the negative effects of the crisis. Intranet and internal communication channels within the company should also be monitored as employees involved always offer valuable responses on whether any new strategies are effective.

3) Security and privacy concerns related to the 5G network technology implementation need to be addressed and remodulated to the security standards set by the telecommunication networks governed and which Huawei intends to operate their technologies with. Swift and widespread response is needed in cases of privacy invasion concerns to companies in order to ease stakeholder tension and minimize any negative public images of the company set out by the media.

THE TESTING OF MICHAEL MCCAIN – ProQuest. (2019). Retrieved December 29, 2019, from Athabascau.ca website: https://0-search-proquest-com.aupac.lib.athabascau.ca/docview/194519272?accountid=8408&ticket=ST-440-N-tK5Y4VLUfqDte67sOWTNYerrI-prd-cas-01

Jin, Y., Liu, B. F., & Austin, L. L. (2011). Examining the Role of Social Media in Effective Crisis Management. Communication Research41(1), 74–94. https://doi.org/10.1177/0093650211423918

Integrated Communication as Strategic Communication: EBSCOhost. (2015). Retrieved December 29, 2019, from Athabascau.ca website: http://0-web.a.ebscohost.com.aupac.lib.athabascau.ca/ehost/detail/detail?vid=0&sid=8f219789-4a7d-4ed0-8ee4-d4c677522e0f%40sdc-v-sessmgr03&bdata=JkF1dGhUeXBlPXVybCxpcCx1aWQmc2l0ZT1laG9zdC1saXZl

Is Huawei a national security threat? | Penn Today. (2019, July 19). Retrieved December 28, 2019, from Penn Today website: https://penntoday.upenn.edu/news/why-huawei-national-security-threat

Cilluffo, F. J., & Cardash, S. L. (2018, December 19). What’s wrong with Huawei, and why are countries banning the Chinese telecommunications firm? Retrieved December 28, 2019, from The Conversation website: https://theconversation.com/whats-wrong-with-huawei-and-why-are-countries-banning-the-chinese-telecommunications-firm-109036

O’Flaherty, K. (2019, February 27). Huawei Security Scandal: Everything You Need to Know. Forbes. Retrieved from https://www.forbes.com/sites/kateoflahertyuk/2019/02/26/huawei-security-scandal-everything-you-need-to-know/#105412d373a5

Huawei Technologies Corporation: from local dominance to global challenge?  |  Emerald Insight. (2019). Journal of Business & Industrial Marketing. https://doi.org/10.1108\/jbim

Internationalization Strategy of MNEs from Emerging Economies: The Case of Huawei |  Emerald Insight. (2009). Multinational Business Review. https://doi.org/10.1108\/mbr