SlideShare uma empresa Scribd logo
1 de 2
CAPPS II (Computer Assisted Passenger Pre-Screening System) is a new Transportation
Security Administration (TSA) is using to check personal details of every passenger
boarding U.S flights in order to combat terrorism and prevent hijacking airplanes.

You are required to give your name, address, home phone number and birth date to be
checked. CAPPS II uses this information to check the passengers’ background
information and personal details to check it against commercial and governmental
databases. After they check the passengers’ details, the profile is “tagged” with a colour-
coded score indicating the level of security that you appear to have. Based on the colour
or score of the profile, the passenger could be detained, interrogated or have an
investigation done. If the score indicates you are a potential hazard for the U.S you can
be prohibited from flying and entering the U.S. this process is commonly known a
Computer Profiling because it creates a profile of every passenger according to the
stereotype their information matches the most with, for example, a Muslim passenger
would probably be colour coded as someone potential dangerous, and would be
detained for further questions and research.

Technology in this case makes the recollection of data and the checking of information
more accurate because it follows a systematic method and it checks every little aspect
of the person. Biometrics analyses and stores the passengers physical aspects such as
fingerprints, iris, voice pitch etc… Meaning that in case there’s a need to check the
reliability of the passengers’ information, the biometrics would make this easier and
more accurate.

Computer profiling has raised a lot of controversy because many people think it goes
against your fundamental right of privacy and your fundamental right to travelling.

      Right of privacy is violated because your personal information is stored in a
       governmental database for further research. Other information such as recent
       purchases, credit card history, bank account balance, family phone number,
       place of work etc… is obtained from commercial databases where all this
       information has been stored for other purposes. The information is saved for a
       lifetime in a open book to travel authorities. This could represent a potential
       problem because no one ensures every citizen that there’s not going to be a
       leach of information, or that the information is not going to be used for purposes
       other than governmental purposes. Furthermore, it is a violation of privacy
       because personal details are saved into a database for a lifetime meaning that
       every travel authority would have access to your personal info. Meaning that if
       someone would want to kidnap, rob or plan an attack, they would have all the
       information they need.
      Security issues arise in the moment personal and sensible information is stored
       in open book to travel authorities. As said before, no one will give an explanation
       in case the databases are hacked or if someone uses this information for other
       purposes. This could also lead to some corruption. The reason of this is because
       in case a travel agent wishes to change information to keep someone form
entering the country or leaving they have all the information they need.
       Technology in this case makes this process easier because the database is open
       and available at anytime inside and out of governmental facilities. Databases
       keep the records in order and most of them are kept up-to-date because they
       are fed by public and commercial databases. So information like, bank accounts,
       personal likings and other information is constantly being updated.
      Reliability of the system represents another important issue because CAPPS II
       could easily misidentify someone and tag him or her with a red label, making
       them terrorists or criminals, disabling them to travel in air. This “false positive”
       not only means that the passenger is psychologically affected but the
       government would waste valuable resources and time. On the other hand “false
       positives” is a big problem because it comes into conflict with every persons
       right of travelling and privacy. To what extent should every personal detail of
       your life be analyzed, stored and become material for scrutiny only for travelling
       purposes?
      A list of people misidentified is one of the biggest concerns that people have
       over this system. What will happen to the list of names that were misidentified?
       Who will guard this list? Will these people be able to see this information and
       under what parameters they were identified as being potential danger?

http://www.prisonplanet.com/ludicrous-terrorist-watch-list-now-contains-over-1-
million-names.html
http://findarticles.com/p/articles/mi_m0UBT/is_5_18/ai_112820868



Some solutions for the issues described above are:
    Implementation of a Data Protection Act. The DPA gives you the right to choose
      who is permitted to view and alter information. If the TSA would like to regulate
      this, they could eliminate the idea of an open book to travel authorities and only
      have it open for FBI agents or agents with permission too view this database. It
      would eliminate the possibility that anyone changes the information for personal
      purposes; also it would enhancing the security factor because personal
      information would only be available only for those who really need it to check
      details and to ensure the security to the nation and not for public view.
    Antivirus and firewalls would enhance the security of the database making it
      harder for hackers to hack this information. This means that everyone who is in
      this database should not worry about their personal information being hacked
      and read by everybody, even worst, they would not worry about their security.

Mais conteúdo relacionado

Mais de itgsabc

Smart Homes (Alberto & Eduardo)
Smart Homes (Alberto & Eduardo)Smart Homes (Alberto & Eduardo)
Smart Homes (Alberto & Eduardo)
itgsabc
 
Smart Houses (Alberto & Eduardo)
Smart Houses (Alberto & Eduardo)Smart Houses (Alberto & Eduardo)
Smart Houses (Alberto & Eduardo)
itgsabc
 
Revision Data Protection Act ( Eduardo And Salvador)
Revision    Data  Protection  Act ( Eduardo And  Salvador)Revision    Data  Protection  Act ( Eduardo And  Salvador)
Revision Data Protection Act ( Eduardo And Salvador)
itgsabc
 
Revision Viruses ( Gerardo E)
Revision     Viruses ( Gerardo  E)Revision     Viruses ( Gerardo  E)
Revision Viruses ( Gerardo E)
itgsabc
 
Revision Psychological Consequences Of Being In Constant Contact ( Jose, ...
Revision    Psychological Consequences Of Being In Constant Contact ( Jose,  ...Revision    Psychological Consequences Of Being In Constant Contact ( Jose,  ...
Revision Psychological Consequences Of Being In Constant Contact ( Jose, ...
itgsabc
 
Portfolio Teleworking ( Javier)
Portfolio    Teleworking ( Javier)Portfolio    Teleworking ( Javier)
Portfolio Teleworking ( Javier)
itgsabc
 
Revision Terrorist And Rebel Use Of It (David & Jorge)
Revision   Terrorist And Rebel Use Of It (David & Jorge)Revision   Terrorist And Rebel Use Of It (David & Jorge)
Revision Terrorist And Rebel Use Of It (David & Jorge)
itgsabc
 
Revision Expert Systems (Claudia, Federico, Natalia)
Revision   Expert Systems (Claudia, Federico, Natalia)Revision   Expert Systems (Claudia, Federico, Natalia)
Revision Expert Systems (Claudia, Federico, Natalia)
itgsabc
 
Portfolio Internet Addiction (Monica And Lorena)
Portfolio   Internet Addiction (Monica And Lorena)Portfolio   Internet Addiction (Monica And Lorena)
Portfolio Internet Addiction (Monica And Lorena)
itgsabc
 
Portfolio Pro Ana Websites (Joanna And Rebecca)
Portfolio   Pro Ana Websites (Joanna And Rebecca)Portfolio   Pro Ana Websites (Joanna And Rebecca)
Portfolio Pro Ana Websites (Joanna And Rebecca)
itgsabc
 
Portfolio Biometric Use In Schools (Fingerprints) (Jenny)
Portfolio   Biometric Use In Schools       (Fingerprints) (Jenny)Portfolio   Biometric Use In Schools       (Fingerprints) (Jenny)
Portfolio Biometric Use In Schools (Fingerprints) (Jenny)
itgsabc
 
Revision Psychological Consequences Of Being In Constant Contact (Jose, Bobby)
Revision   Psychological Consequences Of Being In Constant Contact (Jose, Bobby)Revision   Psychological Consequences Of Being In Constant Contact (Jose, Bobby)
Revision Psychological Consequences Of Being In Constant Contact (Jose, Bobby)
itgsabc
 
Revision Data Protection Act (Eduardo And Salvador)
Revision   Data Protection Act (Eduardo And Salvador)Revision   Data Protection Act (Eduardo And Salvador)
Revision Data Protection Act (Eduardo And Salvador)
itgsabc
 
Revision Viruses (Gerardo E)
Revision    Viruses (Gerardo E)Revision    Viruses (Gerardo E)
Revision Viruses (Gerardo E)
itgsabc
 
Portfolio Should Students Use Wikipedia (David C)
Portfolio   Should Students Use Wikipedia (David C)Portfolio   Should Students Use Wikipedia (David C)
Portfolio Should Students Use Wikipedia (David C)
itgsabc
 
Portfolio Teleworking (Javier)
Portfolio   Teleworking (Javier)Portfolio   Teleworking (Javier)
Portfolio Teleworking (Javier)
itgsabc
 
School Of 2020 (Monica & Mauxi)
School Of 2020 (Monica & Mauxi)School Of 2020 (Monica & Mauxi)
School Of 2020 (Monica & Mauxi)
itgsabc
 
School Of 2020 (Willy)
School Of 2020 (Willy)School Of 2020 (Willy)
School Of 2020 (Willy)
itgsabc
 
School Of 2020 (Nicolas & Salvador)
School Of 2020 (Nicolas & Salvador)School Of 2020 (Nicolas & Salvador)
School Of 2020 (Nicolas & Salvador)
itgsabc
 
School Of 2020 (Gerardo E)
School Of 2020 (Gerardo E)School Of 2020 (Gerardo E)
School Of 2020 (Gerardo E)
itgsabc
 

Mais de itgsabc (20)

Smart Homes (Alberto & Eduardo)
Smart Homes (Alberto & Eduardo)Smart Homes (Alberto & Eduardo)
Smart Homes (Alberto & Eduardo)
 
Smart Houses (Alberto & Eduardo)
Smart Houses (Alberto & Eduardo)Smart Houses (Alberto & Eduardo)
Smart Houses (Alberto & Eduardo)
 
Revision Data Protection Act ( Eduardo And Salvador)
Revision    Data  Protection  Act ( Eduardo And  Salvador)Revision    Data  Protection  Act ( Eduardo And  Salvador)
Revision Data Protection Act ( Eduardo And Salvador)
 
Revision Viruses ( Gerardo E)
Revision     Viruses ( Gerardo  E)Revision     Viruses ( Gerardo  E)
Revision Viruses ( Gerardo E)
 
Revision Psychological Consequences Of Being In Constant Contact ( Jose, ...
Revision    Psychological Consequences Of Being In Constant Contact ( Jose,  ...Revision    Psychological Consequences Of Being In Constant Contact ( Jose,  ...
Revision Psychological Consequences Of Being In Constant Contact ( Jose, ...
 
Portfolio Teleworking ( Javier)
Portfolio    Teleworking ( Javier)Portfolio    Teleworking ( Javier)
Portfolio Teleworking ( Javier)
 
Revision Terrorist And Rebel Use Of It (David & Jorge)
Revision   Terrorist And Rebel Use Of It (David & Jorge)Revision   Terrorist And Rebel Use Of It (David & Jorge)
Revision Terrorist And Rebel Use Of It (David & Jorge)
 
Revision Expert Systems (Claudia, Federico, Natalia)
Revision   Expert Systems (Claudia, Federico, Natalia)Revision   Expert Systems (Claudia, Federico, Natalia)
Revision Expert Systems (Claudia, Federico, Natalia)
 
Portfolio Internet Addiction (Monica And Lorena)
Portfolio   Internet Addiction (Monica And Lorena)Portfolio   Internet Addiction (Monica And Lorena)
Portfolio Internet Addiction (Monica And Lorena)
 
Portfolio Pro Ana Websites (Joanna And Rebecca)
Portfolio   Pro Ana Websites (Joanna And Rebecca)Portfolio   Pro Ana Websites (Joanna And Rebecca)
Portfolio Pro Ana Websites (Joanna And Rebecca)
 
Portfolio Biometric Use In Schools (Fingerprints) (Jenny)
Portfolio   Biometric Use In Schools       (Fingerprints) (Jenny)Portfolio   Biometric Use In Schools       (Fingerprints) (Jenny)
Portfolio Biometric Use In Schools (Fingerprints) (Jenny)
 
Revision Psychological Consequences Of Being In Constant Contact (Jose, Bobby)
Revision   Psychological Consequences Of Being In Constant Contact (Jose, Bobby)Revision   Psychological Consequences Of Being In Constant Contact (Jose, Bobby)
Revision Psychological Consequences Of Being In Constant Contact (Jose, Bobby)
 
Revision Data Protection Act (Eduardo And Salvador)
Revision   Data Protection Act (Eduardo And Salvador)Revision   Data Protection Act (Eduardo And Salvador)
Revision Data Protection Act (Eduardo And Salvador)
 
Revision Viruses (Gerardo E)
Revision    Viruses (Gerardo E)Revision    Viruses (Gerardo E)
Revision Viruses (Gerardo E)
 
Portfolio Should Students Use Wikipedia (David C)
Portfolio   Should Students Use Wikipedia (David C)Portfolio   Should Students Use Wikipedia (David C)
Portfolio Should Students Use Wikipedia (David C)
 
Portfolio Teleworking (Javier)
Portfolio   Teleworking (Javier)Portfolio   Teleworking (Javier)
Portfolio Teleworking (Javier)
 
School Of 2020 (Monica & Mauxi)
School Of 2020 (Monica & Mauxi)School Of 2020 (Monica & Mauxi)
School Of 2020 (Monica & Mauxi)
 
School Of 2020 (Willy)
School Of 2020 (Willy)School Of 2020 (Willy)
School Of 2020 (Willy)
 
School Of 2020 (Nicolas & Salvador)
School Of 2020 (Nicolas & Salvador)School Of 2020 (Nicolas & Salvador)
School Of 2020 (Nicolas & Salvador)
 
School Of 2020 (Gerardo E)
School Of 2020 (Gerardo E)School Of 2020 (Gerardo E)
School Of 2020 (Gerardo E)
 

Último

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Último (20)

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 

Revision Effects Of Computer Profiling (Irene)

  • 1. CAPPS II (Computer Assisted Passenger Pre-Screening System) is a new Transportation Security Administration (TSA) is using to check personal details of every passenger boarding U.S flights in order to combat terrorism and prevent hijacking airplanes. You are required to give your name, address, home phone number and birth date to be checked. CAPPS II uses this information to check the passengers’ background information and personal details to check it against commercial and governmental databases. After they check the passengers’ details, the profile is “tagged” with a colour- coded score indicating the level of security that you appear to have. Based on the colour or score of the profile, the passenger could be detained, interrogated or have an investigation done. If the score indicates you are a potential hazard for the U.S you can be prohibited from flying and entering the U.S. this process is commonly known a Computer Profiling because it creates a profile of every passenger according to the stereotype their information matches the most with, for example, a Muslim passenger would probably be colour coded as someone potential dangerous, and would be detained for further questions and research. Technology in this case makes the recollection of data and the checking of information more accurate because it follows a systematic method and it checks every little aspect of the person. Biometrics analyses and stores the passengers physical aspects such as fingerprints, iris, voice pitch etc… Meaning that in case there’s a need to check the reliability of the passengers’ information, the biometrics would make this easier and more accurate. Computer profiling has raised a lot of controversy because many people think it goes against your fundamental right of privacy and your fundamental right to travelling.  Right of privacy is violated because your personal information is stored in a governmental database for further research. Other information such as recent purchases, credit card history, bank account balance, family phone number, place of work etc… is obtained from commercial databases where all this information has been stored for other purposes. The information is saved for a lifetime in a open book to travel authorities. This could represent a potential problem because no one ensures every citizen that there’s not going to be a leach of information, or that the information is not going to be used for purposes other than governmental purposes. Furthermore, it is a violation of privacy because personal details are saved into a database for a lifetime meaning that every travel authority would have access to your personal info. Meaning that if someone would want to kidnap, rob or plan an attack, they would have all the information they need.  Security issues arise in the moment personal and sensible information is stored in open book to travel authorities. As said before, no one will give an explanation in case the databases are hacked or if someone uses this information for other purposes. This could also lead to some corruption. The reason of this is because in case a travel agent wishes to change information to keep someone form
  • 2. entering the country or leaving they have all the information they need. Technology in this case makes this process easier because the database is open and available at anytime inside and out of governmental facilities. Databases keep the records in order and most of them are kept up-to-date because they are fed by public and commercial databases. So information like, bank accounts, personal likings and other information is constantly being updated.  Reliability of the system represents another important issue because CAPPS II could easily misidentify someone and tag him or her with a red label, making them terrorists or criminals, disabling them to travel in air. This “false positive” not only means that the passenger is psychologically affected but the government would waste valuable resources and time. On the other hand “false positives” is a big problem because it comes into conflict with every persons right of travelling and privacy. To what extent should every personal detail of your life be analyzed, stored and become material for scrutiny only for travelling purposes?  A list of people misidentified is one of the biggest concerns that people have over this system. What will happen to the list of names that were misidentified? Who will guard this list? Will these people be able to see this information and under what parameters they were identified as being potential danger? http://www.prisonplanet.com/ludicrous-terrorist-watch-list-now-contains-over-1- million-names.html http://findarticles.com/p/articles/mi_m0UBT/is_5_18/ai_112820868 Some solutions for the issues described above are:  Implementation of a Data Protection Act. The DPA gives you the right to choose who is permitted to view and alter information. If the TSA would like to regulate this, they could eliminate the idea of an open book to travel authorities and only have it open for FBI agents or agents with permission too view this database. It would eliminate the possibility that anyone changes the information for personal purposes; also it would enhancing the security factor because personal information would only be available only for those who really need it to check details and to ensure the security to the nation and not for public view.  Antivirus and firewalls would enhance the security of the database making it harder for hackers to hack this information. This means that everyone who is in this database should not worry about their personal information being hacked and read by everybody, even worst, they would not worry about their security.