Opinion: Why the DHS's automated target system makes sense
Fix the flaws and ensure that customs agents have the best data to weed out terrorists
Computerworld - There's been a lot of criticism about the U.S. Department of Homeland Security's Automated Targeting System, a terrorist-ranking system for airline passengers, but I don't see anything wrong with it in principle.
The ATS, as it is known, supposedly takes the Passenger Name Records (PNR), basically a flight reservation record, of international travelers, and gives each passenger a score on the likelihood that he or she could be a terrorist. Fundamentally, I don't see a problem with this.
I should make a few disclaimers, though. If there are laws being violated, or if the activity requires a law to allow for it, then the program should be immediately halted. This means that the program is illegal, and the appropriate investigations should be performed.
Likewise, I think the ATS needs to be studied to determine whether too many people are irrationally singled out as potential terrorists. This doesn't mean the program should be abandoned. It just means that the weaknesses in the program should be identified and fixed. I also believe the 40-year retention of records is a major waste of resources.
I recently got back from a trip to Europe, and after hearing the worst about ATS, I have to admit that I came to appreciate it. I probably score very low on the terrorist scale, so for me, the system creates a fast path through customs and immigration, just like it apparently did for many individuals who were also racing through international arrivals.
I would have to assume that the factors in my favor include a high-level status in frequent-flier programs, paying for tickets with established credit cards, and ironically, making frequent international trips. The only time I had a problem going through customs and immigration, since the ATS was implemented, was when an overly suspicious immigrations agent had a hard time believing that I traveled to Amsterdam for less than a day and wasn't bringing drugs back into the country.
Frankly, this is the way it should be. You don't want government employees having to make a lot of their own evaluations of people on the spot, especially when they have the reality of hundreds, maybe thousands, of passengers going through the system every hour. A system that looks at the available facts and automates the thought processes of experienced agents can help agents of all experience levels. Even the best agents cannot consistently deliver quality evaluations. The ATS, in principle, just makes a lot of sense.
Many people may remember that I was highly critical of the U.S. National Security Agency's domestic spying activities. Let's compare the two programs, so you can see what the major differences are, with the ATS being infinitely more legitimate than the NSA's "program."
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Gartner Report: A Guide to Gartner's Enterprise Mobile Security Self-Assessment Gartner introduces a model and a Toolkit intended to help mobility and security IT leaders assess their enterprise mobility programs from a security...
- Gartner Report: Containing Mobile Security Risks With the 80/20 Rule IT planners can deliver better mobile protection with higher user satisfaction by segmenting users into risk groups before committing to specific management or...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts