Terrorist and criminal watch list systems -- sometimes referred to as watchout, lookout, target, or tip-off systems -- are important tools in controlling and protecting our nation's borders. The events of 9/11, and other incidents since then, have highlighted the need to share these watch lists. In light of the importance of border security, this report identifies Fed. databases and systems that contain watch lists, the agencies that maintain and use them in protecting our nation's borders, the kind of data they contain, whether Fed. agencies are sharing info. from these lists with each other and with state and local governments and private org's., the structural characteristics of those lists that are automated, and whether opportunities exist to consolidate these watch lists. Ill.
The Dept. of Homeland Security (DHS) invested more than $6 billion in 2009 on large-scale, info. tech. (IT) systems to help it achieve mission outcomes and transform departmentwide operations. For DHS to effectively leverage these systems as mission enablers and transformation tools, it needs to employ a number of institutional acquisition and IT mgmt. controls and capabilities, such as using an operational and technological blueprint to guide and constrain system investments and following institutional policies, practices, and structures for acquiring and investing in these systems. Also, employing rigorous and disciplined system life cycle mgmt. processes and having capable acquisition and IT mgmt. workforces.
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.