Terrorist Watch List Screening: Efforts to Help Reduce Adverse Effects on the Public: GAO-06-1031

Jarmon, Gloria; Anderson, Paul
October 2006
GAO Reports;10/6/2006, p1
Government Document
A consolidated watch list managed by the FBI's Terrorist Screening Center (TSC) contains the names of known or suspected terrorists, both international and domestic. Various agencies whose missions require screening for links to terrorism use watch list records. For example, U.S. Customs and Border Protection (CBP) screens travelers at ports of entry. Because screening is based on names, it can result in misidentifications when persons not on the list have a name that resembles one on the list. Also, some names may be mistakenly included on the watch list. In either case, individuals can be negatively affected and may express concerns or seek agency action, or redress, to prevent future occurrences. This report addresses: (1) the extent to which the numbers of misidentified persons are known and how they could be affected, (2) the major reasons misidentifications occur and the actions agencies are taking to reduce them or minimize their effects, and (3) the opportunities for redress available to individuals with watch list-related concerns. In conducting work at TSC and the principal federal agencies that use watch list data, GAO reviewed standard operating procedures and other relevant documentation and interviewed responsible officials. GAO makes no recommendations at this time because the agencies have ongoing initiatives to improve data quality, reduce the number of misidentifications or mitigate their effects, and enhance redress efforts. Annually, millions of individuals--from international travelers to visa applicants--are screened for terrorism links against the watch list. At times, a person is misidentified because of name similarities, although the exact number is unknown. In some cases, agencies can verify the person is not a match by comparing birth dates or other data with watch list records, but agencies do not track the number. In other cases, they ask TSC for help. From December 2003 (when TSC began operations) to January 2006, agencies sent tens of thousands of names to TSC, and about half were misidentifications, according to TSC. While the total number of people misidentified may be substantial, it likely represents a fraction of all people screened. Even so, misidentifications can lead to delays, intensive questioning and searches, missed flights, or denied entry at the border. Misidentifications most commonly occur with names that are identical or similar to names on the watch list. To rapidly screen names against the watch list, agencies use computerized programs that account for differences due to misspellings and other variations. TSC has ongoing initiatives to improve computerized matching programs and the quality of watch list records. Also, CBP and the Transportation Security Administration (TSA) have established procedures designed to expedite frequently misidentified persons through screening, after confirming they are not on the watch list. Because security measures regrettably may cause personal...


Related Articles

  • SUPPLY CHAIN SECURITY: CBP Has Made Progress in Assisting the Trade Industry in Implementing the New Importer Security Filing Requirements, but Some Challenges Remain. Caldwell, Stephen L. // GAO Reports;10/12/2010, preceding p1 

    The article presents a study on supply chain security conducted by the Government Accountability Office in the U.S. It notes on the implementation of the new Importer Security Filing (ISF) requirements to address security concerns on cargo containers with smuggled contrabands which may include...

  • Leadership and focus. Browning, Douglas M. // Journal of Commerce (1542-3867);1/9/2006 Supplement, Vol. 7, p62 

    The article comments on the role of the U.S. Customs and Border Protection and the private sector in the improvement of border security. Several challenges being faced by the agency in addressing the threats of terrorism includes leadership and focus. It highlights the organizational and...

  • Aviation Security: Management Challenges Remain for the Transportation Security Administration's Secure Flight Program: GAO-06-864T.  // GAO Reports;6/14/2006, p1 

    After the events of September 11, 2001, the Transportation Security Administration (TSA) assumed the function of passenger prescreening--or the matching of passenger information against terrorist watch lists to identify persons who should undergo additional security scrutiny--for domestic...

  • CBP Technology Office Official Outlines Needs, Challenges.  // TR2: Terror Response Technology Report;12/8/2010, Vol. 6 Issue 25, p4 

    The article looks at the needs and challenges outlined by the Office of Technology Innovation and Acquisition of the U.S. Customs and Border Protection. Technologies and solutions to help with surveillance, detection and identification are being sought by the new office. Additional information...

  • What's a 3PL? Edmonson, R. G. // Journal of Commerce (1542-3867);12/10/2007, Vol. 8 Issue 49, p28 

    This article focuses on the invitation by the U.S. Customs and Border Protection to third-party logistics providers (3PLs) to join the ranks of the Customs-Trade Partnership Against Terrorism (C-TPAT). The move by the Customers and Border Protection is a logical step after it has signed up more...

  • Border Security: Investigators Transported Radioactive Sources Across Our Nation's Borders at Two Locations: GAO-06-583T. Kutz, Gregory D. // GAO Reports;3/28/2006, p1 

    To address the threat of dirty bombs and other nuclear material, the federal government has programs in place that regulate the transportation of radioactive sources and to prevent illegal transport of radioactive sources across our nation's borders. The Department of Homeland Security through...

  • Protecting the Homeland Through Soft Power. Traina III, Dominic J. // Journal of Counterterrorism & Homeland Security International;Summer2009, Vol. 15 Issue 2, p50 

    The article reports on softpower efforts in h omeland security in the U.S. It discusses the relation between soft power and the encouragement of states responsibility which was echoed by President Barack Obama in his announcement to not to wage war with Islam. Among the noted soft power efforts...

  • Northrop Grumman [NOC]: Briefing.  // TR2: Terror Response Technology Report;3/16/2011, Vol. 7 Issue 6, p1 

    This section offers news briefs related to terrorim prevention in the U.S. General Atomics has been awarded a contract of 21.2 million U.S. dollars by the Customs and Border Protection. The U.S. Government Accountability Office (GAO) denies the reinstatement of Northrop Grumman Corp. (NOC) of...

  • Region secure but don't let guard down, says expert. Kahn, Kathy // Hudson Valley Business Journal;2/6/2006, Vol. 17 Issue 3, p34 

    The article reports on the efforts of the government to provide security in New York. Congressman Peter King has affirmed that the government has done a good job in providing security despite possible terrorism attack. King, the chairman of the House Homeland Security Committee commended the...


Read the Article

Other Topics