DHS Case Study

Instructions:  Read the case study below and addressthe applicable questions.

  1. Prepare a 4 – 6 page paper in Microsoft Word on one of the topics below.  I encourage you to leverage outside sources/references, which can help bolster and strengthen your arguments and discussion.
  2. If you discuss outside sources, be sure to cite them accordingly within your document and on your references page.
  3. The 4 – 6 pages does not include the title page, abstract page, or references page (if outside sources are used).
  4. Paper should be written in APA format (title page, double-spacing, abstract, page header, 1″ margins, references page, etc.)
  5. Turnitin.com has been enabled for this assignment so remember that your submission’s file type must be either doc or docx.  Your Turnitin matching score (displayed shortly after you submit your paper to the Dropbox) should not exceed 25%.
  6. The 4 – 6 page requirement means at least 4 FULL pages minimum, not 3 pages, not 3.5 pages, etc. (Please include web address for references used)

Case Study:

The Department of Homeland Security (DHS) is interested inusing technologies to identify suspected of money laundering operations withinthe United States. The system would perform data mining in order to determinepurchases and travel patterns that could ultimately identify individuals whoare engaged in, or at least planning to launder money.  DHS asks a panelof information security professionals to determine the feasibility of thisproject.  Several participants believe a major challenge would be todetermine the patterns of transactions and other indicators. As a participant,you suggest that it might be possible to construct a computer program that usesartificial intelligence to mimic money laundering activity. The program woulddetermine the transactions needed to execute money laundering activities. Oncethese transactions were determined, it would be possible to search relateddatabases and other information resources to locate further evidence.  Alarge population of individuals would need to be monitored/searched,potentially violating their privacy rights.

  1. As an information security professional assigned to this project, what would ethical and moral issues might arise from developing a computer program capable of violating numerous individuals’ privacy in order to identify criminal activities of a few? 
  2. How does this play into what we learned in the course, regarding issues related to violating an individual’s privacy?
  3. Is the greater good of society served by using this approach?   What course of action would you take if placed into this situation?

Leave a Reply

Your email address will not be published. Required fields are marked *