SlideShare a Scribd company logo
The Department of Homeland Security is interested in using computers to identify suspected of
money laundering operations within the United States. It would like to mine databases containing
information about purchases and travel to detect patterns that may identify individuals who are
engaged in, or at least planning, money laundering activity. It asks a panel of information
security professionals to determine the feasibility of this project. A panel members say the most
difficult problem will be determining what patterns of transactions to look for. As a panel
member you suggest that it might be possible to construct a computer program that uses artificial
intelligence to mimic money laundering activity. The program would determine the transactions
needed to execute money laundering act. Once these transactions were determined, it would be
possible to search databases resources to find evidence of these transactions. However, the major
draw back is that there would be no way to narrow the scope of investigation to a few potential
money laundering individuals and in fact a large population of individuals would needs to be
searched potentially violated many individual's privacy. As a information security professional
assigned to this project, what would be the ethical and moral issues, from your perspective, of
developing a computer program capable of violating a large population of individuals' privacy in
order to identify and potentially catch a few suspected individuals of money laundering? How
does this play into what we learned in this course about the issues related to violating an
individual's privacy? What about the greater good for society by catching these money
laundering individuals?

More Related Content

PPTX
FNC Corporate Protect Workshop
PPTX
03.fnc corporate protect workshop new
PPTX
FNC Corporate Protect
PDF
Consumers' and Citizens' Privacy
PDF
Biometric Facial Recognition
DOC
Ethical hacking1
PPT
Cybercrime
DOCX
Project_Paper_ISSC455_Intindolo
FNC Corporate Protect Workshop
03.fnc corporate protect workshop new
FNC Corporate Protect
Consumers' and Citizens' Privacy
Biometric Facial Recognition
Ethical hacking1
Cybercrime
Project_Paper_ISSC455_Intindolo

Similar to The Department of Homeland Security is interested in using computers t.pdf (12)

PPTX
Information Literacy, Privacy, & Risk: What Are the Implications of Mass Surv...
PDF
Graphs in Government
PDF
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
DOCX
Unit VI Case StudyHeadnoteIn addition to knowing how to fo.docx
PDF
The Self-Invasion Of Privacy
PPTX
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
PPTX
Iot privacy vs convenience
PDF
Ethical issues and social issues related to systems upload
PDF
Computer forensic
PDF
Write My Research Paper. Online assignment writing service.
DOCX
Surname 2Briana CastilloCyber Crime6-16-15.docx
PDF
Artificial Intelligence On The Dark Web
Information Literacy, Privacy, & Risk: What Are the Implications of Mass Surv...
Graphs in Government
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Unit VI Case StudyHeadnoteIn addition to knowing how to fo.docx
The Self-Invasion Of Privacy
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
Iot privacy vs convenience
Ethical issues and social issues related to systems upload
Computer forensic
Write My Research Paper. Online assignment writing service.
Surname 2Briana CastilloCyber Crime6-16-15.docx
Artificial Intelligence On The Dark Web
Ad

More from arjunarasso (20)

PDF
The following account balances come from the records of Ourso Company-.pdf
PDF
The folldwing informotion pertalas to Qvestione 1416 - Panone amortize.pdf
PDF
The Fish Aquarium obtained funds from a bank and owes interest on a no.pdf
PDF
The first picture below is a lichen attached to a tree branch- Moss is.pdf
PDF
The first independent Variable is the method of instruction- Video Ins.pdf
PDF
The Endocrine System Materiats Objectuves - Haman torio roadd - Wilt d.pdf
PDF
The features in a model---- Are always functions of each other Keep th.pdf
PDF
The external rate of return is x--xternal rate of return (EROR) using.pdf
PDF
The fancy French Perfume Conpany recently had its secret formula divul.pdf
PDF
The events M- F- C- P and S are defined as Male- Female- Coca Cola- Pe.pdf
PDF
The evolutionary tree below indicates the relationships among differen.pdf
PDF
the espected refum tir aok x ib T The sepected reteh for asa y is 111.pdf
PDF
The Edge layer in IoT relates to the analytics and pre-processing serv.pdf
PDF
The Emergency Medical Treatment and Active Labor Act (EMTALA) prevents.pdf
PDF
The elasticity of demand for a good tends to increase if- Select one-.pdf
PDF
The economy of Singsville currently has $70-00 million worth of curren.pdf
PDF
The economy of Nickeltown currently has a level of M1 equal to $40-00.pdf
PDF
The due dates refed the need for the order to be at ta next cperaton-.pdf
PDF
The disadvantage of the IRR method is that a- the IRR requires long-.pdf
PDF
The Director of Nursing of the hospital asks the staff development coo.pdf
The following account balances come from the records of Ourso Company-.pdf
The folldwing informotion pertalas to Qvestione 1416 - Panone amortize.pdf
The Fish Aquarium obtained funds from a bank and owes interest on a no.pdf
The first picture below is a lichen attached to a tree branch- Moss is.pdf
The first independent Variable is the method of instruction- Video Ins.pdf
The Endocrine System Materiats Objectuves - Haman torio roadd - Wilt d.pdf
The features in a model---- Are always functions of each other Keep th.pdf
The external rate of return is x--xternal rate of return (EROR) using.pdf
The fancy French Perfume Conpany recently had its secret formula divul.pdf
The events M- F- C- P and S are defined as Male- Female- Coca Cola- Pe.pdf
The evolutionary tree below indicates the relationships among differen.pdf
the espected refum tir aok x ib T The sepected reteh for asa y is 111.pdf
The Edge layer in IoT relates to the analytics and pre-processing serv.pdf
The Emergency Medical Treatment and Active Labor Act (EMTALA) prevents.pdf
The elasticity of demand for a good tends to increase if- Select one-.pdf
The economy of Singsville currently has $70-00 million worth of curren.pdf
The economy of Nickeltown currently has a level of M1 equal to $40-00.pdf
The due dates refed the need for the order to be at ta next cperaton-.pdf
The disadvantage of the IRR method is that a- the IRR requires long-.pdf
The Director of Nursing of the hospital asks the staff development coo.pdf
Ad

Recently uploaded (20)

PPTX
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
PPTX
Cell Types and Its function , kingdom of life
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PPTX
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx
PDF
01-Introduction-to-Information-Management.pdf
PPTX
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
PDF
Anesthesia in Laparoscopic Surgery in India
PPTX
Cell Structure & Organelles in detailed.
PDF
Yogi Goddess Pres Conference Studio Updates
PPTX
UNIT III MENTAL HEALTH NURSING ASSESSMENT
PPTX
Orientation - ARALprogram of Deped to the Parents.pptx
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
Practical Manual AGRO-233 Principles and Practices of Natural Farming
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
What if we spent less time fighting change, and more time building what’s rig...
PDF
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
PPTX
UV-Visible spectroscopy..pptx UV-Visible Spectroscopy – Electronic Transition...
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
Cell Types and Its function , kingdom of life
Final Presentation General Medicine 03-08-2024.pptx
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx
01-Introduction-to-Information-Management.pdf
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
Anesthesia in Laparoscopic Surgery in India
Cell Structure & Organelles in detailed.
Yogi Goddess Pres Conference Studio Updates
UNIT III MENTAL HEALTH NURSING ASSESSMENT
Orientation - ARALprogram of Deped to the Parents.pptx
202450812 BayCHI UCSC-SV 20250812 v17.pptx
STATICS OF THE RIGID BODIES Hibbelers.pdf
Module 4: Burden of Disease Tutorial Slides S2 2025
Practical Manual AGRO-233 Principles and Practices of Natural Farming
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
What if we spent less time fighting change, and more time building what’s rig...
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
UV-Visible spectroscopy..pptx UV-Visible Spectroscopy – Electronic Transition...

The Department of Homeland Security is interested in using computers t.pdf

  • 1. The Department of Homeland Security is interested in using computers to identify suspected of money laundering operations within the United States. It would like to mine databases containing information about purchases and travel to detect patterns that may identify individuals who are engaged in, or at least planning, money laundering activity. It asks a panel of information security professionals to determine the feasibility of this project. A panel members say the most difficult problem will be determining what patterns of transactions to look for. As a panel member you suggest that it might be possible to construct a computer program that uses artificial intelligence to mimic money laundering activity. The program would determine the transactions needed to execute money laundering act. Once these transactions were determined, it would be possible to search databases resources to find evidence of these transactions. However, the major draw back is that there would be no way to narrow the scope of investigation to a few potential money laundering individuals and in fact a large population of individuals would needs to be searched potentially violated many individual's privacy. As a information security professional assigned to this project, what would be the ethical and moral issues, from your perspective, of developing a computer program capable of violating a large population of individuals' privacy in order to identify and potentially catch a few suspected individuals of money laundering? How does this play into what we learned in this course about the issues related to violating an individual's privacy? What about the greater good for society by catching these money laundering individuals?