ADVICE+DISSENT: Intelligence File Making a List

Deciding who might be a terrorist is more of an art than a science.

The FBI's Web site describes the Terrorist Screening Center as an "anxious" place, full of "serious faces-like you see at NASA's Mission Control right before a launch." The TSC is essentially a call center, staffed around the clock by government employees and contractors who field queries from law enforcement, security and intelligence agencies that all ask the same basic question: Is the guy we just stopped at the border or pulled out of an airline queue, a known or suspected terrorist? The FBI calls it "one-stop shopping."

The TSC was established to consolidate the dozens of so-called terrorist watch lists that proliferated across government before and immediately after the Sept. 11 attacks. The center has been up and running for about four years now, and while its master list is far from perfect, how it was created gives you a good idea of how difficult information sharing really is, and what intelligence agencies face today as they struggle to get on the same page.

The watch list has something of a bad rap. Airline passengers in particular, who are frequently subjected to close scrutiny, often assume their name is in the government's files for reasons they're not allowed to know. But the TSC doesn't maintain a "black list," according to Donna Bucella, the center's first director, who led the consolidation effort.

Bucella, who recounted her experiences at a panel discussion hosted by Government Executive in July, likened the list to a database of people the government believes require further scrutiny.

Who decides what names go on the list? Settling that question was one of the TSC's first challenges. The agencies with a stake in the list-principally the FBI, the State and Defense departments, and the intelligence agencies-all had their own way of handling information, and each had different ideas about names they wanted to add. "We had 10 sets of eyes looking at the same nomination," Bucella said. She let that continue for the center's first year, and then set a new mandate: We are one.

The screening center laid out some basic criteria for adding a name. First, an individual had to have some demonstrable nexus to terrorism. An agency couldn't just tell the center, "trust us," Bucella said. Every day, the TSC would get an upload of 300 to 500 names. Those weren't all new; some included updated information about existing names. But the pace was relentless. Perhaps inevitably, then, people who shouldn't have been on the list ended up there anyway. From 2005 to 2006, Bucella said, there were almost 400 requests for redress from individuals and 80 names were removed. Once, in anticipation of St. Patrick's Day, the center looked for all the Irish names to clear up any confusion that might arise with the influx of foreign visitors heading to holiday celebrations. It wasn't uncommon to drill down on a name and discover that someone an agency had encountered wasn't actually the person on the list, even though the two shared the same name, Bucella said. But when the TSC did get a hit, day or night, officers would contact the person who had added the name.

To hear Bucella describe it, building and maintaining the watch list is more of an art than a science. Indeed, there have been plenty of hiccups along the way. In 2005, the Justice Department inspector general found that the TSC "could not ensure that the information in the database was complete and accurate," and some names that should have been on the list weren't.

But that's to be expected from such a subjective endeavor. There was no template for how to consolidate all this information years ago, and there still isn't. The consolidated watch list is, in its own right, a legitimate bureaucratic success. But how it was built and how it is maintained lets you in on one of the hard realities about sharing intelligence and hunting for terrorists: Mistakes are unavoidable.

Shane Harris, a staff correspondent for National Journal, wrote about intelligence and technology at Government Executive for five years.

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
Close [ x ] More from GovExec

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Sponsored by One Identity

    One Nation Under Guard: Securing User Identities Across State and Local Government

    In 2016, the government can expect even more sophisticated threats on the horizon, making it all the more imperative that agencies enforce proper identity and access management (IAM) practices. In order to better measure the current state of IAM at the state and local level, Government Business Council (GBC) conducted an in-depth research study of state and local employees.

  • Sponsored by Aquilent

    The Next Federal Evolution of Cloud

    This GBC report explains the evolution of cloud computing in federal government, and provides an outlook for the future of the cloud in government IT.

  • Sponsored by LTC Partners, administrators of the Federal Long Term Care Insurance Program

    Approaching the Brink of Federal Retirement

    Approximately 10,000 baby boomers are reaching retirement age per day, and a growing number of federal employees are preparing themselves for the next chapter of their lives. Learn how to tackle the challenges that today's workforce faces in laying the groundwork for a smooth and secure retirement.

  • Sponsored by Hewlett Packard Enterprise

    Cyber Defense 101: Arming the Next Generation of Government Employees

    Read this issue brief to learn about the sector's most potent challenges in the new cyber landscape and how government organizations are building a robust, threat-aware infrastructure

  • Sponsored by Aquilent

    GBC Issue Brief: Cultivating Digital Services in the Federal Landscape

    Read this GBC issue brief to learn more about the current state of digital services in the government, and how key players are pushing enhancements towards a user-centric approach.


When you download a report, your information may be shared with the underwriters of that document.