Cookies help us display personalized product recommendations and ensure you have great shopping experience.

By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
SmartData CollectiveSmartData Collective
  • Analytics
    AnalyticsShow More
    predictive analytics risk management
    How Predictive Analytics Is Redefining Risk Management Across Industries
    7 Min Read
    data analytics and gold trading
    Data Analytics and the New Era of Gold Trading
    9 Min Read
    composable analytics
    How Composable Analytics Unlocks Modular Agility for Data Teams
    9 Min Read
    data mining to find the right poly bag makers
    Using Data Analytics to Choose the Best Poly Mailer Bags
    12 Min Read
    data analytics for pharmacy trends
    How Data Analytics Is Tracking Trends in the Pharmacy Industry
    5 Min Read
  • Big Data
  • BI
  • Exclusive
  • IT
  • Marketing
  • Software
Search
© 2008-25 SmartData Collective. All Rights Reserved.
Reading: Anti-terror software glitches?
Share
Notification
Font ResizerAa
SmartData CollectiveSmartData Collective
Font ResizerAa
Search
  • About
  • Help
  • Privacy
Follow US
© 2008-23 SmartData Collective. All Rights Reserved.
SmartData Collective > Big Data > Data Mining > Anti-terror software glitches?
Data Mining

Anti-terror software glitches?

StephenBaker1
StephenBaker1
4 Min Read
SHARE

As I was researching my book, Jeff Jonas described for me how a government data failure preceded the 9-11 attacks. Different branches of the government had access to information about several of the terrorists. People on the danger list were renting cars and hotel rooms under their own names. But the government lacked the means to search through this data, matching the names with those on their lists. Jonas had developed software called NORA specifically for such matching work, and in 2005 he sold his company, Systems Research and Development, to IBM.

Jonas often cannot provide details, but he works closely with national security agencies, and the government buys this data-matching software. So my question: Why didn’t the software match the data of Umar Farouk Abdulmutallab, the Nigerian man accused of attempted terrorism on the Christmas flight to Detroit?…


As I was researching my book, Jeff Jonas
described for me how a government data failure preceded the 9-11 attacks.
Different branches of the government had access to information about
several of the terrorists. People on the danger list were renting cars
and hotel rooms under their own names. But the government lacked the
means to search through this data, matching the names with those on
their lists. Jonas had developed software called NORA specifically for
such matching work, and in 2005 he sold his company, Systems Research
and Development, to IBM.

Jonas often cannot provide details, but he works closely with national
security agencies, and the government buys this data-matching software.
So my question: Why didn’t the software match the data of Umar Farouk
Abdulmutallab, the Nigerian man accused of attempted terrorism on the
Christmas flight to Detroit?

More Read

Using business rules to close the SOA knowledge gap
Is Twitter Planning To Monetize The Firehose?
Marketing Execs VS Market Research Execs
What’s the Difference between Desktop BI and Solution BI?
A computer program predicts Viral Tweets

Yesterday’s New York Times editorial
seems to misunderstand the challenge. It says that the National
Counterterrorism Center should be …quot;correlating data so any pattern
emerges….quot; No doubt they’re interested in patterns. But in this case, it
wasn’t mathematical analysis that was missing, but simply connecting
dots. That’s NORA’s specialty. Then the editorial says, …quot;Long before
Mr. Abdulmutallab was allowed to board that flight to
Detroit, some analyst should have punched …ldquo;Nigerian, Abdulmutallab,
Yemen, visa, plot…rdquo; into the system….quot;

Again, I think that’s relying too much on humans. If these software
systems work, they should find those connections and issue automatic
alerts. Jonas describes what he calls Perpetual Analytics in this post.

In a system designed to handle perpetual
analytics, as data changes in source systems (e.g., an employee updates
his address) a message is fired off to the analytics engine and this
new observation is integrated into the collective knowledge.…nbsp; In this way, the …ldquo;data finds the data…rdquo;.…nbsp; Should
this incremental knowledge result in insight (e.g., the employee is
related to an open fraud investigation) such discovery can be published
to the appropriate user (e.g., in this case the fraud investigator).

My question to Jeff: Is the government running this software?

Link to original post

TAGGED:jeff jonasterrorism
Share This Article
Facebook Pinterest LinkedIn
Share

Follow us on Facebook

Latest News

microsoft 365 data migration
Why Data-Driven Businesses Consider Microsoft 365 Migration
Big Data Exclusive
real time data activation
How to Choose a CDP for Real-Time Data Activation
Big Data Exclusive
street address database
Why Data-Driven Companies Rely on Accurate Street Address Databases
Big Data Exclusive
predictive analytics risk management
How Predictive Analytics Is Redefining Risk Management Across Industries
Analytics Exclusive Predictive Analytics

Stay Connected

1.2KFollowersLike
33.7KFollowersFollow
222FollowersPin

You Might also Like

The Statistics of Counter-Terrorism

2 Min Read

Big Data Q&A for the Data Protection Law and Policy Newsletter

13 Min Read

Could Data Governance Help the War on Terror?

6 Min Read

Are you thinking through system improvements after the Xmas Terror Attack?

7 Min Read

SmartData Collective is one of the largest & trusted community covering technical content about Big Data, BI, Cloud, Analytics, Artificial Intelligence, IoT & more.

data-driven web design
5 Great Tips for Using Data Analytics for Website UX
Big Data
AI and chatbots
Chatbots and SEO: How Can Chatbots Improve Your SEO Ranking?
Artificial Intelligence Chatbots Exclusive

Quick Link

  • About
  • Contact
  • Privacy
Follow US
© 2008-25 SmartData Collective. All Rights Reserved.
Go to mobile version
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?