Cookies help us display personalized product recommendations and ensure you have great shopping experience.

By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
SmartData CollectiveSmartData Collective
  • Analytics
    AnalyticsShow More
    payment methods
    How Data Analytics Is Transforming eCommerce Payments
    10 Min Read
    data analytics for pharmacy trends
    How Data Analytics Is Tracking Trends in the Pharmacy Industry
    5 Min Read
    car expense data analytics
    Data Analytics for Smarter Vehicle Expense Management
    10 Min Read
    image fx (60)
    Data Analytics Driving the Modern E-commerce Warehouse
    13 Min Read
    big data analytics in transporation
    Turning Data Into Decisions: How Analytics Improves Transportation Strategy
    3 Min Read
  • Big Data
  • BI
  • Exclusive
  • IT
  • Marketing
  • Software
Search
© 2008-25 SmartData Collective. All Rights Reserved.
Reading: Anti-terror software glitches?
Share
Notification
Font ResizerAa
SmartData CollectiveSmartData Collective
Font ResizerAa
Search
  • About
  • Help
  • Privacy
Follow US
© 2008-23 SmartData Collective. All Rights Reserved.
SmartData Collective > Big Data > Data Mining > Anti-terror software glitches?
Data Mining

Anti-terror software glitches?

StephenBaker1
StephenBaker1
4 Min Read
SHARE

As I was researching my book, Jeff Jonas described for me how a government data failure preceded the 9-11 attacks. Different branches of the government had access to information about several of the terrorists. People on the danger list were renting cars and hotel rooms under their own names. But the government lacked the means to search through this data, matching the names with those on their lists. Jonas had developed software called NORA specifically for such matching work, and in 2005 he sold his company, Systems Research and Development, to IBM.

Jonas often cannot provide details, but he works closely with national security agencies, and the government buys this data-matching software. So my question: Why didn’t the software match the data of Umar Farouk Abdulmutallab, the Nigerian man accused of attempted terrorism on the Christmas flight to Detroit?…


As I was researching my book, Jeff Jonas
described for me how a government data failure preceded the 9-11 attacks.
Different branches of the government had access to information about
several of the terrorists. People on the danger list were renting cars
and hotel rooms under their own names. But the government lacked the
means to search through this data, matching the names with those on
their lists. Jonas had developed software called NORA specifically for
such matching work, and in 2005 he sold his company, Systems Research
and Development, to IBM.

Jonas often cannot provide details, but he works closely with national
security agencies, and the government buys this data-matching software.
So my question: Why didn’t the software match the data of Umar Farouk
Abdulmutallab, the Nigerian man accused of attempted terrorism on the
Christmas flight to Detroit?

More Read

Good Data
Who owns Master Data in your company?
Improving Data Integration the Old Fashioned Way
Interview :Doug Savage ,Creator SavageChickens.com
Analytics is Not a Dirty Word

Yesterday’s New York Times editorial
seems to misunderstand the challenge. It says that the National
Counterterrorism Center should be …quot;correlating data so any pattern
emerges….quot; No doubt they’re interested in patterns. But in this case, it
wasn’t mathematical analysis that was missing, but simply connecting
dots. That’s NORA’s specialty. Then the editorial says, …quot;Long before
Mr. Abdulmutallab was allowed to board that flight to
Detroit, some analyst should have punched …ldquo;Nigerian, Abdulmutallab,
Yemen, visa, plot…rdquo; into the system….quot;

Again, I think that’s relying too much on humans. If these software
systems work, they should find those connections and issue automatic
alerts. Jonas describes what he calls Perpetual Analytics in this post.

In a system designed to handle perpetual
analytics, as data changes in source systems (e.g., an employee updates
his address) a message is fired off to the analytics engine and this
new observation is integrated into the collective knowledge.…nbsp; In this way, the …ldquo;data finds the data…rdquo;.…nbsp; Should
this incremental knowledge result in insight (e.g., the employee is
related to an open fraud investigation) such discovery can be published
to the appropriate user (e.g., in this case the fraud investigator).

My question to Jeff: Is the government running this software?

Link to original post

TAGGED:jeff jonasterrorism
Share This Article
Facebook Pinterest LinkedIn
Share

Follow us on Facebook

Latest News

payment methods
How Data Analytics Is Transforming eCommerce Payments
Analytics Big Data Exclusive
cybersecurity essentials
Cybersecurity Essentials For Customer-Facing Platforms
Exclusive Infographic IT Security
ai for making lyric videos
How AI Is Revolutionizing Lyric Video Creation
Artificial Intelligence Exclusive
intersection of data and patient care
How Healthcare Careers Are Expanding at the Intersection of Data and Patient Care
Big Data Exclusive

Stay Connected

1.2kFollowersLike
33.7kFollowersFollow
222FollowersPin

You Might also Like

Big Data Q&A for the Data Protection Law and Policy Newsletter

13 Min Read

Could Data Governance Help the War on Terror?

6 Min Read

The Statistics of Counter-Terrorism

2 Min Read

Data Mining and Terrorism… Counterpoint

4 Min Read

SmartData Collective is one of the largest & trusted community covering technical content about Big Data, BI, Cloud, Analytics, Artificial Intelligence, IoT & more.

AI and chatbots
Chatbots and SEO: How Can Chatbots Improve Your SEO Ranking?
Artificial Intelligence Chatbots Exclusive
ai is improving the safety of cars
From Bolts to Bots: How AI Is Fortifying the Automotive Industry
Artificial Intelligence

Quick Link

  • About
  • Contact
  • Privacy
Follow US
© 2008-25 SmartData Collective. All Rights Reserved.
Go to mobile version
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?