Cookies help us display personalized product recommendations and ensure you have great shopping experience.

By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
SmartData CollectiveSmartData Collective
  • Analytics
    AnalyticsShow More
    data analytics
    How Data Analytics Can Help You Construct A Financial Weather Map
    4 Min Read
    financial analytics
    Financial Analytics Shows The Hidden Cost Of Not Switching Systems
    4 Min Read
    warehouse accidents
    Data Analytics and the Future of Warehouse Safety
    10 Min Read
    stock investing and data analytics
    How Data Analytics Supports Smarter Stock Trading Strategies
    4 Min Read
    predictive analytics risk management
    How Predictive Analytics Is Redefining Risk Management Across Industries
    7 Min Read
  • Big Data
  • BI
  • Exclusive
  • IT
  • Marketing
  • Software
Search
© 2008-25 SmartData Collective. All Rights Reserved.
Reading: Anti-terror software glitches?
Share
Notification
Font ResizerAa
SmartData CollectiveSmartData Collective
Font ResizerAa
Search
  • About
  • Help
  • Privacy
Follow US
© 2008-23 SmartData Collective. All Rights Reserved.
SmartData Collective > Big Data > Data Mining > Anti-terror software glitches?
Data Mining

Anti-terror software glitches?

StephenBaker1
StephenBaker1
4 Min Read
SHARE

As I was researching my book, Jeff Jonas described for me how a government data failure preceded the 9-11 attacks. Different branches of the government had access to information about several of the terrorists. People on the danger list were renting cars and hotel rooms under their own names. But the government lacked the means to search through this data, matching the names with those on their lists. Jonas had developed software called NORA specifically for such matching work, and in 2005 he sold his company, Systems Research and Development, to IBM.

Jonas often cannot provide details, but he works closely with national security agencies, and the government buys this data-matching software. So my question: Why didn’t the software match the data of Umar Farouk Abdulmutallab, the Nigerian man accused of attempted terrorism on the Christmas flight to Detroit?…


As I was researching my book, Jeff Jonas
described for me how a government data failure preceded the 9-11 attacks.
Different branches of the government had access to information about
several of the terrorists. People on the danger list were renting cars
and hotel rooms under their own names. But the government lacked the
means to search through this data, matching the names with those on
their lists. Jonas had developed software called NORA specifically for
such matching work, and in 2005 he sold his company, Systems Research
and Development, to IBM.

Jonas often cannot provide details, but he works closely with national
security agencies, and the government buys this data-matching software.
So my question: Why didn’t the software match the data of Umar Farouk
Abdulmutallab, the Nigerian man accused of attempted terrorism on the
Christmas flight to Detroit?

More Read

Social Media and Unemployment
SAS commits $70 million to Cloud Computing
Evidence-based management is a simple idea. It just means…
Why Google Chrome has a bad market share ?
my DeveloperWorks Goes Social

Yesterday’s New York Times editorial
seems to misunderstand the challenge. It says that the National
Counterterrorism Center should be …quot;correlating data so any pattern
emerges….quot; No doubt they’re interested in patterns. But in this case, it
wasn’t mathematical analysis that was missing, but simply connecting
dots. That’s NORA’s specialty. Then the editorial says, …quot;Long before
Mr. Abdulmutallab was allowed to board that flight to
Detroit, some analyst should have punched …ldquo;Nigerian, Abdulmutallab,
Yemen, visa, plot…rdquo; into the system….quot;

Again, I think that’s relying too much on humans. If these software
systems work, they should find those connections and issue automatic
alerts. Jonas describes what he calls Perpetual Analytics in this post.

In a system designed to handle perpetual
analytics, as data changes in source systems (e.g., an employee updates
his address) a message is fired off to the analytics engine and this
new observation is integrated into the collective knowledge.…nbsp; In this way, the …ldquo;data finds the data…rdquo;.…nbsp; Should
this incremental knowledge result in insight (e.g., the employee is
related to an open fraud investigation) such discovery can be published
to the appropriate user (e.g., in this case the fraud investigator).

My question to Jeff: Is the government running this software?

Link to original post

TAGGED:jeff jonasterrorism
Share This Article
Facebook Pinterest LinkedIn
Share

Follow us on Facebook

Latest News

data analytics
How Data Analytics Can Help You Construct A Financial Weather Map
Analytics Exclusive Infographic
AI use in payment methods
AI Shows How Payment Delays Disrupt Your Business
Artificial Intelligence Exclusive Infographic
financial analytics
Financial Analytics Shows The Hidden Cost Of Not Switching Systems
Analytics Exclusive Infographic
multi model ai
How Teams Using Multi-Model AI Reduced Risk Without Slowing Innovation
Artificial Intelligence Exclusive

Stay Connected

1.2KFollowersLike
33.7KFollowersFollow
222FollowersPin

You Might also Like

Are you thinking through system improvements after the Xmas Terror Attack?

7 Min Read

Big Data Q&A for the Data Protection Law and Policy Newsletter

13 Min Read

Could Data Governance Help the War on Terror?

6 Min Read

The Statistics of Counter-Terrorism

2 Min Read

SmartData Collective is one of the largest & trusted community covering technical content about Big Data, BI, Cloud, Analytics, Artificial Intelligence, IoT & more.

giveaway chatbots
How To Get An Award Winning Giveaway Bot
Big Data Chatbots Exclusive
ai is improving the safety of cars
From Bolts to Bots: How AI Is Fortifying the Automotive Industry
Artificial Intelligence

Quick Link

  • About
  • Contact
  • Privacy
Follow US
© 2008-25 SmartData Collective. All Rights Reserved.
Go to mobile version
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?