By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
SmartData CollectiveSmartData CollectiveSmartData Collective
  • Analytics
    AnalyticsShow More
    customer experience analytics
    Using Data Analysis to Improve and Verify the Customer Experience and Bad Reviews
    6 Min Read
    data analytics and CRO
    Data Analytics is Crucial for Website CRO
    9 Min Read
    analytics in digital marketing
    The Importance of Analytics in Digital Marketing
    8 Min Read
    benefits of investing in employee data
    6 Ways to Use Data to Improve Employee Productivity
    8 Min Read
    Jira and zendesk usage
    Jira Service Management vs Zendesk: What Are the Differences?
    6 Min Read
  • Big Data
  • BI
  • Exclusive
  • IT
  • Marketing
  • Software
Search
© 2008-23 SmartData Collective. All Rights Reserved.
Reading: Anti-terror software glitches?
Share
Notification Show More
Font ResizerAa
SmartData CollectiveSmartData Collective
Font ResizerAa
Search
  • About
  • Help
  • Privacy
Follow US
© 2008-23 SmartData Collective. All Rights Reserved.
SmartData Collective > Big Data > Data Mining > Anti-terror software glitches?
Data Mining

Anti-terror software glitches?

StephenBaker1
Last updated: 2010/01/02 at 1:27 PM
StephenBaker1
4 Min Read
SHARE

As I was researching my book, Jeff Jonas described for me how a government data failure preceded the 9-11 attacks. Different branches of the government had access to information about several of the terrorists. People on the danger list were renting cars and hotel rooms under their own names. But the government lacked the means to search through this data, matching the names with those on their lists. Jonas had developed software called NORA specifically for such matching work, and in 2005 he sold his company, Systems Research and Development, to IBM.

Jonas often cannot provide details, but he works closely with national security agencies, and the government buys this data-matching software. So my question: Why didn’t the software match the data of Umar Farouk Abdulmutallab, the Nigerian man accused of attempted terrorism on the Christmas flight to Detroit?…


As I was researching my book, Jeff Jonas
described for me how a government data failure preceded the 9-11 attacks.
Different branches of the government had access to information about
several of the terrorists. People on the danger list were renting cars
and hotel rooms under their own names. But the government lacked the
means to search through this data, matching the names with those on
their lists. Jonas had developed software called NORA specifically for
such matching work, and in 2005 he sold his company, Systems Research
and Development, to IBM.

Jonas often cannot provide details, but he works closely with national
security agencies, and the government buys this data-matching software.
So my question: Why didn’t the software match the data of Umar Farouk
Abdulmutallab, the Nigerian man accused of attempted terrorism on the
Christmas flight to Detroit?

Yesterday’s New York Times editorial
seems to misunderstand the challenge. It says that the National
Counterterrorism Center should be …quot;correlating data so any pattern
emerges….quot; No doubt they’re interested in patterns. But in this case, it
wasn’t mathematical analysis that was missing, but simply connecting
dots. That’s NORA’s specialty. Then the editorial says, …quot;Long before
Mr. Abdulmutallab was allowed to board that flight to
Detroit, some analyst should have punched …ldquo;Nigerian, Abdulmutallab,
Yemen, visa, plot…rdquo; into the system….quot;

Again, I think that’s relying too much on humans. If these software
systems work, they should find those connections and issue automatic
alerts. Jonas describes what he calls Perpetual Analytics in this post.

In a system designed to handle perpetual
analytics, as data changes in source systems (e.g., an employee updates
his address) a message is fired off to the analytics engine and this
new observation is integrated into the collective knowledge.…nbsp; In this way, the …ldquo;data finds the data…rdquo;.…nbsp; Should
this incremental knowledge result in insight (e.g., the employee is
related to an open fraud investigation) such discovery can be published
to the appropriate user (e.g., in this case the fraud investigator).

My question to Jeff: Is the government running this software?

Link to original post

TAGGED: jeff jonas, terrorism
StephenBaker1 January 2, 2010 January 2, 2010
Share This Article
Facebook Twitter Pinterest LinkedIn
Share

Follow us on Facebook

Latest News

Cloud-Based Marketing
Smart Video Bloggers Are Leveraging Cloud-Based Marketing Tools
Cloud Computing IT Marketing
technology and security
Technology in Physical Security: A Guide to Business Safety
Exclusive IT Security
ai for stopping credit card theft
AI Can Manage Credit Card Cybersecurity Risks
IT Security
ai can help with nurse burnout
Breakthroughs in AI Are Helping to Prevent Nurse Burnout
Artificial Intelligence Exclusive

Stay Connected

1.2k Followers Like
33.7k Followers Follow
222 Followers Pin

You Might also Like

Big Data Q&A for the Data Protection Law and Policy Newsletter

13 Min Read

The Statistics of Counter-Terrorism

2 Min Read

Data Mining and Terrorism… Counterpoint

4 Min Read

Could Data Governance Help the War on Terror?

6 Min Read

SmartData Collective is one of the largest & trusted community covering technical content about Big Data, BI, Cloud, Analytics, Artificial Intelligence, IoT & more.

ai in ecommerce
Artificial Intelligence for eCommerce: A Closer Look
Artificial Intelligence
data-driven web design
5 Great Tips for Using Data Analytics for Website UX
Big Data

Quick Link

  • About
  • Contact
  • Privacy
Follow US
© 2008-23 SmartData Collective. All Rights Reserved.
Go to mobile version
Welcome Back!

Sign in to your account

Lost your password?