Cookies help us display personalized product recommendations and ensure you have great shopping experience.

By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
SmartData CollectiveSmartData Collective
  • Analytics
    AnalyticsShow More
    big data analytics in transporation
    Turning Data Into Decisions: How Analytics Improves Transportation Strategy
    3 Min Read
    sales and data analytics
    How Data Analytics Improves Lead Management and Sales Results
    9 Min Read
    data analytics and truck accident claims
    How Data Analytics Reduces Truck Accidents and Speeds Up Claims
    7 Min Read
    predictive analytics for interior designers
    Interior Designers Boost Profits with Predictive Analytics
    8 Min Read
    image fx (67)
    Improving LinkedIn Ad Strategies with Data Analytics
    9 Min Read
  • Big Data
  • BI
  • Exclusive
  • IT
  • Marketing
  • Software
Search
© 2008-25 SmartData Collective. All Rights Reserved.
Reading: Anti-terror software glitches?
Share
Notification
Font ResizerAa
SmartData CollectiveSmartData Collective
Font ResizerAa
Search
  • About
  • Help
  • Privacy
Follow US
© 2008-23 SmartData Collective. All Rights Reserved.
SmartData Collective > Big Data > Data Mining > Anti-terror software glitches?
Data Mining

Anti-terror software glitches?

StephenBaker1
StephenBaker1
4 Min Read
SHARE

As I was researching my book, Jeff Jonas described for me how a government data failure preceded the 9-11 attacks. Different branches of the government had access to information about several of the terrorists. People on the danger list were renting cars and hotel rooms under their own names. But the government lacked the means to search through this data, matching the names with those on their lists. Jonas had developed software called NORA specifically for such matching work, and in 2005 he sold his company, Systems Research and Development, to IBM.

Jonas often cannot provide details, but he works closely with national security agencies, and the government buys this data-matching software. So my question: Why didn’t the software match the data of Umar Farouk Abdulmutallab, the Nigerian man accused of attempted terrorism on the Christmas flight to Detroit?…


As I was researching my book, Jeff Jonas
described for me how a government data failure preceded the 9-11 attacks.
Different branches of the government had access to information about
several of the terrorists. People on the danger list were renting cars
and hotel rooms under their own names. But the government lacked the
means to search through this data, matching the names with those on
their lists. Jonas had developed software called NORA specifically for
such matching work, and in 2005 he sold his company, Systems Research
and Development, to IBM.

Jonas often cannot provide details, but he works closely with national
security agencies, and the government buys this data-matching software.
So my question: Why didn’t the software match the data of Umar Farouk
Abdulmutallab, the Nigerian man accused of attempted terrorism on the
Christmas flight to Detroit?

More Read

Ben Goertzel’s Report on AGI-09: The Second Conference on…
Smart Data Collective
WAA Board of Ds. — My Top Picks
Adding all the numbers
Two articles

Yesterday’s New York Times editorial
seems to misunderstand the challenge. It says that the National
Counterterrorism Center should be …quot;correlating data so any pattern
emerges….quot; No doubt they’re interested in patterns. But in this case, it
wasn’t mathematical analysis that was missing, but simply connecting
dots. That’s NORA’s specialty. Then the editorial says, …quot;Long before
Mr. Abdulmutallab was allowed to board that flight to
Detroit, some analyst should have punched …ldquo;Nigerian, Abdulmutallab,
Yemen, visa, plot…rdquo; into the system….quot;

Again, I think that’s relying too much on humans. If these software
systems work, they should find those connections and issue automatic
alerts. Jonas describes what he calls Perpetual Analytics in this post.

In a system designed to handle perpetual
analytics, as data changes in source systems (e.g., an employee updates
his address) a message is fired off to the analytics engine and this
new observation is integrated into the collective knowledge.…nbsp; In this way, the …ldquo;data finds the data…rdquo;.…nbsp; Should
this incremental knowledge result in insight (e.g., the employee is
related to an open fraud investigation) such discovery can be published
to the appropriate user (e.g., in this case the fraud investigator).

My question to Jeff: Is the government running this software?

Link to original post

TAGGED:jeff jonasterrorism
Share This Article
Facebook Pinterest LinkedIn
Share

Follow us on Facebook

Latest News

AI role in medical industry
The Role Of AI In Transforming Medical Manufacturing
Artificial Intelligence Exclusive
b2b sales
Unseen Barriers: Identifying Bottlenecks In B2B Sales
Business Rules Exclusive Infographic
data intelligence in healthcare
How Data Is Powering Real-Time Intelligence in Health Systems
Big Data Exclusive
intersection of data
The Intersection of Data and Empathy in Modern Support Careers
Big Data Exclusive

Stay Connected

1.2kFollowersLike
33.7kFollowersFollow
222FollowersPin

You Might also Like

Data Mining and Terrorism… Counterpoint

4 Min Read

Big Data Q&A for the Data Protection Law and Policy Newsletter

13 Min Read

Could Data Governance Help the War on Terror?

6 Min Read

The Statistics of Counter-Terrorism

2 Min Read

SmartData Collective is one of the largest & trusted community covering technical content about Big Data, BI, Cloud, Analytics, Artificial Intelligence, IoT & more.

giveaway chatbots
How To Get An Award Winning Giveaway Bot
Big Data Chatbots Exclusive
data-driven web design
5 Great Tips for Using Data Analytics for Website UX
Big Data

Quick Link

  • About
  • Contact
  • Privacy
Follow US
© 2008-25 SmartData Collective. All Rights Reserved.
Go to mobile version
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?