Feeds

Blunkett appoints development partner for ID card project

PA Consulting gets the gig

  • alert
  • submit to reddit

Top three mobile application threats

The Home Office today appointed PA Consulting as development partner for the projected UK national identity card scheme. PA's role will be to work on the "design, feasibility testing, business case and procurement" of the scheme, but will not be allowed to bid for any of the supplier contracts.

David Blunkett, who has previously been heard claiming that a string of IT disasters provided the Home Office with precisely the experience needed to avoid an IT disaster, commented:

"This is an ambitious, long-term project which will be introduced incrementally over a number of years. We are determined to get it right, and bringing in expertise from outside Government at this early stage will help us do that.

"Experience from previous projects has shown that early detailed work on feasibility and testing reduces the risks and increases success. Our work with our development partner is one of the key parts of our programme of work leading to the issuing of the first identity cards from 2007/8."

It would be nice to think that PA, being a reputable company, will now fail the ID scheme at the feasibility and business case stages, given that it manifestly is not feasible, and has no discernible business case. But we fear this will not happen.

The ID scheme will be subject to the Office of Government Commerce's Gateway Review process, a system implemented by the OGC with the intention of making sure Government IT projects actually get delivered, working, on time, to budget. The Gateway process has only been in place for a couple of years now, so hasn't really had time to prove itself one way or the other. But we note that it's been TMed in the hope that it might be worth stealing.

By a miraculous coincidence, among the many government projects PA has been involved in is the biometric smart card scheme carried out for the Home Office's Immigration and Nationality Directorate. This is the ID card precursor the IND uses to keep tabs on asylum seekers. ®

Related stories

ID card backlash: is the poll tax effect kicking in?
Biometric ID card trials kick off in Glasgow
Everything you never wanted to know about the UK ID card

Build a business case: developing custom apps

More from The Register

next story
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
iPad? More like iFAD: We reveal why Apple fell into IBM's arms
But never fear fanbois, you're still lapping up iPhones, Macs
Stick a 4K in them: Super high-res TVs are DONE
4,000 pixels is niche now... Don't say we didn't warn you
Amazon Reveals One Weird Trick: A Loss On Almost $20bn In Sales
Investors really hate it: Share price plunge as growth SLOWS in key AWS division
Bose says today is F*** With Dre Day: Beats sued in patent battle
Music gear giant seeks some of that sweet, sweet Apple pie
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
Too many IT conferences to cover? MICROSOFT to the RESCUE!
Yet more word of cuts emerges from Redmond
Chips are down at Broadcom: Thousands of workers laid off
Cellphone baseband device biz shuttered
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.