Feeds

MPs: UK defence project was crap

Bowman skewered

The essential guide to IT transformation

Another UK defence procurement project has been excoriated in yet another damning Parliamentary report.

The project under fire this time is the Bowman military communications infrastructure, a perennial favourite among connoisseurs of arms-procurement cockups.

The finger-pointing group of MPs today is the Commons Public Accounts Committee, which put up its full report at midnight, here (pdf).

The CPA Committee often has harsh words for defence projects, once famously describing a helicopter purchase by saying the forces might as well have bought turkeys instead.

The Bowman project actually began in the late eighties but, as so often happens with Ministry of Defence programmes, more than a decade was spent trying to assemble a contracting consortium which could both do the job and was politically acceptable. For those interested, a short history is provided by the MoD here.

The project's first big disaster came with the 1996 collapse of competition between the Siemens Plessey Systems (SPS)/Racal "Yeoman" team and the ITT "Crossbow".

A mere 10 years after work began at the MoD, in 1998, it appeared that forward movement had been achieved with award of a firm contract to the ITT/SPS/Racal "Archer" alliance to produce Bowman. But this too duly collapsed, and in 2001 a new contract was inked with General Dynamics UK.

Today's CPAC report concerns itself mainly with the progress of the Bowman programme since then, and it makes depressing reading for UK taxpayers – or indeed anyone with the British forces' interests at heart.

To give a flavour of the report's tone, it has four main sections, titled "programme governance arrangements were not fit for purpose", "initial decisions were not well informed" "through life costs were not rigorously assessed", and "operational benefits are limited".

Bowman also had a lighter shoeing last year, from the National Audit Office. Being accountants rather than politicians, the NAO was less brutal, but still critical here and there.

The army has been harsher yet, according to some accounts.

The fact the Bowman project has not gone like a dream is scarcely news, but today's report is probably another coffin-nail for the idea that UK defence procurement has been radically reformed in recent years. ®

Build a business case: developing custom apps

More from The Register

next story
Super Cali signs a kill-switch, campaigners say it's atrocious
Remote-death button bad news for crooks, protesters – and great news for hackers?
UK government accused of hiding TRUTH about Universal Credit fiasco
'Reset rating keeps secrets on one-dole-to-rule-them-all plan', say MPs
Caught red-handed: UK cops, PCSOs, specials behaving badly… on social media
No Mr Fuzz, don't ask a crime victim to be your pal on Facebook
Ex US cybersecurity czar guilty in child sex abuse website case
Health and Human Services IT security chief headed online to share vile images
Don't even THINK about copyright violation, says Indian state
Pre-emptive arrest for pirates in Karnataka
The police are WRONG: Watching YouTube videos is NOT illegal
And our man Corfield is pretty bloody cross about it
Felony charges? Harsh! Alleged Anon hackers plead guilty to misdemeanours
US judge questions harsh sentence sought by prosecutors
prev story

Whitepapers

A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Maximize storage efficiency across the enterprise
The HP StoreOnce backup solution offers highly flexible, centrally managed, and highly efficient data protection for any enterprise.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.