Feeds

How HMRC gave away the UK's national identity

Gov, banks scream 'Don't Panic'

The Power of One Infographic

UK Identity Crisis Early last month Her Majesty's Customs and Revenue apologised after a laptop containing data on 400 customers was stolen. At the time the Revenue was praised by the security industry for coming clean and its "refreshing level of ethical responsibility".

Earlier this month that it had lost pension records for 15,000 people which were put on a CD and sent, possibly unencrypted, by courier to Standard Life's Edinburgh headquarters.

So it seems unlikely that many will be lining up to congratulate Chancellor Alistair Darling today after it emerged that the Revenue has lost a staggering 25 million customer accounts.

In fact, the Revenue could easily have lost the data three times. The CDs were sent first in April in breach of HMRC's own procedures. This month the database was again put on CD and sent to the National Audit Office not once, but twice. We should count ourselves lucky that the data has, apparently, only been lost once.

Still, by sending the data by CD we cannot be sure where it has gone or who has seen it. Several Reg reader comments pointed out that CDs are no way to be transporting sensitive information. The details of how you do so are not important - using CDs simply cannot provide a secure delivery.

Police are still investigating and the search is focussed on the Child Benefit office in Waterview Park, Washington, Sunderland.

It won't take long for them to get their heads round the complexity of the revenue's internal mail system. One staff member at HMRC who contacted The Register explained how the grid mail system works.

"Imagine an A4 sized envelope, with a set of gridlines printed on one side, three columns by 30 or so rows, making 90 boxes. When you want to send stuff internally between Civil Service offices, you get one off the pile, drop your stuff into it and scribble the recipient name and office number in one of the boxes.

"You then leave it in a tray for the Internal Mail people to collect, it goes down to the post room and after a period of time elapses, it arrives at the destination. You get the stuff out, scribble out the last set of details and drop the grid on the 'to be used' pile.

"There's no security, given that the grids are not stuck down, but sometimes you get the more security-aware users sticking a label across the seal and signing it, so there's some evidence if it's tampered with."

Even 25 years ago, who could have possibly thought this is a safe way to send private information about 25 million people?

Still, the Inland Revenue issued the following statement for worried recipients of child benefit: "If you are concerned about the potential HMRC data compromise, please telephone the HMRC dedicated Child Benefit Helpline on 0845 302 1444. Whilst there is no evidence that the lost data has fallen into criminal hands we have produced customer advice, containing questions and answers, as well as top tips on spotting and stopping ID theft."

APACS, the UK bank payment system, reassured customers that even if the CDs did end up in the wrong hands they did not contain enough information on their own to conduct fraud.

Paul Smee, chief exec at APACS, said: "In the event that anyone is the innocent victim of fraud as a result of this incident customers can have peace of mind that they enjoy protection under the Banking Code which means that you should not suffer any financial loss as a result.

"The banking industry would like to reassure its customers that sort code and bank account, national insurance number, date of birth, name and address details are not enough in themselves for an ID fraudster to access your bank account – as additional security information and passwords are always required."

Anyone else with a story to tell, please get in touch by clicking on the byline above this story. ®

Maximizing your infrastructure through virtualization

More from The Register

next story
Sit back down, Julian Assange™, you're not going anywhere just yet
Swedish court refuses to withdraw arrest warrant
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
MPs wave through Blighty's 'EMERGENCY' surveillance laws
Only 49 politcos voted against DRIP bill
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
Delaware pair nabbed for getting saucy atop Mexican eatery
Burrito meets soft taco in alleged rooftop romp outrage
British cops cuff 660 suspected paedophiles
Arrests people allegedly accessing child abuse images online
LightSquared backer sues FCC over spectrum shindy
Why, we might as well have been buying AIR
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.