Feeds

Top secret UK data network goes live two years late

And promptly loses 'operational data'

The Essential Guide to IT Transformation

A system to link a secure communications network used by UK intelligence agencies with other government departments and posts overseas has finally swung into operation, two years later than originally expected.

The slow progress of the SCOPE project drew a rebuke in the annual Parliamentary Intelligence and Security Committee report, published on Wednesday.

“The programme has experienced delay after delay... partners were ill prepared for its introduction, and... there were significant risks involved in the new plan of rolling out two significant phases of the programme simultaneously,” the committee notes.

Originally forecast for April 2005, the SCOPE Service Operations Centre (SOC) went operational with links to HMRC, the Serious and Organised Crime Agency, the Home Office and Department of Trade and Industry in October 2007. The parliamentary committee reports that establishing the secure link has allowed SOCA to drastically reduce the time it takes to "process requests" for information from 12 hours to 15 minutes. Agencies behind the project have maintained their support despite the delays.

"Other departments also report enjoying finally being connected to the secure intelligence network and being able to communicate highly classified information directly and efficiently with the Agencies, FCO, MoD, Cabinet Office and other users," the report explains.

By comparison, the UK's government's established Government Secure Intranet allows Whitehall departments to exchange less sensitive material than facilitated by SCOPE. However, the Intelligence and Security Committee report reveals that SCOPE has already experienced problems with data loss.

"Earlier this year, the Centre suffered a 'serious process failure' which resulted in the loss of some operational data. Although an independent review was held immediately after the incident and the conclusions of that review are currently being implemented, we remain concerned at the serious implications of such a failure were it to occur again," the committee reports.

What the operational data involved or how it was lost is left unexplained.

The annual Intelligence and Security Committee report provides a rare insight into the normally secret world of Britain's intelligence agencies. Much of the report focuses on problems caused by a lack of manpower.

This has led to a focus on counter-terrorism priorities to the possible detriment of other work. The Scope network is also understaffed. The manpower shortage has led to an influx of IT contractors and project consultants at MI5, something the agency itself is uncomfortable with.

Other strands in the report cover the difficulties faced by signals intelligence agency GCHQ in monitoring IP communications and concerns about the breakdown of the DA-notice system, which is designed to give media outlets voluntary guidance about the national security implications of publishing sensitive stories.

The report also records that UK intelligence agencies remain opposed to the idea of allowing the use of intercept evidence in court, a practice common in other countries but one UK spooks reckon will give the bad guys an advantage in working out the strengths and weaknesses of current techniques. ®

Eight steps to building an HP BladeSystem

More from The Register

next story
ONE EMAIL costs mining company $300 MEEELION
Environmental activist walks free after hoax sent share price over a cliff
HP, Microsoft prove it again: Big Business doesn't create jobs
SMEs get lip service - what they need is dinner at the Club
ITC: Seagate and LSI can infringe Realtek patents because Realtek isn't in the US
Land of the (get off scot) free, when it's a foreign owner
Arrr: Freetard-bothering Digital Economy Act tied up, thrown in the hold
Ministry of Fun confirms: Yes, we're busy doing nothing
UK.gov's Open Source switch WON'T get rid of Microsoft, y'know
What do you mean, we've ditched Redmond in favour of IBM?!
Help yourself to anyone's photos FOR FREE, suggests UK.gov
Copyright law reforms will keep m'learned friends busy
Putin: Crack Tor for me and I'll make you a MILLIONAIRE
Russian Interior Ministry offers big pile o' roubles for busting pro-privacy browser
Apple smacked with privacy sueball over Location Services
Class action launched on behalf of 100 million iPhone owners
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.