Feeds

Blogging Whitehall mandarin had top secret 'panopticon' plan

Leaked document reveals Sir Bonar's guilty secret

  • alert
  • submit to reddit

Providing a secure and efficient Helpdesk

April Fools In the summer of 2001, Whitehall officials saw the UK's national identity scheme as just the first step in a "five to fifteen year" strategy to create a comprehensive surveillance society, a top secret document obtained by The Register reveals. The document, signed by top Cabinet Office mandarin Sir Bonar Neville-Kingdom, was prepared for the Domestic Affairs Cabinet Committee, and describes NODISS, the proposed "National Operational Deterrence and Intelligence Surveillance System.

The NODISS plan predates the ID card scheme (consultation began on its precursor, "entitlement cards", the following year), and the reaction of ministers to Neville-Kingdom's plan - if it was ever presented to them - is not known. Many subsequent developments in UK security and surveillance systems however could be seen as possible components of a NODISS-style system, so the document can probably be seen as an accurate reflection of government thinking at the beginning of Tony Blair's second administration.

NODISS, says the document, was intended to provide "real-time data to law enforcement and designated official structures in a way which maximally utilises the range of disparate legal powers available for their acquisition, and comprehensive virtual links between hitherto isolated silos of data for intelligence exploitation."

Working with the ID Card scheme the plan envisages an audit log of ID-verified transactions. "Data-mining the Tracking Database is anticipated to yield the following types of intelligence beneficial for the prevention and detection of crime, the interests of national security, the effective and efficient provision of public services, the control of illegal working, and the enforcement of immigration provisions."

The Cabinet Office denied there was any project called NODISS and said it did not comment on leaked documents. Sources familiar with Whitehall documentation however told The Register that the document appeared to be genuine.

Bizarrely, just last month Sir Bonar Neville-Kingdom became the first blogging permanent secretary, posting his first contribution to open government at Ideal Government, a blog intended as a venue for constructively critical engagement on electronic government. Neville-Kingdom was unavailable for comment when The Register attempted to quiz him about these two apparently diametrically opposed Sir Bonars. Read the full document here. ®

Bootnote

April Fools!

Security for virtualized datacentres

More from The Register

next story
Are you a fat boy? Get to university NOW, you PENNILESS SLACKER
Rotund types paid nearly 20% less than people who didn't eat all the pies
Emma Watson should SHUT UP, all this abuse is HER OWN FAULT
... said an anon coward who we really wish hadn't posted on our website
Japan develops robot CHEERLEADERS which RIDE on BALLS
'Will put smiles on faces worldwide', predicts corporate PR chief
Bruges Booze tubes to pump LOVELY BEER underneath city
Belgian booze pumped from underground
Oz carrier Tiger Air takes terror alerts to new heights
Don't doodle, it might cost you your flight
Amazon: Wish in one hand, Twit in the other – see which one fills first
#AmazonWishList A year's supply of Arran scotch, ta
Let it go, Steve: Ballmer bans iPads from his LA Clippers b-ball team
Can you imagine the scene? 'Hey guys, it's your new owner – WTF is that on your desk?'
Oi, London thief. We KNOW what you're doing - our PRECRIME system warned us
Aye, shipmate, it be just like that Minority Report
prev story

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.