Feeds

Spy chiefs plot £12bn IT spree for comms überdatabase

Black boxes to keep Black's firm in the black

Mobile application security vulnerability report

Billions of pounds of public money will soon be up for grabs for private IT contractors ready to serve the Interception Modernisation Programme - UK spy chiefs' plan to store details of every call, email, text and web browsing session.

And The Register has learned that one plugged-in firm is better poised than most to profit.

The ongoing push in Whitehall to establish a central database of all UK communications data went mainstream this weekend, with eerily similar reports surfacing in The Sunday Times, Sunday Telegraph and Scotland on Sunday. Most of the news was uncovered by El Reg two weeks ago, although it now seems insiders are willing to put a figure on the cost of the project: £12bn.

Tom Black, Detica CEO

That price tag would have the Interception Modernisation Programme (IMP) - as MI6 and GCHQ envisage it - vying for the dubious honour of most expensive IT project in UK history. Its only challenger would be the oft-troubled NHS National Programme for IT (NPfIT), which the National Audit Office said in 2006 is set to run to £12.4bn.

It's sobering to bear in mind that the original cost for NPfIT touted by ministers was just £2.3bn. Reg sources say Treasury officials are already extremely concerned about how massive a hole an overbudget IMP could blow in spending plans.

Such fiscal collywobbles are of course unlikely to dampen the enthusiasm that the intelligence agencies' plans are being greeted with in the private sector. As we reported in August, a pilot project is in the works and funds were allocated last year. This weekend's reports reveal that the first probes at a fixed line telco/ISP and a mobile operator are backed by £1bn.

And in one of the very few public pronouncements on IMP, Home Office minister Lord West made it clear in July that contractors would benefit from the outset: "The private sector is likely to play a major role in this work [the feasibility pilot] and the programme will be conducting a competitive tender and entering commercial negotiations to commission its services".

Detica will very likely be among the first to profit from the IMP bonanza. Based in Guildford, it might warrant the title of The Most Important IT Company Most People Have Never Heard Of. According to sources with knowledge of systems that have long allowed GCHQ to eavesdrop on phone calls, Detica owns and operates the current "black box" infrastructure under contracts funded by the secret intelligence budget.

In contrast to that arrangement, the proposed central communications database would not target the content of calls, emails, texts and other communications; rather, MI6 and GCHQ want to retain the powerful, searchable data detailing who contacted whom. Trust trumps everything in this field, and Detica is a shoo-in to deploy and operate new probes that will be needed in all the major fixed line and mobile communications operators.

Detica's representatives declined to discuss IMP.

Mobile application security vulnerability report

More from The Register

next story
UK government officially adopts Open Document Format
Microsoft insurgency fails, earns snarky remark from UK digital services head
Major problems beset UK ISP filth filters: But it's OK, nobody uses them
It's almost as though pr0n was actually rather popular
US Social Security 'wasted $300 million on an IT BOONDOGGLE'
Scrutiny committee bods probe derailed database project
HP, Microsoft prove it again: Big Business doesn't create jobs
SMEs get lip service - what they need is dinner at the Club
ITC: Seagate and LSI can infringe Realtek patents because Realtek isn't in the US
Land of the (get off scot) free, when it's a foreign owner
Arrr: Freetard-bothering Digital Economy Act tied up, thrown in the hold
Ministry of Fun confirms: Yes, we're busy doing nothing
Australia floats website blocks and ISP liability to stop copyright thieves
Big Content could get the right to order ISPs to stop traffic
Help yourself to anyone's photos FOR FREE, suggests UK.gov
Copyright law reforms will keep m'learned friends busy
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.