Feeds

UK.gov eavesdroppers frustrated by red tape

Call for middle management cull at GCHQ

Providing a secure and efficient Helpdesk

Chiefs at GCHQ, the government's electronic eavesdropping station in Cheltenham, have been told to cut bureaucracy, which it's feared may hamper the agency's ability to cope with an increased demand for intelligence and security testing.

"The department has developed a proliferation of strategies, which serves to dilute its priorities and confuse its staff and partners," a Cabinet Office report said today.

GCHQ's more than 5,000 civilian staff are are responsible both for electronic spying - "SIGINT" - and for providing IT security expertise across other branches of UK government - "information assurance".

The report continued: "There is a risk that this lack of strategic coherence will have an impact on the organisation's focus and its ability to prioritise effectively in the face of stretching demands in the future."

The reports authors spoke to junior staff at GCHQ, who said there were too many middle managers slowing decision-making and contributing to overly complex internal procedures. The Cabinet Office told intelligence chiefs they must "weed out" the middle ranks.

The quality of information available to GCHQ's board was also criticised as "variable", particularly relating to its finance. The agency is currently running a major IT procurement project - Mastering the Internet - worth hundreds of millions and designed to increase its surveillance of the web and VoIP.

In its response to the report, GCHQ said it would "tackle robustly" staff concerns about bureaucracy and look at ways to get a better understanding of its finances.

It also promised to improve the diversity of its staff, which the Cabinet Office said was "poor", with the proportion of women lagging behind other departments. ®

Update

GCHQ sent this statement:

GCHQ accepts the Capability Review recommendation and will seek to reduce processes and management layers while retaining the strong grip on finances and legal compliance which the Review recognised.

We will be looking at best practise from both public and private sectors to see what will best support the agility and flexibility we need to continue our delivery of 'World Class Signals Intelligence'.

Reducing the cost and complexity of web vulnerability management

More from The Register

next story
Phones 4u slips into administration after EE cuts ties with Brit mobe retailer
More than 5,500 jobs could be axed if rescue mission fails
JINGS! Microsoft Bing called Scots indyref RIGHT!
Redmond sporran metrics get one in the ten ring
Driving with an Apple Watch could land you with a £100 FINE
Bad news for tech-addicted fanbois behind the wheel
Murdoch to Europe: Inflict MORE PAIN on Google, please
'Platform for piracy' must be punished, or it'll kill us in FIVE YEARS
Phones 4u website DIES as wounded mobe retailer struggles to stay above water
Founder blames 'ruthless network partners' for implosion
Found inside ISIS terror chap's laptop: CELINE DION tunes
REPORT: Stash of terrorist material found in Syria Dell box
Sony says year's losses will be FOUR TIMES DEEPER than thought
Losses of more than $2 BILLION loom over troubled Japanese corp
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.