Feeds

Sex offender tagging system crashes

Database screw-up takes 16,000 off the grid

Security for virtualized datacentres

Some 16,000 assorted sex offenders, parolees and other convicts across the US were left unmonitored for 12 hours last week, because the monitoring firm's database exceeded a 2.1 billion record threshold.

The tagging system was run by BI Incorporated of Boulder, Colorado, and is called the BI Total Access Server. What should happen is that tagged offender's movements are detected by a GPS system, or other monitoring technology, and notifications sent automatically to BI's customers. On reaching the database limit, this system shut down - although BI still received the offenders' moment data. It took 12 hours for the database, to be restored, and it now has a limit of 1 trillion records.

When the database was back up the delayed alerts were sent out to BI's customers.

BI Inc. spokeswoman Monica Hook said in a statement: "The BI TotalAccess Server is used for a variety of offender risk classifications, including low-, medium- and high-risk defendants and offenders." BI staff told its customers what had happened and kept them updated with progress reports as the resolution took place.

Hook's statement said: "BI's primary concern is public safety. BI is — and has been for 25 years — a quality-driven organisation. BI is completely committed to public safety and the trust our customers place in us. The monitoring and systems team responded with speed and professionalism." Hook did not apologise for this 12-hour lapse and quality failure due to a seemingly obvious problem; databases can run out of record space.

Her statement included this it's-not-our-fault statement: "Len Silverston, a nationally recognised database expert, said the issue that caused the server problem was very unusual and not a reflection of any memory storage problems. 'In my 28 years as a database management expert, running out of values in a column in a table is very rare and very difficult to reach,' he said. 'To see this coming with what the designers had put in place would be very difficult.'"

Hook did say: "We are working with Microsoft to develop a warning system on database thresholds so we can anticipate these issues in the future.”

The implication here is that there was no threshold-about-to-be-exceeded warning before the event. BI was monitoring its offenders better than it was monitoring its own database. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
New 'Cosmos' browser surfs the net by TXT alone
No data plan? No WiFi? No worries ... except sluggish download speed
'Windows 9' LEAK: Microsoft's playing catchup with Linux
Multiple desktops and live tiles in restored Start button star in new vids
iOS 8 release: WebGL now runs everywhere. Hurrah for 3D graphics!
HTML 5's pretty neat ... when your browser supports it
Mathematica hits the Web
Wolfram embraces the cloud, promies private cloud cut of its number-cruncher
Google extends app refund window to two hours
You now have 120 minutes to finish that game instead of 15
Intel: Hey, enterprises, drop everything and DO HADOOP
Big Data analytics projected to run on more servers than any other app
Mozilla shutters Labs, tells nobody it's been dead for five months
Staffer's blog reveals all as projects languish on GitHub
SUSE Linux owner Attachmate gobbled by Micro Focus for $2.3bn
Merger will lead to mainframe and COBOL powerhouse
iOS 8 Healthkit gets a bug SO Apple KILLS it. That's real healthcare!
Not fit for purpose on day of launch, says Cupertino
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.