Feeds

Sex offender tagging system crashes

Database screw-up takes 16,000 off the grid

High performance access to file storage

Some 16,000 assorted sex offenders, parolees and other convicts across the US were left unmonitored for 12 hours last week, because the monitoring firm's database exceeded a 2.1 billion record threshold.

The tagging system was run by BI Incorporated of Boulder, Colorado, and is called the BI Total Access Server. What should happen is that tagged offender's movements are detected by a GPS system, or other monitoring technology, and notifications sent automatically to BI's customers. On reaching the database limit, this system shut down - although BI still received the offenders' moment data. It took 12 hours for the database, to be restored, and it now has a limit of 1 trillion records.

When the database was back up the delayed alerts were sent out to BI's customers.

BI Inc. spokeswoman Monica Hook said in a statement: "The BI TotalAccess Server is used for a variety of offender risk classifications, including low-, medium- and high-risk defendants and offenders." BI staff told its customers what had happened and kept them updated with progress reports as the resolution took place.

Hook's statement said: "BI's primary concern is public safety. BI is — and has been for 25 years — a quality-driven organisation. BI is completely committed to public safety and the trust our customers place in us. The monitoring and systems team responded with speed and professionalism." Hook did not apologise for this 12-hour lapse and quality failure due to a seemingly obvious problem; databases can run out of record space.

Her statement included this it's-not-our-fault statement: "Len Silverston, a nationally recognised database expert, said the issue that caused the server problem was very unusual and not a reflection of any memory storage problems. 'In my 28 years as a database management expert, running out of values in a column in a table is very rare and very difficult to reach,' he said. 'To see this coming with what the designers had put in place would be very difficult.'"

Hook did say: "We are working with Microsoft to develop a warning system on database thresholds so we can anticipate these issues in the future.”

The implication here is that there was no threshold-about-to-be-exceeded warning before the event. BI was monitoring its offenders better than it was monitoring its own database. ®

High performance access to file storage

More from The Register

next story
Android engineer: We DIDN'T copy Apple OR follow Samsung's orders
Veep testifies for Samsung during Apple patent trial
Microsoft: Windows version you probably haven't upgraded to yet is ALREADY OBSOLETE
Pre-Update versions of Windows 8.1 will no longer support patches
OpenSSL Heartbleed: Bloody nose for open-source bleeding hearts
Bloke behind the cockup says not enough people are helping crucial crypto project
Half of Twitter's 'active users' are SILENT STALKERS
Nearly 50% have NEVER tweeted a word
Windows XP still has 27 per cent market share on its deathbed
Windows 7 making some gains on XP Death Day
Internet-of-stuff startup dumps NoSQL for ... SQL?
NoSQL taste great at first but lacks proper nutrients, says startup cloud whiz
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
US taxman blows Win XP deadline, must now spend millions on custom support
Gov't IT likened to 'a Model T with a lot of things on top of it'
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.