Feeds

e-Borders snares 2,800 possible crims, 5 tons of baccy

Also 7 million cigs, claims gov

High performance access to file storage

The UK Border Agency has claimed to have captured large number of crime suspects through the e-Borders monitoring system.

It has issued a statement saying that alerts from the system led to 2,800 arrests in 2010-11 after the details of 126 million passengers were checked against watchlists of suspects wanted by itself, police, the Serious Organised Crime Agency and HM Revenue & Customs.

It said that 18 of the suspects were apprehended in connection with murders, 27 with rapes, 29 with sex offences and 25 with violent crimes. It also claimed to have helped seize half-a-tonne of drugs, five tonnes of loose tobacco and nearly 7 million cigarettes since 2005.

e-Borders, which monitors the movements of large numbers of people in and out of the UK, was launched by the Border Agency in May 2009. It has been criticised by privacy campaigners for being excessively intrusive, and its development was beset by problems.

Government plans to make the scheme compulsory for travellers between the UK and other EU member states were squashed by the European Commission, and in July 2010 the Home Office terminated the contract with Raytheon, which led the development of the programme, claiming the company had been in breach.

In February 2011, the Home Office acknowledged that it had failed to meet its target of tracking 95 per cent of all passenger journeys in and out of the UK by December 2010, with just 55 per cent of inbound and 60 per cent of outbound journeys currently tracked.

But the government has maintained its support for a programme that was initiated by the previous administration. Immigration minister Damian Green said: "Traveller information has enabled the e-Borders to help keep our country safe with more than 8,400 criminals, including rapists and murderers, intercepted since it was established.

"When the new National Crime Agency goes live from 2013 the Manchester based National Border Targeting Centre will be central to helping the UK Border Agency play its part."

This article was originally published at Guardian Government Computing.

Guardian Government Computing is a business division of Guardian Professional, and covers the latest news and analysis of public sector technology. For updates on public sector IT, join the Government Computing Network here.

High performance access to file storage

More from The Register

next story
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Parent gabfest Mumsnet hit by SSL bug: My heart bleeds, grins hacker
Natter-board tells middle-class Britain to purée its passwords
Web data BLEEDOUT: Users to feel the pain as Heartbleed bug revealed
Vendors and ISPs have work to do updating firmware - if it's possible to fix this
OpenSSL Heartbleed: Bloody nose for open-source bleeding hearts
Bloke behind the cockup says not enough people are helping crucial crypto project
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Call of Duty 'fragged using OpenSSL's Heartbleed exploit'
So it begins ... or maybe not, says one analyst
Experian subsidiary faces MEGA-PROBE for 'selling consumer data to fraudster'
US attorneys general roll up sleeves, snap on gloves
NSA denies it knew about and USED Heartbleed encryption flaw for TWO YEARS
Agency forgets it exists to protect communications, not just spy on them
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.