Feeds

Border Agency comes out with another e-Borders deadline

Pop it in the diary so you can have a laugh in 2014

3 Big data security analytics techniques

The UK government has defended its under-fire Border Agency after MPs blasted the e-Borders passenger-scrutinising system as broken and its £9m iris scanners a waste of money.

The written response to a Parliamentary select committee's report on the agency does make some concrete promises including extending the e-Borders technology to cover maritime and railway passengers by 2014.

The traveller identification project has slipped some notable deadlines: by July 2011, the e-Borders system was collecting details of 55 per cent of passengers and crew on airlines, with no coverage of ferries or trains. The original target was to collect 95 per cent of passenger and crew details from everywhere by December 2010, and that could take another 2 years from now.

"We believe that the technical ability to collect data from the rail and maritime sector can be delivered by December 2014," the government report stated, although officials haven't worked out a way to deal with the data yet. "We are working closely with these sectors, and European partners, to find an operationally viable way to capture this data."

In response to the lack of confidence in e-Gates evinced by Border Agency staff - as well as the complaints from frustrated travellers - the government reiterated that the smart chip-checking gates are fine, and made some commitments to step up communications with front-line staff. They added that they'd improved the servicing contract for the eGates:

We work closely with our suppliers to ensure we provide a good e—Gate service and we have recently improved our service management contract to a 24/7 service. The resilience of the e—Gate system is achieved by having banks of e—Gates that allow the service to continue even when one gate develops a fault.

The government also batted off criticisms that the figures and data coming out of the Border Agency was so opaque and contradictory that even the agency's own CEO couldn't understand it, promising to be as transparent as possible.

And as for the £9m spent on iris scanners - withdrawn this year - and the stored eye scans of 5 million people who used them, the government repeated that both would be decommissioned this year:

The lifespan of any IT equipment is finite. IRIS is planned for closure because the system is close to the end of its useful life. IRIS images (not retinal scans), along with all personal data, will be destroyed six months after de—commissioning.

The Whitehall bods stuck to their story that the data gathered from the iris scanner trials was useful in helping them decide not to use Iris scanners any more: "We are currently developing a strategic plan for automation but it is likely that IRIS as a biometric will not be used." ®

3 Big data security analytics techniques

More from The Register

next story
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Samsung Galaxy S5 fingerprint scanner hacked in just 4 DAYS
Sammy's newbie cooked slower than iPhone, also costs more to build
Putin tells Snowden: Russia conducts no US-style mass surveillance
Gov't is too broke for that, Russian prez says
Snowden-inspired crypto-email service Lavaboom launches
German service pays tribute to Lavabit
Mounties always get their man: Heartbleed 'hacker', 19, CUFFED
Canadian teen accused of raiding tax computers using OpenSSL bug
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Call of Duty 'fragged using OpenSSL's Heartbleed exploit'
So it begins ... or maybe not, says one analyst
Heartbleed exploit, inoculation, both released
File under 'this is going to hurt you more than it hurts me'
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.