Feeds

Rubbish IT means DEATH for UK Border Agency, announces May

Only a bullet can end the monster's blundering misery

Maximizing your infrastructure through virtualization

The UK Border Agency's hopeless IT systems are among the reasons why the Home Secretary Theresa May, in an unscheduled statement to MPs yesterday afternoon, confirmed that the UKBA will be axed.

She told the House of Commons that the agency would be replaced with two entities: an immigration and visa service and a separate law enforcement organisation. Both outfits will report directly to ministers in the Home Office. The previous agency status will be altogether scrapped.

May said:

UKBA was given agency status in order to keep its work at an arm’s length from ministers. That was wrong. It created a closed, secretive and defensive culture.

The Home Secretary was particularly scathing of the UKBA's "inadequate" IT systems for being "incompatible" and unreliable.

"They require manual data entry instead of automated data collection, and they often involve paper files instead of modern electronic case management," said May. "So I have asked the Permanent Secretary and Home Office Board to produce a new plan, building on the work done by Rob Whiteman, UKBA’s chief executive, to modernise IT across the whole immigration system."

The Home Sec said that the UKBA had been riddled with problems since its formation in 2008 and highlighted four distinct problems with the agency - with IT systems being one of those issues.

May said it operated within a "complicated legal framework" and that its unwieldy nature meant there were "conflicting cultures" within the organisation. She argued that the UKBA's current agency status meant that it had lacked "accountability and transparency".

"All those things mean it will take many years to clear the backlogs and fix the system," the Home Sec said.

This is the latest and now final dismantling of the UKBA.

In February last year, May divorced Blighty's Border Force from the agency following a series of embarrassing passport check gaffes in 2011.

During the busy summer months of that year, immigration border guards had been told to ignore biometric chips on the passports of non-eurozone citizens. The blunder led to UK Border Force chief Brodie Clark being scalped by May.

In 2012, the National Audit Office found that a £385m computer system being built for the UK's Border Agency and Border Force to process immigrants' paperwork was a year behind schedule and £28m over budget. ®

Top three mobile application threats

More from The Register

next story
Arrr: Freetard-bothering Digital Economy Act tied up, thrown in the hold
Ministry of Fun confirms: Yes, we're busy doing nothing
ONE EMAIL costs mining company $300 MEEELION
Environmental activist walks free after hoax sent share price over a cliff
'Blow it up': Plods pop round for chat with Commonwealth Games tweeter
You'd better not be talking about the council's housing plans
Help yourself to anyone's photos FOR FREE, suggests UK.gov
Copyright law reforms will keep m'learned friends busy
Apple smacked with privacy sueball over Location Services
Class action launched on behalf of 100 million iPhone owners
UK government officially adopts Open Document Format
Microsoft insurgency fails, earns snarky remark from UK digital services head
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.