Feeds

UK fraud squad bends over Serco, G4S for 'phantom crims' probe

Electronic taggers' £9bn gov deals now under threat

Beginner's guide to SSL certificates

The UK's Serious Fraud Office (SFO) has launched a criminal investigation into contractors Serco and G4S after an audit allegedly suggested the companies were massively overcharging for the electronic tagging of offenders.

Sources in government told The Guardian that the two firms billed Blighty for monitoring at least 18,000 tagged crims – but it's alleged that at least 3,000 of these turned out to be back in prison, out of the country, released from the tagging scheme, or dead. In some cases, it is claimed, billing carried on for years after tags had been removed or shut down.

The two companies were hired to attach electronic cuffs to criminals to monitor their whereabouts following the crooks' release from prison, but the UK Justice Secretary Chris Grayling ordered a review of the scheme in July following reports of problems with the system.

Serco allowed Department of Justice auditors to go over its books and G4S refused. Now the SFO, an independent crime-fighting team capable of initiating criminal proceedings, has taken over and is forcing a full investigation. The two firms have more than £9bn in outsourcing contracts with the UK government and these may now be at risk, as well as possible criminal charges against internal staff and directors.

Serco's CEO Chris Hyman stepped down from the company last month as part of a corporate shake up. "I have always put the interests of Serco first," he said in a statement. "At this time, nothing is more important to me than rebuilding the relationship with our UK government customers."

The outsourcing giant's electronic tagging procedures are already under the microscope following an investigation by the Cambridge computer scientist Ross Anderson in August for a court case involving an offender accused of trying to remove their tag: Anderson described Serco's tagging system as "shambolic" and claimed the tags were prone to register false removal alerts.

Serco is also under investigation in the UK for another government contract to deliver prisoners to and from court appearances. Grayling said at the time that an audit discovered "systemic malpractice up to board level" in billing for prisoners who were never transported.

Both Serco and G4S have now been blocked from tendering for the next round of contracts for monitoring electronic tagging. But the SFO can recommend jail time for directors if it's found that they were aware of problems and did nothing to rectify them. ®

Security for virtualized datacentres

More from The Register

next story
Spies, avert eyes! Tim Berners-Lee demands a UK digital bill of rights
Lobbies tetchy MPs 'to end indiscriminate online surveillance'
How the FLAC do I tell MP3s from lossless audio?
Can you hear the difference? Can anyone?
Inequality increasing? BOLLOCKS! You heard me: 'Screw the 1%'
There's morality and then there's economics ...
Google hits back at 'Dear Rupert' over search dominance claims
Choc Factory sniffs: 'We're not pirate-lovers - also, you publish The Sun'
While you queued for an iPhone 6, Apple's Cook sold shares worth $35m
Right before the stock took a 3.8% dive amid bent and broken mobe drama
4chan outraged by Emma Watson nudie photo leak SCAM
In the immortal words of Shaggy, it wasn't me us ... amirite?
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.