Britain’s Border Control Systems Keep Falling Over

The computer system used to protect Britain’s borders by screening passengers for terrorists and criminals "has crashed multiple times,” according to Mark Sewall, the most senior official at the Home Office.

Sewall, who is the Home Office’s permanent secretary, relayed that the Semaphore system not only crashed repeatedly – with most outages lasting “minutes” – but that sometimes, it was un-operational for “hours.” He refused to provide a full rundown of the incidents.

“Most outages are minutes, very, very few are hours. I did ask this question earlier, I don’t have the exact data,” Sedwill said.

Sedwill admitted that there was increased “risk” during outages and that in these times the protection of borders was “less comprehensive,” though – so far – no known criminals, extremists, or illegal immigrants managed to enter the UK during these incidents.

“Yes I do, but I don’t have it here and we don’t define these incidents just by the amount of time … I know how many of those that there are, I don’t want to disclose it publicly,” Sedwill replied when asked by Members of Parliament to provide a breakdown of the incidents.

These revelations raise concerns regarding the state of Britain’s border security. While the country’s border agents have, at all times, access to the “warning index” – a list of individuals wanted by the law, the Semaphore system provides a critical additional layer of security by screening all passengers against lists of suspected individuals before they arrive to the UK.

Still, Sedwill tried to assuage concerns, saying. “What I want to reassure you about, however, is that because it’s a multi-layered system no actual threat manifested itself and we have good risk and contingency mitigation measures in place to ensure that there is no single point of failure in our system.”


I-HLS

 

« Anonymous Declares War On Global Banks
China Denounces Pentagon Cyberwarfare Report »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Hyve

Hyve

Hyve provide a wide range of managed web hosting services including private, hybrid and public VMware cloud hosting.

Sogeti

Sogeti

Sogeti deliver solutions that enable digital transformation and offer cutting-edge expertise in Cloud, Cybersecurity, Digital Manufacturing, Quality Assurance, Testing, and emerging technologies.

CIRT.GY

CIRT.GY

CIRT-GY is the national Computer Incident Response Team for Guyana.

CommuniTake

CommuniTake

CommuniTake builds security, enablement, and management solutions to provide people and organizations with better, and more secure mobile device use.

IDpendant

IDpendant

IDpendant offers a wide range of services, including authentication technology, client security products, single sign on systems, encryption solutions, card and mobile device management systems.

Intensity Analytics

Intensity Analytics

Intensity Analytics is a software firm that develops next-generation, physical user and entity behavioral authentication ("physical UEBA") security software technology.

NuID

NuID

NuID is a pioneer in trustless authentication and decentralized digital identity.

CYRISMA

CYRISMA

CYRISMA is a revolutionary cybersecurity platform that helps organizations manage risk without the usual headaches associated with enterprise cybersecurity tools.

Ermetic

Ermetic

Ermetic’s identity-first cloud infrastructure security platform provides holistic, multi-cloud protection in an easy-to-deploy SaaS solution.

Varen Technologies

Varen Technologies

Varen Technologies is an innovative consulting partner with highly respected cyber security, analytics, Agile Software Development and IT/maintenance expertise.

HolistiCyber

HolistiCyber

HolistiCyber provide state-of-the art consulting, services, and solutions to help proactively and holistically defend against a new era of constantly evolving cyber threats.

Atlas VPN

Atlas VPN

Atlas VPN is a highly secure freemium VPN service with a goal to make safe and open internet accessible for everyone.

Thoropass

Thoropass

Thoropass (formerly Laika) helps you get and stay compliant with smart software and expert services.

Cyber Defense International (CDI)

Cyber Defense International (CDI)

At CDI, we utilize decades of experience in designing and building large-scale cybersecurity programs, creating tailored solutions and services that protect businesses from cyber threats.

Adaptiva

Adaptiva

Adaptiva, the autonomous endpoint management company, delivers the fastest way to patch and manage endpoints at scale.

VT Group (VTG)

VT Group (VTG)

VTG delivers force modernization and digital transformation solutions that expand America’s competitive advantage in the modern battlespace.