Select Committee on Science and Technology Minutes of Evidence


Examination of Witnesses (Questions 340-359)

MS KATHERINE COURTNEY, DR HENRY BLOOMFIELD, MR NIGEL SEED AND MR MAREK REJMAN-GREENE

22 MARCH 2006

  Q340  Mr Devine: I want to talk a bit about security and timescales and such like. In February this year a Dutch company claimed to have skimmed information off ID cards. I do not know if you are aware of that. Are reliability and security your highest priorities regarding the National Identity Register? What other factors are influencing your decisions about the Register? Is there any scenario in which security levels would be sacrificed either for political reasons or for timescale reasons?

  Ms Courtney: I believe that the Dutch company, as reported in the media, was talking about an early prototype passport that had been used and not an ID card.

  Q341  Mr Devine: It still got access.

  Dr Bloomfield: The people who claim to have cracked this prototype Dutch passport did it under laboratory conditions. You need to sit next to a passport with a reader for some considerable time to read it and get into it, which may not happen in ordinary conditions. The other point is that they had already quite a lot of information about the data on the passport which allowed them a foothold to get in through the cryptography and they were also provided with a number of consecutively numbered passports, which further weakens the cryptography. There is a fairly odd set of circumstances that they had in their favour in order to get through this cryptography. Having said that, being able to attack a card or a passport will get you, in the case of our identity card proposals, access to data which is not at all valuable. All the data, apart from the encoded biometrics, would also be printed on the face of the card and you would not actually get very much out of it. Attacking the database is a very, very different challenge.

  Ms Courtney: It is important to point out that the accreditation process focuses on the security and integrity and also on the availability of the system. We need to make sure that all of our plans are accreditable not just against hacking and other security risks but that what we are designing here is a system that does not fall over, that does not have a single point of failure and it does not have a single point of decision-making and that there are clear audit logs of how the system is being used so that we can apply appropriate safeguards and supervision.

  Q342  Mr Devine: And all this can be done security wise within a timescale of two and a half years, can it?

  Ms Courtney: I am confused about the timescale of two and a half years—

  Mr Devine: We are looking at 2009.

  Q343  Bob Spink: That is the date of implementation.

  Ms Courtney: I believe we have said that our timetable is indicative and that on current plans we are looking at 2008-09, but I have also mentioned that we are implementing a number of intermediate things that are happening this year, next year, in 2008, et cetera.

  Q344  Mr Devine: You can write to us about that.

  Ms Courtney: The actual date for "turning on" the National Identity Register is very dependent on the suppliers' proposals as they come back to us through the procurement process. If you would like me to say something more about the security approach, perhaps I can ask Nigel to expand on the security requirements.

  Mr Seed: Security is not going to be an add-on, it is being done now. We have not even gone out with our requirements. The security team is embedded within my procurement team; they are fully engaged. They are on my back all the time, as they should be. The people who are going to do the accreditation are having meetings with our people all the times, looking at our requirements as they develop and then inputting to those requirements. The security of the data centre itself is down to even very basic things like making sure it is not on or near a floodplain. We are looking at all that sort of stuff, right the way from very basic level access and flooding and losing it that way right the way through to hacking.

  Ms Courtney: It is the security around the people, the processes and the systems, not just the technology.

  Q345  Mr Devine: There is a claim that basically if you have one database you are creating a "honeypot" for criminals to hack into. How would you respond to that suggestion?

  Ms Courtney: First of all, I think that is an assumption that there is one database. We have not predetermined the architecture of this system. Our security requirements include issues around making it difficult for people to hack in and access the system. We will have security accreditors throughout the lifetime of this scheme, not just in our planning phase. I think we are doing everything we can to ensure that the security considerations are taken very seriously indeed.

  Q346  Mr Devine: You are not going to have one database, is that what you are saying?

  Ms Courtney: People like to talk about the National Identity Register as a database. The National Identity Register will be a technical system that may involve a series of data storage solutions. I think it is important that people do not prejudge how the architecture of the system will be designed.

  Q347  Chairman: I am now very confused as to what you are saying here. You will have a series of databases. Where is the evidence coming from as to whether you are going for one single database or a series of databases?

  Ms Courtney: You are going to ask me questions about the technical design and I am not a technologist.

  Q348  Chairman: Can any of your colleagues answer?

  Ms Courtney: Our reference solution assumes one thing and then we are working with the market on options—

  Q349  Chairman: In terms of phase one procurement, will the market also decide how many databases you have?

  Mr Seed: To an extent, yes. We are doing an output-based requirement, so we are saying this is what the system must do. How they do it is not defined. If industry comes back and says one single monolithic database is the best way and it meets all the requirements then there may be one database. Equally, they could come back and say the security is increased by having partial data here and partial data elsewhere. We have not defined it.

  Q350  Chairman: Will industry not come back with a solution that is best for them?

  Mr Seed: Possibly.

  Q351  Chairman: I would if I was a commercial company.

  Mr Seed: Of course you would. You have got to remember that this is an open competition. If somebody comes through with a cheaper solution, that is not necessarily what we are going to select. We are going to look for the best technical solution and the best value for money.

  Dr Bloomfield: It is worth adding that it will also have to be a solution which meets the requirements of our security accreditors.

  Q352  Mr Devine: Let us say Jim Devine's computer company gets the contract. I can set up a company in Scotland and send information to Scotland, Wales and London. I could outsource this contract to 100 different companies. Is that right?

  Ms Courtney: We will obviously have a due diligence process—

  Q353  Mr Devine: Is that right?

  Ms Courtney: Not necessarily. We will have a say in this procurement process, as any government client does, about how the consortium is formed and who is providing the solutions. While we do not have an intention to dictate how the market responds to the requirements, we have made it clear that we have to take a decision based on the proposals they put to us. If they propose a solution that includes using companies in a subcontractor relationship such as you describe that we cannot have confidence in, we will not be signing a contract with them.

  Bob Spink: Could I ask you to confirm again, please, because I am incredulous about this, that all of this will be up and running in two and a half years? Can you confirm that none of this will be outsourced offshore UK?

  Q354  Chairman: Can you answer the second part because I think you have answered the first part to be fair?

  Ms Courtney: We have offered to write back with the procurement principles that apply to that.

  Q355  Margaret Moran: Is it not inevitable that the market solution will be a single database simply because of the complexity of joining up a myriad of departmental databases which do not match? How are you going to be able to evaluate what comes forward to you in that respect as against the option of multiple databases which may not come forward at all from industry?

  Ms Courtney: I do not believe there is a foregone conclusion about that. In our market soundings we have had suppliers who have been working for some time on their own reference solutions for this and they have a number of different approaches, all of which may be equally valid and which should be evaluated in the open competition.

  Q356  Mr Devine: You mentioned earlier on that technology is changing. It has been suggested by colleagues in America that these cards are going to be out-of-date very quickly. I think KPMG's assertion is that the durability of the cards would be 10 years. Have you made any assessment of that?

  Ms Courtney: We did do that because that is one of the assumptions driving some of the costs in our business case model. We went out and did a survey of card manufacturers to look specifically at card lifecycles and durability and based on the evidence that they gave back to us we are confident in the 10 year assumption.

  Dr Bloomfield: And also from looking at other schemes. Hong Kong, for example, has a polycarbonate smartcard which is valid for 10 years.

  Q357  Chairman: Nigel, if you have multi-databases as part of your phase one procurement, and that is an option which is open to the tenderers of the process, who controls the data? Would it be the companies who win the contract or does the Government retain control of that data?

  Mr Seed: It is a bit of both. The company will be running the database per se, but the data itself will be monitored by civil servants sitting alongside the contractor. We are intending to have a partnership agreement. There is no intention to hand this contract over and then walk away and leave it with a commercial outfit. There will be full-time civil servants in the data centre monitoring the data and the usage of the data.

  Q358  Chairman: But a private company will be able to have access to all that data if they win the contract, will they not?

  Mr Seed: By definition, in order to maintain the database, yes, they would have to be able to see the data on it.

  Q359  Dr Iddon: As you know, this is a very excitable political issue and all the Members around this table get lots of correspondence on it. Apart from the libertarian arguments which we engage with, the second argument is about the costs and that is where I want to go now. Obviously the London School of Economics is in opposition to the Government on costs and they have quoted figures of £10.6 billion to £19.2 billion, which are the 10 year costs and which include running costs. We can argue about those figures and they have been argued about and the Government has contradicted them. The hon Member for Leigh has quoted a figure of £584 million per year as the total cost but he will not reveal the estimates within that particular figure. Obviously those figures are way apart, there is no similarity between them. I just want to examine that big difference. How can you be certain about the costs when you have not even set a detailed specification yet?

  Ms Courtney: We have had to produce a reference solution for ourselves in order to evaluate what the likely costs would be. We have done that work based on the feasibility analysis that we have done. The figure of £584 million—


 
previous page contents next page

House of Commons home page Parliament home page House of Lords home page search page enquiries index

© Parliamentary copyright 2006
Prepared 4 August 2006