Fujitsu Knowingly Supplied Faulty Data To The British Post Office 

Revelations about the unfolding British Post Office scandal are an example of a faulty IT system resulting in human tragedy - one that raises big questions about how governments use and understand technology. 

Between 1999 and 2015, more than 700 Post Office branch managers were handed criminal convictions for theft and false accounting after discrepancies in Fujitsu's Horizon IT system made it appear as though money was missing. Some went to jail, many were financially ruined and the scandal has been linked to at least four suicides.

In testimony to a Parliamentary Committee the Post Office's Chief Executive admitted that the money taken from branch managers could have been part of "hefty numeration packages for executives". imdded, the Post Office scandal is a major miscarriage of justice in which over 900 sub-postmasters were prosecuted for theft, false accounting and fraud at their branches meant between 1999 and 2015, when these problems were in fact due to errors of the Horizon accounting software.

Fujitsu, who provided the system knew that it had IT faults back in 2008, but didn’t tell the Post Office. 

The Post Office’s management should have been made aware of the computer mistakes and the effects on operations. Worse, Fujitsu is still providing data from the Horizon IT system for use in legal actions against post office operators, the Parliamentary Committee was told.

The Post Office continued to prosecuted more than 900 post office operators across the UK for alleged theft, fraud and false accounting and only stopped directly bringing cases in 2015. Any subsequent potential cases of theft or fraud identified at a branch are referred to police, and ultimately the Crown Prosecution Service if there is enough evidence.

The the subsequent inquiry by MPs into the scandal has heard that Fujitsu already knew about numerous system faults that it used to extract data on Post Office transactions, subsequently used in the prosecution of hundreds of post office operators.

Evidence presented to the inquiry suggested bosses at Fujitsu were concerned at the time that defence lawyers might question the integrity of Fujitsu’s data. Emails shown to the inquiry between Fujitsu managers and the fraud and litigation team, which investigated transactions that failed to complete on Post Office systems, revealed that Fujitsu knew about a string of ongoing problems that it did not reveal.

Fujitsu gave evidence that it was used to send innocent people to prison, and while he did not know exactly when bosses first knew of issues related to Horizon, it had bugs at a "very early stage".

Problems that Fujitsu found included as many as one-third of transactions being duplicated with some fixes involving “manual workarounds”, which the company knew if exposed could call into question the integrity of the data and therefore prosecution cases.

Appearing alongside the Post Office Chief Executive, Fujitsu Europe's boss has admitted the firm has a "moral obligation" to contribute to compensation for sub-postmasters wrongly prosecuted as a result of its faulty IT software. Paul Patterson said Fujitsu gave evidence to the Post Office that was used to prosecute innocent managers.  He added that the Post Office knew about "bugs and errors" in its Horizon accountancy software from an early stage.

Between 1999 and 2015, more than 900 sub-postmasters and postmistresses were prosecuted for theft and false accounting after money appeared to be missing from their branches, but the prosecutions were based on evidence from faulty Horizon software. Some sub-postmasters wrongfully went to prison, many were financially ruined. Some have since died.

It has been described as the most widespread miscarriage of justice in British history, but to date only 93 convictions have been overturned and thousands of people are still waiting for compensation settlements more than 20 years later.

Post Office Scandal UK:     @PostOffice:      BBC:     Guardian:   Telegraph:    FT:    Wikipedia:    Sky

You Might Also Read: 

Royal Mail Refuses To Pay LockBit Ransom Demand:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Cyber Security Is A State Of Mind
A Rolling Campaign Of Russian Inspired DDoS Attacks »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Contrast Security

Contrast Security

Contrast Security is the leader in modernized application security, embedding code analysis and attack prevention directly into software.

Pluralsight

Pluralsight

Pluralsight helps enterprises build technology skills at scale with expert-authored courses on today’s most important technologies including information and cyber security.

HID Global

HID Global

HID Global is a trusted leader in products, services and solutions related to the creation, management, and use of secure identities.

Chainalysis

Chainalysis

Chainalysis provides blockchain analysis software to prevent, detect and investigate cryptocurrency money laundering, fraud and compliance violations.

Zymbit

Zymbit

Zymbit provides hardware security modules (HSM) for IoT devices, including Raspberry Pi and other single board computers.

Stratejm

Stratejm

Stratejm, a Next Generation Managed Security Services Provider, brings innovation and thought leadership to the fight against cyber criminals.

01 Communique Laboratory

01 Communique Laboratory

01 Communique Laboratory is an innovation leader in the new realm of Post-Quantum Cyber Security.

Athreon

Athreon

Athreon utilizes a fusion of AI technology, human interpretation, and the latest in cybersecurity to deliver sound business solutions that help our clients make better data-driven decisions.

Cyberfort Group

Cyberfort Group

Cyberfort exists to provide our clients with the peace-of-mind about the security of their data and the compliance of their business.

Cybolt

Cybolt

Cybolt helps companies, organizations, and governments manage digital risks and live in an environment of confidence and certainty.

Grant Thornton

Grant Thornton

Grant Thornton is one of the world’s leading networks of independent assurance, tax and advisory firms.

eCapital

eCapital

eCAPITAL is a leading venture capital firm that provides early to growth stage funding to technology companies in fields including software & information technology, cybersecurity and industry 4.0.

NetRise

NetRise

NetRise was founded as a direct result of the many shortcomings currently in the device security market, specifically targeting the firmware of devices.

Espria

Espria

Espria is a leading independent managed service provider with expertise in Cloud, IT, Communications and Document Solutions.

enQase

enQase

enQase offers security beyond PQC; the only comprehensive, scalable solution that utilizes enhanced quantum technologies to protect data against current and future quantum threats.

ThreatMon

ThreatMon

Gain insights into emerging threats with real-time data and AI-driven analysis to stay ahead of cyber risks. Detect, analyze, and respond to threats before they happen.