Fujitsu Knowingly Supplied Faulty Data To The British Post Office 

Revelations about the unfolding British Post Office scandal are an example of a faulty IT system resulting in human tragedy - one that raises big questions about how governments use and understand technology. 

Between 1999 and 2015, more than 700 Post Office branch managers were handed criminal convictions for theft and false accounting after discrepancies in Fujitsu's Horizon IT system made it appear as though money was missing. Some went to jail, many were financially ruined and the scandal has been linked to at least four suicides.

In testimony to a Parliamentary Committee the Post Office's Chief Executive admitted that the money taken from branch managers could have been part of "hefty numeration packages for executives". imdded, the Post Office scandal is a major miscarriage of justice in which over 900 sub-postmasters were prosecuted for theft, false accounting and fraud at their branches meant between 1999 and 2015, when these problems were in fact due to errors of the Horizon accounting software.

Fujitsu, who provided the system knew that it had IT faults back in 2008, but didn’t tell the Post Office. 

The Post Office’s management should have been made aware of the computer mistakes and the effects on operations. Worse, Fujitsu is still providing data from the Horizon IT system for use in legal actions against post office operators, the Parliamentary Committee was told.

The Post Office continued to prosecuted more than 900 post office operators across the UK for alleged theft, fraud and false accounting and only stopped directly bringing cases in 2015. Any subsequent potential cases of theft or fraud identified at a branch are referred to police, and ultimately the Crown Prosecution Service if there is enough evidence.

The the subsequent inquiry by MPs into the scandal has heard that Fujitsu already knew about numerous system faults that it used to extract data on Post Office transactions, subsequently used in the prosecution of hundreds of post office operators.

Evidence presented to the inquiry suggested bosses at Fujitsu were concerned at the time that defence lawyers might question the integrity of Fujitsu’s data. Emails shown to the inquiry between Fujitsu managers and the fraud and litigation team, which investigated transactions that failed to complete on Post Office systems, revealed that Fujitsu knew about a string of ongoing problems that it did not reveal.

Fujitsu gave evidence that it was used to send innocent people to prison, and while he did not know exactly when bosses first knew of issues related to Horizon, it had bugs at a "very early stage".

Problems that Fujitsu found included as many as one-third of transactions being duplicated with some fixes involving “manual workarounds”, which the company knew if exposed could call into question the integrity of the data and therefore prosecution cases.

Appearing alongside the Post Office Chief Executive, Fujitsu Europe's boss has admitted the firm has a "moral obligation" to contribute to compensation for sub-postmasters wrongly prosecuted as a result of its faulty IT software. Paul Patterson said Fujitsu gave evidence to the Post Office that was used to prosecute innocent managers.  He added that the Post Office knew about "bugs and errors" in its Horizon accountancy software from an early stage.

Between 1999 and 2015, more than 900 sub-postmasters and postmistresses were prosecuted for theft and false accounting after money appeared to be missing from their branches, but the prosecutions were based on evidence from faulty Horizon software. Some sub-postmasters wrongfully went to prison, many were financially ruined. Some have since died.

It has been described as the most widespread miscarriage of justice in British history, but to date only 93 convictions have been overturned and thousands of people are still waiting for compensation settlements more than 20 years later.

Post Office Scandal UK:     @PostOffice:      BBC:     Guardian:   Telegraph:    FT:    Wikipedia:    Sky

You Might Also Read: 

Royal Mail Refuses To Pay LockBit Ransom Demand:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Cyber Security Is A State Of Mind
A Rolling Campaign Of Russian Inspired DDoS Attacks »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Zayo

Zayo

Zayo is a leading global bandwidth infrastructure services provider for high-performance connectivity, secure colocation and flexible cloud services.

Stormshield

Stormshield

Stormshield is a European leader in digital infrastructure security. We offer smart, connected solutions in order to anticipate attacks and protect digital infrastructures.

D-Fence

D-Fence

D-Fence high availability security service protects corporate email communication, the company and it's employee's against cyber threats.

Cienaga Systems

Cienaga Systems

Cienaga Systems is a leader in autonomous cyber threat hunting technology.

H3C Group

H3C Group

H3C provides a full range of Computer, Storage, Networking and Security solutions.

Aspen Insurance

Aspen Insurance

Aspen is a leading diversified specialty insurance and reinsurance company. Products offered include cyber insurance.

Mnemonica

Mnemonica

Mnemonica specializes in providing data protection system, information security compliance solutions, cloud and managed services.

CYOSS

CYOSS

CYOSS, an ESG Group company, is a specialist in Cyber Security and Data Analytics. We focus on the opportunities of a networked world and make security risks manageable.

Sydeco

Sydeco

Sydeco offer a complete range of products that secure computer and industrial networks, servers, programs and data against any type of computer attack.

E2E Technologies

E2E Technologies

E2E Technologies are a proactive, SLA-beating, managed service provider that busts the common stereotypes surrounding IT.

Everything Blockchain

Everything Blockchain

Everything Blockchain offer solutions that transform enterprise data-management capabilities. Increased efficiency, super-charged performance and all with government grade security.

Cyber Unicorns

Cyber Unicorns

Cyber Unicorns is a cyber security consultancy created to help drive cyber security outcomes in the small to medium-sized business space.

NinjaOne

NinjaOne

The NinjaOne Platform was built to help IT and MSP teams efficiently manage, patch, and support all endpoints.

Invisinet Technologies

Invisinet Technologies

Invisinet is a cybersecurity technology company specializing in innovative solutions that protect network infrastructure and critical assets from advanced threats.

Staris

Staris

Human based defense is dead. Staris is reinventing application security for an increasingly AI driven world.

Servadus

Servadus

Servadus help organizations with their cybersecurity and compliance programs through management and sustainability, consulting, and assessing.