Who fancies a billion-quid bonanza? Just flog the Home Office some shiny walkie-talkies

Actually, a tip-top comms network for our 999 heroes


The UK Home Office is touting a mega contract worth up to £1.2bn to build a next-generation comms network for Blighty's brave emergency services.

Led by the Crime and Policing Group, under the auspices of the Emergency Services Mobile Communications programme, the new system must provide voice calls and wireless broadband connections to on-duty firefighters, cops and ambulance medics.

"These services require a mobile communications network capable of providing the full coverage, resilience, security and public safety functionality required by the 3ES [fire, police and ambulance emergency services]," the service contract's notice document stated.

The new Emergency Services Network (ESN) is expected to be switched on in late 2016, covering roughly 250,000 staff with "broadly" the same number of mobile comms devices in operation.

The deal being brokered will provide for emergency workers overseen by 44 police and crime commissioners, 50 fire and rescue authorities, 13 ambulance trusts, National Crime Agency, National Police Air Services, and three non-Home Office Police services (the British Transport Police, MoD Police and Civil Nuclear Constabulary).

The size of the financial prize is between £550m and £1.22bn, but this "depends" on the extent of the take up of services by other local government and public safety bodies, the tender stated.

The ESN contract is split into four lots: one successful organisation will be named "delivery partner" to move staff onto the new system; another will provide "emergency services user services" aka integration and testing; another will provide mobile call and data services; and a fourth will provide "extension services", including building out a "highly available telecommunications network".

The individual parts of the contract are expected to run for at least 66 months. Three to six suppliers will be invited to submit a tender for each lot from June this year, the contract notice stated. ®

Similar topics


Other stories you might like

  • Battlefield 2042: Please don't be the death knell of the franchise, please don't be the death knell of the franchise

    Another terrible launch, but DICE is already working on improvements

    The RPG Greetings, traveller, and welcome back to The Register Plays Games, our monthly gaming column. Since the last edition on New World, we hit level cap and the "endgame". Around this time, item duping exploits became rife and every attempt Amazon Games made to fix it just broke something else. The post-level 60 "watermark" system for gear drops is also infuriating and tedious, but not something we were able to address in the column. So bear these things in mind if you were ever tempted. On that note, it's time to look at another newly released shit show – Battlefield 2042.

    I wanted to love Battlefield 2042, I really did. After the bum note of the first-person shooter (FPS) franchise's return to Second World War theatres with Battlefield V (2018), I stupidly assumed the next entry from EA-owned Swedish developer DICE would be a return to form. I was wrong.

    The multiplayer military FPS market is dominated by two forces: Activision's Call of Duty (COD) series and EA's Battlefield. Fans of each franchise are loyal to the point of zealotry with little crossover between player bases. Here's where I stand: COD jumped the shark with Modern Warfare 2 in 2009. It's flip-flopped from WW2 to present-day combat and back again, tried sci-fi, and even the Battle Royale trend with the free-to-play Call of Duty: Warzone (2020), which has been thoroughly ruined by hackers and developer inaction.

    Continue reading
  • American diplomats' iPhones reportedly compromised by NSO Group intrusion software

    Reuters claims nine State Department employees outside the US had their devices hacked

    The Apple iPhones of at least nine US State Department officials were compromised by an unidentified entity using NSO Group's Pegasus spyware, according to a report published Friday by Reuters.

    NSO Group in an email to The Register said it has blocked an unnamed customers' access to its system upon receiving an inquiry about the incident but has yet to confirm whether its software was involved.

    "Once the inquiry was received, and before any investigation under our compliance policy, we have decided to immediately terminate relevant customers’ access to the system, due to the severity of the allegations," an NSO spokesperson told The Register in an email. "To this point, we haven’t received any information nor the phone numbers, nor any indication that NSO’s tools were used in this case."

    Continue reading
  • Utility biz Delta-Montrose Electric Association loses billing capability and two decades of records after cyber attack

    All together now - R, A, N, S, O...

    A US utility company based in Colorado was hit by a ransomware attack in November that wiped out two decades' worth of records and knocked out billing systems that won't be restored until next week at the earliest.

    The attack was detailed by the Delta-Montrose Electric Association (DMEA) in a post on its website explaining that current customers won't be penalised for being unable to pay their bills because of the incident.

    "We are a victim of a malicious cyber security attack. In the middle of an investigation, that is as far as I’m willing to go," DMEA chief exec Alyssa Clemsen Roberts told a public board meeting, as reported by a local paper.

    Continue reading

Biting the hand that feeds IT © 1998–2021