Britain spent £850 million covering up data breaches whilst leaving security gaps unfixed
Exclusive review of secret government report reveals institutional pattern of prioritising political embarrassment over basic security
The sums tell the story. Britain's government spent £850 million secretly relocating Afghans after officials accidentally exposed them to Taliban reprisals, yet refuses to say which basic security recommendations remain unfixed two years after its own review identified the gaps. This isn't prudent confidentiality—it's institutional damage control masquerading as national security.
The contradiction emerges from a previously secret government review, dragged into daylight only after sustained parliamentary pressure. The document reveals systematic failures that exposed millions of citizens' most sensitive data, Afghan interpreters facing death, child sexual abuse victims, disability claimants, serving police officers. Eleven major breaches across core government functions, each following identical patterns of negligence.
Yet rather than transparency and reform, the government's response has been elaborate secrecy. Super-injunctions silencing the media. Reviews hidden from Parliament. Expensive cover-ups prioritised over effective prevention. The machinery of modern government, it turns out, treats public scrutiny as a greater threat than the security failures themselves.
The Afghan disaster illuminates this pathology. In February 2022, a Ministry of Defence official sent a spreadsheet containing nearly 19,000 Afghan names to the wrong email address. The error went unnoticed for 18 months—discovered only when excerpts surfaced on Facebook. Court documents reveal the true scale, up to 100,000 people at risk when family members are counted.
The government's instant reflex was concealment, not accountability. Within weeks, ministers secured an unprecedented "super-injunction" that banned not just reporting but acknowledging the ban existed. For two years, even Cabinet ministers remained ignorant whilst officials secretly relocated thousands at vast public expense. The legal suppression was so complete that the incoming Labour government learned of the breach only after winning power.
The secret review nobody was meant to see
This concealment instinct extended to the government's own investigation. The Information Security Review, completed in September 2023, examined breaches affecting millions yet was never intended for public eyes. Only Chi Onwurah's parliamentary committee forced its release—22 months after completion, one month after the Afghan story finally broke.
The findings shatter any notion these were isolated mishaps. HMRC officials posted 7.5 million child benefit records on CDs via ordinary mail—and lost them. Police forces published sexual abuse victims' details in "hidden" spreadsheet tabs. The Police Service of Northern Ireland accidentally released every serving officer's personal information in a routine Freedom of Information response.
Three patterns recur like a broken record, officials downloading sensitive data without proper controls, sending emails to wrong recipients, publishing spreadsheets containing hidden personal information. These aren't sophisticated cyber attacks but administrative incompetence that would embarrass a competent small business.
The human cost cascades beyond financial figures. PSNI officers went into hiding, some considering leaving the force entirely. Sexual abuse survivors saw their details scattered online. Afghan families faced Taliban retribution for helping British forces. The review notes officials typically acted "in good faith"—indicting the system, not individual malice.
Where accountability goes to die
Despite hundreds of millions spent and lives potentially endangered, not one senior official has faced meaningful consequences. The government's accountability machinery appears designed to diffuse rather than enforce responsibility.
Consider the bureaucratic labyrinth, multiple committees, governance structures, and oversight bodies ensure no individual can be held directly culpable. The review identifies "sanctions for negligence" as one of 14 recommendations—yet this remains unimplemented alongside another undisclosed measure over two years later.
Information Commissioner John Edwards warned these breaches "put lives at risk and undermine public trust." His office can issue stern letters and modest fines whilst departments repeat identical failures. The regulatory framework lacks teeth proportionate to institutional breakdown.
Defence Secretary John Healey exemplifies the response, sincere public apology combined with continued secrecy about specific failures. He closed the secret resettlement programme whilst refusing to identify which security measures remain unfixed—contrition and opacity in perfect balance.
The missing pieces
The government's refusal to name which two recommendations remain unimplemented epitomises this approach. Ministers trumpet progress—12 of 14 complete—whilst declining to specify the exceptions. Another layer of opacity around basic security measures.
The 14 recommendations span technical controls and crisis protocols, staff training and negligence sanctions. Implementation deadlines ranged from October 2023 to September 2024. The selective disclosure suggests the missing elements are particularly sensitive or expensive—or both.
This pattern repeats throughout, complex governance generating secret reports, elaborate policies remaining partially implemented, accountability mechanisms existing primarily for process demonstration rather than consequence enforcement. The machinery appears optimised for managing political embarrassment, not preventing security failures.
Onwurah has now summoned officials to explain the gaps and prolonged secrecy. Her committee's intervention proved necessary to force publication—parliamentary oversight as the sole effective accountability mechanism for systematic institutional failure.
Digital transformation built on quicksand
These revelations should chill anyone following government digital ambitions. Ministers regularly announce data-driven public services, artificial intelligence deployment, citizen digital identities. Yet the evidence suggests the public sector cannot reliably manage basic email distribution without exposing sensitive information.
The National Audit Office recently warned government cyber resilience falls dangerously short of evolving threats. One-third of security roles remain vacant or filled by temporary staff. Legacy systems of unknown vulnerability persist whilst skills shortages prevent modernisation. Against this backdrop, systematic data handling failures suggest institutional problems far beyond technical glitches.
The financial absurdity compounds the security failure. The £850 million Afghan bill could have funded comprehensive security upgrades across multiple departments. Instead, expensive concealment trumped transparent reform—political calculations consistently overriding security considerations.
Public trust becomes collateral damage. Citizens must provide increasingly detailed personal information for tax returns, benefit claims, medical records, criminal proceedings. Systematic evidence of institutional incompetence protecting this data undermines the social contract underpinning modern public services.
The real cost of institutional secrecy
The pattern transcends individual security failures, reaching fundamental questions about democratic accountability and state competence. When departments systematically fail at basic administration, the democratic response should be transparent investigation, clear accountability, comprehensive reform.
The evidence suggests precisely the opposite institutional priorities. Elaborate secrecy protects political reputations whilst security gaps persist. Complex governance diffuses responsibility whilst identical failures recur. Expensive cover-ups take precedence over effective prevention.
The £850 million represents only visible costs. Hidden expenses include legal fees for super-injunctions, staff time managing secrecy protocols, duplicated investigations, and opportunity costs of resources diverted from genuine security improvements.
More fundamentally, systematic incompetence combined with determined secrecy corrodes trust essential for effective governance. Public servants who cannot reliably check email recipients or spot hidden spreadsheet data cannot credibly promise protection for citizens' sensitive information in an increasingly digital age.
The choice now confronting government is stark, genuine accountability or continued opacity. Parliamentary pressure forcing the secret review's publication suggests democratic oversight remains possible—but only through sustained scrutiny overcoming institutional resistance.
Whether ministers disclose the missing recommendations and implement comprehensive reforms will indicate if lessons have been learned. The alternative—continued secrecy with recurring failures—risks further trust erosion precisely when digital transformation demands unprecedented citizen confidence in government data handling.
Until institutional incentives change to prioritise genuine security over political embarrassment, citizens' most sensitive information remains vulnerable to the next administrative error in a system that treats transparency as the primary enemy.