NCA seeks emulated phone technology to help combat crime

Emulated phone technology is being sought by the National Crime Agency (NCA) to support its work using multiple aliases to communicate with numerous people nationally and internationally. In its latest challenge, HMGCC Co-Creation wants to hear from organisations which have an emulated phone solution to potentially help the NCA in its future work. The solutions being put forward by organisations applying for this challenge should already be at mid to high Technical Readiness Level (TRL). Organisations are being asked to apply if, over a 12-week period, they can develop and demonstrate a piece of technology to meet this challenge. HMGCC Co-Creation will provide funding for time, materials, overheads, and other indirect expenses.

Opportunity

Challenge opens

10/10/2024

Challenge closes

07/11/2024

Benefit

Organisations are being asked to apply if, over a 12 week period and with a budget of £60k, they can develop and demonstrate technology to meet this challenge. HMGCC Co-Creation will provide funding for time, materials, overheads and other indirect expenses.

Context of the challenge

This HMGCC Co-Creation challenge, launched on behalf of the NCA, is looking for an emulated phone solution. 

The NCA’s mission is to protect the public from serious and organised crime. It operates across the UK and around the world. This requires NCA officers to be able to communicate securely, effectively and dynamically with officers and a range of partners 24/7, 365 days a year. Communications include voice, text, video and picture messaging. 

Officers may use multiple aliases and several physical mobile phones to interact with numerous people, protecting their identity and the identity of those with whom they communicate. The NCA wants to reduce the use of physical handsets, in favour of simplifying operations by using a single approved device. The single device should be able to host a series of emulations that can be spun-up and decommissioned rapidly. Due to the sensitivity of some operations, there must be minimal risk of emulation being linked, and any risks should be identified and clearly articulated for the risk owner. 

You must be logged in to see the full information