Britain Allows Huawei 5G Network Access Against US Advice

The UK Government has decided to give the Chinese telecoms firm Huawei a significant role in building the UK’s 5G phone and data network. 

The US Government has repeatedly warned the UK that the Beijing-based firm poses a security risk and that any access to Britain’s 5G would put in jeopardy US-UK intelligence sharing and possibly any post-Brexit trade deal. In the biggest test of his post-Brexit foreign policy to date,

Prime Minister Boris Johnson ruled that "high-risk vendors" would be allowed into the "non-sensitive" parts of 5G networks, but their involvement would be capped at 35 per cent. The UK National Security Council gave it limited access to the UK network on Tuesday 28th January.

Huawei will be excluded from the sensitive core of networks, where data is processed, and they are not allowed into any critical networks and sensitive locations such as nuclear sites and military bases, the government said.

Boris Johnson has been told that he is potentially disrupting relations with the US and he been warned that he’s now on the road to a diplomatic war with Donald Trump. However, Britain’s most senior intelligence officials believe that they can manage any risk posed by Huawei, which has played a role in the UK’s 3G and 4G networks for more than a decade.

MI5 intelligence chief Sir Andrew Parker and GCHQ’s National Cyber Security Centre have advised ministers that there will be no extra threat if Huawei’s role is restricted to non-core parts of Britain’s new mobile network.

Non-core equipment refers to the antennas and base stations that sit on masts and rooftops, considered less vulnerable than the core servers and systems where customer information is processed. With only two other companies, Sony Ericsson and Nokia, able to provide the necessary equipment and expertise for 5G in the UK.

Senior government insiders believe that excluding Huawei would cost billions more and impose serious delays on the technology rollout.

Several American senators and members of congress have warned that failing to ban Huawei, as Australia and New Zealand have, could lead to repercussions in crucial trade talks between the US and UK.

British Cabinet ministers, including defence secretary Ben Wallace and home secretary Priti Patel have privately expressed concerns about Huawei. Members of the opposition in the House of Lords welcomed the restriction of Huawei's role to the network's periphery but said questions remained to be answered by the Government.Opposition

Labour spokesman Lord Griffiths called for early legislation in an area where technological developments happen quickly, warning against getting "behind the curve" and other critics of the decision expressed concern over the possibility of  disruption to UK-US intelligence sharing.

GOV.UK             CNN:       Huffington Post:      BBC:        CBC

You Might Also Read:

Five Eyes Intelligence Chiefs Point The Finger:

Can A 5G Network Really Be Secure?:

 

« Cyber Crime Costs Britain $27 Billion
Top Cyber Threats For Business In 2020 »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

RSA Conference

RSA Conference

RSA Conference conducts information security events around the globe that connect you to industry leaders and highly relevant information.

International Organization for Standardization (ISO)

International Organization for Standardization (ISO)

ISO is an independent, non-governmental international standards organization. The ISO/IEC 27001 is the standard for information security management systems.

Homeland Security Investigations (HSI)

Homeland Security Investigations (HSI)

Homeland Security Investigations (HSI) is a premier federal law enforcement agency within the Department of Homeland Security (DHS).

Astra Security

Astra Security

Astra's website security solution provides real-time protection against malware, hackers, SQLi, XSS, DDoS, LFI and RFI.

Seclab

Seclab

Seclab is an innovative player in the protection of industrial systems and critical infrastructure against sophisticated cyber attacks.

Arete

Arete

Arete is a global cyber risk company whose mission is to transform the way organizations prepare for, respond to, and prevent cybercrime.

Haventec

Haventec

Haventec’s internationally patented technologies reduce cyber risk and enable pervasive trust services with a decentralised approach to authentication.

Jerusalem Venture Partners (JVP)

Jerusalem Venture Partners (JVP)

JVP’s Center of Excellence in Be’er Sheva aims to identify, nurture and build the next wave of cyber security and big data companies to emerge out of Israel.

Blue Cedar

Blue Cedar

Blue Cedar's mobile app security integration platform secures and accelerates mobile app deployment for enterprises and government organizations around the world.

Hyperwise Ventures

Hyperwise Ventures

Hyperwise Ventures lead seed investments in startups in the cyber security and enterprise software spaces.

InferSight

InferSight

InferSight can help you design an architecture that takes into account security, performance, availability, functionality, resiliency and future capacity to avoid technological lock in and limitations

Zephyr Project

Zephyr Project

The Zephyr Project strives to deliver the best-in-class RTOS for connected resource-constrained devices, built to be secure and safe.

Brightsolid

Brightsolid

Brightsolid are experts in Hybrid Cloud. We design, build and manage secure, scalable cloud environments that meet customers’ business ambitions.

e-Xpert Solutions

e-Xpert Solutions

e-Xpert Solutions is a company specialized in the Information Security field since 2001. Our skills are strong technical expertise and the development of tailor-made solutions.

ThreatDown

ThreatDown

ThreatDown, powered by Malwarebytes, is on a mission to overpower threats and empower IT by removing the complexity of detecting and stopping today’s most advanced threats.

Index Engines

Index Engines

Index Engines is the world’s leading AI-powered analytics engine to detect data corruption due to ransomware.