Britain Bans Huawei 5G

The UK government will ban the installation of new Huawei technology in UK telecommunications networks from September of 2021 - much sooner than predicted. 

This new deadline will allow older Huawei equipment to be used in the national telecoms network. The announcement comes ahead of a new law which  introduces strict security regulations on equipment suppliers seeking access to the national network. Digital Secretary Oliver Dowden said he was pushing for the "complete removal of high-risk vendors" from 5G networks.

Previously, BT's EE division, Vodafone and Three UK would have had until 2027 to install any such equipment acquired before the end of this year, when a purchase ban comes into effect.

This new law will give the British government new powers which will give it the authority to give instructions to big telecoms companies, including BT and Vodafone, which suppliers they may buy equipment from  so-called "high-risk" vendors like Huawei.

Under the new strategy, the government will spend an initial £250m which will involve setting up a National Telecoms Lab research facility as well as investing in open radio technology. Oliver Dowden, the responsible government Minister said that the "new and unprecedented powers" would allow government to "identify and ban telecoms equipment which poses a threat to our national security.... We are also publishing a new strategy to make sure we are never again dependent on a handful of telecoms vendors for the smooth and secure running of our networks.... Our plans will spark a wave of innovation in the design of our future mobile networks,"  This follows a political argument, both in the UK and internationally, over Huawei's threat to security and its alleged links to the Chinese state.

The UK had initially decided that Huawei equipment should be removed from the sensitive part of the "core" network, and only make up a maximum of 35% of the non-core systems. with a deadlne set to be 2023.

Huawei vice president and head of UK operations Victor Zhang said in a press release: “This decision is politically-motivated and not based on a fair evaluation of the risks. It does not serve anyone’s best interests as it would move Britain into the digital slow lane and put at risk the Government’s leveling up agenda.”

Britain has identified 5G technology as a promising field for international collaboration and in 2021 it will  hold the rotating presidency of the G7 group of nations (Canada, France, Germany, Italy, Japan, the United Kingdom, and the United States) providing a platform for creation of a common policy on telecoms technology and equipment supply. 

Quartz:       Guardian:       BBC:      Financial Times:      C|Net:          SCMP:      Council on Foreign Relations

You Might Also Read: 

Who’s Afraid Of Huawei?

 

« Amazon Web Services Outage
Delaware Pays $500,000 Ransom »

Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Free Access: Cyber Security Supplier Directory listing 5,000+ specialist service providers.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

DigitalStakeout

DigitalStakeout

A simple and cost-effective solution to monitor, investigate and analyze data from the web, social media and cyber sources to identify threats and make better security decisions.

Perimeter 81

Perimeter 81

Perimeter 81 is a Zero Trust Network as a Service designed to simplify secure network, cloud and application access for the modern and distributed workforce.

Cylance Smart Antivirus

Cylance Smart Antivirus

An antivirus that works smarter, not harder, from BlackBerry. Lightweight, non-intrusive protection powered by artificial intelligence. BUY NOW - LIMITED DISCOUNT OFFER.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

Phoenix Datacom Limited

Phoenix Datacom Limited

Phoenix Datacom is a provider of solutions and professional services to improve the performance & security of data centres, networks and applications.

Information Commissioner's Office (ICO)

Information Commissioner's Office (ICO)

The Information Commissioner's Office is an independent authority set up to uphold information rights in the public interest

Citrix

Citrix

Citrix provide virtualisation, networking, SaaS and cloud solutions including Secure Networking (Netscaler) and Enterprise Mobility Management (XenMobile).

Quantivate

Quantivate

Quantivate is a provider of web-based Governance, Risk, and Compliance (GRC) software and service solutions.

Deutsche Cyber-Sicherheitsorganisation (DCSO)

Deutsche Cyber-Sicherheitsorganisation (DCSO)

DCSO is an IT security specialist with a focus in three areas - technology management, managed security services, security consulting and auditing.

VMRay

VMRay

VMRay delivers advanced threat analysis and detection that combines a unique agentless hypervisor-based network sandbox with a real-time reputation engine.

Payatu

Payatu

Payatu Technologies is a security testing and services company specialized in Software, Application and Infrastructure security assessments and deep technical security training.

Optra Security

Optra Security

Optra Security specializes in information security with a focus on Application Security.