British Telcos Will Be Told To Strip Huawei Out Of Their Networks

A new report from the British spy agency GCHQ raises security issues over using 5G from  Huawei. The National Cyber Security Centre (part of GCHQ) believes that US sanctions against Huawei will make it impossible to use the Chinese company’s technology as planned for 5G networks.

The UK government has reviewed the report that is widely thought will cause it to change its view on the Chinese firm's role in the UK's telecoms networks. Prime minister Boris Johnson has said that he did not want the country to be "vulnerable to a high-risk state vendor".  

The government is now drawing up plans to stop the purchase of new Huawei gear and remove the existing 5G equipment.

While Huawei has said it remains "open to discussions" there are several  newspaper reports that the British government might ban the purchase of new Huawei 5G equipment by the end of the year.

China's ambassador to the UK has warned that if the country got rid of Huawei, it would send out a wider message about its openness to foreign investment.

The US forbids the Chinese firm and the third parties that make its chips from using "US technology and software to design and manufacture" its products. The risk is that as a consequence Huawei would have to start sourcing chips from elsewhere, which UK security officials might not be able to properly vet.

Prime Minister Johnson could decide to go further, ordering Huawei's kit to be removed from 3G and 4G networks and even the tens of thousands of roadside cabinets it is currently sits in providing broadband connectivity.  But experts have warned that the cost of this would run into "billions of pounds" and would cause major delays to the rollout of full-fibre Internet.

Prime Mister Johnson said: "We have to come up with the right technological solutions, but also we will have to make sure that we can continue to deliver the broadband that the UK needs."

The head of the NATO military alliance has said the West could not ignore the rise of China and so it was important that the UK had had a review of the role of Huawei in its 5G network to ensure its security. Earlier this year Prime Minister Boris Johnson granted Huawei a limited role in UK's 5G mobile network, frustrating a global attempt by the US to exclude the Chinese telecoms giant from the West's next-generation communications.

When questioned about the issue, China's ambassador to the UK said the wider Chinese business community was watching to see how the UK handled the case.

With tensions rising between the countries over imposition of a new security law in the ex-colony, Hong Kong and disagreements over Chian's role in dealing with the Coronavirus pandemic, it seems unlikely that Huawei will restored as an approved supplier to the national network. 


NCSC:       BBC:         CNBC:       Al Jazeera:        Guardian

You Might Also Read: 

Why 5G Technology Is A Geopolitical Issue:

 

« Online Shoppers Have Lost Over £16m To Lockdown Fraud
The Growing Cyber Threat To Renewable Energy »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

SANS Institute

SANS Institute

SANS is the most trusted and by far the largest source for information security training and security certification in the world.

Exploit Database (EDB)

Exploit Database (EDB)

The Exploit Database is a CVE compliant archive of public exploits and corresponding vulnerable software, developed for use by penetration testers and vulnerability researchers.

Cyren

Cyren

Cyren is a cloud-based, Internet security technology company providing threat detection and security analytics.

44CON

44CON

44CON is an Information Security Conference & Training event taking place in London. Designed to provide something for the business and technical Information Security professional.

MetaFlows

MetaFlows

MetaFlows’ SaaS malware detection & prevention software passively analyzes the behavior and the content of Internet traffic.

CSIS Security Group

CSIS Security Group

CSIS provide actionable threat intelligence, prevention, incident response and 24/7 managed security services.

Consult Hyperion

Consult Hyperion

Consult Hyperion is an independent strategic and technical consultancy specialising in digital identity and secure electronic transactions.

Ideagen

Ideagen

Ideagen provides information management, safety, risk and compliance software solutions that allow organisations to achieve operational excellence, regulatory compliance and reduce risk.

ThreatBook

ThreatBook

ThreatBook is dedicated to providing real-time, accurate and actionable threat intelligence to block, detect and prevent attacks.

Cybrary

Cybrary

Cybrary is an open-source cyber security and IT learning and certification preparation platform.

Critical Start

Critical Start

Critical Start provides Managed Detection and Response services, endpoint security, threat intelligence, penetration testing, risk assessments, and incident response.

Wontok

Wontok

Wontok deliver innovative value-added data security services that fill the gaps left in traditional security solutions.

Neosec

Neosec

We’re reinventing API security. Understanding behavior requires data, analytics, and intelligence. Neosec brings XDR techniques to application security.

Mindaro Insurance

Mindaro Insurance

Mindaro is adding the crucial piece of the cyber security puzzle that protects your organization from the financial ramifications of cyber attacks.

Strac

Strac

Eliminate Personal Data Risks from your business. Our Dataless SaaS removes the need to manage sensitive data across web, mobile apps, servers and communication channels.

DEKRA

DEKRA

DEKRA’s promise is to ensure the safety of human interaction with technology and the environment.