The US & Britain Edge Closer To An Agreement On Huawei

Britain has averted a full-blown confrontation with the White House over Huawei, after the UK government also designated the Chinese technology firm a “high-risk vendor” and imposed a cap on its involvement in building the UK’s 5G telecoms network. 

US Defense Secretary Mark Esper has now said he has had "candid" conversation with UK Secretary of State for Defense Ben Wallace on the subject,  although without elaborating on what form the “further’ reduction would take, although but he emphasised the importance of the intelligence-sharing agreement between the United States, the United Kingdom, and other Five Eyes partners. 

 Esper said US officials want to work with the United Kingdom on “a way forward that results in the exclusion of untrusted vendor components for 5G networks” in the UK and elsewhere. Both secretaries said their nations’ disagreement about Huawei was not over the nature of the threat of Chinese-manufactured telecom equipment, but about the best ways to deal with the threat. 

While the US is reportedly still disappointed with the decision to allow “an untrusted vendor” into the UK market, the security and economic relationship between the two countries was too important to jeopardise in a row over mobile phone technology.

The United States has pushed for an outright and total ban on Huawei and other Chinese telecom providers. The British government has taken a less extreme position and while Huawei is banned from networks that the government considers to essential to national security, such as for government use or infrastructure, the government has allowed Huawei to take a position in the commercial market, a position capped at 35% of that market, with the ultimate goal of eventually cutting them out of the market entirely, a position Wallace referred to as “Ban, cap, and cut.”

The UK has a lot of experience probing Chinese telecommunications gear. In 2010, the government established the Huawei Cyber Security Evaluation Centre, or HCSEC, Oversight Board to better understand its threats to customer data and national security. Last March, the Center published a report that described “serious and systematic defects in Huawei’s software engineering and cyber security competence.” Huawei was formally deemed a “high risk vendor” because its Chinese ownership meant Beijing could in theory force it to carry out surveillance of British citizens in the future.

There is no evidence of deliberate security flaws in the company’s equipment but an official British assessment said: “The Chinese state has carried out and will likely continue to carry out cyber-attacks against the UK and our interests.” 

Britain’s spy agencies have long argued that any risks from using Huawei can be contained, and that US calls for a total ban are disproportionate.

The decision comes at a critical moment in the relationship with the  White House, as the UK Prime Minister prepares to press for a post-Brexit trade deal and has already irritated Washington by pressing ahead with plans to implement a digital sales tax on global internet firms, but despite that the White House has been reluctant to link the decision to future trade talks. The  UK Government should reduce Chinese telecoms company Huawei’s involvement in the UK’s 5G mobile network to zero by 2023, former Conservative Party Leader Sir Iain Duncan Smith said.

Huawei is not the only contentious issue threatening the British-American relationship. British diplomats are also fretting over differences with Washington over Britain’s plans for a digital services tax that would hit large American corporations like Google and Amazon, and its policy toward Iran.

Defense One:       Guardian:     Express and Star:    New York Times

You Might Also Read: 

US Increases Pressure To Stop Huawei 5G In Britain:

 

 

« Boot Camp Lessons In Cyber Security
Why 5G Technology Is A Geopolitical Issue »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Global Secure Solutions (GSS)

Global Secure Solutions (GSS)

Global Secure Solutions is an IT security and risk consulting firm and authorised ISO training partner for the PECB.

PortSwigger

PortSwigger

PortSwigger's Burp Suite is an integrated platform for performing security testing of web applications.

D-Fence

D-Fence

D-Fence high availability security service protects corporate email communication, the company and it's employee's against cyber threats.

Niagara Networks

Niagara Networks

Niagara Networks is a Network Visibility industry leader, with emphasis in 1/10/40/100 Gigabit systems and mission-critical IT and security appliances.

The Open Group

The Open Group

The Open Group: Leading the development of open, vendor-neutral IT standards and certifications.

Cybersecurity Advisors Network (CyAN)

Cybersecurity Advisors Network (CyAN)

CyAN provides a not-for-profit platform that helps private and public organisations as well as governments to identify trusted advisors in the area of Cyber Security and Cyber Crime.

Computer Forensics Consult (CFC)

Computer Forensics Consult (CFC)

Computer Forensics Consult provides disaster recovery, computer forensics, electronic discovery and litigation support services in the growing area of Cyber Security.

Cog Systems

Cog Systems

Cog Systems offer an embedded solution built on modularity, proactive security, trustworthiness, and adaptability to enable highly secure connected devices.

Penacity

Penacity

Penacity, LLC provides strategic consulting technology services and Information Security Services to commercial and government organizations.

Switchfast Technologies

Switchfast Technologies

Switchfast Technologies is an IT consulting and managed services provider, offering IT support and consulting to Chicagoland small businesses.

F1 Security

F1 Security

F1 Security provides a family of web security solutions including web application firewalls, web shell detection solutions, and web shell scanners.

Anterix

Anterix

Anterix is focused on empowering the modernization of critical infrastructure and enterprise businesses by enabling private broadband connectivity.

Cypfer

Cypfer

CYPFER is a global market leader in ransomware post-breach remediation and cyber-attack first response.

SureCloud Cyber Services

SureCloud Cyber Services

Our Cyber Testing capability has been honed since we were founded in 2006 as a disrupter in the penetration testing market.

Tundra Managed Solutions

Tundra Managed Solutions

Tundra Managed Solutions is a comprehensive IT services division offering a wide range of managed solutions designed to meet the diverse needs of businesses.

Intersys

Intersys

Intersys provides cyber-resilient IT support and services from IT offices in London, Essex and Cambridge.