UK Telecommunications Act – aka 'power to strip out Huawei' – makes it to the statute book

We bet the Chinese comms giant just LOVED that description

The UK Telecommunications (Security) Act has received Royal Assent, giving the government more control over the use of "high risk" vendors in networks as well as fines that could hit £100k per day for telcos that fail to toe the line.

In case readers are in any doubt who one of those "high risk" vendors is, the statement from the department was titled "Government enshrines in law power to strip out Huawei."

The banhammer was dropped on Huawei's 5G kit last year. The Shenzhen-based company's hardware must be eradicated from UK mobile networks by 2027.

Having got the nod from Her Maj, the 2021 Telecommunications Act ramps things up somewhat. Companies that don't follow directions on those pesky high-risk vendors could be fined up to 10 per cent of their turnover or £100k per day. The rules were floated last year and getting the Act on the statute books means the government can make regulations via secondary legislation.

While the Department of Digital, Culture, Media and Sport (DCMS) did not shy from naming Huawei in its release, the law itself does not specify companies by name. Instead it is concerned with bumping up the security of telecom networks rather than just leaving it to operators to set their own standards.

However, sections such as the "Designated Vendor Directions" give the Secretary of State a range of powers to slap down the use of specific vendors for a number of reasons, including "the interests of national security."

Regulator Ofcom has the task of monitoring and assessing the security of telecoms providers. It will also be able to visit operators' premises in person to conduct on-site inspections.

An Ofcom spokesperson told The Register: "We rely on the internet and our phones for so much of our lives now. So it's vital the networks that provide those services are secure and resilient. These new powers will help us hold telecoms firms to account – making sure they are doing everything they can to protect their networks and the people who use them."

As for what the law actually means, Julia Lopez, minister for Media, Data and Digital Infrastructure, described it as a "major step forward," adding: "Risks to our telecoms networks can never be completely prevented, but we have raised security standards across the board."

DCMS, also known and loved by some as "The Ministry of Fun" (because it's the department for Culture, Media and Sport), listed some of the possible requirements for telecoms providers from government:

  • Securely design, build and maintain sensitive equipment in the core of their networks which controls how they are managed
  • Reduce the risks that equipment supplied by third parties in the telecoms supply chain is unreliable or could be used to facilitate cyber attacks
  • Carefully control who has permission to access sensitive core network equipment on site as well as the software that manages networks
  • Make sure they are able to carry out security audits and put governance in place to understand the risks facing their public networks and services
  • Keep networks running for customers and free from interference, while ensuring confidential customer data is protected when it is sent between different parts of the network

For its part, Huawei has always unsurprisingly denied it is a stooge for the Chinese Communist Party; has worked annually with the Huawei Cyber Security Evaluation Centre (HCSEC), an offshoot of the UK's National Cyber Security Centre, which repeatedly found some crappy coding practices but no security backdoors; and has operated in Britain for years before the UK government was strong-armed by US politicos.

The Register contacted Huawei for its thoughts and will update when the company responds. ®

Similar topics

Broader topics

Other stories you might like

  • Prisons transcribe private phone calls with inmates using speech-to-text AI

    Plus: A drug designed by machine learning algorithms to treat liver disease reaches human clinical trials and more

    In brief Prisons around the US are installing AI speech-to-text models to automatically transcribe conversations with inmates during their phone calls.

    A series of contracts and emails from eight different states revealed how Verus, an AI application developed by LEO Technologies and based on a speech-to-text system offered by Amazon, was used to eavesdrop on prisoners’ phone calls.

    In a sales pitch, LEO’s CEO James Sexton told officials working for a jail in Cook County, Illinois, that one of its customers in Calhoun County, Alabama, uses the software to protect prisons from getting sued, according to an investigation by the Thomson Reuters Foundation.

    Continue reading
  • Battlefield 2042: Please don't be the death knell of the franchise, please don't be the death knell of the franchise

    Another terrible launch, but DICE is already working on improvements

    The RPG Greetings, traveller, and welcome back to The Register Plays Games, our monthly gaming column. Since the last edition on New World, we hit level cap and the "endgame". Around this time, item duping exploits became rife and every attempt Amazon Games made to fix it just broke something else. The post-level 60 "watermark" system for gear drops is also infuriating and tedious, but not something we were able to address in the column. So bear these things in mind if you were ever tempted. On that note, it's time to look at another newly released shit show – Battlefield 2042.

    I wanted to love Battlefield 2042, I really did. After the bum note of the first-person shooter (FPS) franchise's return to Second World War theatres with Battlefield V (2018), I stupidly assumed the next entry from EA-owned Swedish developer DICE would be a return to form. I was wrong.

    The multiplayer military FPS market is dominated by two forces: Activision's Call of Duty (COD) series and EA's Battlefield. Fans of each franchise are loyal to the point of zealotry with little crossover between player bases. Here's where I stand: COD jumped the shark with Modern Warfare 2 in 2009. It's flip-flopped from WW2 to present-day combat and back again, tried sci-fi, and even the Battle Royale trend with the free-to-play Call of Duty: Warzone (2020), which has been thoroughly ruined by hackers and developer inaction.

    Continue reading
  • American diplomats' iPhones reportedly compromised by NSO Group intrusion software

    Reuters claims nine State Department employees outside the US had their devices hacked

    The Apple iPhones of at least nine US State Department officials were compromised by an unidentified entity using NSO Group's Pegasus spyware, according to a report published Friday by Reuters.

    NSO Group in an email to The Register said it has blocked an unnamed customers' access to its system upon receiving an inquiry about the incident but has yet to confirm whether its software was involved.

    "Once the inquiry was received, and before any investigation under our compliance policy, we have decided to immediately terminate relevant customers’ access to the system, due to the severity of the allegations," an NSO spokesperson told The Register in an email. "To this point, we haven’t received any information nor the phone numbers, nor any indication that NSO’s tools were used in this case."

    Continue reading

Biting the hand that feeds IT © 1998–2021