Feeds

Blunkett to press for cyberwar probe of BT's Chinese kit

Kill button fear

Maximizing your infrastructure through virtualization

Exclusive David Blunkett is to press national security officials to impose a programme of ongoing testing on equipment BT bought from Huawei, the networking manufacturer with allegedly close links to the Chinese military.

The former Home Secretary plans to raise concerns at meetings "in the next two weeks" that the equipment could be remotely controlled or sabotaged in a future cyber attack, crippling critical UK communications.

He argued that though there might be little perceived threat at present, BT had "bought equipment from companies that may have an interest somewhere down the track". Although he didn't name BT during his speech at the Infosec conference in London this morning, he exclusively confirmed the reference in conversation with The Register afterwards.

Huawei is a major supplier to the 21CN national network backbone upgrade, which is scheduled for completion in 2013.

Blunkett argued today that cyber security must be improved ahead of the 2012 Olympics.

"You would have spot checks and auditing," he said, when asked directly about BT's Huawei deal. "I think it's something our big companies need to recognise."

BT declined to comment on Blunkett's call.

During his speech, Blunkett also criticised "colleagues" who had taken a role in approving such sensitive deals and then taken jobs with "communications" companies. The comment was an apparent oblique reference to Patricia Hewitt, who is now a non-executive director of BT and was in charge of the Department of Trade and Industry when it waved through Huawei's involvement in 21CN in 2005.

When asked about the reference, a smiling Blunkett described it as "very oblique".

Blunkett's plan to press for "proper monitoring and review procedures" to scrutinise the Huawei equipment follows soon after reports that the chairman of the Joint Intelligence Committee raised fears over potential hidden vulnerabilities at a Cabinet meeting in January. Alex Allen reportedly said intelligence chiefs believe measures taken by BT to secure 21CN "are not effective against deliberate attack by China".

Huawei denies ties to the Chinese military, although its chief executive is a former People's Liberation Army (PLA) telecoms research chief. Last year it was top of a Pentagon list of Chinese technology firms with close links to the PLA.

The phone was not being answered at Huawei UK prior to publication.

Last week the Cabinet Office told The Register it believed the UK was "well ahead of the game" in preparing for a cyber attack, compared to other EU member states. ®

Top three mobile application threats

More from The Register

next story
Arrr: Freetard-bothering Digital Economy Act tied up, thrown in the hold
Ministry of Fun confirms: Yes, we're busy doing nothing
Help yourself to anyone's photos FOR FREE, suggests UK.gov
Copyright law reforms will keep m'learned friends busy
Apple smacked with privacy sueball over Location Services
Class action launched on behalf of 100 million iPhone owners
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
ONE EMAIL costs mining company $300 MEEELION
Environmental activist walks free after hoax sent share price over a cliff
UK government officially adopts Open Document Format
Microsoft insurgency fails, earns snarky remark from UK digital services head
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.