Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementPhysicalTechnologies & SolutionsSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingPhysical SecurityVideo Surveillance

Understanding and complying with the NDAA’s Section 889

By John Bartolac
camera-freepik1170x658v67.jpg
February 22, 2022

On August 13, 2018, the John S. McCain National Defense Authorization Act (NDAA) for Fiscal Year 2019 was signed into law. Broadly speaking, the NDAA is an annual bill that specifies the budget and expenditures for the Department of Defense and tends to pass without garnering much public attention. However, this particular version contained an interesting wrinkle: Section 889 of the 2019 NDAA prohibited federal agencies, their contractors, and grant or loan recipients from procuring or using “telecommunications and video surveillance services or equipment” from several specific Chinese companies.


Section 889 came as a surprise to many — especially those in the security industry. The companies named in Section 889 were Huawei Technologies Company, ZTE Corporation, Hytera Communications Corporation, Hangzhou Hikvision Digital Technology Company, and Dahua Technology Company and their subsidiaries and affiliates, all of which have significant partnerships and relationships in the U.S. The companies also have close ties to the Chinese government. Accordingly, U.S. federal agencies have found that these companies and their affiliates are beholden to, and therefore subject to exploitation, influence, and control by, the Chinese government, making those relationships extremely risky. The sudden need to divest from these companies has posed an interesting challenge for American organizations. Remaining compliant with the NDAA is essential for any enterprise planning to do business with the U.S. government, and failure to do so can have serious consequences.

 

Understanding the NDAA

It goes without saying that the U.S. and China are rivals on the global stage, but there has always been significant trade between the two countries. Why, then, does Section 889 impose such harsh sanctions against specific Chinese companies? It is worth noting that the measure does not forbid American companies from doing business with the Chinese companies named in Section 889. It simply states that any American telecom or security company that does choose to continue doing business with those companies will no longer be able to do business with the U.S. government. Of course, given how lucrative government contracts tend to be, few companies will want to risk their business relationships with the U.S. government and its grant recipients — meaning that Section 889 has effectively drawn a line in the sand.


Those are the broad strokes, but it’s worth breaking down Section 889 in more specific terms. Telecom and security companies that wish to work with the U.S. government are not only prohibited from working with the companies named in Section 889, they’re also not permitted to use any components manufactured by those companies, nor can they partner with contractors or vendors that use those components. This means that any company that wants to receive a grant or a loan from the government must be similarly insulated from those Chinese companies. Finally, any organization that serves as a vendor, supplier, integrator, or other partner to the government and knowingly uses telecommunications or video surveillance components from any of the companies named in Section 889 will be banned from working with the government in the future.

 

What Are the Risks?

Why target these companies specifically? Companies like Huawei and Hikvision produce — among other things — computer chips and video surveillance products. Huawei is particularly noteworthy in this area, as the company is also one of the largest global manufacturers of 5G equipment — including HiSilicon chips, or “system on chip” (SOC). Because Huawei is one of just two companies involved in the development of 5G infrastructure, it has played an essential role in the global 5G rollout, which means that Huawei products are present in a wide range of devices. This poses several issues from a national security standpoint.


The first issue is that there are known backdoors in many of the products produced by Huawei and other Chinese companies, which could allow cybercriminals or other abusers of access devices and, by extension, any network they are connected to. The idea of the Chinese government having the ability to use a backdoor to access any device connected to a physical network is obviously not appealing to American agencies. Recent incidents have also highlighted the danger of compromised surveillance tools. Network cameras are used to increase security, but if an attacker can access the network through a backdoor, they might be able to listen in on classified conversations, track high values assets or even take the entire network down. Federal agencies like the Department of Defense, the CIA, and others have cameras placed throughout their facilities, and China is hardly the only state actor that would love the opportunity to gain access to those cameras. For the U.S. government, these are major, top-level concerns.


There is also the fact that the U.S. government wants to head off a potential danger at the pass. The world is more connected than ever, and — for better or worse — there are U.S. industries that have become heavily reliant on Chinese technology. The government would like to prevent the telecommunications and video surveillance industries from becoming similarly dependent, particularly when that dependence comes with such serious security concerns. Refusing to do business with companies that put themselves — and the public — at risk by using potentially compromised vendors is viewed as an effective way for the government to mitigate the potential danger.

 

Why Section 889 Is So Broad

Way back in 2013, a major retailer suffered a high-profile cyberattack that resulted in a large amount of customer data and financial information being stolen. Attacks like this are not uncommon today, but what made this incident particularly noteworthy was how the attackers got into the system. Instead of targeting the company’s network directly, they broke in via the HVAC system. This wasn’t the first time a company was compromised via a third party, but it did serve as a wake-up call for many organizations who may not have realized that a poorly secured vendor can put their own networks at risk as well.


This helps to illustrate why Section 889 paints with such a broad brush. A narrow scope wouldn’t do much good — after all, what’s the point of banning Huawei chips in government phones or laptops when the very same chip might wind up in a 5G tower outside the Pentagon? Why ban chips in surveillance cameras when a backdoor in the Video Management System (VMS) could leave them just as vulnerable? Some industries affected by Section 889 are surprising — such as the retail industry. Many retailers use Hikvision cameras to secure their physical locations, but if they want to work with — or receive funding from — the U.S. government, they need to make a change. With suspect components present in such a wide range of industries, a blanket approach was necessary. Any components from those Chinese companies under suspicion are banned, and any organizations known to do business with them are also banned.

 

The Challenges of NDAA Compliance

While it is easy to understand why the government wanted to keep Section 889 broad, it makes it more difficult for manufacturers, resellers, integrators, and other government vendors to understand how best to maintain compliance with the new regulations. Of course, the core of the legislation is to simply not buy devices manufactured by the listed Chinese companies or their subsidiaries and affiliates. But it isn’t as easy as that. Companies like Huawei manufacture laptop computers and smartphones, but they also manufacture individual components that might be used in any number of non-Huawei devices. By the letter of Section 889, using a device with a chip made by any of the named companies would result in serious penalties.


This isn’t just a theoretical issue. In the runup to the NDAA’s passing, the government discovered that technology from the listed Chinese companies was present in a wide range of sensitive locations, including military bases, government buildings, embassies, and more. While those locations did not use devices sold by the companies in question, looking under the hood of certain cameras or sensors revealed components manufactured by them. In fact, something as easy as checking the MAC address of a piece of equipment would reveal that the device itself came from China, regardless of the brand label. This is to say that it isn’t always easy to tell whether a device is compliant with Section 889 at a glance — it can take some forensics. It might be a hassle, but it’s necessary. The government does not want to be put in a compromising position by a vendor that failed to conduct proper due diligence.

 

Taking Steps toward Compliance

There isn’t a one-size-fits-all approach to NDAA compliance. A wide range of companies, advisory bodies and educational resources have published NDAA compliance guides, many of which can provide helpful insights into the new requirements and how to adhere to them. Others can help users identify the equipment they have installed and whether it is potentially in violation of Section 889. But ultimately, network security professionals will need to take a deep dive into the equipment used by the respective organizations. It’s impossible to overstate the scale of the problem: any component in any telecommunications of video surveillance equipment that comes from one of the restricted companies can result in a permanent ban from doing business with the government. With that in mind, organizations should be as thorough as possible when it comes to vetting the equipment they use.


Businesses can start by making a list of the hardware and software they use for telecommunications and security purposes. Any device that comes from one of the companies named in Section 889 should be immediately tagged and marked for replacement. Further, it is strongly recommended that they contact everyone relevant in the solution supply chain, including manufacturers, integrators, and anyone else who has the knowledge needed to confirm that no components in the remaining devices were manufactured by the banned companies. Some organizations may even want to disassemble the devices themselves, run manual MAC address checks, or conduct other hands-on forensics. Those with the know-how to do so should do everything possible to ensure that their equipment adheres to the NDAA restrictions.

Of course, confirming that equipment in use is compliant with Section 889 is only half the battle. The provision has been part of the NDAA since 2019, which means most organizations should have already taken steps to ensure that they are in compliance. But it is also important for businesses to ensure that any new equipment they purchase does not contain components from any of the banned companies. Most manufacturers and integrators should be well acquainted with NDAA guidelines by now, which should make it relatively easy to determine whether devices are compliant. Still, due diligence is important. When the cost of failure is being blacklisted by the government, it is impossible to be too thorough.

 

Choose Your Partners Carefully 

The NDAA’s sweeping ban on components from specific Chinese companies has changed the face of the telecommunications and video surveillance markets. And the NDAA is no longer alone in its targeting of these companies: the FCC recently declined to authorize Hikvision and Dahua products for import, effectively preventing them from being sold in the United States. Organizations looking to purchase communications and security equipment now need to be much more mindful of where they come from, or they risk potentially locking themselves out of lucrative government opportunities.


Careful vetting of vendors is more important than ever, and businesses should ensure that they are working with integrators and manufacturers capable of demonstrating strict adherence to NDAA regulations. The security concerns associated with the five Chinese companies listed in the legislation are real, and the NDAA and FCC measures underscore the fact that the government takes them very seriously. Today’s businesses must do the same.

KEYWORDS: Chinese Security computer chip enterprise security national security surveillance video surveillance

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

John bartolac axis communications

John Bartolac is Senior Manager of Industry Segments Development at Axis Communications.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Leadership and Management
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • internet of things

    California’s 'Other' Game-Changer: Complying with the New IoT Cybersecurity Law

    See More
  • Complying with California's Workplace Violence Prevention in Healthcare Rule

    Complying with California's Workplace Violence Prevention in Healthcare Rule

    See More
  • 5 mins with Soby

    5 minutes with Brian Soby - Understanding Software as a Service (SaaS)

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!