Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Sectors

Sponsored Content

Why have the NDAA and FCC banned certain security cameras?

American flag
February 23, 2023

PelcoIn recent years, certain Chinese video surveillance and telecommunications equipment manufacturers have come under scrutiny because of the potential security risks they pose to U.S. security. These manufacturers include familiar industry names, and their subsidiaries and affiliates. The U.S. Government has taken actions restricting the purchase of this equipment by Federal agencies and grant recipients, as well as prohibiting the marketing and sale of these products to certain markets. These actions include section 889 of the National Defense Authorization Act (NDAA) and the Secure Equipment Act of 2021 (SEA), the requirements of which were recently implemented by the Federal Communications Commission (FCC). 


What are the NDAA and the SEA?

The NDAA is legislation that Congress passes annually to set out priorities for national defense policy and funding. Section 889 of the NDAA generally prohibits the use of federal funds (including grant funds) to buy certain telecommunications equipment or services from Huawei, ZTE, or Hytera Communications Corporation, or video surveillance equipment or services from Hytera Communications Corporation, Hangzhou Hikvision Digital Technology Company, or Dahua Technology Company (or any subsidiary or affiliate of such entities).

The SEA directed the FCC to adopt rules that clarify that it would no longer review or approve any application for equipment authorization for equipment that is on the FCC’s list of telecommunications and video surveillance equipment deemed a threat to national security. The FCC implemented this mandate by adopting rules that prohibit the marketing and sale of broadband capable telecommunications and video surveillance equipment manufactured by these companies and their affiliates and subsidiaries to certain markets, e.g., government facilities, critical infrastructure. These rules became effective on February 6th, 2023.


Why were these laws passed?

Both Section 889 and the SEA reflect growing concerns by the federal government about the security threat posed by equipment provided by certain Chinese manufacturers. As video cameras and telecommunications hardware have become increasingly smarter and better connected, related cybersecurity risks have grown in likelihood and threat level.

A camera or broadband-enabled radio might not seem like the most likely candidate for a cybersecurity breach. But networked devices or any devices in the Internet of Things (IoT) can be used as a “back door” by hackers to enter larger networks or obtain user data. These risks are heightened by the fact that Chinese manufacturers tend to make these devices available at low price points and most tend not to be as rigorously secured as laptops or servers.

What’s more, many newer models contain System on a Chip (SoC) technology. This gives a great deal of computing power to devices like cameras but also makes them a much more likely risk vector for hackers. 

These threats could be catastrophic for any business, but the stakes are even higher when these devices are used by the federal government or in the public safety environment. If devices were hacked, the possibility of eavesdropping on classified conversations, accessing confidential information, or disrupting essential services could have enormous repercussions, both nationally and globally. 

This legislation will push many security companies and service providers who work with the U.S. government to carry out thorough due diligence of all their equipment, services and relationships to ensure they are compliant. 


What do Section 889 and SEA mean for businesses?

Section 889 requires that security companies and service providers working with federal agencies or receiving federal grants carry out sufficient due diligence of their equipment, services and supply chain relationships to ensure they are compliant. The SEA and the FCC’s implementing rules have broader impacts. By restricting the marketing and sale of certain Chinese manufactured equipment to certain markets, security manufacturers using such equipment may find their products compromised or investments stranded. 

While it seems as though these rulings apply solely to physical security systems, these decisions will have further-reaching implications for any business with government contracts. Since government contracts are often large opportunities for many businesses, they cannot be too careful in their choice of security equipment or their security service provider.

If you are concerned your business will be affected by the NDAA or the SEA, the first, and most important step to take is to check who manufactures your equipment. If you outsource your physical security to a third party, ask them about the steps they are taking to ensure compliance. Finally, research NDAA-compliant manufacturers and products — such as those produced by Pelco — for a viable and secure alternative. 

KEYWORDS: government regulations law

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing