Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Sectors

Sponsored Content

Why have the NDAA and FCC banned certain security cameras?

American flag
February 23, 2023

PelcoIn recent years, certain Chinese video surveillance and telecommunications equipment manufacturers have come under scrutiny because of the potential security risks they pose to U.S. security. These manufacturers include familiar industry names, and their subsidiaries and affiliates. The U.S. Government has taken actions restricting the purchase of this equipment by Federal agencies and grant recipients, as well as prohibiting the marketing and sale of these products to certain markets. These actions include section 889 of the National Defense Authorization Act (NDAA) and the Secure Equipment Act of 2021 (SEA), the requirements of which were recently implemented by the Federal Communications Commission (FCC). 


What are the NDAA and the SEA?

The NDAA is legislation that Congress passes annually to set out priorities for national defense policy and funding. Section 889 of the NDAA generally prohibits the use of federal funds (including grant funds) to buy certain telecommunications equipment or services from Huawei, ZTE, or Hytera Communications Corporation, or video surveillance equipment or services from Hytera Communications Corporation, Hangzhou Hikvision Digital Technology Company, or Dahua Technology Company (or any subsidiary or affiliate of such entities).

The SEA directed the FCC to adopt rules that clarify that it would no longer review or approve any application for equipment authorization for equipment that is on the FCC’s list of telecommunications and video surveillance equipment deemed a threat to national security. The FCC implemented this mandate by adopting rules that prohibit the marketing and sale of broadband capable telecommunications and video surveillance equipment manufactured by these companies and their affiliates and subsidiaries to certain markets, e.g., government facilities, critical infrastructure. These rules became effective on February 6th, 2023.


Why were these laws passed?

Both Section 889 and the SEA reflect growing concerns by the federal government about the security threat posed by equipment provided by certain Chinese manufacturers. As video cameras and telecommunications hardware have become increasingly smarter and better connected, related cybersecurity risks have grown in likelihood and threat level.

A camera or broadband-enabled radio might not seem like the most likely candidate for a cybersecurity breach. But networked devices or any devices in the Internet of Things (IoT) can be used as a “back door” by hackers to enter larger networks or obtain user data. These risks are heightened by the fact that Chinese manufacturers tend to make these devices available at low price points and most tend not to be as rigorously secured as laptops or servers.

What’s more, many newer models contain System on a Chip (SoC) technology. This gives a great deal of computing power to devices like cameras but also makes them a much more likely risk vector for hackers. 

These threats could be catastrophic for any business, but the stakes are even higher when these devices are used by the federal government or in the public safety environment. If devices were hacked, the possibility of eavesdropping on classified conversations, accessing confidential information, or disrupting essential services could have enormous repercussions, both nationally and globally. 

This legislation will push many security companies and service providers who work with the U.S. government to carry out thorough due diligence of all their equipment, services and relationships to ensure they are compliant. 


What do Section 889 and SEA mean for businesses?

Section 889 requires that security companies and service providers working with federal agencies or receiving federal grants carry out sufficient due diligence of their equipment, services and supply chain relationships to ensure they are compliant. The SEA and the FCC’s implementing rules have broader impacts. By restricting the marketing and sale of certain Chinese manufactured equipment to certain markets, security manufacturers using such equipment may find their products compromised or investments stranded. 

While it seems as though these rulings apply solely to physical security systems, these decisions will have further-reaching implications for any business with government contracts. Since government contracts are often large opportunities for many businesses, they cannot be too careful in their choice of security equipment or their security service provider.

If you are concerned your business will be affected by the NDAA or the SEA, the first, and most important step to take is to check who manufactures your equipment. If you outsource your physical security to a third party, ask them about the steps they are taking to ensure compliance. Finally, research NDAA-compliant manufacturers and products — such as those produced by Pelco — for a viable and secure alternative. 

KEYWORDS: government regulations law

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing