Congress Bans Chinese Video Surveillance Equipment in Government Facilities

The bill banning U.S. government use of Dahua and Hikvision products has been passed by both chambers of Congress. The President Trump has voiced support of this bill and is expected to be signed into law.

In May, this ban was introduced as an amendment to the House version of the NDAA defense appropriations bill. However, at that time, the Senate did not include such a ban, raising hopes by Dahua and Hikvision that the ban would be removed in the reconciliation process. However, reconciliation included the ban and both the House and Senate easily passed the bill with the ban.

Security industry blogger, John Honovich and IPVM released the story on Aug. 2, and included parts of the reconciled bill, which cover some 1,360 pages of government regulation, including a ban of Hikvision and Dahua equipment, or any subsidiary or affiliate, for U.S. government use.

The relevant section is:

(B) For the purpose of public safety, security of government facilities, physical security surveillance of critical infrastructure, and other national security purposes, video surveillance and telecommunications equipment produced by Hytera Communications Corp., Hangzhou Hikvision Digital Technology Co., or Dahua Technology Co. (or any subsidiary or affiliate of such entities …).

Another possible, and critical expansion of the ban is a new clause calling out "critical infrastructure," and "national security purposes":

It is not clear if the bill bans use of their company equipment in those areas but, if so, it would significantly increase the impact as many non-governmental organizations could fall under those categories; such as utilities and financial institutions.

The bill says this "prohibition" will start one year after it is enacted, which would put that in H2 2019:

(C) Effective Dates – The prohibition under sub-section (a)(1) shall take effect one year after the date of the enactment of this Act, and the prohibitions under …

However, in practice, the ban is immediate given the elimination clause.

Compounding the problem for Dahua and Hikvision, the bill includes a directive to "phase-out" and "eliminate" the use of existing equipment.

(B) submits to the head of the executive agency, who shall not later than 30 days thereafter submit to the appropriate congressional committees, a full and complete laydown of the presences of covered telecommunications or video surveillance equipment or services in the entity’s supply chain and a phase-out plan to eliminate such covered telecommunications or video surveillance equipment or services from the entity’s systems.

Overall, Dahua and Hikvision equipment is a distinct minority of government video surveillance. There is; however, a non-trivial amount deployed that could be a boon for system integrators and rival video surveillance manufacturers.

About the Author

Ralph C. Jensen is the Publisher of Security Today magazine.

Featured

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

  • Cutting Retail Losses

    Retail is still a more complex and dynamic security vertical in modern society. Inherent challenges with in-store and distribution center operations are primarily due to constantly shifting consumer buying trends. Retailers must show daily flexibility to keep workers, meet sales goals and attract customers while maintaining safe and efficient operations. Retail is an intricate web of interconnected elements. Read Now

  • The Key to Wellbeing in the Office

    A few years ago, all we saw in the news was the ‘great resignation.’ Now we have another ‘great’ to deal with. According to CBRE, 2023 was the start of the ‘great return’ as office workers returned to their normal offices after working from home. The data shows that two-thirds of all U.S office buildings were more than 90% leased as of Q2 2023. Read Now

Featured Cybersecurity

Webinars

New Products

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file. 3

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3