
FCC Moves to Expand Ban on Chinese Telecom and Surveillance Gear, Underscoring Broader Risks to U.S. Communications Security
The Federal Communications Commission is moving toward a broader crackdown on Chinese telecommunications and surveillance equipment, reopening a national debate over how deeply Chinese technology has penetrated American communications infrastructure and how vulnerable that infrastructure remains. According to Reuters and FCC materials, the agency is now seeking public comment on whether to block imports not only of newly approved devices from certain Chinese firms, but also of previously authorized equipment that could still enter the U.S. market under existing rules. The companies at issue include Huawei, ZTE, Hytera, Hikvision, and Dahua, all of which the FCC has already identified as posing unacceptable national security risks under its “Covered List” framework.
This matters because the current proposal is not merely a technical update to an old rule. It reflects a growing U.S. concern that earlier restrictions may not have gone far enough. In 2022, the FCC barred authorization of new models of communications and video surveillance equipment from these firms under the Secure Equipment Act. But that left open the possibility that equipment previously approved, or modified through later channels, could still find its way into the country. The new initiative is designed to close those remaining gaps and prevent stockpiling or continued importation of technology already associated with national security concerns.
For American readers, the core issue is straightforward: modern telecom and surveillance equipment is not just hardware. It is infrastructure. Cameras, routers, radio modules, and network equipment are embedded in schools, homes, offices, transportation systems, government buildings, and critical infrastructure. If the United States concludes that certain manufacturers pose unacceptable risks, then allowing their devices to continue entering the market creates an obvious contradiction. A security threat does not become harmless simply because it arrived under an earlier approval number. That is why the FCC’s proposal deserves to be viewed not as bureaucratic overreach, but as part of a delayed effort to align policy with reality.
The history behind this is important. The FCC first published its Covered List in 2021 under the Secure and Trusted Communications Networks Act, identifying communications equipment and services deemed to pose an unacceptable risk to U.S. national security. The initial list included Huawei, ZTE, Hytera, Hikvision, and Dahua. In November 2022, the commission took the next major step by banning equipment authorizations for new products from those companies. What the current move suggests is that Washington now believes the original perimeter of those controls still left too much room for circumvention.
That concern is not theoretical. Reuters reported that the FCC has, over the past year, widened its scrutiny of Chinese technology in other areas as well, including Chinese-linked electronics sold online, Chinese-made drones, and test laboratories with ties to entities already deemed security risks. In a separate 2025 action, the commission moved to block certain Chinese labs from testing devices for U.S. authorization, recognizing that security vulnerabilities can be introduced not only through finished products but through the certification pipeline itself. When regulators start worrying not just about the product, but about the labs, the modules, the affiliates, and the import channels, it is a sign that the problem has evolved beyond isolated company names into a broader supply-chain challenge.
Americans should understand what makes firms like Huawei, ZTE, Hikvision, Dahua, and Hytera uniquely controversial in the U.S. policy environment. The concern is not only that they are Chinese companies. It is that they have been repeatedly linked, in U.S. regulatory and legislative findings, to risks involving surveillance, critical communications infrastructure, public safety systems, and the possibility of undue influence from the Chinese state. Whether through direct ownership structures, national intelligence laws in China, or the strategic nature of the sectors they operate in, these firms have come to be treated by U.S. authorities as potential instruments of foreign leverage rather than ordinary market actors.
The Chinese government and the companies involved have consistently denied that their products pose espionage or security threats, and that point should be acknowledged. But the question for the United States is not whether Beijing admits a risk exists. The question is whether American institutions should accept the possibility that communications and surveillance infrastructure could be dependent on equipment made by firms that U.S. agencies have repeatedly identified as unsafe. In national security policy, waiting for absolute proof of catastrophic misuse is a poor standard when the underlying systems are already deeply embedded in daily life. The more essential the system, the lower the tolerance for unresolved strategic risk should be.
This is especially true in the case of video surveillance equipment. Devices from Hikvision and Dahua are not abstract pieces of telecom architecture. They are cameras and monitoring systems, often deployed in schools, apartment complexes, retail environments, government facilities, transit nodes, and industrial sites. These are places where Americans assume their security systems are there to protect them, not to create hidden vulnerability. If regulators believe that such systems could be exploited, misdirected, or expose sensitive data flows, then the threat is not limited to federal installations. It extends to ordinary neighborhoods and businesses.
There is also an economic dimension that should not be ignored. Chinese telecom and surveillance gear has often competed aggressively on price, which is one reason it spread so widely before policymakers began to react. Low-cost technology is appealing to local governments, schools, small businesses, and private consumers operating under budget pressure. But when a low upfront cost masks a strategic vulnerability, the bargain becomes far less attractive. The United States has already learned in other sectors that dependencies built for efficiency can later prove costly when geopolitical tensions rise. Communications infrastructure is one of the last places where Americans can afford to discover that lesson too late.
What makes the FCC proposal important is that it acknowledges the difference between controlling new approvals and actually securing the market. A ban that only stops future model authorizations can be undermined if previously approved units continue to flow in, if affiliates continue to sell under different names, or if components from covered firms are embedded in broader assemblies. The commission has clearly been thinking along those lines. Its 2025 fact sheet sought comment on whether modules and components from listed entities could create the same national security threats as finished branded products. That is a crucial shift. It recognizes that modern hardware ecosystems are modular, and that risk can hide inside the supply chain rather than on the label.
From a national resilience perspective, this is the right direction. The United States cannot protect its communications system by pretending that threat actors will only use the most obvious channels. If one route closes, they will look for another through affiliates, older approvals, third-party sellers, permissive changes, or testing loopholes. That is not paranoia. It is how incentives work in a contested global technology market. A company facing regulatory exclusion will naturally look for edge cases and gray zones. A foreign state seeking strategic access will have every reason to encourage that process. A serious security framework must be designed with that in mind.
None of this means every device already in American homes or businesses must be treated as an immediate emergency. Reuters reported that the current proposal would not directly affect products already in use by consumers. But that should not become an excuse for passivity. Existing exposure remains a separate policy question, especially in public safety settings, government facilities, and critical infrastructure. The first task is to stop the hole from widening. The second is to understand where vulnerable equipment is already installed and whether those placements create risks that require targeted replacement over time.
For the broader public, the lesson is larger than one FCC proposal. Chinese technology risk is not just about TikTok, consumer apps, or headlines about espionage. It is about the quiet hardware layer beneath everyday life: the routers that move data, the cameras that watch entrances, the radio gear that supports communications, and the certification systems that decide what enters the country in the first place. These systems are easy to ignore precisely because they are supposed to be invisible. But invisibility is what makes them valuable both to ordinary users and to hostile actors seeking leverage.
The FCC’s proposed expansion of the ban is therefore best understood as a warning as much as a rulemaking. It warns that earlier safeguards were not enough, that the U.S. market still contains pathways for suspect equipment to enter, and that the government no longer views these devices as isolated procurement problems. They are now part of a broader strategic contest over who builds, tests, supplies, and ultimately controls the infrastructure Americans depend on every day. In that contest, caution is not overreaction. It is basic prudence.