CHINESE Cameras Infiltrate America’s Power Grid

Camera lens protruding through a colorful background

A chilling Department of Homeland Security bulletin reveals that approximately 12,000 Chinese-made surveillance cameras embedded in America’s critical infrastructure could be serving as backdoor access points for Beijing’s state-sponsored cyber operatives to spy on and potentially sabotage our nation’s most vital facilities.

Story Snapshot

  • DHS warns that 12,000 Chinese cameras in U.S. energy and chemical facilities pose espionage and sabotage risks
  • Camera installations surged 40% in critical infrastructure despite FCC import bans through “white labeling” loophole
  • Unencrypted devices communicate directly with Chinese manufacturer servers, providing potential access for Beijing
  • March 2024 incident caught cameras at U.S. oil and gas firm phoning home to China-linked servers

Chinese Cameras Infiltrate America’s Critical Infrastructure

The Department of Homeland Security issued an alarming bulletin warning that Chinese-manufactured internet-connected cameras have infiltrated hundreds of U.S. critical infrastructure sites across energy and chemical sectors. These vulnerable devices lack encryption and maintain constant communication channels with their Chinese manufacturers, creating a dangerous gateway for potential espionage or disruption operations. The bulletin, obtained by ABC News, highlights that these cameras could enable Chinese government actors to access sensitive systems, exfiltrate data, suppress safety alarms, or disable critical fail-safes. This represents exactly the type of foreign infiltration and national security threat that Americans have grown weary of under previous administrations’ lax oversight.

White Labeling Scheme Evades Federal Bans

Despite the Federal Communications Commission implementing import bans in 2022 against specific Chinese camera manufacturers like Hikvision and Dahua, the number of these devices in critical infrastructure actually grew by up to 40% between 2023 and 2024. Chinese manufacturers exploited a deceptive practice called “white labeling,” rebranding their products under different names to circumvent federal restrictions. This calculated evasion demonstrates the lengths to which Chinese companies will go to maintain their surveillance foothold in American facilities. DHS officials are now urging the development of detection tools to identify these white-labeled devices and strengthen enforcement of existing bans, though the damage from years of unchecked infiltration remains.

Pattern of Chinese Cyber Aggression Continues

Chinese state-sponsored actors have actively targeted these camera vulnerabilities since 2020, using them as initial access points to pivot deeper into critical infrastructure networks. The FBI documented this threat pattern in December 2023 with its Private Industry Notification about HiatusRAT malware, which has been targeting Chinese-made webcams and digital video recorders since July 2022. In March 2024, investigators discovered cameras at a U.S. oil and gas firm actively communicating with servers linked to the People’s Republic of China. This ongoing campaign fits within broader Chinese cyber operations, including the 2024 “Salt Typhoon” hacks that compromised major U.S. telecommunications providers like Verizon and AT&T, affecting over one million Americans.

Infrastructure Operators Left Vulnerable and Unaware

Hundreds of U.S. critical infrastructure entities unknowingly deployed these compromised cameras, drawn by lower costs without understanding the national security implications. These energy and chemical sector facilities now face difficult choices: absorb significant replacement costs or continue operating with potential Chinese surveillance inside their security systems. The situation reflects a broader erosion of trust in the Internet of Things supply chain, where cheap foreign technology comes with hidden costs to American security. DHS characterizes these cameras as “pivot points” that cyber actors can exploit to move laterally through networks, accessing industrial control systems and operational technology that keeps America’s lights on and industries running.

National Security Threat Demands Immediate Action

This infiltration represents another consequence of years of globalist policies that prioritized cheap foreign goods over American security and self-reliance. The persistence of these threats despite congressional actions dating back to 2017’s National Defense Authorization Act demonstrates how determined adversaries exploit regulatory gaps and bureaucratic delays. While some policy experts suggest technical mitigations like data blocking or software audits could address risks without complete bans, the fundamental problem remains: Chinese manufacturers with alleged ties to Beijing’s intelligence apparatus maintain direct access to systems monitoring America’s most sensitive facilities. Under the Trump administration, Americans can expect a more aggressive approach to identifying and removing these threats from our critical infrastructure.

Sources:

Internet-connected cameras made in China may be used to spy on US infrastructure: DHS

DHS warns Chinese-made internet cameras pose espionage threat to US critical infrastructure

Managing the Risks of China’s Access to US Data and Control of Software and Connected Technology

Bitsight Identifies Thousands of Compromised Security Cameras

China Penetrated US Telecom Providers to Snoop on Wiretapping Systems