Identify any devices on your networks included in The Secure Equipment Act of 2021

November 22,2021 in  Featured, How Tos
by Jonah Thompson

The US Senate has recently unanimously passed The Secure Equipment Act of 2021 (s.1790). Here’s how you can easily identify devices on the networks you manage that are included in this act.

The Secure Equipment Act of 2021

The US Senate has recently unanimously passed The Secure Equipment Act of 2021 (s.1790). Here’s how you can easily identify devices on the networks you manage that are included in this act. 

The Secure Equipment Act of 2021, was passed on October 28th 2021. 

This new act was passed unanimously in congress and it aims to restrict deployment of telecommunications and video surveillance systems produced by Chinese companies which may be considered a risk to National Security. 

So far, as of March 12th 2021, the devices and companies that have been added to the list are as follows:

  • Huawei Technologies Company: Telecommunications equipment produced by Huawei Technologies Company, including telecommunications or video surveillance services provided by such entities or using such equipment. 
  • ZTE Corporation: Telecommunications equipment produced by ZTE Corporation, including telecommunications or video surveillance services provided by such entity or using such equipment.
  • Hytera Communications Corporation: Video surveillance and telecommunications equipment produced by Hytera Communications Corporation, to the extent it is used for the purpose of public safety, security of government facilities, physical security surveillance of critical infrastructure, and other national security purposes, including telecommunications or video surveillance services provided by such entity or using such equipment.
  • Hangzhou Hikvision Digital Technology Company: Video surveillance and telecommunications equipment produced by Hangzhou Hikvision Digital Technology Company, to the extent it is used for the purpose of public safety, security of government facilities, physical security surveillance of critical infrastructure, and other national security purposes, including telecommunications or video surveillance services provided by such entity or using such equipment.
  • Dahua Technology Company: Video surveillance and telecommunications equipment produced by Dahua Technology Company, to the extent it is used for the purpose of public safety, security of government facilities, physical security surveillance of critical infrastructure, and other national security purposes, including telecommunications or video surveillance services provided by such entity or using such equipment.

Learn more about the companies and devices being restricted in The Secure Equipment Act of 2021 on the FCC website.

What does The Secure Equipment Act of 2021 mean for your IT business?

Although it isn’t currently clear what will happen if these devices or services are found in an environment, it is important that MSPs and service providers take proactive action. Service providers should ensure they are fully aware when devices included in The Secure Equipment Act of 2021 are on a customer network. 

To assist with this, we’ve worked on a script to detect if any of these devices are present on a network. 

Find out if devices included in The Secure Equipment Act of 2021 are on a network you manage

We’ve developed a simple python script using the Domotz APIs, which can identify if any devices listed on The Secure Equipment Act of 2021 are on a network you are managing. 

Use our script to see if devices included in The Secure Equipment Act of 2021 are on a network you manage

The script below is in Python. The instructions should make it easy for those that are not developers to use the script anyways. If you need help email us on support@domotz.com

  1. Install Python (Python 3.8.5 or subsequent versions required). You can download it from https://www.python.org/downloads/ 
  2. Download the Domotz script from github https://github.com/domotz/FCCReport/archive/refs/tags/v1.0.0.zip and copy the content in your preferred folder. For instance C:\Users\myself\downloads\FCC_Report
  3. Get your API Key and API endpoint from the Domotz portal and take note of them.  You can learn how to get your API Key and API endpoint information here: https://help.domotz.com/user-guide/domotz-api/
  4. Open cmd.exe or PowerShell (Terminal on MacOS) and go to the folder above; e.g cd C:\Users\myself\downloads\FCC_Report    
  5. Run the command python -m fcc_covered_list_discovery main_report –endpoint=[Endpoint]  –api_key=[Your API-key]

The script will produce an Excel file containing details about the devices belonging to the restricted list of vendors.

You can also customise the list of vendors to be searched by editing the file banned_vendors.txt

Learn more about The Secure Equipment Act of 2021