The Indian government is not imposing an outright legislative "ban" on all Chinese-made cameras, but it has enacted mandatory cybersecurity certification rules that effectively bar Chinese-origin internet-connected CCTV (Closed-Circuit Television) and video surveillance systems (including major brands like Hikvision, Dahua, and TP-Link, as well as any products using Chinese chipsets) from sale in India starting April 1, 2026.
By Diablo Tech Blog | March 30 2026
This stems from rules introduced by the Ministry of Electronics and Information Technology (MeitY) in March–April 2024, with a two-year transition period. In practice, the government has refused certification for these products on national security grounds, shutting them out of the market (both government procurement and private sales).
Official Policy Framework
The policy rests on three interconnected MeitY actions, forwarded by the Ministry of Home Affairs (MHA) to all central and state government agencies in an Office Memorandum dated April 30, 2024:
- Public Procurement (Preference to Make in India) Order amendment (Gazette notification, March 6, 2024): Gives preference to domestically manufactured CCTV/Video Surveillance Systems (VSS), with rising local content requirements (25% in 2024–25, scaling to 45%+ later). Critical: Compliance with "Essential Requirements (ERs)" for security, tested by STQC (Standardisation Testing and Quality Certification) labs.
- Amendment to Electronics and Information Technology Goods (Requirement of Compulsory Registration) Order, 2021 (April 9, 2024): Adds CCTV cameras (analog/IP/speed domes) and DVR/NVRs to compulsory registration. All internet-connected models (made or imported after April 9, 2024, with full enforcement from April 1, 2026) must pass STQC security testing and registration before sale.
- MeitY Advisory on "Threat of Information Leakage through CCTV/VSS/DVR/NVR" (March 11, 2024): Issued to all ministries/departments, highlighting risks and mandating guidelines. It explicitly lists vulnerabilities such as exposed network services, device communication protocols, physical access to debugging interfaces (UART, JTAG, SWD), memory/firmware extraction, insecure firmware updates, and lack of data storage/encryption.
Key testing requirements (Essential Requirements for Security of CCTV) include:
- Hardware: Disable/protect debugging interfaces; use secure elements/TPM/TEE for keys; tamper resistance/detection; secure boot with signature validation; cryptographically secure random number generators.
- Software/Firmware: Memory protection (ASLR, DEP); TLS encryption for data-in-transit with certificate validation and resistance to MITM attacks; signed/anti-rollback firmware updates; no banned functions or unvetted third-party components; secure code review.
- Other: Mutual authentication; encrypted channels; trusted supply chain (including country-of-origin disclosure for critical components like System-on-Chip/SoC); malware detection; penetration testing at STQC labs.
Manufacturers must declare component origins, submit devices for lab testing (in OEM presence where required), and meet BIS standards. As of early 2026, only ~507 models (mostly non-Chinese) have been certified; Chinese products and Chinese-chipset devices are explicitly not approved.
These rules apply market-wide (not just government use), though government procurement was the initial focus.
Core Reasons: National Security and Espionage Risks
The primary driver is cybersecurity and counter-espionage, not trade protection (though it has that effect). Official documents frame CCTV systems as posing risks of data breaches, privacy violations, hacking, and unauthorized remote access—especially for devices in sensitive locations (government offices, defense sites, critical infrastructure, public spaces).
Specific concerns:
- Backdoors and remote control: Internet-connected IP cameras can be exploited via exposed ports, weak encryption, or firmware flaws to allow spying, data exfiltration, or hijacking. Former Indian cybersecurity chief Gulshan Rai noted: "There's always an espionage risk. Anyone can operate and control internet-connected CCTV cameras sitting in an adverse location."
- Data leakage to foreign servers: In 2021, the government admitted ~1 million Chinese-made cameras were installed in government institutions, with vulnerabilities allowing video/data to be sent abroad.
- Supply chain and foreign laws: Chinese firms (Hikvision, Dahua, etc.) are subject to China's National Intelligence Law (2017), which requires organizations to "support, assist, and cooperate with" state intelligence work. This raises fears of embedded hardware/software trojans. Similar concerns led to bans/restrictions in the US (NDAA), UK, Australia, etc.
- Real-world precedents: Advisory cites "various incidents... due to security flaws in the surveillance cameras." Broader context includes post-2020 India-China border clashes (Galwan), leading to bans on 200+ Chinese apps and restrictions on Chinese telecom gear (Huawei/ZTE).
The government views Chinese supply chains as untrusted for "trusted location" criteria (full visibility into manufacturing to rule out backdoors). Even non-Chinese assembly with Chinese SoCs is rejected.
Secondary Factors: Economic Self-Reliance (Atmanirbhar Bharat)
- Boost domestic industry: Pre-rules, Chinese brands held ~1/3 of India's ~$3.5 billion surveillance market (cheap, dominant in low-end). Indian players (CP Plus, now 45–50% share; others like Qubo, Prama) have surged to >80% by switching to Taiwanese/US chipsets and localizing firmware. Hikvision/Dahua's India business has shrunk dramatically (Dahua down ~80%).
- Local content mandates in Public Procurement Order encourage manufacturing in India, reducing import dependence.
- Higher costs but strategic gains: Bill-of-materials up 15–20% due to non-Chinese components, but prices stable in lower segments; mid/high-end rose. Unstructured/gray-market traders exited.
This fits India's broader "de-risking" from China in critical tech while promoting self-reliance.
Chinese Perspective and Criticisms
Chinese officials and experts (e.g., via Global Times) call it "discriminatory," "politically motivated," and lacking "substantive evidence"—a disguised trade barrier harming consumers and fair competition. They argue it ignores that many "Chinese" products now use global supply chains.
Industry insiders note testing opacity and no public proof of specific exploits in India, plus potential project delays.
Analysis and Broader Implications
This is a precautionary, risk-based de-risking policy rooted in genuine geopolitical and technical threats, consistent with global allies' actions and India's post-2020 China policy. It prioritizes sovereignty over cheap imports, addressing a real vulnerability (mass deployment of potentially compromiseable surveillance in sensitive areas).
Strengths:
- Reduces espionage vectors in a high-stakes domain.
- Accelerates trusted domestic ecosystem.
- Aligns with global standards (e.g., secure-by-design IoT principles).
Trade-offs:
- Short-term market disruption and cost increases.
- Potential quality/innovation gaps if domestic players lag.
- Strains smaller integrators (though major Indian brands adapted).
Not about all "Chinese-made cameras": Focus is internet-connected surveillance/IP CCTV (not, e.g., simple USB webcams or non-networked analog). Analog cameras (less vulnerable) face lighter impact.
Outlook: Expect continued enforcement, with possible extensions for legacy stock. This reinforces India's "trusted source" approach for critical infrastructure. Domestic brands benefit most; global non-Chinese players (Bosch, Honeywell) hold premium segments.
In summary, the move is driven by documented cybersecurity/espionage risks from Chinese supply chains and laws, executed via technical certification to protect national security while advancing self-reliance. It reflects heightened India-China tensions since 2020 and a strategic pivot away from dependency in surveillance tech.
Comments
Post a Comment