25.5 C
Houston
Friday, September 18, 2020

The nefarious nature of Chinese drones

Chinese access to research, data streams and information collected within the United States is under increasing scrutiny. While the threat to your personal data or our nation’s critical security information comes from many directions, the biggest wolves in sheep’s clothing are Chinese-based corporations.

This isn’t just happenstance. Chinese corporations are legally obligated to serve the purposes of the Chinese Communist Party (CCP), which has used every collection method and form of technology at its disposal to collect or even steal government, corporate, and private data.

The latest technological opportunity is small drones.

Chinese counterespionage and national-intelligence laws make sharing of data collected by Chinese-based corporations mandatory, which means there is no boundary or separation between those corporations and the CCP. Whether using stealthy mechanisms or brute force, the methods and depth that brutal government is willing to go to pilfer that data is hard to fathom fully.

A 2014 Congressional report found that Chinese cyber attacks resulted in the theft of detailed specifications on weapons systems like the F-35 stealth fighter. Not surprisingly, China’s new J-31 is that plane’s spitting image.

China also has gained access to key personnel and research across the U.S. science and technology sector. Last year, federal agents arrested more than a dozen professors and researchers at U.S. universities, on charges of stealing for the Chinese government everything from trade secrets, to machine-learning algorithms and vials of biological research.

As for personal data, consider TikTok, a wildly popular application that lets users create short videos to share with the world. TikTok is owned by ByteDance, a Beijing-based company now being sued for harvesting personal user data and sending it to China without the consent or even knowledge of those users. But TikTok’s collection capability pales in comparison to that of drones.

Nearly eight out of every 10 drones sold in the United States are made by the Chinese-based company DJI. The firm’s drone video cameras offer a total magnification of 180x and capture vivid images with 1080-pixel definition. Even when images of buildings and critical infrastructure are captured inadvertently, the system marks their precise location and can transmit real-time video feeds directly to the internet. From that point, the road to China is a short one.

Earlier this summer, a security firm called Synacktiv reverse-engineered a DJI app used to control drones and found it was collecting data that allows DJI to readily identify people of interest, access their contacts and networks, and ultimately compromise the user’s phone. The embedded coding enabled the app to download and execute code whenever it chose and, once exploited, DJI could use the compromised phone to attack other users through WiFi networks.

A separate cybersecurity firm, River Loop Security, recently analyzed DJI Mimo, an app used to edit videos and photographs taken by DJI drones. River Loop observed the network traffic between the internet and mobile devices through the app. They found similar security issues to those of the DJI controller app, and that Mimo sent that data beyond the Great Firewall of China without user consent.

Sure, the CCP appropriates a few government secrets and some intellectual property from wealthy corporations, but what nefarious purposes could they possibly have with your data?

The Chinese government has interned more than a million Uyghurs in camps very reminiscent of those of the Nazi era. Video footage of hundreds of bound and blindfolded Uyghurs on a train platform was leaked and posted on YouTube. The video was taken by the Xinjiang Autonomous Region Public Security Department using a DJI drone in the perimeter of the train station.

If they’ll use the data they collect against their own people that way, it’s a safe bet that the data they’re collecting on you is not just for marketing. Read more about this threat, do your best to safeguard your own data, and if a time comes when you purchase your own drone buyer, beware.

J.V. Venable is a senior research fellow in The Heritage Foundation’s Center for National Defense. Lora Ries is a senior research fellow in the think tank’s Center for Technology Policy.



Washingtontimes

Latest news

Lord Sumption: Boris Johnson’s “‘Rule Of Six’ Is Pointless, Arbitrary, And Unnecessary”

Via 21stCenturyWire.com, This week former UK Supreme Court justice took to the airwaves to strongly criticise the government’s latest laws designed to tighten restrictions on...

Joe Biden Has Been Around For So Long, Johnny Carson Once Made Fun Of His Lies (VIDEO)

Joe Biden has been in Washington for 47 years. If you want some real perspective on how long that is, consider this. Johnny Carson once...

Related news

DHS needs a new authorization, but House Democrats are dropping the ball

It’s been over 1,100 days since the last Department of Homeland Security authorization bill...

Remember that people have rights

In times of great crisis, the United States has risen to the challenge of...

Losing faith in our government

Do you trust the Centers for Disease Control and Prevention? ...

Word of the Week: ‘Contagion’

I was surprised and amused to find an entry on the proper spelling...

The NFL’s ratings take a knee

The National Football League has been the heartbeat of the United States for years....

Coronavirus vaccine hesitancy

In the seventh month of the nationwide coronavirus lockdowns, most people in the...

We can (and should) celebrate Columbus Day

"That man had oak and triple bronze about his heart who first commended...