The US Army will stop using DJI drones due to fear of information leakage

Unmanned aerial vehicles no longer surprise anyone. Not only geeks, but also ordinary people use drones to solve a variety of tasks. Someone needs to write a beautiful video for YouTube, and someone wants to inspect the roof of his house to understand what part of the roof needs repair. In addition, working with copters and military of various states, including the United States.

The army of this country is one of the most technologically advanced in the world. Here, thousands and thousands of drones are used, both from own development and from third-party companies. For example, DJI. The US military used this manufacturer's drones for a long time, since such devices are very convenient. But now they will have to stop this practice.

The problem is that this company's drones collect a lot of information, including geolocation, audio and video. Some users and information experts already complained about "eavesdropping". Nevertheless, the leadership denies everything. Last year, trying to protect themselves from accusations, the company's representatives stated the following: "DJI can not, and we believe that we should not be able to connect to your live feed data on a memory card or phone that is connected to the drones. And since we do not have access to these data, we can not transfer them to anyone else. "

All right, but not really. The fact is that DJI has installed a special software in its drones, which determines the location of the device, referring to the coordinates of the regions forbidden for flights (No Fly Zone). The developers believe that the function No Fly Zone (NFZ) allows you to protect your customers from trouble. But customers prefer to worry about their own safety. The no-flight zones include airports, stadiums, military bases, national parks and other places.

And just this information, collected by special software, is sent to the company's servers. One of the points of the DJI policy reads: "We reserve the right to retain this data and provide it to third parties in the event that the law requires it or there is a well-founded suspicion that these actions violate the laws. Data is provided at the request of the court and other government agencies. " All this information is stored on servers located in the US and China.

It is likely that the military does not like too much that someone can know where exactly the drones are located, which is carrying out an important task. In addition, the telemetry transmitted by the drones can be intercepted by intruders nearby. Protection is provided for by developers, but the data transfer protocols of the DJI drones are too well known, the attacker, having the necessary experience, can easily access this information, and to intercept the video and audio stream is also not too difficult task for the professional.

In any case, high-ranking US military officials ordered to remove all drones from DJI, remove all applications of this company, remove the batteries and storage devices from the devices.

The DJI management has already stated this: "We are surprised and upset by the information that US military will not use DJI drones, although we will not argue with this decision." "We are pleased to work with various organizations directly, including the US Army, which has concerns about cybersecurity. We will try to contact the US Army in order to clarify this situation and find out what is meant when the military talks about "cyber vulnerabilities". Until now, we ask all to refrain from speculation and rumors. "

It is not known whether the Copters of this company are used by the military of Russia. But ordinary users who want to fly wherever they see fit, turn off the flight safety system No Fly Zone. This is done with the help of specialized software, which is produced by the domestic company, Coptersafe. Now this company earns on the creation of de-jailbrokes of various models of Copters, while modifications of devices are offered a variety of – both software and hardware.

About the author


Add Comment

Click here to post a comment

Your email address will not be published. Required fields are marked *