US Army declares DJI drones 'vulnerable'

DJI

Hard blow the one that the boys from DJI after the last memorandum that has just been published directly by the United States Army, which ensures that they will leave the unmanned aircraft manufactured by this Chinese company after cataloging them, both the drones themselves and all the development carried out by the company, of vulnerable to possible cyberattacks.

Before continuing, let me tell you that although it seems that the United States Army only uses systems developed exclusively for it, the truth is that a large part of the drones used are manufactured by DJI, a company that is also responsible for manufacturing. , among other things, items such as flight computers, cameras, radios, batteries, GPS units and general software that now and due to this study, will be discarded immediately.

The United States Department of Defense will immediately discard all types of DJI material that its security forces are using.

As you can see, we are not only talking about certain drone units, but there are many products that the United States Army, at least to date, ordered from DJI. Apparently, the order has come from the Directorate of Aviation Engineering, which has ordered an immediate stop to the use of this type of equipment, all batteries and storage media be removed and even urged to uninstall any application that its military is using and has been designed and developed by DJI.

For its part, a DJI spokesperson has commented that the company has never been consulted or contacted to be able to talk about all the aspects that have led the Department of Defense to classify its products as vulnerable to cyberattacks. As of today, apparently, they are taking steps to clarify the entire situation presented and to be able to solve all this problem.


Be the first to comment

Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: Miguel Ángel Gatón
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.