Australia’s Foreign Affairs Department Yet to Remove China-Made DJI Drones

Australia’s Foreign Affairs Department Yet to Remove China-Made DJI Drones
A DJI Mavic 2 Pro and DJi Mavic Mini made by the Chinese drone maker fly near each other in Miami, Florida, on Dec. 15, 2021. (Joe Raedle/Getty Images)
Henry Jom
6/2/2023
Updated:
6/2/2023
0:00

Australia’s Department of Foreign Affairs and Trade (DFAT) is still using the controversial Chinese-made Da Jiang Innovations (DJI) drones despite other government departments, such as the Australian Border Force (ABF), ceasing their use in May.

DFAT’s chief security officer, Joe Talbot, confirmed the drones’ use during a Senate estimates hearing on June 1.

“We do indeed have some of those devices, but we’re in a process at the moment of replacing that equipment,” Talbot said, adding that 13 DJI drones were currently being used by DFAT and a further two by Austrade.

“We did do a risk assessment on those, and they are not in areas which would cause us concern, specifically, they are used for public diplomacy.”

Talbot said that the department would not put a timeframe on the drones’ replacement.

“We need to deal with supply chain issues. We will be working as quickly as we possibly can to replace those devices,” she said.

Opposition home affairs and cyber security minister James Paterson told The Australian that it was “not clear” how DFAT could continue using the drones safely.
During a speech at the Australian Cyber Security Connect Summit on June 1, Paterson said much of the software and hardware the Australian government uses is from China.

“And the ostensibly ‘private’ companies based in China who produce and sell these products are not really private companies at all,” he said.

“They are effectively arms of the Chinese state and subject to the extrajudicial direction of the Chinese Communist Party through many levers, including strategic ownership stakes, internal CCP cells, national security legislation, and the ever-present threat of arbitrary detention and arrest for their senior management if they fail to uphold the Party’s wishes,” he said.

Defence Department Ceases Use

On May 5, Defence Department Secretary Greg Moriarty and Chief of the Defence Force General Angus Campbell signed a cessation order suspending the use of DJI-related products, including its drones, pending a six-month security audit.

Three weeks prior to this, Campbell issued a formal order that was issued by the army to cease the use of DJI products.

DJI has been blacklisted by the United States Military due to links to the Chinese Military.

Senator James Paterson, the opposition’s home affairs spokesman, has previously said the United States took action against the company because it was “controlled by the People’s Liberation Army” and had been sanctioned for its role in the CCP’s repression of the Uyghur ethnic group in the Xinjiang region.

Senator James Paterson quizzing AFP officials in the Senate. (Screenshot/The Epoch Times)
Senator James Paterson quizzing AFP officials in the Senate. (Screenshot/The Epoch Times)

Paterson urged the ABF to follow the Defence Department and stop flying the drones until a review is done.

Subsequently, the ABF stopped using Chinese-made drones after it was suspended by the Defence Department.

During a senate estimates hearing on May 22, Paterson asked Home Affairs Secretary Mike Pezzullo whether the ban on Chinese-made hardware would be expanded to critical infrastructure.

“We think there’s sufficient ambit,” Pezzullo said.

Home Affairs deputy secretary of cyber and infrastructure, Hamish Hansford, said that the Risk Management Program (RMP) obligation on critical infrastructure operators, which came into effect in February, is one potential way to expand the ban.

“In terms of the risk management program, a minister of Home Affairs could declare a particular device to be a material risk that then a company would have to mitigate, so I think it could be done in that construct,” Hansford said, adding that under the Security of Critical Infrastructure Act could be used pending an adverse security assessment from the Australian Security Intelligence Organisation (ASIO).

However, Paterson rejected the use of the products altogether.

“It seems to me as a matter of logic that if these products are not safe in the Australian government, that we shouldn’t be comfortable about them being used in critical infrastructure providers either, especially systems of national significance, as a subset,” he said.

CCP’s Cyber Attack on US Critical Infrastructure

In a joint statement published by the Australian Cyber Security Centre (ACSC) on May 25, Australia, along with the Five Eyes Security Alliance, condemned the CCP’s cyberattack on critical infrastructure networks across the United States.

The joint advisory was issued after it was discovered that a “cluster of activity” was associated with the CCP’s hacking group, Volt Typhoon—a state-sponsored actor typically focused on espionage and information gathering.

One of the primary tactics used by the cyber actor, in this case, the CCP, is “living off the land,” where the actor blends in with normal Windows systems to evade detection. This tactic exploits legitimate pathways instead of malware.

The Five Eyes alliance—an intelligence alliance between the U.S., UK, Canada, Australia, and New Zealand—also believes that the same techniques used by the CCP “could” be applied to other sectors worldwide.

“Observed behaviour suggests that the threat actor intends to perform espionage and maintain access without being detected for as long as possible,” Microsoft said in a May 24 statement.

Australia’s Department of Foreign Affairs and Trade has been approached for comment.

Henry Jom is a reporter for The Epoch Times, Australia, covering a range of topics, including medicolegal, health, political, and business-related issues. He has a background in the rehabilitation sciences and is currently completing a postgraduate degree in law. Henry can be contacted at [email protected]
twitter
Related Topics