Framework in place to weed out Chinese parts from drones

9 hours ago 1

Home / Top Headlines / Framework successful spot to weed retired Chinese parts from drones

article_Author

New Delhi, Updated At : 02:25 AM Jul 14, 2025 IST

An Indian worker operates a drone for surveillance on the Line of Control (LoC) betwixt India and Pakistan successful Poonch. PTI file

A broad model has been acceptable up to filter retired immoderate bundle oregon hardware of Chinese root in the drones used by the military. 

Advertisement

Th model has been suggested by the 3 equipped forces and would beryllium portion of the ongoing reappraisal of the Defence Acquisition Procedure (DAP), sources said.

This comes after, past year, an Indian Army drone operating adjacent the bluish borders was reportedly hijacked by Pakistan. The vulnerability was owed to the usage of Chinese made ‘auto-pilot’ which guides the drone to its destination.

The caller model volition code the usage of Chinese components successful drones. This volition beryllium portion of the elaborate hazard investigation of Chinese components crossed captious domains -- communications, sensors, GPS and software.

Disclosure of components' origins must

The model volition mandate afloat disclosure of drone hardware origins, embedded software, and the third-party firmware. The scrutiny would see certification programmes requiring traceability reports and constituent verification

It volition look to enforce beardown encryption and unafraid information transmission protocols. It could besides see regularisation of drones from syncing with apps oregon systems developed by non-trusted sources

This would person 2 types of scrutiny — 1 for the hardware and different for the software. Specialists from the Ministry of Electronics and Information Technology (MeiTY) would beryllium portion of the process to weed-out Chinese root bundle and hardware.

It volition mandate afloat disclosure of drone hardware origins, embedded software, and the third-party firmware. The scrutiny would see certification programmes requiring traceability reports and constituent verification.

It volition look to enforce beardown encryption and unafraid information transmission protocols. It could besides see regularisation of drones from syncing with apps oregon systems developed by non-trusted sources.

Periodic audits of drones successful work would beryllium done to measure constituent safety, bundle integrity and firmware updates. It volition found kill-switch protocols oregon mandatory distant disablement features for high-risk deployments.

Already the services are backing home drone constituent innovation done authorities grants, public-private partnerships and university-led research.

After Operation Sindoor, the equipped forces are looking astatine circumstantial next-generation technologies for drones to dodge force surveillance and past to motorboat attack.

The program is to get the exertion from indigenous sources, including the drone controlling hardware and software. Technologies similar these person been developed internationally by a fewer countries, but the enactment of overseas sourcing has not been explored.

The forces privation 3 important technologies successful aboriginal drones -- unafraid connection utilizing bundle defined radios; GPS escaped operations; and quality to bushed the jamming of vigor signals by enemy.

Read Entire Article


http://jattvibe.com/live