Report: Chinese lidar technology poses national security threat

Avatar

A new report from a prominent think tank rings alarm bells over China’s plans to use advanced remote sensing technology as a means of breaching networks and infiltrating critical infrastructure to spy on Americans and the U.S. military.

Known as light detection and ranging (lidar), the technology harnesses laser pulses to build precise, three-dimensional maps of environments it is deployed in. 

By measuring how long it takes the pulses to travel back to sensors, the technology can create exceptionally detailed and accurate spatial data which outstrips what has historically been available, according to a report from the Foundation for Defense of Democracies, a nonprofit research organization. 

Lidar, now used globally in a wide variety of civilian and military use cases, “stands at the center of Beijing’s bid for technological superiority,” the report says, warning that Chinese companies are taking control of the global lidar market, with Chinese-made sensors now used widely in the U.S. as “essential nodes” within public safety, transportation and utility systems.

China-produced lidar’s presence in the U.S. production chain creates a clear opportunity for espionage and sabotage by “potentially enabling Beijing to access sensitive U.S. data or disrupt critical operations,” according to the report, which likens the potential for lidar abuse to the ways in which China has exploited Huawei’s communications technology.

Congress has been paying attention.

In May, Rep. Elissa Slotkin (D-MI) introduced legislation which would bar the Department of Defense from buying Chinese-made lidar.

In September, the chairman of the House China Select Committee announced proposed legislation banning the Department of Transportation from buying equipment that contains China-made lidar technology. 

The U.S. must increase lidar production domestically and nurture efforts to do so in allied countries, according to the report. It also should enforce tough cybersecurity standards for lidar technology to ensure its use in civilian and military networks is secure, the report said.

Calling lidar a “critical” technology, the report offers a silver lining. Many American and other Western firms are capable of manufacturing the technology, allowing the U.S. to walk away from China-produced options.

But the U.S. must act now, the report authors contend.

“LiDAR’s role in tomorrow’s autonomous systems makes it a strategic vulnerability today,” the report says.

“LiDAR isn’t just about mapping roads — it’s about mapping vulnerabilities…  Combined with China’s playbook from Volt Typhoon, the risks of sabotage and operational control are chillingly clear,” the report adds, referring to a Beijing-linked hacking operation into critical U.S. systems.

The threat is especially serious for the automotive sector, the report says, citing a recent Estonian Foreign Intelligence Service bulletin asserting that a Chinese lidar manufacturer planned to transmit data culled from Estonian cars back to China. 

An unnamed Chinese company was reportedly developing lidar systems for self-driving cars in Estonia that would “scan the local environment and transmit this information to Beijing,” the report says.

“Although data collected for autonomous driving is typically deleted if non-essential, this Chinese firm intended to transfer all environmental data to a China-based database, raising concerns about the potential exploitation of this technology for Chinese intelligence purposes, such as mapping foreign infrastructure, identifying sensitive locations, or tracking patterns of movement.”

CybercrimeChinaGovernmentNewsTechnologyPrivacy
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Suzanne Smalley

is a reporter covering privacy, disinformation and cybersecurity policy for The Record. She was previously a cybersecurity reporter at CyberScoop and Reuters. Earlier in her career Suzanne covered the Boston Police Department for the Boston Globe and two presidential campaign cycles for Newsweek. She lives in Washington with her husband and three children.

 

Total
0
Shares
Previous Post

Ransomware suspect Wazawaka reportedly arrested by Russia

Next Post

Japanese crypto service shuts down after theft of bitcoin worth $308 million

Related Posts

One More Tool Will Do It? Reflecting on the CrowdStrike Fallout

The proliferation of cybersecurity tools has created an illusion of security. Organizations often believe that by deploying a firewall, antivirus software, intrusion detection systems, identity threat detection and response, and other tools, they are adequately protected. However, this approach not only fails to address the fundamental issue of the attack surface but also introduces dangerous
Avatar
Read More

Experts Identify 3 Chinese-Linked Clusters Behind Cyberattacks in Southeast Asia

A trio of threat activity clusters linked to China has been observed compromising more government organizations in Southeast Asia as part of a renewed state-sponsored operation codenamed Crimson Palace, indicating an expansion in the scope of the espionage effort. Cybersecurity firm Sophos, which has been monitoring the cyber offensive, said it comprises three intrusion sets tracked as Cluster
Avatar
Read More