China says Wearable Tech Could Leak Secrets

MAIN-China-Army-smart-watch-ban.jpg

The Chinese military said fitness trackers and watches could send private and strategic data to hackers who've gained access to the vulnerable devices. China’s military released an ominous warning recently, telling troops and the wider public that network-connected wearable devices pose a national security risk when used by military personnel.

Published in the People’s Liberation Army Daily, “The moment a soldier puts on a device that can record high-definition audio and video, take photos, and process and transmit data, it’s very possible for him or her to be tracked or to reveal military secrets,” says the message, without mentioning any specific products.
The PLA cites a recent case in which an unnamed soldier from Nanjing tried to use a smart watch to take a photo with his comrades. The story may not actually be real: Even the smartest watches don’t usually have cameras, and the quote from the unwitting soldier, ”Come on, let me use my new smart watch to take a photo of everyone!”, seems too convenient to be true. But it’s plausible enough for the PLA to make its point about security.
In fact, the PLA and militaries the world over are probably less afraid of intentional acts like photographing and distributing classified information, and more worried about the passive data collection and transmission happening on these devices. The PLA’s warning says that fitness trackers and watches, if compromised, could send data on soldiers’ locations, movements, and even health conditions to whoever has gained access.
The warning doesn’t mention an outright ban of wearables by the PLA, but does cite China’s National Administration for the Protection of State Secrets, the Communist Party’s arbiter of classified information, as saying that “the use of wearables with internet access, location information, and voice calling functions should be considered a violation of national security provisions when used by military personnel.”
Indeed, such devices are not just bad for China’s military. The US in 2013 issued FitBit wristbands to soldiers as part of a trial fitness program. And the PLA would surely want, for its own purposes, data on the health conditions of all of its soldiers at any point in time.
Nevertheless, wearable tech is now on the growing list of cyberwar battlefields, alongside email inboxes and USB drives.
DefenseOne:  http://bit.ly/1Ac6CB1

« "Skynet" is Real and Could Flag You as a Terrorist
NSA Snowden is a 'hero' but not in the UK »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Resilient Information Systems Security (RISS)

Resilient Information Systems Security (RISS)

RISS is a research group is in the Department of Computing at Imperial College London.

Blockchain Slovakia

Blockchain Slovakia

Blockchain Slovakia is a non-profit organization that brings together researchers, developers, entrepreneurs, regulators, investors and the public to support blockchain technology in Slovakia.

CyRise

CyRise

CyRise is a venture accelerator focused squarely on early stage cyber security startups.

BELAC

BELAC

BELAC is the national accreditation body for Belgium.

Tech-Recycle

Tech-Recycle

Tech-Recycle was formed to help companies and individuals securely, ethically and easily recycle their IT and office equipment. We destroy all data passed to us safely and securely.

Quantstamp

Quantstamp

Quantstamp are experts in Smart Contract Security Audits. We provide verification that your decentralized system works as intended.

ChainSecurity

ChainSecurity

ChainSecurity provides products and services for securing smart contracts and blockchain protocols and conducts R&D in the areas of security, program analysis, and machine learning.

N8 Identity

N8 Identity

N8 Identity helps organizations realize the vision of Autonomous Identity Governance™ with AI-driven Identity solutions.

Airnow Cybersecurity

Airnow Cybersecurity

Airnow Cybersecurity provide digital cybersecurity services and solutions for organizations and app publishers.

LibraSoft

LibraSoft

Librasoft creates solutions to protect information from external and internal threats.

Data#3 Limited (DTL)

Data#3 Limited (DTL)

Data#3 Limited (DTL) is a leading Australian IT services and solutions provider.

Nigerian Communications Commission (NCC)

Nigerian Communications Commission (NCC)

NCC has established a CSIRT for the telecommunication industry to provide services and support for the prevention and management of potential cyber security related emergencies.

Data Pie Cybersecurity

Data Pie Cybersecurity

The Data Pie Cybersecurity Consulting offers a 360° around protection for your IT security. Security awareness solutions and consulting.

Comcast Technology Solutions (CTS)

Comcast Technology Solutions (CTS)

Comcast Technology Solutions delivers proven technologies for global video, media, communications, data applications, and cybersecurity & compliance.

FluidOne

FluidOne

FluidOne are an award-winning Connected Cloud Solutions provider. We design tailored solutions to help customers and partners digitally transform their IT and communications.

Amplifier Security

Amplifier Security

Amplifier Security are on a mission to empower security teams to modernize their practice by connecting the dots between their security stack and their people.