Feeds

Sleuths find nosy NORKS drones on the Chinternet

UAVs likely to have been made in the Middle Kingdom

The Power of One Brief: Top reasons to choose HP BladeSystem

At least one of the suspected North Korean drones found after crashing south of the 38th parallel appears to have been made by a Chinese aviation company.

Taiyuan Navigation Friend Aviation Technology is a small UAV-maker based in Taiyuan, the capital of Shanxi province – a little over 1,000 kilometres from Pyongyang as the crow flies.

It appears to produce two drone models, with pictures of the SKY-09P pretty much matching perfectly the craft recovered by South Korea a few weeks ago.

As pointed out by the North Korea Tech blog, the wing and chassis shape, propeller and tail-fin all look virtually identical to those of the drone pictured in a South Korean Ministry of Defence image.

If it is the same, the petrol-powered craft has a wingspan of 1.92 meters, can travel at 80-100km/h and flies at a height of up to 4,000m, according to the spec sheet.

It can apparently carry a 3kg payload and takes off via a catapult mechanism before landing with a parachute – or presumably falling out of the sky in the case of the recovered drone.

Additional pictures found on the interwebs lend further credence to the theory the NORKS drone hails from China.

Beijing-based aviation and comms biz TranComm lists a range of UAVs for sale on its site including the SKY-09P.

A shot of the undercarriage of the SKY-09P indicates various bolts and pads which seem to be in the exact same configuration as those on the crashed drone.

It’s also built to carry digital cameras or camcorders, according to the product info, which tallies with the digital snapper recovered from one of the crashed drones a few weeks back.

TranComm also sells sister models the SKY-09 and SKY-09H which can fly higher than the SKY-09P, reaching 5,000m and 6,000m respectively.

The recovery of the crashed UAVs put Seoul on alert after it was deduced from the on-board images that one of the aerial vehicles had been flying over the South Korean capital, snapping various landmarks including the presidential residence.

For the record, North Korea has neither confirmed nor denied that the drones were catapulted into the heavens from its side of the border.

If it turns out to be true, this won't be the first time the hermit state has co-opted technology from its communist neighbour.

Earlier this month it emerged that its first 'home-grown' smartphone, the Arirang AS1201, is likely to be little more than a rebadged version of the Chinese-made Uniscope U1201. ®

Seven Steps to Software Security

More from The Register

next story
NSA man: 'Tell me about your Turkish connections'
Spooks ask Dabbsy to suggest a nice hotel with pool
Russia sends SEX-CRAZED GECKOS to SPAAAAACE!
In space... no one can hear you're green...
Carlos: Slim your working week to just three days of toil
'Midas World' vision suggests you retire later, watch more tellie and buy more stuff
Yahoo! Japan! launches! service! for! the! dead!
If you're reading this email, I am no longer alive
Plucky Rockall podule man back on (proper) dry land
Bold, barmy Brit adventurer Nick Hancock escapes North Atlantic islet
Motorist 'thought car had caught fire' as Adele track came on stereo
'FIRE' caption on dashboard prompts dunderheaded hard shoulder halt
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.