Jump to content

Recommended Posts

Posted (edited)

http://www.aviationweek.com/aw/generic/story_generic.jsp?channel=awst&id=news/awst/2011/01/03/AW_01_03_2011_p18-279564.xml

 

Interesting bit:

 

"One question that may go unanswered for a long time concerns the degree to which cyberespionage has aided the development of the J-20. U.S. defense industry cybersecurity experts have cited 2006—close to the date when the J-20 program would have started—as the point at which they became aware of what was later named the advanced persistent threat (APT), a campaign of cyberintrusion aimed primarily at military and defense industries and characterized by sophisticated infiltration and exfiltration techniques.

 

Dale Meyerrose, information security vice president for the Harris Corp. and former chief information officer for the director of national intelligence, told an Aviation Week cybersecurity conference in April 2010 that the APT had been little discussed outside the classified realm, up to that point, because “the vast majority of APT attacks are believed to come from a single country.”

 

Between 2009 and early 2010, Lockheed Martin found that “six to eight companies” among its subcontractors “had been totally compromised—e-mails, their networks, everything,” according to Chief Information Security Officer Anne Mullins."

 

And also:

 

"The way in which the J-20 was unveiled also reflects China’s use and control of information technology to support national interests. The test airfield is located in the city of Chengdu and is not secure, with many public viewing points. Photography is technically forbidden, but reports suggest that patrols have been permitting the use of cell phone cameras. From Dec. 25‑29, these images were placed on Chinese Internet discussion boards, and after an early intervention by censors—which served to draw attention to the activity—they appeared with steadily increasing quality. Substantial international attention was thereby achieved without any official disclosures."

Edited by hassata

[sIGPIC][/sIGPIC]

  • 4 months later...
Posted

Yup, the Chinese supposedly already have the entire F35 program data, stolen a good few years ago via hacks into networks.

 

That was a crazy breach and one that should of never been allowed to happen.

Posted

The Chinese are notorious tech theives. What they cant steal they "borrow" from countries we sell to.

 

Be that as it may sealing tech and building an infrustructure that can output something as sophisticated as an F-22 are two different things. To build a stealth fighter nowadays is really no big secret. But to provide the software, the avionics, dependable engines...ect ? That something quite different.

[sIGPIC][/sIGPIC]

"Lead, Follow, or get out of the way"

Posted (edited)
I don't think so.

 

 

Actually, they do, the Americans already admitted to it a few years back.

 

This is the first link that I found when I googled, their is loads of them.

 

http://online.wsj.com/article/SB124027491029837401.html

 

Maybe not the entire load of it, but enough for them to know everything more or less about the aircraft and how its made and how to fight and defend against it.

Edited by bumfire
  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...