J-20 5th Gen Fighter Thread V

Status
Not open for further replies.

weig2000

Captain
Appearances can be very important, particularly if you lack a capability?? right?? and its no secret that cyber-hackers did in fact breach the F-35 protocols??? so, Mr. Forbins question is a very fair question.

So no, its certainly not unrealistic to ask the question, and its a question that somebody some where knows the answer to. I do suspect that our "friends" may be "borrowing" tech from their "cyber mining" operations?

I would also note that posters here are very concerned when early aircraft came out with an obviously non functional EOTS as a placeholder on the forward fuselage, and they were much happier when an apparently functional EOTS was later installed on the aircraft, and that EOTS housing and lenses appear a great deal like the outer housing and lenses on the F-35.

Have I drawn any firm conclusions?? NO, but I do have concerns, and the fact that Mr. Forbin asked that question with-out prompting allows us to acknowledge that others have similar suspicions, in fact there have been "high level" discussions between the US and China about these very issues??? YES??

What these "high level" discussions between the US and China specifically have to do with EOTS on J-20? Do you have anything concrete here to add? Or you're just letting your imagination and bias running wild?

FORBIN and anyone can express their opinion here in a public forum, and I can express opinion on these opinions too.

All of these accusations against China "stealing" have been going on for quite a while, much of them are politically-motivated and many are bordering on being very ridiculous. Use some common sense, please.

I don't see anything positive or productive coming out of this particular discussion with you. I can stop here.
 

FORBIN

Lieutenant General
Registered Member
Only idiot answer, fake and/or meaningless arguments and now in more you go for bias, your not honnest, serious again less fair... pffffff :rolleyes:

It is the "2011" only in 2014 which is the first J-20 proto with the EOTS, soo undoubtedly Chinese can, have time for copied...i don' t say have do... :cool:
 
Last edited:

vesicles

Colonel
The US has acknowledged leaking of F-35 info. However, we don't know what has been leaked and how much has been leaked.

We always emphasize the seemingly undefeated capability of Chinese cyber intelligence forces. One thing that we seem to unfairly ignore is the capability of US counter-intelligence. They are no slouches either. Just compare both countries' civilian high tech industry. I don't see how the Chinese cyber intelligence could simply walk in and take whatever they want, especially when the target is such a high profile project.

Specifically about the F-35 info. How important was the data stolen? Was it about the EOTS, or about the landing gear, or about the leather on the pilot seat, or something else that is less sensitive? Could it be possible that it was actually false info planned by the US counter-intelligence, which was specifically designed to mislead the Chinese? Things like these have happened plenty times in the Cold War and other times in history between rivals.

Given the advanced equipment, capability and experience of the US counter-intelligence, I highly doubt the usefulness of leaked F-35 data.
 

Jeff Head

General
Registered Member
More reports are popping up with the same theme !!



It is rumored that LRIP J-20s have finally been delivered to PLAAF Flight Test & Training Base today !!!

Still awaiting confirmation and esp. images ...

via:
Please, Log in or Register to view URLs content!


Deino
This is really big news.

If the PLAAF Test and Training Cadre now has the aircraft, things are going to start popping.
 

weig2000

Captain
Only idiot answer, fake and/or meaningless arguments and now in more you go for bias, your not honnest, serious again less fair... pffffff :rolleyes:
I'll refrain from responding to this.

It is the "2011" only in 2014 which is the first J-20 proto with the EOTS, soo undoubtedly Chinese can, have time for copied...i don' t say have do... :cool:
I see. Let me summarize. Your evidence are that 1) their external shapes look alike, and 2) they have three years to copy and work on, which you think is sufficient time. Of course, you're not saying they copy it. So it's not an accusation. It's just logically possible. Is my understanding correct?

Without more evidence, I suggest we leave it there - that is, your conjecture.
 

AndrewS

Brigadier
Registered Member
@vesicles

The US has acknowledged leaking of F-35 info. However, we don't know what has been leaked and how much has been leaked.

We always emphasize the seemingly undefeated capability of Chinese cyber intelligence forces. One thing that we seem to unfairly ignore is the capability of US counter-intelligence. They are no slouches either. Just compare both countries' civilian high tech industry. I don't see how the Chinese cyber intelligence could simply walk in and take whatever they want, especially when the target is such a high profile project.

Specifically about the F-35 info. How important was the data stolen? Was it about the EOTS, or about the landing gear, or about the leather on the pilot seat, or something else that is less sensitive? Could it be possible that it was actually false info planned by the US counter-intelligence, which was specifically designed to mislead the Chinese? Things like these have happened plenty times in the Cold War and other times in history between rivals.

Given the advanced equipment, capability and experience of the US counter-intelligence, I highly doubt the usefulness of leaked F-35 data.

It is commonly acknowledged that cyber is an offensive dominated environment, where it is far easier to penetrate an opposing network than it is to defend your own.

There are always bugs in the code, so cyber-security experts have acknowledged that it impossible to create a secure cyber-perimeter around an organisational network, and that intrusion detection has to operate by detecting anomalous actions or data flows.

It is possible that there are false flag operations, but you only have to look at the OPM hack of security clearance files as an example of lax security.
 
Status
Not open for further replies.
Top