J-20 5th Gen Fighter Thread V

Status
Not open for further replies.

vesicles

Colonel
@vesicles



It is commonly acknowledged that cyber is an offensive dominated environment, where it is far easier to penetrate an opposing network than it is to defend your own.

There are always bugs in the code, so cyber-security experts have acknowledged that it impossible to create a secure cyber-perimeter around an organisational network, and that intrusion detection has to operate by detecting anomalous actions or data flows.

It is possible that there are false flag operations, but you only have to look at the OPM hack of security clearance files as an example of lax security.

True! However, once the US agents realized the data has been stolen, they could mount their own attacks to destroyed the stolen data? Could that happen? Unlike other kinds of intelligence, these detailed tech data need a long time to be properly analyzed and digested. The US could find where the stolen data is stored and destroyed them before the Chinese have a chance to analyze the data? the Chinese would be similarly defenseless against such attacks...

My point is that the US and China should be at least similarly capable in these cyber battles. Who know... there might be some agreement between the two countries. I don't attack you if you don't attack me. I will mess you up as much as you can mess me up. So back off!
 

Air Force Brat

Brigadier
Super Moderator
How effective will the J-20 be without its intended engines ?

From the J-20s inception, Dr. Song expressed concern that J-20 might not initially have the engines they wanted, so to mitigate that concern, he directed the design team to incorporate aerodynamic "work-arounds". For instance the ventral fins below the vertical stabilizers provide not only yaw stability, but an upward pitching moment of the tail in order to break a stall in the case of engine failure. Notice they are "flared away from the body, and do indeed function almost as "feathers" on an arrow, hence the "archaic, tail feathers" term.

So to answer your question, it was anticipated from the beginning that at least initially, the J-20 would NOT have the engines they wanted, also the WS-15 likely has a "common core" as far as size and weight as they Russian engines initially choosen to begin flight test. Likely baffles and internal features with-in the cowl would need a slight amount of "tweaking".

In the dark ages of aviation, it was and still is common to upgrade aircraft engines, in some cases going from recips to turbines or even Jet engines. That is what Chengdu will do once the WS-15 becomes available.
 

kriss

Junior Member
Registered Member
The US could find where the stolen data is stored and destroyed them before the Chinese have a chance to analyze the data? the Chinese would be similarly defenseless against such attacks...

Chinese can make a copy of the data the minute they stole it (if they indeed did it) and get it off the grid, which also lead to the question why LM didn't put it in a physically isolated internal network in the first place if those data are so important.
 

danielchin

Junior Member
this image looks "cleaner"

____%202016-08-26%20__1.25.27.png
 

Air Force Brat

Brigadier
Super Moderator
The US has acknowledged leaking of F-35 info. However, we don't know what has been leaked and how much has been leaked.

We always emphasize the seemingly undefeated capability of Chinese cyber intelligence forces. One thing that we seem to unfairly ignore is the capability of US counter-intelligence. They are no slouches either. Just compare both countries' civilian high tech industry. I don't see how the Chinese cyber intelligence could simply walk in and take whatever they want, especially when the target is such a high profile project.

Specifically about the F-35 info. How important was the data stolen? Was it about the EOTS, or about the landing gear, or about the leather on the pilot seat, or something else that is less sensitive? Could it be possible that it was actually false info planned by the US counter-intelligence, which was specifically designed to mislead the Chinese? Things like these have happened plenty times in the Cold War and other times in history between rivals.

Given the advanced equipment, capability and experience of the US counter-intelligence, I highly doubt the usefulness of leaked F-35 data.

It is astounding to me that given the acknowledgement that we had "hackers" breaching our security protocol, not leaks but folks breaking into our network, and honestly, they've been up front about who the "usual suspects are"?? that people would think that's ridiculous???

I never made any accusations, but those kind of targeted, repeated, persistant breaches honestly come under what could be referred to as "cyber warfare"???

Again I'm not making accusations, but I'm not the one who called the possibility ridiculous either??? HEH! Heh! HeH!
 

Air Force Brat

Brigadier
Super Moderator
this image looks "cleaner"

____%202016-08-26%20__1.25.27.png

it is indeed "very clean" and this airplane continues to grow on me, I an 1/100 scale model of both J-20 and PAK-FA, both beautiful innovative aircraft on their own merit. While I like the conventional configuration much better "just because", I do, the J-20 is a very "interesting, out of the box airplane" and shows the real genius of Dr. Song and the team a CHENGDU, good job people. Looks like it would be a blast to fly.
 

AndrewS

Brigadier
Registered Member
It is astounding to me that given the acknowledgement that we had "hackers" breaching our security protocol, not leaks but folks breaking into our network, and honestly, they've been up front about who the "usual suspects are"?? that people would think that's ridiculous???

I never made any accusations, but those kind of targeted, repeated, persistant breaches honestly come under what could be referred to as "cyber warfare"???

Again I'm not making accusations, but I'm not the one who called the possibility ridiculous either??? HEH! Heh! HeH!

Well, I'm sure that the NSA has successfully hacked China on a number of occasions.

But we just don't hear about this publicly.
 

AndrewS

Brigadier
Registered Member
Chinese can make a copy of the data the minute they stole it (if they indeed did it) and get it off the grid, which also lead to the question why LM didn't put it in a physically isolated internal network in the first place if those data are so important.

My understanding is that BAE and most other subcontractors got hacked at the same time.

So LM weren't unique.
 

AndrewS

Brigadier
Registered Member
How effective will the J-20 be without its intended engines ?

In what role?

As an interceptor targeting AWACS/Tanker/ISR aircraft, it shouldn't make too much of a difference and the cost/benefit ratio works out very well.

But it wouldn't fare well in a dogfight, but what stealth fighter ever wants to get into that sort of position?
 
Status
Not open for further replies.
Top