It looks like you're using an Ad Blocker.

Please white-list or disable AboveTopSecret.com in your ad-blocking tool.

Thank you.

 

Some features of ATS will be disabled while you continue to use an ad-blocker.

 

China’s ‘Stealth Attack’ on the F-35

page: 2
3
<< 1   >>

log in

join
share:

posted on Oct, 2 2012 @ 06:08 AM
link   
reply to post by Neocrusader
 


There are a few things to realize about this incident however. The first is that yes, the B-2 was tracked, but it was tracked at a range that even if it was engaged successfully, the chances are that it would have released weapons, and hit the target.

The second is that the B-2 wasn't trying to hide, like it would in a real combat situation. There are a number of systems that are only used when going into combat that help to mask their signature more than if they are just on a ferry flight, or training with other aircraft. They're only allowed to use these systems when they are going into a for real shooting situation, so that no one can learn about them, or figure out ways around them.

Most importantly is that five or six years ago, a university working on visual stealth systems for the military admitted that they had systems for multiple wavelengths, and were working on more. Obviously they wouldn't go into detail, and it will be a long time before they admit anything, but stealth isn't a static system. As air defenses get more advanced, so does the stealth system in question.

Stealth isn't unbeatable by any means. It just gives you more time to get weapons on target, and a better chance of coming back in one piece, to fly more missions.



posted on Oct, 2 2012 @ 06:16 AM
link   
I heard about this stealth too. China is very smart.They don't waste their energy finding new technologies rather they prefer reversing others technology .



posted on Oct, 2 2012 @ 06:20 AM
link   
Not long (a year or two I think) before the new aircraft was unveiled, Lockheed admitted that every one of its F-35 subcontractors, and themselves, had been the target of hackers, and that a lot of F-35 data had been stolen in the attacks. They won't admit as to what, because most of it is classified, but probably enough to permit building at least a semi-stealthy aircraft. The problem comes in with manufacturing. The US has a huge advantage over the rest of the world in this field, because they have been building stealth aircraft since the 1970s. That means that a lot of the required equipment is already in place, where another country just starting out still has to figure out what equipment is needed, and build it.



posted on Oct, 2 2012 @ 07:01 AM
link   
China have a stealth fighter prototype the J-20. Looks like a copy of the F-22. And the J-21 is probably a copy of the F-35. No doubt the Chinese have tried to hack anything and everything and have probably got a lot of information from hacking.

J-20
www.globalsecurity.org...
J-21
www.globalsecurity.org...

The F-22 had it's first flight in 1990 the J-20 in 2011 almost 20 years behind.

The F-22 and F-35 could be the last US manned fighters. The future probably lies with UCAVS unmanned combat aerial vehicles. The next generation of fighters could be stealthy UCAVs. Stealthy aircraft still have an IR signature and I've seen something on the B-2 being picked up on IR a few years ago which the USAF wasn't happy about and tried to fix. The F-35 program has had a lot of problems.



posted on Oct, 2 2012 @ 03:23 PM
link   
reply to post by Zaphod58
 


lol hi again dude.....or dudette

As I understand the story there was something of a gentlemen's bet thrown down somewhere in the chain
This is from one guy who was on the rapier team and another whom claims he was involved but I haven't confirmed that

A few years ago the US penetrated British airspace undetected using stealth aircraft, however this was done after finding out when 'certain' kit was not in use


But there is another story behind the B-2 track, something along your lines
But as you didn't list it, you don't know it, if you don't know it, It confirms I shouldn't say it
Respectfully


Edit
As to everything else
Yeah I agree there's some crazy developments going on, and due to their sophistication and uses of new technology the restrictions and governance for the use of such devices is very ........grey

edit on 2-10-2012 by Neocrusader because: (no reason given)

edit on 2-10-2012 by Neocrusader because: (no reason given)

edit on 2-10-2012 by Neocrusader because: (no reason given)



posted on Oct, 2 2012 @ 03:53 PM
link   
reply to post by Neocrusader
 


There's quite a bit that I prefer not to list for various reasons. I usually try to use Flight or The Aviationist as my main sources.

But the F-22 and the B-2 in non-combat modes have a decent IR signature. I've heard that the F-22 can be tracked in the 31-32 mile range using IR sensors. Not sure about the B-2, as the engines are non-afterburning, but I would assume similar. In so called "combat mode", my understanding is that there are IR suppression systems that help to hide the IR signature.

They're a lot quieter about any active radar suppression systems however. Although there are a few very odd things about the B-2 after they land that makes me think that it has some very interesting active suppression systems when it comes to radar as well.

One of the systems also has some interesting implications when it comes to fuel consumption as well, which means that the range may be longer than we have been led to believe. There is a lot of interesting reading out there about the B-2. Most hearsay, but some makes a lot of sense.



posted on Oct, 30 2012 @ 11:06 AM
link   
I believe it goes something like this: Make it looks like this is secret technology (F-35), allow opposition to cyber-attack your systems, watch them (China), then keep giving them little bits and pieces consisting of not so revolutionary technology, keep them distracted from the real secrets. Possibly even let them "accidently" have the wrong information. The countermeasures for how to defeat stealth technology are well understood.



posted on Oct, 31 2012 @ 11:47 AM
link   

Originally posted by JrSkeptic
I believe it goes something like this: Make it looks like this is secret technology (F-35), allow opposition to cyber-attack your systems, watch them (China), then keep giving them little bits and pieces consisting of not so revolutionary technology, keep them distracted from the real secrets. Possibly even let them "accidently" have the wrong information. The countermeasures for how to defeat stealth technology are well understood.


You are assuming far too much intentional competence.



posted on Nov, 4 2012 @ 08:38 AM
link   

Originally posted by Maxatoria
surely thats good news for the American military machine as it means another 100 billion dollars plus spent on developing the next new generation jet fighter while china produces enough f-35 clones at knock down costs to be able to match american air forces 3-1 in the chinese favour and still have change left over for another carrier


China couldn't even rip-off Russia's Gen 4 Mig engines, let alone a gen 5 fighter jet.




top topics



 
3
<< 1   >>

log in

join