He does it on purpose to make punch the screen. All these colors act like kryptonite on me.It's nonsense, but I like the colours.![]()
I guess he's another one that lives in his own delu... own world.
He does it on purpose to make punch the screen. All these colors act like kryptonite on me.It's nonsense, but I like the colours.![]()
As per the new brochure/poster by "official" USAF, F-22 is Stealth+ while F-35 being just Stealth. So Raptor beats Lightning II even in that one area where the latter was supposed to have a lead. Time for you and your cronies to throttle back on F-35 hype train, me thinks!He does it on purpose to make punch the screen. All these colors act like kryptonite on me.
I guess he's another one that lives in his own delu... own world.
Hostage makes it clear F-35 beats the F-22 in stealth.
Hostage is a USAF General who was in charged of F-35 program who has access to classified info of F-35 and F-22 he doesn't have to give the public any RCS numbers if he says the F-35 beats the F-22 in stealth then it beats it in stealth. That's it. He is in the know he saw the numbers so his claim is true.
For the love of Ya'hweh & Moshe , it's Sabbath time & you're back online , you pathetic l'il anti semite JINO . Remind me the next time you jump up & down for alleged anti Semitic comments from my end.He does it on purpose to make punch the screen. All these colors act like kryptonite on me.
I guess he's another one that lives in his own delu... own world.
He does it on purpose to make punch the screen. All these colors act like kryptonite on me.
I guess he's another one that lives in his own delu... own world.
Are we back to E virus like Stuxnet territory once again , sweetie all because s̶o̶n̶ o̶f̶ G̶o̶d̶ -̶ J̶e̶s̶u̶s̶ Gen Hostage says so ? Remember the massive trouble you got into when you made such absurd claims the first time around ? We asked for evidence then . We're still awaiting it .
How come your butt buddies Generals Bogdan Hostage et al haven't provided you with any evidence of their claims in all the 4 years you've been peddling their bull crap made for Congress testimonies out here ? Coz it's essentially bull crap made for Congress testimonies ??
F-35 can attack systems with electronic viruses
--The issue of how effective the F-35 would be in a classic dogfight often arises. Gen. Hostage noted during our interview that the F-35 pilot who engages in a dogfight has either made a mistake or been very unlucky. Shooting down other planes using kinetics is only one role of the F-35. Perhaps air forces around the world are going to have to come up with a new honor other than ace to define those who fly the F-35. What should a pilot be awarded for outsmarting the best air defense systems in the world or injecting something like Stuxnet into the enemy’s command and control system? So much of what this aircraft will do has nothing to do with shooting down another pilot that we may need a new term.What is electronic virus?
Who's asking for the details ? We've always maintained the bare bones is enough. For eg the original Stuxnet virus was uploaded onto the network of the Iranian nuclear complex manually . So how exactly are you going about it here ? Unless you think this can be transferred via bluetooth. Which given the kind of intelligence you've displayed out here wouldn't be surprising in the least.Evidence? Are you daft or something? He doesn't need to show classified evidence that the F-35 can attack systems with electronic viruses to satisfy some mumbai boob.
Yes logic dictates it must be so PROVIDED it is backed by sufficient evidence. We aren't asking for the entire documentation. Just a hint or two. Otherwise this is for the consumption of Congress to authorise more funds or to keep them from probing too deep into the program about its capabilities asking where have all those billions gone ?See hunny this is how it works when USAF generals who are in the know and have all the classified info of what F-35 and F-22 can do, and they throw us a bone by letting it be known that the F-35 beats the F-22 in stealth or the F-35 has cyber warfare capability, logic dictates that it must be so.
Whether you Indians, who consider this kind of tech sorcery, believe it or not is irrelevant.
They didn't get it for the e virus like Stuxnet . That's for sure. If you're claiming otherwise please show us one document from the evaluation of the F-35 by the Swiss or any country confirming this little detail of e virus like Stuxnet in their report.The nations who spend multi $billions on this fighter don't buy hype, bub.
Dassault, frenchies in here and you fanboys claim mighty Rafale's Spectra can do all sorts of wonders when it comes to EW and "active stealth" where's the evidence it can do this cht?!?
The Paxtanis are pathological liars. Here's your own man Richard Clarke ex State Dept , NSC & DoD saying so .Oh wait... Nvm. It's ok we don't need evidence the Pakees showed us Rafale's spectra capability claim has always been BS. I mean 0-3 in air combat against pakee flown export J-10's says spectra is BS![]()
--The issue of how effective the F-35 would be in a classic dogfight often arises. Gen. Hostage noted during our interview that the F-35 pilot who engages in a dogfight has either made a mistake or been very unlucky. Shooting down other planes using kinetics is only one role of the F-35. Perhaps air forces around the world are going to have to come up with a new honor other than ace to define those who fly the F-35. What should a pilot be awarded for outsmarting the best air defense systems in the world or injecting something like Stuxnet into the enemy’s command and control system? So much of what this aircraft will do has nothing to do with shooting down another pilot that we may need a new term.
-LANGLEY AFB: If you want to stop a conversation about the F-35 with a military officer or industry expert, then just start talking about its cyber or electronic warfare capabilities.![]()
Gen. Mike Hostage On The F-35; No Growlers Needed When War Starts - Breaking Defense
For years, the news about the most expensive conventional weapons system in US history, the F-35 Joint Strike Fighter, has been driven by its soaring costs, technical problems and schedule screw-ups. The government and Congress and the public rarely speak about what the F-35 will do, how...breakingdefense.com
These are the capabilities that most excite the experts I’ve spoken with because they distinguish the F-35 from previous fighters, giving it what may be unprecedented abilities to confuse the enemy, attack him in new ways through electronics (think Stuxnet), and generally add enormous breadth to what we might call the plane’s conventional strike capabilities.
So I asked Air Force Gen. Mike Hostage, head of Air Combat Command here, about the F-35’s cyber capabilities, mentioning comments by former Air Force Chief of Staff Gen. Norton Schwartz several years ago about the F-35 having the “nascent capability” to attack Integrated Air Defense Systems (known to you and me as surface to air missiles) with cyber weapons.
'A God's Eye View Of The Battlefield:' Gen. Hostage On The F-35 - Breaking Defense Breaking Defense - Defense industry news, analysis and commentary
AESA Radar, Cyber And IADSThe F-35 is unlikely to carry CW hardware of its own. It likely acts as a relay for Compass Call with cyber payloads delivered from the Compass Call's Suter network. The F-35 can neither carry Suter nor power it. CW also needs a crew working on specific tasks to create the payload.
AESA Radar, Cyber And IADS
Here’s an excellent explanation for how we go from radio and radar and military systems that are not connected to the Internet yet remain vulnerable to hacking that I’ve cribbed from my deputy, Sydney Freedberg, from a recent piece he wrote in Breaking Defense about cyberwar. An enemy’s radios and radars are run by computers, so you can transmit signals to hack them. If the enemy’s computers are linked together then your virus can spread throughout that network. The enemy does not have to be connected to the Internet. You just need the enemy’s radios and radar to receive incoming signals – which they have to do in order to function.
So, as a former top intelligence official explained to me about two years ago, the AESA radar’s beams can throw out those zeros and ones to ANY sort of receiver. And an enemy’s radar is a receiver. His radios are receivers. Some of his electronic warfare sensors are also receivers.
But neither Hostage nor many others I spoke with were willing to be specific on the record about how effective the AESA radar, working with the aircraft’s sensors like the Distributed Aperture System and its data fusion system, will be. So the following is information culled from conversations over the last three months with a wide range of knowledgeable people inside government and the defense industry, as well as retired military and intelligence officers.
As the F-35 flies toward the Chinese coast and several hundred incoming PLAAF J-20s streak toward them in the scenario outlined in the first piece of this series, spoofing (using the enemy’s own systems to deceive him) will be a major part of our attack.
Enemy radar may well show thousands of F-35s and other aircraft heading their way, with stealth cross-sections that appear to match what the Chinese believe is the F-35’s cross section. Only a few hundred of them are real, but the Chinese can’t be certain which are which, forcing them to waste long-range missiles and forcing them to get closer to the US and allied F-35s so they can tell with greater fidelity which ones are real. The Chinese will try and use Infrared Search and Track (IRST) sensors, which have shorter ranges but provide tremendous fidelity in the right weather conditions. But that, of course, renders them more vulnerable to one sensor on the F-35 that even the plane’s critics rarely criticize, the Distributed Aperture System (DAS).
![]()
'A God's Eye View Of The Battlefield:' Gen. Hostage On The F-35 - Breaking Defense
For years, the news about the most expensive conventional weapons system in US history, the F-35 Joint Strike Fighter, has been driven by its enormous cost, design, and schedule screw-ups. The Pentagon and Congress and the public have rarely spoken about what the F-35 would do, how effectively...breakingdefense.com
Uncanny. For a moment I was about to type - "lots of errors in your post. I've made the necessary corrections, sweetie, "but relented for it'd be too much work for my Sabbath.AESA Radar, Cyber And IADS
Here’s an excellent explanation for how we go from radio and radar and military systems that are not connected to the Internet yet remain vulnerable to hacking that I’ve cribbed from my deputy, Sydney Freedberg, from a recent piece he wrote in Breaking Defense about cyberwar. An enemy’s radios and radars are run by computers, so you can transmit signals to hack them. If the enemy’s computers are linked together then your virus can spread throughout that network. The enemy does not have to be connected to the Internet. You just need the enemy’s radios and radar to receive incoming signals – which they have to do in order to function.
So, as a former top intelligence official explained to me about two years ago, the AESA radar’s beams can throw out those zeros and ones to ANY sort of receiver. And an enemy’s radar is a receiver. His radios are receivers. Some of his electronic warfare sensors are also receivers.
But neither Hostage nor many others I spoke with were willing to be specific on the record about how effective the AESA radar, working with the aircraft’s sensors like the Distributed Aperture System and its data fusion system, will be. So the following is information culled from conversations over the last three months with a wide range of knowledgeable people inside government and the defense industry, as well as retired military and intelligence officers.
As the F-35 flies toward the Chinese coast and several hundred incoming PLAAF J-20s streak toward them in the scenario outlined in the first piece of this series, spoofing (using the enemy’s own systems to deceive him) will be a major part of our attack.
Enemy radar may well show thousands of F-35s and other aircraft heading their way, with stealth cross-sections that appear to match what the Chinese believe is the F-35’s cross section. Only a few hundred of them are real, but the Chinese can’t be certain which are which, forcing them to waste long-range missiles and forcing them to get closer to the US and allied F-35s so they can tell with greater fidelity which ones are real. The Chinese will try and use Infrared Search and Track (IRST) sensors, which have shorter ranges but provide tremendous fidelity in the right weather conditions. But that, of course, renders them more vulnerable to one sensor on the F-35 that even the plane’s critics rarely criticize, the Distributed Aperture System (DAS).
![]()
'A God's Eye View Of The Battlefield:' Gen. Hostage On The F-35 - Breaking Defense
For years, the news about the most expensive conventional weapons system in US history, the F-35 Joint Strike Fighter, has been driven by its enormous cost, design, and schedule screw-ups. The Pentagon and Congress and the public have rarely spoken about what the F-35 would do, how effectively...breakingdefense.com
They think they are stronger than the Chinese in cyber warfare, but the opposite will be true.Uncanny. For a moment I was about to type - "lots of errors in your post. I've made the necessary corrections, sweetie, "but relented for it'd be too much work for my Sabbath.
So I'd just leave this here - if I didn't know better, I'd say your write up reads like it's describing SPECTRA , ja?
What do you think? @Picdelamirand-oil
How's the brain doing after 3 of your Rafales were shot down? Too soon? Lol.They think they are stronger than the Chinese in cyber warfare, but the opposite will be true.
No doubt, USA is the best in this domain but India has also formidable cyber and EW tech now. Underestimate us at your peril like what Pakistanis did and found their Gazi egos completely busted by us.How's the brain doing after 3 of your Rafales were shot down? Too soon? Lol.
Our way of fighting is of a higher standard than China and definitely India. PLA is barely in its infancy in kill chain warfare capabilities where the US has perfected kill web of which we're the only military that fights like this which includes Cyber warfare. US will have full cyber domain and complete dominance of the battle space picture and that includes EM realm.
-The goal of the Adapting Cross-Domain Kill-Webs (ACK) program is to provide a decision aid for mission commanders to assist them with rapidly identifying and selecting options for tasking – and retasking – assets within and across organizational boundaries.
Specifically, ACK will assist users with selecting sensors, effectors, and support elements across military domains (space, air, land, surface, subsurface, and cyber) that span the different military Services to deliver desired effects on targets. Instead of limited, monolithic, pre-defined kill chains, these more disaggregated forces can be used to formulate adaptive “kill webs” based on all of the options available.
Adapting Cross-Domain Kill-Webs (ACK)
www.darpa.mil
Well pic-oil was talking about China not you guys.No doubt, USA is the best in this domain but India has also formidable cyber and EW tech now. Underestimate us at your peril like what Pakistanis did and found their Gazi egos completely busted by us.
Very impressive sweetie ! According to DARPA this ACK business was derived from e commerce platforms & is now considered fully implemented.How's the brain doing after 3 of your Rafales were shot down? Too soon? Lol.
Our way of fighting is of a higher standard than China and definitely India. PLA is barely in its infancy in kill chain warfare capabilities where the US has perfected kill web of which we're the only military that fights like this which includes Cyber warfare. US will have full cyber domain and complete dominance of the battle space picture and that includes EM realm.
-The goal of the Adapting Cross-Domain Kill-Webs (ACK) program is to provide a decision aid for mission commanders to assist them with rapidly identifying and selecting options for tasking – and retasking – assets within and across organizational boundaries.
Specifically, ACK will assist users with selecting sensors, effectors, and support elements across military domains (space, air, land, surface, subsurface, and cyber) that span the different military Services to deliver desired effects on targets. Instead of limited, monolithic, pre-defined kill chains, these more disaggregated forces can be used to formulate adaptive “kill webs” based on all of the options available.
Adapting Cross-Domain Kill-Webs (ACK)
www.darpa.mil
So basically what you're suggesting is this e virus like Stuxnet that sweetie's harping about is very difficult to introduce into a Chinese IADS & that it's something which can be done for less sophisticated IADS .> 1st focus shifted from NGAD, F/A-XX to F-35.
> Then focus silently shifted from Stealth aspect to CW. I hope some people realize that Stealth = RAM + RAS + EW + tactics/orientation.
> 6gen is expected to have CW, so i'll talk about it little, as i work along security engineers in DataCenter, who've done certifications like CCNP/IE, CISSP, CompTIA, etc.
Those who can't trust my degree & experience can consult some IT professional or final year tech student in their neighbourhood, social circle.
Those who know coding like C/C++ can refer to book like "Writing TSRs through C" by IITian Mr. Yeshwant Kanetkar.
TSR stands for Terminate & Stay Resident.
View attachment 43419
NOTE - 20 years back I took F2F coaching for C, C++ by him in class of 10x10 students in air-cooled room, in Nagpur, India.
> Is it possible for a fighter jet to have CW - Yes.
> Can any N/w be hacked? - NO. Atleast not until its communication protocol & architecture of computers behind firewall are known.
Just spoofing the pattern of 0s & 1s is not enough.
W/o building's blueprint & sentry guards outside verifying IDs, damaging it from inside is not possible. it would like China, N.Korea trying to get into AREA-51 & some sub-terrainian facility beneath.
The concept of "S/w back door" is NOT really like a backyard door/vent.
The communication channels are not like doors/windows.
These analogies are used for/by unqualified people.
> How devices of different OS talk, like Apple, Android, Windows, Linux, etc? - Just like 2 people of 2 different languages need a common language, similarly a small piece of code known as "device driver" is written for each OS to communicate through common comm. protocols like Ethernet, WiFi, etc.
> What is computer virus? - small malicious piece of code, a TSR which executes then terminates but stays resident in RAM, so it won't appear in GUI of any tool like MS Windows' Resource Monitor, Task Manager, etc. Only special tools, basically anti-virus S/w, looking into RAM & HDD/SSD can detect it.
> What it 1st requirement of coder to write virus? - understand the H/w architecture of target computer like 32/64-bit, OS type, communication protocols like Ethernet, TCP/IP, WiFi to start with.
So when someone writes a TSR in C then he/she already knows the target OS is 32-bit MS Windows for example with Ethernet or WiFi connection.
NOTE - There are numerous civil & military communication protocols. The civil ones can be generic or custom. The military ones are secret.
> How hacking begins?- Unknown devices have to ID themselves to a N/w. The hacking device acts as "imposter" to snoop & spoof.
Below is basic example how a client device connects to N/w by DHCP (Dynamic Host Config Protocol) by DORA process (Discover, Offer, Request, Acknowledge) -
View attachment 43428
> After acting as imposter also the device has to bypass security protocols with encryption & "challenge handshakes" where the server challenges the client with passcode & other ways.
And every communication protocol is made up of layers in a stack like OSI, TCP/IP stack & each layer can have its own security protocols.
View attachment 43430
WiFi uses WEP/WPA/WPA2/WPA3
View attachment 43429
There are entire courses & certifications in CW. So details beyond this may bounce off many people's head.
> Can any aircraft be upgraded to have CW? - Yes, it'll need appropriate computing, electricity, cooling. Higher stand-off range means higher power & cooling. An external EW jamming pod can also have its own propeller driven electricity generator & air/liquid-cooled system. Similarly, a CW pod can also be developed. Actually CW is modern evolution/extension of EW.
> How powerful are avionics computers? - depends on maker, mainframe to average super-computer. They need cooling by air & liquid, like in gaming PCs.
> Will the CW jet need help from remote assets? - A hacker just needs a phone/tab, at max a laptop. Viruses are tiny codes, can be stored in Micro-SD type card. The hacking tools have already made in advance & installed. Either WSO can operate or advanced AI co-pilot can do it.
> Were F-22 & F-35 originally quoted with CW? - At least not in documentaries & other public sources, but may be secretly is a possibility.
But modular H/w & S/w were mentioned which could be updated in future. S/w patch upgrade can be done every few years.
> If originally F-22/35 or any jet didn't have CW, can they be MLUed for it? - Yes, easily & so can any jet like i said above. It all depends on capability of engineers. Even 4.5gen jets can be MLUed for CW with AI.
But remember the capability/education & cost factors of a country/economy.
> Do MLUed F-22/35, NGAD, F/A-XX pose serious CW threat to world? - depends on target nation's education, R&D & the H/w & S/w they use.
If any nation/infrastructure uses foreign H/W &/or S/w then BEWARE.
USA (DARPA) invented Internet & many protocols, OSs, etc & is global market leader in many H/w & S/w including security.
There are dedicated dominating MNCs like
- Cisco, Juniper, Arista, Palo Alto, etc for networking equipments like switches, routers, firewalls, load balancers, etc.
- Intel, AMD, etc for microprocessors. Very few MNCs have very costly Lithography machines to make chips.
- DELL, HP, Hitachi, IBM, etc for servers.
- Apple, MicroSoft, Redhat, VMware, Citrix, etc for OS.
USA also either commands or influences entities like ISOC (Internet society), IETF (Internet Engineering Task Force), IANA (Internet Assigned Numbers Authority), IEEE(Institute of Electrical and Electronics Engineers ), etc.
But Globalization permitted cross-border education, information proliferation. This has cautioned the world of their vulnerabilities & enabled to address them.
Apart from USA & EU, the nations of Russia, China, India also have significantly good S/w engineers since 1990s. China is into chip industry & India is trying to get into it. India has huge IT industry & global CEOs. DRDO has experience in multi-national H/w & s/w.
So these 3 nations or any truly secured nation need their own H/w, S/w & protocols for their govt. offices & military assets.