United State's NGAD & F/A-XX Fighter Programs : Updates and Discussions

He does it on purpose to make punch the screen. All these colors act like kryptonite on me.

I guess he's another one that lives in his own delu... own world.
As per the new brochure/poster by "official" USAF, F-22 is Stealth+ while F-35 being just Stealth. So Raptor beats Lightning II even in that one area where the latter was supposed to have a lead. Time for you and your cronies to throttle back on F-35 hype train, me thinks!
 
Hostage makes it clear F-35 beats the F-22 in stealth.
Hostage is a USAF General who was in charged of F-35 program who has access to classified info of F-35 and F-22 he doesn't have to give the public any RCS numbers if he says the F-35 beats the F-22 in stealth then it beats it in stealth. That's it. He is in the know he saw the numbers so his claim is true.

Are we back to E virus like Stuxnet territory once again , sweetie all because s̶o̶n̶ o̶f̶ G̶o̶d̶ -̶ J̶e̶s̶u̶s̶ Gen Hostage says so ? Remember the massive trouble you got into when you made such absurd claims the first time around ? We asked for evidence then . We're still awaiting it .

How come your butt buddies Generals Bogdan Hostage et al haven't provided you with any evidence of their claims in all the 4 years you've been peddling their bull crap made for Congress testimonies out here ? Coz it's essentially bull crap made for Congress testimonies ??

He does it on purpose to make punch the screen. All these colors act like kryptonite on me.

I guess he's another one that lives in his own delu... own world.
For the love of Ya'hweh & Moshe , it's Sabbath time & you're back online , you pathetic l'il anti semite JINO . Remind me the next time you jump up & down for alleged anti Semitic comments from my end.
 
  • Like
Reactions: Rajput Lion
He does it on purpose to make punch the screen. All these colors act like kryptonite on me.
I guess he's another one that lives in his own delu... own world.
🤦‍♂️:LOL:
> Why're you abusing Indians on Indian forum?
> Do you step into doctor's clinic, medical forums & abuse them also?
> Unfortunately in society, even among real experienced engineers, very few care to discuss on topics like Defence, Aviation. At max they talk on gadgets, bikes, cars. I'm not into cricket, politics, etc. That's why engineers like me have to come to forums like this.
> Out of 1.5 billion Indians, 100s of 1000s of techies, a few forum members could be qualified on various domains. But if you abuse them then IDK what to say further, or do i have to say. 🤦‍♂️
 
  • Like
Reactions: Rajput Lion
Are we back to E virus like Stuxnet territory once again , sweetie all because s̶o̶n̶ o̶f̶ G̶o̶d̶ -̶ J̶e̶s̶u̶s̶ Gen Hostage says so ? Remember the massive trouble you got into when you made such absurd claims the first time around ? We asked for evidence then . We're still awaiting it .

How come your butt buddies Generals Bogdan Hostage et al haven't provided you with any evidence of their claims in all the 4 years you've been peddling their bull crap made for Congress testimonies out here ? Coz it's essentially bull crap made for Congress testimonies ??


Evidence? Are you daft or something? He doesn't need to show classified evidence that the F-35 can attack systems with electronic viruses to satisfy some mumbai boob. See hunny this is how it works when USAF generals who are in the know and have all the classified info of what F-35 and F-22 can do, and they throw us a bone by letting it be known that the F-35 beats the F-22 in stealth or the F-35 has cyber warfare capability, logic dictates that it must be so. Whether you Indians, who consider this kind of tech sorcery, believe it or not is irrelevant. The nations who spend multi $billions on this fighter don't buy hype, bub.

Dassault, frenchies in here and you fanboys claim mighty Rafale's Spectra can do all sorts of wonders when it comes to EW and "active stealth" where's the evidence it can do this cht?!? Oh wait... Nvm. It's ok we don't need evidence the Pakees showed us Rafale's spectra capability claim has always been BS. I mean 0-3 in air combat against pakee flown export J-10's says spectra is BS :ROFLMAO:
 
What is electronic virus?
--The issue of how effective the F-35 would be in a classic dogfight often arises. Gen. Hostage noted during our interview that the F-35 pilot who engages in a dogfight has either made a mistake or been very unlucky. Shooting down other planes using kinetics is only one role of the F-35. Perhaps air forces around the world are going to have to come up with a new honor other than ace to define those who fly the F-35. What should a pilot be awarded for outsmarting the best air defense systems in the world or injecting something like Stuxnet into the enemy’s command and control system? So much of what this aircraft will do has nothing to do with shooting down another pilot that we may need a new term.
-
LANGLEY AFB: If you want to stop a conversation about the F-35 with a military officer or industry expert, then just start talking about its cyber or electronic warfare capabilities.

These are the capabilities that most excite the experts I’ve spoken with because they distinguish the F-35 from previous fighters, giving it what may be unprecedented abilities to confuse the enemy, attack him in new ways through electronics (think Stuxnet), and generally add enormous breadth to what we might call the plane’s conventional strike capabilities.

So I asked Air Force Gen. Mike Hostage, head of Air Combat Command here, about the F-35’s cyber capabilities, mentioning comments by former Air Force Chief of Staff Gen. Norton Schwartz several years ago about the F-35 having the “nascent capability” to attack Integrated Air Defense Systems (known to you and me as surface to air missiles) with cyber weapons.
'A God's Eye View Of The Battlefield:' Gen. Hostage On The F-35 - Breaking Defense Breaking Defense - Defense industry news, analysis and commentary
 
Evidence? Are you daft or something? He doesn't need to show classified evidence that the F-35 can attack systems with electronic viruses to satisfy some mumbai boob.
Who's asking for the details ? We've always maintained the bare bones is enough. For eg the original Stuxnet virus was uploaded onto the network of the Iranian nuclear complex manually . So how exactly are you going about it here ? Unless you think this can be transferred via bluetooth. Which given the kind of intelligence you've displayed out here wouldn't be surprising in the least.

See hunny this is how it works when USAF generals who are in the know and have all the classified info of what F-35 and F-22 can do, and they throw us a bone by letting it be known that the F-35 beats the F-22 in stealth or the F-35 has cyber warfare capability, logic dictates that it must be so.
Yes logic dictates it must be so PROVIDED it is backed by sufficient evidence. We aren't asking for the entire documentation. Just a hint or two. Otherwise this is for the consumption of Congress to authorise more funds or to keep them from probing too deep into the program about its capabilities asking where have all those billions gone ?

While non STEM yokels like you who can't tell potential from kinetic energy or AC from DC current would lap up unquestioningly much like the yokels who pass off for lawmakers in your great country , people with a STEM background will ask questions which if you find uncomfortable or unanswerable , either means you don't understand the subject matter or there is no such thing except tall claims , the explanation for which I've provided earlier.

Whether you Indians, who consider this kind of tech sorcery, believe it or not is irrelevant.

The rules of physics are the same anywhere on earth or does it behave differently in the land of the free & home of the brave.
The nations who spend multi $billions on this fighter don't buy hype, bub.
They didn't get it for the e virus like Stuxnet . That's for sure. If you're claiming otherwise please show us one document from the evaluation of the F-35 by the Swiss or any country confirming this little detail of e virus like Stuxnet in their report.

I'm challenging you right here right now to produce such a document from a foreign source which has evaluated the F-35 since you're claiming this is classified stuff which the US can't share.

By reports from foreign sources I mean just a line or two about this mythical ability of the F-35 to transmit such viruses to infect the C&C of the enemy's IADS.
Dassault, frenchies in here and you fanboys claim mighty Rafale's Spectra can do all sorts of wonders when it comes to EW and "active stealth" where's the evidence it can do this cht?!?

They've proved it through extensive documentation out here. Feel free to refresh your memory citing those references to challenge them . I'm not here to hold brief for the Rafales.

Oh wait... Nvm. It's ok we don't need evidence the Pakees showed us Rafale's spectra capability claim has always been BS. I mean 0-3 in air combat against pakee flown export J-10's says spectra is BS :ROFLMAO:
The Paxtanis are pathological liars. Here's your own man Richard Clarke ex State Dept , NSC & DoD saying so .


Secondly I'd be a little more humble & circumspect about any other make of Fighters especially if my own frontline FAs got taken down by a group of goat phuckers & camel humpers & that too 2 SH while the F-35s & F-16s had a narrow escape in the aptly named Operation Rough Rider where the USN got ridden roughly.

You think they named the operation the way they did on purpose ? I'm beginning to think so too. After all the rough riding you guys got in Afghanistan & now Yemen with Eye Raq in between you seem to a certain fetish for being violated & then running out of the theatre of operations with your pants around your ankles claiming victory. This is the third instance already since the new millennium began. Don't even get me started on your performance of the latter half a century last millenium.

Say what happened to that e virus like Stuxnet in Operation Rough Rider ? Why didn't you use it there , Ja ? 🤣
 
--The issue of how effective the F-35 would be in a classic dogfight often arises. Gen. Hostage noted during our interview that the F-35 pilot who engages in a dogfight has either made a mistake or been very unlucky. Shooting down other planes using kinetics is only one role of the F-35. Perhaps air forces around the world are going to have to come up with a new honor other than ace to define those who fly the F-35. What should a pilot be awarded for outsmarting the best air defense systems in the world or injecting something like Stuxnet into the enemy’s command and control system? So much of what this aircraft will do has nothing to do with shooting down another pilot that we may need a new term.
-
LANGLEY AFB: If you want to stop a conversation about the F-35 with a military officer or industry expert, then just start talking about its cyber or electronic warfare capabilities.

These are the capabilities that most excite the experts I’ve spoken with because they distinguish the F-35 from previous fighters, giving it what may be unprecedented abilities to confuse the enemy, attack him in new ways through electronics (think Stuxnet), and generally add enormous breadth to what we might call the plane’s conventional strike capabilities.

So I asked Air Force Gen. Mike Hostage, head of Air Combat Command here, about the F-35’s cyber capabilities, mentioning comments by former Air Force Chief of Staff Gen. Norton Schwartz several years ago about the F-35 having the “nascent capability” to attack Integrated Air Defense Systems (known to you and me as surface to air missiles) with cyber weapons.
'A God's Eye View Of The Battlefield:' Gen. Hostage On The F-35 - Breaking Defense Breaking Defense - Defense industry news, analysis and commentary

The F-35 is unlikely to carry CW hardware of its own. It likely acts as a relay for Compass Call with cyber payloads delivered from the Compass Call's Suter network. The F-35 can neither carry Suter nor power it. CW also needs a crew working on specific tasks to create the payload.
 
The F-35 is unlikely to carry CW hardware of its own. It likely acts as a relay for Compass Call with cyber payloads delivered from the Compass Call's Suter network. The F-35 can neither carry Suter nor power it. CW also needs a crew working on specific tasks to create the payload.
AESA Radar, Cyber And IADS

Here’s an excellent explanation for how we go from radio and radar and military systems that are not connected to the Internet yet remain vulnerable to hacking that I’ve cribbed from my deputy, Sydney Freedberg, from a recent piece he wrote in Breaking Defense about cyberwar. An enemy’s radios and radars are run by computers, so you can transmit signals to hack them. If the enemy’s computers are linked together then your virus can spread throughout that network. The enemy does not have to be connected to the Internet. You just need the enemy’s radios and radar to receive incoming signals – which they have to do in order to function.

So, as a former top intelligence official explained to me about two years ago, the AESA radar’s beams can throw out those zeros and ones to ANY sort of receiver. And an enemy’s radar is a receiver. His radios are receivers. Some of his electronic warfare sensors are also receivers.

But neither Hostage nor many others I spoke with were willing to be specific on the record about how effective the AESA radar, working with the aircraft’s sensors like the Distributed Aperture System and its data fusion system, will be. So the following is information culled from conversations over the last three months with a wide range of knowledgeable people inside government and the defense industry, as well as retired military and intelligence officers.

As the F-35 flies toward the Chinese coast and several hundred incoming PLAAF J-20s streak toward them in the scenario outlined in the first piece of this series, spoofing (using the enemy’s own systems to deceive him) will be a major part of our attack.

Enemy radar may well show thousands of F-35s and other aircraft heading their way, with stealth cross-sections that appear to match what the Chinese believe is the F-35’s cross section. Only a few hundred of them are real, but the Chinese can’t be certain which are which, forcing them to waste long-range missiles and forcing them to get closer to the US and allied F-35s so they can tell with greater fidelity which ones are real. The Chinese will try and use Infrared Search and Track (IRST) sensors, which have shorter ranges but provide tremendous fidelity in the right weather conditions. But that, of course, renders them more vulnerable to one sensor on the F-35 that even the plane’s critics rarely criticize, the Distributed Aperture System (DAS).
 
AESA Radar, Cyber And IADS

Here’s an excellent explanation for how we go from radio and radar and military systems that are not connected to the Internet yet remain vulnerable to hacking that I’ve cribbed from my deputy, Sydney Freedberg, from a recent piece he wrote in Breaking Defense about cyberwar. An enemy’s radios and radars are run by computers, so you can transmit signals to hack them. If the enemy’s computers are linked together then your virus can spread throughout that network. The enemy does not have to be connected to the Internet. You just need the enemy’s radios and radar to receive incoming signals – which they have to do in order to function.

So, as a former top intelligence official explained to me about two years ago, the AESA radar’s beams can throw out those zeros and ones to ANY sort of receiver. And an enemy’s radar is a receiver. His radios are receivers. Some of his electronic warfare sensors are also receivers.

But neither Hostage nor many others I spoke with were willing to be specific on the record about how effective the AESA radar, working with the aircraft’s sensors like the Distributed Aperture System and its data fusion system, will be. So the following is information culled from conversations over the last three months with a wide range of knowledgeable people inside government and the defense industry, as well as retired military and intelligence officers.

As the F-35 flies toward the Chinese coast and several hundred incoming PLAAF J-20s streak toward them in the scenario outlined in the first piece of this series, spoofing (using the enemy’s own systems to deceive him) will be a major part of our attack.

Enemy radar may well show thousands of F-35s and other aircraft heading their way, with stealth cross-sections that appear to match what the Chinese believe is the F-35’s cross section. Only a few hundred of them are real, but the Chinese can’t be certain which are which, forcing them to waste long-range missiles and forcing them to get closer to the US and allied F-35s so they can tell with greater fidelity which ones are real. The Chinese will try and use Infrared Search and Track (IRST) sensors, which have shorter ranges but provide tremendous fidelity in the right weather conditions. But that, of course, renders them more vulnerable to one sensor on the F-35 that even the plane’s critics rarely criticize, the Distributed Aperture System (DAS).

Yeah, so that's what I'm talking about. The F-35 will act as a relay to send out those zeroes and ones.

Just that those zeroes and ones, the cyber payload, will have to come from either ground control or Compass Call.

First, you need SIGINT systems to pick up vulnerabilities. That's done by Rivet Joint, the F-35, satellites etc. That data is sent to cyber control or Compass Call, depending on the volume of data. Then a whole bunch of people with access to room-sized supercomputers create the payload and that data is then retransmitted through the Compass Call.

Once the F-35s gets its B4 capabilities, it should be able to transmit such payloads.

If you are assuming the F-35 and its pilot will create the payload by itself, then that's like assuming the pilot can also manufacture an AMRAAM while flying. You need an army of techs to write and compile programs before the payload is generated. The F-35 pilot is way too much of a dumba88 for that, he will never have the tools or training for it. And this doesn't happen in real time either. It may take days, weeks, or months. Stuxnet took years to prepare for example.
 
AESA Radar, Cyber And IADS

Here’s an excellent explanation for how we go from radio and radar and military systems that are not connected to the Internet yet remain vulnerable to hacking that I’ve cribbed from my deputy, Sydney Freedberg, from a recent piece he wrote in Breaking Defense about cyberwar. An enemy’s radios and radars are run by computers, so you can transmit signals to hack them. If the enemy’s computers are linked together then your virus can spread throughout that network. The enemy does not have to be connected to the Internet. You just need the enemy’s radios and radar to receive incoming signals – which they have to do in order to function.

So, as a former top intelligence official explained to me about two years ago, the AESA radar’s beams can throw out those zeros and ones to ANY sort of receiver. And an enemy’s radar is a receiver. His radios are receivers. Some of his electronic warfare sensors are also receivers.

But neither Hostage nor many others I spoke with were willing to be specific on the record about how effective the AESA radar, working with the aircraft’s sensors like the Distributed Aperture System and its data fusion system, will be. So the following is information culled from conversations over the last three months with a wide range of knowledgeable people inside government and the defense industry, as well as retired military and intelligence officers.

As the F-35 flies toward the Chinese coast and several hundred incoming PLAAF J-20s streak toward them in the scenario outlined in the first piece of this series, spoofing (using the enemy’s own systems to deceive him) will be a major part of our attack.

Enemy radar may well show thousands of F-35s and other aircraft heading their way, with stealth cross-sections that appear to match what the Chinese believe is the F-35’s cross section. Only a few hundred of them are real, but the Chinese can’t be certain which are which, forcing them to waste long-range missiles and forcing them to get closer to the US and allied F-35s so they can tell with greater fidelity which ones are real. The Chinese will try and use Infrared Search and Track (IRST) sensors, which have shorter ranges but provide tremendous fidelity in the right weather conditions. But that, of course, renders them more vulnerable to one sensor on the F-35 that even the plane’s critics rarely criticize, the Distributed Aperture System (DAS).
Uncanny. For a moment I was about to type - "lots of errors in your post. I've made the necessary corrections, sweetie, "but relented for it'd be too much work for my Sabbath.

So I'd just leave this here - if I didn't know better, I'd say your write up reads like it's describing SPECTRA , ja?

What do you think? @Picdelamirand-oil
 
  • Like
Reactions: Rajput Lion
Uncanny. For a moment I was about to type - "lots of errors in your post. I've made the necessary corrections, sweetie, "but relented for it'd be too much work for my Sabbath.

So I'd just leave this here - if I didn't know better, I'd say your write up reads like it's describing SPECTRA , ja?

What do you think? @Picdelamirand-oil
They think they are stronger than the Chinese in cyber warfare, but the opposite will be true.
 
  • Like
Reactions: _Anonymous_
They think they are stronger than the Chinese in cyber warfare, but the opposite will be true.
How's the brain doing after 3 of your Rafales were shot down? Too soon? Lol.

Our way of fighting is of a higher standard than China and definitely India. PLA is barely in its infancy in kill chain warfare capabilities where the US has perfected kill web of which we're the only military that fights like this which includes Cyber warfare. US will have full cyber domain and complete dominance of the battle space picture and that includes EM realm.


-The goal of the Adapting Cross-Domain Kill-Webs (ACK) program is to provide a decision aid for mission commanders to assist them with rapidly identifying and selecting options for tasking – and retasking – assets within and across organizational boundaries.

Specifically, ACK will assist users with selecting sensors, effectors, and support elements across military domains (space, air, land, surface, subsurface, and cyber) that span the different military Services to deliver desired effects on targets. Instead of limited, monolithic, pre-defined kill chains, these more disaggregated forces can be used to formulate adaptive “kill webs” based on all of the options available.
 
  • Like
Reactions: Rajput Lion
How's the brain doing after 3 of your Rafales were shot down? Too soon? Lol.

Our way of fighting is of a higher standard than China and definitely India. PLA is barely in its infancy in kill chain warfare capabilities where the US has perfected kill web of which we're the only military that fights like this which includes Cyber warfare. US will have full cyber domain and complete dominance of the battle space picture and that includes EM realm.


-The goal of the Adapting Cross-Domain Kill-Webs (ACK) program is to provide a decision aid for mission commanders to assist them with rapidly identifying and selecting options for tasking – and retasking – assets within and across organizational boundaries.

Specifically, ACK will assist users with selecting sensors, effectors, and support elements across military domains (space, air, land, surface, subsurface, and cyber) that span the different military Services to deliver desired effects on targets. Instead of limited, monolithic, pre-defined kill chains, these more disaggregated forces can be used to formulate adaptive “kill webs” based on all of the options available.
No doubt, USA is the best in this domain but India has also formidable cyber and EW tech now. Underestimate us at your peril like what Pakistanis did and found their Gazi egos completely busted by us.
 
How's the brain doing after 3 of your Rafales were shot down? Too soon? Lol.

Our way of fighting is of a higher standard than China and definitely India. PLA is barely in its infancy in kill chain warfare capabilities where the US has perfected kill web of which we're the only military that fights like this which includes Cyber warfare. US will have full cyber domain and complete dominance of the battle space picture and that includes EM realm.


-The goal of the Adapting Cross-Domain Kill-Webs (ACK) program is to provide a decision aid for mission commanders to assist them with rapidly identifying and selecting options for tasking – and retasking – assets within and across organizational boundaries.

Specifically, ACK will assist users with selecting sensors, effectors, and support elements across military domains (space, air, land, surface, subsurface, and cyber) that span the different military Services to deliver desired effects on targets. Instead of limited, monolithic, pre-defined kill chains, these more disaggregated forces can be used to formulate adaptive “kill webs” based on all of the options available.
Very impressive sweetie ! According to DARPA this ACK business was derived from e commerce platforms & is now considered fully implemented.

Which still doesn't answer the e virus like Stuxnet conundrum as well as poses the question - why wasn't all this successful against the rag tag goat phuckers & camel humpers militia also known as the Houthis ?

How come the Operation Rough Rider ended up with the USN being roughly ridden ? It's a genuine question .
 
> 1st focus shifted from NGAD, F/A-XX to F-35.
> Then focus silently shifted from Stealth aspect to CW. I hope some people realize that Stealth = RAM + RAS + EW + tactics/orientation.

> 6gen is expected to have CW, so i'll talk about it little, as i work along security engineers in DataCenter, who've done certifications like CCNP/IE, CISSP, CompTIA, etc.
Those who can't trust my degree & experience can consult some IT professional or final year tech student in their neighbourhood, social circle.
Those who know coding like C/C++ can refer to book like "Writing TSRs through C" by IITian Mr. Yeshwant Kanetkar.
TSR stands for Terminate & Stay Resident.
1747547345635.png
NOTE - 20 years back I took F2F coaching for C, C++ by him in class of 10x10 students in air-cooled room, in Nagpur, India.


> Is it possible for a fighter jet to have CW - Yes.

> Can any N/w be hacked? - NO. Atleast not until its communication protocol & architecture of computers behind firewall are known.
Just spoofing the pattern of 0s & 1s is not enough.
W/o building's blueprint & sentry guards outside verifying IDs, damaging it from inside is not possible. it would like China, N.Korea trying to get into AREA-51 & some sub-terrainian facility beneath.:alien:👾🤦‍♂️:LOL:
The concept of "S/w back door" is NOT really like a backyard door/vent.
The communication channels are not like doors/windows.
These analogies are used for/by unqualified people.

> How devices of different OS talk, like Apple, Android, Windows, Linux, etc? - Just like 2 people of 2 different languages need a common language, similarly a small piece of code known as "device driver" is written for each OS to communicate through common comm. protocols like Ethernet, WiFi, etc.

> What is computer virus? - small malicious piece of code, a TSR which executes then terminates but stays resident in RAM, so it won't appear in GUI of any tool like MS Windows' Resource Monitor, Task Manager, etc. Only special tools, basically anti-virus S/w, looking into RAM & HDD/SSD can detect it.

> What it 1st requirement of coder to write virus? - understand the H/w architecture of target computer like 32/64-bit, OS type, communication protocols like Ethernet, TCP/IP, WiFi to start with.
So when someone writes a TSR in C then he/she already knows the target OS is 32-bit MS Windows for example with Ethernet or WiFi connection.
NOTE - There are numerous civil & military communication protocols. The civil ones can be generic or custom. The military ones are secret.

> How hacking begins?- Unknown devices have to ID themselves to a N/w. The hacking device acts as "imposter" to snoop & spoof.
Below is basic example how a client device connects to N/w by DHCP (Dynamic Host Config Protocol) by DORA process (Discover, Offer, Request, Acknowledge) -
1747548763029.png

> After acting as imposter also the device has to bypass security protocols with encryption & "challenge handshakes" where the server challenges the client with passcode & other ways.
And every communication protocol is made up of layers in a stack like OSI, TCP/IP stack & each layer can have its own security protocols.

1747551907640.png

WiFi uses WEP/WPA/WPA2/WPA3

1747550184967.png


There are entire courses & certifications in CW. So details beyond this may bounce off many people's head.

> Can any aircraft be upgraded to have CW? - Yes, it'll need appropriate computing, electricity, cooling. Higher stand-off range means higher power & cooling. An external EW jamming pod can also have its own propeller driven electricity generator & air/liquid-cooled system. Similarly, a CW pod can also be developed. Actually CW is modern evolution/extension of EW.

> How powerful are avionics computers? - depends on maker, mainframe to average super-computer. They need cooling by air & liquid, like in gaming PCs.

> Will the CW jet need help from remote assets? - A hacker just needs a phone/tab, at max a laptop. Viruses are tiny codes, can be stored in Micro-SD type card. The hacking tools have already made in advance & installed. Either WSO can operate or advanced AI co-pilot can do it.

> Were F-22 & F-35 originally quoted with CW? - At least not in documentaries & other public sources, but may be secretly is a possibility.
But modular H/w & S/w were mentioned which could be updated in future. S/w patch upgrade can be done every few years.

> If originally F-22/35 or any jet didn't have CW, can they be MLUed for it? - Yes, easily & so can any jet like i said above. It all depends on capability of engineers. Even 4.5gen jets can be MLUed for CW with AI.
But remember the capability/education & cost factors of a country/economy.

> Do MLUed F-22/35, NGAD, F/A-XX pose serious CW threat to world? - depends on target nation's education, R&D & the H/w & S/w they use.
If any nation/infrastructure uses foreign H/W &/or S/w then BEWARE.⚠️🚨

USA (DARPA) invented Internet & many protocols, OSs, etc & is global market leader in many H/w & S/w including security.
There are dedicated dominating MNCs like
- Cisco, Juniper, Arista, Palo Alto, etc for networking equipments like switches, routers, firewalls, load balancers, etc.
- Intel, AMD, etc for microprocessors. Very few MNCs have very costly Lithography machines to make chips.
- DELL, HP, Hitachi, IBM, etc for servers.
- Apple, MicroSoft, Redhat, VMware, Citrix, etc for OS.
USA also either commands or influences entities like ISOC (Internet society), IETF (Internet Engineering Task Force), IANA (Internet Assigned Numbers Authority), IEEE(Institute of Electrical and Electronics Engineers ), etc.

But Globalization permitted cross-border education, information proliferation. This has cautioned the world of their vulnerabilities & enabled to address them.

Apart from USA & EU, the nations of Russia, China, India also have significantly good S/w engineers since 1990s. China is into chip industry & India is trying to get into it. India has huge IT industry & global CEOs. DRDO has experience in multi-national H/w & s/w.
So these 3 nations or any truly secured nation need their own H/w, S/w & protocols for their govt. offices & military assets.
 
  • Like
Reactions: _Anonymous_
> 1st focus shifted from NGAD, F/A-XX to F-35.
> Then focus silently shifted from Stealth aspect to CW. I hope some people realize that Stealth = RAM + RAS + EW + tactics/orientation.

> 6gen is expected to have CW, so i'll talk about it little, as i work along security engineers in DataCenter, who've done certifications like CCNP/IE, CISSP, CompTIA, etc.
Those who can't trust my degree & experience can consult some IT professional or final year tech student in their neighbourhood, social circle.
Those who know coding like C/C++ can refer to book like "Writing TSRs through C" by IITian Mr. Yeshwant Kanetkar.
TSR stands for Terminate & Stay Resident.
View attachment 43419
NOTE - 20 years back I took F2F coaching for C, C++ by him in class of 10x10 students in air-cooled room, in Nagpur, India.


> Is it possible for a fighter jet to have CW - Yes.

> Can any N/w be hacked? - NO. Atleast not until its communication protocol & architecture of computers behind firewall are known.
Just spoofing the pattern of 0s & 1s is not enough.
W/o building's blueprint & sentry guards outside verifying IDs, damaging it from inside is not possible. it would like China, N.Korea trying to get into AREA-51 & some sub-terrainian facility beneath.:alien:👾🤦‍♂️:LOL:
The concept of "S/w back door" is NOT really like a backyard door/vent.
The communication channels are not like doors/windows.
These analogies are used for/by unqualified people.

> How devices of different OS talk, like Apple, Android, Windows, Linux, etc? - Just like 2 people of 2 different languages need a common language, similarly a small piece of code known as "device driver" is written for each OS to communicate through common comm. protocols like Ethernet, WiFi, etc.

> What is computer virus? - small malicious piece of code, a TSR which executes then terminates but stays resident in RAM, so it won't appear in GUI of any tool like MS Windows' Resource Monitor, Task Manager, etc. Only special tools, basically anti-virus S/w, looking into RAM & HDD/SSD can detect it.

> What it 1st requirement of coder to write virus? - understand the H/w architecture of target computer like 32/64-bit, OS type, communication protocols like Ethernet, TCP/IP, WiFi to start with.
So when someone writes a TSR in C then he/she already knows the target OS is 32-bit MS Windows for example with Ethernet or WiFi connection.
NOTE - There are numerous civil & military communication protocols. The civil ones can be generic or custom. The military ones are secret.

> How hacking begins?- Unknown devices have to ID themselves to a N/w. The hacking device acts as "imposter" to snoop & spoof.
Below is basic example how a client device connects to N/w by DHCP (Dynamic Host Config Protocol) by DORA process (Discover, Offer, Request, Acknowledge) -
View attachment 43428

> After acting as imposter also the device has to bypass security protocols with encryption & "challenge handshakes" where the server challenges the client with passcode & other ways.
And every communication protocol is made up of layers in a stack like OSI, TCP/IP stack & each layer can have its own security protocols.

View attachment 43430

WiFi uses WEP/WPA/WPA2/WPA3

View attachment 43429


There are entire courses & certifications in CW. So details beyond this may bounce off many people's head.

> Can any aircraft be upgraded to have CW? - Yes, it'll need appropriate computing, electricity, cooling. Higher stand-off range means higher power & cooling. An external EW jamming pod can also have its own propeller driven electricity generator & air/liquid-cooled system. Similarly, a CW pod can also be developed. Actually CW is modern evolution/extension of EW.

> How powerful are avionics computers? - depends on maker, mainframe to average super-computer. They need cooling by air & liquid, like in gaming PCs.

> Will the CW jet need help from remote assets? - A hacker just needs a phone/tab, at max a laptop. Viruses are tiny codes, can be stored in Micro-SD type card. The hacking tools have already made in advance & installed. Either WSO can operate or advanced AI co-pilot can do it.

> Were F-22 & F-35 originally quoted with CW? - At least not in documentaries & other public sources, but may be secretly is a possibility.
But modular H/w & S/w were mentioned which could be updated in future. S/w patch upgrade can be done every few years.

> If originally F-22/35 or any jet didn't have CW, can they be MLUed for it? - Yes, easily & so can any jet like i said above. It all depends on capability of engineers. Even 4.5gen jets can be MLUed for CW with AI.
But remember the capability/education & cost factors of a country/economy.

> Do MLUed F-22/35, NGAD, F/A-XX pose serious CW threat to world? - depends on target nation's education, R&D & the H/w & S/w they use.
If any nation/infrastructure uses foreign H/W &/or S/w then BEWARE.⚠️🚨

USA (DARPA) invented Internet & many protocols, OSs, etc & is global market leader in many H/w & S/w including security.
There are dedicated dominating MNCs like
- Cisco, Juniper, Arista, Palo Alto, etc for networking equipments like switches, routers, firewalls, load balancers, etc.
- Intel, AMD, etc for microprocessors. Very few MNCs have very costly Lithography machines to make chips.
- DELL, HP, Hitachi, IBM, etc for servers.
- Apple, MicroSoft, Redhat, VMware, Citrix, etc for OS.
USA also either commands or influences entities like ISOC (Internet society), IETF (Internet Engineering Task Force), IANA (Internet Assigned Numbers Authority), IEEE(Institute of Electrical and Electronics Engineers ), etc.

But Globalization permitted cross-border education, information proliferation. This has cautioned the world of their vulnerabilities & enabled to address them.

Apart from USA & EU, the nations of Russia, China, India also have significantly good S/w engineers since 1990s. China is into chip industry & India is trying to get into it. India has huge IT industry & global CEOs. DRDO has experience in multi-national H/w & s/w.
So these 3 nations or any truly secured nation need their own H/w, S/w & protocols for their govt. offices & military assets.
So basically what you're suggesting is this e virus like Stuxnet that sweetie's harping about is very difficult to introduce into a Chinese IADS & that it's something which can be done for less sophisticated IADS .

Please note sweetie . Learn something constructive from the above write up or come up with an informed rebuttal instead of making a nuisance of yourself out here. Ja ? @Innominate