
{"id":4744,"date":"2019-06-10T20:08:26","date_gmt":"2019-06-10T20:08:26","guid":{"rendered":"http:\/\/blogs.plymouth.ac.uk\/dcss\/?p=4744"},"modified":"2019-06-10T20:08:26","modified_gmt":"2019-06-10T20:08:26","slug":"china-knows-all-about-ths-f-35-and-f-22","status":"publish","type":"post","link":"https:\/\/blogs.plymouth.ac.uk\/dcss\/2019\/06\/10\/china-knows-all-about-ths-f-35-and-f-22\/","title":{"rendered":"CHINA KNOWS ALL ABOUT THS F-35 AND F-22"},"content":{"rendered":"<p><a href=\"http:\/\/blogs.plymouth.ac.uk\/dcss\/wp-content\/uploads\/sites\/50\/2015\/09\/xlarge_F-22_Raptor-1.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-246\" src=\"http:\/\/blogs.plymouth.ac.uk\/dcss\/wp-content\/uploads\/sites\/50\/2015\/09\/xlarge_F-22_Raptor-1-1024x682.jpg\" alt=\"\" width=\"560\" height=\"373\" srcset=\"https:\/\/blogs.plymouth.ac.uk\/dcss\/wp-content\/uploads\/sites\/50\/2015\/09\/xlarge_F-22_Raptor-1-1024x682.jpg 1024w, https:\/\/blogs.plymouth.ac.uk\/dcss\/wp-content\/uploads\/sites\/50\/2015\/09\/xlarge_F-22_Raptor-1-300x200.jpg 300w, https:\/\/blogs.plymouth.ac.uk\/dcss\/wp-content\/uploads\/sites\/50\/2015\/09\/xlarge_F-22_Raptor-1-560x373.jpg 560w, https:\/\/blogs.plymouth.ac.uk\/dcss\/wp-content\/uploads\/sites\/50\/2015\/09\/xlarge_F-22_Raptor-1-260x173.jpg 260w, https:\/\/blogs.plymouth.ac.uk\/dcss\/wp-content\/uploads\/sites\/50\/2015\/09\/xlarge_F-22_Raptor-1-160x107.jpg 160w, https:\/\/blogs.plymouth.ac.uk\/dcss\/wp-content\/uploads\/sites\/50\/2015\/09\/xlarge_F-22_Raptor-1.jpg 1280w\" sizes=\"auto, (max-width: 560px) 100vw, 560px\" \/><\/a><\/p>\n<p>Source: National Interest<\/p>\n<p>By TNI Staff<\/p>\n<p>In some ways, the damage is already done. Beijing has gained reams of technical information on advanced U.S. weapons system such as the F-22 and F-35.<\/p>\n<p>\u201cAdversaries will continue to use cyber operations to undermine U.S. military and commercial advantage by hacking into U.S. defense industry and commercial enterprises in pursuit of scientific, technical, and business information,\u201d Coats stated.<\/p>\n<p>\u201cExamples include theft of data on the F-35 Joint Strike Fighter, the F-22 Raptor fighter jet, and the MV-22 Osprey. In addition, adversaries often target personal accounts of government officials and their private-sector counterparts. This espionage reduces cost and accelerates the development of foreign weapon systems, enables foreign reverse-engineering and countermeasures development, and undermines U.S. military, technological, and commercial advantage.\u201d<\/p>\n<p>Russia and China will likely use their cyber-warfare and cyber-espionage capabilities to challenge the United States into the foreseeable future.<\/p>\n<p>(This first appeared in 2017 and is being republished due to reader interest.)<\/p>\n<p>Do You Know What Happened On This Day?<\/p>\n<p>Both nations possess highly capable forces that can steal information or attack American infrastructure. Indeed, in some cases, highly classified data on some of the United States\u2019 most advanced military hardware\u2014including the Lockheed Martin F-22 Raptor, F-35 Joint Strike Fighters and Bell-Boeing V-22 Osprey\u2014is in now in the hands of foreign adversaries as result of cyber-espionage.<\/p>\n<p>Read more at: https:\/\/nationalinterest.org\/blog\/buzz\/china-knows-all-about-f-35-and-f-22-thanks-data-it-stole-61912<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Source: National Interest By TNI Staff In some ways, the damage is already done. Beijing has gained reams of technical information on advanced U.S. weapons system such as the F-22 and F-35. \u201cAdversaries will continue to use cyber operations to undermine U.S. military and commercial advantage by hacking into U.S. defense industry and commercial enterprises&hellip; <a class=\"more-link\" href=\"https:\/\/blogs.plymouth.ac.uk\/dcss\/2019\/06\/10\/china-knows-all-about-ths-f-35-and-f-22\/\">Continue reading <span class=\"screen-reader-text\">CHINA KNOWS ALL ABOUT THS F-35 AND F-22<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":246,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-4744","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-defence-industry","entry"],"_links":{"self":[{"href":"https:\/\/blogs.plymouth.ac.uk\/dcss\/wp-json\/wp\/v2\/posts\/4744","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.plymouth.ac.uk\/dcss\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.plymouth.ac.uk\/dcss\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.plymouth.ac.uk\/dcss\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.plymouth.ac.uk\/dcss\/wp-json\/wp\/v2\/comments?post=4744"}],"version-history":[{"count":1,"href":"https:\/\/blogs.plymouth.ac.uk\/dcss\/wp-json\/wp\/v2\/posts\/4744\/revisions"}],"predecessor-version":[{"id":4745,"href":"https:\/\/blogs.plymouth.ac.uk\/dcss\/wp-json\/wp\/v2\/posts\/4744\/revisions\/4745"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blogs.plymouth.ac.uk\/dcss\/wp-json\/wp\/v2\/media\/246"}],"wp:attachment":[{"href":"https:\/\/blogs.plymouth.ac.uk\/dcss\/wp-json\/wp\/v2\/media?parent=4744"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.plymouth.ac.uk\/dcss\/wp-json\/wp\/v2\/categories?post=4744"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.plymouth.ac.uk\/dcss\/wp-json\/wp\/v2\/tags?post=4744"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}