The latest jet fighter F-35 can be destroyed without a single shot

85

Helmet F-35 provides an overview of augmented reality, which is served by six cameras located on the body of the aircraft. Thanks to this, the pilot can look to any point of the cockpit, and instead of seeing the interior of the aircraft, directly through the cameras, observe what is happening outside.

This computer performance is completely controlled by a computer system called ALIS.



The pilot demonstrates ALIS.

According to the American media, ALIS “is very similar to a laptop computer, and the pilot carries him into the plane, where he inserts the device into a special hole located next to him in the cabin. The device contains all the information about the mission to which it flies. The servers that manage all of these programs take up space approximately equal to the size of the shipping container.

This is a very tempting target for hackers. If your opponents can crack all the programs that control [the mission], then they will essentially destroy the plane. And all this without a single shot. "

Thus, the ALIS system seems to have been given too much power over the F-35. For example, ALIS is capable of landing an aircraft for an indefinite period in case it detects any problems in the aircraft.

If hackers succeed in penetrating the network on which ALIS depends, it is quite possible that they will be able to disable the entire fleet of F-35. This would make the plane, the most expensive combat equipment complex, completely useless.
Our news channels

Subscribe and stay up to date with the latest news and the most important events of the day.

85 comments
Information
Dear reader, to leave comments on the publication, you must sign in.
  1. StrateG
    -5
    27 February 2014 18: 10
    The Americans, of course, are a "smart" country, but I can admit such a thing ... just count it, destroy the computers and the skiff of the USA army
    1. +62
      27 February 2014 18: 18
      Quote from the article: "If hackers manage to penetrate the network on which ALIS depends, it is quite possible that they could disable the entire F-35 fleet. This would render the aircraft, the most expensive system of military equipment, completely useless."
      ================================================== ===================
      If yes ...
      Do not think that American aviation engineers are so asses. Well, when someone breaks into this system, then you can talk, and so, it's just an idle talk. Nuclear weapons control systems are equipped with a much larger number of military servers and computers, but the nuclear war through the fault of hackers has not yet begun! I am not a supporter of stupid ur-patriotism. Enemy is better to evaluate adequately!
      1. +11
        27 February 2014 18: 21
        The best way of sabotage is for a person like SNOWDEN to work on this network — he will do all the work instead of the Russian Air Force quickly and accurately and save us billions of rubles.
        1. upasika1918
          +9
          27 February 2014 19: 07
          The Snowden man must sit in the Oval Office.
          1. -1
            28 February 2014 08: 14
            he is already sitting there
            states are falling more and more.
      2. +2
        27 February 2014 18: 33
        Quote: GSH-18
        So when someone breaks into this system, then you can talk


        Do you already have such a sticker there?
      3. Fedya
        -1
        27 February 2014 22: 02
        It is certainly so! But, let’s remember how the Jews cut down the Bushehr nuclear power plant! So everything can be, and most likely will be!
      4. avg
        +6
        27 February 2014 23: 06
        Quote: GSH-18
        I am not a supporter of stupid ur-patriotism. Enemy is better to evaluate adequately!

        So do I. But the axiom that says: "What one person has created, another can always break," has not yet been canceled.
        Conclusion: There is work to do wink
        1. SSR
          0
          28 February 2014 00: 34
          Quote: avg
          Quote: GSH-18
          I am not a supporter of stupid ur-patriotism. Enemy is better to evaluate adequately!

          So do I. But the axiom that says: "What one person has created, another can always break," has not yet been canceled.
          Conclusion: There is work to do wink

          Iran has already demonstrated a "planted" UAV))) so the F-35 is not a panacea.
      5. -1
        28 February 2014 06: 50
        if you shy away a high-altitude nuclear explosion above the territory of the enemy, on the RS-20 it seems like a monoblock part of 20Mt is provided, then they will not fly anywhere and will not float
      6. -1
        28 February 2014 07: 55
        Quote: GSH-18
        So when someone breaks into this system, then you can talk, and so, it's just an idle talk

        The trick is that if something can be done, then someone will someday do it. And at the most inopportune moment.
    2. Salamander
      -1
      27 February 2014 18: 19
      That is, they can only fight with monkeys laughing The technique is too much developed ...
      1. Phase
        +6
        27 February 2014 18: 30
        Quote: Salamander
        That is, they can only fight with monkeys laughing. The technique is too developed ...

        Instead of underestimating the enemy, it is better to take a closer look at the new car. Yes, her birth is not easy, but this is not at all a reason for neglect and hatred.

        , and even written illiterate. One quote is enough;

        "This performance The computer is fully controlled by a computer system called ALIS"

        About nothing
        1. +4
          27 February 2014 19: 08
          Quote: Phase
          and even written illiterate. One quote is enough;

          "This performance The computer is fully controlled by a computer system called ALIS"

          About nothing


          I think the translation was taken from the English-language news.
          1. +6
            27 February 2014 20: 01
            Quote: Lord of the Sith
            Quote: Phase
            and even written illiterate. One quote is enough;

            "This performance The computer is fully controlled by a computer system called ALIS"

            About nothing


            I think the translation was taken from the English-language news.


            I will not be surprised, they also have their own "all-spreading" laughing
            1. +3
              27 February 2014 21: 06
              Quote: And Us Rat
              I will not be surprised, they also have their own "all-spreading"

              The machinations of Northrop Grumman, McDonnell Douglas.
              1. +2
                27 February 2014 22: 02
                Quote: saturn.mmm
                Quote: And Us Rat
                I will not be surprised, they also have their own "all-spreading"

                The machinations of Northrop Grumman, McDonnell Douglas.

                Northrop-Grumman is unlikely, they also produce avionics for the F-35. Did you see an advertisement from Northrop-Grumman about the F-35 with their super-duper-mega-electronics shooting down the Su-27? If not, watch the Youtube video "F-35 DAS".
                1. +4
                  28 February 2014 02: 16
                  Quote: 0255
                  Did you see an advertisement from Northrop-Grumman about the F-35 with their super-duper-mega-electronics shooting down the Su-27? If not, watch the Youtube video "F-35 DAS".

                  Found, provide for all to see. hi
                  (The warning is especially gifted - for me, the chur should not be minus for the content, I did not shoot it laughing)
                  1. 0
                    28 February 2014 08: 19
                    besides network-centricity there is nothing of the kind.
                  2. +1
                    28 February 2014 08: 21
                    I almost fell asleep while watching - a rare cotton wool in the spirit of amers) They would have put Chuck Norris at the helm ...
                    1. +1
                      28 February 2014 14: 23
                      and wretched graphics negative
                      1. 0
                        28 February 2014 16: 32
                        I was no longer upset by the schedule, but by their ideas about the "stupid pilots" of the Su-27.
                      2. +1
                        28 February 2014 21: 15
                        Quote: supertiger21
                        I was no longer upset by the schedule, but by their ideas about the "stupid pilots" of the Su-27.

                        aha, and "Shilka" shoots stupidly at one point wassat If the anti-aircraft gun will shoot at one point, and not at an air target, then Northrop-Grumman doesn’t need super electronics to destroy it laughing
                        But have Americans once imagined us, citizens of the countries of the former USSR, smart? We, in their view, are barbarians and drunks, we have bears walking around the cities, walking around with earflaps with a red star.
                        Quote: http://maillist.ru/archives/1059/1413858/4751223_html
                        - Honey, I'm home!
                        - Why so late?
                        - On the way the bear sprained his leg - I had to solder vodka.
                        - Sit down! Let's drink vodka.
                        “Mom, I'll go play with the bear.”
                        - Well, just drink vodka first.
                        - And where is our grandfather?
                        - He has been waiting in line for coupons for coupons for a second week.
                        “It's good that he drank vodka before that.” And you don’t sit idle - go drink vodka too.
                        “Okay, go take a walk, son, and don't forget to write a report to the KGB in the evening!” And on the way home do not forget to buy vodka - it ends.
                        - Darling, something's hot. Please turn off the nuclear reactor.
                        - Now I’ll finish the vodka and turn it off, but for now, play the balalaika.
                      3. +1
                        1 March 2014 14: 05
                        Quote: 0255
                        “Honey, I'm home!” “Why so late?” “On the way the bear sprained his leg — I had to solder vodka.” Sit down! Let's drink vodka. “Mom, I'll go play with the bear.” “Well, just drink vodka first.” “And where is our grandfather?” “He has been waiting in line for coupons for two weeks.” “It's good that he drank vodka before that. And you don’t sit idle - go drink vodka too. - Okay, go take a walk, son, and do not forget to write a report to the KGB in the evening! And on the way home, do not forget to buy vodka - it ends. - Honey, something is hot. Please turn off the nuclear reactor. - Now I’ll finish the vodka and turn it off, but for now, play the balalaika.


                        drinks Interesting jokes based on supposedly Russian traditions. It’s very annoying when the West sees Russia in such a person. And so the jokes are not bad, he laughed heartily! good
                      4. +1
                        1 March 2014 13: 22
                        Quote: supertiger21
                        I was no longer upset by the schedule, but by their ideas about the "stupid pilots" of the Su-27.

                        And I was pinned that the Americans are creating an aircraft that will hit the air defense of the USSR in the 60s (by video) "Circle" and "Shilka"
                      5. +1
                        1 March 2014 14: 11
                        Apparently the Americans foresaw that the S-400 would be sold to very few people, and therefore they are not particularly worried. So far, they are going to use the F-35 against outdated air defenses, since such as the F-15E are defenseless even against the S-125. However, "Penguin" is very dangerous and for modern S-300. They say that long-wave radars are able to detect stealth aircraft, but in fact this is still a theory, in practice this has not happened yet.
                      6. 0
                        1 March 2014 22: 03
                        Quote: supertiger21
                        They say that long-wave radars are capable of detecting stealth aircraft, but in essence this is still a theory, in practice this has not yet happened.

                        The Americans shot the same video, a little primitive.
            2. +2
              27 February 2014 21: 42
              And Us Rat
              Hi!
              Yes, where they are not. You even have them. :))) The only question is where they are cultivated and who. :)))
              And the article is enchantingly informative, evidence-based and convincing. :))) I would like to add that if you replace the hackers with a man with a sledgehammer, then if he gets to the servers, then all American planes will fall ... and if he can work with automated troop control systems, the result will be even better ... .and if CG recruits the US president, then there will be socialism in the USA tomorrow, and the day after tomorrow they will fall apart ... :))) I’m surprised that such an article came out here .... even if they wrote more, or what ... :)) ) Or there is nothing to write, just brilliant thought flashed and that's all ... :)))
              1. +3
                28 February 2014 02: 18
                Quote: smile
                And Us Rat
                Hi!
                Yes, where they are not. You even have them. :))) The only question is where they are cultivated and who. :)))
                And the article is enchantingly informative, evidence-based and convincing. :))) I would like to add that if you replace the hackers with a man with a sledgehammer, then if he gets to the servers, then all American planes will fall ... and if he can work with automated troop control systems, the result will be even better ... .and if CG recruits the US president, then there will be socialism in the USA tomorrow, and the day after tomorrow they will fall apart ... :))) I’m surprised that such an article came out here .... even if they wrote more, or what ... :)) ) Or there is nothing to write, just brilliant thought flashed and that's all ... :)))


                I’ll go drink some water, laugh no more strength, barely read laughing laughing laughing You forgot as an option - the invasion of communist aliens and Godzilla from the genetic laboratories of the secret city of Siberia-194894765 laughing
    3. 0
      27 February 2014 18: 31
      Quote: StrateG
      Americans are certainly a "smart" country

      Obviously in childhood they read Robert Sheckley "A gun that does not bum"
    4. +4
      27 February 2014 18: 46
      Dreaming! Who told you that the architecture of ALIS is compatible with the architecture of personal computers. It may not even be binary-octal. And you’ll break the hell out of it if there’s nothing. Only a powerful electromagnetic pulse. We have such protection, but are they fools? Only intelligence, having stolen all the documentation, can give a hint on how to do this. It’s immediately obvious that you are not a specialist in computers.
      1. 0
        27 February 2014 19: 49
        Quote: Алексей_К
        It’s immediately obvious that you are not a specialist in computers.

        You apparently too
        Quote: Алексей_К
        Who told you that the architecture of ALIS is compatible with the architecture of personal computers

        Does it have to be compatible? What for?
        Quote: Алексей_К
        Only intelligence, having found all the documentation, can give a hint on how to do this.

        Not familiar with reverse engineering?
        Another question is what is considered "hacking"
      2. 0
        28 February 2014 06: 42
        Alexey_K (1) Yesterday, 18:46 p.m. ↑
        Dreaming! Who told you that the architecture of ALIS is compatible with the architecture of personal computers. It may not even be binary-octal. And you’ll break the hell out of it if there’s nothing. Only a powerful electromagnetic pulse. We have such protection, but are they fools? Only intelligence, having stolen all the documentation, can give a hint on how to do this. It’s immediately obvious that you are not a specialist in computers.



        So it seems like it should be clear that everything is not on the "pig". Hackers Mlyn, botanists ...
    5. jjj
      +1
      27 February 2014 19: 19
      The more I look at the images of this device, the more perplexed: in general, due to what it flies and maneuvers
      1. +1
        27 February 2014 19: 49
        Quote: jjj
        The more I look at the images of this device, the more perplexed: in general, due to what it flies and maneuvers

        like the F-117 - due to the computer. Good luck to hackers who want to hack into their vaunted ALIS system bully
        1. +1
          27 February 2014 21: 28
          Quote: 0255
          Good luck to hackers who want to hack into their vaunted ALIS system


          People (!) Well, you can’t believe every word, you can think for yourself ... belay
          1. The comment was deleted.
    6. AVV
      0
      27 February 2014 19: 46
      Quote: StrateG
      The Americans, of course, are a "smart" country, but I can admit such a thing ... just count it, destroy the computers and the skiff of the USA army

      Too much self-confidence, she will destroy them! Then they will sell their plane to their partners because they will understand that they need to get rid of it faster !!!
    7. +1
      27 February 2014 21: 32
      Quote: StrateG
      The Americans, of course, are a "smart" country, but I can admit such a thing ... just count it, destroy the computers and the skiff of the USA army


      But if you think about it, the proud American US(who did not understand- United States, it is the United States) a simple change of layout turns into a simple Russian GY ...
    8. The comment was deleted.
    9. 120352
      0
      27 February 2014 23: 16
      Any computer is easy to confuse. Therefore, the coming war must become a war of hackers!
  2. +6
    27 February 2014 18: 10
    A muddy little article .. too much if ..
    1. Vovka levka
      +10
      27 February 2014 18: 15
      Quote: max702
      A muddy little article .. too much if ..

      Muddy? Complete nonsense.
      Or really someone thinks that the Americans. Do not flatter yourself, do not be so naive, do not.
      1. 0
        27 February 2014 18: 24
        Well, the control of nuclear missiles was hacked, and the Pentagon is constantly visiting. And here the connection with the server is very stupid.
        1. +1
          27 February 2014 18: 44
          And who hacked the control of nuclear missiles? Who?
        2. Vovka levka
          0
          27 February 2014 18: 47
          Quote: uralkos
          Well, hacked the control of nuclear missiles

          Do you believe that?
          You know in Soviet times, there were very reasonable doubts about the state of the Strategic Missile Forces control in the phase of hostilities.
          The most important thing is that it didn’t have to be verified in reality, and we have the opportunity to discuss this calmly.
        3. +4
          27 February 2014 18: 52
          But the real hack was not a missile control system, but a game imitating this system. These systems do not contact the Internet. Russia would have destroyed America long ago if that were so.
          1. 0
            27 February 2014 20: 55
            Air Force pilot, Britain begins procurement of F-35B Lightning 2 ((((

            test flights, pilots from the UK at Eglin airbase ((((
  3. +1
    27 February 2014 18: 12
    It is a pity that it will not be possible to sink it, because it does not sink.
  4. +4
    27 February 2014 18: 15
    The more complex the system, the more opportunities it has to break down or be damaged intentionally, and the more it requires more complex protection.
    1. +2
      27 February 2014 18: 56
      Do not confuse you with military computers and personal computers. Everything is simpler there and there is no Windows or Android. They have a different architecture. Complete incompatibility. You can put only interference or try to destroy it with an electromagnetic pulse, but this is a nuclear war.
      1. Old skeptic
        +1
        27 February 2014 19: 38
        My brother said:
        What one person did, then another can forever break.

        It is not a fact that such a machine will not fall into the hands of the enemy (with a downed plane or as a result of espionage) and the enemy’s specialists with sufficient perseverance and the number of trophies will not be able to crack it. And if it is possible to change the flight task in the process of its implementation (i.e. in the air), then the system has an external input and this is possibly a vulnerability.
        And the impossibility of changing the flight mission in the air ........ well, I don’t know ..... I think this is wrong.
      2. nikolaxp
        0
        27 February 2014 20: 05
        There is no complete incompatibility, the principles of operation of any computers are identical, as well as their structure, the difference in minor details and program code. Everything is based on algorithms, and they are universal for any languages ​​and systems with small nuances.
        The only partially incompatible computer can be called the neural-biological computer under development, which is grown from animal brain cells and is a jar with a single living organism-a computer, not a box with microcircuits, but even then it is programmed through a special interface from a regular PC.
        1. Old skeptic
          0
          27 February 2014 20: 25
          Well, for example, binary and ternary codes.
          You can run binary code on a ternary computer, but you cannot run it on a reverse.
      3. 0
        28 February 2014 18: 52
        Quote: Алексей_К
        Do not confuse you with military computers and personal computers. Everything is easier there and there is no Windows or Android. They have a different architecture

        Do you think that a combat aircraft will hack from a chickpea or a tablet? military computers will probably be used, and what codes are there - hz.
  5. +2
    27 February 2014 18: 23
    Yes, the higher the tricked out product, the lower its degree of reliability !!!! In defense complexes this is extremely unacceptable, everywhere there must be a middle ground !!!
  6. +2
    27 February 2014 18: 23
    In general, the idea is true. We are moving into a world where weapons or vehicles can be destroyed with a hacker attack. But for now all this if yes, and we must take into account that hacking these systems is not an easy task - it’s easier to take the radio from the enemy to listen to his conversations than to crack the digital key.
    In general, we’ll wait and see, but it’s worth preparing and PAKs to cover from such muck
  7. -1
    27 February 2014 18: 25
    The servers managing all these programs occupy a space approximately equal to the size of a container for shipping.

    ...those. servers sit on the ground?
    If TaG, then this is kapets! Open interface, arrived, the aircraft is helpless. The Yankees played ...
    laughing
    1. +2
      27 February 2014 18: 47
      Why is LA helpless? The automated control system in the air will turn off. Each vehicle will remain a combat unit.
      1. -1
        27 February 2014 19: 39
        But will the pilot be ready for such a situation?
        1. +1
          27 February 2014 19: 59
          Work in the "radio silence" mode is generally standard for "stealth".
          1. 0
            27 February 2014 22: 51
            Quote: clidon
            Work in the "radio silence" mode is generally standard for "stealth"


            ... and radio altimeters?
            1. 0
              28 February 2014 05: 20
              What is wrong with them?
              1. 0
                28 February 2014 11: 01
                Quote: clidon
                What is wrong with them?

                and they cannot but work in the mode of small heights and enveloping of the relief - that means they emit. Passive locators catch their radiation (and not only, up to all EMR sources on board, including the operation of solenoid valves, operating electric motors of drives, generators) ...
                1. 0
                  28 February 2014 17: 29
                  Well, stealth then does not only work in the mode of enveloping the terrain. The same F-117s generally did not fly so low. Well, the leads from the wiring, passive locators, alas, are still caught only in science fiction.
        2. 0
          27 February 2014 20: 50
          Quote: sibi
          But will the pilot be ready for such a situation?

          The question is rhetorical, we include logic.
    2. 0
      27 February 2014 18: 59
      You are completely hardened, if you crack a friend or foe system, then our fighter of the khan will be beaten down.
  8. +1
    27 February 2014 18: 31
    It’s just that hackers need to be raised, educated, whether they will help against F-35 or not, but they will be very useful for the army in future and not only wars. IMHO
    1. +1
      27 February 2014 19: 00
      Hackers will not help here, only intelligence.
  9. +1
    27 February 2014 18: 34
    overdid it while painting with freaks !!! it’s easier to be Amerikos ..... so maybe people will become kinder to them !!) wink
  10. -1
    27 February 2014 18: 39
    This plane, like the F 22, is an example for all countries, namely for us (Russia) what kind of military equipment does not need to be developed and even more so produced. "Good luck" striped bellies !!!
    1. +2
      27 February 2014 20: 53
      Quote: capex1
      This plane, like the F 22, is an example for all countries, namely for us (Russia) what kind of military equipment does not need to be developed and even more so produced. "Good luck" striped bellies !!!

      That's right, cancel all modern developments and restart the release of the MiG-21 and T-34, and return the cavalry cavalry with checkers! wassat
  11. 0
    27 February 2014 18: 42
    1. "I can".
    The article has a typo.
    2. Russian hackers, and not only Russian hack anything.
  12. +3
    27 February 2014 18: 42
    I think this is nonsense. If what the pilot carries with him is a client that communicates with the server to process the data received by the fighter, then it would turn out that the fighter had a VERY limited radius of operation. I'm not talking about the amount of data transferred.

    In fact, the exchange of data between the fighter and the server is unlikely to play such a critical role. And most likely all the calculations and stuff happen in the piece of iron that the pilot carries with him.

    Those. that would take control would require physical access to the piece of iron. Considering that the developers most likely don’t, then there will be their own operating system, albeit on the core from the Nyxes, but certainly significantly altered, therefore it is not possible to write a virus an effective virus even for the most experienced specialists in this field.
  13. +2
    27 February 2014 18: 43
    I do not think that American engineers and military are such rams.
    1. +1
      27 February 2014 18: 57
      Quote: Zymran
      I do not think that American engineers and military are such rams.


      And rightly so ... Yes
    2. 0
      27 February 2014 22: 58
      Quote: Zymran
      American engineers and military rams like that.

      they had enough intelligence to use Kaspersky on the basis of the UAV control in Creek in Nevada. That says it all...
      laughing

      http://army-news.ru/2011/10/po-amerikanskim-dronam-udaril-virus/
  14. +2
    27 February 2014 18: 47
    Such a flying device receives a bunch of information from a satellite, base stations, information is exchanged in flight between machines, it is also a good source.
    If you manage to at least make a mistake in receiving information, even if it’s not fatal, you can safely consider the machine destroyed.
    I remember the B-2 Spirit on Guam on February 23, 2008, was in a plane crash because of
    The Commission of Inquiry concluded that the cause of the accident was the negligence of ground personnel who did not turn on the heating of the air pressure receiver to remove condensate accumulated in it. Because of this, the aircraft control system received an overestimated speed value and prematurely gave a command to take off the ground.
  15. Gagarin
    +5
    27 February 2014 18: 50
    Do not think that the enemy is not ready for such scenarios. Serious engineers work.
    And their intelligence today will read this article with our comments and everything in the F-35 will finally fix it.
    1. +2
      27 February 2014 20: 58
      Quote: Gagarin
      Do not think that the enemy is not ready for such scenarios. Serious engineers work.
      And their intelligence today will read this article with our comments ....

      ... and twirl his fingers in bewilderment at the temple. wassat
      1. +1
        27 February 2014 22: 43
        Quote: And Us Rat
        .and twist his fingers in bewilderment at the temple.

        Come on, there are enough geniuses.
        It’s with you and we have a finger twisted around the temple, and they develop countermeasures.
        1. +1
          28 February 2014 00: 47
          Quote: saturn.mmm
          Quote: And Us Rat
          .and twist his fingers in bewilderment at the temple.

          Come on, there are enough geniuses.
          It’s with you and we have a finger twisted around the temple, and they develop countermeasures.

          And you, and we, and them, countermeasures are developed proactively, together with the technology being developed and taking into account its weaknesses. This is an elementary logic, I just goof off such scribblers (no matter whose), they write nonsense and do not blush.
          Memory cards with a flight mission have existed for 20 years, and 10 years for real-time data exchange with on-board computers of tanks, planes and helicopters, if they have not yet been hacked, then ... request
  16. +4
    27 February 2014 18: 53
    Usually glad to any articles, but this utter nonsense fool The author is clearly an optimist, hoping that everything will be bad for the enemy, "the enemy is stupid, you can win anyway" fellow . It would be nice to remember the famous proverb: "Shout HALVA at least three times, your mouth will not be sweet."
    1. 0
      27 February 2014 19: 29
      Quote: supertiger21
      Usually glad to any articles, but this sheer nonsense. The author is clearly an optimist, hoping that the enemy will be all bad, "the enemy is stupid, you can win anyway." It would be nice to remember the famous proverb: "Shout HALVA at least three times, it is not sweet in your mouth will become ".

      If you are really interested in reading the source.
      https://www.f35.com/
      http://www.codeonemagazine.com/index.html
      http://lockheedmartin.com/us/products/f35.html (ежемесячный и квартальные отчеты по програме")
      also official tweeter and facebook
      http://news.usni.org/
      http://www.f-16.net/
      From the Russian-speaking I can recommend only.
      http://sandrermakoff.livejournal.com/
      1. 0
        27 February 2014 21: 13
        Thank you, I read some links. I don’t understand English, but I also looked. Forgive me, what did you want to tell them? request
  17. StrateG
    +1
    27 February 2014 18: 55
    They put too much on technology, not fearing the risk of its failure. Maybe there are some chips? Duplication, backup in case of failure?
    1. 0
      27 February 2014 21: 00
      Quote: StrateG
      They put too much on technology, not fearing the risk of its failure. Maybe there are some chips? Duplication, backup in case of failure?

      And what does logic tell you? request
  18. +4
    27 February 2014 19: 02
    To all readers - you are dreamers! Who told you that the architecture of ALIS is compatible with the architecture of personal computers. It may not even be binary-octal. And you’ll break the hell out of it if there’s nothing. Only a powerful electromagnetic pulse. We have such protection, but are they fools? Only intelligence, having stolen all the documentation, can give a hint on how to do this. It’s immediately obvious that you are not specialists in computers
  19. -1
    27 February 2014 19: 25
    Americans have long recognized themselves as winners and therefore they don’t particularly think about the vulnerability of their technology, so they sculpt that sounds cooler and looks prettier.
  20. 0
    27 February 2014 19: 29
    Too many participants making the system vulnerable:

    ALIS integrates a variety of commercial-off-the-shelf applications, in addition to its proprietary programming. Key software contributors include the UK's IFS Applications external link (supply chain management) and Trilogi external link (interactive technical manuals), Canada's MXI Maintenix external link (aviation maintenance management), and Siebel external link (CRM communications, maintenance request tracking, etc. )

    ALIS will also interface with the Norwegian JSF4I project, which is targeted at small and medium size defense operators who might seek to use different national systems instead of, or as a supplement to, ALIS.
    Quote: Алексей_К
    To all readers - you are dreamers! Who told you that the architecture of ALIS is compatible with the architecture of personal computers.
    1. 0
      27 February 2014 19: 35
      You can use electronic warfare troops.
  21. Capyar 48315
    +2
    27 February 2014 19: 30
    The USA is a power and their specialists chew their crust with caviar for good reason. all the dangers of hi-tek re-stuffing are also recognized and learn from mistakes. The article is rather nonsense. And without noting the hacking of defense systems, it will be somehow calmer for me with the presence of the necessary number of 4+ and 5 generations in combat regiments (getting old choli, pulls to conservatism )
  22. 0
    27 February 2014 19: 31
    wassat Einstein: “I don’t know what they will fight in the III-rd World War, but in the IV-th they will use stones and clubs”.
  23. +1
    27 February 2014 19: 34
    Our aircraft designers are also in no way inferior to the Americans. Our T-50 is also an experimental technique, but it will enter the production stream completely ready-made, and not "raw" like the American f-35.
    1. -1
      27 February 2014 19: 50
      Also judging by the parameters, I think the T-50 is better, but if not better, then not worse and cheaper.
      1. +1
        27 February 2014 20: 28
        In the current small-lot batch, the F35A is already cheaper than the PAK Fa, or slightly or several times depending on whom to believe, the general designer or Putin.
        1. 0
          27 February 2014 20: 34
          Maybe cheaper. Only the performance characteristics of the F-35 make you think. "Clever casing", stealth, serious ammunition, including long-range missiles, on the internal sling make you think even more. The Fu-35 has a lot to boast about. But this is not the level of the F-22 and T-50. Where is a heavy fighter without high speed? How will he intercept? Most likely nothing. This will be done by the F-22 and our T-50. So it's not worth comparing prices. The machines are very different.
          1. +2
            27 February 2014 21: 06
            Quote: SkiF_RnD
            This will be done by the F-22 and our T-50. So do not compare prices. Cars are very different.


            Finally I found clever words, that’s the point that planes are for different tasks. I completely agree!

            From the very beginning, the F-35 was created as a fighter with ground air defense systems, and the air role as a secondary one. And for such a task, the main thing is to have the most advanced avionics and stealth technology. It was necessary to sacrifice flight characteristics, which negatively affected its ability to conduct air combat. And perhaps in this regard, the American 5th generation fighter is not for nothing that received the nickname "Penguin", which is very common in almost all Russian-speaking forums (including on the airborne). But you should not underestimate it in the air. that this is a stealth aircraft with a radar with an active phased array, as well as a forward-looking OLS. This means that even our Su-35S will not be sweet when the Lights are tens and hundreds of kilometers from them. The American principle is successfully operating here " the first to launch a rocket, the first to shoot down. "Despite the fact that our 35th Sushki generation 4 ++ may not even notice who is hitting them and from where, which once again confirms the superiority of stealth. In such a situation, the F-35 can only give a powerful rebuff to the PAK FA , because also a 5P.A fighterstories that 4P fighters can successfully fight the "Penguin" like clockwork, nothing more than bikes. Since "+" do not add "4" to the number, it will still not be a five ...
            1. 0
              28 February 2014 15: 45
              The American principle is successfully applied here.


              Well, let’s say, it has not yet been successful successfully. This has yet to be verified. They discover the Typhoons of the Raptors in exercises. It seems to me that the stealth’s radical superiority is still a fable ... Time will tell. hi
              1. 0
                28 February 2014 16: 21
                Quote: SkiF_RnD
                Well, let’s say, it has not yet been successful successfully. This has yet to be verified.


                Everything has already been checked and everything is working. Remember Yugoslavia, where the Yankees fired MiG-29s with AIM-120 missiles. MiGs simply didn’t notice who was shooting at them, because their radars were inactive. With stealth technologies, this scenario is even more dangerous for the enemy and more convenient for the Americans.

                Quote: SkiF_RnD
                They discover the Typhoons of the Raptors in exercises.


                Yeah, they find out))) If they live to see a "dog fight", when the distance between opponents is maximally reduced, then the radar will be able to somehow detect. But such a probability is crushingly small.

                Quote: SkiF_RnD
                stealth superiority is still a fable ...


                If stealth technologies are not needed in your opinion, then why are all scientists racking their brains to achieve it?! Maybe then we are also creating a PAK FA in vain? Apparently everyone in the world is stupid, and you alone know how to solve the problem)
    2. The comment was deleted.
    3. +3
      27 February 2014 21: 06
      Quote: Dimastik
      Our aircraft designers are also in no way inferior to the Americans. Our T-50 is also an experimental technique, but it will enter the production stream completely ready-made, and not "raw" like the American f-35.

      Why are you all stuck with these two planes? Neither one nor the second are ready. Divorced fortune-telling on coffee grounds, let them enter the arsenal first - then there will be something to discuss, ON THE RESULTS OF THE ESTABLISHED OPERATION. No.
  24. -1
    27 February 2014 19: 46
    In order to get more dough, corporations stuff their products with various bells and whistles, which seem to improve performance, but actually complicate work and maintenance, as well as make the product more vulnerable in various situations.
    For example, German tanks in the Second World War were more advanced technically, but difficult to maintain, compared with the T-34.
  25. +2
    27 February 2014 19: 47
    Not an article - a fable. No.

    Soon they will begin to write: - if mediums manage to penetrate the brain ... wassat
    1. +2
      27 February 2014 21: 07
      Quote: Michael_59
      Not an article - a fable. No.

      Soon they will begin to write: - if mediums manage to penetrate the brain ... wassat


      In the dorsal wassat
  26. Leshka
    0
    27 February 2014 20: 08
    that's why cyber technology needs to be developed
  27. -1
    27 February 2014 20: 24
    I have always said that blind faith in technology is utopia. Modern digital systems are vulnerable. Scientists still do not know how the neural system of the human body works, at the same time they are ready to give a decision about the life or death of a person to a microprocessor. In my opinion this is complete nonsense!
  28. +1
    27 February 2014 20: 24
    How is that possible? How can I fill in a pest program? The data exchange channels between the aircraft and the command center come to mind. Hacking this data channel is not an easy task! It takes 5 hours ... plus you need to activate harmful software!
    1. 0
      27 February 2014 20: 31
      Quote: JonnyT
      How can I fill in a pest program?

      Not necessary. A malfunctioning miserable semiconductor, overheating of the processor, a nanosized particle in the crystal - at the output there is a minimum accident, as a maximum disaster!

      Thus, the ALIS system seems to have been given too much power over the F-35. For example, ALIS is capable of landing an aircraft for an indefinite period in case it detects any problems in the aircraft.!!!!
  29. ed65b
    +1
    27 February 2014 20: 59
    EEEEEEE ..... And there is nothing to say sad I think it's easier with a rocket laughing
    1. The comment was deleted.
  30. +2
    27 February 2014 21: 05
    And here are the autopsy programs. bully
  31. sxn278619
    0
    27 February 2014 21: 21
    The ALIS system computer does not have Internet access, so it is impossible to crack it. Uneducated nonsense.
    1. 0
      28 February 2014 20: 36
      You, dear, amateur. Any digital programmable system requires at least updates. I will not talk about the details, if you are not a child, you will agree. Every time the system is updated, and as far as I understand from the article, there are degrees of "freedom" ... Mom, don't cry! ... I understand that Americans are not stupid people, but, excuse me, the risks are not worth it. I'm talking about the price of the issue. If you are not a troll and have read the article, you will understand.
  32. karavay1982
    0
    27 February 2014 21: 37
    Now I'll throw a banana.
    Everyone did not believe that millions could be heard. But no, the Americans took and built such a system and where hectares occupy information stores. As they say, he saw ... on TV.
    Americans iron Pakistan with drones. The control center is located in the United States. I don’t remember whether they boasted about their electronic protection or not, but once Iran takes control of such an UAV and lands it. I saw it myself ... on TV)
    The same Iran is a uranium enrichment program, the Americans admitted that they launched viruses there and the program seemed to slow down for a year.
    And now back to our beloved F-35 fighter.
    If the code was written by MAN, then another MAN will be able to write a program to crack it. It is only a matter of time and resources.
    Many hacker attacks stop only turning off the system or a bullet to the head of the hacker.
    Moreover, the Americans provide for the exchange of information during the flight. Here's another way the fighter is taken under control.
    I am not saying that we are the smartest and our missiles are missile. but Americans are also PEOPLE who also want dough!
    And just as the military budget is being sawn up, it’s just ten times more than anyone else, and even the Americans are no longer afraid of the enemy. After the collapse of the USSR, they did not have a worthy opponent.
    So the Americans themselves added problems. Not catastrophic, but probable.
    1. +1
      27 February 2014 22: 16
      1. Really a banana.
      2. Believe the smaller TV.
      laughing
  33. +1
    27 February 2014 22: 04
    Quote: And Us Rat
    In the dorsal

    Through the rear valve wassat wassat
  34. Smiles to you
    +1
    27 February 2014 22: 26
    Well and goodies! Hackers, flag in hand ... Russian ...
  35. +1
    27 February 2014 23: 01
    The pilot receives flight missions to this system immediately before departure via a closed, encrypted channel. Go hackney.
  36. postman
    +1
    28 February 2014 01: 05
    Quote: Author
    For example, ALIS is able [b] for an indefinite time [/ b] to land a plane in case of ...

    [b] for an indefinite time [/ b !!!
    And for a CLEAR TIME you can plant?
    And where? in the IVS?
  37. Vita_vko
    +2
    28 February 2014 01: 20
    To crack a similar system, first you need to be able to connect to it. It is definitely not connected to the Internet. But even if by some miracle it was possible to install a left modem with access to the shared network and sniffers would not detect it, then you still need a lot of time to learn how to bypass security systems. Although, of course, we have a lot of talented IT specialists, and if they are given a similar task with the appropriate software, then it will be possible to find a vulnerability in a couple of years. But it is very doubtful that the effectiveness of such an attack will be higher than a conventional air defense system.
  38. +3
    28 February 2014 05: 50
    The article is stupid and Aftur has not the slightest idea about the topic of his opus ... apparently he was going to stick two fingers into the data exchange system as if into an outlet - he is also a BETMAN into the bargain, and large specialists in chorus and in unison gagged about another stupidity "Yankee ". The ability to have a "glass" cabin in all vectors is BAD ... a self-diagnostic system and with the ability to land the car in the machine is VERY BAD ... but the presence of control servers is YOUR SUCK FULL and, apparently, for us is an artifact of the prehistoric past ?? ? Or maybe I'm watching a gathering on this INTERNET MOLE resource ??? Well then F-35 really hang yourself wassat
  39. +2
    28 February 2014 09: 32
    Of course, I would also like the 35th to be a completely unsuitable machine. but such hatred-inspiring moods are simply dangerous. Americans are enemies of course, but that does not automatically make them fools unfortunately. you need to work on the superiority of your weapons.
  40. +1
    28 February 2014 10: 29
    Blessed is he who believes. And even more so if he believes that the technique of a potential enemy is worthless. Of course, in US combat systems, a lot of attention is paid to their computerization. But this trend is worldwide and it did not bypass the Russian Armed Forces. At the same time, the level of development of computer technology in the United States is still an order of magnitude, if not more, higher than the level of the same Russian technology. Moreover, the Americans are well aware of the danger of hacking their computers and are doing everything to reduce this danger. Therefore, instead of lulling the reader with fairy tales about the frailty of the "American" flying machine, it would be good to tune the same reader so that Russian flying machines would be no worse, especially in terms of their electronic equipment, including computers. While this is a bit tight.
  41. patriot123
    +2
    28 February 2014 17: 07
    they will eliminate this weakness in a matter of time !! only now they’ve been rolling around the airplane for a long time !!
  42. 0
    28 February 2014 19: 06
    It remains to announce a solid (at least 10-50 million dollars) prize to the hacker for such a feat. I would be glad to know that his last name would be, say, Kaspersky smile
  43. 0
    28 February 2014 22: 32
    The article is an enemy disinformation! Only a rocket!
  44. Sledgehammer
    0
    2 March 2014 01: 16
    It is doubtful. Doable only if there is a traitor inside and very
    aware.
  45. Mark Twain
    0
    2 March 2014 14: 33
    F35 in Point Cook in Melbourne- 100th anniversary of military aviation in Australia 1-2 March 2014
  46. Mark Twain
    0
    2 March 2014 14: 35
    Engine F 35-100th anniversary of military aviation in Australia
  47. Blinder
    0
    11 March 2014 23: 13
    It seems that the Yankees did not provide for the transition in emergency cases from computer to horse-drawn! Well, stupid!
  48. 0
    28 October 2014 01: 12
    I am wildly sorry, but this argument, I was pretty pleased! To begin with, any computer operating system is based on binary code, everything else is a shell that was created only to facilitate the input of information, and nothing more. Allow me gentlemen to remind you that the “BIOS” was developed by the Russian mathematician by writing it when the first computers were just beginning to appear! Since then, no one has been able to correctly rewrite it, for multi-core processors, only shells are created that simplify the work, but do not affect the central core of the system, which is loaded first. With the advent of the Internet, kids playing, quite by accident, got to the Pentagon’s server, yes, they got to the strategic planning simulator of the start of a nuclear war, but they could have accessed codes to launch real missiles, turned them off in time! A couple of hackers, launched in US banks, a funny program that counted hundredths of a percent that were not taken into account when calculating interest, if my memory serves me, I think correct that in a year, the boys received $ 2 million, got to try this cash out without taking care five times. Transfer them from one bank to another. So, this whole system is quite vulnerable if you try to hack it, but the virus must be driven through the satellite using its access codes, and it is not necessary to destroy it, it is enough to set a task in a class compatible with the Bernese donkey task. Stealth technology is a good thing, but the problem is that it does not guarantee invisibility in the entire frequency range, you can always find the frequency where the locator beam will be reflected from such an object. Or harmonics, because the system of signal reflection is not so much important as the area of ​​illumination of the object, and the materials from which it is made, but again it all comes down to the fact that there are no materials that can completely absorb all wave frequencies. As far as the announcer was telling the truth or not negotiating it, but on the T-50. special coating is used, which reduces the proportion of the reflected signal in the direction of the radar. By the way, the first lamp-based radars had a very large component of harmonics, in which all these invisibles are clearly visible, because radio lamps have a large signal amplification region, respectively, and harmonics, for this reason, lamp amplifiers are considered the best amplifiers, they not only enhance the main signal, but also harmonics, which allows you to feel all the shades of the sound of the instruments.

"Right Sector" (banned in Russia), "Ukrainian Insurgent Army" (UPA) (banned in Russia), ISIS (banned in Russia), "Jabhat Fatah al-Sham" formerly "Jabhat al-Nusra" (banned in Russia) , Taliban (banned in Russia), Al-Qaeda (banned in Russia), Anti-Corruption Foundation (banned in Russia), Navalny Headquarters (banned in Russia), Facebook (banned in Russia), Instagram (banned in Russia), Meta (banned in Russia), Misanthropic Division (banned in Russia), Azov (banned in Russia), Muslim Brotherhood (banned in Russia), Aum Shinrikyo (banned in Russia), AUE (banned in Russia), UNA-UNSO (banned in Russia), Mejlis of the Crimean Tatar people (banned in Russia), Legion “Freedom of Russia” (armed formation, recognized as terrorist in the Russian Federation and banned), Kirill Budanov (included to the Rosfinmonitoring list of terrorists and extremists)

“Non-profit organizations, unregistered public associations or individuals performing the functions of a foreign agent,” as well as media outlets performing the functions of a foreign agent: “Medusa”; "Voice of America"; "Realities"; "Present time"; "Radio Freedom"; Ponomarev Lev; Ponomarev Ilya; Savitskaya; Markelov; Kamalyagin; Apakhonchich; Makarevich; Dud; Gordon; Zhdanov; Medvedev; Fedorov; Mikhail Kasyanov; "Owl"; "Alliance of Doctors"; "RKK" "Levada Center"; "Memorial"; "Voice"; "Person and law"; "Rain"; "Mediazone"; "Deutsche Welle"; QMS "Caucasian Knot"; "Insider"; "New Newspaper"