美国竟把F-35项目涨价和延迟的责任推给中国

来源:百度文库 编辑:超级军网 时间:2024/04/29 02:10:52


How much of the F-35 Joint Strike Fighter’s spiraling cost in recent years can be traced to China’s cybertheft of technology and the subsequent need to reduce the fifth-generation aircraft’s vulnerability to detection and electronic attack?

That is a central question that budget planners are asking, and their queries appear to have validity. Moreover, senior Pentagon and industry officials say other classified weapon programs are suffering from the same problem. Before the intrusions were discovered nearly three years ago, Chinese hackers actually sat in on what were supposed to have been secure, online program-progress conferences, the officials say.

The full extent of the connection is still being assessed, but there is consensus that escalating costs, reduced annual purchases and production stretch-outs are a reflection to some degree of the need for redesign of critical equipment. Examples include specialized communications and antenna arrays for stealth aircraft, as well as significant rewriting of software to protect systems vulnerable to hacking.

It is only recently that U.S. officials have started talking openly about how data losses are driving up the cost of military programs and creating operational vulnerabilities, although claims of a large impact on the Lockheed Martin JSF are drawing mixed responses from senior leaders. All the same, no one is saying there has been no impact.

While claiming ignorance of details about effects on the stealth strike aircraft program, James Clapper, director of national intelligence, says that Internet technology has “led to egregious pilfering of intellectual capital and property. The F-35 was clearly a target,” he confirms. “Clearly the attacks . . . whether from individuals or nation-states are a serious challenge and we need to do something about it.”

The F-35 issue was ducked as well by David Shedd, deputy director of the Defense Intelligence Agency, but not the impact of cybertheft on defense spending and operational security.

“I am not going to talk about the F-35,” Shedd says. “I’d be sitting with the secretary having a counseling session. The answer is absolutely yes. The leaks have hurt our efforts in that it gives the adversary an advantage in having insights into what we’re doing. It should be clear that whether there are leaks on the technology side or that affect preemptive decision-making, they are very damaging to the intelligence community.”

Those closer to the program are less equivocal about the damage that cyberintrusions are causing the JSF program.

“You are on to something,” says a veteran combat pilot with insight into both the F-35 and the intelligence communities. “There are both operational and schedule problems with the program related to the cyber data thefts. In addition, there are the costs of redressing weaknesses in the original system design and lots of software fixes.”

The subject also was addressed during Pentagon briefings about President Barack Obama’s budget for 2013.
“We are very attentive . . . to cybervulnerabilities in weapon systems, ours and those of others,” says Deputy Defense Secretary Ashton Carter. “It’s part of the modern world. It’s a highly computerized airplane. Like all our other computer systems, we have to be attentive to it.”

In July 2011, then-Deputy Defense Secretary William Lynn pointed out that a foreign intelligence agency had victimized a major defense contractor and extracted 24,000 files concerning a developmental system. That is important because a decision to redesign a compromised system depends on whether the lost information would help the intruder develop similar systems and generate methods of attack and defense. Some U.S. officials have pegged the costs at tens of billions of dollars.

There is some empirical evidence to support this concern. China has made a habit in recent years of regularly rolling out new aircraft designs, including the J-20 stealth prototype strike fighter and a series of new unmanned aircraft that look like U.S. designs such as the Global Hawk and Sensor Craft.

Nonetheless, the Pentagon’s ardor for the strike fighter has not dampened.

“We want the airplane,” Carter declares. “We want all three variants. At the same time, there is the issue of cost and the performance of the program in this difficult time when we are trying to reach full-rate production. That’s still a concern. We’ll ride up that curve to full-rate production when it’s economically and managerially prudent to do it.”

Despite the proclamation of support for the program, the Pentagon is expected to reduce by 179 aircraft the U.S. buy of F-35s through 2017 in the forthcoming fiscal 2013 defense spending request, according to a Reuters report. If approved by Congress, this would dash the hopes of Lockheed Martin to swiftly ramp up production and lower per-unit prices, a goal tied to the company’s campaign to sell the aircraft abroad. The Pentagon’s reasoning for slowing production is to reduce the impact of yet-unknown problems that could still arise from the flight-test program. In addition, the Block II software package is late. It was slated for release to the flight-testing fleet by the end of last year.

An early concern about a possible avenue for hacking into stealth aircraft, the F-35’s Multifunction Advanced Data Link (MADL), is no longer suspect. It was dropped as an add-on to the F-22 and B-2 that would allow stealth aircraft to communicate without being detected. Program insiders say MADL was scrubbed as a “pure money issue.” MADL was designed for high throughput, frequency-hopping and anti-jamming capabilities with phased-array antenna assemblies that send and receive tightly directed radio signals.

The F-35 program may have been vulnerable because of its lengthy development. Defense analysts note that the JSF’s information system was not designed with cyberespionage, now called advanced persistent threat, in mind. Lockheed Martin officials now admit that subcontractors (6-8 in 2009 alone, according to company officials) were hacked and “totally compromised.” In fact, the stealth fighter program probably has the biggest “attack surface” or points that can be attacked owing to the vast number of international subcontractors.

There also is the issue of unintended consequences. The 2009 hacking was apparently not aimed at the F-35 but rather at a classified program. However, those accidental results were spectacular. Not only could intruders extract data, but they became invisible witnesses to online meetings and technical discussions, say veteran U.S. aerospace industry analysts. After the break-in was discovered, the classified program was halted and not restarted until a completely new, costly and cumbersome security system was in place.

There is another view of what is affecting JSF and why. A former senior staffer for the U.S. Senate contends that the F-35 program’s problems reflect diminishing interest in manned aircraft whose performance is limited primarily by its aircrew.

“I think the biggest issue facing the JSF is that there has been a profound shift in the military’s perception of the value of manned aircraft compared to unmanned aircraft,” he says. “I’ve had long conversations with a Marine Corps forward air controller who has just returned from Afghanistan. He pointed out that an F/A-18 can be kept on call for 15 minutes, but an unmanned Reaper is there for eight hours. The day of the fighter pilot is over. There has been a seismic shift in the military’s value judgment of manned and unmanned aircraft.”

However, that is a disputed analysis.

The JSF and its mission of penetrating integrated air defense systems will not be threatened by unmanned aircraft despite cost issues, says a retired aerospace official who has been involved with the F-35 throughout its life.

[url=http://www.aviationweek.com/aw/generic/story_generic.jsp?channel=awst&id=news/awst/2012/02/06/AW_02_06_2012_p30-419987.xml&headline=China's%20Role%20In%20JSF's%20Spiraling%20Costs&next=0]http://www.aviationweek.com/aw/generic/story_generic.jsp?channel=awst&id=news/awst/2012/02/06/AW_02_06_2012_p30-419987.xml&headline=China's%20Role%20In%20JSF's%20Spiraling%20Costs&next=0]航空周刊[/url]

How much of the F-35 Joint Strike Fighter’s spiraling cost in recent years can be traced to China’s cybertheft of technology and the subsequent need to reduce the fifth-generation aircraft’s vulnerability to detection and electronic attack?

That is a central question that budget planners are asking, and their queries appear to have validity. Moreover, senior Pentagon and industry officials say other classified weapon programs are suffering from the same problem. Before the intrusions were discovered nearly three years ago, Chinese hackers actually sat in on what were supposed to have been secure, online program-progress conferences, the officials say.

The full extent of the connection is still being assessed, but there is consensus that escalating costs, reduced annual purchases and production stretch-outs are a reflection to some degree of the need for redesign of critical equipment. Examples include specialized communications and antenna arrays for stealth aircraft, as well as significant rewriting of software to protect systems vulnerable to hacking.

It is only recently that U.S. officials have started talking openly about how data losses are driving up the cost of military programs and creating operational vulnerabilities, although claims of a large impact on the Lockheed Martin JSF are drawing mixed responses from senior leaders. All the same, no one is saying there has been no impact.

While claiming ignorance of details about effects on the stealth strike aircraft program, James Clapper, director of national intelligence, says that Internet technology has “led to egregious pilfering of intellectual capital and property. The F-35 was clearly a target,” he confirms. “Clearly the attacks . . . whether from individuals or nation-states are a serious challenge and we need to do something about it.”

The F-35 issue was ducked as well by David Shedd, deputy director of the Defense Intelligence Agency, but not the impact of cybertheft on defense spending and operational security.

“I am not going to talk about the F-35,” Shedd says. “I’d be sitting with the secretary having a counseling session. The answer is absolutely yes. The leaks have hurt our efforts in that it gives the adversary an advantage in having insights into what we’re doing. It should be clear that whether there are leaks on the technology side or that affect preemptive decision-making, they are very damaging to the intelligence community.”

Those closer to the program are less equivocal about the damage that cyberintrusions are causing the JSF program.

“You are on to something,” says a veteran combat pilot with insight into both the F-35 and the intelligence communities. “There are both operational and schedule problems with the program related to the cyber data thefts. In addition, there are the costs of redressing weaknesses in the original system design and lots of software fixes.”

The subject also was addressed during Pentagon briefings about President Barack Obama’s budget for 2013.
“We are very attentive . . . to cybervulnerabilities in weapon systems, ours and those of others,” says Deputy Defense Secretary Ashton Carter. “It’s part of the modern world. It’s a highly computerized airplane. Like all our other computer systems, we have to be attentive to it.”

In July 2011, then-Deputy Defense Secretary William Lynn pointed out that a foreign intelligence agency had victimized a major defense contractor and extracted 24,000 files concerning a developmental system. That is important because a decision to redesign a compromised system depends on whether the lost information would help the intruder develop similar systems and generate methods of attack and defense. Some U.S. officials have pegged the costs at tens of billions of dollars.

There is some empirical evidence to support this concern. China has made a habit in recent years of regularly rolling out new aircraft designs, including the J-20 stealth prototype strike fighter and a series of new unmanned aircraft that look like U.S. designs such as the Global Hawk and Sensor Craft.

Nonetheless, the Pentagon’s ardor for the strike fighter has not dampened.

“We want the airplane,” Carter declares. “We want all three variants. At the same time, there is the issue of cost and the performance of the program in this difficult time when we are trying to reach full-rate production. That’s still a concern. We’ll ride up that curve to full-rate production when it’s economically and managerially prudent to do it.”

Despite the proclamation of support for the program, the Pentagon is expected to reduce by 179 aircraft the U.S. buy of F-35s through 2017 in the forthcoming fiscal 2013 defense spending request, according to a Reuters report. If approved by Congress, this would dash the hopes of Lockheed Martin to swiftly ramp up production and lower per-unit prices, a goal tied to the company’s campaign to sell the aircraft abroad. The Pentagon’s reasoning for slowing production is to reduce the impact of yet-unknown problems that could still arise from the flight-test program. In addition, the Block II software package is late. It was slated for release to the flight-testing fleet by the end of last year.

An early concern about a possible avenue for hacking into stealth aircraft, the F-35’s Multifunction Advanced Data Link (MADL), is no longer suspect. It was dropped as an add-on to the F-22 and B-2 that would allow stealth aircraft to communicate without being detected. Program insiders say MADL was scrubbed as a “pure money issue.” MADL was designed for high throughput, frequency-hopping and anti-jamming capabilities with phased-array antenna assemblies that send and receive tightly directed radio signals.

The F-35 program may have been vulnerable because of its lengthy development. Defense analysts note that the JSF’s information system was not designed with cyberespionage, now called advanced persistent threat, in mind. Lockheed Martin officials now admit that subcontractors (6-8 in 2009 alone, according to company officials) were hacked and “totally compromised.” In fact, the stealth fighter program probably has the biggest “attack surface” or points that can be attacked owing to the vast number of international subcontractors.

There also is the issue of unintended consequences. The 2009 hacking was apparently not aimed at the F-35 but rather at a classified program. However, those accidental results were spectacular. Not only could intruders extract data, but they became invisible witnesses to online meetings and technical discussions, say veteran U.S. aerospace industry analysts. After the break-in was discovered, the classified program was halted and not restarted until a completely new, costly and cumbersome security system was in place.

There is another view of what is affecting JSF and why. A former senior staffer for the U.S. Senate contends that the F-35 program’s problems reflect diminishing interest in manned aircraft whose performance is limited primarily by its aircrew.

“I think the biggest issue facing the JSF is that there has been a profound shift in the military’s perception of the value of manned aircraft compared to unmanned aircraft,” he says. “I’ve had long conversations with a Marine Corps forward air controller who has just returned from Afghanistan. He pointed out that an F/A-18 can be kept on call for 15 minutes, but an unmanned Reaper is there for eight hours. The day of the fighter pilot is over. There has been a seismic shift in the military’s value judgment of manned and unmanned aircraft.”

However, that is a disputed analysis.

The JSF and its mission of penetrating integrated air defense systems will not be threatened by unmanned aircraft despite cost issues, says a retired aerospace official who has been involved with the F-35 throughout its life.

[url=http://www.aviationweek.com/aw/generic/story_generic.jsp?channel=awst&id=news/awst/2012/02/06/AW_02_06_2012_p30-419987.xml&headline=China's%20Role%20In%20JSF's%20Spiraling%20Costs&next=0]http://www.aviationweek.com/aw/generic/story_generic.jsp?channel=awst&id=news/awst/2012/02/06/AW_02_06_2012_p30-419987.xml&headline=China's%20Role%20In%20JSF's%20Spiraling%20Costs&next=0]航空周刊[/url]
美国还没施行甲骨文四级考试么
本人很懒,GOOGLE的翻译很烂,将就看吧:

可以追溯到中国的技术网络盗窃和随后的需要减少的第五代战机的漏洞检测和电子攻击的F-35联合攻击战斗机的成本近年来不断上升的有多少?

这是一个中央预算规划者都在问的问题,和他们的疑问似乎有有效性。此外,五角大楼高级行业官员说,其他分类的武器计划从患有同样的问题。在入侵之前发现了近三年来,中国黑客竟然坐在什么被认为已经安全,网络计划进度会议,官员说。

连接的完整程度仍在评估,但有共识,即成本上升,减少每年的采购和生产弹力奏是反映了某种程度的需要重新设计关键设备。例子包括隐形飞机和专用通信天线阵列,以及显著重写的软件系统,以保护易受黑客攻击。

这是最近才说,美国官员已开始公开谈论数据损失是如何被哄抬的军事计划的成本,创造业务的漏洞,虽然有很大的影响对洛克希德·马丁公司的JSF的索赔从高层领导人的反应不一。都是一样的,没有人说有没有影响。

虽然声称无知的隐身攻击机计划的影响的详细信息,国家情报总监詹姆斯·克拉珀说,互联网技术已“导致智力资本和财产的令人震惊的顺手牵羊。 F-35战机是明确的目标,“他证实。 “很显然的攻击。 。 。无论从个人或民族国家是一个严重的挑战,我们需要做些什么。“

F-35的问题被回避以及国防情报局的副主任戴维·谢德,但不影响国防开支和运营安全的cybertheft。

谢德说:“我不打算谈论的F-35”。 “我坐在与辅导会议秘书。答案是绝对肯定的。泄漏伤害了我们的努力,它给人的对手的优势,在到我们正在做什么,有见解。应该很清楚,在技术方面或影响先发制人的决策,他们是非常有害的情报界是否有泄漏。“

接近该计划的有关损害的模棱两可,cyberintrusions造成JSF项目。

“你的东西,说:”与老将战斗洞察到的F-35和智能社区试点。 “有运营和时间表与方案相关的网络数据盗窃的问题。此外,还有纠正的弱点,在原来的系统设计和大量的软件修复的费用。“

这个问题也被解决在2013年总统奥巴马的预算案五角大楼简报。
“我们非常周到。 。 。到武器系统cybervulnerabilities,我们和其他人说,“国防部副部长阿什顿·卡特。 “这是现代世界的一部分。这是一个高度计算机化的飞机。我们所有的其他计算机系统一样,我们一定要关注它。“

在2011年7月,当时的国防部副部长威廉·林恩指出,外国情报机构曾受害的一个主要的国防承包商,并提取了24000文件关于发展的制度。这是非常重要的,因为决定重新设计一个受损系统上取决于是否丢失的信息将有助于入侵者开发类似的系统,并产生攻击和防御方法。一些美国官员已经挂在数百亿美元的成本。

有一些经验证据来支持这种担忧。中国已在定期推出新飞机的设计,其中包括在J-20隐形原型罢工战斗机和一系列新的无人驾驶飞机,如美国的“全球鹰”和传感器工艺设计看起来像最近几年的习惯。

然而,五角大楼的攻击战斗机的热情并没有挫伤。

“我们希望飞机,”卡特宣布。 “我们希望所有的三个变种。在同一时间,在这个艰难的时刻,当我们正在努力,以达到全速率生产计划的成本和性能的问题。这仍然是一个问题。我们将乘坐这条曲线全速率生产时,它的经济和管理审慎做到这一点。“

尽管五角大楼宣布支持该方案,预计在即将到来的2013财年国防开支的要求,通过2017美国购买F-35战机由179架飞机,以减少,据路透社报道。如果得到国会的批准,这将冲洛克希德·马丁公司希望迅速增加生产,降低每单位的价格,绑在国外出售飞机公司的活动目标。五角大楼的推理是放缓生产减少的影响还未知的问题,仍可能出现从试飞计划。此外,第二块软件包是太晚了。它被提名为去年年底发布的飞行测试车队。

早期的关注,一个可能的途径一个黑客进入隐形飞机F-35战斗机的多功能先进数据链(MADL),不再是犯罪嫌疑人。它投下了一个附加到的F-22和B-2将使隐形飞机的沟通而不被发现。计划的业内人士说,,MADL擦洗是作为一个“纯粹的金钱问题。”MADL是为高吞吐量,跳频,抗干扰能力相控阵天线组件发送和接收无线电信号,紧紧地定向设计。

F-35项目可能已脆弱的,因为其漫长的发展。国防分析家指出,现在被称为网络间谍先进的持续威胁,记住,设计JSF的信息系统。洛克希德·马丁公司的官员现在承认,分包商(6-8仅在2009年,根据公司的官员)被砍死,“完全破坏。”其实,隐形战斗机的计划可能有最大的“攻击面”或可由于攻击点广大的国际分包商。

也有意想不到的后果的问题。 2009年黑客攻击,显然不是针对F-35战机,而是在分类方案。然而,这些意外的结果是壮观。入侵者不仅可以提取数据,但他们成为在线会议和技术性的讨论无形的证人说,美国资深航空业分析师。中场休息后,在被发现后,分类程序被停止,并没有重新启动,直到一个完全新的,昂贵和繁琐的安全系统到位。

还有另一种看法是影响JSF和为什么。美国参议院一位前高级职员争辩说,F-35项目的问题,反映在载人飞机,其性能主要是有限的机组人员减少利益。

“我想在JSF面临的最大问题是在军队的载人飞机的价值相比,无人驾驶飞机的看法,出现了深刻的变化,”他说。 “我已经与刚刚从阿富汗返回的海军陆战队前进空中管制长谈。他指出,这架F/A-18可以保持在15分钟的通话,但无人收割,有八个小时。战斗机飞行员的一天。一直在军队的载人和无人驾驶飞机的价值判断地震的转变。“

然而,这是一个有争议的分析。

JSF和穿透综合防空系统的任务将不会被无人驾驶飞机的威胁,尽管成本问题,说一个退休的航天官员已与F-35在其整个生命。
求翻译,懒得花脑筋去看e文


重复,已删!

重复,已删!
兔子就是悲剧的中枪体
这也能赖上兔子,美鳖啊,真让人无语。
看不出来有这个迹象吧。
没耐心看完,一堆臆测,怀疑被tg黑了,就不断地修改,更新,然后钱就涨了
----------------------------------------------------
还有始终如一的鄙视态度,因为所谓的"长得像",所以就是tg不正当途径得到的
----------------------------------------------------md吃饱了撑得慌,骗钱骗得肆无忌惮
跟中国有个鬼的关系啊。
sigh,欲加之罪何患无辞
兔子属于习惯性中枪
兔子果然习惯性中枪。。
神马都是TG的
看不懂方言。
是LZ强加的吧,估计人家没那个心情。
JSTCVW09CD 发表于 2012-2-11 10:20
是LZ强加的吧,估计人家没那个心情。


据美国《航空周刊》2月3日报道,该文章认为F-35成本上升与中国窃取相关技术有关。由于中国窃取相关技术造成技术泄露,使得该战机更容易被探测到,也更容易受到电子攻击的干扰;这就使得美国需要增加投入降低这些脆弱性。此外,文章还探讨了中国的行为究竟给F-35项目成本的增长造成了多大影响。

文章称,这个问题已经成为了财政预算规划认识所关心的核心问题,而且该问题似乎有一定的依据。此外,五角大楼和业界高官还表示,其它武器项目也遭受了相关资料被窃取的问题。这些官员认为,在美国三年前发现中国窃取资料行为之前,中国的黑客实际上已经能够监听美国这些项目的在线项目进展会议;而他们还一直认为这些会议是安全的。有关中国的技术窃取行为对F-35成本上涨造成的影响还处于评估中,但是人们都认为成本增长、年度购买数量减少和生产时间延长都在一定程度上表明,这一关键装备需要进行重新设计。这包括隐形飞机的通信和天线阵列,而且对系统进行保护,防止被窃取的软件也要进行重大改写。直到最近,美国政府官员才开始公开讨论数据丢失对军事项目成本增长及作战脆弱性所造成的影响。有消息称,信息窃取对洛克希德-马丁公司的F-35项目造成了很大的影响;而高层的回应则不近相同。不过,没有人否认,信息窃取给军事项目造成了影响。

文章称,美国国家情报局局长詹姆斯-克拉珀(James Clapper)表示,对有关隐形战机项目遭窃的细节不清楚;他表示,互联网技术已经“导致了极坏的技术和知识产权剽窃,而很明显,F-35是目标之一”。他还认为,不管这些攻击行为是来自个人还是国家行为,都是对美国的严重挑战,美国应该对此有所行动。美国国防部情报局副局长戴维-谢德(David

Shedd)也有意避谈F-35问题,他也没有谈论网络窃取对防务支出和作战安全的影响。谢德表示:“我不会谈论有关F-35的问题,我将会与防长举行协商会议。不过,答案是肯定的;技术泄露已经影响了我们的进展,并让敌人在了解我们的进展方面取得了一定的优势。”很明显,无论是否存在技术泄露或者,如果它影响决策,那么它就对情报部门造成损害。

文章称,那些更加了解项目的人则更加明确表示,网络入侵正在对F-35项目造成损害。一位熟知F-35战机项目和情报部门的老战斗机飞行员表示,“你们懂得的,如果数据遭到窃取,相关项目的作战和规划都会出现问题。此外,修正原系统的设计缺陷,以及大量软件修订也需要大量成本。”五角大楼在举行有关奥巴马总统2013财政预算的新闻发布会上也对该问题进行了说明。国防部副部长阿什顿-卡特(Ashton Carter)表示,“我们非常关注武器系统,我们自身和其他方面的网络脆弱性。这是现代世界的一部分,这是一种高度计算机化的飞机;和其他计算机系统一样,我们非常关注该武器的情况。”

文章称,2011年7月,当时的国防部副部长威廉-林恩(William Lynn )指出,外国情报部分入侵了一家重要防务公司,并窃取了一个争取与研发中的系统的2万4千份文件。这非常重要,因为重新设计受影响系统的决定取决于丢失的信息是否有助于入侵方发展类似的系统,并得出出攻击和防御的策略。而一些美国官员则认为,美国在这方面的损失达到了数百亿美元。这样的担忧是有一定的依据的。近些年,中国不断推出包括歼-20隐形战机和一系列新型无人机在内的新型战机设计;而这些设计与中国的“全球鹰”和“传感器飞机”设计类似。不过,五角大楼对F-35的热情并未减退。卡特表示,“我们想要这样的战机,三种型号都要。与此同时,我们在实现全力生产的时候,遇到了项目成本和执行的问题。这仍然是个令人担心的问题。当该战机的成本和管理使得需要对生产谨慎的时候,我们正在朝着实现全力生产努力。”

文章称,尽管五角大楼表达了对该项目的支持,但据路透社报道,五角大楼会在2013财年把到2017年订购的战机数量减少179架。如果这项决定在国会通过,这将会使洛克系统-马丁公司迅速增加该战机产量,降低单价成本的希望落空;这对该公司外销的情况有很大的影响。五角大楼关于降低产量的理由是,降低试飞中存在的未知问题的影响。此外,Block  II软件包的进展也出现了落后的情况。按照原计划,该软件包应该在去年年底就交付试飞战机。

文章称,美国早期曾担心被窃取的是F-35多功能先进数据链系统,但现在则不只是担心了。该系统原本是准备安装在F-22战机和B-2轰炸机上面的,该系统可以使飞机在不被发现的情况下进行通信。项目内部人士表示,多功能先进数据链系统的下马“完全是钱的问题”。多功能先进数据链系统具备高吞吐率、频率跳变和反电子干扰的能力,结合相控阵天线能够发送和接受特定的电磁波信号。

文章称,F-35项目可能由于其发展时间过长而变得脆弱。防务分析专家表示,F-35的信息系统设计并未考虑网络入侵问题。洛-马公司相关人员承认,外资承包商遭到网络入侵,并完全危及到整个项目。事实上,由于存在大量国际资承包商,该隐形战机项目可能有多个被攻击点。此外,该项目还存在一些意想不到的问题。2009的网络入侵行为并非针对F-35,而是针对一类项目。然而,这些偶然的结果造成了很严重的后果。一位退休的航空产业官员表示,入侵方不仅可以窃取数据,还可以监听到相关的在线会议和技术讨论。在发现此次入侵之后,该类别的项目就被中止了,直到一套高成本的新安全系统就位,该项目才得以恢复。

文章称,此外,对影响F-35的因素还有其它观点。一位前美国参议院人士认为,F-35战机项目出现的问题反映了美国对有人驾驶飞机兴趣的降低;因为,飞机的作战效果主要受到机组人员的影响。他说:“我认为F-35面临的最大的问题是,与无人机相比,人们对有人驾驶飞机价值的认知发生了重大转变。我与从阿富汗返回国内的海军陆战队前线空军指挥人员进行了交流,他指出,一架F/A-18能够进行15分钟的活动;而‘死神’无人机则可以连续进行8小时的活动。战机飞行员的时代正在终结,人们有关有人驾驶战机和无人机军事价值的判断正在发生重大转变。”然而,这是一个具有争议性的分析。一位一辈子都在为F-35项目服务的退役空军官员表示,尽管存在成本急剧上升的问题,该战机及其穿透对手综合防空系统的使命将不会受到无人机的威胁。

http://war.163.com/12/0207/10/7PLFLQFM00011MTO.html
这算不算我兔躺着也中枪
楼主的翻译不错嘛。
晕~~还真是兔子躺着也中弹啊~~
典型的屎拉不下怪 兔子看。