PLEASE USE A NAME WHEN COMMENTING

21 July 2009

Addendum to the F-22 Stealth Fighter






Israel Matzav posted a scoop on the Senate Removal of the F-22 Funding



SOME INFORMATION IN THE BACKGROUND

The F-22 Raptor is a fifth-generation fighter aircraft that uses stealth technology. It was designed primarily as an air superiority fighter, but has additional capabilities that include ground attack, electronic warfare, and signals intelligence roles. The United States Air Force considers the F-22 a critical component for the future of US tactical airpower, and claims that the aircraft cannot be matched by any known or projected fighter.
95,000 employed and 300 Million protected

BUT WHAT WE NEED TO KNOW IN CONJUNCTION WITH THE ISRAEL MATZAV REPORT:

I came across the following from Steve Collins a few days ago and was amazed (who has been interviewed on the Tamar Yonah Show): "An Australian news source reported that Chinese computer hackers stole a massive amount of technical data about the USA’s new F-35 fighter (which has not yet been built)...According to the report, the Chinese 'spies were able to siphon off "terabytes" of data related to design and electronic systems"' of the F-35 fighter. The story was originally reported by the Wall Street Journal." Chinese hackers steal JSF secrets

"If China is stealing 'terabytes' of information about the F-35 design plans, there is a chance that China will be building the new F-35 fighter before the USA ever gets it off the drawing board! The US military badly needs the new F-22 fighter airplane to replace it aging inventory of warplanes. The F-22 is already being built and is more advanced that the F-35"


EX-UNIVERSITY OF TENNESSEE PROFESSOR SENTENCED TO PRISON:

Professor Roth had graduate students from China and Iran working with him and he was arrested upon returning from China where he handed over US technology re: unmanned Air Force drones to the Chinese. Hmm. He had a Chinese and Iranian graduate student. China is spying on the USA in a massive way and is expanding its military to defeat the USA in a future war. Iran calls the USA “the Great Satan. Could this have been a clue worth investigating some time ago? Why are Chinese and Iranians allowed to work on high-level military research projects in American Universities when their home nations are rival nations to the USA?

THE FBI SAYS

Federal Bureau of Investigation in Knoxville, Tn: Former University of Tennessee Professor John Reece Roth Sentenced to 48 Months in Prison for Illegally Exporting Military Research Technical Data

KNOXVILLE, TN—On Wednesday, July 1, 2009, John Reece Roth, 72, of Knoxville, Tennessee, was sentenced to 48 months in prison for violating the Arms Export Control Act by conspiring to illegally export, and actually exporting, technical information relating to a U.S. Air Force (USAF) research and development contract. The sentencing, announced today by United States Attorney Russ Dedrick, took place in U.S. District Court in Knoxville, Tennessee, by the Honorable Thomas A. Varlan, Jr., United States District Court Judge. Upon his release from prison, Roth will serve a term of two years supervised release.

These illegal exports by Dr. Roth of technical information, known as “technical data,” related to his illegal disclosure and transport of restricted military information associated with the USAF contract to develop specialized plasma technology for use on an advanced form of an unmanned air vehicle (UAV), also known as a drone. The illegal exports by Dr. Roth of military technical information involved specific information about advanced plasma technology that had been designed and was being tested for use on the wings of drones operating as a weapons or surveillance systems. The Arms Export Control Act prohibits the export of defense-related materials, including the technical data, to a foreign national or a foreign nation.


CONCERNING CYBER THREATS:

The commander of the U.S. Northern Command, Air Force Gen. Victor E. Renuart Jr., said that cyberattacks -- from nation states to individual computer hackers -- pose one of the most serious threats for the military command that is dedicated to protecting the U.S. from attacks on the homeland.

No comments:

Rabbi Wein — Chaye Sarah

Jewish tradition has always viewed the family as being an important component in choosing a proper mate. Though family certainly cannot be t...