>> "HOW CHINA COPIED 5 IMPORTANT U.S WEAPONS ?" の動画ページ
"HOW CHINA COPIED 5 IMPORTANT U.S WEAPONS ?" の動画はこちら
"HOW CHINA COPIED 5 IMPORTANT U.S WEAPONS ?" について
USA has long accused China of aggressive espionage & reverse engineering. Officials and organizations have traced various attacks on corporates and government computer systems in US to computers in China. The attacks in some cases are so sophisticated that it will be impossible to perpetrate without the backing of Chinese government.
In this video, Defense Updates looks at 5 weapons of US that China has stolen design information, reversed engineered & created copies. Note that, these weapons have been listed according to their importance in battlefield.
Lets get started.
SIKORSKY UH-60 Black Hawk
In the 1980s, China purchased two dozen civilian version of the Black Hawk (S-70C-2s).
They got some insights about design but were not able to do much since these did not contain secret components like the military version. This changed in 2011. Pakistan gave China access to the previously unknown U.S. "stealth" Sikorsky UH 60 helicopter that crashed during the commando raid which killed Osama bin Laden in May. This was done despite, explicit requests from the CIA not to.
It is believed that Chinese experts took detailed photographs of the design and more importantly collected the sample of the stealth coating, which is used to hide the craft from radars.
In late 2013, China conducted a flight test of a Z-10 helicopter, which closely resembles the Sikorsky UH-60 “Black Hawk.”
Z-20, improved version of Z 10 is currently in development phase, and is also expected to enter production in 2018.
AM GENERAL HMMWV HUMVEE LIGHT TRUCK (U.S.)
CHINESE DONGFENG EQ2050 BRAVE SOLDIER
For 30 years, AM General's Humvee has served US troops around the world, achieving iconic status.
In the late 1980s, AM General, a major vehicle manufacturer based in Indiana, wanted to sell the High Mobility Multipurpose Wheeled Vehicle, also known as the Humvee, to the Chinese People’s Liberation Army (PLA).
The PLA rejected the offer, and picked up one Humvee that was left by AM General in China. They also gathered the few civilian Humvees that Chinese oil companies had bought in the 1990s. Using reverse engineering, they built a prototype and named it Dongfeng EQ2050.
C-17 GLOBEMASTER III
Beginning in the winter of 2009, two Chinese hackers began sending malicious e-mails to Boeing employees disguised to look as if they came from familiar people. Even if one employee opened the mail and downloaded the attached file, it could give hackers a portal to secrets, corporate and US Department of Defense plans, engineering details, and potentially classified Pentagon files stored on Boeing networks. And that’s exactly what happened.
Over the next two years, hackers stole some 630,000 files from Boeing related to the C-17, the third most expensive plane that the Pentagon has ever developed, with research and development costs of $3.4 billion. They obtained detailed drawings; measurements of the wings and fuselage, and other parts; outlines of the pipeline and electric wiring systems; and even flight test data.
On 26 Jan 2013 Chinese copy of C17,Y-20 Doppelganger, first flew. Currently, 8 are in service more production is planned in future.
NORTHROP GRUMMAN X-47B UNMANNED COMBAT AIR VEHICLE (UCAV)
CHINESE LIJIAN SHARP SWORD UCAV
General Atomics MQ-1 Predator UAV (U.S.)
CHENGDU WING LOONG “PTERODACTYL” UAV
Beginning in 2011, a series of weaponized emails—PDF and Microsoft Word attachments with malware inside—were sent to people who work to build American drones. A cyber security group found that the attachments, many of them with benign titles like "Boeing_Current_Market_Outlook_2011_to_2030.pdf", originated with a hacker group in Shanghai linked to China's military.
Of the 261 attacks uncovered, 123 targeted U.S. drone companies, from large defense contractors to small firms. According to analyst, these were largely successful.
The newest Chinese drones build with stolen data; closely resemble US aircraft visually and in performance, a remarkable turn-around time for China’s aviation industry.
LOCKHEED MARTIN F-35B Lightning II (U.S.)
Shenyang J-31 that was unveiled in late 2014.
The pentagon began the F 35 program in 2001 with an aim to develop a cost effective replacement for the U.S military’s F15 fighters, F16 and F18 bombers and reconnaissance aircraft, and a-10 close air support warplanes.
The NSA estimated that the Chinese had conducted more than 30,000 cyber attacks as part of the massive defense industrial espionage, and that more than 500 attacks were significant intrusions in Department of Defense (DOD) systems. More than 1,600 network computers were penetrated and at least 600,000 user accounts were compromised, from the Chinese cyber spying.
"HOW CHINA COPIED 5 IMPORTANT U.S WEAPONS ?" に関連する動画はこちら
"HOW CHINA COPIED 5 IMPORTANT U.S WEAPONS ?"の動画にご興味のあるあなたへ
"HOW CHINA COPIED 5 IMPORTANT U.S WEAPONS ?"の動画を見ると、関連の動画が次々と出てきて、
"HOW CHINA COPIED 5 IMPORTANT U.S WEAPONS ?"の動画を見るだけで、勝手にアクセスを呼んで