« Palestinians complain of widespread torture in PA lockupsJULIE SABBATH GOY BURCHILL »

NATIONAL SECURITY ALERT: F-35 STEALTH FIGHTER SPY COVER-UP

November 3rd, 2010

By Gordon Duff


F-35 Joint Strike Fighter worthless?

“WIKI” STYLE ESPIONAGE LANDS $300 BILLION DOLLAR SUPER-PLANE PLANS

“Another spy disaster like Pollard, shoved under the rug too long due to pressure from the powerful Israeli lobby.”

On April 21, 2009, the Department of Defense announced the theft of 1.5 terabytes of data on the F-35 Joint Strike Fighter, the platform meant give the United States and her allies air superiority for the next 40 years. In a flash, all that was gone, $300 billion dollars of funding down the drain, every system, defense, offense, stealth, everything needed to build one or shoot it down, all gone. Day one, China was accused but it wasn’t China, it wasn’t Iran, it wasn’t Pakistan. The theft left a clear signature, one identical to the data Wikileaks has been receiving, sources inside the Pentagon repeating the actions of Israeli-Soviet spy, Jonathan Pollard. As vital as the F-35 is to America’s defense, Pollard’s triumph on behalf of Soviet Russia and Israel dwarfs the current espionage coup.

Since the 2009 announcement, there has been nothing but silence.

When the theft was announced, Pentagon “damage control” went into action immediately branding the disaster as “unimportant” while scrambling to look for any possible way to “put the toothpaste back into the tube.” What Secretary Gates came up with was a simple denial and to pretend it never happened. With the continual efforts by the Israeli government to secure the release of master spy Jonathan Pollard, a “witch hunt” for another Israeli spy would endanger America’s hopes of winning a settlement between Israel and the Palestinians.

There was no real question, this was another Israeli operation, their “signature” was all over it.

“AN UNPRECEDENTED DISASTER”

What did America lose? 15 years of research and development? That doesn’t come close. Key components of the F-35, from stealth materials, flight and weapons systems, to tens of thousands of man-hours of systems programming are now “out there,” available to any potential rival, military or commercial. At best, it could be considered a $300 billion dollar bank robbery, by American standards, nothing new in today’s financial world.

Another spy disaster like Pollard, shoved under the rug too long due to pressure from the powerful Israeli lobby.

At worst, nations whose defense capabilities were decades behind the US can now be at par, as the F-35 was estimated to be “air superiority capable” until at least 2040. Data stolen could make production of a comparable aircraft possible in as little as 36 months, particularly with several projects in the offing, Russia/India and in China, each of which are capable of quickly adapting upgraded systems.

The JSF (Joint Strike Fighter) in its three variants, conventional takeoff/landing (CTOL, carrier variant (CV) and short takeoff/vertical landing (STOLV), are scheduled for production through 2026 with estimates of service life until 2060 and beyond. Export versions of the F-35, “detuned” are available for American allies, NATO and Israel. The F-35 delivers more “punch” per dollar than any current “legacy” fighter by a margin of as much as 8 to 1.

AIR DEFENSE VULNERABILITY

In March, 1999, on the 4th day of American involvement in the Bosnian war, Serbian forces shot down an F-117 stealth bomber using a Soviet SA 300 air defense system with radar modifications based on data secured through espionage.

Data on the resonant frequencies of the materials and surfaces of the F-117 made it possible for radar to, not only detect a plane previously believed “invisible’ at a range of 13 kilometers, but to successfully destroy one, an embarrassment the US feels the sting of even today.

The stolen data on the F-35 covers more than simple materials but all jamming and other defensive systems and performance characteristics. Air defense systems can now be tuned specifically to find only the F-35 if so required.

THE TRAIL OF THE SNAIL

Wikileaks are called “leaks.” Julian Assange darts from country to country, hotel to TV studio, always ahead of the security forces hunting him down, a veritable “Nordic” bin Laden. Newspapers are peppered with photographs of a boyish face in the uniform of the American army, identified as the potential “leaker.” The 46,000 intelligence/counter-intelligence officers of the Department of Defense, supplemented by the FBI and 16 other agencies and 40 other departments, more “bodies” than currently serve in Afghanistan, we are told, are unable to rein in this “dangerous duo.”

Documents by the hundreds of thousands are leaked, upon qualified examination, showing careful screening with many documents edited and more selected out of series with careful gaps and omissions. A single non-commissioned officer, watched 24 hours a day by tens of thousands of security officers and threatened with life in prison, is an unlikely suspect. However, there has been no mention of any others nor has there been a mention of an investigation of any kind. In fact, there seems to me no attempt whatsoever to curtail these current leaks.

What does this tell us?

WHEN IS A LEAK “HACKING” AND WHEN IS HACKING A “LEAK” AND WHAT IS “ESPIONAGE?”

It was never announced when, exactly, the theft of the F-35 data occurred. The press release was April 21. 2009, long enough after President Bush left office for the blame to evade his administration, one infamous for “leaks” such as the “Scooter” Libby (Liebowitz) “outing” of CIA nuclear proliferation specialist Valerie Plame.

Despite the “cute” attempt by the Department of Defense and Secretary Gates to refer to espionage as “hacking,” there is nothing either innocent or harmless about it. As all data is formatted for electronic media and secured by firewalls and passwords, all espionage is “hacking.”

The difference between “leaking” and “spying” is semantics. The goal is the same, destruction of the defense capabilities of the United States, except “spying” pays better.

The people responsible for each, particularly when they access the same systems and overcome the same roadblocks, all requiring the same physical access, are one in the same.

Those who “leak” perform an identical task to those who spy.

Those who leak, those who have leaked appear to be, to any reasonable person, exactly the same people who are spying now and who were supporting Pollard.

The first place we look, before new Russian, Indian, Iranian or Chinese version of the F-35 take flight or our first F-35 meets a fiery end is Israel. No Chinese or Pakistani’s or Iranians have gained by the F-35 espionage “clone” operations known as “Wikileaks.”

Assange is a recipient. He may well be a “dupe.”

The group rifling the “underwear drawers” of the Pentagon may well, at times, be pranksters pulling America’s tail, Pentagon insiders all.

They are also spies.

-###-

By Gordon Duff http://www.veteranstoday.com:80/2010/11/02/national-security-alert-f-35-stealth-fighter-spy-cover-up/

No feedback yet

Voices

Voices

  • LifeSiteNews The president-elect praised the former Democratic congresswomen and said she'll bring a 'fearless spirit' to the intelligence community as a member of his cabinet. President-elect Donald Trump announced Wednesday that he would nominate…
  • Paul Craig Roberts There’s many a slip between cup and lip I have been speaking with MAGA Americans and, as I suspected, there is little comprehension of the vast impediments to renewal. The swamp that Trump is to drain is entrenched and…
  • PDF's for Einstein, Dr. Rosaly M. C. Lopes, Darwin, Lorenzo Langstroth, Marie Curie, Shakespeare & Many More! by Tracy Turner Shakespeare, Curie, Orwell, Hemingway, Dostoevsky, Lopes, Einstein Dr. Rosaly Lopes Director of the Planetary Science…
  • RT.com Speaking just one day after the Republican candidate's US election victory, the Russian president explained Moscow's position on a range of global issues Russian President Vladimir Putin addressed pressing global issues at Sochi's annual Valdai…
  • The Pretender's Magic is their diversity in musical range. Mystifying the sultry blues of "Blue Sun" to the punk-infused anthems like "Brass in Pocket," the band slips into these heterogeneous grooves with greased skids. Chrissie's wide-ranging influences pair with The Pretenders, evolving while retaining core elements of its personality. The eclectic portfolio will consistently deliver a "new" live surprise. Sorry, but there is no raucous Lynyrd Skynyrd "Play Free Bird" here. Everybody has a favorite, many favorites. The diversity of the songs makes every new and old fan curious to learn more about one aspect or another of the band's expression.
  • By Joe Granville When the formula is calculated, it yields a very small probability—around 1.45 × 10⁻¹⁴, or 0.00014%. This result suggests that, mathematically, Trump's victory is extremely unlikely under these assumptions. A centrist in the Tea Party,…
  • by Ellen Brown Buncombe County North Carolina – damage after Hurricane Helene floods. NCDOTcommunications, CC BY 2.0 https://creativecommons.org/licenses/by/2.0, via Wikimedia Commons Asheville, North Carolina, is known for its historic architecture,…
  • By: Brett Redmayne-Titley "When injustice becomes law, resistance becomes duty." It is not inaccurate to determine that we, the remaining moral world, are in reality also Palestinian by metaphor. Likewise, we are all individually disenfranchised,…
  • Paul Craig Roberts The Democrats are set to steal the election. They have everything in place except enough votes to hide their theft. Watch the video of the Trump Grand Finale, listen to the speeches by Robert Kennedy and Tucker Carlson. Marvel at the…
  • Joe Scarborough recently resigned from Congress unexpectedly, soon after a divorce and amid rumors about his marital fidelity Reader Comment Posted December 18, 2001 FORT WALTON BEACH, Fla. - Lori Klausutis, a 28-year-old office worker for Rep. Joe…
November 2024
Sun Mon Tue Wed Thu Fri Sat
 << <   > >>
          1 2
3 4 5 6 7 8 9
10 11 12 13 14 15 16
17 18 19 20 21 22 23
24 25 26 27 28 29 30

  XML Feeds

blog engine
FAIR USE NOTICE: This site contains copyrighted articles and information about environmental, political, human rights, economic, democratic, scientific, and social justice issues, etc. This news and information is displayed without profit for educational purposes, in accordance with, Title 17 U.S.C. Section 107 of the US Copyright Law. Thepeoplesvoice.org is a non-advocacy internet web site, edited by non-affiliated U.S. citizens. editor
ozlu Sozler GereksizGercek Hava Durumu Firma Rehberi Hava Durumu Firma Rehberi E-okul Veli Firma Rehberi