Visual China After the air raid on Syria by the United States, Britain and France, two cruise missiles were suspected to have failed to detonate in the Syria strike. The The Associated Press recently expressed great indignation over Syrias handling of the Tomahawk missile to Russia and demanded the return of unexploded missiles. Although the parties disclosed that it was just a Tomahawk missile, the two missiles may include an extended range united defense zone to ground missile, or a JASSM-ER missile. Russian experts said: this kind of precision weapons outside the zone has a considerable threat. It will be interesting to study this kind of weapon. By dismantling and analyzing other countries weapons and equipment, understanding the specific technology, key components and materials used, reverse engineering, cracking weapons and carrying out imitation and tracking research, looking for ways to reverse or needles for our own weapons, said Professor Wang Qun, a think-tank of the defense science and technology strategy at National University of Defense Technology. The improvement and improvement of sex is an important way to promote the development of domestic weapons. Military technology secret war never stops The joint defense area outer space missile, abbreviated JASSM, JASSM missile and extended range JASSM-ER missile can carry out all weather cruise under all weather conditions, and have the same damage and concealment characteristics. This is the first time JASSM has participated in actual combat. If Russia gets the real thing, it should be a windfall. Russian experts said that the study of these missiles will help Russia improve its missile defense system, as well as electronic warfare system. Wang Qun pointed out: acquiring and cracking military technology in a similar way is not a patent for backward countries. Some of the former Soviet Unions nuclear weapons manufacturing technology is alleged to have been stolen from the United States. The United States and other western countries often get Soviet military technology through this way. In the 70s of last century, pilot Belenko drove the Soviet Unions most advanced MIG -25P fighter plane to defy Japan. At that time, MIG -25 was the fastest and highest flying intercept fighter in the world, which was once one of the most feared things in the United States. The final result is that the United States and Japan fully understand this kind of fighter and end the myth of MIG -25. In 1991, the United States intelligence service took advantage of the withdrawal of the former Soviet Red Army stationed in democratic Germany and joined the federal intelligence agency with the German Federal intelligence agency to carry out the big action of the GIRAFFE. In this big purchase, NATO military experts got what they had been dreaming of - the only strategic guide deployed in the Democratic Germany. Projectile early-warning radar system. Reverse engineering acquirement is not easy. At present, there are many ways to understand each others weapons and equipment and acquire military technology. Wang Qun introduced, the most common is from third party access or close contact with weapons and equipment. In 2017, there were media reports that despite a secrecy agreement with Russia, India asked the US Navy representatives to enter the Russian chakra nuclear submarine to visit the nuclear submarine, causing the Russian military to be angry. Because for experts, do not speak directly into the interior of the equipment, even if it can be observed near the distance, sometimes it is possible to basically judge some of the less clear details, to understand its design and design inspiration. If we can enter the internal equipment, we will surely cause more military technology leakage. Wang Qun said that this method can often achieve twice the result with half the effort for the development of weapons and equipment. A small detail in the development of weapons and equipment may cause the development process to stagnate or the equipment performance is not up to standard, but through such a visit, it may be possible to play a single role. Another way to get information is by collecting weapons or wreckage or seizure of weapons and equipment. He said. During the capture of Ben Laden, the U. S. Army crashed an advanced stealth helicopter. Although the six team members of the seals were destroyed, they left a complete tail rotor for the world to study. The technical personnel of the countries obtained some special useful information from the wreckage of the tail and the debris of the fuselage, for example. The configuration of the tail, the fairing, the stealth material, etc. Of course, reverse copying is not the one who can do all, must have a certain industrial base and technology accumulation, with an excellent technical team, it is possible to obtain the desired military technology. After the capture of the US missile, Syria did not study itself, but gave it to Russia. In fact, it was the lack of technical level in Syria and the lack of a corresponding R & D system. Wang Qun pointed out. The core technology can not be copied by reverse copying It is necessary to recognize that through the deconstruction of this kind of material, we can be informed of the configuration of the weapon, the use of materials and other technical details, to understand the technical route of the other, to get the inspiration for design, to find the gap, and so on. Wang Qun said, of course, there are some more complex equipment, even if you get the object, reverse engineering, it may not be able to decipher some of the key and core technologies. Many things can only rely on their own long-term research and development and technology accumulation and excellent processing technology, such as aero engines. For example, materials are hard to be copied in reverse. The material composition of aero engines may be acquired by modern analytical techniques. But the same proportion of ingredients and different manufacturing processes will result in different material properties. In addition, even if the hardware of weapons and equipment can be deconstructed and the key technologies and components are understood, the important software systems, such as the control system software of weaponry, can not be replicated. To a certain extent, this is the key factor to decide the performance of weapon equipment. Without breaking the security password, there is no data, no source code and the meaning of code. Therefore, many things can only be developed and tested by themselves. Wang Qun said, in addition, producers will also adopt some protective measures on hardware. Once they are forced to open, they will destroy hardware integrity. In order to prevent China from acquiring advanced technology and replicating, Russia has done special treatment on the key parts of its engine to prevent China from getting advanced technology and copying it, according to media reports. It is not only difficult to deconstruct them, but also may destroy the whole engine. Wang Qun pointed out: it is undeniable that this way of acquiring military technology through reverse engineering can get inspiration and better understand design ideas and technical details and technical routes. But ultimately, if we want to make breakthroughs in military technology, the key lies in independent research and development and independent innovation. We must work hard in hard power. Source: ScienceDaily daily - editor in charge of China Science and Technology Net: Liang Lian Fei _NBJS6165 In addition, even if the hardware of weapons and equipment can be deconstructed and the key technologies and components are understood, the important software systems, such as the control system software of weaponry, can not be replicated. To a certain extent, this is the key factor to decide the performance of weapon equipment. Without breaking the security password, there is no data, no source code and the meaning of code. Therefore, many things can only be developed and tested by themselves. Wang Qun said, in addition, producers will also adopt some protective measures on hardware. Once they are forced to open, they will destroy hardware integrity.