Officials: Chinese Spying Helped Develop Stealth Jet

Thursday, 13 Mar 2014 02:29 PM

By Joe Battaglia

Share:
  Comment  |
   Contact Us  |
  Print  
|  A   A  
  Copy Shortlink
U.S. officials and defense analysts have indicated that China's multiyear cyberespionage operation yielded sensitive technology and aircraft secrets which it was able to use in building its new J-20 stealth fighter jet.

The Chinese cyberspying occurred in 2007, when it compromised military contractors Lockheed Martin, Raytheon, and Northrop Grumman, and included stealing plans for the Pentagon's $300 billion Joint Strike Fighter project — the Defense Department's costliest weapons program ever. Designs for nearly two dozen other major weapons systems were also breached, The Washington Free Beacon reported.

Other weapons systems accessed by Chinese hackers include the Patriot missile system, Terminal High Altitude Area Defense, and the Army's ballistic missile interceptor program
Aegis.

The Joint Strike Fighter, also known as the F-35 Lightning II, is the most technically challenging weapons program the Pentagon has ever attempted. The plane relies on 7.5 million lines of computer code, which the Government Accountability Office told The Wall Street Journal is more than triple the amount used in the current top Air Force fighter.

For years, China expressed frustration that its military lagged behind the U.S. technologically. While experts were skeptical that the Asian country would be able to field a stealth fighter, it shocked the world in January 2011, showing off a fully functional design.

"You've seen significant improvements in Chinese military capabilities through their willingness to spend, their acquisitions of advanced Russian weapons, and from their cyberespionage campaign," James A. Lewis, a cyberpolicy expert at the Center for Strategic and International Studies, told the the Post. "Ten years ago, I used to call the  [People's Liberation Army] the world's largest open-air military museum. I can't say that now."

China's cost-effective strategy to update its military appears to have been twofold. It purchased some technologies at discounted rates from U.S. Cold War-era rivals such as Russia. Other technologies it simply stole from the United States and built itself.

Stolen data was obtained by a Chinese military unit called a Technical Reconnaissance Bureau based in the Chengdu province. The data was then passed to the state-run Aviation Industry Corp. The Chengdu Aircraft Industry Group, a subsidiary of AVIC, used the stolen data in building the J-20.

In a Jan. 20 article, the Global Times, China's official Communist Party newspaper, bragged about how key technologies used for the F-35 Lightning II were "completely obtained" by the government, according to The Washington Times. The article stopped short of claiming those technologies were acquired directly from the United States.

Recent photographs published on Chinese websites showing a newer version of the J-20 seem to confirm theft of F-35 data. The new version of the radar-evading aircraft had incorporated several design upgrades since the first demonstrator aircraft was revealed in 2011.

One of its most significant weapons enhancements is a new electro-optical targeting system under its nose. Protruding engine nozzles seen in the earlier version have been hidden in an attempt to further reduce the jet's radar signature. The newest J-20 also appeared with a different radar-absorbing coating.

Du Wenlong, a Chinese Academy of Military Sciences official, told Chinese state television on Feb. 20 that the new J-20's shortened exhaust nozzles and tail and vertical fin modifications were designed to reduce radar detection. He added that a "revolutionary" breakthrough allowed the twin engines to increase both power and reliability.

Richard Fisher, a Chinese weapon systems specialist with the International Assessment and Strategy Center, said the new J-20 was flight-tested on March 1 and demonstrated the enhanced fifth-generation jet fighter features. He termed the implementation of these enhancements to be "very curious."

In 2012, Rep. Michael McCaul, chairman of the House Homeland Security Subcommittee on Oversight, Investigations and Management, warned that cyberattacks, such as the one executed by the Chinese, place the country at risk.

"Make no mistake, America is under attack by digital bombs," McCaul said, according to CBS News.

He added that the theft of $1 trillion in intellectual property was a "serious economic issue," and that the theft of F-35 blueprints would enable China to, "manufacture those planes and then guard against those planes."


Related Stories:

© 2014 Newsmax. All rights reserved.

Share:
  Comment  |
   Contact Us  |
  Print  
  Copy Shortlink
Around the Web
Join the Newsmax Community
Please review Community Guidelines before posting a comment.
>> Register to share your comments with the community.
>> Login if you are already a member.
blog comments powered by Disqus
 
Email:
Retype Email:
Country
Zip Code:
Privacy: We never share your email.
 
Hot Topics
Follow Newsmax
Like us
on Facebook
Follow us
on Twitter
Add us
on Google Plus
Around the Web
Top Stories
You May Also Like

Sen. John Barrasso Mocks John Kerry's Climate Change Fears

Friday, 29 Aug 2014 22:23 PM

Secretary of State John Kerry ought to focus more on the immediate and deadly threats to the United States from around t . . .

Democrats Keep Obama at Distance Ahead of Mid-Term Elections

Friday, 29 Aug 2014 22:00 PM

Barack Obama's Democrats are walking a tightrope 10 weeks before US congressional elections: do they solicit the unpopul . . .

Report: Islamic State Computer Had Instructions for Jihad

Friday, 29 Aug 2014 21:20 PM

A dusty laptop snatched from an Islamic State hideout stashed thousands of documents about how to carry out the jihadist . . .

Most Commented

Newsmax, Moneynews, and Independent. American. are registered trademarks of Newsmax Media, Inc. Newsmax TV, NewsmaxWorld, NewsmaxHealth, are trademarks of Newsmax Media, Inc.

 
NEWSMAX.COM
America's News Page
©  Newsmax Media, Inc.
All Rights Reserved