Pentagon accuses China of bolstering its military through “cyber theft”


Chinese J-20 fighter planes and Lockheed Martin’s F-35 Lightning II Joint Strike Fighter are “awfully similar”.

According to Peter Suciu of The National Interest, there is no doubting that Beijing has taken it seriously, particularly when it comes to military weapons. In the spring of 2019, the Pentagon accused China of bolstering its military through “cyber theft” and other means.

Lockheed Martin discovered in 2007 that Chinese hackers were stealing technical documents relating to the F-35 development, and the Asia Times claimed that a similar loss occurred when hackers working for Beijing accessed the network of an Australian F-35 subcontractor.

According to those breaches, it appears likely that the Chinese got critical knowledge and technical data used in the development of the J-20. Additionally, Suciu notes that the J-20’s development began in earnest only after the F-22 was shown.

This is evident in the J-20 “Mighty Dragon” aircraft, which was probably certainly based on stolen Lockheed Martin F-22 Raptor designs, according to The National Interest.

Watch latest movies on Netflix !

As previously revealed by Business Insider, the aircraft’s appearance and profile are far from the only similarities between the two fifth-generation fighters.

Furthermore, not only does the Chinese fighter resemble the F-22, but its sensor system also resembles the Lockheed Martin Electro-Optical Targeting System used on the Lightning II, Suciu notes. This shows that espionage had a role in the Mighty Dragon’s development.

China’s ambitions to establish a world-class military have undoubtedly been funded not by local research and development (R&D), but by borrowing from foreign powers.

Even Russia has expressed dissatisfaction with China’s brazen “borrowing” of technological advancements as Beijing continues to develop increasingly sophisticated military weapons, according to The National Interest.


Visit for more interesting stories.


Leave a Reply