The Shenyang J-31 (F60)

The Shenyang J-31 (F60) Photo via airliners.net by wc

China's Copycat Jet Raises Questions About F-35

Did the Chinese theft of data on the US fighter jet and other weapons shrink the Pentagon's technical superiority?

New technical specs about China’s new J-31 fighter, a plane designed to rival the American-made F-35 Joint Strike Fighter, popped up on a Chinese blog last week. So who has the advantage — the U.S. or China?

China’s twin-engine design bears a striking resemblance to the single-jet F-35. Still, the Joint Strike Fighter is expected to fly slightly farther and carry a heavier load of weapons, according to the data, which was first reported by Jane’s.

Military experts say that while the J-31 looks like, and may even fly like, the F-35, it’s what’s under the hood and embedded in the skin that really matters. The U.S. has the better computer software, unique sensors and other hardware, stealth coating, and engines technology—all critical attributes that make fifth-generation aircraft different than the military jets of last century.

Exactly how long that advantage lasts is up for debate; senior Pentagon officials and experts believe American technology superiority is shrinking. That means the U.S. military’s weapons will not overmatch adversaries for as long as they have in past decades.

“It’s basically, are they producing weapon systems that have fifth-generation characteristics that potentially nullify some of our planned advantages in the future battlespace,” said Peter Singer, a strategist and senior fellow at New America.

“[W]e were depending more so on the [American weapons] having that generation-ahead edge, and if we don’t have that generation-ahead edge, that is incredibly scary for us in various scenarios,” Singer said.

U.S. Deputy Defense Secretary Robert Work and acquisition chief Frank Kendall have spent much of the past two years warning that the U.S. military’s technology advantage is eroding.

“What it does is reduce the cost and lead time of our adversaries to doing their own designs, so it gives away a substantial advantage,” Kendall said of cyber espionage at a 2013 Senate Appropriations Defense Subcommittee hearing.

Since then, Work and Kendall have been leading projects to find technologies that will give the American military an advantage on the battlefield of the future.

China is suspected of stealing F-35 design data in 2009. U.S. officials have said classified information was not stolen in that breach, but in 2011 it emerged that China was building a multirole, stealth fighter of its own that could strike targets in the air and on the ground, like the F-35. The J-31 flew for the first time in 2012.

The Pentagon huddled with defense companies in 2007 to urge firms to better protect their networks. Companies are attempting to beef up their cybersecurity, but there is a gap in the security talent, said Justin Harvey, chief security officer for Fidelis Cybersecurity, a firm that works with the U.S. government and private industry.

“They’re buying these tools, but they’re not investing a ton in the people,” he said. Whenever a company is attacked, they typically call Fidelis or similar cybersecurity firms to consult because they don’t have employees with the training or experience to assess the breach.

“I think 90 percent of U.S. companies are not equipped to deal with cyber espionage,” Harvey said.

The defense industrial base and financial services industry are the best-protected, he said.

Cyber espionage allows rival companies to get access to the information gleaned during testing “for the cost of breaching your network,” Singer said.

Cyber theft allows China to save tens of billions of dollars in research-and-development, the experimentation and testing a new weapon goes through before it reaches the battlefield, experts say. While the Chinese jet fighters might still be inferior to the American planes, not having to do early research and development allows them to focus on upgrades and improvements.

This means the 10- to 20-year advantage an aircraft like the F-35 was supposed have on the battlefield might not be there, Singer said. Those Chinese plans could then compete against U.S.-made aircraft 20 years from now when the U.S. government allows more and more allies to buy the F-35.

“Those future competitions will be incredibly difficult because we’ll have paid the R&D for our competitors,” Singer said.

Increased research-and-development costs, ever common in Pentagon acquisition projects, often lead to a decrease in the total number of items purchased. Most recently, this was the case with the F-35’s older brother, the F-22 Raptor. The Air Force had wanted more than 700 planes, a number cut first to 381 and ultimately to 187.

“The expense of our fifth-generation [fighter aircraft] means we have not been able to buy as many as we want,” Singer said.

But the F-35, unlike previous aircraft, has been designed to receive upgrades over the years, which will ultimately improve its capabilities, allowing it defeat new threats.

F-35 development will end in October 2017. After that the program will move into a “follow-on development” phase, said F-35 project spokesman Joe DellaVedova. “One of the F-35’s great strengths is that it’s a growth platform, so its software, its processors, its radar, its capability; there’s a lot of room for growth."

The jet fighters will get software and hardware upgrades every two years on an alternating basis.

The F-35 itself and its ground equipment undergo multiple tests each year to make sure the systems can withstand cyber attack, DellaVedova said. “We take the cyber threat very seriously,” he said.

While the Chinese planes might still have inferior systems, stealing intellectual property and subsequent R&D savings also allows Beijing to make drastic changes in prototypes.

For the J-20, a Chinese stealth fighter being built to rival the F-22, there have been numerous prototypes in which the plane’s design has become stealthier, Singer said.

“Their designs, their capabilities are shifting from prototype to prototype in a way that has not happening with the current way that we are building our fifth-gen systems,” he said.

X
This website uses cookies to enhance user experience and to analyze performance and traffic on our website. We also share information about your use of our site with our social media, advertising and analytics partners. Learn More / Do Not Sell My Personal Information
Accept Cookies
X
Cookie Preferences Cookie List

Do Not Sell My Personal Information

When you visit our website, we store cookies on your browser to collect information. The information collected might relate to you, your preferences or your device, and is mostly used to make the site work as you expect it to and to provide a more personalized web experience. However, you can choose not to allow certain types of cookies, which may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more and change our default settings according to your preference. You cannot opt-out of our First Party Strictly Necessary Cookies as they are deployed in order to ensure the proper functioning of our website (such as prompting the cookie banner and remembering your settings, to log into your account, to redirect you when you log out, etc.). For more information about the First and Third Party Cookies used please follow this link.

Allow All Cookies

Manage Consent Preferences

Strictly Necessary Cookies - Always Active

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data, Targeting & Social Media Cookies

Under the California Consumer Privacy Act, you have the right to opt-out of the sale of your personal information to third parties. These cookies collect information for analytics and to personalize your experience with targeted ads. You may exercise your right to opt out of the sale of personal information by using this toggle switch. If you opt out we will not be able to offer you personalised ads and will not hand over your personal information to any third parties. Additionally, you may contact our legal department for further clarification about your rights as a California consumer by using this Exercise My Rights link

If you have enabled privacy controls on your browser (such as a plugin), we have to take that as a valid request to opt-out. Therefore we would not be able to track your activity through the web. This may affect our ability to personalize ads according to your preferences.

Targeting cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.

Social media cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools.

If you want to opt out of all of our lead reports and lists, please submit a privacy request at our Do Not Sell page.

Save Settings
Cookie Preferences Cookie List

Cookie List

A cookie is a small piece of data (text file) that a website – when visited by a user – asks your browser to store on your device in order to remember information about you, such as your language preference or login information. Those cookies are set by us and called first-party cookies. We also use third-party cookies – which are cookies from a domain different than the domain of the website you are visiting – for our advertising and marketing efforts. More specifically, we use cookies and other tracking technologies for the following purposes:

Strictly Necessary Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Functional Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Performance Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Social Media Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Targeting Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.