For years, China has been accused of conducting cyber espionage and intelligence-gathering operations targeting the United States military, particularly its advanced aircraft programs. The theft of classified information related to the F-22 Raptor and F-35 Lightning II, two of the most sophisticated stealth fighter jets ever built, has had profound implications for global military power dynamics. This article explores the history of China’s espionage efforts, the impact on U.S. national security, and how these stolen technologies have shaped China’s own stealth fighter programs.
The U.S. Air Force’s Crown Jewels: F-22 and F-35
The F-22 Raptor and F-35 Lightning II are among the most advanced stealth fighter jets ever developed by the United States. These aircraft are equipped with cutting-edge avionics, stealth technology, and combat capabilities that provide the U.S. and its allies with air superiority.
- F-22 Raptor: Designed as an air superiority fighter, the F-22 is known for its unmatched speed, agility, and stealth. The aircraft features highly classified radar-evading technology, making it difficult for enemy forces to detect.
- F-35 Lightning II: The F-35 is a multi-role stealth fighter that comes in three variants: the F-35A for conventional takeoff and landing, the F-35B for short takeoff and vertical landing, and the F-35C for aircraft carrier operations. It incorporates advanced sensor fusion, electronic warfare capabilities, and a high-tech helmet-mounted display system.
These aircraft are not just machines; they represent billions of dollars in research, development, and testing efforts over decades. Keeping their technology secure is paramount for the United States. However, over the years, China has managed to gain access to critical data related to both aircraft.
How China Stole U.S. Stealth Fighter Secrets
Su Bin and the Theft of F-22 & F-35 Data
One of the most significant espionage cases involving China and U.S. stealth fighters was that of Su Bin, a Chinese national who played a pivotal role in stealing military secrets.
Between 2008 and 2014, Su Bin, a businessman with ties to the Chinese military, worked with hackers linked to the People’s Liberation Army (PLA) to infiltrate U.S. defense contractors. He specifically targeted Boeing, Lockheed Martin, and other aerospace firms involved in developing the F-22 and F-35. Su Bin’s group successfully extracted over 630,000 files related to the C-17 cargo aircraft and critical design documents for the F-22 and F-35.
The stolen data included:
- Blueprints and technical specifications
- Radar cross-section data
- Engine schematics
- Electronic warfare systems
This breach provided China with valuable intelligence on how U.S. stealth technology works and could be replicated.
Su Bin was arrested in 2014 in Canada and later extradited to the United States, where he pleaded guilty in 2016. He was sentenced to 46 months in prison, but by then, the damage was already done.
Cyber Breaches in the F-35 Program
Beyond Su Bin’s activities, China has also been linked to numerous cyber espionage campaigns targeting the F-35 program.
In 2009, reports emerged that Chinese hackers had breached U.S. military networks and defense contractors working on the F-35. The hackers reportedly accessed terabytes of sensitive data, including the jet’s stealth capabilities, sensor systems, and mission parameters.
As a result of these breaches, cybersecurity experts believe China was able to reverse-engineer many of the design features of the F-35 and incorporate them into its own military aircraft.
China’s Stealth Fighter Program: A Copy-Paste Strategy?
Following the espionage activities and data breaches, China unveiled its own stealth fighter programs, the Chengdu J-20 and the Shenyang J-35. Many military analysts believe these aircraft incorporate stolen U.S. technology.
Chengdu J-20: China’s Answer to the F-22
- First flight: 2011
- Role: Air superiority fighter
- Key features: Twin-engine design, advanced stealth shaping, and an internal weapons bay
The J-20 bears striking similarities to both the F-22 and F-35. It features a sleek, angular design with an emphasis on stealth, much like the F-22. Some reports suggest that China struggled to develop indigenous stealth coatings and engine technology, further supporting the idea that stolen data played a role in its development.
Shenyang J-35: China’s Version of the F-35
- First revealed: 2024 Zhuhai Airshow
- Role: Multi-role stealth fighter, likely for naval use
- Key features: Single-engine design, stealth capabilities, and carrier compatibility
The J-35 looks almost identical to the F-35, prompting speculation that China copied key aspects of the American jet. Military experts have noted similarities in:
- The aircraft’s shape and stealth characteristics
- The placement of its sensors
- The internal weapons bay design
Both the J-20 and J-35 serve as clear indications that China has leveraged espionage to close the technological gap with the U.S.
Strategic Consequences of China’s Espionage
The implications of China’s theft of U.S. stealth technology are significant.
1. The Shrinking U.S. Technological Advantage
For decades, the United States maintained air superiority through its advanced aircraft. However, with China rapidly developing its stealth capabilities, the U.S. may lose its edge in future conflicts.
2. Enhanced Chinese Military Power
China’s J-20 and J-35 are now part of the PLA Air Force and PLA Navy, giving China greater strategic flexibility in the Indo-Pacific. These aircraft could challenge U.S. air dominance in Taiwan, the South China Sea, and beyond.
3. The Need for Stronger Cybersecurity
The U.S. Department of Defense has since strengthened its cybersecurity measures to prevent further espionage. However, China’s past success in stealing F-22 and F-35 data raises concerns about future technology leaks.
The Battle for Military Supremacy Continues
The theft of U.S. military technology, particularly stealth fighter secrets, has allowed China to fast-track its own defense programs and challenge U.S. air superiority. The J-20 and J-35, believed to be heavily influenced by stolen designs, are now active parts of China’s growing military power.
While the U.S. continues to innovate with new programs such as the Next-Generation Air Dominance (NGAD) fighter, espionage remains a critical issue in the race for technological dominance. As cyber warfare and intelligence-gathering evolve, the battle for supremacy in the skies is far from over.
Would you like more details on how the U.S. is countering these threats with new stealth aircraft programs?