What's new

After Copying F-35's Stealth, China's J-20 Duplicating its Non-Stealth Features

dani191

SENIOR MEMBER
Joined
Jul 10, 2017
Messages
4,781
Reaction score
-9
Country
Israel
Location
Israel

  1. AIR
  2. Fighter Aircraft
  3. China
After Copying F-35's Stealth, China's J-20 Duplicating its Non-Stealth Features
  • Our Bureau
  • 09:18 AM, June 4, 2020
  • 322357

16df76901_1591262181.jpg

J-20 fighter
China's J-20 stealth jet, believed to be a copycat design of the US-made F-35, is now duplicating its non-stealth feature - to carry weapons on external pylons.

The F-35 and J-20 carry missiles and bombs in an internal weapons bay to avoid radar detection. However, for some missions requiring heavier weapons load, these are mounted on external pylons, at the expense of stealth.

On Monday, local media posted photograph showing a J-20 prototype undergoing a test flight with two external pylon adapters, one under each side of its wings.

The Chinese jet previously had the capacity to carry four PL-15 missiles in its main weapons bay and two PL-10 short-range missiles in its side weapons bay. The external adapters will enable the jet to carry four more missiles.

Based on the mission, different types of loadouts can be chosen. “Beast mode” with more munitions can be activated in low-risk and low-threat missions.

In addition, the Chinese media speculated that the J-20 fighters could also carry external fuel tanks for extended range.

es1gpr7xs_1591262198.jpg

Lockheed F-35 jet
The J-20’s sensor system also looks similar to the F-35’s Electro-Optical Targeting System (EOTS) in terms of shape and placement. In 2007, Chinese hackers allegedly stole technical documents related to the F-35 from Lockheed Martin.

Daniel Coats, in a congressional testimony published in May 2017, named Russia, China, Iran and North Korea as “Cyber Theat Actors.”

“Adversaries will continue to use cyber operations to undermine U.S. military and commercial advantage by hacking into U.S. defense industry and commercial enterprises in pursuit of scientific, technical, and business information,” Coats stated.

“Examples include theft of data on the F-35 Joint Strike Fighter, the F-22 Raptor fighter jet, and the MV-22 Osprey. In addition, adversaries often target personal accounts of government officials and their private-sector counterparts. This espionage reduces cost and accelerates the development of foreign weapon systems, enables foreign reverse-engineering and countermeasures development, and undermines U.S. military, technological, and commercial advantage.”
https://www.defenseworld.net/news/2...icating_its_Non_Stealth_Features#.XucdBdVvaUk
 
.
  1. AIR
  2. Fighter Aircraft
  3. China
After Copying F-35's Stealth, China's J-20 Duplicating its Non-Stealth Features
  • Our Bureau
  • 09:18 AM, June 4, 2020
  • 322357

16df76901_1591262181.jpg

J-20 fighter
China's J-20 stealth jet, believed to be a copycat design of the US-made F-35, is now duplicating its non-stealth feature - to carry weapons on external pylons.

The F-35 and J-20 carry missiles and bombs in an internal weapons bay to avoid radar detection. However, for some missions requiring heavier weapons load, these are mounted on external pylons, at the expense of stealth.

On Monday, local media posted photograph showing a J-20 prototype undergoing a test flight with two external pylon adapters, one under each side of its wings.

The Chinese jet previously had the capacity to carry four PL-15 missiles in its main weapons bay and two PL-10 short-range missiles in its side weapons bay. The external adapters will enable the jet to carry four more missiles.

Based on the mission, different types of loadouts can be chosen. “Beast mode” with more munitions can be activated in low-risk and low-threat missions.

In addition, the Chinese media speculated that the J-20 fighters could also carry external fuel tanks for extended range.

es1gpr7xs_1591262198.jpg

Lockheed F-35 jet
The J-20’s sensor system also looks similar to the F-35’s Electro-Optical Targeting System (EOTS) in terms of shape and placement. In 2007, Chinese hackers allegedly stole technical documents related to the F-35 from Lockheed Martin.

Daniel Coats, in a congressional testimony published in May 2017, named Russia, China, Iran and North Korea as “Cyber Theat Actors.”

“Adversaries will continue to use cyber operations to undermine U.S. military and commercial advantage by hacking into U.S. defense industry and commercial enterprises in pursuit of scientific, technical, and business information,” Coats stated.

“Examples include theft of data on the F-35 Joint Strike Fighter, the F-22 Raptor fighter jet, and the MV-22 Osprey. In addition, adversaries often target personal accounts of government officials and their private-sector counterparts. This espionage reduces cost and accelerates the development of foreign weapon systems, enables foreign reverse-engineering and countermeasures development, and undermines U.S. military, technological, and commercial advantage.”
https://www.defenseworld.net/news/2...icating_its_Non_Stealth_Features#.XucdBdVvaUk
Guess what man? In order to copy something you need samples of it and to study it.
When did china retain F-35? Do they have magic x-ray eyes?
 
. . .
@Deino your insight is most valuable lol


IMO once again a stupid attempt to down-rate anything from China, to put it in simple words for simple peoples in order to deamonize China and all its developments.

That surely does not negate that China spies and copies - like others too - but to say the "China's J-20 stealth jet, believed to be a copycat design of the US-made F-35" shows nothing but hoe stupid the author is and tell s more about its intentions than on facts. And also since when is the ability "to carry weapons on external pylons" copying, stealing? Or shall we go back in history which aircraft carried external stores first and then say, all US types are copying and stealing?

IMO this plain stupid thread should be closed since it has no other intention than trolling.
 
.
Guess what man? In order to copy something you need samples of it and to study it.
When did china retain F-35? Do they have magic x-ray eyes?
Means they are either innovating or stealing
 
.
  1. AIR
  2. Fighter Aircraft
  3. China
After Copying F-35's Stealth, China's J-20 Duplicating its Non-Stealth Features
  • Our Bureau
  • 09:18 AM, June 4, 2020
  • 322357

16df76901_1591262181.jpg

J-20 fighter
China's J-20 stealth jet, believed to be a copycat design of the US-made F-35, is now duplicating its non-stealth feature - to carry weapons on external pylons.

The F-35 and J-20 carry missiles and bombs in an internal weapons bay to avoid radar detection. However, for some missions requiring heavier weapons load, these are mounted on external pylons, at the expense of stealth.

On Monday, local media posted photograph showing a J-20 prototype undergoing a test flight with two external pylon adapters, one under each side of its wings.

The Chinese jet previously had the capacity to carry four PL-15 missiles in its main weapons bay and two PL-10 short-range missiles in its side weapons bay. The external adapters will enable the jet to carry four more missiles.

Based on the mission, different types of loadouts can be chosen. “Beast mode” with more munitions can be activated in low-risk and low-threat missions.

In addition, the Chinese media speculated that the J-20 fighters could also carry external fuel tanks for extended range.

es1gpr7xs_1591262198.jpg

Lockheed F-35 jet
The J-20’s sensor system also looks similar to the F-35’s Electro-Optical Targeting System (EOTS) in terms of shape and placement. In 2007, Chinese hackers allegedly stole technical documents related to the F-35 from Lockheed Martin.

Daniel Coats, in a congressional testimony published in May 2017, named Russia, China, Iran and North Korea as “Cyber Theat Actors.”

“Adversaries will continue to use cyber operations to undermine U.S. military and commercial advantage by hacking into U.S. defense industry and commercial enterprises in pursuit of scientific, technical, and business information,” Coats stated.

“Examples include theft of data on the F-35 Joint Strike Fighter, the F-22 Raptor fighter jet, and the MV-22 Osprey. In addition, adversaries often target personal accounts of government officials and their private-sector counterparts. This espionage reduces cost and accelerates the development of foreign weapon systems, enables foreign reverse-engineering and countermeasures development, and undermines U.S. military, technological, and commercial advantage.”
https://www.defenseworld.net/news/2...icating_its_Non_Stealth_Features#.XucdBdVvaUk
so? i say that is some good work. no need to re invent the wheel.
 
.
in the process of copying China somehow miraculously manages to forget to copy F-22 and F-35 engines, the stealthy and the vtol types.
 
. .
So is the US gonna burn the F-35 considering China has access to everything about it?
 
.
Guess what man? In order to copy something you need samples of it and to study it.
When did china retain F-35? Do they have magic x-ray eyes?

No you don't, you can copy through data, how do you think Soviets copied Space Shuttle
 
.
Guess what man? In order to copy something you need samples of it and to study it.
When did china retain F-35? Do they have magic x-ray eyes?

or you know, you can hack the blue prints. It’s not a matter of discussion it’s in the open Chinese copied a lot from f-35
 
.
  1. AIR
  2. Fighter Aircraft
  3. China
After Copying F-35's Stealth, China's J-20 Duplicating its Non-Stealth Features
  • Our Bureau
  • 09:18 AM, June 4, 2020
  • 322357

16df76901_1591262181.jpg

J-20 fighter
China's J-20 stealth jet, believed to be a copycat design of the US-made F-35, is now duplicating its non-stealth feature - to carry weapons on external pylons.

The F-35 and J-20 carry missiles and bombs in an internal weapons bay to avoid radar detection. However, for some missions requiring heavier weapons load, these are mounted on external pylons, at the expense of stealth.

On Monday, local media posted photograph showing a J-20 prototype undergoing a test flight with two external pylon adapters, one under each side of its wings.

The Chinese jet previously had the capacity to carry four PL-15 missiles in its main weapons bay and two PL-10 short-range missiles in its side weapons bay. The external adapters will enable the jet to carry four more missiles.

Based on the mission, different types of loadouts can be chosen. “Beast mode” with more munitions can be activated in low-risk and low-threat missions.

In addition, the Chinese media speculated that the J-20 fighters could also carry external fuel tanks for extended range.

es1gpr7xs_1591262198.jpg

Lockheed F-35 jet
The J-20’s sensor system also looks similar to the F-35’s Electro-Optical Targeting System (EOTS) in terms of shape and placement. In 2007, Chinese hackers allegedly stole technical documents related to the F-35 from Lockheed Martin.

Daniel Coats, in a congressional testimony published in May 2017, named Russia, China, Iran and North Korea as “Cyber Theat Actors.”

“Adversaries will continue to use cyber operations to undermine U.S. military and commercial advantage by hacking into U.S. defense industry and commercial enterprises in pursuit of scientific, technical, and business information,” Coats stated.

“Examples include theft of data on the F-35 Joint Strike Fighter, the F-22 Raptor fighter jet, and the MV-22 Osprey. In addition, adversaries often target personal accounts of government officials and their private-sector counterparts. This espionage reduces cost and accelerates the development of foreign weapon systems, enables foreign reverse-engineering and countermeasures development, and undermines U.S. military, technological, and commercial advantage.”
https://www.defenseworld.net/news/2...icating_its_Non_Stealth_Features#.XucdBdVvaUk
how can someone is so stupid? please go check the stealth paint they used in J-20 and F-35 you will understand the difference.
 
.
or you know, you can hack the blue prints. It’s not a matter of discussion it’s in the open Chinese copied a lot from f-35
You are literally telling everyone your intel agency is crap.
 
.
You are literally telling everyone your intel agency is crap.

Lockheed martins isn’t an intergovernmental agency it’s a private company. We’re not commies that everything is controlled by govt. smh

Also, hacking incident or another doesn’t constitute a lack of intel agency. Cyberattacks between countries happen all the time.

US, took over 3.34 million Chinese computer in its cyberattacks. Now ur gona Chinese intelligence agency is crap? Sometimes bias here is astronomical

https://www.cybersecurity-insiders.com/china-to-strongly-retaliate-us-cyber-attacks/
 
Last edited:
.

Country Latest Posts

Back
Top Bottom