China’s Fighters, Drone Look Like U.S. Aircraft

Wing Loong

PARIS — China’s models of military planes at the Paris Air Show bear resemblance to U.S. aircraft, drawing attention to the rising concern in the Defense Department that the country is using cyber espionage to obtain sensitive defense technology.

The state-run Aviation Industry Corporation of China had a large exhibit of military and civilian models of aircraft at the show, held outside Paris at the historic Le Bourget airfield.

The display included three fighters and a drone: a single-seat version of the FC-1, a single-engine fighter built for the Pakistani air force and designated JF-17; a dual-seat variant of the FC-1 in development; the dual-seat, twin-engine L-15 trainer; and an unmanned system called Wing Loong.

The fighters looked like the F-16 made by Lockheed Martin Corp. and the drone bore resemblance to the MQ-1 Predator made by General Atomics Aeronautical Systems Inc., without the inverted tail. The Chinese drone is designed as a low-altitude craft that can fly up to 16,500 feet and loiter for 20 hours.

A spokesman from the Beijing-based corporation was quick to note that the FC-1 is “a lot cheaper than the F-16,” though he declined to provide a figure. The man gave a brief overview of the systems to but declined to be named, citing corporation policy.

Notably missing from the exhibit was any display of the J-20, China’s classified stealth-fighter program.

During talks this month at an estate in Rancho Mirage, Calif., President Barack Obama reportedly warned the new Chinese President Xi Jinping that cyber attacks against the U.S. threaten the two countries’ strategic relationship. Xi insisted China is also the victim of computer hacking.

Obama faced pressure to raise the issue after the recent leak of a classified section of a Defense Department report showed that designs for the most advanced U.S. weapons have been compromised by suspected Chinese hackers. The list of weaponry includes the F-35 Joint Strike Fighter, the Littoral Combat Ship, and the Aegis Ballistic Missile Defense System, among others.

The Pentagon in its latest annual assessment of China’s armed forces for the first time blamed China directly for targeting its computer networks. The attacks were focused on extracting information, including sensitive defense technology.

“In 2012, numerous computer systems around the world, including those owned by the U.S. government, continued to be targeted for intrusions, some of which appear to be attributable directly to the Chinese government and military,” it states. “The accesses and skills required for these intrusions are similar to those necessary to conduct computer network attacks.”

That document also concluded that the People’s Liberation Army, or PLA, considers the strategy of “information dominance” a critical form of defense against countries that it views as “information dependent,” such as the U.S.

China called the accusations “groundless” and “not in line with the efforts made by both sides to strengthen mutual trust and cooperation,” according to a May 9 article published on the state-run website, “People’s Daily Online.” The country is a “victim itself of cyberattacks,” it states.

A Chinese espionage group since 2006 has stolen hundreds of terabytes of information from at least 141 companies across 20 major industries, including aerospace and defense, according to a February report from Mandiant, a closely held company based in Alexandria, Va., which sells information-security services.

About the Author

Brendan McGarry
Brendan McGarry is the managing editor of He can be reached at Follow him on Twitter at @Brendan_McGarry.

49 Comments on "China’s Fighters, Drone Look Like U.S. Aircraft"

  1. China’s Fighters, Drone Look Like U.S. Aircraft. Astonishing! Could this have anything to do with the incompetent bozo's who allowed all of our top secret data to be downloaded into China? I hope those people are on paid leave now. They deserve to be punished.

  2. They're just poor copies of outdated platforms. No big deal.

  3. I'll believe it once they start militarizing those GE engines built in China.

  4. The Chinese already copied all of the Russian designs, now they want new ones.
    The Chinese have a copy of teh Eurofighter also.

  5. I hope they are planting false networks and feeding them 1/3 truth mixed in with 2/3 bull which hopefully comes back to bite the CH in the end.

  6. DUH!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! China been copying Russian and NATO designs since the PRC was born. think of it all hte MiGs they copies there new Stealth fighter looks too much like a F-35A. Face it CHina's never made a ral design of there own.

  7. It's a good thing for them to copy our systems, this way we know what they have, capabilities and how to defend against it. Otherwise we'd have to rely on espionage to figure out what they have…

  8. China can't innovate so they have to replicate.

  9. 1. Of course they look similar; they’re designed for a similar purpose.
    2. All countries copy things when they’re starting from behind. America copied a lot from German rocket technology and then, with time and money they took it much further. Exciting to think where China will take American technology now it is they who have the money.

  10. 1. Of course they look similar; they’re designed for a similar purpose.
    2. All countries copy things when they’re starting from behind. America copied a lot from German rocket technology and then, with time and money they took it much further. Exciting to think where China will take American technology now it is they who have the money.

  11. Professor Ski!!! | June 20, 2013 at 2:48 pm | Reply

    Lets just nuke while we still have the stocks to do it with, before the guy with big ears takes it all away, sayying a piece treaty will keep nukes from flying at us. Mr. President remember your history!

  12. Maybe I'm taking the wromg view here but one thing I can't understand. It looks simple to me but surely if you have computer systems holding information this sensitive then why is that system EVER connected to the net?

    OK, I'm not a major world power but I have a laptop that I use for my work. That laptop (or at least the software on it) is so valuable to me that I never, ever connect it to the internet. Anything that goes in it is loaded by DVD or Zipdrive after it has been scanned first.

    Am I wrong or is this really not rocket science?

  13. "and an unmanned system called Wing Loong."
    Almost as funny as the name nodong for a missle

  14. USS ENTERPRISE | June 20, 2013 at 5:45 pm | Reply

    NO WAY! Its not like China has been hacking US defense contractors, and government agencies, in an attempt to get information to make these cheap Air Hogs. Obviously.

  15. Big surprise. China, Russia and Israel have always done all they can to steal American secrets.

  16. I guess if we were out of the sneaky reverse-engineering business, we'd have to clean Tonopah out. Goodbye S-300. Goodbye radars. Goodbye Migs and Sukhois. Goodbye ELINT aircraft designed to analyze enemy radars.

    Did I miss something? That said, the US will still steal stuff, even if it's perceived as lower-technology. Why? Knowledge is power.

  17. The FC-1/JF-17 is hardly new. First flight was 2003 and entered service with PAF in 2010.

  18. they are copying what we have on the coasts, probably missing things, and lowering quality.
    china obviously hasn't gone further than us in technology. if these are the things the military is showing us, imagine what our military really has

  19. Well, about their J-20 aircraft, It looks it have an relatively original airframe (not an "rivet-to-rivet" stolen design). But its canopy looks almost like an exactly copy of the F-22's canopy… Of course Chinese are using foreign ideas, but i don't believe that Chinese can't innovate at all.

  20. I can't believe the paranoia, and the fear of some of these people. Do they really think any of this is new and has not been happening for a long time. America has always and will always lead the world.

  21. Well look at it this way, now we can send our predators to conduct surveillance all over china! and the chinese will think its one of theirs! what more in time of war!

  22. What does DOD expect when the computers they use are most likely "made in China"?

  23. So Snowden is a hero? So you hate top secrets by our government? President Obama should tell everything we are doing to the public. Now you complain because China has a direct link to all our sensitive data? Why are some Americans so stupid??

  24. Zero surprise here. It is clear the Obama administration has been lax and derelict in securing our military designs and secrets from the Chinese.

    I only wish that some designer would make up a totally nonsensical design, then designate it to be Top Secret and watch and wait to see how long before the Chinese and Russians trot out their version of the faker design. Betcha it would only be a matter of months.

  25. One of the most embarrassing scenarios is when you are beaten in your own games, by your own stick, right at your home, and in front of the wife and kids — Sun Tzu page 101.

  26. FC-1 = Northrop F-20 Tigershark
    Yilong = General Atomics Reaper/Predator
    L-15 = YAK-130 / M-346

  27. So when will Biden be brought up on charges of treason for spilling the beans on the SEAL's that were in the chopper that was shot down,eh. Or the details Obama gave out for a GD movie? I say find the biggest tree for all of these thugs.

  28. This is bad. If they have compromised our most sensitive systems like AEGIS and F35, then imagine what they got that our government isn't telling us. Classified and black programs. They most likely got it all. Sub technology, stealth technology. Why not? Everything has been compromised. Even the private sector tech has been completely stolen.

    They have everything. Like "carlos" said at least we know what they have. And I would like to think we had some back door defenses on stolen files or sabotage capability. Doubtful.

  29. The reason why they are so cheap is, when you don't have to put in the R&D, the overhead decreases. China are thieves. Equate them with the Ferangie.

  30. Hopefully our government will learn from this. Why should we waste $billions on developing products when we could hire a bunch of hackers for a few thousand each year to "acquire" our new designs. We are so stupid.

  31. The Chinese are building up their military in a big way. I can only assume someone made a hateful video.

  32. Time for a different approach to China simply this invest and developed West, South Central Africa and Mexico to manufacture goods so we can buy from them and leave China alone for good. Stop trading and buying from China period!

  33. Once i heard story how the US designed made almost exact copy of the Soviet pontoon bridge…

  34. Just hack the commies and keep your mouths shut, espionage is all about wrecking the other guy before he makes you look stupid and weak……..are we to late?

  35. So what else is new?

  36. Snowden is a coward and a traitor as far as I'm concerned, if he truly believes in what he did and america can tuly accept homegrown traitors working in places with secrets then come home and take your ass whipping like a man. All the papers and rights activist in the world will be their to take the pain away, our parents and government set rules in their house for your protection and theirs you wanna break those rules and be your own man then you no longer need their help too face the world or will he just be another Benedict Arnold who dies in silence in a foreign land.

  37. The JF-17 isn't a copy of anything, as far as I can tell. It's got little hints of features from all over (LERX, DVI) but it's in essence a fairly conventional lightweight jet fighter that was built out of modern composites, fitted with good enough engines and avionics, and delivered on time, under budget and fit for purpose.

    Now, they didn't copy that from the USA, did they…

  38. Of course the Chinese aircraft resemble U.S. aircraft, can't point fingers how, so they must have stumbled across U.S. aircraft on the internet LOL.

    A quote from Gen. Keith Alexander, Chief of U.S. Cyber Comman d and Dir of NSA said: That the loss of intellectual property due to cyber attacks amounts to the "greatest transfer of wealth in human history."

    To me, that means they stold the farm, what probably cost the U.S. tax payer trillions they (whomever) got everything for nothing.

  39. B.S. The US is intentionally giving China these designs. That is the only conclusion possible for hiring and rehiring Chinese nationals who aren't even naturalized at places that produce nuclear weapons. Then after being caught shipppng secrets one time that same person is rehired. For those of you who remember trends starting in 1990s.

    Why? Hard to say what LSD dreams the State Department is working with. Chinese allies against Russians?

    Or is it just DOD trying to get new toys faster. if enemy is falling behind in arms race …give them some of your designs that are going stale. F-22 Raptor was pushed through Congress based on rumors Chinese were copying upgraded F-15 with vector nozzles.

  40. They only look like the F16 if I ignore any actual pictures, close both eyes, and engage maximum imagination.

  41. NeoconBrony | July 7, 2013 at 4:03 pm | Reply

    If the Chinese did steal F-35 designs and they can actually get the damned thing to work, then props to them I guess.

  42. The USA is building a fighter bomber that evades radar, flies faster and thus able to drop precision munitions at will – an aircraft that will give it remarkable advantage if deployed in battle. That a foreign nation is trying to steal design and engineering secrets of this warbird by remarkable cyber spyware American become so incredulous and sanctimonious – well people what did you expect them to do? Isn't that what spy craft is for anyway? It is the game. Perhap we have watched too many Hollywood movies and the action hero spies are all too busy saving the world from evil instead of doing what is normal for spies – espionage!

  43. Well, just put it this way. All the world know that US is the culprit of computer hacking. Even its own citizens are treated as suspects. So much for land of the free. Anyway, now the US accused China of hacking its military secrets. My question is if the US is so good at its technology, how can its computer be hacked. Assuming China can access you computer, then don't you think China is superior than the US in computer. If this so, what make the US think that China can not make jet better than F-35? That's what happen when stupidity is combined with arrogance. The result is a country called the USA.

  44. LindaBodicea | July 20, 2013 at 3:34 am | Reply

    Since paper and gunpowder, the Chinese have invented nothing. They are not an innovative culture nor race. Lowest ratio of Nobel Prize winners per population outside of Africa.

  45. This isn't new. Look back at the US F-15, F-22, F-35, and they just look too much alike. Makes you think some designs are being shared, stolen, sold or something. It can't just be coincidence or the result of common logical technology.

  46. The Chinese will always try to steal our tech just like we will take whatever new tech that we can use from any1 else. Can't be mad if u got a better pistol then me then I want yours but I see you looking at my rifle an try to hide it cause it far superior to yours…everyone wants the best…USA is jus used to haven it an need to remember envy an want move the world too

  47. It has to do with people in general they are selfish meaning full of self..there is no United States anymore its just a hole lot of people out for self…no unity…no pride in country…an no praise from ur country rather. It's sad really

  48. fighter planes will be replaced by drones, and china is stealing it, let them, because the next stage of technological revolution is already being dreamed of by our young minds and will be made available in 20 years or so.

  49. 衛星 TV のウェブサイトに参加した後 取得 ダウンロード ノート パソコン テレビ用フリー ソフトと を設定 で お使いのコンピューター。このシリーズは私を捕まえて、瞬間 LisaNova のチャネル (後述) で始められるそれ。Youll の方法 できる
    フォーカス と彼ら フットワーク 他と共に 側面 から、 ゲーム。Veoh にはビデオ
    クリップが含まれています も 音楽 ビデオ。

Leave a comment

Your email address will not be published.