Did China Steal The F-35 Fighter Jet Blueprints?

In 2007, Chinese hackers, working under the direction of the People’s Liberation Army (PLA), infiltrated the computer networks of major U.S. defense contractors, including Lockheed Martin and Boeing, as well as their subcontractors.

China stole technology from the F-35 Lightning II, the United States’ premier stealth fighter jet, through a sophisticated cyber espionage operation orchestrated by Chinese state actors.

Here are some recent trending Epstein files:

  1. Paragon Spyware Dashboard Exposed in LinkedIn Post
  2. Pulp Fiction Director Roger Avary Exposes Hollywoodโ€™s Daily Baby Sacrifices on Joe Rogan
  3. China's (CCP) Secret Organ Harvest: Millions Imprisoned for Profit
  4. Hollywoodโ€™s Dark Deal: Fame for Satanic Souls
  5. DMX: on โ€˜The Industryโ€™
  6. Jon Stewartโ€™s Pizzagate Mockery Backfires
  7. Is Bad Bunny a Communist spy?
  8. Pam Bondi Dodges Epstein Files Questions Look at โ€˜THE DOWโ€™
  9. Jamie Raskin Blasts Pam Bondi: DOJ Running Massive Epstein Files Cover-Up
  10. Lin Wood Predicted โ€˜Epstein Filesโ€™ in 2019
  11. Shawn Ryan: Redacting Epstein Files & Names Protects the Criminals
  12. Epstein Survivors Drop Bombshell Ad Super Bowl Sunday on Epstein Files [VIDEO]
  13. Jack Lang Resigns: 600+ Mentions in Epstein Files Exposed
  14. Chuck E. Cheese CEO David McKillips Resigns After Epstein Files Mentions
  15. Jeffrey Epstein Files: โ€œi think pedophilee is the pluralโ€ & Mentions Of Woody Allen
  16. The โ€˜Epstein Filesโ€™ Bitcoin Crash
  17. WEF Probes CEO + President Bรธrge Brende To Epstein Files
  18. Clintons Will Testify In Congressโ€™s Epstein Files Investigation
  19. Whoopi Goldberg & โ€˜The Viewโ€™ Hosts Mentioned In Epstein Files
  20. Epstein Files Unveil Jeffreyโ€™s Secret Porn Stash
  21. Epstein Files Claim: He Introduced Melania to Trump
  22. DOJ Pulls Thousands of Epstein Files After Victim Identities Accidentally Released
  23. Gates, Musk among notables in latest Epstein files.
  24. Epstein Files; Jeffrey Epstein Joked: โ€œThe Jews Pull Strings?โ€ At Island Dinner Party
  25. Uncovered 2026 Epstein Files Exposes New Crimes, Israel, CIA, Gates, and More 
  26. House Judiciary seeks Epstein files amid cover-up allegations.
  27. Epstein Files: Bill Gates Caught STD, Epstein Email Says Melinda Gates Searched For Antibiotics for STD
  28. Epstein Jail video Wiped: FBI Files Show RAID 6 Back Up Drives Destroyed
  29. Epstein File: EFTA02731488 Exposes Shocking Billionaire Leon Black Child Rape Claims
  30. Epstein Temple Gets New White Paint Job
  31. Pam Bondi Drops Bombshell: โ€œTens of Thousands of Epstein Child Videosโ€
  32. Ghislaine Maxwell Pleads the Fifth: Epstein File Secrets Stay Buried!
  33. Thomas Massie LIVE On CNN: Les Wexner A Redacted Name & Epstein Co-Conspirator
  34. Rep Thomas Massie Exposes UAE Sultan bin Sulayem as Epsteinโ€™s โ€œTorture Videoโ€ Sender
  35. Howard Lutnickโ€™s 13-Year Epstein Ties Revealed in DOJ Records
  36. Epstein Forwarded Elite Health Care Investor List to His Inbox
  37. Epstein Death Document Dated Before His Death
  38. Is Jeffrey Epstein Secretly Playing Fortnite in Israel?
  39. Deepak Chopra to Epstein: โ€œGod is a Construct, Cute Girls Are Realโ€
  40. FBI Report: Jeffrey Epstein Trained as Mossad Spy Under Ehud Barak
  41. Was Epsteinโ€™s Zorro Ranch A Secret Child Trafficking Hub Near The Border?
  42. Prince Andrewโ€™s Ex Girlfriend Says Jeffrey Epstein Is Alive and Hiding in Israel [VIDEO]
  43. Nicole Junkermannโ€™s 2010 Email Asked to Have Jeffrey Epsteinโ€™s Baby
  44. Ghislaine Maxwell Watched Teen Give Birth for Jeffrey Epsteinโ€™s Baby
  45. Jeffrey Epstein to Ehud Barak: โ€œMake Clear I Donโ€™t Work for Mossadโ€
  46. Bill Gates Regrets Every Minute With Jeffrey Epstein In TV Interview [VIDEO]
  47. Epstein pled guilty to soliciting unknown minor: โ€œWhat Minor?โ€
  48. Brad Karp resigns as Paul Weiss chairman amid Epstein email scandal
  49. Casey Wasserman urged to resign as LA Olympics chair over Epstein emails
  50. Epstein Records Israeli Prime Minister Ehud Barak About Israeli Immigration For More Russians
  51. Epstein Wants To Takeover $80B In Libya Assets During 2011 Libyan Civil War
  52. Elon Musk Email To Jeffrey Epstein: โ€œWhat Day/Night Will be The Wildest Partyโ€ฆโ€
  53. Jeffrey Epsteinโ€™s Covid-19 email in 2015.
  54. Leaked FBI File Claims Alan Dershowitz Has Mossad Ties Via Epstein
  55. Epsteinโ€™s Leaked STD Email To Bill Gates and Secret Antibiotics For Melinda Plot
  56. Jeffrey Epstein Emails With Ariane de Rothschild: Ukraine Upheaval Offers Many Opportunities
  57. Melinda Gates Interview: Bill Gates Must โ€˜Answerโ€™ Epstein file questions [VIDEO]
  58. Epstein Email to Peggy Siegal: โ€œNo Goyimโ€ 100% Jew Night, Jews & WASPs Only!"
  59. Leaked FBI Email: Epstein Boasted of Tony Blair Orgy
  60. Epstein Urged to Help Anti-Putin Leader Ilya Ponomarev & Replace Russian President Putin
  61. Epstein Pushes to Settle Sarah Ransome Case Quietly; Video Rumors of Clinton and Dershowitz participating in orgies
  62. XBOX Permanently Bans Jeffrey Epstein Over Threats & Abuse on XBOX Live
  63. Jeffrey Epsteinโ€™s Shocking 2009 Email: โ€œThis Is How Jews Make Moneyโ€
  64. Did Jeffrey Epstein Father a Secret Child?
  65. Wolff to Epstein: "War Between Jews and Non-Jewsโ€ฆ"
  66. KenT Tells Feds: Epstein Didn't Suicide โ€“ Mexico Evidence Proves It
  67. Roseanne & Nicki Minaj Expose Hollywoodโ€™s Baby Blood Rituals For Adrenochrome
  68. Dismantling The Cabal [Movie] (2019)
  69. Aviciiโ€™s Death: Did โ€œFor a Better Dayโ€ Music Video Expose Too Much?
  70. Robert Maxwell, Ghislaineโ€™s Father, Blackmailed Mossad: ยฃ400M or Expose Spy Secrets
  71. What Is CCP โ€˜Elite Captureโ€™?
  72. Read the latest Epstein files here.
Click subscribe to enter your email below for BREAKING NEWS updates!

America 24 news subscribe to email news updates

They stole over 630,000 files totaling 65 gigabytes on related programs, with significant portions dedicated to the F-35, F-22, and C-17. The breaches began as early as 2007, with major intrusions reported in 2009 when hackers accessed terabytes of F-35 data from defense networks. The core conspiracy involving Su Bin ran through 2014.

They extracted massive amounts of sensitive data, including detailed blueprints, radar systems (such as the AN/APG-81), engine schematics, stealth coating materials, electro-optical systems, and flight test plans. This theft provided China with critical insights into advanced stealth, avionics, and propulsion technologies, enabling rapid progress in its own fifth-generation fighter programs like the Chengdu J-20 and Shenyang J-35 (formerly FC-31). U.S. officials, including Pentagon acquisition leaders, confirmed that the stolen data reduced development costs and timelines for adversaries, eroding America’s technological edge in military aviation.The key figure in the operation was Su Bin (also known as Stephen Su), a Chinese national and businessman who ran an aviation company in Canada. From October 2008 to March 2014, Su collaborated directly with two PLA-affiliated hackers based in China. He identified targets, provided intelligence on vulnerabilities (such as employee directories and supply-chain weaknesses), and translated stolen English documents into Chinese for use by Chinese military and aviation entities, including the Aviation Industry Corporation of China (AVIC) and the Chengdu Aircraft Industry Group.

The hackers used “hop points” on compromised servers in third countries to mask their attacks, exploiting weaker security in subcontractors to access shared F-35 designs without directly breaching core Lockheed Martin systems.

In July 2014, Canadian authorities arrested Su at the FBI’s request; he was extradited to the United States and pleaded guilty in March 2016 to conspiring to steal and export U.S. military secrets. U.S. intelligence linked the operation to PLA units like the Technical Reconnaissance Bureau in Chengdu, which coordinated the hacks and funneled information to state-run developers. This timeline aligned with China’s unveiling of J-20 prototypes in 2011 and later J-35 developments, incorporating design elements that mirrored F-35 features.

The hackers employed advanced cyber intrusion techniques to exfiltrate the data, encrypting it during transfer to evade detection. Su directed the targeting of specific individuals and companies, then compiled and translated the stolen files into reports for PLA and AVIC use. The theft focused on high-value components like radar modules, engine cooling methods, leading/trailing edge treatments, and stealth contours, allowing China to reverse-engineer and integrate these into its jets. This supply-chain-focused approach exploited the distributed nature of the F-35 program, where thousands of subcontractors shared sensitive information.

China pursued this theft to close the technological gap with the United States in stealth aviation, shortcutting decades of independent R&D and saving billions in development costs. Su Bin himself described the goal in emails as enabling China to “stand easily on the giantโ€™s shoulders” and rapidly catch up to U.S. levels. The stolen F-35 secrets directly supported PLA modernization efforts, enhancing regional air dominance, countering U.S. forces, and positioning China for global fighter exports. By acquiring proven designs rather than innovating from scratch, China accelerated its transition to fifth-generation capabilities.

The operation’s success led to design modifications in Chinese jets, such as updated inlets, stabilizers, and radar integrations resembling F-35 elements. Su Bin received a 46-month prison sentence in the U.S., highlighting the severity of the breach. U.S. defense officials have repeatedly stated that this theftโ€”part of broader Chinese cyber campaignsโ€”compromised dozens of weapons systems and represents one of the most damaging instances of state-sponsored espionage, with lasting impacts on American military superiority despite ongoing efforts to secure supply chains. China continues to deny involvement, but court records, guilty pleas, and declassified U.S. assessments confirm the theft occurred.


Discover more from America24

Subscribe to get the latest posts sent to your email.

Related Articles

Responses

Your email address will not be published. Required fields are marked *

error:

Discover more from America24

Subscribe now to keep reading and get access to the full archive.

Continue reading