Were the F-35 Plans Intentionally Leaked to the Chinese so They Could Build J-31 Fighter?

Did the US military intentionally leak F-35 plans to China to trick them into investing hundreds of billions into an already obsolete stealth fighter, J-31?
Were the F-35 Plans Intentionally Leaked to the Chinese so They Could Build J-31 Fighter?
A U.S. Air Force F-35 Lightning II joint strike fighter sits at Eglin Air Force Base, Fla., July 14, 2011. A new study looking at Canada’s troubled military procurement system suggests the government’s own policies have contributed to the dysfunction and delay. The Canadian Press/AP, U.S. Air Force, Samuel King Jr.
Updated:

Edward Snowden released slides recently from an allegedly classified Powerpoint presentation to German newspaper Der Spiegel. The documents show that 50 terabytes of classified F-35 Joint Strike Fighter information was stolen from the U.S. government contractor.

Fifty terabytes of classified data is like $50 million in gold; both are kept in a secure bank vault. If someone wanted to rob a bank vault, the only way they'd be able to get it out, is through the front door.

Could it be possible the data was intentionally leaked to the Chinese as a way to fool them into investing hundreds of billions of dollars into a stealth fighter that is already outdated or has had its stealth capabilities compromised by innovations in radar technology?

We Have Given Faulty Information to Communist Spies Before

The United States has purposefully allowed corrupted data to fall in the hands of less-than-friendly communist regimes in the past.

In 1982 the CIA got wind of Soviet KGB spies stealing data on Canada’s natural gas pipeline designs and leaked them faulty designs that caused a huge explosion in part of the Soviet pipeline, costing them millions of dollars in repairs and redesign.

Thomas Reed wrote in his 2005 book At the Abyss: An Insider’s History of the Cold War, “The pipeline software that was to run the pumps, turbines, and valves was programmed to go haywire, to reset pump speeds and valve settings to produce pressures far beyond those acceptable to the pipeline joints and welds. The result was the most monumental non-nuclear explosion and fire ever seen from space.” 

China Seeks to Counter US Military Dominance

Many new weapons have been developed in China that specifically target the United State’s global military dominance. One of the most striking among them is the aircraft carrier sinking missile, the Dong-Feng 21 (DF-21D). The DF-21 has a estimated range of 1,000–1,700 miles.

An F-22 Raptor has a 1,900-mile range. It can only fly half that distance from a carrier before turning around to fly back to its carrier for refueling. It is clear the DF-21D was developed to strike a carrier before its aircraft are in range.

A major piece of modern technology China is lacking is a 5th generation stealth fighter. The planes it currently has in service would be no match for the F-22 Raptor, which are capable of easily shooting down several of China’s planes without even being detected. Upon getting 50 terabytes of classified data, China would of course be wise to quickly invest billions into developing a plane that could counter the Raptor.

The recently spotted Shenyang J-31 is that plane. Baring a more than uncanny resemblance to the F-22, this plane is definitely designed to remove the United State’s F-22 advantage.

The U.S. stopped manufacturing F-22s almost 3 years ago. Maybe they have something better.

A Chinese J-31 stealth fighter performs at the Airshow China 2014 in Zhuhai, south China's Guangdong province on Nov. 11, 2014. This aircraft was likely built using data stolen by Chinese hackers on the F-35. (Johannes Eisele/AFP/Getty Images)
A Chinese J-31 stealth fighter performs at the Airshow China 2014 in Zhuhai, south China's Guangdong province on Nov. 11, 2014. This aircraft was likely built using data stolen by Chinese hackers on the F-35. Johannes Eisele/AFP/Getty Images

Inside Man in Data Heist?

Cybersecurity expert and CEO of IPCybercrime.com Rob Holmes knows some interesting facts about hacking.

“Hackers use proxies to disguise their Internet protocol (IP) address; this slows the speed of their connection down significantly.” He explained how the anonomyzing network called Tor gives users speeds so slow, “it would take tens of thousands of hours to steal that much data.”

Not only would the connection speed be drastically reduced by IP disguising, most computers, and especially those containing secret classified data, employ firewalls. These firewalls block certain ports from allowing too much data to pass through. For instance, email ports are usually configured to not allow a lot of data to pass through them quickly. Think of a garden hose trying to drain an olympic-sized swimming pool. This prevents a hacker from exploiting your email account to steal your whole hard drive via email.

A computer containing sensitive data is almost guaranteed to be properly configured in such a way that someone is not going to be able to walk out the front door with the goods and have no one notice, not without some help.

“All big heists have an inside man. Most corporate espionage starts with a disgruntled employee. Most can be prevented by timely intervention. Espionage often starts with a complaint to the human resource department,” said Mr. Holmes.

Snowden Had Complained

NSA Deputy Director Richard Ledgett has admitted Snowden had expressed concerns over the size and scope of the wiretapping projects to his superiors in a Teleconference call at TED 2014.

This is a great example of an employee with classified clearance on the inside having a grievance with the way things were being done, and how he was treated, ultimately releasing sensitive documents.

If this act wasn’t done to trick the Chinese into spending billions and luring them into a false sense of security, then it was most likely done by someone who received a big payout from the Chinese government/military for their efforts.

The $400 Billion Lemon?

The F-35 Joint Strike Fighter (JSF) has been the most expensive and problematic project in military history.

It has continually encountered setbacks, and due to the massive delays, is experiencing a problem called “feature creep.”

Because it has taken so long to create, new technologies have emerged and need to be added to the plane. This causes another setback, during which time, newer technologies are developed and again need to be added to the plane.

With $400 billion already invested and only 150 planes in active service today, the project is expected to end up costing over $1 trillion.

The JSF program’s goals were to provide 4,000 5th-generation stealth fighters to the U.S. and its allies at an affordable price.

The F-22 Raptor has been banned from being exported to any other countries, and after seeing its performance, European nations and Australia wanted to retire their aging 3rd and 4th generation non-stealth fighters. F-35’s were originally expected to cost under $100 million a piece, but due to setbacks and feature creep, the price has more than tripled to over $300 million as the “flyaway price.”

Reports of other problems with the F-35 have also emerged. Being unable to use warm jet fuel, having maneuverability problems, and being too slow, are just a few reports that have surfaced.