J20 IS A ULTIMATE COPY & MIXTURE OF MOST PROBABLY MIG MFI & PRE-JAST/JSF DESIGN[/COLOR][/SIZE][/U][/B]
J20 is the ultimate copy & mixture of most probably mig mfi & pre JAST/JSF design,
similarities with the MIG-1.44
The latest images show some startling similarities between the Chinese J-20 and canceled Russian MiG-1.44. Both have similar style of delta wing canard configurations and V-Shaped tail section with closely mounted engines.
Similarities with the F22-Raptor
The canopy looks like a 1:1 carbon copy of that on the F-22, right down to the v-shaped cylinder on the forward part of the frame.
Similarities with the pre JAST/JSF design
The fuselarge & canards resembles very much or a carboncopy of pre JAST/JSF design
According to a report by the Reuters news service,Russia sold China tech for J-20
http://www.dodbuzz.com/2011/08/18/report-russia-sold-china-tech-for-j-20/
Russia has never transferred any stealth technology to China to assist it with its J-20 Black Eagle fifth-generation stealth fighter prototype, Russian plane maker MiG said .
Chendu employed former MiG engineers who have previously worked on MiG 1.44 as it was cancelled project .But mig is facing financial problems after 1990 after collapse of USSR .so their engineers must have been recruitred by china for the modernization of plaaf so how it is possible that that those engineers are not helping Chinese in developing j20 .
Cyber espionage theft speculations
Computer spies had broken into the Pentagons $300 billion Joint Strike Fighter project, the Defense Departments costliest weapons program ever. Computer systems involved with the program appear to have been infiltrated at least as far back as 2007, according to people familiar with the matter. Evidence of penetrations continued to be discovered at least into 2008. The intruders appear to have been interested in data about the design of USAF planes, its performance statistics and its electronic systems. The intruders compromised the system responsible for diagnosing a planes maintenance problems during flight, according to officials familiar with the matter. However, the planes most vital systems such as flight controls and sensors are physically isolated from the publicly accessible Internet.
The intruders entered through vulnerabilities in the networks of two or three contractors helping to build the high-tech fighter jet, according to people who have been briefed on the matter. Lockheed Martin is the lead contractor on the program, and Northrop Grumman Corp , BAE Systems PLC also play major roles in its development. The spies inserted technology that encrypts the data as its being stolen , as a result, investigators cant tell exactly what data has been taken.
Amongst high speculation of Chinese involvement in these events , investigators traced the penetrations back with a high level of certainty to a known Chinese Internet protocol, or IP, addresses and digital fingerprints that had been used for attacks in the past. A Pentagon report issued had stated that the Chinese military has made steady progress in developing online-warfare techniques. China hopes its computer skills can help it compensate for an underdeveloped military, the report said. The Chinese Embassy said in a statement that China opposes and forbids all forms of cyber crimes. It called the Pentagons report a product of the Cold War mentality and said the allegations of cyber espionage are intentionally fabricated to fan up China threat sensations.
There were also reports on some forums that F-22 was spotted over Beijing.
This photograph looks suspicious