F-35s vs. J-20s: How America's 5th Generation Stealth Fighters Would Crush China

Kris Osborn

Kris Osborn

Security,

Technology. 

F-35s vs. J-20s: How America's 5th Generation Stealth Fighters Would Crush China

This can be explained in terms of a well-known Air Force strategic concept pioneered years ago by air theorist and pilot Col. John Boyd, referred to as the "OODA Loop," --- for observe, orient, decide and act. The concept is to complete this process quickly and make fast decisions while in an air-to-air dogfight -- in order to get inside the enemy's decision cycle, properly anticipate, and destroy an enemy before they can destroy you.

The Air Force is accelerating development of a special, high-tech, on-board threat library for the F-35 designed to precisely identify enemy aircraft operating in different high-risk areas around the globe - such as a Chinese J-20 stealth fighter or Russian T-50 PAK FA 5th Gen fighter, service leaders said. 

(This first appeared in late 2017.)

Described as the brains of the airplane, the "mission data files" are extensive on-board data systems compiling information on geography, air space and potential threats in areas where the F-35 might be expected to perform combat operations, Air Force officials explained.

"Mission data files are the key that unlocks the F-35," Brig. Gen. Scott Pleus, Director of the F-35 Integration Office said. 

Read full article