The document discusses the capabilities of the F-35 Joint Strike Fighter and argues it is a generational leap in technology compared to fourth generation fighters. It describes some of the F-35's classified sensors and systems, including its powerful AESA radar that can automatically fuse data from thousands of sensors. The F-35 pilot has access to near-perfect information from many sources and can operate as a tactician rather than technician. The F-35's array of sensors allow it to engage targets from long range while maintaining stealth.
This is Part 1 of 3 covering my work on my Future Deep Strike Aircraft project, to inspire interest in aerospace engineering for the RAeS, the A&SPA(UK) and AIAA.
Combat Systems Fusion Engine for the F-35ICSA, LLC
Michael Skaff of Lockheed Martin and the Principal Engineer for the F-35’s pilot vehicle interface explains the combat systems and their integration in the F-35. This capability is inherent in every F-35 or part of the baseline aircraft. In a real sense software development is never done; it is part of the evolving capability of the aircraft.
BVR combat was, for a long time, dream of both Western and Asian air forces. Today, it seems that the dream has been finally fulfilled; but is that really so?
FIA16: Leonardo Aircraft Division: M-346 programme - the dual role conceptLeonardo
During 2016 edition of the Farnborough Airshow, Leonardo Aircraft Division presented the M-346FT (Fighter Trainer), the latest variant of the platform, ideal to train next generation of fighter pilots
Sensor Technology and Futuristic Of Fighter Aircraft IJERA Editor
The Next Generation fighter Aircraft seeks a fighter with higher abilities in areas such as reach, persistence,
survivability, net-centricity, situation awareness, human system integration and weapons effects. The future
system will have to counter foe armed with next generation advanced electronic attack, sophisticated integrated
air defense systems, directed energy weapons, passive detection, integrated self-protection and cyber-attack
capabilities. It must be capable to operate in the anti-access area-denial (A2/AD) environment that will exist in
the next coming years.
This is Part 1 of 3 covering my work on my Future Deep Strike Aircraft project, to inspire interest in aerospace engineering for the RAeS, the A&SPA(UK) and AIAA.
Combat Systems Fusion Engine for the F-35ICSA, LLC
Michael Skaff of Lockheed Martin and the Principal Engineer for the F-35’s pilot vehicle interface explains the combat systems and their integration in the F-35. This capability is inherent in every F-35 or part of the baseline aircraft. In a real sense software development is never done; it is part of the evolving capability of the aircraft.
BVR combat was, for a long time, dream of both Western and Asian air forces. Today, it seems that the dream has been finally fulfilled; but is that really so?
FIA16: Leonardo Aircraft Division: M-346 programme - the dual role conceptLeonardo
During 2016 edition of the Farnborough Airshow, Leonardo Aircraft Division presented the M-346FT (Fighter Trainer), the latest variant of the platform, ideal to train next generation of fighter pilots
Sensor Technology and Futuristic Of Fighter Aircraft IJERA Editor
The Next Generation fighter Aircraft seeks a fighter with higher abilities in areas such as reach, persistence,
survivability, net-centricity, situation awareness, human system integration and weapons effects. The future
system will have to counter foe armed with next generation advanced electronic attack, sophisticated integrated
air defense systems, directed energy weapons, passive detection, integrated self-protection and cyber-attack
capabilities. It must be capable to operate in the anti-access area-denial (A2/AD) environment that will exist in
the next coming years.
Lockheed Martin F35 Lightning II(Aerodynamics Presentation)SYEDMOEEDHUSSAIN1
Note: For best experience of animation, Proceed in Slide Show Mode Of MS Power Point
Lockheed Martin F35 Lightning II's
1. Brief History
2. Dimensions
3. Concept of Shockwave
4. Drag Coefficient
5. Reynold’s Number
6. Features
7. Capabilities
Airborne ISR is the activity that organizes and integrates command direction, sensors, processed information, and intelligence with timely distribution in order to provide decision-makers with the best possible understanding of the battlefield and the enemy.
Project: Lockheed Martin's Advanced Targeting Pod (ATP) program press communication.
Contribution: Wrote press release and interviewed business leaders for quotes.
Website: http://www.lockheedmartin.com/
I will give you a choice of two topics to write about. Choose one .docxsheronlewthwaite
I will give you a choice of two topics to write about. Choose one of the following:
1. Forensic Readiness
· What does this mean for a company?
· What are some of the benefits for a company? Explain each one.
· As an Security Manager of the company how would you present this to the CEO?
2. Computer Forensics Methodologies
· List them and explain each one.
· Pick one of the methodologies and describe
·
· What tools could you use for what situations.
· Procedures that you would follow.
· Types of documentation you would need to keep.
· Would it need to be done in a mobile lab or not? Why?
New York Times
July 13, 2009
http://www.nytimes.com/2009/07/14/business/14blackbox.html?_r=1&scp=1&sq=black%20boxes&st=cse
Airlines Study Alternatives to Jets’ Black Boxes
By CHRISTINE NEGRONI
Modern communication technology allows even those with little important to say to transmit real-time information about where they are and what they are doing. But last month, when Airbus jets from Air France and Yemenia Airways crashed into the ocean, taking their black boxes into the deep with them, neither aircraft could send its data and cockpit voice recordings to a secure place on the ground.
On July 2, the day that the missing recorders from Air France Flight 447 were presumed to have exhausted their 30-day battery and stopped emitting the pinging noise of the locator beacon, Airbus announced that it would look for new ways to reduce the chance of losing critical data.
“This is a worldwide industry issue, albeit a rare one,” said Mary Anne Greczyn, manager of communications for Airbus Americas. In an e-mail message, Ms. Greczyn said, “Recent accidents certainly made this a front-burner topic of discussion.”
What is known so far about the crash of Flight 447, in which 228 people died, comes from automatic messages sent from the airplane to Air France. Those messages are not intended to provide information for accident investigators but are routinely used by airlines for maintenance. When an airplane is crossing an ocean and out of radio range, only the most important information is sent, since communication must be by satellite and transmission is expensive. Airlines can select what kind of flight data is worth the price of satellite time.
According to a statement from Airbus, even using the normal radio signal to send all the information about a flight would require enormous bandwidth.
But Krishna Kavi, a professor of computer science and engineering at the University of North Texas, said that might not be the case. In 2001, Mr. Kavi proposed transmitting in real time just the information from the flight data recorder. “The amount of data is very small compared to video photos that you receive on smartphones,” he said. Mr. Kavi said his plan was even more achievable today.
Mike Poole, an air crash investigator with CAE Flightscape, an aviation safety company in Canada, said that transmitting all that data in real time “sounds really attractive” but ...
Identification Friend or Foe (IFF) System Market.pdfHindhuja10
The Identification Friend or Foe (IFF) System Market: Enhancing Military Safety and Security with a Projected CAGR of 6% by 2027
The Identification Friend or Foe (IFF) system market is poised for substantial growth, with Market Data Forecast estimating its value to reach USD 3.8 billion by 2027, growing at a (CAGR) of 6% during the forecast period.
The Identification Friend or Foe (IFF) system is a sophisticated technology used in military and aviation sectors to distinguish between friendly and potentially hostile aircraft, vehicles, or vessels. It is a transponder-based system that emits signals containing encoded information, allowing friendly forces to identify and differentiate themselves from potential adversaries. IFF systems utilize unique codes or signatures, often encrypted, enabling military personnel or air traffic controllers to positively identify friendly assets, prevent friendly fire incidents, and enhance situational awareness in combat or operational scenarios.
Military forces globally are focused on modernizing their defense capabilities, including upgrading IFF systems. The need for advanced identification and interoperability among allied forces drives the demand for more sophisticated IFF technologies.
Beyond military applications, IFF systems play a crucial role in civilian air traffic management, ensuring secure and efficient airspace operations. The growing emphasis on safety and security in civilian aviation supports the demand for reliable IFF systems.
Continuous technological advancements in radar, transponder, and encryption technologies contribute to the evolution of IFF systems. Improved capabilities, such as Mode 5 IFF, encrypted communication, and integration with radar systems, drive market growth.
Integrating new IFF systems with existing radar and communication systems can be complex and costly. Compatibility issues and the need for seamless integration with diverse platforms and sensors pose challenges for adoption.
Adherence to evolving international standards and regulations, such as those set by ICAO (International Civil Aviation Organization) and military interoperability protocols, presents challenges for IFF system manufacturers. Compliance with changing standards and interoperability requirements across different platforms can be demanding.
Key Players in the IFF System Market:
● Lockheed Martin Corporation
● Thales Group
● Raytheon Company
● BAE Systems plc
● Northrop Grumman Corporation
● Harris Corporation (now L3Harris Technologies)
● Leonardo S.p.A.
● Saab AB
● Rheinmetall AG
● Israel Aerospace Industries (IAI)
● Hensoldt
● Terma A/S
● Elbit Systems Ltd.
● Indra Sistemas
● Cohort plc
● Astronics Corporation
● Kelvin Hughes Limited
● Curtiss-Wright Corporation
● RADA Electronic Industries Ltd.
Recent Developments:
● In October 2022, (Northrop Grumman) announced the successful integration of an advanced IFF system into a military aircraft, enhancing airspace safety and identification.
The f 35- culture change you can believe in v2ICSA, LLC
This briefing focuses upon the strategic impact of fleet wide U.S. and allied acquisition and operation of F-35s. This "flying combat system" deployed and operated as a fleet has strategic consequences. The allies are always forward deployed; US forces can plug into the F-35 And Aegis fleets in the Pacific and provide surge and augmentation capability or the US can lead an effort to which allies can contribute. The entire power projection dynamic is altered; your power projection capability is ALWAYS forward deployed.
Similar to Vanguard Magazine - The Joint Strike Fighter: Driven By Data (20)
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
UiPath Test Automation using UiPath Test Suite series, part 6
Vanguard Magazine - The Joint Strike Fighter: Driven By Data
1. The Joint
Strike Fighter:
F Fighter replacement
36 APRIL/MAY 2014 www.vanguardcanada.com
T
alking in detail about the F-35 Joint Strike Fighter re-
quires verbal dexterity. Many of the aircraft’s features
are classified, so inadvertently revealing a number or
the full capabilities of a sensor carry a heavy price.
“Leavenworth [prison] is such a terrible place to be,” Stephen
O’Bryan says with a rueful smile as he pauses yet again at the de-
scription of a sensor system.
The vice president of F-35 Program Integration and Business
Development for Lockheed Martin Aeronautics is treading care-
fully for good reason. He needs to continue selling the virtues of
the aircraft to Canadians, especially Cabinet members who now
hold the fate of Canada’s CF-18 fighter replacement program in
their hands following the delivery of an options analysis report
by the National Fighter Procurement Secretariat in April. But he
wants them to understand the generational leap in technology he
believes the F-35 represents without revealing the
full extent of its capability.
A former U.S. Navy fighter pilot with years of ex-
perience in F-18s, O’Bryan knows the limitations of
so-called fourth generation fighter jets. Where sur-
vival was once about the skill of a pilot, it will now
be about the strength of the data. “We used to say
speed is life; it’s now, information is life,” he says.
Rather than a technician in the cockpit, O’Bryan
envisions a tactician making rapid decisions based
on the automatic fusion of data from thousands
of sensors. “Fourth generation flying was hard.
The best fighter pilots I knew where the ones who
[could process what they heard over their radios]
and meld it with what they were looking at in their
displays. That made it more art than science.
“With the F-35, the pilot is a user of information. The idea is
to give you near-perfect information from a variety of sources,
including your wingmen, and fuse it into one picture. [And] ev-
erybody has the same accurate picture.”
He equates the introduction of the F-35 to the arrival of the
aircraft carrier and its impact on the notion of close engagement
in naval warfare. The fighter jet’s array of sensors, database and
processor allow it to operate from distance to degrade and then
attack an opponent’s capa-
bility.
To demonstrate why the
F-35 is a self-sufficient game-
changer, able to operate without
the support of electronic attack, air-
borne warning and control, or joint
surveillance and target attack aircraft, he
points to the AESA (active electronically
scanned array) radar.
For starters, the F-35’s APG 81 radar is no
longer just a radar. “It’s a multi-functional ar-
ray” that automatically fuses information from
“thousands of radars” in the aircraft, O’Bryan
explains. And rather than the familiar sweep-
ing cone, the F-35’s beam is more like a laser,
able to focus on a specific target or on multiple
targets (the exact number is classified) with ten
times the power of an EA 6B Prowler, he says.
Furthermore, a formation of four F-35s can
alternate transmission of the jamming signal
among themselves, again automatically. And
with stealth capability, one or all four of the air-
craft can operate from inside the target’s firing
range.
“You start with 10 times more power, and if
you are much closer and you are alternating sig-
nals between four airplanes with a stealth data link between them,
you can do that jamming in a coherent, cooperative manner. The
signal, the technique, everything is done for [the pilot].”
Equally important, where fourth generation radar are able to
detect the arrival of a threat with plus or minus 30 degrees accu-
racy, the F-35 can pinpoint the threat to within plus or minus one
degree, an advantage that is narrowed further with the assistance
of a formation of four aircraft sharing that threat trajectory, he
says.
Driven by data
by Chris Thatcher
2. FFighter replacement
www.vanguardcanada.com APRIL/MAY 2014 37
In mid-March, as the Eurofighter Typhoon prepared to mark
the 20th anniversary of its maiden flight, executives from
the European consortium were in Ottawa to remind the
government that although the F-35 Joint Strike Fight-
er might look good on paper and in testing, they
have an operations-proven option that can meet
Canada’s varied needs.
The Eurofighter of today is vastly improved from the airplane
that first took flight in 1994 and the three companies that
serve as the prime contractors – BAE Systems, Airbus Group
and Alenia Aermacchi – have unveiled a Typhoon 2020 con-
cept that is intended to ensure future evolution.
To date, the twin-engine, multi-mission Typhoon has accumu-
lated more than 225,000 flying hours in exercises and opera-
tions,includingLibya.Theconsortiumbelievesthatcapability
makes it an ideal solution for Canada’s fighter replacement
program.
Like Boeing and Dassualt, the two other likely bidders to re-
place Canada’s CF-18s, Eurofighter is becoming more vocal in
its call for the government to hold an open competition. (It will
have a presence at CANSEC 2014 in May.)
Company officials said they believe the landscape has shifted
in Canada since the government reset the fighter replace-
ment program in 2012 and laid out a seven-point plan to ex-
plore all options.
Not only do they believe the Typhoon can compete with the
F-35 in terms of capability for Canada’s multi-mission needs,
they said they have a “powerful argument to bring to the ta-
ble” regarding opportunities for Canadian industry in a global
supplychainthatgoeswellbeyonddefenceandcouldinclude
export opportunities in commercial aerospace, cyber, securi-
ty, border control and space.
BAE, Airbus and Alenia already have a sizeable footprint in
Canada, representing some 4,000 jobs and $1.5 billion in
sales, they added.
Moreover, Canada would become an equal partner in the Eu-
rofighter program, deriving the benefits of a “proven track
record, proven costs, and proven support costs.” A 20th anni-
versary might mean age to some, but for Eurofighter it means
knowledge and invaluable experience they hope Canada can
appreciate.
Typhoon pitches proven
capability and cost
When combined with the F-35’s equally accurate ranging and
its ability to build a common ground picture from a “tactically
significant range” (the resolution is classified) that enables auto
target correlation and recognition, “[the F-35] has the ability to
take the pictures, through the weather, classify the [targets], and
give mensurated coordinates.”
It’s a bit like being in a boxing match with an opponent who is
blindfolded and with his ears covered, O’Bryan explains. “You’ve
got great situational awareness, but you’ve also degraded his situ-
ational awareness with stealth, electronic attack, other sensors and
techniques.”
The rest of the electronic warfare (EW) systems, the distributed
aperture system (DAS) and the electro-optical targeting system
(EOTS) are equally impressive.
The six cameras that make up the DAS provide 360-degree situ-
ational awareness and missile detection and tracking that is able to
identify which aircraft in a formation has been targeted and then
triangulate the location from where the missile was fired. “DAS is
turning out to be better than we thought,” O’ Bryan says.
And the EOTS underneath the nose of the aircraft provides la-
ser guided bomb targeting, including locking onto moving tar-
gets, infrared search and track (IRST), blue-force interrogation,
non-cooperative target recognition (CTR) and radar frequency
counter measures (RFCM), which allow the F-35 to identify an
adversary by the return of its engines and emissions.
“It has the best combat ID suite of any fighter I have ever come
across,” he says. “And it has the most advanced suite of counter-
measures of any fighter airplane.” In addition, he points out that
the F-35 carries 18,500 pounds of onboard fuel, meaning it can
stay in the fight longer than its fourth generation counterparts.
That range of capability – operating at distance, onboard elec-
tronic warfare, target identification, common situational aware-
ness, and the ability to engage for longer duration – suggests a
change in tactics.
O’Bryan says young pilots entering the F-35 program are al-
ready starting to think of new ways of operating. “They are get-
ting very innovative. I have seen them in the simulator do things
that I have learned from, things to create deception and surprise.”
But that, too, will remain classified.