As Congress begins to take up the Obama administration’s defense budget, one item not even under discussion needs to be considered. Events of the past 18 months have made clear that it’s time to rethink the fate of the F-22 …Continue reading →
Defense Secretary Bob Gates will be told in a meeting today that development of the F-35 Joint Strike Fighter will be further delayed, on top of the 13-month slippage that was disclosed in March. Confucius, Œc. Vol.Don’t ask impertinent questions …Continue reading →
Here’s a couple tiny excerpts, but you need to read Arthur Herman’s piece in the upcoming Commentary. Twice. Not just because it jibes extensively with Confucius’s* thoughts on the American military. Seriously. Make time. Print it out. Whatever it takes. …Continue reading →
Dr. J writes in: GE/Rolls Royce had an advertisement on the radio asking me to call my congressman to ask him to support funding their jet engine program for the F-35. After my so-called Blue-dog Democrat voted for TARP, the …Continue reading →
So, the good folks over at Air Power Australia have put out maybe the most comprehensive open-source study of the PAK-FA, and whaddya know, it looks to be a hell of a plane. In fact, it’s so good that if …Continue reading →
Mike Goldfarb is on fire these days. Your Volgi hasn’t even gotten to his reporting on Burma (tonight, maybe). But here he relates a hell of a scoop by Congressional Quarterly’s Josh Rogin: According to Rogin, “An internal Pentagon oversight …Continue reading →
Regardless of the vote in the Senate, “ The F-22 funding termination this week doesn’t change a thing [about the tactical advantages offered by the stealth fighter’s advanced systems] and I think history will bear out the F-22 advocates’ position …Continue reading →
From Aviation Week: Top military planners in the Pacific are well aware of the F-22’s less advertised capabilities as an airborne command and control node, an intelligence, surveillance and reconnaissance sensor package and an advanced electronic and information warfare weapon. …Continue reading →
Mike Goldfarb writes a great obituary. It’s not quite Marc Antony at Caesar’s funeral, but it’s worth your time, beginning: The final vote is 58 to 40. With that victory the Obama White House has eliminated the last major threat …Continue reading →
My Man(darin), spectacular avionics porn. Let’s just hope it’s not one of the things the Chinese stole a couple months back. If you look at the stuff the F-22* can do, and the F-35 is supposed to be able to …Continue reading →
Your Mandarin was sent by secret courier a very interesting link that details the proposed sensor systems in the new F-35 Joint Strike Fighter. If this works even half as well as advertised, this will be incredibly awesome. The MandarinThe …Continue reading →
Bill Sweetman writes, under the great headline: F35 H4X0R3D ZOMG! The Wall Street Journal reports today that part of the F-35 Joint Strike Fighter program’s computer network has been penetrated and compromised, most likely by China-based intelligence operatives. Key points …Continue reading →
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.