New software will give the F-35 a decisive edge over any enemy fighter aircraft

NEW SOFTWARE WILL GIVE THE F-35 A DECISIVE EDGE OVER ANY ENEMY FIGHTER AIRCRAFT

By Dario Leone
Nov 2 2017
Share this article

The software is conceived to allow the F-35 to precisely identify advanced enemy aircraft such as the Chinese J-20 and the Russian Su-57 stealth fighters

The U.S. Air Force (USAF) is speeding up the development of a new on-board threat library for the F-35 stealth fighter. According to USAF officials this software is conceived to precisely identify advanced enemy aircraft such as the Chinese Chengdu J-20 and the Russian Sukhoi Su-57 stealth fighters.

According to Scout.com these “mission data files,” which are described as the brains of the F-35, are extensive on-board data systems compiling information on geography, air space and potential threats in areas where the F-35 might be expected to perform combat operations.

Consisting of hardware and software, the mission data files are essentially a database of known threats and friendly aircraft in specific parts of the world. Noteworthy the mission data files are aimed to work with the aircraft’s Radar Warning Receiver (RWR) that is designed to find and identify approaching enemy threats.

The files, that are being worked on at a reprogramming laboratory at Eglin Air Force Base (AFB), Fla., have experienced some delays which led to quicken their development so that the operational F-35s have the most extensive threat library possible. The first increments of the technology will be integrated for training F-35s.

“If there is nothing in the library, the F-35 will not know exactly what the threat will be,” a USAF official explained.

The mission data packages are loaded with a wide range of information to include commercial airliner information and specifics on Russian and Chinese fighter jets.

F-35A print
This print is available in multiple sizes from AircraftProfilePrints.com – CLICK HERE TO GET YOURS. F-35A Lighning II 56th OG, 61st FS, LF/12-5050 / 2014

For example, the mission data system would enable a pilot to quickly identify a Russian MiG-29 if it were detected by the F-35’s sensors.

Furthermore the mission data files can adapt to new threats and intelligence information as they emerge.

The USAF is developing 12 different mission data files for 12 different geographic areas.

The idea of having an advanced threat library is to enable F-35 pilots to see and destroy enemies in the air, well in advance of a potential dogfight scenario.

This can be explained in terms of a well-known Air Force strategic concept pioneered years ago by air theorist and pilot Col. John Boyd, referred to as the “OODA Loop,” – for observe, orient, decide and act. The concept is to complete this process quickly and make fast decisions while in an air-to-air dogfight in order to get inside the enemy’s decision cycle, properly anticipate, and destroy an enemy before it can destroy you.

New software will give the F-35 a decisive edge over any enemy fighter aircraft

According to USAF thanks to its advanced sensor fusion the F-35 can complete the OODA loop much more quickly than any potential adversary.

Photo credit: Tech. Sgt. Ryan Crane and Airman 1st Class Tristan Biese / U.S. Air Force

Artwork courtesy of AircraftProfilePrints.com


Share this article

Dario Leone

Dario Leone

Dario Leone is an aviation, defense and military writer. He is the Founder and Editor of “The Aviation Geek Club” one of the world’s most read military aviation blogs. His writing has appeared in The National Interest and other news media. He has reported from Europe and flown Super Puma and Cougar helicopters with the Swiss Air Force.

Leave a comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Share this article


Share this article
Share this article

Always up to date! News and offers delivered directly to you!

Get the best aviation news, stories and features from The Aviation Geek Club in our newsletter, delivered straight to your inbox.

Error: Contact form not found.


Share this article
Back to top
My Agile Privacy
This website uses technical and profiling cookies. Clicking on "Accept" authorises all profiling cookies. Clicking on "Refuse" or the X will refuse all profiling cookies. By clicking on "Customise" you can select which profiling cookies to activate. We and our selected ad partners can store and/or access information on your device, such as cookies, unique identifiers, browsing data. You can always choose the specific purposes related to profiling by accessing the advertising preferences panel, and you can always withdraw your consent at any time by clicking on "Manage consent" at the bottom of the page.

List of some possible advertising permissions:

You can consult: our list of advertising partners, the Cookie Policy and the Privacy Policy.
Warning: some page functionalities could not work due to your privacy choices