Dutch F-35 is implementing the first secret data share directly with the C2 system outside the United States


The Royal Dutch Air Force (RNLAF) has achieved a milestone during the MDO.

In what is considered an “important step forward in multiple integration,” the Royal Air Force (RNLAF) and Lockheed Martin’s work has successfully shown the first exchange of data ever built between the F-35 system within the aviation and the non-control and control system (C2). The test was held during Ramstein Lille, a multinational main exercise that started on March 31 and concluded on April 11, 2025.

During the exercise, the Dutch F-35S was discovered in the A2AD Denial Denial Condition and Similar Earth Simulation Goals. Use Advanced Datalink multi -functional datalink (MADL)The targeting data has been transferred through Skung Works’ Open Systems Gateway (OSG) to Keystone, which is the Dutch C2 environment. Keystone then transferred the information to a missile artillery platform, which shared and neutralized the target, and completed the killing series within minutes.

This achievement emphasizes the F-35 ability to integrate smoothly with the C2 allies, which enhances the common operational effectiveness. By opening the extensive data created by the F-35, OSG provides air and missile defense systems from the Allies to receive accurate targeting information and improve the detection times and response times.

Commodore bert ‘vida’ de Smit of the Rnlaf commented:

“Ramstein achieved a resounding successful success, which indicates the power of cooperation between the United States Air Force in Europe-the Africa-AFAFRICA and the actions of the Darb.

Oj Sanchez, Vice President and Director General of Lockheed Martin Skung Works added:

“The capabilities of all joint joint areas that were clarified in Ramstein for its science are a boom in multi-field operations, while emphasizing the F-35 ability to integrate smoothly with international C2 environments.

This is not the first time that a fifth-generation plane has been used to shorten what is known as the sensor to the small-decisive window of the time between discovering the target and connecting weapons on it. In the high charming, very dynamic fighting, the throat can be seconds of this decisive schedule. The goal is clear: winning data, sharing it quickly, and shooting first.

Early in 2016, the US Marine Corps explored the role of F-35 in the network-related killing chains. In a live demonstration, the F-35B of VMX-1 was combined at the Edwards Air Force Base in the Integrated Fire Control Base (NIFC-CA). As a front sensor, the plane discovered a missile threat on the horizon and pushed targeting data via advanced Datalink multi-functional Datalink (LLS-1) floor-LLS-1)-Earth-based AEGIS Simulation. The Simulator, equipped with the AEGIS 9.C1 and Standard 6 -missed line, operates the target and destroyed it successfully. It was a pivotal moment, showing how the ghost fighter can extend the marine air defense sensor.

In 2018, and F-35B joint data targeted with HIMARS (The high artillery missile system), more healthy in the ability of a plane on the ground -based fire braid near the real time. These tests have confirmed what many have suspected of society for a long time: Fifth -generation fighters are not only from archers, but multiple -field sensors are able to feed the targeted data to land platforms, sea or air.

Even before F-35, the F-22 RAPTOR began to redefine how the fighter contributes to the broader task. Once again in 2013, then Pacaf Commander General Hook Carlel Description of how RAPTOR can use its advanced sensors to provide targeting data to launch the submarine Tomahawk Land attack (Tseman) attack. In the inherent torque process, the role of F-22 developed into what was described as “The motor circumstantial awareness.Raptors accompanied the strike packages inside and outside the Syrian and Iraqi airspace, using the AESA radar and its sensor to create a detailed picture of the battle space. Then this intelligence was shared with other assets – from offensive aircraft to air portable early warning platforms – improving the total awareness of the entire strike.

F-35 inherits this task, and takes it further. With MadL, eots (Photo targeting system), AN/aq-37 Jet is designed to be the distributed aperture system (DAS) and the built -in Fusion engine, to be the actual time, coordination fires and data across fields. Whether feeding data targeted to a ship, standing on the ground, or supporting long-term fires from another continent, the fifth generation fighter is no longer just attracted to defense-it is the first knot in the killing chain.

Now, thanks to efforts like Dutch integration with Keystone, the Kill series no longer stops on the American border.

The pioneering test news comes in the wake of the controversy over the potential restrictions of the United States on the F-35S that operates a foreigner and the supposed presence “the key to killing”.

We also explained in detail in a previous article on “Kill the switch“The legend, which the US government has the ability to disrupt or reduce the operational capabilities of F-35 fighters, is not allowed to do independent F-35 operators” to conduct independent tests outside the continental United States (Conus) based on the United States policy. The US government security rules (USG) and the National Defense Policy (NDP) require that American citizens make specific jobs to protect critical American technology. “

Although this policy does not constitute the real “key to killing”, it reaches the United States that reserves the ability to block software updates and leave the plane effectively, but it is increasingly outdated.

Think of F-35 as a modern smartphone: an advanced platform that relies on frequent programs to stay at the forefront of power. To unlock new features, run advanced task groups, and stay interfering with the broader network, the plane needs to develop continuously.

If you stop updating your smartphone, it will not become useful overnight. You can still make calls and send messages. But with the appearance of new applications and services, your device is backward. Security holes do not start. Performance decomposes. In the end, it is no longer suitable for the purpose in a modern environment …

To a large extent, the F-35 works in the same way. It is not just a fighter plane, it is a network sensor phase, a fifth -generation fighting system built around communication, fusion and adaptation. Without updates in time, he can still fly, but its edge fades quickly. In the area of ​​data paid in the actual time, graceful threats, and multi -field complexity, the current survival is not luxury, it is survival.

This is where the recent Dutch test in Ramstein may indicate something bigger.

By successfully showing the exchanging direct data between the F-35 on the plane and the non-American C2 system, the Royal Air Force was not achieved only from a technical box, but rather a statement.

Despite the central nature of the F-35 program and the potential restrictions imposed by the protection of the source code and the control of the upgrade, allied operators actively work to benefit from the advanced aircraft capabilities, proving that there is an operating value even outside the structure that focuses on the United States.

message? Even with the attached strings, the fifth general. The platforms remain a powerful tool in the hands of allies, especially when countries invest in integration, creativity and technical sovereignty.





Source link

Leave a Reply

Your email address will not be published. Required fields are marked *