Chers abonnés, bonjour. Conformément au réglement de l’Union Européenne n°2016/679 ou Réglement Général sur la Protection des Données, vous pouvez accéder à vos données mais aussi les effacer si vous le souhaitez en remplissant le formulaire RGPD qui est ici: https://airforces.fr/contact/
Dear subscribers, good morning. In accordance with the European Union regulation n°2016/679 or General Data Protection Regulation, you can access your data but also delete them if you wish by filling out the GDPR form which is here: https://airforces.fr/contact/
Un message de confirmation vous sera envoyé par la suite.
Watch and listen carefully to Mr. Learmount’s point of view which has been deemed to be of considerable interest as far as the 2009 AF 447 crash is concerned. Please notice that there are interesting acronyms such as GIGO (Garbage in – Garbage out), and LOC – if it is well known as « Loss of Consciousness » – means « Loss of Control » here. Special thanks to Xavier Cotton (Passion pour l’aviation webmaster) who has found out this video:
As far as the Swiss Air Force is concerned, there has been two options so far – the choice of new fighter aircraft or postponement thereof, the second alternative has been chosen. You will find hereafter the Avianews webmaster’s analysis:
This is the Swiss Federal Council Message:
« However, given the current state of federal finances and priorities taken as a whole, the time of acquisition is postponed to no later than 2015. The Federal Council decided on the proposal of DDPS (Federal Department of Defence, Civil Protection and Sports) to postpone the replacement of 54 obsolete combat aircraft F-5 Tiger Air Force. The Head of the DDPS, Ueli Maurer held a news conference on the postponement which is expected to last at most until 2015. The Federal Department of Finance and the DDPS together confirm by the end of 2011 the conditions for an acquisition during the second half of the decade. »
The reasons for non selection:
First, this is an organizational problem from the financial organization of Armée XXI. Remember, the people had voted for the new military organization with a comfortable 70% « yes »! id est a military downsized with a budget of only 4.3 billion Swiss Francs now. However, the parliament has never put forward this budget that painfully reaches 3.6 billion. The Swiss People is reportedly disappointed by such loss of income, and deception as well.
No F-5 replacement:
Replacing the F-5 is out of the question anymore but to get prepared for the next generation of F/A-18 from 2025. Consequently, there is more urgency to acquire a large number of aircraft as a whole block but split into several ones.
The losers in this case are the Swiss industry and jobs. Indeed, if the cost of a fighter plane is expensive, the returns on partnerships to « Offsets » were significantly higher and would have revitalized both the Swiss manufacturing industry and employment.
The three companies will meet in a few years for a new offer and therefore cannot comment on this « no choice »!
Dassault must be disappointed for they would certainly have won the contract with his Rafale. The version of the Rafale-04T was proposed with more powerful engines, the wiring for the METEOR missile, the new targeting pod Damocles XF and the brand new IDM (Improved Data Modem).
It bodes well for Saab because they now may complete the Swedish version of the Gripen E / F (NG), whose development is not completed yet and find a buyer with the Swedish Air Force (SwAF). Indeed, it must order the Gripen E / F by 2015.
EADS Eurofighter will be able to finalize its AESA E-scan radar and they are likely to reduce maintenance costs of the aircraft as promised this summer to the Switzerland Economy Minister Doris Leuthard at the ILA Berlin Airshow.
Commentary by Gen. Norton A. Schwartz, Air Force Chief of Staff. 5/28/2009- WASHINGTON, D.C —
In executing our Air Force mission of fly, fight and win, our Airmen, civilians and contractors, knowingly or unknowingly, engage daily on the cyber battlefield. Computers and personal electronic devices connected to our networks can simultaneously be powerful tools and critical vulnerabilities. At times, our networks have been compromised by multiple means: Malware hidden in emails, virus-corrupted thumb drives, and media moved incorrectly between networks. We can prevent these events with due consideration and proper procedures, but in the past, we’ve regarded network protection and security as the « comm guy’s job, » and as a user inconvenience. This must no longer be the case.