Thursday, 12 March 2020 09:51

New report says F-35 design flaws mounting, but few being fixed Featured

New report says F-35 design flaws mounting, but few being fixed Image by Military_Material from Pixabay

The program office for the F-35 Joint Strike Fighter has made little progress in fixing hundreds of design flaws in the fighter jet, according to a report obtained by the non-partisan independent watchdog Project On Government Oversight.

The Joint Strike Fighter Program Office’s Deficiency Report Metrics document of 28 February listed 883 unresolved design flaws, with no plans to correct more than 160 of them.

More than half the flaws, 448, were in dispute, with pilots or engineers describing a problem, and contractors, who had to fix them, contesting their existence.

Reporter Dan Grazier wrote that a number of sources from inside the F-35 program had told POGO that the stock response from Lockheed Martin, the main contractor, was to respond to reports of a shortcoming by saying that it could be fixed only if the contract itself was changed.

In June last year, a report in Defence News said the F-35 was still marred by flaws and glitches that could cause risks to pilot safety and also affect the jet's ability to carry out key parts of its mission.

The POGO report said 162 flaws were listed as "open, no planned correction", in the document. Only 10 flaws were listed as being fixable before future modernisation. Fixes for a further 273 had been found, but there were either no funds to carry out the work or else more testing was needed to verify the proposed solutions.

Australia is one of the F-35 fighter recipients, with 14 F-35As ordered in November 2009. A second batch of 58 was ordered in April 2014 and 28 more are expected to be ordered to bring the figure to 100. There are three versions of the plane: the F-35A is for conventional takeoff and landing; the F-35B for short takeoff/vertical landing; and the F-35C for aircraft carriers.

The cost of the 72 planes was put at $17 billion in 2015, though cost blowouts may happen due to frequent production and delivery delays.

Eleven countries — Australia, Belgium, Denmark, Italy, Israel, the Netherlands, Norway, Japan, South Korea, Turkey and the UK — are buying the F-35 as their future fighter of choice. Nine partner nations have contributed funds to the plane's development. Canada pulled out of the program.

The POGO report said there nine Category I flaws, those that “may cause death, severe injury, or severe occupational illness; may cause loss or major damage to a weapon system; critically restricts the combat readiness capabilities of the using organisation; or result in a production line stoppage". No comment about solutions was provided when the program office was asked for one.

Rather, minutes from a 2018 Deficiency Review Board meeting showed paperwork was being changed to reclassify some of the Category I flaws to a lower status, rather than fix them.

Grazier wrote that the persistent nature of the design flaws was also highlighted. "The F-35 entered operational testing in December 2018 with a large 'technical debt' of problems that had been identified but not corrected during developmental testing, as the Pentagon’s testing office reported earlier this year," he said.

"Of the 873 deficiencies identified by the testing office as of November 2019, approximately 576, or 66%, were carried over from the development phase."

WEBINAR event: IT Alerting Best Practices 27 MAY 2PM AEST

LogicMonitor, the cloud-based IT infrastructure monitoring and intelligence platform, is hosting an online event at 2PM on May 27th aimed at educating IT administrators, managers and leaders about IT and network alerts.

This free webinar will share best practices for setting network alerts, negating alert fatigue, optimising an alerting strategy and proactive monitoring.

The event will start at 2pm AEST. Topics will include:

- Setting alert routing and thresholds

- Avoiding alert and email overload

- Learning from missed alerts

- Managing downtime effectively

The webinar will run for approximately one hour. Recordings will be made available to anyone who registers but cannot make the live event.



Security requirements such as confidentiality, integrity and authentication have become mandatory in most industries.

Data encryption methods previously used only by military and intelligence services have become common practice in all data transfer networks across all platforms, in all industries where information is sensitive and vital (financial and government institutions, critical infrastructure, data centres, and service providers).

Get the full details on Layer-1 encryption solutions straight from PacketLight’s optical networks experts.

This white paper titled, “When 1% of the Light Equals 100% of the Information” is a must read for anyone within the fiber optics, cybersecurity or related industry sectors.

To access click Download here.


Sam Varghese

website statistics

Sam Varghese has been writing for iTWire since 2006, a year after the site came into existence. For nearly a decade thereafter, he wrote mostly about free and open source software, based on his own use of this genre of software. Since May 2016, he has been writing across many areas of technology. He has been a journalist for nearly 40 years in India (Indian Express and Deccan Herald), the UAE (Khaleej Times) and Australia (Daily Commercial News (now defunct) and The Age). His personal blog is titled Irregular Expression.



Recent Comments